[SECURITY] [DSA 1560-1] New kronolith2 packages fix cross site scripting

2008-04-28T10:15:47
ID DEBIAN:DSA-1560-1:3C0F6
Type debian
Reporter Debian
Modified 2008-04-28T10:15:47

Description


Debian Security Advisory DSA-1560-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst April 28, 2008 http://www.debian.org/security/faq


Package : kronolith2 Vulnerability : insufficient input sanitising Problem type : remote Debian-specific: no Debian Bug : 478121

"The-0utl4w" discovered that the Kronolith, calendar component for the Horde Framework, didn't properly sanitise URL input, leading to a cross-site scripting vulnerability in the add event screen.

For the stable distribution (etch), this problem has been fixed in version 2.1.4-1etch1.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your kronolith2 package.

Upgrade instructions


wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch


Source archives:

http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4-1etch1.dsc Size/MD5 checksum: 988 bed4712a2341c3a5043c6e69ad6e8309 http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4-1etch1.diff.gz Size/MD5 checksum: 5388 580890a3d47459f77dd89aa664ca4a44 http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4.orig.tar.gz Size/MD5 checksum: 1691114 df6d6fc99012865b18b089212c7544ad

Architecture independent packages:

http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4-1etch1_all.deb Size/MD5 checksum: 1694916 d93492c52a99397b76f862705b7fd24e

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>