Linux Security
    Linux Security
    Linux Security

    Debian: New htdig packages fix cross-site scripting vulnerability

    Posted By
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 680-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    February 14th, 2005           
    - --------------------------------------------------------------------------
    Package        : htdig
    Vulnerability  : unsanitised input
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-0085
    Michael Krax discovered a cross site scripting vulnerability in
    ht://dig, a web search system for an intranet or small internet.
    For the stable distribution (woody) this problem has been fixed in
    version 3.1.6-3woody1.
    For the unstable distribution (sid) this problem has been fixed in
    version 3.1.6-11.
    We recommend that you upgrade your htdig package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      591 e5fd50b03893bda0bb43aa6a54beacc4
          Size/MD5 checksum:    19822 294cfc471ac36e7cc3ade8e8ab2a968c
          Size/MD5 checksum:  2068675 7a2f20d8d6149efd8d119bb2ebf55f23
      Architecture independent components:
          Size/MD5 checksum:   316892 3c2f6462e01ace0097a9351c1a98ca39
      Alpha architecture:
          Size/MD5 checksum:  1103690 e5a883a1619d22da9598f66c53ab28ee
      ARM architecture:
          Size/MD5 checksum:  1009600 98ccc3af2d25970b7cff9a5451b045e5
      Intel IA-32 architecture:
          Size/MD5 checksum:   950526 3557095a60b11ef24bff9634778107fc
      Intel IA-64 architecture:
          Size/MD5 checksum:  1216768 840c06cf1b6c405ab24bc20a7d41bdd4
      HP Precision architecture:
          Size/MD5 checksum:  1155976 345dc883031bc10c10b7ac4743d2a679
      Motorola 680x0 architecture:
          Size/MD5 checksum:   921906 82f8f0dd287a78856179f29ea1161489
      Big endian MIPS architecture:
          Size/MD5 checksum:   992524 e5b1c3054332a4f92cecae9c888bff8b
      Little endian MIPS architecture:
          Size/MD5 checksum:   989954 d4e2b19ad21431118fbb4a1ccdc46a24
      PowerPC architecture:
          Size/MD5 checksum:   937060 7841f5423965ce1f2afbff9c0054182a
      IBM S/390 architecture:
          Size/MD5 checksum:   910122 939faa17e33b38585ab518c21751a171
      Sun Sparc architecture:
          Size/MD5 checksum:   914470 85ceb822a4e3b1906c9e97ea01192c9c
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"140","title":"Not a game-changer for me.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"3","type":"x","order":"2","pct":100,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.