Red Hat Bugzilla – Bug 679339
CVE-2011-0432 pywebdav: SQL injection due improper escaping of user credentials [epel-5]
Last modified: 2014-12-26 14:50:46 EST
epel-5 tracking bug for pywebdav: see blocks bug list for full details of the security issue(s).
This bug is never intended to be made public, please put any public notes
in the 'blocks' bugs.
[bug automatically created by: add-tracking-bugs]
Are there plans to upgrade the version of pywebdav in the epel el5 repo or should we look at retiring the package? Let me know if I can be of assistance.
uff, sounds I forgot about it, both Fedora and EL-6 were fixed on time
pywebdav-0.9.4.1-1.el5 has been submitted as an update for Fedora EPEL 5.
* should fix your issue,
* was pushed to the Fedora EPEL 5 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=epel-testing pywebdav-0.9.4.1-1.el5'
as soon as you are able to.
Please go to the following url:
then log in and leave karma (feedback).
pywebdav-0.9.4.1-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.