Package : gforge
Vulnerability : insufficient input sanitising
Problem type : remote
Debian-specific: no
CVE IDs : CVE ids pending
Laurent Almeras and Guillaume Smet have discovered a possible SQL
injection vulnerability and cross-site scripting vulnerabilities in
gforge, a collaborative development tool. Due to insufficient input
sanitising, it was possible to inject arbitrary SQL statements and use
several parameters to conduct cross-site scripting attacks.
For the stable distribution (lenny), these problem have been fixed in
version 4.7~rc2-7lenny1.
The oldstable distribution (etch), these problems have been fixed in
version 4.5.14-22etch11.
For the testing distribution (squeeze), these problems will be fixed
soon.
For the unstable distribution (sid), these problems have been fixed in
version 4.7.3-2.
We recommend that you upgrade your gforge packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch