[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100126205158.GA24850@galadriel.inutil.org>
Date: Tue, 26 Jan 2010 21:51:58 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1978-1] New phpgroupware packages
fix several vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1978-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 26, 2010 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : phpgroupware
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2009-4414 CVE-2009-4415 CVE-2009-4416
Several remote vulnerabilities have been discovered in phpgroupware, a
Web based groupware system written in PHP. The Common Vulnerabilities
and Exposures project identifies the following problems:
CVE-2009-4414
An SQL injection vulnerability was found in the authentication
module.
CVE-2009-4415
Multiple directory traversal vulnerabilities were found in the
addressbook module.
CVE-2009-4416
The authentication module is affected by cross-site scripting.
For the stable distribution (lenny) these problems have been fixed in
version 0.9.16.012+dfsg-8+lenny1.
For the unstable distribution (sid) these problems have been fixed in
version 0.9.16.012+dfsg-9.
We recommend that you upgrade your phpgroupware packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.012+dfsg.orig.tar.gz
Size/MD5 checksum: 19383160 bbfcfa12aca69b4032d7b4d38aeba85f
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.012+dfsg-8+lenny1.diff.gz
Size/MD5 checksum: 70541 fc805ae50cd52606578ed95e8a5bde96
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.012+dfsg-8+lenny1.dsc
Size/MD5 checksum: 1662 0507c4e0a6be1d93a060a7c6222c84c0
Architecture independent packages:
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-email_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 1167526 b7d47f4df02c98e3269fd2b8bce094f4
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-core-base_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 48252 80a0c4bf563e576fbad0b023fcca2f4b
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-calendar_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 268338 acdc243f1b2cbcea42a548408232657d
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-addressbook_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 180662 e0835bac92df72541b52912e80e1e852
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 22380 c12295c8f5f4abdf2f9d8c94ceefe4a1
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-news-admin_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 41572 d21d4ab4ce6adbb23a46a21fd0dd67cb
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-manual_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 93094 dc2bcd999a4a97a0acb8a0a9b156ea03
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-filemanager_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 95206 0faba6d54c83ac610d11a256a12eec67
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-phpgwapi_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 1522130 c4ff77bb7c80222b04ccdb130f5d2db6
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-preferences_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 60034 b7b86ca86b431dbd7b637506db451196
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 20228 5563f9a3d9b4835b2c89cb1ba571b23f
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-core_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 4546 de306e6062f710d430704297106f192e
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-admin_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 192062 0427388ce20eb307946c6272856313b7
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-notes_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 33356 700f8d5a2b8fff7b03f464259f912ddb
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-doc_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 130988 230362e560b03abda388bb0964516d6c
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-phpgwapi-doc_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 7984748 82aff1fbf1f337ad876dd63be9914102
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-setup_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 276764 6c743b8fcfbdfa313086264ccee8a7fd
http://security.debian.org/pool/updates/main/p/phpgroupware/phpgroupware-0.9.16-todo_0.9.16.012+dfsg-8+lenny1_all.deb
Size/MD5 checksum: 50716 6c7c8523a8e03e94a9211efccb337dd0
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAktfVZIACgkQXm3vHE4uylrvOwCdFJvWO6TIq6kMiKuXd6jNIgf9
WzAAn2k180FV5fb0Y4tmkQlJX4OllDBN
=vr1k
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists