|
Message-Id: <20141114214750.858F76DC01A@smtpvmsrv1.mitre.org> Date: Fri, 14 Nov 2014 16:47:50 -0500 (EST) From: cve-assign@...re.org To: vdanen@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: old CVE assignments for JQuery 1.10.0 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 We're not sure why you listed Ticket #6016 twice, but here are the CVE IDs for these http://jqueryui.com/changelog/1.10.0/ XSS issues: > Title, reported by shadowman131 > http://bugs.jqueryui.com/ticket/6016 > https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3 Use CVE-2010-5312. > combobox demo, reported by DJtomy > http://bugs.jqueryui.com/ticket/8859 > https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e > default content - 8859 follow-on work by scott.gonzalez > http://bugs.jqueryui.com/ticket/8861 > https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde As far as we can tell, 5fee6fd5000072ff32f2d65b6451f39af9e0e39e doesn't fix anything in the jQuery library, and it is reverted in f2854408cce7e4b7fc6bf8676761904af9c96bde. We're not sure about conventions for changelogs, but it seems potentially misleading to just include "Fixed: XSS in combobox demo. (#8859, 5fee6fd)" in the 1.10.0 changelog anyway. A side issue is that 5fee6fd5000072ff32f2d65b6451f39af9e0e39e, by itself, only modified the demos/autocomplete/combobox.html file. We realize that the demos are shipped in the jquery-ui distribution. However, the demos typically wouldn't be part of the deployed product, so there's a question of whether combobox.html could have its own CVEs. In this case, the question seems largely irrelevant because changing the combobox.html code wasn't a useful way to address a vulnerability. Use CVE-2012-6662 for the issue fixed in f2854408cce7e4b7fc6bf8676761904af9c96bde. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUZnfKAAoJEKllVAevmvmscLYH/0EyGlrnj/nUyFM+RzuWzBsk iziDAeXEyC4/5zgc38/j38eKIshmdUg7Wp49rRUXj9z88zfihZowExE+ojVZFdtC EjK4+SZPjdb7dTdSVkeNnS4Dv6a8u6Kq2XGuV7FZ9Tx1Qs7kIscn7N2uixR8o8Tz KatmHEksbC1phQq8QdMb+Xw/Juc3cc7aB7/vuYfkiAvEOtWfs2+EtEMnT/Y3kfVj otiwMGAvGrCHQN9W5Vr1MNEp/rhnEsdbH7YYZMHrF3QlPN4UDlq+rk+Oooo+0nxp aEpyLQ8VibM3nV/JUCnUCpNFt9cGlAORYOdSC8YvPlrTQ5ihHj8YVjcx+BzQo7Y= =X1NZ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.