-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3164-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff February 21, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : typo3-src CVE ID : not yet available Pierrick Caillon discovered that the authentication could be bypassed in the Typo 3 content management system. Please refer to the upstream advisory for additional information: https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/ For the stable distribution (wheezy), this problem has been fixed in version 4.5.19+dfsg1-5+wheezy4. The upcoming stable distribution (jessie) no longer includes Typo 3. For the unstable distribution (sid), this problem has been fixed in version 4.5.40+dfsg1-1. We recommend that you upgrade your typo3-src packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJU6PcKAAoJEBDCk7bDfE42vZAP/0O0OZa0HUSS/HjWXqpumd6s PBIf0GoUq/MZLbaKujvkJWQS3kuC58INrdLgykVC7JoZ9a6mClufo3pYXh4621TX NMQq1DPkHRVUaK5+7TDSSADefxt/At3sMD0osGv/WC9s1PN8Rv+eXUrtellTyT9e DXHgNUMjzGF41EidpP7jyXIWMLiKyXhWnicHnyWOvh3/cxcfF1S5ySYWhiL7r099 qc+LIgr5fbx6qY+yF5jaE3+OZjci1P7sLFtiS1kI1PWpB2SEVOZkP0kWzhL6CL+F R6IRh6T6aj5Wlomjo90F/woQuqUX/8pKZHQko2XA/Mc+d859EbijjVzz7zcEE1iV wWmioOGwLYNuuEUHzdSqhmjZ7RgVMBYTmQpa5CGJHK48++Vt0gbyrTSpMjXEca7B BwnX/dy+FQdIFv1EdvCS2qRD7r5nUfePbTYY2i8O8tb8jM93LrlXLmT0klv1p0i0 SNa1XT66cCZig96l2EunYrvFaxzFnguWqZhjhHqdKztvHoqPQXgWfI+Xt8UEJBvt Kv58NtlxSfEMlR8oDznjNZBt6+lh1ZdHP8zaIuR3owolx4DjpooGRMNa2GJnbIFX nhFGzc+55ffx9WUJOcD03giFjuUFXB0kEaIlOshvzMy6GMt2HjcNmMx1A9HL4z2Q 9ztorEmBvqBJAVBNKlRL =Euei -----END PGP SIGNATURE-----