"-----BEGIN PGP SIGNED MESSAGE-----
 Hash: SHA1
 
 - ------------------------------------------------------------------------
 Debian Security Advisory DSA-2008-1                  security@debian.org
 http://www.debian.org/security/                       Moritz Muehlenhoff
 March 08, 2010                        http://www.debian.org/security/faq
 - ------------------------------------------------------------------------
 
 Package        : typo3-src
 Vulnerability  : several
 Problem type   : local/remote
 Debian-specific: no
 CVE Id(s)      : not yet available
 Debian Bug     : 571151
 
 Several remote vulnerabilities have been discovered in the TYPO3 web 
 content management framework: Cross-site scripting vulnerabilities have
 been discovered in both the frontend and the backend. Also, user data
 could be leaked. More details can be found in the Typo3 security
 advisory:
 http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-004/ 
 
 For the stable distribution (lenny), these problems have been fixed in
 version 4.2.5-1+lenny3.
 
 For the upcoming stable distribution (squeeze) and the unstable 
 distribution (sid), these problems have been fixed in version 4.3.2-1.
 
 We recommend that you upgrade your typo3-src package.
 
 Upgrade instructions
 - --------------------
 
 wget url
         will fetch the file for you
 dpkg -i file.deb
         will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
         will update the internal database
 apt-get upgrade
         will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 5.0 alias lenny
 - --------------------------------
 
 Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
 
 Source archives:
 
   http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5-1+lenny3.dsc
     Size/MD5 checksum:     1008 2b5fae60fae3e6a6aac0abab77878aab
   http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5.orig.tar.gz
     Size/MD5 checksum:  8144727 75b2e5db6ac586fb6176f329be452159
   http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src_4.2.5-1+lenny3.diff.gz
     Size/MD5 checksum:   128331 a6c5d19786ea0cb438dca15a5e4cd03d
 
 Architecture independent packages:
 
   http://security.debian.org/pool/updates/main/t/typo3-src/typo3-src-4.2_4.2.5-1+lenny3_all.deb
     Size/MD5 checksum:  8201908 b9597dd425a73b6cb89bdc3724fcb02f
   http://security.debian.org/pool/updates/main/t/typo3-src/typo3_4.2.5-1+lenny3_all.deb
     Size/MD5 checksum:   133890 7322ee4dbabfb7b8a9ad34541a750777
 
   These files will probably be moved into the stable distribution on
   its next update.
 
 - ---------------------------------------------------------------------------------
 For apt-get: deb http://security.debian.org/ stable/updates main
 For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
 Mailing list: debian-security-announce@lists.debian.org
 Package info: `apt-cache show ' and http://packages.debian.org/
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1.4.10 (GNU/Linux)
 
 iEYEARECAAYFAkuVhQgACgkQXm3vHE4uylo4xgCgohzOaLUcU4En9DQynWda8gOP
 SrUAniZckHE8wYFiYdCB4ukcJY4dWCqB
 =KtlY
 -----END PGP SIGNATURE-----
 " 
 T in the Park tickets sell outDSA 2013-1: New egroupware packages fix several vulnerabilities
This entry was posted
on 5:43 PM
.
Archives
- 
▼ 
2010
            (391)
          
- 
▼ 
March
            (45)
          
- RHSA-2010:0271-04 Important: kvm security, bug fix...
 - RHSA-2010:0237-05 Low: sendmail security and bug f...
 - USN-919-1: Emacs vulnerability
 - RHSA-2010:0175-01 Low: httpd security, bug fix, an...
 - USN-917-1: Puppet vulnerabilities
 - RHSA-2010:0166-01 Moderate: gnutls security update
 - RHSA-2010:0173-02 Important: openssl096b security ...
 - DSA 2022-1: New mediawiki packages fix several vul...
 - RHSA-2010:0167-01 Moderate: gnutls security update
 - RHSA-2010:0161-01 Important: kernel-rt security an...
 - RHSA-2010:0165-01 Moderate: nss security update
 - RHSA-2010:0168-01 Moderate: httpd security and enh...
 - USN-918-1: Samba vulnerability
 - RHSA-2010:0154-02 Moderate: thunderbird security u...
 - RHSA-2010:0146-01 Important: kernel security and b...
 - DSA 2021-1: New spamass-milter packages fix remote...
 - DSA 2020-1: New ikiwiki packages fix cross-site sc...
 - RHSA-2010:0148-01 Important: kernel security and b...
 - RHSA-2010:0153-02 Moderate: thunderbird security u...
 - RHSA-2010:0145-01 Moderate: cpio security update
 - RHSA-2010:0147-01 Important: kernel security and b...
 - DSA-2019-1: New pango1.0 packages fix denial of se...
 - USN-915-1: Thunderbird vulnerabilities
 - RHSA-2010:0141-01 Moderate: tar security update
 - RHSA-2010:0155-01 Moderate: java-1.4.2-ibm securit...
 - RHSA-2010:0149-01 Important: kernel security and b...
 - RHSA-2010:0142-01 Moderate: tar security update
 - USN-913-1: libpng vulnerabilities
 - DSA 2008-1: New typo3-src packages fix several vul...
 - DSA 2013-1: New egroupware packages fix several vu...
 - DSA-2010-1: New kvm packages fix several vulnerabi...
 - USN-908-1: Apache vulnerabilities
 - Contentteller 2.0.6 released
 - USN-907-1: gnome-screensaver vulnerabilities
 - DSA 2007-1: New cups packages fix arbitrary code e...
 - USN-906-1: CUPS vulnerabilities
 - RHSA-2010:0129-01 Moderate: cups security update
 - GLSA 201003-01 sudo: Privilege escalation
 - RHSA-2010:0130-01 Moderate: java-1.5.0-ibm securit...
 - DSA 2006-1: New sudo packages fix several vulnerab...
 - RHSA-2010:0125-01 Moderate: systemtap security update
 - RHSA-2010:0126-01 Important: kvm security and bug ...
 - RHSA-2010:0124-01 Important: systemtap security up...
 - DSA 2004-1: New samba packages fix several vulnera...
 - DSA 2004-1: New Linux 2.6.24 packages fix several ...
 
 
 - 
▼ 
March
            (45)