from URL: irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode) References: https://nvd.nist.gov/vuln/detail/CVE-2020-8955 https://weechat.org/doc/security/ https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ede8136c1e182c63ea9dfc6b434ec8c529dd2ebf commit ede8136c1e182c63ea9dfc6b434ec8c529dd2ebf Author: Georgy Yakovlev <gyakovlev@gentoo.org> AuthorDate: 2020-02-13 10:16:51 +0000 Commit: Georgy Yakovlev <gyakovlev@gentoo.org> CommitDate: 2020-02-13 10:17:12 +0000 net-irc/weechat: drop 2.6 Bug: https://bugs.gentoo.org/709452 Package-Manager: Portage-2.3.88, Repoman-2.3.20 Signed-off-by: Georgy Yakovlev <gyakovlev@gentoo.org> net-irc/weechat/Manifest | 1 - net-irc/weechat/weechat-2.6-r1.ebuild | 147 ---------------------------------- 2 files changed, 148 deletions(-) https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fed15324d74bdca04d5921143c7b19fce0d7dc03 commit fed15324d74bdca04d5921143c7b19fce0d7dc03 Author: Georgy Yakovlev <gyakovlev@gentoo.org> AuthorDate: 2020-02-13 10:15:54 +0000 Commit: Georgy Yakovlev <gyakovlev@gentoo.org> CommitDate: 2020-02-13 10:17:11 +0000 net-irc/weechat: 2.7-r2 stable x86 and amd64 Bug: https://bugs.gentoo.org/709452 Package-Manager: Portage-2.3.88, Repoman-2.3.20 Signed-off-by: Georgy Yakovlev <gyakovlev@gentoo.org> net-irc/weechat/weechat-2.7-r2.ebuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=90ebaefdcf0e3762b12a0b4cf107b284ebccae55 commit 90ebaefdcf0e3762b12a0b4cf107b284ebccae55 Author: Georgy Yakovlev <gyakovlev@gentoo.org> AuthorDate: 2020-02-13 10:13:54 +0000 Commit: Georgy Yakovlev <gyakovlev@gentoo.org> CommitDate: 2020-02-13 10:17:11 +0000 net-irc/weechat: revbump for CVE-2020-8955 Bug: https://bugs.gentoo.org/709452 Package-Manager: Portage-2.3.88, Repoman-2.3.20 Signed-off-by: Georgy Yakovlev <gyakovlev@gentoo.org> net-irc/weechat/files/2.7-CVE-2020-8955.patch | 46 ++++++++++++++++++++++ ...weechat-2.7-r1.ebuild => weechat-2.7-r2.ebuild} | 2 + 2 files changed, 48 insertions(+)
thanks for reporting, fixed in the tree, old versions removed.
that was fast, thank you!
2.7.1 is out and it includes this patch we already have and couple more, minimal changes to 2.7, so let's stabilize it. adding atom to package list and arches to CC.
2.7.1 ppc64 stable
An automated check of this bug failed - repoman reported dependency errors (29 lines truncated): > dependency.bad net-irc/weechat/weechat-2.7.1.ebuild: DEPEND: arm(default/linux/arm/17.0) ['dev-util/cpputest'] > dependency.badindev net-irc/weechat/weechat-2.7.1.ebuild: DEPEND: arm(default/linux/arm/17.0/armv4) ['dev-util/cpputest'] > dependency.badindev net-irc/weechat/weechat-2.7.1.ebuild: DEPEND: arm(default/linux/arm/17.0/armv4/desktop) ['dev-util/cpputest']
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
Tree is clean.
CVE-2020-8955 (https://nvd.nist.gov/vuln/detail/CVE-2020-8955): irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
GLSA Vote: No Maintainer(s), please drop the vulnerable version(s).
Please note I have filed another bug for more issues with weechat-2.7. I filed it separately for clarity given we've already moved forward with this bug. See bug 714086.
Title needs to become <net-irc/weechat-2.7-r2. Cleanup is now done (in bug 714086).
Added to an existing GLSA.
This issue was resolved and addressed in GLSA 202003-51 at https://security.gentoo.org/glsa/202003-51 by GLSA coordinator Thomas Deutschmann (whissi).