lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 22 Apr 2009 18:50:47 +0200 From: Nico Golde <nion@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 1778-1] New mahara packages fix cross-site scripting -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA-1778-1 security@...ian.org http://www.debian.org/security/ Nico Golde April 22nd, 2009 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : mahara Vulnerability : insufficient input sanitization Problem type : remote Debian-specific: no CVE ID : CVE-2009-0664 It was discovered that mahara, an electronic portfolio, weblog, and resume builder, is prone to cross-site scripting (XSS) attacks because of missing input sanitization of the introduction text field in user profiles and any text field in a user view. The oldstable distribution (etch) does not contain mahara. For the stable distribution (lenny), this problem has been fixed in version 1.0.4-4+lenny2. For the testing distribution (squeeze), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 1.1.3-1. We recommend that you upgrade your mahara packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2.dsc Size/MD5 checksum: 1303 934fdf17abf7221e30fe68c925377126 http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2.diff.gz Size/MD5 checksum: 39307 3193a6e1483f1375430cc236230bc9cc Architecture independent packages: http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny2_all.deb Size/MD5 checksum: 1637064 9fc42b011a826509edc1fccdb9bc149e http://security.debian.org/pool/updates/main/m/mahara/mahara-apache2_1.0.4-4+lenny2_all.deb Size/MD5 checksum: 7830 30c258196ccbdddc6c4f25e1534ba96e These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@...ts.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAknvSucACgkQHYflSXNkfP9g0gCgueRfLOeqF2CR/xxEGle8lf7s qesAn0IYvuNO9N4PeVE9cBKi2G3xvdwT =aPgi -----END PGP SIGNATURE-----
Powered by blists - more mailing lists