USN-1230-1: Quassel vulnerability
14 October 2011
An unprivileged user could read files in the data and logging directories, including an automatically generated SSL certificate, used by the quasselcore daemon.
- quassel - KDE/Qt-based IRC client
Felix Geyer discovered that the quassel-core post installation script created
data and logging directories which were readable by all users. The post
installation script also generated a certificate, in the data directory, which
was readable by all users.
The problem can be corrected by updating your system to the following package versions:
In general, a standard system update will make all the necessary changes.