[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1T1hfN-0005a8-GJ@titan.mandriva.com>
Date: Wed, 15 Aug 2012 19:46:01 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2012:132 ] glpi
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:132
http://www.mandriva.com/security/
_______________________________________________________________________
Package : glpi
Date : August 15, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Multiple cross-site request forgery (CSRF) and cross-site scripting
(XSS) flaws has been found and corrected in GLPI (CVE-2012-4002,
CVE-2012-4003).
This advisory provides the latest version of GLPI (0.83.4) which are
not vulnerable to these issues. Additionally the latest versions of
the corresponding plugins are also being provided.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4003
https://forge.indepnet.net/projects/glpi/versions/771
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
1814c787ca48edf04916dea7173d75b1 mes5/i586/glpi-0.83.4-0.1mdvmes5.2.noarch.rpm
f0182fefad437bf835e937fa08f7524d mes5/i586/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.noarch.rpm
c28b0d2aca9066d855d98cb4c9e7a399 mes5/i586/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.noarch.rpm
c57d6d6d2811b0f4916153d7134a7fce mes5/i586/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.noarch.rpm
9fa5d75025b57ddab307f58aa0b08c01 mes5/i586/glpi-plugin-fusioninventory-deploy-2.4.1-0.1mdvmes5.2.noarch.rpm
e0c68a078cc2e0893f51c2e2f01cab5c mes5/i586/glpi-plugin-fusioninventory-inventory-2.4.1-0.1mdvmes5.2.noarch.rpm
5e445df107bb79252a7adc6f008380e1 mes5/i586/glpi-plugin-fusioninventory-snmp-2.4.1-0.1mdvmes5.2.noarch.rpm
e91eb49e873c22ac51dd00640b408abd mes5/i586/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.noarch.rpm
67f836f3c2d5646688da4237567585be mes5/i586/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.noarch.rpm
df39b7613a418c63035736d14e4c0060 mes5/i586/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.noarch.rpm
a161d6a8c24197e62806e155e814a674 mes5/i586/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.noarch.rpm
efb1aace80562c0cd6ee10893c229126 mes5/i586/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.noarch.rpm
ee8a47d8b4f8e5add6442230dd27b8b1 mes5/i586/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.noarch.rpm
8ee3cdf1157502fc78e44c0279fd1eb1 mes5/SRPMS/glpi-0.83.4-0.1mdvmes5.2.src.rpm
748ef67eba7afc7073ff2c449a23556c mes5/SRPMS/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.src.rpm
c868ccc98ec30b70c242ca2b4ce9af99 mes5/SRPMS/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.src.rpm
bb6218d3a31661a23b673ce761130602 mes5/SRPMS/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.src.rpm
c393c7ccb7c44edbc18568690e9a92cd mes5/SRPMS/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.src.rpm
720679a5e36829a853e859de43dd4e10 mes5/SRPMS/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.src.rpm
c13c1ef282bf7559b3e8da6c36c7260e mes5/SRPMS/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.src.rpm
085c2b937d3d0790f718030b475aecb3 mes5/SRPMS/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.src.rpm
494574a8e0ec67a73c39d0722620c883 mes5/SRPMS/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.src.rpm
9855da6818ddf8926290810658c16685 mes5/SRPMS/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
75daf4e1060c8bbc344f191ab971e2da mes5/x86_64/glpi-0.83.4-0.1mdvmes5.2.noarch.rpm
697c288ed3dc263da55d1ed380e19126 mes5/x86_64/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.noarch.rpm
f55f2c976fb89b82e0be063b6810640f mes5/x86_64/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.noarch.rpm
a9c16780f969fdfd5efb3aab2e966e9d mes5/x86_64/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.noarch.rpm
44f0e8461d590aafa6dd6cf153a5ab8f mes5/x86_64/glpi-plugin-fusioninventory-deploy-2.4.1-0.1mdvmes5.2.noarch.rpm
4be879d2aae7b8a6742ff92f21c4ad4c mes5/x86_64/glpi-plugin-fusioninventory-inventory-2.4.1-0.1mdvmes5.2.noarch.rpm
7e7a17f2c24c381bf6f1ce405e9282bb mes5/x86_64/glpi-plugin-fusioninventory-snmp-2.4.1-0.1mdvmes5.2.noarch.rpm
f7bb3207a79e12ab82ef870dde3b26de mes5/x86_64/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.noarch.rpm
3f3c321581cc07239c12eb890598f175 mes5/x86_64/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.noarch.rpm
c6335bb89c1b2dd3dbf92e45c685528d mes5/x86_64/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.noarch.rpm
71d8f5f682a41ca6dc6ffbef82cb465d mes5/x86_64/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.noarch.rpm
307e4f3bca7af137f0bde2bd0e8f40ca mes5/x86_64/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.noarch.rpm
e6a49d1c10123869ec1b80c6cb69c43e mes5/x86_64/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.noarch.rpm
8ee3cdf1157502fc78e44c0279fd1eb1 mes5/SRPMS/glpi-0.83.4-0.1mdvmes5.2.src.rpm
748ef67eba7afc7073ff2c449a23556c mes5/SRPMS/glpi-plugin-archires-2.0.1-0.1mdvmes5.2.src.rpm
c868ccc98ec30b70c242ca2b4ce9af99 mes5/SRPMS/glpi-plugin-datainjection-2.2.2-0.1mdvmes5.2.src.rpm
bb6218d3a31661a23b673ce761130602 mes5/SRPMS/glpi-plugin-fusioninventory-2.4.1-0.1mdvmes5.2.src.rpm
c393c7ccb7c44edbc18568690e9a92cd mes5/SRPMS/glpi-plugin-genericobject-2.1.3-0.1mdvmes5.2.src.rpm
720679a5e36829a853e859de43dd4e10 mes5/SRPMS/glpi-plugin-manufacturersimports-1.5.2-0.1mdvmes5.2.src.rpm
c13c1ef282bf7559b3e8da6c36c7260e mes5/SRPMS/glpi-plugin-massocsimport-1.6.1-0.1mdvmes5.2.src.rpm
085c2b937d3d0790f718030b475aecb3 mes5/SRPMS/glpi-plugin-racks-1.3.2-0.1mdvmes5.2.src.rpm
494574a8e0ec67a73c39d0722620c883 mes5/SRPMS/glpi-plugin-reports-1.6.1-0.1mdvmes5.2.src.rpm
9855da6818ddf8926290810658c16685 mes5/SRPMS/glpi-plugin-webservices-1.3.1-0.1mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQK7TImqjQ0CJFipgRAtHxAJ94svjBCtwOcbICvdfs76MfvOZ1UQCghQ/A
PtVCjI1LvjHvJi9mQNryW38=
=wWXY
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists