[Secure-testing-commits] r5903 - data/CVE data/DTSA website/DTSA

stef-guest at alioth.debian.org stef-guest at alioth.debian.org
Wed May 23 06:34:53 UTC 2007


Author: stef-guest
Date: 2007-05-23 06:34:51 +0000 (Wed, 23 May 2007)
New Revision: 5903

Modified:
   data/CVE/list
   data/DTSA/dtsa
   website/DTSA/DTSA-35-1.html
   website/DTSA/DTSA-36-1.html
   website/DTSA/DTSA-37-1.html
Log:
fix some more references to etch

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2007-05-22 21:14:11 UTC (rev 5902)
+++ data/CVE/list	2007-05-23 06:34:51 UTC (rev 5903)
@@ -85,7 +85,7 @@
 CVE-2007-2755 (The PrecisionID Barcode 1.9 ActiveX control in ...)
 	TODO: check
 CVE-2007-2754 (Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and ...)
-	- freetype <unfixed> (bug filed)
+	- freetype <unfixed> (bug #425625)
 CVE-2007-2753 (RunawaySoft Haber portal 1.0 stores sensitive information under the ...)
 	TODO: check
 CVE-2007-2752 (SQL injection vulnerability in devami.asp in RunawaySoft Haber portal ...)

Modified: data/DTSA/dtsa
===================================================================
--- data/DTSA/dtsa	2007-05-22 21:14:11 UTC (rev 5902)
+++ data/DTSA/dtsa	2007-05-23 06:34:51 UTC (rev 5903)
@@ -1,4 +1,5 @@
-#!/usr/bin/python 
+#!/usr/bin/python
+
 import sys, getopt, os, glob
 
 # TODO:
@@ -14,6 +15,8 @@
 
 announce_mail_address = "secure-testing-announce at lists.alioth.debian.org"
 testing_name = "lenny"
+stable_name = "etch"
+oldstable_name = "sarge"
 
 def print_usage():
 	print "dtsa [-p | -u] dtsa-id major number"
@@ -148,7 +151,7 @@
 	html.write("</dd>\n")
 
 	html.write("<br>")
-	html.write("<dt>For the testing distribution (etch) this is fixed in version " + testing_fix + "</dt>\n")
+	html.write("<dt>For the testing distribution (" + testing_name + ") this is fixed in version " + testing_fix + "</dt>\n")
 
 	if len(sid_fix) > 0:
 		html.write("<dt>For the unstable distribution (sid) this is fixed in version " + sid_fix + "</dt>\n")
@@ -211,7 +214,7 @@
 		ascii.write(i + "\n")
 	ascii.write("\n")
 
-	ascii.write("For the testing distribution (etch) this is fixed in version\n")
+	ascii.write("For the testing distribution (" + testing_name + ") this is fixed in version\n")
 	ascii.write(testing_fix + "\n")
 	ascii.write("\n")
 
@@ -226,7 +229,7 @@
 	ascii.write("\n")
 
 	ascii.write("The Debian testing security team does not track security issues for the\n")
-	ascii.write("stable (etch) and oldstable (sarge) distributions. If stable is vulnerable,\n")
+	ascii.write("stable (" + stable_name + ") and oldstable (" + oldstable_name + ") distributions. If stable is vulnerable,\n")
 	ascii.write("the Debian security team will make an announcement once a fix is ready.\n")
 	ascii.write("\n")
 

Modified: website/DTSA/DTSA-35-1.html
===================================================================
--- website/DTSA/DTSA-35-1.html	2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-35-1.html	2007-05-23 06:34:51 UTC (rev 5903)
@@ -57,7 +57,7 @@
 insufficient validation of 802.11 authentication packets, which allows the &nbsp;<br>
 execution of arbitrary code.&nbsp;<br>
 </dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 1:0.8-0.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 1:0.8-0.1lenny1</dt>
 <dt>For the unstable distribution (sid) this is fixed in version 1:0.7-3</dt>
 <br><dt>This upgrade is recommended if you use aircrack-ng.<dt>
 <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>

Modified: website/DTSA/DTSA-36-1.html
===================================================================
--- website/DTSA/DTSA-36-1.html	2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-36-1.html	2007-05-23 06:34:51 UTC (rev 5903)
@@ -56,7 +56,7 @@
 <dd>Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of &nbsp;<br>
 service (daemon crash) and possibly execute arbitrary code.&nbsp;<br>
 </dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 1:1.1.0-7.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1</dt>
 <dt>For the unstable distribution (sid) this is fixed in version 1:1.1.0-8</dt>
 <br><dt>This upgrade is recommended if you use mydns.<dt>
 <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>

Modified: website/DTSA/DTSA-37-1.html
===================================================================
--- website/DTSA/DTSA-37-1.html	2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-37-1.html	2007-05-23 06:34:51 UTC (rev 5903)
@@ -71,7 +71,7 @@
 It was discovered that a file descriptor leak in the PDF handler may lead to &nbsp;<br>
 denial of service.&nbsp;<br>
 </dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 0.90.1-3lenny2</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 0.90.1-3lenny2</dt>
 <dt>For the unstable distribution (sid) this is fixed in version 0.90.2-1</dt>
 <br><dt>This upgrade is recommended if you use clamav.<dt>
 <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>




More information about the Secure-testing-commits mailing list