[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: Vulnerability fixed in Quassel?
From:       cve-assign () mitre ! org
Date:       2014-10-26 17:50:41
Message-ID: 20141026175041.2836C8BC004 () smtpvmsrv1 ! mitre ! org
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://projects.kde.org/projects/extragear/network/konversation/repository/revisions/1f55cee8b3d0956adc98834f7b5832e48e077ed7
>  https://bugs.kde.org/show_bug.cgi?id=210792

> https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
> http://bugs.quassel-irc.org/issues/1314

Use CVE-2014-8483 for this out-of-bounds read issue, which can have an
impact of either denial of service or disclosure of information from
process memory.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUTTP0AAoJEKllVAevmvmsSzIH+QHR+7d5VT2alOdllmuUk2Wq
wDCZKhMM74Moyg4JcWsYbnJtk+rlqMS4FEBNVMJdyk2wX8D4/Pm9Y7V1IikejOAk
/Dj2uF+V8iAvOha+SU9GDteUJtIujYMqZ/sOFHXNuXGCw/X+8k5WcMRVOGOIEmDU
Q/b9GEdg0ai8YLAwoQEJlcXk1hg3k9YIq5y6ckJHhSBDdxTKC2Q29LMXJzpzCNg+
w4EivSLUYuoUNRKa5jaPT2D60X293nAw683bCjb4VQc+eiSeSo4zZwCZvUEqatWp
20t7WRmb8l9uEgkYpP70tSI3Hgro+kTDmmlsDGd1DHIzz9pHw8pzBccbirqt/7E=
=AAg1
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic