MGASA-2020-0153

Source
https://advisories.mageia.org/MGASA-2020-0153.html
Import Source
https://advisories.mageia.org/MGASA-2020-0153.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0153
Related
Published
2020-04-02T22:48:49Z
Modified
2020-04-02T22:24:23Z
Summary
Updated weechat packages fix security vulnerabilities
Details

Updated weechat packages fix security vulnerabilities:

An issue was discovered in WeeChat before 2.7.1 (0.4.0 to 2.7 are affected). A malformed message 352 (who) can cause a NULL pointer dereference in the callback function, resulting in a crash (CVE-2020-9759).

An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick (CVE-2020-9760).

References
Credits

Affected packages

Mageia:7 / weechat

Package

Name
weechat
Purl
pkg:rpm/mageia/weechat?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.1-1.mga7

Ecosystem specific

{
    "section": "core"
}