oss-sec mailing list archives
Re: CVE request: Curl insecure usage
From: Kurt Seifried <kseifried () redhat com>
Date: Thu, 03 Jan 2013 00:31:05 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/02/2013 11:02 AM, Moritz Muehlenhoff wrote:
On Wed, Dec 26, 2012 at 12:38:19PM +0100, Moritz Muehlenhoff wrote:On Thu, Nov 29, 2012 at 10:44:36PM +0100, Moritz Mühlenhoff wrote:Also can someone collate and post a list of all the other apps using curl insecurely and need CVE's with appropriate links to the upstreams/etc? Thanks.There are some, which are potentially affected, but where discussion with upstream is still pending.Here are two more. These are the last two remaining issues found by Alessandro Ghedini: Please assign CVE IDs: 1. Zabbix https://support.zabbix.com/browse/ZBX-5924
Please use CVE-2012-6086 for this issue.
2. Moodle This one is two-fold. First of all Moodle embeds PHP-Cas and Moodle is thus affected by CVE-2012-5583 as well. (Same code, so same CVE ID). Additionally there's another issue specific to Moodle, which requires a CVE ID: https://github.com/tpyo/amazon-s3-php-class/pull/36
Please use CVE-2012-6087 for this issue.
Cheers, Moritz
- -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQ5TO5AAoJEBYNRVNeJnmTt0oQAINPPhlLqdmfpgOE/qMvUBLe xCezoVP7zj0T4cpvcmzxjAvcBsfsnYjF0XChfMC+vk5FpK0jmSBdcdyHivhzQP9L SrR3O1QMZbeo0N9UXgR4q3h9s1Xvccr/4CpZAyraq1d05f/fSRvLQ1oFejFlmOJc lmoRJl3V6ov5LPr16eiINQRXuq0+eERB8y3zQResJuu68CMzJlBbRsOf59As0gtK zVfuounDS4ggSLD7GbQiP8Fqu8RAKp47LDyxfKLEI5EwrBpE/e/mtYgx6TFWUk1L 68K5wegMCxjqr1goROY9E/xeStfnrFr8ONKEgJOwNTgg1YiFjWvI3BFXCoVqjQ4e QIyCMmEhDj+hu81Ct5uraTHDqAynvqfC+nW2KS8LxRgXxMhJM8EWHMKp9Uu1+Adm k5FZiHRwJ9mc25eryLmn81+8JBe+KLLSAZDs2p54heP/JoW54nj8s32clnpl/6Uw utOiSnWMJgqByndOOli9Z6jQ3mo1iP1BRdoLNGN4azInq2IavtK2So2xiAoYuyUQ HQ24xRZB76OQpZoPTnisL/WX9gboOmsbc35DSm5T5uiT7yNb47cooD9o5Hq+U3Vb GKW5U4LmO4dKMTn/1aXgE6rt/k2Q3YrvuDur77pWTSuYLqIPuY4IEM5NnX8ukavI JLv+eFxyNQUVIA1kQw+B =hzGV -----END PGP SIGNATURE-----
Current thread:
- Re: CVE request: Curl insecure usage Moritz Muehlenhoff (Jan 02)
- Re: CVE request: Curl insecure usage Kurt Seifried (Jan 02)
- <Possible follow-ups>
- Re: CVE request: Curl insecure usage Moritz Muehlenhoff (Jan 15)