* debian/control
- updated maintainer field
* SECURITY UPDATE: (LP: #191205)
+ wml_backend/p1_ipp/ipp.src (CVE-2008-0665)
- in Website META Language (WML) 2.0.11 allows local
users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp
temporary file.
+ wlm_backend/p3_eperl/eperl_sys.c wml_contrib/wmg.cgi (CVE-2008-0666)
- Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary
files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by
wml_contrib/wmg.cgi and (2) temporary files used by
wml_backend/p3_eperl/eperl_sys.c.
* References
+ http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0665
+ http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0666
+ http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907
This bug was fixed in the package wml - 2.0.11-1ubuntu0.1
---------------
wml (2.0.11-1ubuntu0.1) feisty-security; urgency=low
* debian/control p1_ipp/ ipp.src (CVE-2008-0665) p3_eperl/ eperl_sys. c wml_contrib/wmg.cgi (CVE-2008-0666) contrib/ wmg.cgi and (2) temporary files used by backend/ p3_eperl/ eperl_sys. c. www.cve. mitre.org/ cgi-bin/ cvename. cgi?name= 2008-0665 www.cve. mitre.org/ cgi-bin/ cvename. cgi?name= 2008-0666 bugs.debian. org/cgi- bin/bugreport. cgi?bug= 463907
- updated maintainer field
* SECURITY UPDATE: (LP: #191205)
+ wml_backend/
- in Website META Language (WML) 2.0.11 allows local
users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp
temporary file.
+ wlm_backend/
- Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary
files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by
wml_
wml_
* References
+ http://
+ http://
+ http://
-- Emanuele Gentili <email address hidden> Mon, 10 Mar 2008 17:28:13 +0100