Debian: New phpsysinfo packages fix cross site scripting
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 724-1 security@debian.org http://www.debian.org/security/ Martin Schulze May 18th, 2005 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : phpsysinfo Vulnerability : design flaw Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-0870 Debian Bug : 301118 Maksymilian Arciemowicz discoverd several cross site scripting issues in phpsysinfo, a PHP based host information application. For the stable distribution (woody) these problems have been fixed in version 2.0-3woody2. For the testing (sarge) and unstable (sid) distribution these problems have been fixed in version 2.3-3. We recommend that you upgrade your phpsysinfo package. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: Size/MD5 checksum: 622 bc59ec24d7ef4b8b1c0e17cd7753fa19 Size/MD5 checksum: 2765 a6933aed26ea8425379b37b2ae7c8ba8 Size/MD5 checksum: 48104 abd184ebc003aeba07d9945bb9c6ff0f Architecture independent components: Size/MD5 checksum: 42256 f714e679fc08c95a2bdada5c4371f07c These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org