Summary: | <net-irc/quassel-0.9.2 : manipulated clients can access backlog of all users on a shared core (CVE-2013-6404) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | net-irc, patrick, proxy-maint, sputnick |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/11/28/2 | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() CVE-2013-6404 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6404): Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/. Arches, please test and mark stable =net-irc/quassel-0.9.2 Target keywords: amd64 ppc x86 ppc stable x86 stable amd64 stable @maintainer(s), please cleanup. @security, please vote. GLSA vote: no. + 23 Dec 2013; Sergey Popov <pinkbyte@gentoo.org> -quassel-0.9.1.ebuild: + Security cleanup, bug #492782 Thanks, folks GLSA vote: no Closing as noglsa |