Debian: new gforge packages fix cross site scripting

    Date26 Jan 2008
    CategoryDebian
    2986
    Posted ByLinuxSecurity Advisories
    José Ramón Palanco discovered th a cross site scripting vulnerability in GForge, a collaborative development tool, allows remote attackers to inject arbitrary web script or HTML in the context of a logged in user's session.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1475-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                          Thijs Kinkhorst
    January 26, 2008                      http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : gforge
    Vulnerability  : missing input sanitising
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2007-0176
    
    José Ramón Palanco discovered th a cross site scripting vulnerability
    in GForge, a collaborative development tool, allows remote attackers to
    inject arbitrary web script or HTML in the context of a logged in user's
    session.
    
    For the stable distribution (etch), this problem has been fixed in version
    4.5.14-22etch5.
    
    The old stable distribution (sarge) is not affected by this problem.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 4.6.99+svn6347-1.
    
    We recommend that you upgrade your gforge package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz
        Size/MD5 checksum:  2161141 e85f82eff84ee073f80a2a52dd32c8a5
      http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5.dsc
        Size/MD5 checksum:      950 5416e7f128db22b483573e7e2cf0b519
      http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5.diff.gz
        Size/MD5 checksum:   197440 8a12d00cf17dfdd7494985c4f8f29911
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    88336 ef9fd62cd1104bb8a0a44f9ab6c00f48
      http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    80086 aa3c0d2cf684fbf36461957983697905
      http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch5_all.deb
        Size/MD5 checksum:  1010572 cdffbbec0307d622055f8c83d20729bc
      http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    88430 54534ede5d4892b11e811d1dd2c1e163
      http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    88940 297da4e3095868da632ab328e1d13b81
      http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch5_all.deb
        Size/MD5 checksum:   704662 73e25880fb3aeffdfa74b2135fd8a699
      http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    75900 e57351a0174e579eaf4c5a22a6ef2c35
      http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch5_all.deb
        Size/MD5 checksum:   212338 73e57f965fcc865f1995ca6dab808282
      http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    81914 5b8ba2b559bb02e5b8fbf3a136f2c05d
      http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    85866 9de18ba9b22999a83e5603a6cb6df245
      http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch5_all.deb
        Size/MD5 checksum:   103578 0b763ea3bc7aa6f0f46575416b31120b
      http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    86154 aaa05646086fc3d408c010d7d0bb776b
      http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    86970 e6b3f1bd2667fb1e19e094719d3451ae
      http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch5_all.deb
        Size/MD5 checksum:    95418 59e4878ae57e30de94925e1975cf8c11
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.