|
Message-ID: <20120801212023.GQ16112@redhat.com> Date: Wed, 1 Aug 2012 15:20:23 -0600 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request: Ganglia Web 3.5.1 Not a lot of details on this one, but could a CVE be assigned to this? Upstream has released Ganglia Web 3.5.1 [1] which includes a fix for a security flaw going back to 3.1.7 and possibly earlier versions. This flaw can lead to the arbitrary execution of scripts with the privileges of the web user (apache or nobody), which could possibly lead to other compromises or data exposure. This flaw has been fixed in upstream 3.5.1. No further information is currently available regarding the flaw or a patch. [1] http://ganglia.info/?p=549 Other references: https://bugzilla.redhat.com/show_bug.cgi?id=845124 https://bugs.gentoo.org/show_bug.cgi?id=428776 https://secunia.com/advisories/50047/ -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.