108624 2003-07-31 17:57 /82 rader/ Matt Zimmerman <mdz@debian.org> Importerad: 2003-07-31 17:57 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Externa svar till: listadmin@securityfocus.com Mottagare: Bugtraq (import) <5814> Ärende: [SECURITY] [DSA-355-1] New gallery packages fix cross-site scripting ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 355-1 security@debian.org http://www.debian.org/security/ Matt Zimmerman July 30th, 2003 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : gallery Vulnerability : cross-site scripting Problem-Type : remote Debian-specific: no CVE Ids : CAN-2003-0614 Larry Nguyen discovered a cross site scripting vulnerability in gallery, a web-based photo album written in php. This security flaw can allow a malicious user to craft a URL that executes Javascript code on your website. For the current stable distribution (woody) this problem has been fixed in version 1.25-8woody1. For the unstable distribution (sid) this problem has been fixed in version 1.3.4-3. We recommend that you update your gallery package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody1.dsc Size/MD5 checksum: 573 99fd36bbfc4accdb0e492af056d47805 http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody1.diff.gz Size/MD5 checksum: 7333 0e28ce3c9aafc9c4fb33f857614a7721 http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5.orig.tar.gz Size/MD5 checksum: 132099 1a32e57b36ca06d22475938e1e1b19f9 Architecture independent components: http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody1_all.deb Size/MD5 checksum: 132574 d9120f1f49aed1e314410f40aa9573f1 These files will probably be moved into the stable distribution on its next revision. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/KFN7ArxCt0PiXR4RAisfAJ4xIx5EnEjPeJxaY/IF//rYge8ZYQCeLK9s y2L2odV/uXxq85bD7xmnAJw= =icsM -----END PGP SIGNATURE----- (108624) /Matt Zimmerman <mdz@debian.org>/(Ombruten)