drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Überschreiben von Dateien in Munin (Aktualisierung)
Name: |
Überschreiben von Dateien in Munin (Aktualisierung) |
|
ID: |
DSA-3794-3 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie |
|
Datum: |
Sa, 4. März 2017, 00:44 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
Munin |
|
Update von: |
Überschreiben von Dateien in Munin |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3794-3 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 03, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : munin Debian Bug : 856536
The update for munin issued as DSA-3794-2 caused a regression leading to Perl warnings being appended to the munin-cgi-graph log file. Updated packages are now available to correct this issue. For reference, the original advisory text follows.
Stevie Trujillo discovered a local file write vulnerability in munin, a network-wide graphing framework, when CGI graphs are enabled. GET parameters are not properly handled, allowing to inject options into munin-cgi-graph and overwriting any file accessible by the user running the cgi-process.
For the stable distribution (jessie), this problem has been fixed in version 2.0.25-1+deb8u3.
We recommend that you upgrade your munin packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAli5zQ5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RpPA/7BNipiGHtI40hIA2BwVN0JweZdPCT/N9NrhVZkMPboWf/EaMzTXbMTwyj DmT6/jMLHIexncG6vzODmpMf5DWdSB5RUhh6XtZJJOfeiCe7Kw42fuIR5yiQD7ED UXZPe8gqsAqIQoaafmPMA3TnRoSAamrkUI9Msh4owsEbM9RqOKkLg6KJMMya9PEG dGJGlO1KBE0XkD2bBs2RThHnC7fkLYJirj9b38zN6iQaZz+cz4jrpy1NCMrMKNjh r6HPJ/8/RoYFFtqPvGqc75Nrhpet3jcpCg1wImoUBCANEBT9ubpbgc8jm/CUHYwb xWGppdzoMbXmy7EbE/gGAFkJkwURPiN3+cvjSlkIZwX5wAUJe3TRcdXM9cH8KEgq 4zyRPiYtf5LusmrpKy8AcAAwvWTDGcTN+oAVVlJyl9WEK7zZ3tguS62Z55uHTWDc liFVvni3JIqzD3FvQlx4agFxP/0uRyBaw2S2GoZpRzhFB4touVm/vTu+5azWypW7 y7tKFYHRikOhgnKxwi/LVpw8mCkJ8bxtnPF9IPXINaAb+NZ5GNAcbsemcnKamUau yHGTOyvwSghVoRqmR3FatVQIoHDocDwdK/CCIvrLslm4wWog1RkU/97O6u0SN1q8 151E+4zyztI2VzMNHDx2ZOHE4SZ6Ma3SiQ/lYjEnWZNkl5mXCDA= =sw0A -----END PGP SIGNATURE-----
|
|
|
|