Summary: | <net-irc/quassel-0.9.1: SQL injection (CVE-2013-4422) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Mikle Kolyada (RETIRED) <zlogene> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | net-irc, patrick, proxy-maint, sputnick |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/oss-sec/2013/q4/45 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Mikle Kolyada (RETIRED)
![]() ![]() ![]() ![]() Upstream has released 0.9.1 which contains the fix. 0.9.1 is already in tree. How about to start stabilization? + + 11 Oct 2013; Patrick Lauer <patrick@gentoo.org> +quassel-0.9.1.ebuild: + Bump + Arches, please test and mark stable: =net-irc/quassel-0.9.1 target KEYWORDS="amd64 ppc x86" Acked by Patrick amd64 stable Added to existing GLSA request. ppc stable x86 stable GLSA vote: no. (In reply to Chris Reffett from comment #9) > GLSA vote: no. We already have a GLSA request from prior bug. This was added to it. Affected versions dropped. CVE-2013-4422 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4422): SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message. This issue was resolved and addressed in GLSA 201311-03 at http://security.gentoo.org/glsa/glsa-201311-03.xml by GLSA coordinator Sean Amoss (ackle). |