{"id":"MGASA-2015-0147","summary":"Updated quassel packages fix security vulnerabilities","details":"Updated quassel packages fix security vulnerabilities:\n\nQuassel could crash when receiving an overlength CTCP query containing only\nmultibyte characters (CVE-2015-2778).\n\nQuassel could incorrectly split a message in the middle of a multibyte\ncharacter, leading to a denial of service (CVE-2015-2779).\n","modified":"2026-04-16T06:26:12.640633790Z","published":"2015-04-15T09:01:28Z","upstream":["CVE-2015-2778","CVE-2015-2779"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0147.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15544"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html"}],"affected":[{"package":{"name":"quassel","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/quassel?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.2-1.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0147.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}