Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New gforge packages fix SQL injection Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Sumit I. Siddharth discovered that Gforge, a collaborative development tool performs insufficient input sanitising, which allows SQL injection.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1369-1                                   Moritz Muehlenhoff
September 6th, 2007           
- --------------------------------------------------------------------------

Package        : gforge
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2007-3913

Sumit I. Siddharth discovered that Gforge, a collaborative development
tool performs insufficient input sanitising, which allows SQL injection. 

For the oldstable distribution (sarge) this problem has been fixed in
version 3.1-31sarge2.

For the stable distribution (etch) this problem has been fixed in
version 4.5.14-22etch1.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your gforge package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      868 6baa9978f8ff39cae8e37535e617f6ba
      Size/MD5 checksum:   297258 e0f0ef2728d4649743b4ac034f899636
      Size/MD5 checksum:  1409879 c723b3a9efc016fd5449c4765d5de29c

  Architecture independent components:
      Size/MD5 checksum:    93644 a7809f932f269fc22e36f5623590c6c9
      Size/MD5 checksum:    98972 aa4610876b4e27b53369f0453ecaa6ca
      Size/MD5 checksum:   148118 5a69c6c150bb5a56420ddd92dec031e1
      Size/MD5 checksum:    72242 7ed71adf708785818e9115052af661ca
      Size/MD5 checksum:    59642 35f6d7170cb3b192c83f9fbee0effcec
      Size/MD5 checksum:    70546 cbb7cbaa587229ce51ef878a531c1a18
      Size/MD5 checksum:    58032 984c0cf8b748e5e128c4a04391a2a9bb
      Size/MD5 checksum:    64934 b2541fbb6077be81f66474f50ca28171
      Size/MD5 checksum:    64470 b5a67eddf626e7956982543f1bedf208
      Size/MD5 checksum:    64568 3b419356e44b78b094c9080e266deda2
      Size/MD5 checksum:    60772 887c0770c32d6b2395d25b4a193629fb
      Size/MD5 checksum:    59114 b68df2ff172ea2994ad9e52d60083ced
      Size/MD5 checksum:  1107780 3de84f6c70eccdcf06d64148e55a9427
      Size/MD5 checksum:    56164 c6abb5b1dbd072255c21513f6144b4d4
      Size/MD5 checksum:    55582 ae4524ebd3ac974c1e14793f12514983

Debian GNU/Linux 4.0 alias etch
- -------------------------------

  Source archives:
      Size/MD5 checksum:      950 7088b49f742f8203cc689f2bcfbf14b9
      Size/MD5 checksum:   194896 c95813e44cd904fccfba04cad5b94fd7
      Size/MD5 checksum:  2161141 e85f82eff84ee073f80a2a52dd32c8a5

  Architecture independent components:
      Size/MD5 checksum:  1010346 7114903cb13bf87cf3c257bad1dd843d
      Size/MD5 checksum:   211926 841316feb1664ae9845586b66fc57100
      Size/MD5 checksum:   103210 44eccc3f4121723db0f563941d61d44e
      Size/MD5 checksum:    85494 95ea49749fd03abddfcc690e59b207e5
      Size/MD5 checksum:    95118 25bd9f81653ac3629a4429e287453987
      Size/MD5 checksum:    81536 11cf175310c1bca1fbf10db56cc04d7d
      Size/MD5 checksum:    75528 38be0176a5ac04c3d537353d53a72a8d
      Size/MD5 checksum:    88566 a17dd782f30bd7bd1cde29060942511a
      Size/MD5 checksum:    88056 72fca3abe3a44808b4882602e45ba7b0
      Size/MD5 checksum:    87966 15c9032c485e020b043033d22333ffc9
      Size/MD5 checksum:    85782 140baa861cead128bc275beb7e34640f
      Size/MD5 checksum:    86590 beb9162cfb4885f4ac25ec4f1a8d3087
      Size/MD5 checksum:   704210 4f25c656b3f0f7a9db7efbb817d4e1ae
      Size/MD5 checksum:    79712 057a23c53b666a93ed7da602deba3f21

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.