LWN.net Logo

Mageia alert MGASA-2012-0347 (weechat)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0347: weechat-0.3.0-1.1.mga1 (1/core), weechat-0.3.6-3.2.mga2 (2/core)
Date:  Fri, 30 Nov 2012 23:19:50 +0100
Message-ID:  <20121130221950.GA5212@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2012-0347 Date: November 30th, 2012 Affected releases: 1, 2 Description: Updated weechat packages fix security vulnerability: Untrusted command for function hook_process in WeeChat before 0.3.9.2 could lead to execution of commands, because of shell expansions (so the problem is only caused by some scripts, not by WeeChat itself) (CVE-2012-5534). Updated Packages: Mageia 1: weechat-0.3.0-1.1.mga1 weechat-aspell-0.3.0-1.1.mga1 weechat-charset-0.3.0-1.1.mga1 weechat-devel-0.3.0-1.1.mga1 weechat-lua-0.3.0-1.1.mga1 weechat-perl-0.3.0-1.1.mga1 weechat-python-0.3.0-1.1.mga1 weechat-ruby-0.3.0-1.1.mga1 weechat-tcl-0.3.0-1.1.mga1 Mageia 2: weechat-0.3.6-3.2.mga2 weechat-aspell-0.3.6-3.2.mga2 weechat-charset-0.3.6-3.2.mga2 weechat-devel-0.3.6-3.2.mga2 weechat-lua-0.3.6-3.2.mga2 weechat-perl-0.3.6-3.2.mga2 weechat-python-0.3.6-3.2.mga2 weechat-ruby-0.3.6-3.2.mga2 weechat-tcl-0.3.6-3.2.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5534 https://savannah.nongnu.org/bugs/?37764 http://www.weechat.org/security/ http://lists.opensuse.org/opensuse-updates/2012-11/msg000... https://bugs.mageia.org/show_bug.cgi?id=8235 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds