Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Aug 2014 20:02:13 +0200
From: Nico Golde <oss-security+ml@...lde.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: cacti remote code execution and SQL injection

Hi,
* Murray McAllister <mmcallis@...hat.com> [2014-08-14 09:48]:
> On 08/13/2014 07:07 AM, Nico Golde wrote:
> >Hi,
> >Mischa Sallé and Wilco Baan Hofman reported a security issue in cacti to
> >Debian when processing arguments passed to the graph settings script:
> >http://svn.cacti.net/viewvc?view=rev&revision=7454
> >
> >We consider this issue to be public given the public fix.
> >Can someone assign a CVE id? We do have some indication that this was reported
> >in parallel Fedora, in case anyone from RedHat already assigned a CVE id to
> >this.
> 
> Red Hat did not assign a CVE for this (the original report was 
> https://bugzilla.redhat.com/show_bug.cgi?id=1127165).

Can someone from Mitre assign a CVE id in this case?

Thanks!
Nico
-- 
Nico Golde - XMPP: nion@...ber.ccc.de - GPG: 0xA0A0AAAA

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ