exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28125

Secunia Security Advisory 28125
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ganglia. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | d28d5ce5c0b33a45481afb7cb55101252d6626d55d8de22b9d3d7a33aceb916c

Secunia Security Advisory 28125

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Fedora update for ganglia

SECUNIA ADVISORY ID:
SA28125

VERIFY ADVISORY:
http://secunia.com/advisories/28125/

CRITICAL:
Less critical

IMPACT:
Cross Site Scripting

WHERE:
>From remote

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/
Fedora 8
http://secunia.com/product/16769/

DESCRIPTION:
Fedora has issued an update for ganglia. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks.

For more information:
SA28116

SOLUTION:
Apply updated packages.

-- Fedora 7 --

63ec9822a272cabb8218dc67e0a681dd28b2c8e6
ganglia-debuginfo-3.0.6-1.fc7.ppc64.rpm
b087bc46c685165bb9e67b32723fe889587250de
ganglia-devel-3.0.6-1.fc7.ppc64.rpm
ee454e94d793276ee7fafabf7ade77518b7c377a
ganglia-gmond-3.0.6-1.fc7.ppc64.rpm
a413012e193f7071dbcd3fcd20e9b52a01b4c361
ganglia-gmetad-3.0.6-1.fc7.ppc64.rpm
7114c3de566e029b21e9003421359adb0db6a75f
ganglia-web-3.0.6-1.fc7.ppc64.rpm
3a5a43ad5fc6f67a499ed0641acad4253b64678f
ganglia-3.0.6-1.fc7.ppc64.rpm
16250903d0b3878721dbe5e0539d0046560d0d94
ganglia-debuginfo-3.0.6-1.fc7.i386.rpm
c456df72e71f8f463946e5029a4028964ad17433
ganglia-devel-3.0.6-1.fc7.i386.rpm
a0a8b7bc407aab30f15c5876d949c2b09f450d48
ganglia-gmond-3.0.6-1.fc7.i386.rpm
caf3bf9280cf328a973ad58c37ae39687bd8141d
ganglia-gmetad-3.0.6-1.fc7.i386.rpm
c2f111ac72ca65f4c4b1c605170c3970967bdb3d
ganglia-web-3.0.6-1.fc7.i386.rpm
ef2050788735d1619ea768d3fe1777f48f3e15a5
ganglia-3.0.6-1.fc7.i386.rpm
a88af8a0ec20cf65599bc998ee488531b005fac7
ganglia-3.0.6-1.fc7.x86_64.rpm
7ba3c1fabcb06ef67e923e46b54152e7743089ea
ganglia-devel-3.0.6-1.fc7.x86_64.rpm
123a0d17a9caf7c4a7cf151dce664e9a8cc32e0a
ganglia-gmetad-3.0.6-1.fc7.x86_64.rpm
5aa2044856633a12442dfc12c80f41d1eab3a69f
ganglia-web-3.0.6-1.fc7.x86_64.rpm
05f9774ab1cb177e32725ec2e0037baa210ad67f
ganglia-gmond-3.0.6-1.fc7.x86_64.rpm
8d95798d7c5f834a22eaf87301f23ac70a37c960
ganglia-debuginfo-3.0.6-1.fc7.x86_64.rpm
f27805460bfa88485aa69b0d95781e96bfdf1f86
ganglia-debuginfo-3.0.6-1.fc7.ppc.rpm
6ff886c5746f49170fff936037b13a9cfeddb22a
ganglia-devel-3.0.6-1.fc7.ppc.rpm
7211470d2e1b6bac7f9066bd41b02ee3c1714cfc
ganglia-gmond-3.0.6-1.fc7.ppc.rpm
082dfc65528c6361e657112e2744254ca2ca5f82
ganglia-gmetad-3.0.6-1.fc7.ppc.rpm
ac6102aaf686069322416e0b011d412ffbe8b195
ganglia-web-3.0.6-1.fc7.ppc.rpm
96da889ef7ab7e4fa3419d6fbb6f31f8ae0cff79 ganglia-3.0.6-1.fc7.ppc.rpm
52b2a899cbe636b3b38deff1d55c3cc95a08e82a ganglia-3.0.6-1.fc7.src.rpm

-- Fedora 8 --

23038ad0bb18fa123fc3c9ad830f68b3921098ca
ganglia-debuginfo-3.0.6-1.fc8.ppc64.rpm
e0a947dde31e2b63dfb641804fe84acd46bd24ce
ganglia-devel-3.0.6-1.fc8.ppc64.rpm
dbfde1328b624bec3d832a90c3f60e1d3849082a
ganglia-gmond-3.0.6-1.fc8.ppc64.rpm
90eabcf18a5ade95cfe8a58c9bdc2800d04336f2
ganglia-gmetad-3.0.6-1.fc8.ppc64.rpm
56d7a36b24ffbb8d05c99384fb982f19404e38e0
ganglia-web-3.0.6-1.fc8.ppc64.rpm
8e01720986ea2073b92190151a582bbddce68976
ganglia-3.0.6-1.fc8.ppc64.rpm
8e9419345b5db36ad9244b295641cdf5043bc705
ganglia-gmond-3.0.6-1.fc8.i386.rpm
443768a266dacc83dd2872e2824a229fe8a09853
ganglia-gmetad-3.0.6-1.fc8.i386.rpm
f3b555411a5a1373efee43380e83b89b70ebb553
ganglia-3.0.6-1.fc8.i386.rpm
e86cd2beeed9a029d47099ad6c69107713e58462
ganglia-web-3.0.6-1.fc8.i386.rpm
8d06927992de78cf0cd38312ae9de617b6216f5e
ganglia-debuginfo-3.0.6-1.fc8.i386.rpm
39b2f8a75a6176571883ceb6c0e73cddded34f94
ganglia-devel-3.0.6-1.fc8.i386.rpm
2e4dbfd6e38d144c432e520a38e30895848dd268
ganglia-web-3.0.6-1.fc8.x86_64.rpm
4d7f39b82be86ba4d5558f4d7c01c21e40e79dec
ganglia-devel-3.0.6-1.fc8.x86_64.rpm
02512a207a5e0e6b7cc7d5af2ef1232a3ea22496
ganglia-3.0.6-1.fc8.x86_64.rpm
e99ef884d99d32ce0411104d676cd638b4138da2
ganglia-gmond-3.0.6-1.fc8.x86_64.rpm
b3edbb369886ec7929d0b619bef555f4df451cbb
ganglia-gmetad-3.0.6-1.fc8.x86_64.rpm
95de56bf4fd8834ff4812c83a96d41cf60bc17db
ganglia-debuginfo-3.0.6-1.fc8.x86_64.rpm
bcbf861fb000ddc36b36a68a2d244d0322674351
ganglia-debuginfo-3.0.6-1.fc8.ppc.rpm
9f6affcbfd6e000dd52366e6e1aac17354244014
ganglia-devel-3.0.6-1.fc8.ppc.rpm
b6a6f9de00615e01bc7c4647e013f96cae22c676
ganglia-gmond-3.0.6-1.fc8.ppc.rpm
5733f91ed4cbbf00050cf5ccd4eed3c59b721728
ganglia-gmetad-3.0.6-1.fc8.ppc.rpm
ddc8b2b0d797d88796aeb5748f814149c5d28302
ganglia-web-3.0.6-1.fc8.ppc.rpm
365937ff0b581783f4f60101ea4f6c0e87a3176e ganglia-3.0.6-1.fc8.ppc.rpm
c53785ff9fa56f1b2bb80edd3a07e6ef22e45f1f ganglia-3.0.6-1.fc8.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00634.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00632.html

OTHER REFERENCES:
SA28116:
http://secunia.com/advisories/28116/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close