Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Aug 2014 20:02:13 +0200
From: Nico Golde <>
Subject: Re: CVE id request: cacti remote code execution and SQL injection

* Murray McAllister <> [2014-08-14 09:48]:
> On 08/13/2014 07:07 AM, Nico Golde wrote:
> >Hi,
> >Mischa Sallé and Wilco Baan Hofman reported a security issue in cacti to
> >Debian when processing arguments passed to the graph settings script:
> >
> >
> >We consider this issue to be public given the public fix.
> >Can someone assign a CVE id? We do have some indication that this was reported
> >in parallel Fedora, in case anyone from RedHat already assigned a CVE id to
> >this.
> Red Hat did not assign a CVE for this (the original report was 

Can someone from Mitre assign a CVE id in this case?

Nico Golde - XMPP: - GPG: 0xA0A0AAAA

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ