oss-sec mailing list archives

Re: CVE Request - Quassel IRC SQL injection


From: Bas Pape <baspape () gmail com>
Date: Fri, 11 Oct 2013 19:10:31 +0200

2013/10/11 Kurt Seifried <kseifried () redhat com>:
On 10/09/2013 10:48 AM, Bas Pape wrote:
No upstream fix is available at this time, although the below
patch does fix the current issue.

Please use CVE-2013-4422 for this issue.

Thanks, glad to see I didn't botch the request. I am correct in
thinking Mitre will fill the details (e.g. description and references)
once they get around to it, or does that require something from my or
upstream's end?

For completeness sake, upstream fixed it [1] and announced a new
release (0.9.1 [2]).

[1] https://github.com/quassel/quassel/commit/aa1008be162cb27da938cce93ba533f54d228869
[2] http://quassel-irc.org/node/120

--
Tucos


Current thread: