[Bug 1190481] New: VUL-0: weechat: buffer overflow in the relay plugin
https://bugzilla.suse.com/show_bug.cgi?id=1190481 Bug ID: 1190481 Summary: VUL-0: weechat: buffer overflow in the relay plugin Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.3 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: mimi.vx@gmail.com Reporter: gianluca.gabrielli@suse.com QA Contact: security-team@suse.de Found By: --- Blocker: --- A security vulnerability has been fixed in WeeChat 3.2.1, which was released a few hours ago: a malformed websocket frame sent to the relay plugin can cause a buffer overflow and possibly a crash. This happens only if you define a relay (irc or weechat), even if a password is defined (the crash happens before the authentication of the client). This vulnerability affects WeeChat versions from 0.4.1 to 3.2. Some workarounds, if you can not upgrade: - remove all relays - unload the relay plugin - secure relay to allow only some trusted IP addresses (option relay.network.allowed_ips). Thanks to Stuart Nevans Locke for reporting the problem. For more info, please visit the WeeChat security page: https://weechat.org/doc/security/ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1190481
Maintenance Robot
participants (1)
-
bugzilla_noreply@suse.com