lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 26 Jan 2008 17:25:45 +0100 (CET)
From: (Thijs Kinkhorst)
Subject: [SECURITY] [DSA 1475-1] new gforge packages fix
	cross site scripting

Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1475-1                                  Thijs Kinkhorst
January 26, 2008            
- ------------------------------------------------------------------------

Package        : gforge
Vulnerability  : missing input sanitising
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-0176

José Ramón Palanco discovered th a cross site scripting vulnerability
in GForge, a collaborative development tool, allows remote attackers to
inject arbitrary web script or HTML in the context of a logged in user's

For the stable distribution (etch), this problem has been fixed in version

The old stable distribution (sarge) is not affected by this problem.

For the unstable distribution (sid) this problem has been fixed in
version 4.6.99+svn6347-1.

We recommend that you upgrade your gforge package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:  2161141 e85f82eff84ee073f80a2a52dd32c8a5
    Size/MD5 checksum:      950 5416e7f128db22b483573e7e2cf0b519
    Size/MD5 checksum:   197440 8a12d00cf17dfdd7494985c4f8f29911

Architecture independent packages:
    Size/MD5 checksum:    88336 ef9fd62cd1104bb8a0a44f9ab6c00f48
    Size/MD5 checksum:    80086 aa3c0d2cf684fbf36461957983697905
    Size/MD5 checksum:  1010572 cdffbbec0307d622055f8c83d20729bc
    Size/MD5 checksum:    88430 54534ede5d4892b11e811d1dd2c1e163
    Size/MD5 checksum:    88940 297da4e3095868da632ab328e1d13b81
    Size/MD5 checksum:   704662 73e25880fb3aeffdfa74b2135fd8a699
    Size/MD5 checksum:    75900 e57351a0174e579eaf4c5a22a6ef2c35
    Size/MD5 checksum:   212338 73e57f965fcc865f1995ca6dab808282
    Size/MD5 checksum:    81914 5b8ba2b559bb02e5b8fbf3a136f2c05d
    Size/MD5 checksum:    85866 9de18ba9b22999a83e5603a6cb6df245
    Size/MD5 checksum:   103578 0b763ea3bc7aa6f0f46575416b31120b
    Size/MD5 checksum:    86154 aaa05646086fc3d408c010d7d0bb776b
    Size/MD5 checksum:    86970 e6b3f1bd2667fb1e19e094719d3451ae
    Size/MD5 checksum:    95418 59e4878ae57e30de94925e1975cf8c11

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>
Version: GnuPG v1.4.6 (GNU/Linux)


Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists