lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100311223009.GA4708@galadriel.inutil.org>
Date: Thu, 11 Mar 2010 23:30:09 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 2013-1] New egroupware packages
	fix several vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2013-1                  security@...ian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
March 11, 2010                        http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : egroupware
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : not yet available
Debian Bug     : 573279

Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based
groupware suite: Missing input sanitising in the spellchecker integration
may lead to the execution of arbitrary commands and a cross-site scripting
vulnerability was discovered in the login page.

For the stable distribution (lenny), these problems have been fixed in
version 1.4.004-2.dfsg-4.2.

The upcoming stable distribution (squeeze), no longer contains egroupware
packages.

We recommend that you upgrade your egroupware packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.diff.gz
    Size/MD5 checksum:    35229 1da727f1fb571ac148883ff1cd0d270d
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.dsc
    Size/MD5 checksum:     1775 72e364d1bfd007520f004bb62be49caf
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg.orig.tar.gz
    Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf

Architecture independent packages:

  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-bookmarks_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   105886 548e844db769730c4e63a09046d6c6b7
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-felamimail_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   334336 a8b1b304c76b0ce2ba07aef4d979ee2a
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-mydms_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   569314 ec321c8c1032fc5d563857d600f96667
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-polls_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    41450 047af44eef33721e3e5600e2433d0999
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-calendar_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   447966 b5a50e6ccbab7586351fccf3dc1dd497
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-developer-tools_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    59252 0c2800cd5998eb8acccd6c4ab11a1f62
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-etemplate_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   639436 d5a22274257572b18caa7503d9af72ed
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-emailadmin_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    92244 2e26a6b63744204b9e14944ed5ea727f
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpsysinfo_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   201340 f6925e13cba379934ee0498f92fc4596
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:     7738 682ddfca5073843b6f30298050762393
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-resources_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    79552 629ded68172377ab350135900faaa251
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-news-admin_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    69932 36654d065e20e04eaf39a108b94c6f43
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-filemanager_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   171686 45d61216c4a2a2e7cc9dcfbc71b19e2e
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-registration_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   136528 85bef627512808e873cbd25040d6deaf
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sitemgr_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   627560 0dc27f321b2a075b44e54fe12c6fb428
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpbrain_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   143912 85d374aed2b1f462223c93cf13c1eb4b
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-core_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:  4409348 03bf3cfab8fc4a8ccc34848551682d2e
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-infolog_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   273950 1aae22abbbab84bbc36713a7b2d7f9bb
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-tracker_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    89532 6e47505d8098b4e7b5e9e9b7c4c0eafa
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-wiki_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   119642 fabc08c73db4681e36b723719c5c2d66
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sambaadmin_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    27324 721b208efa3421232f30d809934aaf43
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-addressbook_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   309896 2870dbd2fee65e5e16234483618566c1
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-timesheet_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    67108 cbd37f7f1767cc185989dd4c9feb8ea4
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-manual_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    34710 8dc500ad3fb1908439939f8474a69670
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-projectmanager_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   591664 71964dae44c79067d1032554d48fe48d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkuZbrIACgkQXm3vHE4uylodkQCg5ZWY52QiqXBYxvlD/hgVpdyp
SU4An19ugJi0wrU0tTSCBk/IUwFtwYp8
=L4GI
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ