Wir haben Ihre Supportanfrage erhalten und aufgenommen. Ihrer Anfrage wurde die Ticketnummer #18206 zugewiesen. Bitte geben Sie diese bei allen weiteren Kontakten immer mit an.
Um weitere Informationen zu diesem Ticket zu senden, schicken Sie bitte eine Mail mit dem Subject "[rt.scanplus.de #18206]" oder antworten Sie einfach auf diese Mail mit dem "Antworten"-Button Ihres Mailprogramms, damit diese Informationen automatisch Ihrer Anfrage zugeordnet werden koennen. Mit freundlichen Gruessen, Ihr Scan-Plus Support Team ------------------------------------------------------------------------- Ihre Anfrage: [SECURITY] [DSA 1725-1] New websvn packages fix information leak Ticket-Nummer: 18206 Status: new Inhalt: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1725-1 [email protected] http://www.debian.org/security/ Thijs Kinkhorst February 15, 2009 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : websvn Vulnerability : programming error Problem type : remote Debian-specific: no CVE Id(s) : CVE-2009-0240 Debian Bug : 512191 Bas van Schaik discovered that WebSVN, a tool to view Subversion repositories over the web, did not properly restrict access to private repositories, allowing a remote attacker to read significant parts of their content. The old stable distribution (etch) is not affected by this problem. For the stable distribution (lenny), this problem has been fixed in version 2.0-4+lenny1. For the unstable distribution (sid), this problem has also been fixed in version 2.0-4+lenny1. We recommend that you upgrade your websvn package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1.diff.gz Size/MD5 checksum: 21217 fec9c4c9173ac5da1e6866b6afdb37ff http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1.dsc Size/MD5 checksum: 1291 3b2910de66eb35b3650558c2a6b70d74 http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0.orig.tar.gz Size/MD5 checksum: 172005 047e02c0fa2948fdf98a3e348e3f1530 Architecture independent packages: http://security.debian.org/pool/updates/main/w/websvn/websvn_2.0-4+lenny1_all.deb Size/MD5 checksum: 194618 f03bd2f1bf00ee0666368a85faf1a9ef These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: [email protected] Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJJmDH0AAoJECIIoQCMVaAciZAH/332bnuIAmGcSQAMzkQJGYZJ echCkVJq4OZeTqWAPLPd7TskYAdP1LlV/nDkEZmivrfkEEa8Vfv9RM5gphYclMZb 6ZU4Wn56hpNfKy725qnuEd+E95uOXwLpX0VBLUwVk0BA64hEVN/c7IQ9DV59y/Rs TJT3elMf8CgZ44IQhCpiUyD9STI1ZLEhfGjPKRnqpK+uBu+LIHKpnIkuXDhLkmIM +gbV0vAXP564tHvYCAAreg6CBxl7iJPq59HyOh0fq2Nwh/jsz7gvP9YPy3kdfpib tguX9Kd3uH84+YufykAGW39DxX5nXITzSNont3pSk4zJyuqH+oJF4naL0YiHs6w= =GO2G -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] ------------------------------------------------------------------------- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

