—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-3794-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 25, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : munin
CVE ID : CVE-2017-6188
Debian Bug : 855705
Stevie Trujillo discovered a local file write vulnerability in munin, a
network-wide graphing framework, when CGI graphs are enabled. GET
parameters are not properly handled, allowing to inject options into
munin-cgi-graph and overwriting any file accessible accessible by the
user running the cgi-process.
For the stable distribution (jessie), this problem has been fixed in
version 2.0.25-1+deb8u1.
We recommend that you upgrade your munin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlix6vhfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0SQTg//WXRyiDkW5irOue8t7kYmI2UE6AL+1eakYmxl23HkiAdB6puBcsRZS559
P8d0tN6aFxiM+p2Cl651V+RCS+K4vi7HGvu6r7qSDXGW0S1BA7NrRUM5eAlebdAP
yxqnz/iD8ghuBn7HEUtBzKomkapBvk7XniRDV57Add5iMVVM5iXjLBHgXp+iL9r6
UABFY7TBVm7EW0u3z0CL2whuMzqE7d4ggZD+AGL7G0BNnAR8/KNyW3G00aEwEeb5
k3yBmEDjTut17gdeX9WvSAjA9uigSpLri1geUubRxV8CoG8ZE6Ka55uIh8enDAOO
G7CWlJogS+h95fJFNFAjQTvmqEy/RbROXBuA94aE9IzZttOE0774wCHDhteGaYgM
uO22AXFlgYMLoeohSE7385EmjDyIYGsL/wYXlOkbZzeppUmvidBc6zR3JK03BS7a
SgC853CyfUU6rCdXOgLPa5Z1pDDnArcfk9hU2Z472wiUpiRvXM8OuBHrj+YH/UbC
Ygq5H4ymb76a5EqEm83fnHXRotnYvvWluGZ8A4ZpnrvPTgJ5h0c3Ugt2uGcyICo8
Y+OBypehyaeJjIyUSkq8A2Zb74VvISbHO4i+goRW9wDje23T8Gj3vjOyXuoot+XF
CscqihAQhJZwWyUEZqmlh3rPucXk1ETPy47RRbbW3nLSSXRrvTw=
=8YsW
—–END PGP SIGNATURE—–
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-3794-3 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 03, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : munin
Debian Bug : 856536
The update for munin issued as DSA-3794-2 caused a regression leading to
Perl warnings being appended to the munin-cgi-graph log file. Updated
packages are now available to correct this issue. For reference, the
original advisory text follows.
Stevie Trujillo discovered a local file write vulnerability in munin, a
network-wide graphing framework, when CGI graphs are enabled. GET
parameters are not properly handled, allowing to inject options into
munin-cgi-graph and overwriting any file accessible by the user running
the cgi-process.
For the stable distribution (jessie), this problem has been fixed in
version 2.0.25-1+deb8u3.
We recommend that you upgrade your munin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=sw0A
—–END PGP SIGNATURE—–
$downloadlink = get_field('download_link'); ?>