Bugzilla – Bug 924933
VUL-0: CVE-2015-2779: quassel: incorrect message splitting leading to DoS
Last modified: 2015-04-08 14:08:15 UTC
rh#1205130 A denial-of-service flaw was found in Quassel IRC, a distributed IRC client: This patch fixes two bugs. The first is garbage characters caused by accidentally splitting the string in the middle of a multibyte character. Since the new code splits at a character level instead of a byte level, this will no longer be an issue. The second is the core crash caused by sending an overlength CTCP query ("/me") containing only multibyte characters. This bug was caused by the old CTCP splitter using the byte index from lastParamOverrun() as a character index for a QString. https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8 References: https://bugzilla.redhat.com/show_bug.cgi?id=1205130 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2779 http://seclists.org/oss-sec/2015/q1/1030
bugbot adjusting priority
Submit request sent.
releasing
openSUSE-SU-2015:0687-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 924930,924933 CVE References: CVE-2015-2778,CVE-2015-2779 Sources used: openSUSE 13.2 (src): quassel-0.10.0-3.7.1 openSUSE 13.1 (src): quassel-0.9.2-19.1