|
|
Subscribe / Log in / New account

Mageia alert MGASA-2020-0122 (weechat)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2020-0122: Updated weechat packages fix security vulnerability
Date:  Fri, 6 Mar 2020 17:15:12 +0100
Message-ID:  <20200306161512.65FBD9F74F@duvel.mageia.org>

MGASA-2020-0122 - Updated weechat packages fix security vulnerability Publication date: 06 Mar 2020 URL: https://advisories.mageia.org/MGASA-2020-0122.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-8955 Description: Updated weechat packages fix security vulnerability: irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode)(CVE-2020-8955). References: - https://bugs.mageia.org/show_bug.cgi?id=26267 - https://lists.opensuse.org/opensuse-updates/2020-02/msg00... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8955 SRPMS: - 7/core/weechat-2.4-2.1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds