Home / mailingsPDF  

[USN-1230-1] Quassel vulnerability

Posted on 14 October 2011
Ubuntu Security

--===============6513712852761344782==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="Kj7319i9nmIyA2yE"
Content-Disposition: inline


--Kj7319i9nmIyA2yE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-1230-1
October 14, 2011

quassel vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS

Summary:

An unprivileged user could read files in the data and logging directories,
including an automatically generated SSL certificate, used by the quasselcore
daemon.

Software Description:
- quassel: KDE/Qt-based IRC client

Details:

Felix Geyer discovered that the quassel-core post installation script created
data and logging directories which were readable by all users. The post
installation script also generated a certificate, in the data directory, which
was readable by all users.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.04:
quassel-core 0.7.2-0ubuntu2.3

Ubuntu 10.10:
quassel-core 0.7.1-0ubuntu1.2

Ubuntu 10.04 LTS:
quassel-core 0.6.1-0ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1230-1
https://launchpad.net/bugs/846922

Package Information:
https://launchpad.net/ubuntu/+source/quassel/0.7.2-0ubuntu2.3
https://launchpad.net/ubuntu/+source/quassel/0.7.1-0ubuntu1.2
https://launchpad.net/ubuntu/+source/quassel/0.6.1-0ubuntu1.3

 

TOP