Home / mailings [USN-1230-1] Quassel vulnerability
Posted on 14 October 2011
Ubuntu Security--===============6513712852761344782==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="Kj7319i9nmIyA2yE"
Content-Disposition: inline
--Kj7319i9nmIyA2yE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================================
Ubuntu Security Notice USN-1230-1
October 14, 2011
quassel vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
An unprivileged user could read files in the data and logging directories,
including an automatically generated SSL certificate, used by the quasselcore
daemon.
Software Description:
- quassel: KDE/Qt-based IRC client
Details:
Felix Geyer discovered that the quassel-core post installation script created
data and logging directories which were readable by all users. The post
installation script also generated a certificate, in the data directory, which
was readable by all users.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
quassel-core 0.7.2-0ubuntu2.3
Ubuntu 10.10:
quassel-core 0.7.1-0ubuntu1.2
Ubuntu 10.04 LTS:
quassel-core 0.6.1-0ubuntu1.3
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1230-1
https://launchpad.net/bugs/846922
Package Information:
https://launchpad.net/ubuntu/+source/quassel/0.7.2-0ubuntu2.3
https://launchpad.net/ubuntu/+source/quassel/0.7.1-0ubuntu1.2
https://launchpad.net/ubuntu/+source/quassel/0.6.1-0ubuntu1.3