Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120801212023.GQ16112@redhat.com>
Date: Wed, 1 Aug 2012 15:20:23 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: Ganglia Web 3.5.1

Not a lot of details on this one, but could a CVE be assigned to this?

Upstream has released Ganglia Web 3.5.1 [1] which includes a fix for a
security flaw going back to 3.1.7 and possibly earlier versions.  This
flaw can lead to the arbitrary execution of scripts with the privileges
of the web user (apache or nobody), which could possibly lead to other
compromises or data exposure.  This flaw has been fixed in upstream
3.5.1.  No further information is currently available regarding the flaw
or a patch.

[1] http://ganglia.info/?p=549

Other references:

https://bugzilla.redhat.com/show_bug.cgi?id=845124
https://bugs.gentoo.org/show_bug.cgi?id=428776
https://secunia.com/advisories/50047/

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.