Gentoo Logo

Roundup: Filesystem access vulnerability

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200408-09 / Roundup
Release Date August 11, 2004
Latest Revision May 22, 2006: 03
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-apps/roundup <= 0.6.4 >= 0.7.6 All supported architectures

Related bugreports: #53494

Synopsis

Roundup will make files owned by the user that it's running as accessable to a remote attacker.

2.  Impact Information

Background

Roundup is a simple to use issue-tracking system with command-line, web, and e-mail interfaces.

Description

Improper handling of a specially crafted URL allows access to the server's filesystem, which could contain sensitive information.

Impact

An attacker could view files owned by the user running Roundup. This will never be root however, as Roundup will not run as root.

3.  Resolution Information

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of Roundup.

Resolution

All Roundup users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=www-apps/roundup-0.7.6"
# emerge ">=www-apps/roundup-0.7.6"

4.  References



Print

Page updated August 11, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.