Bug#488632: Let's close this

2011-03-13 Thread Mark Doliner
I'm a dev on the Pidgin project and I just looked at the original diff from the CRISP advisory. I wasn't able to find a flaw in the libpurple source code. If someone can point out exactly how the leak happens, or provide a proof of concept XML file that demonstrates the leak, I'll gladly look at

Bug#488632:

2009-12-18 Thread Ari Pollak
Moritz Muehlenhoff wrote: Ari, could you check with upstream, whether this has been fixed by now? I'm pretty sure it's not fixed anywhere. I don't remember the exact reason why, but I think it had to do with either lack of a good exploit case, or lack of a proper fix. -- To UNSUBSCRIBE, e

Bug#488632:

2009-12-18 Thread Moritz Muehlenhoff
On Thu, Nov 13, 2008 at 12:23:15PM -0500, Ari Pollak wrote: > CVE-2008-2956 is the only remaining bug that hasn't been fixed upstream. > It's not considered serious because of the reasons given earlier: > > The other issue (CVE-2008-2956) can only be exploited, when the client > is connecting to a

Bug#488632:

2008-11-13 Thread Ari Pollak
CVE-2008-2956 is the only remaining bug that hasn't been fixed upstream. It's not considered serious because of the reasons given earlier: The other issue (CVE-2008-2956) can only be exploited, when the client is connecting to a server that either does not check for malformed XML or send them. The

Bug#488632:

2008-11-08 Thread John Walsh
This seems like a fairly serious security bug to be left alone for several months...is there anyone involved in maintaining pidgin working on patching this? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#488632: pidgin: Few security flaws

2008-10-09 Thread Tobias Klauser
Hi, According to [1] at least CVE-2008-2957 has been fixed upstream in version 2.5.0 The fix looks the same as the one from [2] in libpurple/upnp.c but differs a bit in libpurple/util.c Unfortunately the upstream SCM is currently down so I was not able to exract the patch from there. [1] http:/

Bug#488632: pidgin: Few security flaws

2008-07-08 Thread Nico Golde
Hi, the only thing which is fixed in 2.4.3 so far is CVE-2008-2927 but none of the CVE ids included in the bug report are fixed from what I can see. Cheers Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot1

Bug#488632: reopen and lower severity

2008-07-04 Thread Ari Pollak
Steffen Joeris wrote: > P.S. Did you check the proposed patches[0][1] yet? Upstream has still not made a decision about how to fix them, and I don't want to apply a random patch that may or may not fix the issue properly. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubsc

Bug#488632: reopen and lower severity

2008-07-04 Thread Steffen Joeris
reopen 488632 severity 488632 normal thanks While I do agree that the remaining issues (CVE-2008-2957, CVE-2008-2956) are not RC bugs, I still believe they should be addressed. Thus, I reopened the bug and lowered the severity to normal. From what I've read, only people in the buddy list can tr

Bug#488632: Additional resource

2008-06-30 Thread Kai Wasserbäch
Hi, Secunia reports [0] that the bug reported by Juan Pablo Lopez Yacubian on Buqtraq is also present in 2.4.2. Greetings, Kai [0] http://secunia.com/advisories/30881/ -- Kai Wasserbäch (Kai Wasserbaech) E-Mail: [EMAIL PROTECTED] Jabber (debianforum.de): Drizzt URL: http://wiki.debianforum

Bug#488632: pidgin: Few security flaws

2008-06-30 Thread Steffen Joeris
Package: pidgin Severity: grave Tags: security Justification: user security hole Hi The following email came over the public security list: There are three pidgin flaws that could use CVE ids. http://marc.info/?l=bugtraq&m=121449329530282&w=4 And two here: http://crisp.cs.du.edu/?q=ca2007-1 I