oss-sec mailing list archives
Re: CVE Request - Quassel IRC SQL injection
From: Bas Pape <baspape () gmail com>
Date: Fri, 11 Oct 2013 19:10:31 +0200
2013/10/11 Kurt Seifried <kseifried () redhat com>:
On 10/09/2013 10:48 AM, Bas Pape wrote:No upstream fix is available at this time, although the below patch does fix the current issue.Please use CVE-2013-4422 for this issue.
Thanks, glad to see I didn't botch the request. I am correct in thinking Mitre will fill the details (e.g. description and references) once they get around to it, or does that require something from my or upstream's end? For completeness sake, upstream fixed it [1] and announced a new release (0.9.1 [2]). [1] https://github.com/quassel/quassel/commit/aa1008be162cb27da938cce93ba533f54d228869 [2] http://quassel-irc.org/node/120 -- Tucos
Current thread:
- CVE Request - Quassel IRC SQL injection Bas Pape (Oct 09)
- Re: CVE Request - Quassel IRC SQL injection Kurt Seifried (Oct 10)
- Re: CVE Request - Quassel IRC SQL injection Bas Pape (Oct 11)
- Re: CVE Request - Quassel IRC SQL injection Kurt Seifried (Oct 11)
- Re: CVE Request - Quassel IRC SQL injection Bas Pape (Oct 11)
- Re: CVE Request - Quassel IRC SQL injection Kurt Seifried (Oct 10)