Secunia Security Advisory - Debian has issued an update for gforge. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
6f71a0a9f4d57a70ee1d74a250a4deb356d2d920adc1370bedbfbde31500cda3
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Debian update for gforge
SECUNIA ADVISORY ID:
SA28598
VERIFY ADVISORY:
http://secunia.com/advisories/28598/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for gforge. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
For more information:
SA23675
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz
Size/MD5 checksum: 2161141 e85f82eff84ee073f80a2a52dd32c8a5
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5.dsc
Size/MD5 checksum: 950 5416e7f128db22b483573e7e2cf0b519
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5.diff.gz
Size/MD5 checksum: 197440 8a12d00cf17dfdd7494985c4f8f29911
Architecture independent packages:
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch5_all.deb
Size/MD5 checksum: 88336 ef9fd62cd1104bb8a0a44f9ab6c00f48
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5_all.deb
Size/MD5 checksum: 80086 aa3c0d2cf684fbf36461957983697905
http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch5_all.deb
Size/MD5 checksum: 1010572 cdffbbec0307d622055f8c83d20729bc
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch5_all.deb
Size/MD5 checksum: 88430 54534ede5d4892b11e811d1dd2c1e163
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch5_all.deb
Size/MD5 checksum: 88940 297da4e3095868da632ab328e1d13b81
http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch5_all.deb
Size/MD5 checksum: 704662 73e25880fb3aeffdfa74b2135fd8a699
http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch5_all.deb
Size/MD5 checksum: 75900 e57351a0174e579eaf4c5a22a6ef2c35
http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch5_all.deb
Size/MD5 checksum: 212338 73e57f965fcc865f1995ca6dab808282
http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch5_all.deb
Size/MD5 checksum: 81914 5b8ba2b559bb02e5b8fbf3a136f2c05d
http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch5_all.deb
Size/MD5 checksum: 85866 9de18ba9b22999a83e5603a6cb6df245
http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch5_all.deb
Size/MD5 checksum: 103578 0b763ea3bc7aa6f0f46575416b31120b
http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch5_all.deb
Size/MD5 checksum: 86154 aaa05646086fc3d408c010d7d0bb776b
http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch5_all.deb
Size/MD5 checksum: 86970 e6b3f1bd2667fb1e19e094719d3451ae
http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch5_all.deb
Size/MD5 checksum: 95418 59e4878ae57e30de94925e1975cf8c11
-- Debian GNU/Linux unstable alias sid --
Fixed in version 4.6.99+svn6347-1.
ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00037.html
OTHER REFERENCES:
SA23675:
http://secunia.com/advisories/23675/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------