[Full-disclosure] [SECURITY] [DSA 1725-1] New websvn packages fix information leak

Type securityvulns
Reporter Securityvulns
Modified 2009-02-16T00:00:00



Debian Security Advisory DSA-1725-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst February 15, 2009 http://www.debian.org/security/faq

Package : websvn Vulnerability : programming error Problem type : remote Debian-specific: no CVE Id(s) : CVE-2009-0240 Debian Bug : 512191

Bas van Schaik discovered that WebSVN, a tool to view Subversion repositories over the web, did not properly restrict access to private repositories, allowing a remote attacker to read significant parts of their content.

The old stable distribution (etch) is not affected by this problem.

For the stable distribution (lenny), this problem has been fixed in version 2.0-4+lenny1.

For the unstable distribution (sid), this problem has also been fixed in version 2.0-4+lenny1.

We recommend that you upgrade your websvn package.

Upgrade instructions

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny

Source archives:

http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1.diff.gz Size/MD5 checksum: 21217 fec9c4c9173ac5da1e6866b6afdb37ff http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1.dsc Size/MD5 checksum: 1291 3b2910de66eb35b3650558c2a6b70d74 http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0.orig.tar.gz Size/MD5 checksum: 172005 047e02c0fa2948fdf98a3e348e3f1530

Architecture independent packages:

http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1_all.deb Size/MD5 checksum: 194618 f03bd2f1bf00ee0666368a85faf1a9ef

These files will probably be moved into the stable distribution on its next update.

For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJmDH0AAoJECIIoQCMVaAciZAH/332bnuIAmGcSQAMzkQJGYZJ echCkVJq4OZeTqWAPLPd7TskYAdP1LlV/nDkEZmivrfkEEa8Vfv9RM5gphYclMZb 6ZU4Wn56hpNfKy725qnuEd+E95uOXwLpX0VBLUwVk0BA64hEVN/c7IQ9DV59y/Rs TJT3elMf8CgZ44IQhCpiUyD9STI1ZLEhfGjPKRnqpK+uBu+LIHKpnIkuXDhLkmIM +gbV0vAXP564tHvYCAAreg6CBxl7iJPq59HyOh0fq2Nwh/jsz7gvP9YPy3kdfpib tguX9Kd3uH84+YufykAGW39DxX5nXITzSNont3pSk4zJyuqH+oJF4naL0YiHs6w= =GO2G -----END PGP SIGNATURE-----

Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/