X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/5fbfab9bae300c0ec1747750996ce3b7ade737e2..81aa58e7ca0118fbb6e1b7f53e47f01d260cdbff:/doc/security.mdwn diff --git a/doc/security.mdwn b/doc/security.mdwn index d72382672..afefd1bc3 100644 --- a/doc/security.mdwn +++ b/doc/security.mdwn @@ -110,7 +110,7 @@ runs ikiwiki to update a given wiki. The wrapper can in turn be made suid, for example to be used in a [[post-commit]] hook by people who cannot write to the html pages, etc. -If the wrapper script is made suid, then any bugs in this wrapper would be +If the wrapper program is made suid, then any bugs in this wrapper would be security holes. The wrapper is written as securely as I know how, is based on code that has a history of security use long before ikiwiki, and there's been no problem yet. @@ -484,10 +484,10 @@ for information disclosure via symlinks. ([[!cve CVE-2011-1408]]) This hole was discovered on 8 June 2011 and fixed the same day with the release of ikiwiki 3.20110608. Note that the fix is dependant on -a version of su that has a similar hole fixed; [[!debbug 628843]] -tracks fixing the hole in Debian's su. An upgrade is a must for any -sites that have `ikiwiki-update-wikilist` installed suid (not the default), -and whose admins run `ikiwiki-mass-rebuild`. +a version of su that has a similar hole fixed. Version 4.1.5 of the shadow +package contains the fixed su; [[!debbug 628843]] tracks fixing the hole in +Debian. An upgrade is a must for any sites that have `ikiwiki-update-wikilist` +installed suid (not the default), and whose admins run `ikiwiki-mass-rebuild`. ## javascript insertion via meta tags