[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 1715-1] New moin packages fix insufficient input sanitising



Thank you Devin, the problem was solved yesterday by other member helps.


2009. 01. 29, csütörtök keltezéssel 07.14-kor Devin Carraway ezt írta:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> - ------------------------------------------------------------------------
> Debian Security Advisory DSA-1715                    security@debian.org
> http://www.debian.org/security/                           Steffen Joeris
> January 29, 2009                      http://www.debian.org/security/faq
> - ------------------------------------------------------------------------
> 
> Package        : moin
> Vulnerability  : insufficient input sanitising
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2009-0260 CVE-2009-0312
> Debian Bug     : 513158
> 
> 
> It was discovered that the AttachFile action in moin, a python clone of
> WikiWiki, is prone to cross-site scripting attacks (CVE-2009-0260).
> Another cross-site scripting vulnerability was discovered in the
> antispam feature (CVE-2009-0312).
> 
> 
> For the stable distribution (etch) these problems have been fixed in
> version 1.5.3-1.2etch2.
> 
> For the testing (lenny) distribution these problems have been fixed in
> version 1.7.1-3+lenny1.
> 
> For the unstable (sid) distribution these problems have been fixed in
> version 1.8.1-1.1.
> 
> We recommend that you upgrade your moin packages.
> 
> Upgrade instructions
> - --------------------
> 
> wget url
>         will fetch the file for you
> dpkg -i file.deb
>         will install the referenced file.
> 
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
> 
> apt-get update
>         will update the internal database
> apt-get upgrade
>         will install corrected packages
> 
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
> 
> 
> Debian GNU/Linux 4.0 alias etch
> - -------------------------------
> 
> Debian (stable)
> - ---------------
> 
> Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
> 
> Source archives:
> 
>   http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.diff.gz
>     Size/MD5 checksum:    40914 139bcec334ed7fbf1ca2bef3c89a8377
>   http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3.orig.tar.gz
>     Size/MD5 checksum:  4187091 e95ec46ee8de9527a39793108de22f7d
>   http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.dsc
>     Size/MD5 checksum:      671 7b24d6f694511840a0a9da0c9f33f5ad
> 
> Architecture independent packages:
> 
>   http://security.debian.org/pool/updates/main/m/moin/python-moinmoin_1.5.3-1.2etch2_all.deb
>     Size/MD5 checksum:   914904 ab6158ae7010c3701859ceb26bd61bd2
>   http://security.debian.org/pool/updates/main/m/moin/moinmoin-common_1.5.3-1.2etch2_all.deb
>     Size/MD5 checksum:  1595112 a46561072eb0ee26ee1a71275c0e64b3
> 
> 
>   These files will probably be moved into the stable distribution on
>   its next update.
> 
> - ---------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
> 
> iD8DBQFJgT3oU5XKDemr/NIRApQ9AJ4tYeY7WMIAUYHjmeryHoEo6HkecgCgmIU9
> b7VcvgOvyalRLrZrejSKFQI=
> =miAO
> -----END PGP SIGNATURE-----
> 
> 


Reply to: