Debian: DSA-1951-1: New firefox-sage packages fix insufficient input sanitizing

    Date 15 Dec 2009
    120
    Posted By LinuxSecurity Advisories
    It was discovered that firefox-sage, a lightweight RSS and Atom feed reader for Firefox, does not sanitise the RSS feed information correctly, which makes it prone to a cross-site scripting and a cross-domain scripting attack.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1951-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                      Steffen Joeris
    December 15, 2009                     https://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : firefox-sage
    Vulnerability  : insufficient input sanitising
    Problem type   : remote
    Debian-specific: no
    CVE Id         : CVE-2009-4102
    Debian Bug     : 559267
    
    It was discovered that firefox-sage, a lightweight RSS and Atom feed
    reader for Firefox, does not sanitise the RSS feed information
    correctly, which makes it prone to a cross-site scripting and a
    cross-domain scripting attack.
    
    
    For the stable distribution (lenny), this problem has been fixed in
    version 1.4.2-0.1+lenny1.
    
    For the oldstable distribution (etch), this problem has been fixed in
    version 1.3.6-4etch1.
    
    For the testing distribution (squeeze) and the unstable distribution
    (sid), this problem has been fixed in version 1.4.3-3.
    
    
    We recommend that you upgrade your firefox-sage packages.
    
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Debian (oldstable)
    - ------------------
    
    Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.3.6-4etch1.dsc
        Size/MD5 checksum:      607 d4175001caa8fc685f47452de46aaa03
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.3.6.orig.tar.gz
        Size/MD5 checksum:   135325 49c68a517b6611c7352feb6072be9567
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.3.6-4etch1.diff.gz
        Size/MD5 checksum:    13123 a59b6403405d4c6214b569fdb068049f
    
    Architecture independent packages:
    
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.3.6-4etch1_all.deb
        Size/MD5 checksum:   150172 57339ba6521e7611e4e27fce4f87df31
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.4.2-0.1+lenny1.diff.gz
        Size/MD5 checksum:    15552 c62acce299739cfe09c5ed671f0d310f
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.4.2.orig.tar.gz
        Size/MD5 checksum:   169202 71f4d7379bc6e39640fc20016493f129
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.4.2-0.1+lenny1.dsc
        Size/MD5 checksum:     1039 f47c953cd90197453e1ce165f13cb701
    
    Architecture independent packages:
    
      https://security.debian.org/pool/updates/main/f/firefox-sage/firefox-sage_1.4.2-0.1+lenny1_all.deb
        Size/MD5 checksum:   171308 63a27b648f10e021b18acf9c8d8d24f0
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and https://packages.debian.org/
    

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.