Debian: New tutos packages fix multiple vulnerabilities
Summary
An SQL injection vulnerability allows the execution of SQL commands
through the link_id parameter in file_overview.php.
CVE-2004-2162
Cross-Site-Scripting vulnerabilities in the search function of the
address book and in app_new.php allow the execution of web script
code.
The old stable distribution (woody) does not contain tutos packages.
For the stable distribution (sarge) these problems have been fixed in
version 1.1.20031017-2+1sarge1.
The unstable distribution (sid) does no longer contain tutos packages.
We recommend that you upgrade your tutos package.
Upgrade Instructions
- --------------------wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Size/MD5 checksum: 575 7babaefc5a7e57afc2fb421d5829c4cf
Size/MD5 checksum: 4955293 c9c539f0d5504d69377e326870db18c3
Architecture independent components:
Size/MD5 checksum: 4760050 39bb9b2f3e9655c7060f04a5dac83e09
These files will probably be moved into the stable distribution on
its next update.
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org