it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecurityNotifies] [SECURITY] [DSA 2013-1] New egroupware packages fix several vulnerabilities
Chronologisch Thread
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecurityNotifies] [SECURITY] [DSA 2013-1] New egroupware packages fix several vulnerabilities
- Date: Thu, 11 Mar 2010 23:30:09 +0100
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- Old-return-path: <jmm AT inutil.org>
- Priority: urgent
- Resent-date: Thu, 11 Mar 2010 22:30:26 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <ATINDM3OvlB.A.XMG.C8WmLB@liszt>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-2013-1 security AT debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 11, 2010 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : egroupware
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE Id(s) : not yet available
Debian Bug : 573279
Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based
groupware suite: Missing input sanitising in the spellchecker integration
may lead to the execution of arbitrary commands and a cross-site scripting
vulnerability was discovered in the login page.
For the stable distribution (lenny), these problems have been fixed in
version 1.4.004-2.dfsg-4.2.
The upcoming stable distribution (squeeze), no longer contains egroupware
packages.
We recommend that you upgrade your egroupware packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,
mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.diff.gz
Size/MD5 checksum: 35229 1da727f1fb571ac148883ff1cd0d270d
http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.dsc
Size/MD5 checksum: 1775 72e364d1bfd007520f004bb62be49caf
http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg.orig.tar.gz
Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf
Architecture independent packages:
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-bookmarks_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 105886 548e844db769730c4e63a09046d6c6b7
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-felamimail_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 334336 a8b1b304c76b0ce2ba07aef4d979ee2a
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-mydms_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 569314 ec321c8c1032fc5d563857d600f96667
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-polls_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 41450 047af44eef33721e3e5600e2433d0999
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-calendar_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 447966 b5a50e6ccbab7586351fccf3dc1dd497
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-developer-tools_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 59252 0c2800cd5998eb8acccd6c4ab11a1f62
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-etemplate_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 639436 d5a22274257572b18caa7503d9af72ed
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-emailadmin_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 92244 2e26a6b63744204b9e14944ed5ea727f
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpsysinfo_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 201340 f6925e13cba379934ee0498f92fc4596
http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 7738 682ddfca5073843b6f30298050762393
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-resources_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 79552 629ded68172377ab350135900faaa251
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-news-admin_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 69932 36654d065e20e04eaf39a108b94c6f43
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-filemanager_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 171686 45d61216c4a2a2e7cc9dcfbc71b19e2e
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-registration_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 136528 85bef627512808e873cbd25040d6deaf
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sitemgr_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 627560 0dc27f321b2a075b44e54fe12c6fb428
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpbrain_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 143912 85d374aed2b1f462223c93cf13c1eb4b
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-core_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 4409348 03bf3cfab8fc4a8ccc34848551682d2e
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-infolog_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 273950 1aae22abbbab84bbc36713a7b2d7f9bb
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-tracker_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 89532 6e47505d8098b4e7b5e9e9b7c4c0eafa
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-wiki_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 119642 fabc08c73db4681e36b723719c5c2d66
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sambaadmin_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 27324 721b208efa3421232f30d809934aaf43
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-addressbook_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 309896 2870dbd2fee65e5e16234483618566c1
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-timesheet_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 67108 cbd37f7f1767cc185989dd4c9feb8ea4
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-manual_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 34710 8dc500ad3fb1908439939f8474a69670
http://security.debian.org/pool/updates/main/e/egroupware/egroupware-projectmanager_1.4.004-2.dfsg-4.2_all.deb
Size/MD5 checksum: 591664 71964dae44c79067d1032554d48fe48d
These files will probably be moved into the stable distribution on
its next update.
-
---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce AT lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkuZbrIACgkQXm3vHE4uylodkQCg5ZWY52QiqXBYxvlD/hgVpdyp
SU4An19ugJi0wrU0tTSCBk/IUwFtwYp8
=L4GI
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: 20100311223009.GA4708 AT galadriel.inutil.org">http://lists.debian.org/20100311223009.GA4708 AT galadriel.inutil.org
- [IT-SecurityNotifies] [SECURITY] [DSA 2013-1] New egroupware packages fix several vulnerabilities, Moritz Muehlenhoff, 11.03.2010
Archiv bereitgestellt durch MHonArc 2.6.19.