Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 102371 - www-apps/xoops: XML-RPC Vulnerabilities round 2
Summary: www-apps/xoops: XML-RPC Vulnerabilities round 2
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~1 [upstream] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2005-08-13 07:24 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2005-08-23 05:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-08-13 07:24:05 UTC
see bug #102324
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-08-14 22:09:03 UTC
Now instead see bug #102576 
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-08-21 08:33:43 UTC
Nothing from upstream yet.
Comment 3 Stuart Herbert (RETIRED) gentoo-dev 2005-08-23 00:42:15 UTC
Hi,

xoops doesn't use either of the XML-RPC libraries that are known to be
vulnerable to bug #102576.  Do you have any further information on how and why
xoops is vulnerable?

Thanks,
Stu
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-08-23 00:55:24 UTC
I guess our supposition was based on the fact that xoops was reported as
vulnerable to the previous XML-RPC vulnerability (see bug 101899). You can close
the bug as INVALID if you confirm that it doesn't contain an affected lib.
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-08-23 01:01:15 UTC
I opened new xmlrpc bugs for all packages affected by last round. So no 
specific evidence for xoops. 
Comment 6 Stuart Herbert (RETIRED) gentoo-dev 2005-08-23 05:45:55 UTC
xoops uses its own XMLRPC library, which doesn't use eval() in the process.

Closing bug as invalid.  If any more information comes to light, please re-
open this bug.

Best regards,
Stu