Debian Security Advisory
DSA-1477-1 yarssr -- missing input sanitising
- Date Reported:
- 27 Jan 2008
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-5837.
- More information:
Duncan Gilmore discovered that yarssr, an RSS aggregator and reader, performs insufficient input sanitising, which could result in the execution of arbitrary shell commands if a malformed feed is read.
Due to a technical limitation of the archive management scripts, the fix for the old stable distribution (sarge) needs to be postponed by a few days.
For the stable distribution (etch), this problem has been fixed in version 0.2.2-1etch1.
We recommend that you upgrade your yarssr packages.
- Fixed in:
Debian GNU/Linux 4.0 (stable)
- Architecture-independent component:
MD5 checksums of the listed files are available in the original advisory.