| Summary: | net-im/pidgin < 2.5.1 Failure to verify SSL certificate (CVE-2008-3532) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | amigadave, dhp_gentoo, net-im |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://secunia.com/advisories/31390/ | ||
| Whiteboard: | B3 [glsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Robert Buchholz (RETIRED)
2008-08-06 22:26:10 UTC
This issue is fixed in 2.5.0, which is in the portage tree but currently marked unstable. The ebuild is in. I'm a bit shy about rushing this to stable because its not a great threat and there is a whole new MSN implementation in that version and I'm not sure how good it is. We could argue about the impact of failure to verify certificates, especially when people rely on it. Let's give it the rest of this week in ~arch to test, and we will CC arches on Aug. 24. Please mark any bugs that come up as blockers of this bug. Arches, please test and mark stable net-im/pidgin-2.5.1. Target Keywords: "alpha amd64 hppa ia64 ppc ~ppc64 sparc x86 ~x86-fbsd" Sparc stable for pidgin-2.5.1. amd64/x86 stable alpha/ia64 stable ppc stable Stable for HPPA. 2.5.1 is now in x86 stable and merged to Portage; if all other arch, i think you can close this bug ... (In reply to comment #10) > 2.5.1 is now in x86 stable and merged to Portage; if all other arch, i think > you can close this bug ... > Thanks for your effort, but ... no, not really. This is a security bug, please see our policy[1]. So, ready for voting. I vote YES. [1] http://www.gentoo.org/security/en/vulnerability-policy.xml voting yes too, request filed. GLSA 200901-13, sorry for the delay 2.5.2 stable by now, and 2.5.4 should come in withint 24h (bump request just closed, waiting for tree to sync). |