-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2290-1 security@debian.org http://www.debian.org/security/ Florian Weimer August 07, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : samba Vulnerability : cross-site scripting Problem type : remote Debian-specific: no CVE ID : CVE-2011-2522 CVE-2011-2694 The Samba Web Administration Tool (SWAT) contains several cross-site request forgery (CSRF) vulnerabilities (CVE-2011-2522) and a cross-site scripting vulnerability (CVE-2011-2694). For the oldstable distribution (lenny), these problems have been fixed in version 2:3.2.5-4lenny15. For the stable distribution (squeeze), these problems have been fixed in version 2:3.5.6~dfsg-3squeeze5. For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in version 2:3.5.10~dfsg-1. We recommend that you upgrade your samba packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJOPu+SAAoJEL97/wQC1SS+X0oH/1sHoqRnZe31ZieKTXz05twC NYpJm5+zQhC1ZKu4aVcErINqulJA7UKz33cL67E4JbhdRr99VZYhGP7h1/IHSjy7 CTjpXP7orvZPSAkT+O9GxbBNr0rGZCsIe4tmmm0S4DFe4wD8hnciJbCNhRmH7ztm DowdCI2SUzmAuKrJBIePWg9KMBRIb5M+6a6hU0u+axHS/CqJNNnW3CXW7Id+t/OI LEdw0Duio2f0r7xoLlyF5QPVUwLJnE5QV6JsyqxwWK1mvOEYR+4uWmPz/ZDElPA/ kRdHDU2tnfj7Y6ioVc4g8ivTE21+2E9Z2HqEt2WVZrfwvZidPI45TynALQOFdl8= =BmoS -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/