Debian: DSA-2091-1: New squirrelmail packages fix cross-site request forgery
Summary
In addition, a denial-of-service was fixed, which could be triggered when a
passwords containing 8-bit characters was used to log in (CVE-2010-2813).
For the stable distribution (lenny), these problems have been fixed in
version 1.4.15-4+lenny3.1.
For the testing distribution (squeeze) and the unstable distribution (sid),
these problems have been fixed in version 1.4.21-1.
We recommend that you upgrade your squirrelmail packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
Source archives:
Size/MD5 checksum: 34647 2251562662703a0d8e4f0de309ca60a6
Size/MD5 checksum: 621320 87b466fef98e770307afffd75fe25589
Size/MD5 checksum: 1240 a4e2ab21379259946f02a1d30831fe6d
Architecture independent packages:
Size/MD5 checksum: 615152 d08549fd86ffec2ae16b36e358f50cd6
These files will probably be moved into the stable distribution on
its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show