From e922a564ce31a82ada8681d2eaf7ad15fb32bd00 Mon Sep 17 00:00:00 2001 From: Micah Anderson Date: Thu, 22 Sep 2005 12:41:12 +0000 Subject: Prepare to release python2.2 DTSA, updated website and added hints git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2091 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- website/DTSA/DTSA-18-1.html | 91 +++++++++++++++++++++++++++++++++++++++++++++ website/list.html | 4 +- 2 files changed, 94 insertions(+), 1 deletion(-) create mode 100644 website/DTSA/DTSA-18-1.html (limited to 'website') diff --git a/website/DTSA/DTSA-18-1.html b/website/DTSA/DTSA-18-1.html new file mode 100644 index 0000000000..f4869d86a0 --- /dev/null +++ b/website/DTSA/DTSA-18-1.html @@ -0,0 +1,91 @@ + + + Debian testing security team - Advisory + + + + +
+ + + + + Debian Project +
+
+ + + + + + + + + + + +
+ Debian testing security team - Advisory +
+ + +
+ + +

DTSA-18-1

+
+
Date Reported:
+
September 22, 2005
+
Affected Package:
+
python2.2
+
Vulnerability:
+
integer overflow
+
Problem-Scope:
+
remote
+
Debian-specific:
+
No
+
CVE:
+
+CAN-2005-2491 +
+
More information:
+
An integer overflow with a subsequent buffer overflow has been detected 
+in PCRE, the Perl Compatible Regular Expressions library, allowing 
+a remote attacker to execute arbitrary code. This code is also present in Python. 
+Exploiting this vulnerability requires an attacker to specify the used 
+regular expression. 
+
+
For the testing distribution (etch) this is fixed in version 2.2.3dfsg-2sarge1
+
For the unstable distribution (sid) this is fixed in version 2.2.3dfsg-4
+
This upgrade is recommended if you use python2.2.
+
If you have the secure testing lines in your sources.list, you can update by running this command as root:
+ +
apt-get update && apt-get install python2.2
+
+ +
+
To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:
+
+
deb http://secure-testing-mirrors.debian.net/debian-secure-testing etch-proposed-updates/security-updates main contrib non-free
+
deb-src http://secure-testing-mirrors.debian.net/debian-secure-testing etch-proposed-updates/security-updates main contrib non-free
+
+
The archive signing key can be downloaded from
+
http://secure-testing.debian.net/ziyi-2005-7.asc
+ +
+ + +
+ + Valid HTML 4.01! + + Valid CSS! + + + + diff --git a/website/list.html b/website/list.html index d53f10931f..1fe0818093 100644 --- a/website/list.html +++ b/website/list.html @@ -67,10 +67,12 @@
several
[September 13th, 2005] DTSA-15-1 php4
several vulnerabilities
-
[September 15, 2005] DTSA-16-1 linux-2.6
+
[September 15th, 2005] DTSA-16-1 linux-2.6
various
[September 15th, 2005] DTSA-17-1 lm-sensors
insecure temporary file
+
[September 22, 2005] DTSA-18-1 python2.2
+
integer overflow

-- cgit v1.2.3