MGASA-2015-0147

Source
https://advisories.mageia.org/MGASA-2015-0147.html
Import Source
https://advisories.mageia.org/MGASA-2015-0147.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0147
Related
Published
2015-04-15T09:01:28Z
Modified
2015-04-15T08:47:13Z
Summary
Updated quassel packages fix security vulnerabilities
Details

Updated quassel packages fix security vulnerabilities:

Quassel could crash when receiving an overlength CTCP query containing only multibyte characters (CVE-2015-2778).

Quassel could incorrectly split a message in the middle of a multibyte character, leading to a denial of service (CVE-2015-2779).

References
Credits

Affected packages

Mageia:4 / quassel

Package

Name
quassel
Purl
pkg:rpm/mageia/quassel?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.2-1.2.mga4

Ecosystem specific

{
    "section": "core"
}