X-Git-Url: http://git.tremily.us/?a=blobdiff_plain;f=doc%2Fsecurity.mdwn;h=b573b5f2348a3bea028706f1af7d5433b3b0f9a7;hb=64031e30a735969d2cfb6ad93aad87065c0e78d0;hp=35385465607929108d488eff73fa395e71d82467;hpb=0204dabccfafd89b1e98a33fc5165e8f0e4e0927;p=ikiwiki.git diff --git a/doc/security.mdwn b/doc/security.mdwn index 353854656..b573b5f23 100644 --- a/doc/security.mdwn +++ b/doc/security.mdwn @@ -471,6 +471,20 @@ who could upload a malicious stylesheet to a site to add it to a page as an alternate stylesheet, or replacing the default stylesheet. This hole was discovered on 28 Mar 2011 and fixed the same hour with -the release of ikiwiki 3.20110328. An upgrade is recommended for sites -that have untrusted committers, or have the attachments plugin enabled. +the release of ikiwiki 3.20110328. A fix was backported to Debian squeeze, +as version 3.20100815.6. An upgrade is recommended for sites that have +untrusted committers, or have the attachments plugin enabled. ([[!cve CVE-2011-1401]]) + +## tty hijacking via ikiwiki-mass-rebuild + +Ludwig Nussel discovered a way for users to hijack root's tty when +ikiwiki-mass-rebuild was run. Additionally, there was some potential +for information disclosure via symlinks. ([[!cve CVE-2011-1408]]) + +This hole was disconvered on 8 June 2011 and fixed the same day with +the release of ikiwiki 3.20110608. Note that the fix is dependant on +a version of su that has a similar hole fixed; [[!debbug 628843]] +tracks fixing the hole in Debian's su. An upgrade is a must for any +sites that have `ikiwiki-update-wikilist` installed suid (not the default), +and whose admins run `ikiwiki-mass-rebuild`.