[BSA-071] Security Update for request-tracker4
-----BEGIN PGP SIGNED MESSAGE-----
Dominic Hargreaves uploaded new packages for request-tracker4 which fixed
the following security problems:
The vulnerable-passwords scripts introduced for CVE-2011-0009
failed to correct the password hashes of disabled users.
Several cross-site scripting issues have been discovered.
Password hashes could be disclosed by privileged users.
Several cross-site request forgery vulnerabilities have been
found. If this update breaks your setup, you can restore the old
behaviour by setting $RestrictReferrer to 0.
The code to support variable envelope return paths allowed the
execution of arbitrary code.
Disabled groups were not fully accounted as disabled.
SQL injection vulnerability, only exploitable by privileged users.
For the squeeze-backports distribution the problems have been fixed in
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
-----END PGP SIGNATURE-----