Bug 22957 - quassel new security issues fixed upstream in 0.12.5 (CVE-2018-1000178 and CVE-2018-1000179)
Summary: quassel new security issues fixed upstream in 0.12.5 (CVE-2018-1000178 and CV...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA5TOO MGA5-32-OK MGA6-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2018-04-27 16:57 CEST by David Walser
Modified: 2018-05-16 10:26 CEST (History)
4 users (show)

See Also:
Source RPM: quassel-0.12.4-4.mga6.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2018-04-27 16:57:40 CEST
Quassel 0.12.5 has been released on April 24:
https://quassel-irc.org/node/130

Details and links to patches are here:
http://openwall.com/lists/oss-security/2018/04/27/1

CVEs have been requested.

Mageia 6 should be updated and hopefully we can backport the patches to Mageia 5.
David Walser 2018-04-27 16:57:49 CEST

Whiteboard: (none) => MGA5TOO

Comment 1 David Walser 2018-04-27 21:12:51 CEST
Mageia 6 build queued by David; BS is stuck.

quassel-0.12.5-1.mga6
quassel-common-0.12.5-1.mga6
quassel-client-0.12.5-1.mga6
quassel-core-0.12.5-1.mga6

from quassel-0.12.5-1.mga6.src.rpm
Comment 2 David GEIGER 2018-05-01 11:03:27 CEST
unfortablely the two patches doesn't apply in 0.10.1 release from mga5!
Comment 3 David Walser 2018-05-01 16:50:32 CEST
CVE assignments:
http://openwall.com/lists/oss-security/2018/05/01/1

I see only a few hunks fail in mga5, so a backport should be possible.  Will try to look at it later.

Summary: quassel new security issues fixed upstream in 0.12.5 => quassel new security issues fixed upstream in 0.12.5 (CVE-2018-1000178 and CVE-2018-1000179)

Comment 4 David Walser 2018-05-04 05:02:58 CEST
That wasn't too bad.

Advisory:
========================

Updated quassel packages fix security vulnerabilities:

A heap corruption exists in quassel version 0.12.4 in quasselcore that allows
an attacker to execute code remotely (CVE-2018-1000178).

A NULL Pointer Dereference exists in quassel version 0.12.4 in the quasselcore
that allows an atacker to denial of service by attempting a login when the
database is not initialized (CVE-2018-1000179).

The Mageia 5 package has been patched to fix these issues and the Mageia 6
package has been upgraded to version 0.12.5, which also has other fixes and
improvements.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000179
http://openwall.com/lists/oss-security/2018/05/01/1
https://quassel-irc.org/node/130
========================

Updated packages in core/updates_testing:
========================
quassel-0.10.1-5.3.mga5
quassel-common-0.10.1-5.3.mga5
quassel-client-0.10.1-5.3.mga5
quassel-core-0.10.1-5.3.mga5
quassel-0.12.5-1.mga6
quassel-common-0.12.5-1.mga6
quassel-client-0.12.5-1.mga6
quassel-core-0.12.5-1.mga6

from SRPMS:
quassel-0.10.1-5.3.mga5.src.rpm
quassel-0.12.5-1.mga6.src.rpm

CC: (none) => geiger.david68210
Assignee: geiger.david68210 => qa-bugs

Comment 5 David Walser 2018-05-04 07:37:22 CEST
Debian has issued an advisory for this on May 2:
https://www.debian.org/security/2018/dsa-4189
Comment 6 Herman Viaene 2018-05-09 10:28:52 CEST
MGA5-32 on Dell Latitude D600 Xfce
No installation issues.
Could use quassel to connect to irc.freenode.org channel #mageia-qa. I see the list of users, I can post, but no one responded>
Seems OK to me.

Whiteboard: MGA5TOO => MGA5TOO MGA5-32-OK
CC: (none) => herman.viaene

Comment 7 Len Lawrence 2018-05-10 00:39:42 CEST
Mageia 6, x86_64.

Installed and updated the packages.
Before the update ran the wizard.
$ quassel
Opened the gui at freenode.  Connected to #mageia-qa after giving my password.
Nobody about - talking to myself.

It works OK.

CC: (none) => tarazed25
Whiteboard: MGA5TOO MGA5-32-OK => MGA5TOO MGA5-32-OK MGA6-64-OK

Lewis Smith 2018-05-13 19:47:05 CEST

Keywords: (none) => advisory, validated_update
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2018-05-16 10:26:31 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2018-0243.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.