Debian: DSA-2013-1: New egroupware packages fix several vulnerabilities
Summary
Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based
groupware suite: Missing input sanitising in the spellchecker integration
may lead to the execution of arbitrary commands and a cross-site scripting
vulnerability was discovered in the login page.
For the stable distribution (lenny), these problems have been fixed in
version 1.4.004-2.dfsg-4.2.
The upcoming stable distribution (squeeze), no longer contains egroupware
packages.
We recommend that you upgrade your egroupware packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
Size/MD5 checksum: 35229 1da727f1fb571ac148883ff1cd0d270d
Size/MD5 checksum: 1775 72e364d1bfd007520f004bb62be49caf
Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf
Architecture independent packages:
Size/MD5 checksum: 105886 548e844db769730c4e63a09046d6c6b7
Size/MD5 checksum: 334336 a8b1b304c76b0ce2ba07aef4d979ee2a
Size/MD5 checksum: 569314 ec321c8c1032fc5d563857d600f96667
Size/MD5 checksum: 41450 047af44eef33721e3e5600e2433d0999
Size/MD5 checksum: 447966 b5a50e6ccbab7586351fccf3dc1dd497
Size/MD5 checksum: 59252 0c2800cd5998eb8acccd6c4ab11a1f62
Size/MD5 checksum: 639436 d5a22274257572b18caa7503d9af72ed
Size/MD5 checksum: 92244 2e26a6b63744204b9e14944ed5ea727f
Size/MD5 checksum: 201340 f6925e13cba379934ee0498f92fc4596
Size/MD5 checksum: 7738 682ddfca5073843b6f30298050762393
Size/MD5 checksum: 79552 629ded68172377ab350135900faaa251
Size/MD5 checksum: 69932 36654d065e20e04eaf39a108b94c6f43
Size/MD5 checksum: 171686 45d61216c4a2a2e7cc9dcfbc71b19e2e
Size/MD5 checksum: 136528 85bef627512808e873cbd25040d6deaf
Size/MD5 checksum: 627560 0dc27f321b2a075b44e54fe12c6fb428
Size/MD5 checksum: 143912 85d374aed2b1f462223c93cf13c1eb4b
Size/MD5 checksum: 4409348 03bf3cfab8fc4a8ccc34848551682d2e
Size/MD5 checksum: 273950 1aae22abbbab84bbc36713a7b2d7f9bb
Size/MD5 checksum: 89532 6e47505d8098b4e7b5e9e9b7c4c0eafa
Size/MD5 checksum: 119642 fabc08c73db4681e36b723719c5c2d66
Size/MD5 checksum: 27324 721b208efa3421232f30d809934aaf43
Size/MD5 checksum: 309896 2870dbd2fee65e5e16234483618566c1
Size/MD5 checksum: 67108 cbd37f7f1767cc185989dd4c9feb8ea4
Size/MD5 checksum: 34710 8dc500ad3fb1908439939f8474a69670
Size/MD5 checksum: 591664 71964dae44c79067d1032554d48fe48d
These files will probably be moved into the stable distribution on
its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show