It was reported [1],[2] that telepathy-idle, an IRC backend for the Telepathy framework, did not check the server's SSL/TLS certificate for validity [3]. This could allow an attacker to carry out man-in-the-middle attacks. This flaw has existed in the source since 2007, and versions 0.1.11 through to 0.1.14 use GLib for TLS, so they did very basic checks on certificates, but did not check that the certificate issuer was a trusted CA, that the identity matched the server's hostname, or that the certificate had not expired. The forthcoming 0.1.15 release will fix this flaw; a patch is attached to the upstream bug [4]. [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706094 [2] http://www.openwall.com/lists/oss-security/2013/04/24/5 [3] https://bugs.freedesktop.org/show_bug.cgi?id=63810 [4] https://bugs.freedesktop.org/attachment.cgi?id=78341
Packages already built and in bodhi for f18 & f19: https://admin.fedoraproject.org/updates/telepathy-idle-0.1.15-1.fc19 https://admin.fedoraproject.org/updates/telepathy-idle-0.1.15-1.fc18
Created telepathy-idle tracking bugs for this issue Affects: fedora-all [bug 956335]
Typo in the summary: telepath -> telepathy
(In reply to comment #3) > Typo in the summary: telepath -> telepathy Thank you, Agostino.
The CVE identifier of CVE-2007-6746 has been assigned: http://www.openwall.com/lists/oss-security/2013/04/29/19 to this issue.
telepathy-idle-0.1.15-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.