Bug 14183 - python-oauth2 new security issue CVE-2013-4346
Summary: python-oauth2 new security issue CVE-2013-4346
Status: RESOLVED WONTFIX
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 3
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: Philippe Makowski
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/613457/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-26 22:55 CEST by David Walser
Modified: 2014-09-28 17:08 CEST (History)
0 users

See Also:
Source RPM: python-oauth2-1.5.170-2.3.mga3.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-09-26 22:55:33 CEST
Fedora has issued an advisory on September 13:
https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138701.html

It looks like we fixed CVE-2013-4347 in Bug 11224, but didn't fix CVE-2013-4346 at that time, but Fedora's advisory says both were fixed, thanks to Philippe Makowski.

So either they were mistaken or there's another patch we can use.

Reproducible: 

Steps to Reproduce:
Comment 1 Philippe Makowski 2014-09-27 19:32:21 CEST
(In reply to David Walser from comment #0)
> Fedora has issued an advisory on September 13:
> https://lists.fedoraproject.org/pipermail/package-announce/2014-September/
> 138701.html
> 
> It looks like we fixed CVE-2013-4347 in Bug 11224, but didn't fix
> CVE-2013-4346 at that time, but Fedora's advisory says both were fixed,
> thanks to Philippe Makowski.
> 
we did "mga 11224  multiple vulnerabilities in python-oauth2 (CVE-2013-4346, CVE-2013-4347" 
http://svnweb.mageia.org/packages/updates/3/python-oauth2/current/SPECS/python-oauth2.spec?r1=417316&r2=532500

in fact, Fedora applied my patches, but read https://bugs.mageia.org/show_bug.cgi?id=11224#c13, we choose to do nothing for CVE-2013-4346
Comment 2 David Walser 2014-09-28 02:10:37 CEST
Yes I know all of that.  What I'm asking is, did Fedora actually do something for CVE-2013-4346 (i.e., is there something we *can* do), or were they mistaken in including that CVE in their advisory?
Comment 3 Philippe Makowski 2014-09-28 17:05:22 CEST
They didn't mistaken, they applied my fix, and we decided to not apply it.
so they are right to say that they fixed CVE-2013-4346 , even if we decided that we can't because we didn't want what Claire qualified as  "Some regression". As I said : "if someone want to use this skeletal implementation, he have to be aware of CVE-2013-4346 and take care of this in his own code."
Comment 4 David Walser 2014-09-28 17:08:27 CEST
OK.

Status: NEW => RESOLVED
Resolution: (none) => WONTFIX


Note You need to log in before you can comment on or make changes to this bug.