Mageia 2020-0153: weechat security update
Summary
Updated weechat packages fix security vulnerabilities:
An issue was discovered in WeeChat before 2.7.1 (0.4.0 to 2.7 are
affected). A malformed message 352 (who) can cause a NULL pointer
dereference in the callback function, resulting in a crash
(CVE-2020-9759).
An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are
affected). When a new IRC message 005 is received with longer nick
prefixes, a buffer overflow and possibly a crash can happen when a
new mode is set for a nick (CVE-2020-9760).
References
- https://bugs.mageia.org/show_bug.cgi?id=26400
- https://www.debian.org/lts/security/2020/dla-2157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9759
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9760
Resolution
MGASA-2020-0153 - Updated weechat packages fix security vulnerabilities
SRPMS
- 7/core/weechat-2.7.1-1.mga7