-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2480-4                   security@debian.org
http://www.debian.org/security/                          Raphael Geissert
September 15, 2012                     http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : request-tracker3.8
Vulnerability  : regression
Debian-specific: no

The security updates for request-tracker3.8, DSA-2480-1, DSA-2480-2,
and DSA-2480-3, contained minor regressions. Namely:

* The calendar popup page in Internet Explorer would be blocked by the
CSRF protection mechanism.
* Search results pages could not be shared without saving, sharing, and
then loading the search.
* rt-email-dashboards would fail with an error due to a call to an
undefined "interp" method.

Please note that if you run request-tracker3.8 under the Apache web
server, you must stop and start Apache manually.  The "restart"
mechanism is not recommended, especially when using mod_perl.

For the stable distribution (squeeze), this problem has been fixed in
version 3.8.8-7+squeeze5.

We recommend that you upgrade your request-tracker3.8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-2480-4: request-tracker3.8 regression update

September 15, 2012
The security updates for request-tracker3.8, DSA-2480-1, DSA-2480-2, and DSA-2480-3, contained minor regressions

Summary

The security updates for request-tracker3.8, DSA-2480-1, DSA-2480-2,
and DSA-2480-3, contained minor regressions. Namely:

* The calendar popup page in Internet Explorer would be blocked by the
CSRF protection mechanism.
* Search results pages could not be shared without saving, sharing, and
then loading the search.
* rt-email-dashboards would fail with an error due to a call to an
undefined "interp" method.

Please note that if you run request-tracker3.8 under the Apache web
server, you must stop and start Apache manually. The "restart"
mechanism is not recommended, especially when using mod_perl.

For the stable distribution (squeeze), this problem has been fixed in
version 3.8.8-7+squeeze5.

We recommend that you upgrade your request-tracker3.8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Package : request-tracker3.8
Vulnerability : regression
Debian-specific: no

Related News