|
Message-Id: <1238421169.3260.38.camel@lifebook> Date: Mon, 30 Mar 2009 15:52:48 +0200 From: Anthony <tony@...post24.com> To: oss-security@...ts.openwall.com Subject: [Fwd: Cross-Site Scripting in Banshee DAAP Extension] I've notified Redhat and the Novell/SuSE security teams about a vulnerability in Banshee's DAAP extension. I have requested a CVE name for this. I will update this list when I have received the actual CVE name. Subject: Cross-Site Scripting in Banshee DAAP Extension From: Anthony <tony@...post24.com> Reply-To: tony@...post24.com To: cve@...re.org Content-Type: text/plain Organization: Outpost24 AB Message-Id: <1238405900.3260.32.camel@...ebook> Mime-Version: 1.0 X-Mailer: Evolution 2.24.5 (2.24.5-1.fc10) Date: Mon, 30 Mar 2009 11:38:21 +0200 Content-Transfer-Encoding: 7bit I would like to reserve a CVE name for a cross-site scripting vulnerability in the DAAP extension of Banshee. A description of the vulnerability can be found in the GNOME bugzilla (http://bugzilla.gnome.org/show_bug.cgi?id=577270). I have notified the RedHat and SuSE/Novell security teams. I consider the bugzilla a notification to the upstream vendor (which also happens to be Novell anyway). Upstream vendor is aware that I'm requesting this CVE name. I'm still waiting for RHSA and SUSE-SA numbers. I'll follow up when I have them. Thank you in advance, - Tony
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.