Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 08 Apr 2012 09:59:09 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: David Black <disclosure@....org>
Subject: Re: CVE request: gajim - code execution and sql injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/08/2012 04:49 AM, David Black wrote:
> Hi. a few months ago the following bugs were reported in gajim and
> do not yet have CVE-ID allocation: 1.
> https://trac.gajim.org/ticket/7031, 'Assisted' code execution (if
> the user clicks a link)

Please use CVE-2012-2085 for this issue.

> 2. https://trac.gajim.org/ticket/7034, SQL injection via jids

Please use CVE-2012-2086 for this issue.

> Note: these two issues are fixed in the latest gajim
> release[0][1].
> 
> [0] http://gajim.org/ - "Gajim 0.15 is here! (18 March 2012)" [1]
> https://trac.gajim.org/query?status=closed&milestone=0.15



On a side note: if you want a free SSL certificate please use
something like http://cert.startcom.org/ which is included within most
browsers. cacert.org is not included in any (that I know of) browsers,
I have no idea what the cacert practices are (and I can't find any
documentation on their site) so there's no way that root key will be
loaded by myself (and most people I know).


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=wM0B
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.