[Secure-testing-commits] r1842 - in data/DTSA: . advs

Joey Hess joeyh at costa.debian.org
Wed Sep 7 17:08:19 UTC 2005


Author: joeyh
Date: 2005-09-07 17:08:19 +0000 (Wed, 07 Sep 2005)
New Revision: 1842

Modified:
   data/DTSA/advs/0-hotzenplotz.adv
   data/DTSA/advs/1-kismet.adv
   data/DTSA/advs/10-pcre.adv
   data/DTSA/advs/11-maildrop.adv
   data/DTSA/advs/12-vim.adv
   data/DTSA/advs/2-centericq.adv
   data/DTSA/advs/3-clamav.adv
   data/DTSA/advs/4-ekg.adv
   data/DTSA/advs/5-gaim.adv
   data/DTSA/advs/6-cgiwrap.adv
   data/DTSA/advs/7-mozilla.adv
   data/DTSA/advs/8-mozilla-firefox.adv
   data/DTSA/advs/9-bluez-utils.adv
   data/DTSA/dtsa
Log:
add upgrade: field in advisory files, to get rid of the need to manually
edit that FIXME every time


Modified: data/DTSA/advs/0-hotzenplotz.adv
===================================================================
--- data/DTSA/advs/0-hotzenplotz.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/0-hotzenplotz.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -9,6 +9,7 @@
 vendor-advisory: http://www.hotzenplotz.org/sec/buffer-overflow.html
 testing-fix: 3.14-1ts1
 sid-fix: 3.14-2
+upgrade: apt-get install hotzenplotz
 
 User authentication in hotzenplotz does not verify the user name properly.
 A buffer overflow can be exploited to execute arbitrary code with elevated

Modified: data/DTSA/advs/1-kismet.adv
===================================================================
--- data/DTSA/advs/1-kismet.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/1-kismet.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2626 CAN-2005-2627
 testing-fix: 2005.08.R1-0.1etch1
 sid-fix: 2005.08.R1-1
+upgrade: apt-get install kismet
 
 Multiple security holes have been discovered in kismet:
 

Modified: data/DTSA/advs/10-pcre.adv
===================================================================
--- data/DTSA/advs/10-pcre.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/10-pcre.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2491
 testing-fix: 6.3-0.1etch1
 sid-fix: 6.3-1
+upgrade: apt-get install libpcre3
 
 An integer overflow in pcre_compile.c in Perl Compatible Regular Expressions
 (PCRE) allows attackers to execute arbitrary code via quantifier values in

Modified: data/DTSA/advs/11-maildrop.adv
===================================================================
--- data/DTSA/advs/11-maildrop.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/11-maildrop.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2655
 testing-fix: 1.5.3-1.1etch1
 sid-fix: 1.5.3-2
+upgrade: apt-get install maildrop
 
 The lockmail binary shipped with maildrop allows for an attacker to
 obtain an effective gid as group "mail".  Debian ships the binary with its

Modified: data/DTSA/advs/12-vim.adv
===================================================================
--- data/DTSA/advs/12-vim.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/12-vim.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2368
 testing-fix: 1:6.3-085+0.0etch1
 sid-fix: 1:6.3-085+1
+upgrade: apt-get install vim
 
 vim modelines allow files to execute arbitrary commands via shell
 metacharacters in the glob or expand commands of a foldexpr expression

Modified: data/DTSA/advs/2-centericq.adv
===================================================================
--- data/DTSA/advs/2-centericq.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/2-centericq.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2448 CAN-2005-2370 CAN-2005-2369 CAN-2005-1914
 testing-fix: 4.20.0-8etch1
 sid-fix: 4.20.0-9
+upgrade: apt-get install centericq
 
 centericq in testing is vulnerable to multiple security holes:
 

Modified: data/DTSA/advs/3-clamav.adv
===================================================================
--- data/DTSA/advs/3-clamav.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/3-clamav.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2070 CAN-2005-1923 CAN-2005-2056 CAN-2005-1922 CAN-2005-2450
 testing-fix: 0.86.2-4etch1
 sid-fix: 0.86.2-1
+upgrade: apt-get upgrade
 
 Multiple security holes were found in clamav:
 

Modified: data/DTSA/advs/4-ekg.adv
===================================================================
--- data/DTSA/advs/4-ekg.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/4-ekg.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-1916 CAN-2005-1851 CAN-2005-1850 CAN-2005-1852 CAN-2005-2448
 testing-fix: 1:1.5+20050808+1.6rc3-0etch1
 sid-fix: 1:1.5+20050808+1.6rc3-1
+upgrade: apt-get install libgadu3 ekg
 
 Multiple vulnerabilities were discovered in ekg:
 

Modified: data/DTSA/advs/5-gaim.adv
===================================================================
--- data/DTSA/advs/5-gaim.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/5-gaim.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2102 CAN-2005-2370 CAN-2005-2103
 testing-fix: 1:1.4.0-5etch2
 sid-fix: 1:1.4.0-5
+upgrade: apt-get install gaim
 
 Multiple security holes were found in gaim:
 

Modified: data/DTSA/advs/6-cgiwrap.adv
===================================================================
--- data/DTSA/advs/6-cgiwrap.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/6-cgiwrap.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: 
 testing-fix: 3.9-3.0etch1
 sid-fix: 3.9-3.1
+upgrade: apt-get upgrade
 
 Javier Fernández-Sanguino Peña discovered various vulnerabilities in cgiwrap:
 

Modified: data/DTSA/advs/7-mozilla.adv
===================================================================
--- data/DTSA/advs/7-mozilla.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/7-mozilla.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2004-0718 CAN-2005-1937
 testing-fix: 2:1.7.8-1sarge1
 sid-fix: 2:1.7.10-1
+upgrade: apt-get install mozilla
 
 A vulnerability has been discovered in Mozilla that allows remote attackers
 to inject arbitrary Javascript from one page into the frameset of another

Modified: data/DTSA/advs/8-mozilla-firefox.adv
===================================================================
--- data/DTSA/advs/8-mozilla-firefox.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/8-mozilla-firefox.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2004-0718 CAN-2005-1937 CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
 testing-fix: 1.0.4-2sarge3
 sid-fix: 1.0.6-3
+upgrade: apt-get install mozilla-firefox
 
 We experienced that the update for Mozilla Firefox from DTSA-8-1
 unfortunately was a regression in several cases.  Since the usual

Modified: data/DTSA/advs/9-bluez-utils.adv
===================================================================
--- data/DTSA/advs/9-bluez-utils.adv	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/advs/9-bluez-utils.adv	2005-09-07 17:08:19 UTC (rev 1842)
@@ -8,6 +8,7 @@
 cve: CAN-2005-2547
 testing-fix: 2.19-0.1etch1
 sid-fix: 2.19-1
+upgrade: apt-get install bluez-utils
 
 A bug in bluez-utils allows remote attackers to execute arbitrary commands
 via shell metacharacters in the Bluetooth device name when invoking the PIN

Modified: data/DTSA/dtsa
===================================================================
--- data/DTSA/dtsa	2005-09-07 16:56:57 UTC (rev 1841)
+++ data/DTSA/dtsa	2005-09-07 17:08:19 UTC (rev 1842)
@@ -36,6 +36,7 @@
 	descr = []
 	author = ""
 	scope = ""
+	upgrade = "apt-get upgrade"
 	debian_specific = False
 
 	dtsa_id = "DTSA-" + id + "-" + str(sid)
@@ -65,6 +66,8 @@
 			testing_fix = i[12:].strip()
 		elif i.startswith("sid-fix:"):
 			sid_fix = i[8:].strip()
+		elif i.startswith("upgrade:"):
+			upgrade = i[8:].strip()
 		elif d:
 			descr.append(i.strip())
 		elif i == "\n" and d == False:
@@ -73,11 +76,11 @@
 	if len(cve) == 0:
 		print "No CVE assignments seem to have been made for this issue"
 
-	export_html(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, dtsa_id, 1, author, scope, debian_specific)  
+	export_html(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, dtsa_id, 1, author, scope, debian_specific, upgrade)
 	
 	print "A html representation has been generated as",dtsa_id + ".html"
 	
-	export_ascii(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, dtsa_id, 1, author, scope, debian_specific)  
+	export_ascii(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, dtsa_id, 1, author, scope, debian_specific, upgrade)
 
 	print "A textual representation has been generated as", dtsa_id
 	print "You can publish it with the sndadvisory script"
@@ -103,7 +106,7 @@
 	l_f.write("\tTODO: unreleased\n")
 	l_f.close()
 
-def export_html(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, id, rev, author, scope, debian_specific):
+def export_html(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, id, rev, author, scope, debian_specific, upgrade):
 	html = open(os.getcwd() + "/" + id + ".html", "w")
 	
 	# Open, read, write and close the header
@@ -158,7 +161,7 @@
 	html.write("<dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>\n")
 	html.write("\n")
 
-	html.write("<dd>apt-get update && apt-get install "+ src + " FIXME, I'm broken </dd>\n")
+	html.write("<dd>apt-get update && "+ upgrade + "</dd>\n")
 	html.write("<br>\n")
 	html.write("\n")
 	# FIXME, use python-crypto for inclusion of SHA-1 checksums
@@ -175,7 +178,7 @@
 	pass
 
 
-def export_ascii(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, id, rev, author, scope, debian_specific):
+def export_ascii(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_advisory, id, rev, author, scope, debian_specific, upgrade):
 	ascii = open(os.getcwd() + "/" + id, "w")
 
 	# FIXME: use a nice external template with alignment specifiers
@@ -243,7 +246,7 @@
 	ascii.write("To install the update, run this command as root:\n")
 	ascii.write("\n")
 
-	ascii.write("apt-get update && apt-get install "+ src + "FIXME, I'm broken \n")
+	ascii.write("apt-get update && "+ upgrade + "\n")
 	ascii.write("\n")
   
 	ascii.write("For further information about the Debian testing security team, please refer\n")




More information about the Secure-testing-commits mailing list