---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Debian update for ikiwiki SECUNIA ADVISORY ID: SA39048 VERIFY ADVISORY: http://secunia.com/advisories/39048/ DESCRIPTION: Debian has issued an update for ikiwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. For more information: SA38983 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 -- Source archives: http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.dsc Size/MD5 checksum: 1736 cf65b7fa1ea53f80088e5e7a24bf4f28 http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5.tar.gz Size/MD5 checksum: 771947 1c05117599045714fc477f757c675478 Architecture independent packages: http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.5_all.deb Size/MD5 checksum: 918452 ae67075b982fd6b19adca30f2393ee9a ORIGINAL ADVISORY: DSA-2020-1: http://lists.debian.org/debian-security-announce/2010/msg00060.html OTHER REFERENCES: SA38983: http://secunia.com/advisories/38983/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------