On 2014-04-25 16:58:53, Moritz Muehlenhoff wrote:
> On Fri, Apr 25, 2014 at 04:41:36PM +0200, Sebastian Ramacher wrote:
> > On 2014-04-25 16:40:28, Sebastian Ramacher wrote:
> > > Hi Security Team,
> > >
> > > On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> > > > Source: libmms
> > > > Versi
On Fri, Apr 25, 2014 at 04:41:36PM +0200, Sebastian Ramacher wrote:
> On 2014-04-25 16:40:28, Sebastian Ramacher wrote:
> > Hi Security Team,
> >
> > On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> > > Source: libmms
> > > Version: 0.6-1
> > > Severity: grave
> > > Tags: security upstream fi
On 2014-04-25 16:40:28, Sebastian Ramacher wrote:
> Hi Security Team,
>
> On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> > Source: libmms
> > Version: 0.6-1
> > Severity: grave
> > Tags: security upstream fixed-upstream
> >
> > Hi,
> >
> > the following vulnerability was published for lib
Hi Security Team,
On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> Source: libmms
> Version: 0.6-1
> Severity: grave
> Tags: security upstream fixed-upstream
>
> Hi,
>
> the following vulnerability was published for libmms.
>
> CVE-2014-2892[0]:
> heap-based buffer overflow
Please find at
Source: libmms
Version: 0.6-1
Severity: grave
Tags: security upstream fixed-upstream
Hi,
the following vulnerability was published for libmms.
CVE-2014-2892[0]:
heap-based buffer overflow
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures)
5 matches
Mail list logo