Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120430223447.GL13910@redhat.com>
Date: Mon, 30 Apr 2012 16:34:47 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Vincent Untz <vuntz@...e.com>
Subject: Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag
 despite no verification

* [2012-04-24 12:04:24 +0200] Ludwig Nussel wrote:

>libsoup 2.32.2 does not verify certificates at all if an application does
>not explicitly specify a file with trusted root CA's. Since that libsoup
>version relies on the verification failure to clear the trust flag it
>always considers ssl connections as trusted in that case.
>
>Reference:
>https://bugzilla.novell.com/show_bug.cgi?id=758431

Are you sure it's just this specific version of libsoup?  Looking at the
code of earlier versions (such as 2.2.98), the patch noted in your bug
would apply (unless there is some other context around it that would
make this a non-issue?).  Did you look at other versions at all?

Thanks for any info.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.