DSA 2480-1: request-tracker3.8 security update
Posted on: 05/25/2012 11:11 AM

A request-tracker3.8 security update has been released for Debian GNU/Linux

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2480-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 24, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : request-tracker3.8
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-2082 CVE-2011-2083 CVE-2011-2084 CVE-2011-2085
CVE-2011-4458 CVE-2011-4459 CVE-2011-4460

Several vulnerabilities were discovered in Request Tracker, an issue
tracking system:


The vulnerable-passwords scripts introduced for CVE-2011-0009
failed to correct the password hashes of disabled users.


Several cross-site scripting issues have been discovered.


Password hashes could be disclosed by privileged users.


Several cross-site request forgery vulnerabilities have been
found. If this update breaks your setup, you can restore the old
behaviour by setting $RestrictReferrer to 0.


The code to support variable envelope return paths allowed the
execution of arbitrary code.


Disabled groups were not fully accounted as disabled.


SQL injection vulnerability, only exploitable by privileged users.

For the stable distribution (squeeze), this problem has been fixed in
version 3.8.8-7+squeeze2.

For the unstable distribution (sid), this problem has been fixed in
version 4.0.5-3.

We recommend that you upgrade your request-tracker3.8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/dsa_2480_1_request_tracker3_8_security_update.html)