Re: [SECURITY] [DSA 1715-1] New moin packages fix insufficient input sanitising

2009-01-29 Thread Andy Smith
Thank you Devin, the problem was solved yesterday by other member helps.


2009. 01. 29, csütörtök keltezéssel 07.14-kor Devin Carraway ezt írta:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - 
 Debian Security Advisory DSA-1715secur...@debian.org
 http://www.debian.org/security/   Steffen Joeris
 January 29, 2009  http://www.debian.org/security/faq
 - 
 
 Package: moin
 Vulnerability  : insufficient input sanitising
 Problem type   : remote
 Debian-specific: no
 CVE ID : CVE-2009-0260 CVE-2009-0312
 Debian Bug : 513158
 
 
 It was discovered that the AttachFile action in moin, a python clone of
 WikiWiki, is prone to cross-site scripting attacks (CVE-2009-0260).
 Another cross-site scripting vulnerability was discovered in the
 antispam feature (CVE-2009-0312).
 
 
 For the stable distribution (etch) these problems have been fixed in
 version 1.5.3-1.2etch2.
 
 For the testing (lenny) distribution these problems have been fixed in
 version 1.7.1-3+lenny1.
 
 For the unstable (sid) distribution these problems have been fixed in
 version 1.8.1-1.1.
 
 We recommend that you upgrade your moin packages.
 
 Upgrade instructions
 - 
 
 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 4.0 alias etch
 - ---
 
 Debian (stable)
 - ---
 
 Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
 mipsel, powerpc, s390 and sparc.
 
 Source archives:
 
   
 http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.diff.gz
 Size/MD5 checksum:40914 139bcec334ed7fbf1ca2bef3c89a8377
   http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3.orig.tar.gz
 Size/MD5 checksum:  4187091 e95ec46ee8de9527a39793108de22f7d
   http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.dsc
 Size/MD5 checksum:  671 7b24d6f694511840a0a9da0c9f33f5ad
 
 Architecture independent packages:
 
   
 http://security.debian.org/pool/updates/main/m/moin/python-moinmoin_1.5.3-1.2etch2_all.deb
 Size/MD5 checksum:   914904 ab6158ae7010c3701859ceb26bd61bd2
   
 http://security.debian.org/pool/updates/main/m/moin/moinmoin-common_1.5.3-1.2etch2_all.deb
 Size/MD5 checksum:  1595112 a46561072eb0ee26ee1a71275c0e64b3
 
 
   These files will probably be moved into the stable distribution on
   its next update.
 
 - 
 -
 For apt-get: deb http://security.debian.org/ stable/updates main
 For dpkg-ftp: ftp://security.debian.org/debian-security 
 dists/stable/updates/main
 Mailing list: debian-security-annou...@lists.debian.org
 Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.9 (GNU/Linux)
 
 iD8DBQFJgT3oU5XKDemr/NIRApQ9AJ4tYeY7WMIAUYHjmeryHoEo6HkecgCgmIU9
 b7VcvgOvyalRLrZrejSKFQI=
 =miAO
 -END PGP SIGNATURE-
 
 


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: [SECURITY] [DSA 1710-1] New ganglia-monitor-core packages fix remote code execution

2009-01-25 Thread Andy Smith
Thank you for information!
-- 
Andy Smith kovacs.end...@upcmail.hu


2009. 01. 25, vasárnap keltezéssel 21.26-kor Steffen Joeris ezt írta:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - 
 Debian Security Advisory DSA-1710-1  secur...@debian.org
 http://www.debian.org/security/   Steffen Joeris
 January 25, 2009  http://www.debian.org/security/faq
 - 
 
 Package: ganglia-monitor-core
 Vulnerability  : buffer overflow
 Problem type   : remote
 Debian-specific: no
 CVE Id : CVE-2009-0241
 
 Spike Spiegel discovered a stack-based buffer overflow in gmetad, the
 meta-daemon for the ganglia cluster monitoring toolkit, which could be
 triggered via a request with long path names and might enable
 arbitrary code execution.
 
 For the stable distribution (etch), this problem has been fixed in
 version 2.5.7-3.1etch1.
 
 For the unstable distribution (sid) this problem has been fixed in
 version 2.5.7-5.
 
 For the testing distribution (lenny), this problem will be fixed soon.
 
 We recommend that you upgrade your ganglia-monitor-core packages.
 
 Upgrade instructions
 - 
 
 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 4.0 alias etch
 - ---
 
 Source archives:
 
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/ganglia-monitor-core_2.5.7.orig.tar.gz
 Size/MD5 checksum:   508535 7b312d76d3f2d0cfe0bafee876337040
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/ganglia-monitor-core_2.5.7-3.1etch1.diff.gz
 Size/MD5 checksum:   316476 052c6ae45b1d114616ae8a4d04530cfe
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/ganglia-monitor-core_2.5.7-3.1etch1.dsc
 Size/MD5 checksum:  759 cf4c7357786fd423ee1c04a936dfc389
 
 alpha architecture (DEC Alpha)
 
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1-dev_2.5.7-3.1etch1_alpha.deb
 Size/MD5 checksum:   150882 e0450d50127c267dbb97d3f27b41603a
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/gmetad_2.5.7-3.1etch1_alpha.deb
 Size/MD5 checksum:   111420 5050aa958bd47ca0202f782989a3f662
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1_2.5.7-3.1etch1_alpha.deb
 Size/MD5 checksum:   106024 204e913ca281f7698d94c28e0b53fa7d
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/ganglia-monitor_2.5.7-3.1etch1_alpha.deb
 Size/MD5 checksum:   168450 5476515111a428a8e13c27437ef9f18c
 
 amd64 architecture (AMD x86_64 (AMD64))
 
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/gmetad_2.5.7-3.1etch1_amd64.deb
 Size/MD5 checksum:   102418 e4f43cb6911e3b8ebcd38dd400698c70
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1-dev_2.5.7-3.1etch1_amd64.deb
 Size/MD5 checksum:   132094 ea40ef93a55598d06bbebd6ca297371b
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1_2.5.7-3.1etch1_amd64.deb
 Size/MD5 checksum:98228 c7694aad20a0c47144fcf9ed3a8c7005
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/ganglia-monitor_2.5.7-3.1etch1_amd64.deb
 Size/MD5 checksum:   153468 c3b2b87c5ccc506aa5294ca7fe4c5c65
 
 arm architecture (ARM)
 
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/gmetad_2.5.7-3.1etch1_arm.deb
 Size/MD5 checksum:92476 58bbe3b2bab165d03c0b4042152b558c
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1_2.5.7-3.1etch1_arm.deb
 Size/MD5 checksum:88620 7eeb57376971a530a8630a31d428f63f
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1-dev_2.5.7-3.1etch1_arm.deb
 Size/MD5 checksum:   119844 8b79fdc26c8d936ae851e3eae7782644
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/ganglia-monitor_2.5.7-3.1etch1_arm.deb
 Size/MD5 checksum:   138300 60bd39e5a8c5591d2c81e450a6b410ad
 
 i386 architecture (Intel ia32)
 
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/libganglia1_2.5.7-3.1etch1_i386.deb
 Size/MD5 checksum:93078 93bcce44d781f9b6338e563f335487a5
   
 http://security.debian.org/pool/updates/main/g/ganglia-monitor-core/gmetad_2.5.7-3.1etch1_i386.deb
 Size/MD5 checksum:95864 364689bae05cead30438b1f58ed39254