[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted cacti 0.8.6c-7sarge5 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 20 Nov 2007 17:34:00 +0100
Source: cacti
Binary: cacti
Architecture: source all
Version: 0.8.6c-7sarge5
Distribution: oldstable-security
Urgency: high
Maintainer: sean finney <seanius@debian.org>
Changed-By: Stephan Hermann <sh@sourcecode.de>
Description: 
 cacti      - Frontend to rrdtool for monitoring systems and services
Changes: 
 cacti (0.8.6c-7sarge5) oldstable-security; urgency=high
 .
   * SECURITY UPDATE:
     + CVE-2007-6035: SQL injection vulnerability in Cacti before 0.8.7a allows
       remote attackers to execute arbitrary SQL commands via unspecified
       vectors.
   * debian/patches/10_CVE-2007-6035.dpatch: applied patch by upstream
     (Link: http://www.cacti.net/downloads/patches/0.8.6j/sec_sql_injection-0.8.6j.patch)
   * References:
     CVE-2007-6035
Files: 
 8bfbdff5df7b79d6b8500cc9b859ac04 887 web extra cacti_0.8.6c-7sarge5.dsc
 cbd167e3cdd2711ce2910c3a47dd6d45 56568 web extra cacti_0.8.6c-7sarge5.diff.gz
 fbf23e7c7829a8461dc30217f4f926bc 1059858 web extra cacti_0.8.6c-7sarge5_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR0dAEGz0hbPcukPfAQJcpwf/X+W47OWKleY/1GlzxKUd0Cm1a+d1EfTh
TwYG6I+HnqunadK1U70pW/JEbz65Q3PV+aDGSAXWgcUddKH4M7JsH5aaWEkSjqIu
LQ+XPxHpLXe918iyGIzBwG7PQG+eOllBMYBcOb/I7H2ahDBJ5zTZpknKfZMnKXdO
68RM5cTXwlepUB/PyFbiIZ7rn8+QRCd4WJ6522aVKVdULMrbmLwV1d6Ns2CHWZhw
/yJaPyDFcKB7lHTunbIowMHngOitzXSRYAbIot3edVkEwk4WXDzEfW7QE6mwpk1B
bWfYGQSTAOfWajsVUeHwwOVr4sjU5UPEmxSKfsaOXqm+WP+3W7qITA==
=1Pzx
-----END PGP SIGNATURE-----


Accepted:
cacti_0.8.6c-7sarge5.diff.gz
  to pool/main/c/cacti/cacti_0.8.6c-7sarge5.diff.gz
cacti_0.8.6c-7sarge5.dsc
  to pool/main/c/cacti/cacti_0.8.6c-7sarge5.dsc
cacti_0.8.6c-7sarge5_all.deb
  to pool/main/c/cacti/cacti_0.8.6c-7sarge5_all.deb


Reply to: