Author: stef-guest
Date: 2007-05-23 06:34:51 +0000 (Wed, 23 May 2007)
New Revision: 5903

Modified:
   data/CVE/list
   data/DTSA/dtsa
   website/DTSA/DTSA-35-1.html
   website/DTSA/DTSA-36-1.html
   website/DTSA/DTSA-37-1.html
Log:
fix some more references to etch

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2007-05-22 21:14:11 UTC (rev 5902)
+++ data/CVE/list       2007-05-23 06:34:51 UTC (rev 5903)
@@ -85,7 +85,7 @@
 CVE-2007-2755 (The PrecisionID Barcode 1.9 ActiveX control in ...)
        TODO: check
 CVE-2007-2754 (Integer signedness error in truetype/ttgload.c in Freetype 
2.3.4 and ...)
-       - freetype <unfixed> (bug filed)
+       - freetype <unfixed> (bug #425625)
 CVE-2007-2753 (RunawaySoft Haber portal 1.0 stores sensitive information under 
the ...)
        TODO: check
 CVE-2007-2752 (SQL injection vulnerability in devami.asp in RunawaySoft Haber 
portal ...)

Modified: data/DTSA/dtsa
===================================================================
--- data/DTSA/dtsa      2007-05-22 21:14:11 UTC (rev 5902)
+++ data/DTSA/dtsa      2007-05-23 06:34:51 UTC (rev 5903)
@@ -1,4 +1,5 @@
-#!/usr/bin/python 
+#!/usr/bin/python
+
 import sys, getopt, os, glob
 
 # TODO:
@@ -14,6 +15,8 @@
 
 announce_mail_address = "[EMAIL PROTECTED]"
 testing_name = "lenny"
+stable_name = "etch"
+oldstable_name = "sarge"
 
 def print_usage():
        print "dtsa [-p | -u] dtsa-id major number"
@@ -148,7 +151,7 @@
        html.write("</dd>\n")
 
        html.write("<br>")
-       html.write("<dt>For the testing distribution (etch) this is fixed in 
version " + testing_fix + "</dt>\n")
+       html.write("<dt>For the testing distribution (" + testing_name + ") 
this is fixed in version " + testing_fix + "</dt>\n")
 
        if len(sid_fix) > 0:
                html.write("<dt>For the unstable distribution (sid) this is 
fixed in version " + sid_fix + "</dt>\n")
@@ -211,7 +214,7 @@
                ascii.write(i + "\n")
        ascii.write("\n")
 
-       ascii.write("For the testing distribution (etch) this is fixed in 
version\n")
+       ascii.write("For the testing distribution (" + testing_name + ") this 
is fixed in version\n")
        ascii.write(testing_fix + "\n")
        ascii.write("\n")
 
@@ -226,7 +229,7 @@
        ascii.write("\n")
 
        ascii.write("The Debian testing security team does not track security 
issues for the\n")
-       ascii.write("stable (etch) and oldstable (sarge) distributions. If 
stable is vulnerable,\n")
+       ascii.write("stable (" + stable_name + ") and oldstable (" + 
oldstable_name + ") distributions. If stable is vulnerable,\n")
        ascii.write("the Debian security team will make an announcement once a 
fix is ready.\n")
        ascii.write("\n")
 

Modified: website/DTSA/DTSA-35-1.html
===================================================================
--- website/DTSA/DTSA-35-1.html 2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-35-1.html 2007-05-23 06:34:51 UTC (rev 5903)
@@ -57,7 +57,7 @@
 insufficient validation of 802.11 authentication packets, which allows the 
&nbsp;<br>
 execution of arbitrary code.&nbsp;<br>
 </dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 
1:0.8-0.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 
1:0.8-0.1lenny1</dt>
 <dt>For the unstable distribution (sid) this is fixed in version 1:0.7-3</dt>
 <br><dt>This upgrade is recommended if you use aircrack-ng.<dt>
 <br><dt>If you have the secure testing lines in your sources.list, you can 
update by running this command as root:</dt>

Modified: website/DTSA/DTSA-36-1.html
===================================================================
--- website/DTSA/DTSA-36-1.html 2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-36-1.html 2007-05-23 06:34:51 UTC (rev 5903)
@@ -56,7 +56,7 @@
 <dd>Multiple buffer overflows in MyDNS allow remote attackers to cause a 
denial of &nbsp;<br>
 service (daemon crash) and possibly execute arbitrary code.&nbsp;<br>
 </dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 
1:1.1.0-7.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 
1:1.1.0-7.1lenny1</dt>
 <dt>For the unstable distribution (sid) this is fixed in version 1:1.1.0-8</dt>
 <br><dt>This upgrade is recommended if you use mydns.<dt>
 <br><dt>If you have the secure testing lines in your sources.list, you can 
update by running this command as root:</dt>

Modified: website/DTSA/DTSA-37-1.html
===================================================================
--- website/DTSA/DTSA-37-1.html 2007-05-22 21:14:11 UTC (rev 5902)
+++ website/DTSA/DTSA-37-1.html 2007-05-23 06:34:51 UTC (rev 5903)
@@ -71,7 +71,7 @@
 It was discovered that a file descriptor leak in the PDF handler may lead to 
&nbsp;<br>
 denial of service.&nbsp;<br>
 </dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 
0.90.1-3lenny2</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 
0.90.1-3lenny2</dt>
 <dt>For the unstable distribution (sid) this is fixed in version 0.90.2-1</dt>
 <br><dt>This upgrade is recommended if you use clamav.<dt>
 <br><dt>If you have the secure testing lines in your sources.list, you can 
update by running this command as root:</dt>


_______________________________________________
Secure-testing-commits mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-commits

Reply via email to