Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 811603 (CVE-2021-40516) - <net-irc/weechat-3.3: Websocket vulnerability in relay plugin
Summary: <net-irc/weechat-3.3: Websocket vulnerability in relay plugin
Status: IN_PROGRESS
Alias: CVE-2021-40516
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa?]
Keywords:
Depends on: 816240 816696
Blocks:
  Show dependency tree
 
Reported: 2021-09-04 20:56 UTC by Sam James
Modified: 2021-10-12 16:49 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester gentoo-dev Security 2021-09-04 20:56:19 UTC
From email to weechat-security@nongnu.org:
```
Hi all,

A security vulnerability has been fixed in WeeChat 3.2.1, which was released a
few hours ago: a malformed websocket frame sent to the relay plugin can cause a
buffer overflow and possibly a crash.

This happens only if you define a relay (irc or weechat), even if a password is
defined (the crash happens before the authentication of the client).

This vulnerability affects WeeChat versions from 0.4.1 to 3.2.

Some workarounds, if you can not upgrade:

- remove all relays
- unload the relay plugin
- secure relay to allow only some trusted IP addresses
 (option relay.network.allowed_ips).

Thanks to Stuart Nevans Locke for reporting the problem.

For more info, please visit the WeeChat security page:
https://weechat.org/doc/security/

-- 
Sébastien Helleu
```
Comment 1 Sam James archtester gentoo-dev Security 2021-09-21 00:11:00 UTC
ping
Comment 2 Georgy Yakovlev gentoo-dev 2021-10-12 16:29:31 UTC
bumpage, stabilization and cleanup done. please proceed with security things =)
Comment 3 John Helmert III gentoo-dev Security 2021-10-12 16:49:18 UTC
Thanks!