6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.013 Low
EPSS
Percentile
84.2%
Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system. The Common Vulnerabilities
and Exposures project identifies the following problems:
Request Tracker stock templates are resolved by this update. But any
custom email templates should be updated to ensure that values
interpolated into mail headers do not contain newlines.
This version of Request Tracker includes a database content upgrade. If
you are using a dbconfig-managed database, you will be offered the
choice of applying this automatically. Otherwise see the explanation in
/usr/share/doc/request-tracker4/NEWS.Debian.gz for the manual steps to
perform.
Please note that if you run request-tracker4 under the Apache web
server, you must stop and start Apache manually. The restart mechanism
is not recommended, especially when using mod_perl or any form of
persistent Perl process such as FastCGI or SpeedyCGI.
For the stable distribution (wheezy), these problems have been fixed in
version 4.0.7-5+deb7u2.
For the testing distribution (jessie), these problems will be fixed
soon.
For the unstable distribution (sid), these problems have been fixed in
version 4.0.12-2.
We recommend that you upgrade your request-tracker4 packages.
CPE | Name | Operator | Version |
---|---|---|---|
request-tracker4 | eq | 4.0.7-5 | |
request-tracker4 | eq | 4.0.7-5+deb7u1 | |
request-tracker4 | eq | 4.0.7-5+deb7u2~bpo60+1 |