Bug 17328 - quassel new security issue CVE-2015-8547
Summary: quassel new security issue CVE-2015-8547
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/668336/
Whiteboard: has_procedure mga5-32-ok advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-12-13 13:31 CET by David Walser
Modified: 2015-12-17 16:48 CET (History)
1 user (show)

See Also:
Source RPM: quassel-0.10.1-5.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-12-13 13:31:01 CET
A CVE was assigned for a denial of service issue fixed upstream:
http://openwall.com/lists/oss-security/2015/12/13/1

Patched packages uploaded for Mageia 5 and Cauldron.

Advisory:
========================

Updated quassel packages fix security vulnerability:

The Quassel core could be crashed by a client using the op command, causing a
denial of service (CVE-2015-8547).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8547
http://openwall.com/lists/oss-security/2015/12/13/1
========================

Updated packages in core/updates_testing:
========================
quassel-0.10.1-5.1.mga5
quassel-common-0.10.1-5.1.mga5
quassel-client-0.10.1-5.1.mga5
quassel-core-0.10.1-5.1.mga5

from quassel-0.10.1-5.1.mga5.src.rpm

Reproducible: 

Steps to Reproduce:
Comment 1 claire robinson 2015-12-14 18:40:37 CET
Testing complete mga5 32

Confirmed the crash. Started quasselcore in one terminal and quasselclient in a 2nd. Completed the setup wizard.

Created a channel "/join #mrsbtest" and used "/op *" which crashed the core.

Confirmed OK after update.

Whiteboard: (none) => has_procedure mga5-32-ok

Rémi Verschelde 2015-12-15 07:35:17 CET

Whiteboard: has_procedure mga5-32-ok => has_procedure mga5-32-ok advisory

Comment 2 claire robinson 2015-12-16 16:11:24 CET
Validating.

Please push to 5 updates

Thanks

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 3 Mageia Robot 2015-12-16 22:01:59 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0475.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-12-17 16:48:41 CET

URL: (none) => http://lwn.net/Vulnerabilities/668336/


Note You need to log in before you can comment on or make changes to this bug.