Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Feb 2014 23:10:49 -0800
From:      Pierre Carrier <pierre.carrier@airbnb.com>
To:        secalert <secalert@redhat.com>
Cc:        bugbusters <bugbusters@freebsd.org>, product.security@airbnb.com, pkgsrc-security <pkgsrc-security@netbsd.org>, Rory O'Connell <rory@berecruited.com>
Subject:   Re: [engineering.redhat.com #278019] Insufficient salting in the net-ldap Ruby gem
Message-ID:  <CAM7LUF5dpkTOacFRtk9UErsq5sp_UnzRLCrEsdQtpKwEWU232w@mail.gmail.com>
In-Reply-To: <rt-4.0.13-24394-1392271280-1668.278019-5-0@engineering.redhat.com>
References:  <RT-Ticket-278019@engineering.redhat.com> <CAM7LUF4MuEJ0DWKhDZ=P=Z7HME_F18a8K4LeSehccmPQP8xHpg@mail.gmail.com> <rt-4.0.13-24394-1392271280-1668.278019-5-0@engineering.redhat.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Feb 12, 2014 at 10:01 PM, Red Hat Security Response Team
<secalert@redhat.com> wrote:
> Please use CVE-2014-0083 for this issue. Also can an issue be opened upstream if it hasn't already been done? Thanks.

My understanding from a naive search is that the current active
project is github.com/ruby-ldap/ruby-net-ldap, and
rory@berecruited.com has been merging all pull requests there in
recent times, so I included them in the original email as the presumed
current upstream.

-- 
Pierre



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAM7LUF5dpkTOacFRtk9UErsq5sp_UnzRLCrEsdQtpKwEWU232w>