Denial of Service in Konversation
ID: | FEDORA-2014-13837 |
Distribution: | Fedora |
Plattformen: | Fedora 21 |
Datum: | Mi, 12. November 2014, 08:05 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8483 |
Applikationen: | Konversation |
Originalnachricht |
|
Name : konversation Product : Fedora 21 Version : 1.5.1 Release : 1.fc21 URL : http://konversation.kde.org/ Summary : A user friendly IRC client Description : A simple and easy to use IRC client with support for strikeout; multi-channel joins; away / unaway messages; ignore list functionality; support for foreign language characters; auto-connect to server; optional timestamps to chat windows; configurable background colors and much more -------------------------------------------------------------------------------- Update Information: Konversation 1.5.1 is a maintenance release containing only bug fixes. The included changes address several minor behavioral defects and a low-risk DoS security defect in the Blowfish ECB support. See also: https://konversation.kde.org/ -------------------------------------------------------------------------------- References: [ 1 ] Bug #1156418 - CVE-2014-8483 quassel, konversation: out-of-bounds read on a heap-allocated array https://bugzilla.redhat.com/show_bug.cgi?id=1156418 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update konversation' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce |