TITLE: Debian update for gallery SECUNIA ADVISORY ID: SA17367 VERIFY ADVISORY: http://secunia.com/advisories/17367/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for gallery. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. For more information: SA16389 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gallery/gallery_1.5-1sarge1.dsc Size/MD5 checksum: 589 66094a4fb1cc5429e8fc7815aa0f2c32 http://security.debian.org/pool/updates/main/g/gallery/gallery_1.5-1sarge1.diff.gz Size/MD5 checksum: 15051 2239879af55f3de1abb91c036bf9a7a3 http://security.debian.org/pool/updates/main/g/gallery/gallery_1.5.orig.tar.gz Size/MD5 checksum: 6654533 7d610b59e7bf9edbbfa0abb38e041754 Architecture independent components: http://security.debian.org/pool/updates/main/g/gallery/gallery_1.5-1sarge1_all.deb Size/MD5 checksum: 6570176 d68b5e9c23c40acb4457882ee2b8a1a8 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.5-2. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-879 OTHER REFERENCES: SA16389: http://secunia.com/advisories/16389/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------