Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 08 Feb 2013 11:22:48 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>
Subject: Re: CVE request: XSS flaws fixed in ganglia

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/08/2013 11:06 AM, Vincent Danen wrote:
> A number of XSS issues were fixed in ganglia's web ui:
> 
> https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
>
>  https://bugzilla.redhat.com/show_bug.cgi?id=892823
> 
> I think one CVE would cover all of these since they were fixed at
> the same time, in the same commit.
> 
> Thanks.
> 

Please use CVE-2013-0275 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=kBKp
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ