Debian Security Advisory DSA-1725-1 firstname.lastname@example.org http://www.debian.org/security/ Thijs Kinkhorst February 15, 2009 http://www.debian.org/security/faq
Package : websvn Vulnerability : programming error Problem type : remote Debian-specific: no CVE Id(s) : CVE-2009-0240 Debian Bug : 512191
Bas van Schaik discovered that WebSVN, a tool to view Subversion repositories over the web, did not properly restrict access to private repositories, allowing a remote attacker to read significant parts of their content.
The old stable distribution (etch) is not affected by this problem.
For the stable distribution (lenny), this problem has been fixed in version 2.0-4+lenny1.
For the unstable distribution (sid), this problem has also been fixed in version 2.0-4+lenny1.
We recommend that you upgrade your websvn package.
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1.diff.gz Size/MD5 checksum: 21217 fec9c4c9173ac5da1e6866b6afdb37ff http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1.dsc Size/MD5 checksum: 1291 3b2910de66eb35b3650558c2a6b70d74 http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0.orig.tar.gz Size/MD5 checksum: 172005 047e02c0fa2948fdf98a3e348e3f1530
Architecture independent packages:
http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1_all.deb Size/MD5 checksum: 194618 f03bd2f1bf00ee0666368a85faf1a9ef
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: email@example.com Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>