Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=b06734a4786311bf74c34b5c9dca15f345e28d30
commit b06734a4786311bf74c34b5c9dca15f345e28d30 Author: Miklos Vajna <vmik...@frugalware.org> Date: Sun May 3 13:17:35 2009 +0200 FSA595-drupal6 diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 05ebea9..a954a8c 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,18 +26,15 @@ <fsas> <fsa> - <id>594</id> + <id>595</id> <date>2009-05-03</date> <author>Miklos Vajna</author> - <package>drupal</package> - <vulnerable>5.16-1</vulnerable> - <unaffected>5.17-1anacreon1</unaffected> - <bts>http://bugs.frugalware.org/task/3759</bts> + <package>drupal6</package> + <vulnerable>6.10-1</vulnerable> + <unaffected>6.11-1anacreon1</unaffected> + <bts>http://bugs.frugalware.org/task/3760</bts> <cve>No CVE, see http://drupal.org/node/449078.</cve> - <desc>Some vulnerabilities have been reported in Drupal, which can be exploited by malicious people to conduct script insertion attacks or to disclose potentially sensitive information. - 1) User provided input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is viewed and interpreted as UTF-7. - Successful exploitation requires the ability to post content. - 2) An unspecified error can be exploited to disclose information about form submissions when a user is tricked into submitting a form after following a specially crafted link to the site. This can further be exploited to conduct e.g. cross-site request forgery attacks.</desc> + <desc>See FSA594.</desc> </fsa> <fsa> <id>593</id> _______________________________________________ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git