Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Debian » viewvc security update

viewvc security update

  • Vendor: Debian
  • Vendor ID: DSA 3784-1
  • Date: February 09, 2017


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3784-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
February 09, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : viewvc
CVE ID : CVE-2017-5938
Debian Bug : 854681

Thomas Gerbet discovered that viewvc, a web interface for CVS and
Subversion repositories, did not properly sanitize user input. This
problem resulted in a potential Cross-Site Scripting vulnerability.

For the stable distribution (jessie), this problem has been fixed in
version 1.1.22-1+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.26-1.

We recommend that you upgrade your viewvc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlicdRIACgkQEL6Jg/PV
nWQwEwf9EJ/jcrEHW7ECp589COrLXTjOg72/j3p+6AbgSP2PPrCzXxECh+aYT0AL
IVxQqU0POn1u1srVdGOuNEUryKvuD3Sqel9Xu+/aBHQ/wf+AUcfMz5oqx00PWCpF
+0bN9xZLRrp4JVAR4fhen19g7IHLv79us43q6E/Ak94amHW1v0F8saSEfOjzvaJs
VJsTpDjCLbXtzsfD6NkDexwTFjtZK3SlJ2g3ZP+UnXgsH1m462xhiE7wcmnAmAZ6
yAe/mO+6N0za05DLZ9Opa0V75IWvvAl2/XMBC9+buFzBcrmx812dC1iDevSjshj6
5OCJ5xPlt2oWobJ7j4ZFAHRG9M86kg==
=+kGE
-----END PGP SIGNATURE-----

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »