Red Hat Bugzilla – Bug 840318
ganglia: Arbitrary PHP files may be executed from the Ganglia server due to unsanitized input to graph.php
Last modified: 2012-07-31 13:02:23 EDT
+++ This bug was initially created as a clone of Bug #840316 +++
Was reported upstream at http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=333
ganglia-3.1.7-6.el6 has been submitted as an update for Fedora EPEL 6.
Does EPEL-5 version (3.0.7-1.el5) need this fix?
No the code seems safe there
* should fix your issue,
* was pushed to the Fedora EPEL 6 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=epel-testing ganglia-3.1.7-6.el6'
as soon as you are able to.
Please go to the following url:
then log in and leave karma (feedback).
ganglia-3.1.7-6.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.