---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for mahara SECUNIA ADVISORY ID: SA37218 VERIFY ADVISORY: http://secunia.com/advisories/37218/ DESCRIPTION: Debian has issued an update for mahara. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks. For more information: SA37217 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny4.dsc Size/MD5 checksum: 1304 a89de002e60d1435fe9c7375cdd353b3 http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4.orig.tar.gz Size/MD5 checksum: 2383079 cf1158e4fe3cdba14fb1b71657bf8cc9 http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny4.diff.gz Size/MD5 checksum: 40473 61fa7821c6637801a3f7a22ed5993233 Architecture independent packages: http://security.debian.org/pool/updates/main/m/mahara/mahara-apache2_1.0.4-4+lenny4_all.deb Size/MD5 checksum: 7908 ce0748a7b83729e5f987529b871f9428 http://security.debian.org/pool/updates/main/m/mahara/mahara_1.0.4-4+lenny4_all.deb Size/MD5 checksum: 1637754 cf0bdb218c9fbd5723f1be19ac4b84a6 ORIGINAL ADVISORY: DSA-1924-1: http://www.us.debian.org/security/2009/dsa-1924 OTHER REFERENCES: SA37217: http://secunia.com/advisories/37217/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------