From 729fc70fc4d56f1b9d92ac7e384ccd103b63412a Mon Sep 17 00:00:00 2001 From: Micah Anderson Date: Thu, 22 Sep 2005 12:36:17 +0000 Subject: Bump kdelibs adv number git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2090 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- data/DTSA/advs/18-kdelibs.adv | 15 --------------- data/DTSA/advs/18-python2.2.adv | 17 +++++++++++++++++ data/DTSA/advs/19-kdelibs.adv | 15 +++++++++++++++ data/DTSA/advs/19-python2.2.adv | 17 ----------------- 4 files changed, 32 insertions(+), 32 deletions(-) delete mode 100644 data/DTSA/advs/18-kdelibs.adv create mode 100644 data/DTSA/advs/18-python2.2.adv create mode 100644 data/DTSA/advs/19-kdelibs.adv delete mode 100644 data/DTSA/advs/19-python2.2.adv (limited to 'data/DTSA/advs') diff --git a/data/DTSA/advs/18-kdelibs.adv b/data/DTSA/advs/18-kdelibs.adv deleted file mode 100644 index 4b12cbd030..0000000000 --- a/data/DTSA/advs/18-kdelibs.adv +++ /dev/null @@ -1,15 +0,0 @@ -source: kdelibs -date: September 13th, 2005 -author: Moritz Muehlenhoff -vuln-type: insecure default permissions -problem-scope: local -debian-specifc: no -cve: CAN-2005-1920 -vendor-advisory: -testing-fix: 4:3.3.2-6.1etch1 -sid-fix: 4:3.4.2-1 -upgrade: apt-get install kdelibs4 - -kate always created backup files for edited files with default permissions, -even if the original permissions were stricter. This could lead to information -disclosure. \ No newline at end of file diff --git a/data/DTSA/advs/18-python2.2.adv b/data/DTSA/advs/18-python2.2.adv new file mode 100644 index 0000000000..6bdb6f2558 --- /dev/null +++ b/data/DTSA/advs/18-python2.2.adv @@ -0,0 +1,17 @@ +source: python2.2 +date: September 22, 2005 +author: Micah Anderson +vuln-type: integer overflow +problem-scope: remote +debian-specifc: no +cve: CAN-2005-2491 +vendor-advisory: +testing-fix: 2.2.3dfsg-2sarge1 +sid-fix: 2.2.3dfsg-4 +upgrade: apt-get install python2.2 + +An integer overflow with a subsequent buffer overflow has been detected +in PCRE, the Perl Compatible Regular Expressions library, allowing +a remote attacker to execute arbitrary code. This code is also present in Python. +Exploiting this vulnerability requires an attacker to specify the used +regular expression. diff --git a/data/DTSA/advs/19-kdelibs.adv b/data/DTSA/advs/19-kdelibs.adv new file mode 100644 index 0000000000..4b12cbd030 --- /dev/null +++ b/data/DTSA/advs/19-kdelibs.adv @@ -0,0 +1,15 @@ +source: kdelibs +date: September 13th, 2005 +author: Moritz Muehlenhoff +vuln-type: insecure default permissions +problem-scope: local +debian-specifc: no +cve: CAN-2005-1920 +vendor-advisory: +testing-fix: 4:3.3.2-6.1etch1 +sid-fix: 4:3.4.2-1 +upgrade: apt-get install kdelibs4 + +kate always created backup files for edited files with default permissions, +even if the original permissions were stricter. This could lead to information +disclosure. \ No newline at end of file diff --git a/data/DTSA/advs/19-python2.2.adv b/data/DTSA/advs/19-python2.2.adv deleted file mode 100644 index 6bdb6f2558..0000000000 --- a/data/DTSA/advs/19-python2.2.adv +++ /dev/null @@ -1,17 +0,0 @@ -source: python2.2 -date: September 22, 2005 -author: Micah Anderson -vuln-type: integer overflow -problem-scope: remote -debian-specifc: no -cve: CAN-2005-2491 -vendor-advisory: -testing-fix: 2.2.3dfsg-2sarge1 -sid-fix: 2.2.3dfsg-4 -upgrade: apt-get install python2.2 - -An integer overflow with a subsequent buffer overflow has been detected -in PCRE, the Perl Compatible Regular Expressions library, allowing -a remote attacker to execute arbitrary code. This code is also present in Python. -Exploiting this vulnerability requires an attacker to specify the used -regular expression. -- cgit v1.2.3