
openSUSE Security Update: Security update for weechat ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1150-1 Rating: moderate References: #1036467 Cross-References: CVE-2017-8073 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for weechat fixes one security issues: - CVE-2017-8073: WeeChat allowed a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow (bsc#1036467). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-536=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): weechat-1.5-2.3.1 weechat-aspell-1.5-2.3.1 weechat-aspell-debuginfo-1.5-2.3.1 weechat-debuginfo-1.5-2.3.1 weechat-debugsource-1.5-2.3.1 weechat-devel-1.5-2.3.1 weechat-doc-1.5-2.3.1 weechat-guile-1.5-2.3.1 weechat-guile-debuginfo-1.5-2.3.1 weechat-lua-1.5-2.3.1 weechat-lua-debuginfo-1.5-2.3.1 weechat-perl-1.5-2.3.1 weechat-perl-debuginfo-1.5-2.3.1 weechat-python-1.5-2.3.1 weechat-python-debuginfo-1.5-2.3.1 weechat-ruby-1.5-2.3.1 weechat-ruby-debuginfo-1.5-2.3.1 weechat-tcl-1.5-2.3.1 weechat-tcl-debuginfo-1.5-2.3.1 - openSUSE Leap 42.2 (noarch): weechat-lang-1.5-2.3.1 References: https://www.suse.com/security/cve/CVE-2017-8073.html https://bugzilla.suse.com/1036467