Debian: DSA-3063-1: quassel security update
Debian: DSA-3063-1: quassel security update
An out-of-bounds read vulnerability was discovered in Quassel-core, one of the components of the distributed IRC client Quassel. An attacker can send a crafted message that crash to component causing a denial of services or disclosure of information from process memory.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3063-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Luciano Bello November 02, 2014 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : quassel CVE ID : CVE-2014-8483 Debian Bug : 766962 An out-of-bounds read vulnerability was discovered in Quassel-core, one of the components of the distributed IRC client Quassel. An attacker can send a crafted message that crash to component causing a denial of services or disclosure of information from process memory. For the stable distribution (wheezy), this problem has been fixed in version 0.8.0-1+deb7u3. For the unstable distribution (sid), this problem has been fixed in version 0.10.0-2.1 (will be available soon). We recommend that you upgrade your quassel packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.