---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for gforge SECUNIA ADVISORY ID: SA28598 VERIFY ADVISORY: http://secunia.com/advisories/28598/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gforge. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. For more information: SA23675 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz Size/MD5 checksum: 2161141 e85f82eff84ee073f80a2a52dd32c8a5 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5.dsc Size/MD5 checksum: 950 5416e7f128db22b483573e7e2cf0b519 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5.diff.gz Size/MD5 checksum: 197440 8a12d00cf17dfdd7494985c4f8f29911 Architecture independent packages: http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch5_all.deb Size/MD5 checksum: 88336 ef9fd62cd1104bb8a0a44f9ab6c00f48 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5_all.deb Size/MD5 checksum: 80086 aa3c0d2cf684fbf36461957983697905 http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch5_all.deb Size/MD5 checksum: 1010572 cdffbbec0307d622055f8c83d20729bc http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch5_all.deb Size/MD5 checksum: 88430 54534ede5d4892b11e811d1dd2c1e163 http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch5_all.deb Size/MD5 checksum: 88940 297da4e3095868da632ab328e1d13b81 http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch5_all.deb Size/MD5 checksum: 704662 73e25880fb3aeffdfa74b2135fd8a699 http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch5_all.deb Size/MD5 checksum: 75900 e57351a0174e579eaf4c5a22a6ef2c35 http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch5_all.deb Size/MD5 checksum: 212338 73e57f965fcc865f1995ca6dab808282 http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch5_all.deb Size/MD5 checksum: 81914 5b8ba2b559bb02e5b8fbf3a136f2c05d http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch5_all.deb Size/MD5 checksum: 85866 9de18ba9b22999a83e5603a6cb6df245 http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch5_all.deb Size/MD5 checksum: 103578 0b763ea3bc7aa6f0f46575416b31120b http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch5_all.deb Size/MD5 checksum: 86154 aaa05646086fc3d408c010d7d0bb776b http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch5_all.deb Size/MD5 checksum: 86970 e6b3f1bd2667fb1e19e094719d3451ae http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch5_all.deb Size/MD5 checksum: 95418 59e4878ae57e30de94925e1975cf8c11 -- Debian GNU/Linux unstable alias sid -- Fixed in version 4.6.99+svn6347-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00037.html OTHER REFERENCES: SA23675: http://secunia.com/advisories/23675/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------