Your message dated Sat, 03 Jan 2009 19:52:31 +0000
with message-id <e1ljcxv-0000bg...@ries.debian.org>
and subject line Bug#508026: fixed in phppgadmin 4.0.1-3.1etch1
has caused the Debian Bug report #508026,
regarding register_globals on is not supported
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
508026: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508026
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: phppgadmin
Version: 4.0.1-3.1
Severity: grave
Tags: security

Hi,

A vulnerability that allows an attacker to perform a local files inclusion 
attack in phpPgAdmin has been exposed at [1].

Note that the vulnerability can only be exploited when register_globals=on 
(which is the default in /etc/phppgadmin/apache.conf).

If you fix the vulnerability please also make sure to include the CVE id in 
the changelog entry, when one is assigned.

[1]http://www.milw0rm.com/exploits/7363

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---
--- Begin Message ---
Source: phppgadmin
Source-Version: 4.0.1-3.1etch1

We believe that the bug you reported is fixed in the latest version of
phppgadmin, which is due to be installed in the Debian FTP archive:

phppgadmin_4.0.1-3.1etch1.diff.gz
  to pool/main/p/phppgadmin/phppgadmin_4.0.1-3.1etch1.diff.gz
phppgadmin_4.0.1-3.1etch1.dsc
  to pool/main/p/phppgadmin/phppgadmin_4.0.1-3.1etch1.dsc
phppgadmin_4.0.1-3.1etch1_all.deb
  to pool/main/p/phppgadmin/phppgadmin_4.0.1-3.1etch1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 508...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <giuse...@iuculano.it> (supplier of updated phppgadmin 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 23 Dec 2008 18:19:59 +0100
Source: phppgadmin
Binary: phppgadmin
Architecture: source all
Version: 4.0.1-3.1etch1
Distribution: stable-security
Urgency: high
Maintainer: Isaac Clerencia <is...@debian.org>
Changed-By: Giuseppe Iuculano <giuse...@iuculano.it>
Description: 
 phppgadmin - Set of PHP scripts to administrate PostgreSQL over the WWW
Closes: 427151 449103 508026
Changes: 
 phppgadmin (4.0.1-3.1etch1) stable-security; urgency=high
 .
   * Non-maintainer upload.
   * debian/patches/01_CVE-2008-5587.dpatch: Unset language variable before
     determine file includes (Closes: #508026), and fix local file inclusion
     vulnerability (CVE-2008-5587)
   * debian/patches/02_CVE-2007-2865_CVE-2007-5728.dpatch: Backported upstream
     patch to fix XSS vulnerability (Closes: #427151) (Closes: #449103)
     (CVE-2007-2865, CVE-2007-5728)
Files: 
 e6dea463d597f6dda40d774820e3bb03 890 web extra phppgadmin_4.0.1-3.1etch1.dsc
 eedac65ce5d73aca2f92388c9766ba1b 703673 web extra phppgadmin_4.0.1.orig.tar.gz
 1cbe0f619e65a8c49894e8c0fe015fb5 15678 web extra 
phppgadmin_4.0.1-3.1etch1.diff.gz
 1f5b68f6be269eb3c10646cd8d69c31c 704386 web extra 
phppgadmin_4.0.1-3.1etch1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBSVTf4Wz0hbPcukPfAQLxNwf+M87yBiWJ1T6xHGZQyFl7PSLcJo2xapRu
pYPWXV/I9VPjz1gglrCP9SsS6sNfruMGNZZ47mtwlLK/ak/SSyxU2tVPoLPcTAu1
oackQkEUtZNKvhJvZBxzvO+qz7GqgpPgvpp/KRbusr6JAcW0RZZ++2gwjghSy5ej
ALbzf4mH+Mcaw9iwxn5+Y60y2iPfXaLy0P19fAsruJ+IU+bal+ijgPMyIYIyNXje
Jke6g9mZAgDJSesPjiyfzhSxyatO7zM+JlylZbmkC7KJSZhYvu5V8X1MnP6ve5pI
4xyEu7OAm53xrUAVRtMXzC7snUJzgNxTREoVfaRw13iQYiA4gCwyAg==
=PXUO
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to