-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3063-1                   security@debian.org
http://www.debian.org/security/                             Luciano Bello
November 02, 2014                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : quassel
CVE ID         : CVE-2014-8483
Debian Bug     : 766962

An out-of-bounds read vulnerability was discovered in Quassel-core, one 
of the components of the distributed IRC client Quassel. An attacker can 
send a crafted message that crash to component causing a denial of 
services or disclosure of information from process memory.

For the stable distribution (wheezy), this problem has been fixed in
version 0.8.0-1+deb7u3.

For the unstable distribution (sid), this problem has been fixed in
version 0.10.0-2.1 (will be available soon).

We recommend that you upgrade your quassel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3063-1: quassel security update

November 2, 2014
An out-of-bounds read vulnerability was discovered in Quassel-core, one of the components of the distributed IRC client Quassel

Summary

An out-of-bounds read vulnerability was discovered in Quassel-core, one
of the components of the distributed IRC client Quassel. An attacker can
send a crafted message that crash to component causing a denial of
services or disclosure of information from process memory.

For the stable distribution (wheezy), this problem has been fixed in
version 0.8.0-1+deb7u3.

For the unstable distribution (sid), this problem has been fixed in
version 0.10.0-2.1 (will be available soon).

We recommend that you upgrade your quassel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Package : quassel
CVE ID : CVE-2014-8483
Debian Bug : 766962

Related News