oss-sec mailing list archives

Re: Vulnerability fixed in Quassel?


From: cve-assign () mitre org
Date: Sun, 26 Oct 2014 13:50:41 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

https://projects.kde.org/projects/extragear/network/konversation/repository/revisions/1f55cee8b3d0956adc98834f7b5832e48e077ed7
https://bugs.kde.org/show_bug.cgi?id=210792

https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
http://bugs.quassel-irc.org/issues/1314

Use CVE-2014-8483 for this out-of-bounds read issue, which can have an
impact of either denial of service or disclosure of information from
process memory.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUTTP0AAoJEKllVAevmvmsSzIH+QHR+7d5VT2alOdllmuUk2Wq
wDCZKhMM74Moyg4JcWsYbnJtk+rlqMS4FEBNVMJdyk2wX8D4/Pm9Y7V1IikejOAk
/Dj2uF+V8iAvOha+SU9GDteUJtIujYMqZ/sOFHXNuXGCw/X+8k5WcMRVOGOIEmDU
Q/b9GEdg0ai8YLAwoQEJlcXk1hg3k9YIq5y6ckJHhSBDdxTKC2Q29LMXJzpzCNg+
w4EivSLUYuoUNRKa5jaPT2D60X293nAw683bCjb4VQc+eiSeSo4zZwCZvUEqatWp
20t7WRmb8l9uEgkYpP70tSI3Hgro+kTDmmlsDGd1DHIzz9pHw8pzBccbirqt/7E=
=AAg1
-----END PGP SIGNATURE-----


Current thread: