1
Candidate: CVE-2015-8547
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8547
5
http://www.openwall.com/lists/oss-security/2015/12/12/1
7
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp
8
in Quassel 0.10.0 allows remote attackers to cause a denial of service
9
(application crash) via the "/op *" command in a query.
13
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807801
19
upstream: https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7
20
upstream: https://github.com/quassel/quassel/commit/7ecbc1bf921880f7b03af779de7d9611853a0d46 (0.10-beta1)
21
Tags_quassel: universe-binary
22
upstream_quassel: released (1:0.12.2-3)
23
precise_quassel: ignored (reached end-of-life)
24
precise/esm_quassel: DNE (precise was needed)
25
trusty_quassel: needed
26
vivid_quassel: ignored (reached end-of-life)
27
vivid/stable-phone-overlay_quassel: DNE
28
vivid/ubuntu-core_quassel: DNE
29
wily_quassel: ignored (reached end-of-life)
30
xenial_quassel: needed
31
yakkety_quassel: ignored (reached end-of-life)
32
zesty_quassel: ignored (reached end-of-life)
33
artful_quassel: not-affected (1:0.12.4-2ubuntu2)
34
bionic_quassel: not-affected (1:0.12.4-2ubuntu2)
35
devel_quassel: not-affected (1:0.12.4-2ubuntu2)