| Summary: | quassel new security issue CVE-2013-6404 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, tmb |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/575368/ | ||
| Whiteboard: | advisory MGA3-64-OK MGA3-32-OK | ||
| Source RPM: | quassel-0.9.1-1.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-11-28 16:44:10 CET
Freeze push requested for Cauldron. Checked into SVN for Mageia 3. Whiteboard:
(none) =>
MGA3TOO quassel-0.9.2-1.mga4 uploaded for Cauldron. Mageia 3 update building now. Version:
Cauldron =>
3 Advisory: ======================== Updated quassel packages fix security vulnerability: Security vulnerability in Quassel before 0.9.2 through which a manipulated, but properly authenticated client was able to retrieve the backlog of other users on the same core in some cases (CVE-2013-6404). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6404 http://freecode.com/projects/quassel/releases/359566 http://quassel-irc.org/node/123 http://www.openwall.com/lists/oss-security/2013/11/28/8 ======================== Updated packages in core/updates_testing: ======================== quassel-0.9.2-1.mga3 quassel-common-0.9.2-1.mga3 quassel-client-0.9.2-1.mga3 quassel-core-0.9.2-1.mga3 from quassel-0.9.2-1.mga3.src.rpm Assignee:
bugsquad =>
qa-bugs Advisory 11808.adv committed to svn. No poc provided, so just need to test that the update works. CC:
(none) =>
davidwhodgins Testing complete on Mageia 3 i586 and x86_64. Validating the update. Someone from the sysadmin team please push 11808.adv to updates. Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2013-0362.html Status:
NEW =>
RESOLVED
David Walser
2013-12-02 16:46:37 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/575368/ |