Bugzilla – Bug 1163889
VUL-0: CVE-2020-8955: weechat: denial of service in irc_mode_channel_update in plugins/irc/irc-mode.c
Last modified: 2022-03-14 16:21:12 UTC
rh#1803064 A vulnerability was found in irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode). Reference: https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da https://weechat.org/doc/security/ References: https://bugzilla.redhat.com/show_bug.cgi?id=1803064 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8955 http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8955.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8955 https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da https://weechat.org/doc/security/
From the looks of it still missing in Leap and Tumbleweed.
Upstream looks to me like there might be a version 2.7.1 incoming.
This is an autogenerated message for OBS integration: This bug (1163889) was mentioned in https://build.opensuse.org/request/show/774861 Factory / weechat https://build.opensuse.org/request/show/774865 15.1+Backports:SLE-15+Backports:SLE-15-SP1 / weechat
openSUSE-SU-2020:0248-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1163889 CVE References: CVE-2020-8955 Sources used: openSUSE Leap 15.1 (src): weechat-2.1-lp151.3.3.1 openSUSE Backports SLE-15-SP1 (src): weechat-2.1-bp151.4.3.1 openSUSE Backports SLE-15 (src): weechat-2.1-bp150.3.3.1
done