stef-guest at alioth.debian.org
2007-May-23 06:34 UTC
[Secure-testing-commits] r5903 - data/CVE data/DTSA website/DTSA
Author: stef-guest Date: 2007-05-23 06:34:51 +0000 (Wed, 23 May 2007) New Revision: 5903 Modified: data/CVE/list data/DTSA/dtsa website/DTSA/DTSA-35-1.html website/DTSA/DTSA-36-1.html website/DTSA/DTSA-37-1.html Log: fix some more references to etch Modified: data/CVE/list ==================================================================--- data/CVE/list 2007-05-22 21:14:11 UTC (rev 5902) +++ data/CVE/list 2007-05-23 06:34:51 UTC (rev 5903) @@ -85,7 +85,7 @@ CVE-2007-2755 (The PrecisionID Barcode 1.9 ActiveX control in ...) TODO: check CVE-2007-2754 (Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and ...) - - freetype <unfixed> (bug filed) + - freetype <unfixed> (bug #425625) CVE-2007-2753 (RunawaySoft Haber portal 1.0 stores sensitive information under the ...) TODO: check CVE-2007-2752 (SQL injection vulnerability in devami.asp in RunawaySoft Haber portal ...) Modified: data/DTSA/dtsa ==================================================================--- data/DTSA/dtsa 2007-05-22 21:14:11 UTC (rev 5902) +++ data/DTSA/dtsa 2007-05-23 06:34:51 UTC (rev 5903) @@ -1,4 +1,5 @@ -#!/usr/bin/python +#!/usr/bin/python + import sys, getopt, os, glob # TODO: @@ -14,6 +15,8 @@ announce_mail_address = "secure-testing-announce at lists.alioth.debian.org" testing_name = "lenny" +stable_name = "etch" +oldstable_name = "sarge" def print_usage(): print "dtsa [-p | -u] dtsa-id major number" @@ -148,7 +151,7 @@ html.write("</dd>\n") html.write("<br>") - html.write("<dt>For the testing distribution (etch) this is fixed in version " + testing_fix + "</dt>\n") + html.write("<dt>For the testing distribution (" + testing_name + ") this is fixed in version " + testing_fix + "</dt>\n") if len(sid_fix) > 0: html.write("<dt>For the unstable distribution (sid) this is fixed in version " + sid_fix + "</dt>\n") @@ -211,7 +214,7 @@ ascii.write(i + "\n") ascii.write("\n") - ascii.write("For the testing distribution (etch) this is fixed in version\n") + ascii.write("For the testing distribution (" + testing_name + ") this is fixed in version\n") ascii.write(testing_fix + "\n") ascii.write("\n") @@ -226,7 +229,7 @@ ascii.write("\n") ascii.write("The Debian testing security team does not track security issues for the\n") - ascii.write("stable (etch) and oldstable (sarge) distributions. If stable is vulnerable,\n") + ascii.write("stable (" + stable_name + ") and oldstable (" + oldstable_name + ") distributions. If stable is vulnerable,\n") ascii.write("the Debian security team will make an announcement once a fix is ready.\n") ascii.write("\n") Modified: website/DTSA/DTSA-35-1.html ==================================================================--- website/DTSA/DTSA-35-1.html 2007-05-22 21:14:11 UTC (rev 5902) +++ website/DTSA/DTSA-35-1.html 2007-05-23 06:34:51 UTC (rev 5903) @@ -57,7 +57,7 @@ insufficient validation of 802.11 authentication packets, which allows the <br> execution of arbitrary code. <br> </dd> -<br><dt>For the testing distribution (etch) this is fixed in version 1:0.8-0.1lenny1</dt> +<br><dt>For the testing distribution (lenny) this is fixed in version 1:0.8-0.1lenny1</dt> <dt>For the unstable distribution (sid) this is fixed in version 1:0.7-3</dt> <br><dt>This upgrade is recommended if you use aircrack-ng.<dt> <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt> Modified: website/DTSA/DTSA-36-1.html ==================================================================--- website/DTSA/DTSA-36-1.html 2007-05-22 21:14:11 UTC (rev 5902) +++ website/DTSA/DTSA-36-1.html 2007-05-23 06:34:51 UTC (rev 5903) @@ -56,7 +56,7 @@ <dd>Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of <br> service (daemon crash) and possibly execute arbitrary code. <br> </dd> -<br><dt>For the testing distribution (etch) this is fixed in version 1:1.1.0-7.1lenny1</dt> +<br><dt>For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1</dt> <dt>For the unstable distribution (sid) this is fixed in version 1:1.1.0-8</dt> <br><dt>This upgrade is recommended if you use mydns.<dt> <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt> Modified: website/DTSA/DTSA-37-1.html ==================================================================--- website/DTSA/DTSA-37-1.html 2007-05-22 21:14:11 UTC (rev 5902) +++ website/DTSA/DTSA-37-1.html 2007-05-23 06:34:51 UTC (rev 5903) @@ -71,7 +71,7 @@ It was discovered that a file descriptor leak in the PDF handler may lead to <br> denial of service. <br> </dd> -<br><dt>For the testing distribution (etch) this is fixed in version 0.90.1-3lenny2</dt> +<br><dt>For the testing distribution (lenny) this is fixed in version 0.90.1-3lenny2</dt> <dt>For the unstable distribution (sid) this is fixed in version 0.90.2-1</dt> <br><dt>This upgrade is recommended if you use clamav.<dt> <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>