[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

RE: [SECURITY] [DSA 2320-1] dokuwiki regression fix



Hola Benet:

Lo del viernes fue un desastre, vinieron 4 niños, es decir el hijo de empar y tres  más.

Necesitamos que nos abras las puertas de los coles, necesitamos poder ir a las clases de E.F, que nos dejen presentarnos e incluso hacer unos 20 minutos de juegos etc para que los niños vean lo que es.
Un saludo.



¡Error! Referencia de hipervínculo no válida.

Javier Martínez Abad
Administrador - Sistemes
C/ Rei en Jaume I, 2
46470 - Catarroja - Valencia- España
Telèfon: (+34) 961266609 Extensió: 157
Fax: (+34) 961269933 
e-mail: jmartine@florida-uni.es
www.florida.es


-----Mensaje original-----
De: Thijs Kinkhorst [mailto:thijs@debian.org] 
Enviado el: sábado, 08 de octubre de 2011 15:24
Para: debian-security-announce@lists.debian.org
Asunto: [SECURITY] [DSA 2320-1] dokuwiki regression fix
Importancia: Alta

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2320-1                   security@debian.org
http://www.debian.org/security/                           Thijs Kinkhorst
October 8, 2011                        http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : dokuwiki
Vulnerability  : regression fix
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2011-2510 
Debian Bug     : 644145

The dokuwiki update included in Debian Lenny 5.0.9 to address a cross site scripting issue (CVE-2011-2510) had a regression rendering links to external websites broken. This update corrects that regression.

For the oldstable distribution (lenny), this problem has been fixed in version 0.0.20080505-4+lenny4.

We recommend that you upgrade your dokuwiki packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJOkE33AAoJEOxfUAG2iX57bPIH/jFv4OmdhGeS12FMyZW/oq9D
CW95YdhyuZA3xRSF9fViksRAFL6D1+5tAMp7mA4GfaYm35F7nmHyHvHfYUaEnz9j
AfTGlcSwDO0pXPhcLbNH28W3T/jv48fgOE3BKvjva7drKwyF4JHjRFFcYczeqMBe
SU75CwoEHqK9TnkMQJObRFkzfbx6+IJh51qjMdA4DpCzkwDSDPpNtXZpa+zoGdU+
ICLKqUK/UYwCpwu4ycIQ/r2oeDxzk9bf+PHRtNRe5JXU4az08wGBl+ClTK+u/vqT
Fw8VRnhltwpzN9eA34R8S058JGnNom3SVoMWJIIwvrxcnKfLNR6a8gsLUNZS6KQ=
=/Uh5
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20111008132336.AE36159B89@kinkhorst.com


Reply to: