[Secure-testing-commits] r5903 - data/CVE data/DTSA website/DTSA
stef-guest at alioth.debian.org
stef-guest at alioth.debian.org
Wed May 23 06:34:53 UTC 2007
Author: stef-guest
Date: 2007-05-23 06:34:51 +0000 (Wed, 23 May 2007)
New Revision: 5903
Modified:
data/CVE/list
data/DTSA/dtsa
website/DTSA/DTSA-35-1.html
website/DTSA/DTSA-36-1.html
website/DTSA/DTSA-37-1.html
Log:
fix some more references to etch
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2007-05-22 21:14:11 UTC (rev 5902)
+++ data/CVE/list 2007-05-23 06:34:51 UTC (rev 5903)
@@ -85,7 +85,7 @@
CVE-2007-2755 (The PrecisionID Barcode 1.9 ActiveX control in ...)
TODO: check
CVE-2007-2754 (Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and ...)
- - freetype <unfixed> (bug filed)
+ - freetype <unfixed> (bug #425625)
CVE-2007-2753 (RunawaySoft Haber portal 1.0 stores sensitive information under the ...)
TODO: check
CVE-2007-2752 (SQL injection vulnerability in devami.asp in RunawaySoft Haber portal ...)
Modified: data/DTSA/dtsa
===================================================================
--- data/DTSA/dtsa 2007-05-22 21:14:11 UTC (rev 5902)
+++ data/DTSA/dtsa 2007-05-23 06:34:51 UTC (rev 5903)
@@ -1,4 +1,5 @@
-#!/usr/bin/python
+#!/usr/bin/python
+
import sys, getopt, os, glob
# TODO:
@@ -14,6 +15,8 @@
announce_mail_address = "secure-testing-announce at lists.alioth.debian.org"
testing_name = "lenny"
+stable_name = "etch"
+oldstable_name = "sarge"
def print_usage():
print "dtsa [-p | -u] dtsa-id major number"
@@ -148,7 +151,7 @@
html.write("</dd>\n")
html.write("<br>")
- html.write("<dt>For the testing distribution (etch) this is fixed in version " + testing_fix + "</dt>\n")
+ html.write("<dt>For the testing distribution (" + testing_name + ") this is fixed in version " + testing_fix + "</dt>\n")
if len(sid_fix) > 0:
html.write("<dt>For the unstable distribution (sid) this is fixed in version " + sid_fix + "</dt>\n")
@@ -211,7 +214,7 @@
ascii.write(i + "\n")
ascii.write("\n")
- ascii.write("For the testing distribution (etch) this is fixed in version\n")
+ ascii.write("For the testing distribution (" + testing_name + ") this is fixed in version\n")
ascii.write(testing_fix + "\n")
ascii.write("\n")
@@ -226,7 +229,7 @@
ascii.write("\n")
ascii.write("The Debian testing security team does not track security issues for the\n")
- ascii.write("stable (etch) and oldstable (sarge) distributions. If stable is vulnerable,\n")
+ ascii.write("stable (" + stable_name + ") and oldstable (" + oldstable_name + ") distributions. If stable is vulnerable,\n")
ascii.write("the Debian security team will make an announcement once a fix is ready.\n")
ascii.write("\n")
Modified: website/DTSA/DTSA-35-1.html
===================================================================
--- website/DTSA/DTSA-35-1.html 2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-35-1.html 2007-05-23 06:34:51 UTC (rev 5903)
@@ -57,7 +57,7 @@
insufficient validation of 802.11 authentication packets, which allows the <br>
execution of arbitrary code. <br>
</dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 1:0.8-0.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 1:0.8-0.1lenny1</dt>
<dt>For the unstable distribution (sid) this is fixed in version 1:0.7-3</dt>
<br><dt>This upgrade is recommended if you use aircrack-ng.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>
Modified: website/DTSA/DTSA-36-1.html
===================================================================
--- website/DTSA/DTSA-36-1.html 2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-36-1.html 2007-05-23 06:34:51 UTC (rev 5903)
@@ -56,7 +56,7 @@
<dd>Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of <br>
service (daemon crash) and possibly execute arbitrary code. <br>
</dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 1:1.1.0-7.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1</dt>
<dt>For the unstable distribution (sid) this is fixed in version 1:1.1.0-8</dt>
<br><dt>This upgrade is recommended if you use mydns.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>
Modified: website/DTSA/DTSA-37-1.html
===================================================================
--- website/DTSA/DTSA-37-1.html 2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-37-1.html 2007-05-23 06:34:51 UTC (rev 5903)
@@ -71,7 +71,7 @@
It was discovered that a file descriptor leak in the PDF handler may lead to <br>
denial of service. <br>
</dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 0.90.1-3lenny2</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 0.90.1-3lenny2</dt>
<dt>For the unstable distribution (sid) this is fixed in version 0.90.2-1</dt>
<br><dt>This upgrade is recommended if you use clamav.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>
More information about the Secure-testing-commits
mailing list