A cross-site scripting (XSS) flaw was found in the way jQuery, a fast, small, and feature-rich JavaScript library, performed sanitization of location.hash and <tag> arguments in certain circumstances. A remote attacker could provide a specially-crafted web page to a web-based application using the jQuery library that, when processed would lead to arbitrary HTML or web script execution in the context of logged-in user session. Upstream bug report: [1] http://bugs.jquery.com/ticket/9521 References: [2] http://blog.jquery.com/2011/09/01/jquery-1-6-3-released/ [3] http://www.openwall.com/lists/oss-security/2013/01/31/3
Created drupal7-jquery_update tracking bugs for this issue Affects: fedora-all [bug 896496] Affects: epel-all [bug 896497]
Created python-tw-jquery tracking bugs for this issue Affects: fedora-all [bug 896577] Affects: epel-all [bug 896578]
Created python-tw2-jquery tracking bugs for this issue Affects: fedora-17 [bug 901599] Affects: epel-6 [bug 901600]
All relevant updates have been pushed.