-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2480-1 firstname.lastname@example.org http://www.debian.org/security/ Moritz Muehlenhoff May 24, 2012 http://www.debian.org/security/faq
Package : request-tracker3.8 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-2082 CVE-2011-2083 CVE-2011-2084 CVE-2011-2085 CVE-2011-4458 CVE-2011-4459 CVE-2011-4460
Several vulnerabilities were discovered in Request Tracker, an issue tracking system:
The vulnerable-passwords scripts introduced for CVE-2011-0009 failed to correct the password hashes of disabled users.
Several cross-site scripting issues have been discovered.
Password hashes could be disclosed by privileged users.
Several cross-site request forgery vulnerabilities have been found. If this update breaks your setup, you can restore the old behaviour by setting $RestrictReferrer to 0.
The code to support variable envelope return paths allowed the execution of arbitrary code.
Disabled groups were not fully accounted as disabled.
SQL injection vulnerability, only exploitable by privileged users.
For the stable distribution (squeeze), this problem has been fixed in version 3.8.8-7+squeeze2.
For the unstable distribution (sid), this problem has been fixed in version 4.0.5-3.
We recommend that you upgrade your request-tracker3.8 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: email@example.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAk++cYMACgkQXm3vHE4uylokxACguQb84ehN2ODvrYW4Mr1CmOLY XIkAoJ/DIybBV9MxZA7txyMDE56vsWeM =+4ft -----END PGP SIGNATURE-----