From ef8295eb935cca9a27731d2042d2ffd9f2605e3a Mon Sep 17 00:00:00 2001 From: Micah Anderson Date: Thu, 22 Sep 2005 12:33:08 +0000 Subject: Preparing python2.2 adv. added xerves24 to removed-packages git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2089 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- data/DTSA/advs/19-python2.2.adv | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 data/DTSA/advs/19-python2.2.adv (limited to 'data/DTSA/advs') diff --git a/data/DTSA/advs/19-python2.2.adv b/data/DTSA/advs/19-python2.2.adv new file mode 100644 index 0000000000..6bdb6f2558 --- /dev/null +++ b/data/DTSA/advs/19-python2.2.adv @@ -0,0 +1,17 @@ +source: python2.2 +date: September 22, 2005 +author: Micah Anderson +vuln-type: integer overflow +problem-scope: remote +debian-specifc: no +cve: CAN-2005-2491 +vendor-advisory: +testing-fix: 2.2.3dfsg-2sarge1 +sid-fix: 2.2.3dfsg-4 +upgrade: apt-get install python2.2 + +An integer overflow with a subsequent buffer overflow has been detected +in PCRE, the Perl Compatible Regular Expressions library, allowing +a remote attacker to execute arbitrary code. This code is also present in Python. +Exploiting this vulnerability requires an attacker to specify the used +regular expression. -- cgit v1.2.3