Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 03 Dec 2015 23:26:32 +0100
From: Matthias Geerdsen <matthias@...lons.info>
To: oss-security@...ts.openwall.com
Subject: CVE request - Redmine: open redirect vulnerability (fixed earlier
 this year)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi,

please assign a CVE ID for an open redirect vulnerability fixed
in the Redmine releases 2.6.7, 3.0.5 and 3.1.1 [1,2]. Commit can be
found at [3], the ticket is still private [4].

Cheers
Matthias

[1] <http://www.redmine.org/news/101>
[2] <http://www.redmine.org/projects/redmine/wiki/Security_Advisories>
[3]
<https://github.com/redmine/redmine/commit/032f2c9be6520d9d1a1608aa4f1d5d1f184f2472>
[4] <https://www.redmine.org/issues/19577>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJWYMGUAAoJEDVYuxv9Aw7qNSsH/2Iwpxy3Rwj1m63zIWdvUOMv
VpQ1DUF3jGW6g378R5XhDzfiJ3E6vi0BLfzZ026JItaxcHG7OzbNGPobuxDIfjmH
c68/W2lZ7pMfBkIDyg4qCzNJFm4bjdzQdMWY2syVwP4hZoWrZIHbwWonbcMGXeXc
u9oGi6cpm0FOpVCOu6bzcYRRhIwcm3M7NtKPmdKS3Cwr00rlh0Iae4Ie+pP6H8nE
0fHoB6xa2xwQZ8+cDvgtGqwQvZQlHLB9r0lFSKC/OWjdO3eZPToYBhNwp57FECuF
Bo+CDK1XJH11lLxzNc8hXtaLeF3pYh/DZRFJFrLLO7OLOTIvHZ95jObmbSsJoDU=
=wuHV
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.