|
Message-Id: <20150302040932.C48DE6C002F@smtpvmsrv1.mitre.org> Date: Sun, 1 Mar 2015 23:09:32 -0500 (EST) From: cve-assign@...re.org To: sebastian@...ping.org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: DokuWiki privilege escalation in RPC API -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Security Hotfix 2014-09-29c: fixes privilege escalation in RPC API > > https://www.dokuwiki.org/changes > https://github.com/splitbrain/dokuwiki/issues/1056 > https://github.com/splitbrain/dokuwiki/commit/4970ad24ce49ec76a0ee67bca7594f918ced2f5f Use CVE-2015-2172. > DokuWiki maintenance release 2014-09-29c (of 2015-02-25) We agree that 2014-09-29c does not mean that the release had been announced during 2014. For example, see: http://web.archive.org/web/20150121213236/http://www.dokuwiki.org/changes - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJU8+IVAAoJEKllVAevmvmsFM8IAJbf12dtIQbfeDg42RD/KRJu WfOsO36OBI226TJP10XNX4xXOfz1mzK/0XH1VvlzOZp5Bwd+x4QEEKC5q0Fq0TJI +XmD4PrKHRBiLYVErsEf4jxxXUrQv044bFXPtg/2U0G3wEqCYy/s7maVf+1xRF+t hgtI4KdVl02RHku6V2+cK7Lr/qgfnXO5mFbizyDNAWag3EVDycOs1wFer0yBrUhu MZlsW5W6DrhfcRuxg4XEy7blTvG/7a7SpHTgIAo+6u3lER1xxgUEepllJpltm0mi U1GyIE5v2cZvKdVwVXEssVzOBVlF52BNjY/Ooz+SaE7AGoLfXqnySxB+P4hktdw= =ihN0 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.