You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa munin

Sigurnosni nedostatak programskog paketa munin

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3794-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 25, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : munin
CVE ID : CVE-2017-6188
Debian Bug : 855705

Stevie Trujillo discovered a local file write vulnerability in munin, a
network-wide graphing framework, when CGI graphs are enabled. GET
parameters are not properly handled, allowing to inject options into
munin-cgi-graph and overwriting any file accessible accessible by the
user running the cgi-process.

For the stable distribution (jessie), this problem has been fixed in
version 2.0.25-1+deb8u1.

We recommend that you upgrade your munin packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=8YsW
—–END PGP SIGNATURE—–

 

 

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA512

 

– ————————————————————————-

Debian Security Advisory DSA-3794-3                   security@debian.org

https://www.debian.org/security/                     Salvatore Bonaccorso

March 03, 2017                        https://www.debian.org/security/faq

– ————————————————————————-

 

Package        : munin

Debian Bug     : 856536

 

The update for munin issued as DSA-3794-2 caused a regression leading to

Perl warnings being appended to the munin-cgi-graph log file. Updated

packages are now available to correct this issue. For reference, the

original advisory text follows.

 

Stevie Trujillo discovered a local file write vulnerability in munin, a

network-wide graphing framework, when CGI graphs are enabled. GET

parameters are not properly handled, allowing to inject options into

munin-cgi-graph and overwriting any file accessible by the user running

the cgi-process.

 

For the stable distribution (jessie), this problem has been fixed in

version 2.0.25-1+deb8u3.

 

We recommend that you upgrade your munin packages.

 

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://www.debian.org/security/

 

Mailing list: debian-security-announce@lists.debian.org

—–BEGIN PGP SIGNATURE—–

 

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAli5zQ5fFIAAAAAALgAo

aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2

NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND

z0RpPA/7BNipiGHtI40hIA2BwVN0JweZdPCT/N9NrhVZkMPboWf/EaMzTXbMTwyj

DmT6/jMLHIexncG6vzODmpMf5DWdSB5RUhh6XtZJJOfeiCe7Kw42fuIR5yiQD7ED

UXZPe8gqsAqIQoaafmPMA3TnRoSAamrkUI9Msh4owsEbM9RqOKkLg6KJMMya9PEG

dGJGlO1KBE0XkD2bBs2RThHnC7fkLYJirj9b38zN6iQaZz+cz4jrpy1NCMrMKNjh

r6HPJ/8/RoYFFtqPvGqc75Nrhpet3jcpCg1wImoUBCANEBT9ubpbgc8jm/CUHYwb

xWGppdzoMbXmy7EbE/gGAFkJkwURPiN3+cvjSlkIZwX5wAUJe3TRcdXM9cH8KEgq

4zyRPiYtf5LusmrpKy8AcAAwvWTDGcTN+oAVVlJyl9WEK7zZ3tguS62Z55uHTWDc

liFVvni3JIqzD3FvQlx4agFxP/0uRyBaw2S2GoZpRzhFB4touVm/vTu+5azWypW7

y7tKFYHRikOhgnKxwi/LVpw8mCkJ8bxtnPF9IPXINaAb+NZ5GNAcbsemcnKamUau

yHGTOyvwSghVoRqmR3FatVQIoHDocDwdK/CCIvrLslm4wWog1RkU/97O6u0SN1q8

151E+4zyztI2VzMNHDx2ZOHE4SZ6Ma3SiQ/lYjEnWZNkl5mXCDA=

=sw0A

—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2017-02-0190-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa apache2

Otkriveni su sigurnosni nedostaci u programskom paketu apache2 za Debian. Otkriveni nedostaci isticali su se u modulima mod_session_crypto i mod_auth_digest...

Close