* [gentoo-announce] GLSA: gallery (200309-06)
@ 2003-09-02 13:36 Daniel Ahlberg
0 siblings, 0 replies; only message in thread
From: Daniel Ahlberg @ 2003-09-02 13:36 UTC (permalink / raw
To: gentoo-announce
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain, Size: 1349 bytes --]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-06
- - - ---------------------------------------------------------------------
PACKAGE : gallery
SUMMARY : cross site scripting
DATE : 2003-09-02 13:36 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <gallery-1.3.4_p1
FIXED VERSION : >=gallery-1.3.4_p1
CVE : CAN-2003-0614
- - - ---------------------------------------------------------------------
quote from cve:
"Cross-site scripting (XSS) vulnerability in search.php of Gallery 1.1
through 1.3.4 allows remote attackers to insert arbitrary web script via
the searchstring parameter."
SOLUTION
It is recommended that all Gentoo Linux users who are running
app-misc/gallery upgrade to gallery-1.3.4_p1 as follows:
emerge sync
emerge gallery
emerge clean
- - - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/VJzwfT7nyhUpoZMRAgr+AKDEyMBZEx7Pwk+WclB0+exQM/MUNQCgozCt
oOd3lnNslrrVVia/u4YJMzo=
=jaBo
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2003-09-02 13:30 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-09-02 13:36 [gentoo-announce] GLSA: gallery (200309-06) Daniel Ahlberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox