-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0389
                          viewvc security update
                             10 February 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           viewvc
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-5938  

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3784

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running viewvc check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3784-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
February 09, 2017                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : viewvc
CVE ID         : CVE-2017-5938
Debian Bug     : 854681

Thomas Gerbet discovered that viewvc, a web interface for CVS and
Subversion repositories, did not properly sanitize user input. This
problem resulted in a potential Cross-Site Scripting vulnerability.

For the stable distribution (jessie), this problem has been fixed in
version 1.1.22-1+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.26-1.

We recommend that you upgrade your viewvc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlicdRIACgkQEL6Jg/PV
nWQwEwf9EJ/jcrEHW7ECp589COrLXTjOg72/j3p+6AbgSP2PPrCzXxECh+aYT0AL
IVxQqU0POn1u1srVdGOuNEUryKvuD3Sqel9Xu+/aBHQ/wf+AUcfMz5oqx00PWCpF
+0bN9xZLRrp4JVAR4fhen19g7IHLv79us43q6E/Ak94amHW1v0F8saSEfOjzvaJs
VJsTpDjCLbXtzsfD6NkDexwTFjtZK3SlJ2g3ZP+UnXgsH1m462xhiE7wcmnAmAZ6
yAe/mO+6N0za05DLZ9Opa0V75IWvvAl2/XMBC9+buFzBcrmx812dC1iDevSjshj6
5OCJ5xPlt2oWobJ7j4ZFAHRG9M86kg==
=+kGE
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9XW2
-----END PGP SIGNATURE-----