Summary: | www-client/arora: Integer overflow (CVE-2010-1100) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tomás Touceda (RETIRED) <chiiph> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | minor | CC: | qt |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://code.google.com/p/arora/ | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Tomás Touceda (RETIRED)
![]() http://security-tracker.debian.org/tracker/CVE-2010-1100 notes: Advisory is wrong, URL range is protected by QUrl (In reply to comment #1) > http://security-tracker.debian.org/tracker/CVE-2010-1100 notes: > Advisory is wrong, URL range is protected by QUrl So, is this invalid? @qt, thoughts on this? Thanks! I believe the advisory is wrong yes Ok, thanks. Marking this as invalid. |