On Tue, Dec 09, 2008 at 02:21:30PM +0100, Olivier Berger wrote:
> Here's a proposed patch for stable too.
> 
> Regards,
> -------- Message transféré --------
> De: Olivier Berger <olivier.ber...@it-sudparis.eu>
> À: sve...@ozemail.com.au
> Cc: secur...@debian.org
> Sujet: Re: Proposed NMU -> twiki-4.0.5-9.1etch2 - Re: [Fwd:
> [TWiki-Announce] Security Alert -CVE-2008-5305: TWiki SEARCH variable
> allows arbitrary shell command execution]
> Date: Thu, 04 Dec 2008 14:42:25 +0100
> 
> Hi.
> 
> Again, same for etch's version.
> 
> See proposed twiki_4.0.5-9.1etch2.diff.gz and it's corresponding
> interdiff_4.0.5-9.1etch1_4.0.5-9.1etch2
> 
> Note that both NMU proposals were untested. Only the packages seem to
> build fine.

I just wanted to draw the security team's attention to this bug, since
it's an remote arbitrary code execution issue publically known about
(including proof of concept exploit) since 2008-12-05 for which there is
a trivial (four line) fix.

I recommend uploading a fixed package for etch ASAP.

I'm not a regular user of twiki although I have it installed on my
server, and have manually deployed the fix without any complaints from
users.

Cheers,
Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to