| Summary: | zabbix - password leakage (CVE-2013-5572) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | Dimitri Jakov <mitya> |
| Status: | RESOLVED INVALID | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | luigiwalser |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572 | ||
| Whiteboard: | |||
| Source RPM: | zabbix | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-10-01 08:12:51 CEST
Does this affect Zabbix 1.x? We only have 2.x in Cauldron. Version:
2 =>
Cauldron
David Walser
2013-10-01 15:24:32 CEST
CC:
(none) =>
luigiwalser The upstream report doesn't list 1.x as affected: https://support.zabbix.com/browse/ZBX-6721 Status:
NEW =>
RESOLVED |