From email to email@example.com:
A security vulnerability has been fixed in WeeChat 3.2.1, which was released a
few hours ago: a malformed websocket frame sent to the relay plugin can cause a
buffer overflow and possibly a crash.
This happens only if you define a relay (irc or weechat), even if a password is
defined (the crash happens before the authentication of the client).
This vulnerability affects WeeChat versions from 0.4.1 to 3.2.
Some workarounds, if you can not upgrade:
- remove all relays
- unload the relay plugin
- secure relay to allow only some trusted IP addresses
Thanks to Stuart Nevans Locke for reporting the problem.
For more info, please visit the WeeChat security page:
bumpage, stabilization and cleanup done. please proceed with security things =)