|
|
Subscribe / Log in / New account

Mageia alert MGASA-2020-0153 (weechat)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2020-0153: Updated weechat packages fix security vulnerabilities
Date:  Fri, 3 Apr 2020 00:49:46 +0200
Message-ID:  <20200402224946.50D5D9F63F@duvel.mageia.org>

MGASA-2020-0153 - Updated weechat packages fix security vulnerabilities Publication date: 02 Apr 2020 URL: https://advisories.mageia.org/MGASA-2020-0153.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-9759, CVE-2020-9760 Description: Updated weechat packages fix security vulnerabilities: An issue was discovered in WeeChat before 2.7.1 (0.4.0 to 2.7 are affected). A malformed message 352 (who) can cause a NULL pointer dereference in the callback function, resulting in a crash (CVE-2020-9759). An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick (CVE-2020-9760). References: - https://bugs.mageia.org/show_bug.cgi?id=26400 - https://www.debian.org/lts/security/2020/dla-2157 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9759 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9760 SRPMS: - 7/core/weechat-2.7.1-1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds