RE: [SECURITY] [DSA 2320-1] dokuwiki regression fix
Hola Benet:
Lo del viernes fue un desastre, vinieron 4 niños, es decir el hijo de empar y tres más.
Necesitamos que nos abras las puertas de los coles, necesitamos poder ir a las clases de E.F, que nos dejen presentarnos e incluso hacer unos 20 minutos de juegos etc para que los niños vean lo que es.
Un saludo.
¡Error! Referencia de hipervínculo no válida.
Javier Martínez Abad
Administrador - Sistemes
C/ Rei en Jaume I, 2
46470 - Catarroja - Valencia- España
Telèfon: (+34) 961266609 Extensió: 157
Fax: (+34) 961269933
e-mail: jmartine@florida-uni.es
www.florida.es
-----Mensaje original-----
De: Thijs Kinkhorst [mailto:thijs@debian.org]
Enviado el: sábado, 08 de octubre de 2011 15:24
Para: debian-security-announce@lists.debian.org
Asunto: [SECURITY] [DSA 2320-1] dokuwiki regression fix
Importancia: Alta
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2320-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
October 8, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dokuwiki
Vulnerability : regression fix
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-2510
Debian Bug : 644145
The dokuwiki update included in Debian Lenny 5.0.9 to address a cross site scripting issue (CVE-2011-2510) had a regression rendering links to external websites broken. This update corrects that regression.
For the oldstable distribution (lenny), this problem has been fixed in version 0.0.20080505-4+lenny4.
We recommend that you upgrade your dokuwiki packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJOkE33AAoJEOxfUAG2iX57bPIH/jFv4OmdhGeS12FMyZW/oq9D
CW95YdhyuZA3xRSF9fViksRAFL6D1+5tAMp7mA4GfaYm35F7nmHyHvHfYUaEnz9j
AfTGlcSwDO0pXPhcLbNH28W3T/jv48fgOE3BKvjva7drKwyF4JHjRFFcYczeqMBe
SU75CwoEHqK9TnkMQJObRFkzfbx6+IJh51qjMdA4DpCzkwDSDPpNtXZpa+zoGdU+
ICLKqUK/UYwCpwu4ycIQ/r2oeDxzk9bf+PHRtNRe5JXU4az08wGBl+ClTK+u/vqT
Fw8VRnhltwpzN9eA34R8S058JGnNom3SVoMWJIIwvrxcnKfLNR6a8gsLUNZS6KQ=
=/Uh5
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20111008132336.AE36159B89@kinkhorst.com
Reply to: