patch for CVE-2012-5524
Gajim performed verification of invalid (broken / expired) x.509v3 SSL certificates (True as return value was returned always regardless if error during certificate validation occurred or not). A rogue XMPP server could use this flaw to conduct man-in-the-middle attack (MiTM) and trick Gajim client to accept the certificate even when it was invalid / should not be accepted.
This release fixes this issue.
Please log in to add feedback.
This update has been submitted for testing by mcepl.
This update is currently being pushed to the Fedora EPEL 6 testing updates repository.
This update has been pushed to testing
This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by mcepl.
This update is currently being pushed to the Fedora EPEL 6 stable updates repository.
This update has been pushed to stable