Bug 833483 (CVE-2012-2085)
Summary: | CVE-2012-2085 gajim: Execute command helper improperly sanitizing 'command' argument, leading to remote code execution | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | mschmidt |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-08-06 09:21:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 833485 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2012-06-19 14:50:42 UTC
While this issue has been previously corrected in the versions of the gajim package, as shipped with Fedora release of 15, 16, 17, and as shipped with Fedora EPEL 6, it still affects the version of the gajim package, as shipped with Fedora EPEL 5. Please schedule an update. Created gajim tracking bugs for this issue Affects: epel-5 [bug 833485] gajim-0.12.5-1.el5.2 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. |