Re: [SECURITY] [DSA 2968-1] gnupg2 security update

2014-06-30 Thread Daniel Thomas Hasbrouck
 what should I do with the Above gobble-D-GOOK? even my usb Flashdrives
Are wiped!, (not by me!).


On Fri, Jun 27, 2014 at 1:14 AM, Salvatore Bonaccorso car...@debian.org
wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 - -
 Debian Security Advisory DSA-2968-1   secur...@debian.org
 http://www.debian.org/security/  Salvatore Bonaccorso
 June 27, 2014  http://www.debian.org/security/faq
 - -

 Package: gnupg2
 CVE ID : CVE-2014-4617
 Debian Bug : 752498

 Jean-Rene Reinhard, Olivier Levillain and Florian Maury reported that
 GnuPG, the GNU Privacy Guard, did not properly parse certain garbled
 compressed data packets. A remote attacker could use this flaw to mount
 a denial of service against GnuPG by triggering an infinite loop.

 For the stable distribution (wheezy), this problem has been fixed in
 version 2.0.19-2+deb7u2.

 For the testing distribution (jessie), this problem has been fixed in
 version 2.0.24-1.

 For the unstable distribution (sid), this problem has been fixed in
 version 2.0.24-1.

 We recommend that you upgrade your gnupg2 packages.

 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/

 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1

 iQIcBAEBCgAGBQJTrSUZAAoJEAVMuPMTQ89ExOEP/1Ycmnphx4Quq4BvlIFM8EbR
 vhH2tfBSUr4VAgik2AkGKOUTaci6qJLrs9Sf4lGnjobTXFn8+BitNiO3AFn2wIq1
 eIqosXZxUflNquCvSyfxjid8MuJk7DOzSca8QENlTQfDKk+5LpWGfKM1I2dKSvOh
 Q4KTfcQU6nM17Epczj6eAUDqGdX+I5qPBJLTD5Cc+t9eOy2Erdaj+NWUc/lBDjgo
 oQDw/ytZLzI5AwJoc1dAtQR0pEbNlBXrGOs9p1+8VdZ4V7cNjkPJLtsHZj0d+M8o
 0/4IsKQEM4Fzu4nrjTiiLDpf2+tYqHMtst9AzY0Hf1gaZAGA0Sdx5Kvts5zBSfz8
 WbiKTZvvLqgkWUOdxqIf9/tT6tbr8vkuNPdtcBnvyIM8fb4MiXcBBbhG03fTgvpr
 f776rjk6Y3IWHp0RhNBn8Lep4YGExzyoKikTqUjQoHcMGVhCBtcAfTnLlCKc8IVz
 UPyp0gzv1GTrMeZq8riyLckBpBMTf0i8bEncK/0buyBwDevjdFGSUoBh+hsqtktV
 dUYNTLpSJoqAAbWCqytiPQ7A6VP5IyuXmUcn1vIFTV9gGFsChpIJFQ/Y298X6xM6
 u+Z7NhZjcrvfGy+I7Hcv1q1tHQszdvPJZc46dFBKhpupKA+swvg3iG4FbTxNPOH1
 kk6B9YFnYI+Nq2zzcyAr
 =7fez
 -END PGP SIGNATURE-


 --
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive: https://lists.debian.org/e1x0ris-ay...@master.debian.org




Re: [SECURITY] [DSA 2970-1] cacti security update

2014-06-30 Thread Daniel Thomas Hasbrouck
What am I supposed to Download this ONTO?   PC I'm ON, is a PUBLIC Library
PC.  all of MY USB Flash-Drive are Wiped Clean.  gobble-D-Gook =
incomprehensible Material.


On Sun, Jun 29, 2014 at 10:58 AM, Moritz Muehlenhoff j...@debian.org wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 - -
 Debian Security Advisory DSA-2970-1   secur...@debian.org
 http://www.debian.org/security/Moritz Muehlenhoff
 June 29, 2014  http://www.debian.org/security/faq
 - -

 Package: cacti
 CVE ID : CVE-2014-2326 CVE-2014-2327 CVE-2014-2328 CVE-2014-2708
  CVE-2014-2709 CVE-2014-4002

 Multiple security issues (cross-site scripting, cross-site request
 forgery, SQL injections, missing input sanitising) have been found in
 Cacti, a web frontend for RRDTool.

 For the stable distribution (wheezy), these problems have been fixed in
 version 0.8.8a+dfsg-5+deb7u3.

 For the testing distribution (jessie), these problems have been fixed in
 version 0.8.8b+dfsg-6.

 For the unstable distribution (sid), these problems have been fixed in
 version 0.8.8b+dfsg-6.

 We recommend that you upgrade your cacti packages.

 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/

 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1

 iQIcBAEBAgAGBQJTsFOEAAoJEBDCk7bDfE42Nz0QAJB/n4g/zhKu86yaLNqZQBhR
 tT1m51OJ9+2tUI96wnA4ZNUlFqCByCG/CjJGDUWoOGGjD6brZ3xufrLyD0SNickv
 8XB+Wdbv/N6q0joKD96WtYYQcaLNUlhCGyzFmLLa2bo6n9v+85lNDJINCJt2Y3Wy
 B6pyVREhfLGyOdwdrMHn/25yZ7jSc+Cd/o03GyJamZMn6gjY3rh2sNAeCbUIq5Oi
 GFZ9LJvmcHKeSJOm0FFQSFmTrIbLMUb/1/TK2LLAGiHN4fpjkMZsN+vyTgCwgG8y
 7sjhz3QizQ6C/PKGpdmhgmbTgJbGdxO6pyzDGpNxVx+q6eGWP6D5NsbIuNQB9Q/4
 hG+95CJI8orxdyGtu3UVuW3ZjJOi5h2a2oOT1J+dEHhpmrhNXq9aZ+NtCw8RUzuF
 pSH4zNwk078PnYn1vKUBrIZhsrRHB1n4I6FjAm1JpFFWfPzJnPQrE3jxRjNALUqj
 PSyJ3VA54FcHfu/BRj9dqBMFb8zIgOUaO7OOEJ2nsV451IfMHkFtP9uMHSznogaG
 VP6rC8ue/aAyhSEXaBCj+bOLp6UVc9JNXoVL992tKk7EPQsd3Bim7IZnwyhJukAa
 qSlAqstZbAlA+khpcYA6Uq1pFkxlj7rnLIGiskHwMALRGBNmSYUXych9q1qjqxyO
 kfWXzI3r7DFK5U+DqeKs
 =NbC+
 -END PGP SIGNATURE-


 --
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive:
 https://lists.debian.org/20140629175803.GA2541@pisco.westfalen.local




Re: [SECURITY] [DSA 2970-1] cacti security update

2014-06-30 Thread Jack
On 30/06/2014 19:21, Daniel Thomas Hasbrouck wrote:
 What am I supposed to Download this ONTO?   PC I'm ON, is a PUBLIC Library
 PC.  all of MY USB Flash-Drive are Wiped Clean.  gobble-D-Gook =
 incomprehensible Material.

The main purpose of this list is to update Debian system administrators
(including users who administer their own machines) about package
updates that have relevance to system security.

If you can't update the software on the machine you are using, then
these notices will be much less useful to you than it will be to others
who can.

Perhaps you should have a chat with the guy at your library who looks
after the PCs.

-- 
Jack.


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53b1cb28.6010...@jackpot.uk.net



Re: [SECURITY] [DSA 2968-1] gnupg2 security update

2014-06-30 Thread Paul Wise
On Tue, Jul 1, 2014 at 2:11 AM, Daniel Thomas Hasbrouck wrote:

  what should I do with the Above gobble-D-GOOK?

Ask your sysadmin to perform an upgrade on any physical machines or
virtual machines you have that are running Debian. The same
vulnerability probably applies to other Linux/BSD distributions so
upgrade those too. It may also apply to Windows/Mac machines if you
have installed GnuPGP there.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caktje6fkfe6repvpgz5ggpgx4nbgogy33gf+vtkme1a5md-...@mail.gmail.com