Bugtraq: [SECURITY] [DSA 3794-2] munin regression update

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA512

– ————————————————————————

Debian Security Advisory DSA-3794-2 security (at) debian (dot) org [email concealed]

https://www.debian.org/security/ Salvatore Bonaccorso

March 02, 2017 https://www.debian.org/security/faq

– ————————————————————————

Package : munin

Debian Bug : 856455

The update for munin issues as DSA-3794-1 caused a regression in the

zooming functionality in munin-cgi-graph. Updated packages are now

available to correct this issue. For reference, the original advisory

text follows.

Stevie Trujillo discovered a local file write vulnerability in munin, a

network-wide graphing framework, when CGI graphs are enabled. GET

parameters are not properly handled, allowing to inject options into

munin-cgi-graph and overwriting any file accessible by the user running

the cgi-process.

For the stable distribution (jessie), this problem has been fixed in

version 2.0.25-1+deb8u2.

For the unstable distribution (sid), this problem has been fixed in

version 2.0.32-1.

We recommend that you upgrade your munin packages.

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://www.debian.org/security/

Mailing list: debian-security-announce (at) lists.debian (dot) org [email concealed]

—–BEGIN PGP SIGNATURE—–

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAli3sQNfFIAAAAAALgAo

aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2

NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND

z0R4fhAAgWkNO6DYqMuVS4c+3H32wOygl5mWa0sVmXuFbMjxcW8p3yYUdnzXGSJK

VthLYtyST57qUaardAMNmQu0HTRDZd8bIyzrMDJgda9Qkz5t2XQ1kbwUyk5W036W

t/Xla3Y6WNUevGegfUwK2dd1wyVwPI/Pbr4UrZUMozf4/MpH7fmtsrgR/wK25y72

QRh+cJtxCDvrnCTcEWwTxOmYjpAzZnXa/g3qO5F+c8R3RUpTsDIRuuUIX+o7+BaI

xsGYRPn2Tzkz4HxKQri/+Jpp3kmxfpELtGB4ODTfdzVOAr38aslQkSMnIY9+3rSV

opJL/wu5onsqTRj5QFpOhQXjT/MKflsFAiL1VsRDw5FytwyNlmPpLhjvC6gbZ1Ao

U3j6r1l7EjhVIq0YH9YIlO3qS9IePSsLuoPSuO8GiSZPO7AM06mxbjiw7M2ww8/U

bxPgM8WL8+riiG5xrBD3t7rG03wQdx689vQmU/ZBLfsZMa2YJ146ip6CgZUiRoDG

QYpoZKQnKNTo2S0+5Pd3aMskPi9nEXso2PZ3cD42XsBCG5Sv5ooGORFXamulyTIh

2xpWxqk9H1QnZSKB2117EgLu7m5hO1AJbu5urLHA4ThrtMG7zKpCsGCWwx914qXJ

xJK4bHe53ECHGIhsrnAh7I8RpRw0jaNjkaqhdFU6fpLgE0hf5qI=

=kBJF

—–END PGP SIGNATURE—–

[ reply ]

Source: SecurityFocus Vulnerabilities @ March 2, 2017 at 01:04AM

0
Share