Debian Security Advisory
DSA-1477-1 yarssr -- missing input sanitising
- Date Reported:
- 27 Jan 2008
- Affected Packages:
- yarssr
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-5837.
- More information:
-
Duncan Gilmore discovered that yarssr, an RSS aggregator and reader, performs insufficient input sanitising, which could result in the execution of arbitrary shell commands if a malformed feed is read.
Due to a technical limitation of the archive management scripts, the fix for the old stable distribution (sarge) needs to be postponed by a few days.
For the stable distribution (etch), this problem has been fixed in version 0.2.2-1etch1.
We recommend that you upgrade your yarssr packages.
- Fixed in:
-
Debian GNU/Linux 4.0 (stable)
- Source:
- http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2-1etch1.diff.gz
- http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2.orig.tar.gz
- http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2-1etch1.dsc
- http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/y/yarssr/yarssr_0.2.2-1etch1_all.deb
MD5 checksums of the listed files are available in the original advisory.