You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa typo3-src

Sigurnosni nedostatak programskog paketa typo3-src

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-3164-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
February 21, 2015 http://www.debian.org/security/faq
– ————————————————————————-

Package : typo3-src
CVE ID : not yet available

Pierrick Caillon discovered that the authentication could be bypassed in
the Typo 3 content management system. Please refer to the upstream
advisory for additional information:
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/

For the stable distribution (wheezy), this problem has been fixed in
version 4.5.19+dfsg1-5+wheezy4.

The upcoming stable distribution (jessie) no longer includes Typo 3.

For the unstable distribution (sid), this problem has been fixed in
version 4.5.40+dfsg1-1.

We recommend that you upgrade your typo3-src packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIcBAEBAgAGBQJU6PcKAAoJEBDCk7bDfE42vZAP/0O0OZa0HUSS/HjWXqpumd6s
PBIf0GoUq/MZLbaKujvkJWQS3kuC58INrdLgykVC7JoZ9a6mClufo3pYXh4621TX
NMQq1DPkHRVUaK5+7TDSSADefxt/At3sMD0osGv/WC9s1PN8Rv+eXUrtellTyT9e
DXHgNUMjzGF41EidpP7jyXIWMLiKyXhWnicHnyWOvh3/cxcfF1S5ySYWhiL7r099
qc+LIgr5fbx6qY+yF5jaE3+OZjci1P7sLFtiS1kI1PWpB2SEVOZkP0kWzhL6CL+F
R6IRh6T6aj5Wlomjo90F/woQuqUX/8pKZHQko2XA/Mc+d859EbijjVzz7zcEE1iV
wWmioOGwLYNuuEUHzdSqhmjZ7RgVMBYTmQpa5CGJHK48++Vt0gbyrTSpMjXEca7B
BwnX/dy+FQdIFv1EdvCS2qRD7r5nUfePbTYY2i8O8tb8jM93LrlXLmT0klv1p0i0
SNa1XT66cCZig96l2EunYrvFaxzFnguWqZhjhHqdKztvHoqPQXgWfI+Xt8UEJBvt
Kv58NtlxSfEMlR8oDznjNZBt6+lh1ZdHP8zaIuR3owolx4DjpooGRMNa2GJnbIFX
nhFGzc+55ffx9WUJOcD03giFjuUFXB0kEaIlOshvzMy6GMt2HjcNmMx1A9HL4z2Q
9ztorEmBvqBJAVBNKlRL
=Euei
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20150221213333.GA19121@pisco.westfalen.local

AutorMarijo Plepelic
Cert idNCERT-REF-2015-02-0008-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa xdg-utils

Otkriven je sigurnosni nedostatak u programskom paketu xdg-utils. Otkriveni nedostatak potencijalnim napadačima omogućuje pokretanje proizvoljnih naredbi. Svim korisnicima savjetuje se...

Close