Date: Thu, 03 Jan 2013 00:31:05 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Moritz Muehlenhoff <jmm@...ian.org> Subject: Re: CVE request: Curl insecure usage -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/02/2013 11:02 AM, Moritz Muehlenhoff wrote: > On Wed, Dec 26, 2012 at 12:38:19PM +0100, Moritz Muehlenhoff wrote: >> On Thu, Nov 29, 2012 at 10:44:36PM +0100, Moritz Mühlenhoff wrote: >>>> Also can someone collate and post a list of all the other apps using >>>> curl insecurely and need CVE's with appropriate links to the >>>> upstreams/etc? Thanks. >>> >>> There are some, which are potentially affected, but where discussion >>> with upstream is still pending. > > Here are two more. These are the last two remaining issues found by > Alessandro Ghedini: > Please assign CVE IDs: > > 1. Zabbix > https://support.zabbix.com/browse/ZBX-5924 Please use CVE-2012-6086 for this issue. > 2. Moodle > This one is two-fold. First of all Moodle embeds PHP-Cas and Moodle is thus > affected by CVE-2012-5583 as well. (Same code, so same CVE ID). > > Additionally there's another issue specific to Moodle, which requires a CVE > ID: > https://github.com/tpyo/amazon-s3-php-class/pull/36 Please use CVE-2012-6087 for this issue. > > Cheers, > Moritz > - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQ5TO5AAoJEBYNRVNeJnmTt0oQAINPPhlLqdmfpgOE/qMvUBLe xCezoVP7zj0T4cpvcmzxjAvcBsfsnYjF0XChfMC+vk5FpK0jmSBdcdyHivhzQP9L SrR3O1QMZbeo0N9UXgR4q3h9s1Xvccr/4CpZAyraq1d05f/fSRvLQ1oFejFlmOJc lmoRJl3V6ov5LPr16eiINQRXuq0+eERB8y3zQResJuu68CMzJlBbRsOf59As0gtK zVfuounDS4ggSLD7GbQiP8Fqu8RAKp47LDyxfKLEI5EwrBpE/e/mtYgx6TFWUk1L 68K5wegMCxjqr1goROY9E/xeStfnrFr8ONKEgJOwNTgg1YiFjWvI3BFXCoVqjQ4e QIyCMmEhDj+hu81Ct5uraTHDqAynvqfC+nW2KS8LxRgXxMhJM8EWHMKp9Uu1+Adm k5FZiHRwJ9mc25eryLmn81+8JBe+KLLSAZDs2p54heP/JoW54nj8s32clnpl/6Uw utOiSnWMJgqByndOOli9Z6jQ3mo1iP1BRdoLNGN4azInq2IavtK2So2xiAoYuyUQ HQ24xRZB76OQpZoPTnisL/WX9gboOmsbc35DSm5T5uiT7yNb47cooD9o5Hq+U3Vb GKW5U4LmO4dKMTn/1aXgE6rt/k2Q3YrvuDur77pWTSuYLqIPuY4IEM5NnX8ukavI JLv+eFxyNQUVIA1kQw+B =hzGV -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ