| Summary: | viewvc security vulnerability CVE-2017-5938 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Zombie Ryushu <zombie_ryushu> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, lists.jjorge, marja11, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://lwn.net/Vulnerabilities/714124/ | ||
| Whiteboard: | advisory MGA5-64-OK MGA5-32-OK | ||
| Source RPM: | viewvc | CVE: | |
| Status comment: | |||
|
Description
Zombie Ryushu
2017-02-11 06:49:24 CET
Thanks, Zombie Assigning to all packagers collectively, since there is no registered maintainer for this package. Btw, I don't see a freeze push request for 1.1.26, so setting version to Cauldron and "MGA5TOO" CC:
(none) =>
marja11 Done for Cauldron, and for MGA5. Suggested advisory: ======================== Thomas Gerbet discovered that viewvc, a web interface for CVS and Subversion repositories, did not properly sanitize user input. This problem resulted in a potential Cross-Site Scripting vulnerability. this problem has been fixed in version 1.1.26 ======================== Updated packages in core/updates_testing: viewvc-1.1.26-1.mga5.srpm viewvc-1.1.26-1.mga5.noarch.rpm Status:
NEW =>
ASSIGNED
José Jorge
2017-02-11 22:13:09 CET
Assignee:
pkg-bugs =>
qa-bugs
Dave Hodgins
2017-02-11 23:04:22 CET
CC:
(none) =>
davidwhodgins
David Walser
2017-02-12 14:58:38 CET
Version:
Cauldron =>
5
David Walser
2017-02-12 15:46:00 CET
URL:
http://www.linuxsecurity.com/content/view/170725/170/ =>
https://lwn.net/Vulnerabilities/714124/ Just testing by running /usr/share/viewvc/bin/standalone.py and then using a browser to connect to http://localhost/viewvc/ Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0048.html Status:
ASSIGNED =>
RESOLVED |