Your message dated Sat, 03 Jan 2009 19:52:31 +0000 with message-id <e1ljcxv-0000bg...@ries.debian.org> and subject line Bug#508026: fixed in phppgadmin 4.0.1-3.1etch1 has caused the Debian Bug report #508026, regarding register_globals on is not supported to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 508026: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508026 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: phppgadmin Version: 4.0.1-3.1 Severity: grave Tags: security Hi, A vulnerability that allows an attacker to perform a local files inclusion attack in phpPgAdmin has been exposed at [1]. Note that the vulnerability can only be exploited when register_globals=on (which is the default in /etc/phppgadmin/apache.conf). If you fix the vulnerability please also make sure to include the CVE id in the changelog entry, when one is assigned. [1]http://www.milw0rm.com/exploits/7363 Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.netsignature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---Source: phppgadmin Source-Version: 4.0.1-3.1etch1 We believe that the bug you reported is fixed in the latest version of phppgadmin, which is due to be installed in the Debian FTP archive: phppgadmin_4.0.1-3.1etch1.diff.gz to pool/main/p/phppgadmin/phppgadmin_4.0.1-3.1etch1.diff.gz phppgadmin_4.0.1-3.1etch1.dsc to pool/main/p/phppgadmin/phppgadmin_4.0.1-3.1etch1.dsc phppgadmin_4.0.1-3.1etch1_all.deb to pool/main/p/phppgadmin/phppgadmin_4.0.1-3.1etch1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 508...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Giuseppe Iuculano <giuse...@iuculano.it> (supplier of updated phppgadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 23 Dec 2008 18:19:59 +0100 Source: phppgadmin Binary: phppgadmin Architecture: source all Version: 4.0.1-3.1etch1 Distribution: stable-security Urgency: high Maintainer: Isaac Clerencia <is...@debian.org> Changed-By: Giuseppe Iuculano <giuse...@iuculano.it> Description: phppgadmin - Set of PHP scripts to administrate PostgreSQL over the WWW Closes: 427151 449103 508026 Changes: phppgadmin (4.0.1-3.1etch1) stable-security; urgency=high . * Non-maintainer upload. * debian/patches/01_CVE-2008-5587.dpatch: Unset language variable before determine file includes (Closes: #508026), and fix local file inclusion vulnerability (CVE-2008-5587) * debian/patches/02_CVE-2007-2865_CVE-2007-5728.dpatch: Backported upstream patch to fix XSS vulnerability (Closes: #427151) (Closes: #449103) (CVE-2007-2865, CVE-2007-5728) Files: e6dea463d597f6dda40d774820e3bb03 890 web extra phppgadmin_4.0.1-3.1etch1.dsc eedac65ce5d73aca2f92388c9766ba1b 703673 web extra phppgadmin_4.0.1.orig.tar.gz 1cbe0f619e65a8c49894e8c0fe015fb5 15678 web extra phppgadmin_4.0.1-3.1etch1.diff.gz 1f5b68f6be269eb3c10646cd8d69c31c 704386 web extra phppgadmin_4.0.1-3.1etch1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iQEVAwUBSVTf4Wz0hbPcukPfAQLxNwf+M87yBiWJ1T6xHGZQyFl7PSLcJo2xapRu pYPWXV/I9VPjz1gglrCP9SsS6sNfruMGNZZ47mtwlLK/ak/SSyxU2tVPoLPcTAu1 oackQkEUtZNKvhJvZBxzvO+qz7GqgpPgvpp/KRbusr6JAcW0RZZ++2gwjghSy5ej ALbzf4mH+Mcaw9iwxn5+Y60y2iPfXaLy0P19fAsruJ+IU+bal+ijgPMyIYIyNXje Jke6g9mZAgDJSesPjiyfzhSxyatO7zM+JlylZbmkC7KJSZhYvu5V8X1MnP6ve5pI 4xyEu7OAm53xrUAVRtMXzC7snUJzgNxTREoVfaRw13iQYiA4gCwyAg== =PXUO -----END PGP SIGNATURE-----
--- End Message ---