Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 05 May 2012 17:57:43 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Marcus Meissner <meissner@...e.de>, Steve Beattie <steve@...w.org>
Subject: Re: CVE Request: evolution-data-server lacks SSL checking
 in its libsoup users

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/04/2012 01:44 PM, Marcus Meissner wrote:
> On Fri, May 04, 2012 at 10:03:20AM -0600, Kurt Seifried wrote:
>> On 05/04/2012 02:30 AM, Steve Beattie wrote:
>>> On Fri, May 04, 2012 at 10:03:11AM +0200, Marcus Meissner
>>> wrote:
>>>> This was already reported: 
>>>> https://bugzilla.gnome.org/show_bug.cgi?id=671537 
>>>> https://launchpad.net/bugs/933659   (private still)
>>>> 
>>>> so it might have a CVE already.
>>> 
>>> I've made the launchpad bug public now. There was no CVE
>>> assigned in that report.
>>> 
>>> Thanks.
>>> 
>> 
>> Shouldn't these all be covered by the libsoup CVE:
>> 
>>> libsoup 2.32.2 does not verify certificates at all if an 
>>> application does not explicitly specify a file with trusted
>>> root CA's. Since that libsoup version relies on the
>>> verification failure to clear the trust flag it always
>>> considers ssl connections as trusted in that case.
>>> 
>>> Reference: https://bugzilla.novell.com/show_bug.cgi?id=758431
>>> 
>>> cu Ludwig
>>> 
>> Please use CVE-2012-2132 for this issue.
> 
> That really depends if it is the task of libsoup or the task of
> the applications I think. So who is lacking the checks...
> 
> Our opinion is that the default should be "good" in libsoup, so a
> CVE is needed there in all cases.
> 
> Ciao, Marcus

Ok, if someone wants to make a list of the affected libsoup users with
links and whatnot that are using libsoup and fixing their use of it
feel free to post it so I can get them CVEs as needed.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJPpb53AAoJEBYNRVNeJnmT5gsP/ROIpL4I1i4m/NFTvZNY8/Oz
y1KrddqhEKY5SO7C5k1PYeOAaCWpyEGna6CZN6CGUlQ/81KNXd1qaoFbvcVnT/pG
tl9Wdk9oJ4ovTWxo6VpEM6YgjfmbSH7x4zo2s2zcWfzFuhHg9zIrOa/V02CniTDa
T32ErvaiyBsB+3JbOzndS1tX6dtO+Vmg9/+WpQYCNNNiXN/Psg4h5pKLbMC8APzq
z1tsRJNVD+2JHqjASd4xn0Kxjo0X+DrvpfRrAJ7xgVHgAoEoe3QysFOB9Vto1vFU
JeqyrCU+LLM44NLwq5ENbPBKYnJ2ULzpxPTfG70skv8eN0Jj4T5XPjXcb0cbHHGC
Q1RrM3t2puMzWY53MrfS1+Xi0fKQBxcZ8xIPaxvJ7Je+mVeASGxoa2+I+Rln1jPE
o8Ma16S0ttSqnnThSfq+eCMBq/g+m6DddN7FpowH6z/Rmgaeh5/aHvcviY4JF3i2
85GSfMbLALG+MxXnKENN96jbjp684NeXvD826YhdETEXczYZt3NRcBrn7o6etPta
87au4w7zeJwPNfyS50GumkAXud/yVnQi1y8O5CtYBIM6VdOommX7mzswYhFk7wed
PgPj4Un5McK+hws8We/uMJ9S9SlndL2emdMqg/f6/TLUCwKQwKtcHnU9GMR774qT
JRR1FOX9kL18hrg1m4WO
=OnRu
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.