---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for mediawiki1.7 SECUNIA ADVISORY ID: SA36951 VERIFY ADVISORY: http://secunia.com/advisories/36951/ DESCRIPTION: Debian has issued an update for mediawiki1.7. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks, and by malicious people to conduct cross-site scripting and request forgery attacks. For more information: SA33133 SA33881 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7_1.7.1-9etch1.dsc Size/MD5 checksum: 911 7db727bfa3f6139e107af451a90df719 http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7_1.7.1.orig.tar.gz Size/MD5 checksum: 3256428 50b74e2b5c86fb94c7201b72d2037662 http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7_1.7.1-9etch1.diff.gz Size/MD5 checksum: 46880 f939cc99afd3ff4b330a35ce549fdd7e Architecture independent packages: http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7_1.7.1-9etch1_all.deb Size/MD5 checksum: 3341486 4d801e5ee141c2affd080437cafa7f0f alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_alpha.deb Size/MD5 checksum: 180506 526bd0d52438515635abc44afea9e618 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_amd64.deb Size/MD5 checksum: 137638 b63b1cd4bc45683507e765b5af1aea12 arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_arm.deb Size/MD5 checksum: 140018 a9431b5e427703486a814ed2a7442d62 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_hppa.deb Size/MD5 checksum: 42988 0a7a434f0fcc81b7d8d5e80137ca6569 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_i386.deb Size/MD5 checksum: 122238 cc04873698abdbf03011336f533c2b06 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_ia64.deb Size/MD5 checksum: 231730 e3201066e1de24dc9a13d284ea4b685f mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_mips.deb Size/MD5 checksum: 42978 e92b925866416643905a835ab0a5ae2b mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_mipsel.deb Size/MD5 checksum: 42986 8c6b53cdf4af706debdc7eed12ae585b powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_powerpc.deb Size/MD5 checksum: 140584 47487edcc395a3a559e0d9eab8be653c sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mediawiki1.7/mediawiki1.7-math_1.7.1-9etch1_sparc.deb Size/MD5 checksum: 143132 5e59318af766a1ede67f62ffd1843597 ORIGINAL ADVISORY: DSA-1901-1: http://lists.debian.org/debian-security-announce/2009/msg00222.html OTHER REFERENCES: SA33133: http://secunia.com/advisories/33133/ SA33881: http://secunia.com/advisories/33881/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------