Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 11 Oct 2013 22:35:21 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request - Quassel IRC SQL injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/11/2013 11:10 AM, Bas Pape wrote:
> 2013/10/11 Kurt Seifried <kseifried@...hat.com>:
>> On 10/09/2013 10:48 AM, Bas Pape wrote:
>>> No upstream fix is available at this time, although the below 
>>> patch does fix the current issue.
>> 
>> Please use CVE-2013-4422 for this issue.
> 
> Thanks, glad to see I didn't botch the request. I am correct in 
> thinking Mitre will fill the details (e.g. description and
> references) once they get around to it, or does that require
> something from my or upstream's end?
> 
> For completeness sake, upstream fixed it [1] and announced a new 
> release (0.9.1 [2]).
> 
> [1]
> https://github.com/quassel/quassel/commit/aa1008be162cb27da938cce93ba533f54d228869
>
> 
[2] http://quassel-irc.org/node/120
> 
> -- Tucos

Yes as per
https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures

Until The CVE is assigned AND Mitre is made aware of it (e.g. the
embargo passes and the issue is made public) AND Mitre has researched
the issue and written a description of it entries will show up as "**
RESERVED **".


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=zx5T
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.