Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 10 Dec 2011 00:17:10 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Mark Doliner <mark@...gant.net>
Subject: Re: CVE request: Pidgin crash

On 12/09/2011 07:08 PM, Mark Doliner wrote:
> Hi!  Would it be possible to issue a CVE for a newish crash in Pidgin?
>  This is a remotely-triggerable crash in the oscar protocol (used by
> the AIM and ICQ plugins) when handling incoming buddy list-related
> SNACs.  I do not believe remote-code execution is possible.  It was
> discovered by Evgeny Boger and reported on our public issue tracker at
> http://developer.pidgin.im/ticket/14682  I do not believe a CVE exists
> for this yet.
>
> The Pidgin project will be releasing version 2.10.1 tomorrow and it
> will include a fix for this issue.
>
> Thanks (and sorry for sending this at the beginning of your weekends!),
> Mark
What is "weekends"? =)

Please use CVE-2011-4601 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.