Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri,  4 Dec 2015 23:40:01 -0500 (EST)
From: cve-assign@...re.org
To: matthias@...lons.info
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request - Redmine: open redirect vulnerability (fixed earlier this year)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> http://www.redmine.org/news/101
> http://www.redmine.org/projects/redmine/wiki/Security_Advisories
> https://github.com/redmine/redmine/commit/032f2c9be6520d9d1a1608aa4f1d5d1f184f2472
> https://www.redmine.org/issues/19577

Use CVE-2015-8474.

This is not the same as CVE-2014-1985, which was fixed in 2014.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=h03D
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ