lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <m1DqAaT-000pBjC@finlandia.Infodrom.North.DE> Date: Wed Jul 6 15:18:01 2005 From: joey at infodrom.org (Martin Schulze) Subject: [SECURITY] [DSA 739-1] New trac package fixes upload/download vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 739-1 security@...ian.org http://www.debian.org/security/ Martin Schulze July 6th, 2005 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : trac Vulnerability : missing input sanitising Problem-Type : remote Debian-specific: no Stefan Esser discovered an input validation flaw within Trac, a wiki and issue tracking system, that allows download/upload of files and therefore can lead to remote code execution in some configurations. The old stable distribution (woody) does not contain the trac package. For the stable distribution (sarge) this problem has been fixed in version 0.8.1-3sarge2. For the unstable distribution (sid) this problem has been fixed in version 0.8.4-1. We recommend that you upgrade your trac package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1-3sarge2.dsc Size/MD5 checksum: 655 17707ec452bb497b18b22a8280b775d6 http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1-3sarge2.diff.gz Size/MD5 checksum: 6294 386a1ffa63b1ba8709ad317176f1d419 http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1.orig.tar.gz Size/MD5 checksum: 236791 1b6c44fae90c760074762b73cdc88c8d Architecture independent components: http://security.debian.org/pool/updates/main/t/trac/trac_0.8.1-3sarge2_all.deb Size/MD5 checksum: 196864 85fd50e157531cbac57bf6e4901ad039 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@...ts.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCy+YNW5ql+IAeqTIRAiCPAJ9gEM0gvKX+zOTQslZFJlonZQjRWwCgmvMF AaYnuPNuo27LbU0Y3XUTZ5I= =iQRL -----END PGP SIGNATURE-----
Powered by blists - more mailing lists