|
Message-ID: <5258D189.6040303@redhat.com> Date: Fri, 11 Oct 2013 22:35:21 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request - Quassel IRC SQL injection -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/11/2013 11:10 AM, Bas Pape wrote: > 2013/10/11 Kurt Seifried <kseifried@...hat.com>: >> On 10/09/2013 10:48 AM, Bas Pape wrote: >>> No upstream fix is available at this time, although the below >>> patch does fix the current issue. >> >> Please use CVE-2013-4422 for this issue. > > Thanks, glad to see I didn't botch the request. I am correct in > thinking Mitre will fill the details (e.g. description and > references) once they get around to it, or does that require > something from my or upstream's end? > > For completeness sake, upstream fixed it [1] and announced a new > release (0.9.1 [2]). > > [1] > https://github.com/quassel/quassel/commit/aa1008be162cb27da938cce93ba533f54d228869 > > [2] http://quassel-irc.org/node/120 > > -- Tucos Yes as per https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures Until The CVE is assigned AND Mitre is made aware of it (e.g. the embargo passes and the issue is made public) AND Mitre has researched the issue and written a description of it entries will show up as "** RESERVED **". - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQIcBAEBAgAGBQJSWNGJAAoJEBYNRVNeJnmTL3kP/2Zci9Gha0Pc8+Qo3YAam52j sC/XrdVxXpFSZcghl7GJSCwWmEmzNrFiuSPBqHAdzXs4iPcaJI1CKSXNNAd+IWmy iu0xJdl1H/tlFbnzV4ivO/BD0hWr49vBfvXQMd08WrfTCfGB3VSIHfSLjOWO1eLh pZafi80EwNW38sWqiygKL1FZAIXXZpf2+OSi5wFw+YSmnhsFPdVCBClp+/7/JTnd RCJ5iJMeJ9/fMCwywnZlLuNQGJjCDhapfk8+dcuc2O1Jhl2JgXXc0G6ZV0tClXee l/l78K8a2ZpgtUm5nDkOXAEcDtUka9CuB+OSx0KkgbupQcH1CFirTmfGBiywDEyu ekZA3i20Q00seHi3Eh8cayqgwtoA9M8rZDABx8887Jky5tYpfANlpNCrByNhmD7/ ds9UX+FbLE5CGcZaRYL7YAxUsNoueLGsByX2a/LORLSXkkwHEwzvmwp409dfbK+d 6/C5VeuhAERbpRdw59plliD73+xtYqX6lgsk7vfUzfvycCnKcJ2xYzFNqsIig4wZ p51POEfZjeKShfwZojhfVhsi4uByP7AY9SbEHN79fpGIE5b7C0btbyVs9V2HvAq+ MulbaHWIl/v/wpVQQCahtKfCI6w/1xV8LETQpgy3jdXgeD1dcSa4DxibGqJovYjd KP4pXpwn3QoseHfLXUrq =zx5T -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.