Packages
- weechat - Fast, light and extensible chat client (metapackage)
Details
Stuart Nevans Locke discovered that WeeChat’s relay plugin insecurely handled
malformed websocket frames. A remote attacker in control of a server
could possibly use this issue to cause denial of service in a client.
(CVE-2021-40516)
Stuart Nevans Locke discovered that WeeChat insecurely handled certain
IRC messages. A remote attacker in control of a server could possibly use
this issue to cause denial of service in a client. This issue only affected
Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2020-9760)
Stuart Nevans Locke discovered that WeeChat insecurely handled certain
IRC messages. A remote unauthenticated attacker could possibly use these
issues to cause denial of service in a client. These issues only affected
Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2020-9759,
Stuart Nevans Locke discovered that WeeChat’s relay plugin insecurely handled
malformed websocket frames. A remote attacker in control of a server
could possibly use this issue to cause denial of service in a client.
(CVE-2021-40516)
Stuart Nevans Locke discovered that WeeChat insecurely handled certain
IRC messages. A remote attacker in control of a server could possibly use
this issue to cause denial of service in a client. This issue only affected
Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2020-9760)
Stuart Nevans Locke discovered that WeeChat insecurely handled certain
IRC messages. A remote unauthenticated attacker could possibly use these
issues to cause denial of service in a client. These issues only affected
Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2020-9759, CVE-2020-8955)
Joseph Bisch discovered that WeeChat’s logger incorrectly handled certain
memory operations when handling log file names. A remote attacker could possibly
use this issue to cause denial of service in a client. This issue only
affected Ubuntu 16.04 ESM. (CVE-2017-14727)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
20.04 focal | weechat-python – 2.8-1ubuntu0.1~esm1 | ||
weechat-plugins – 2.8-1ubuntu0.1~esm1 | |||
weechat-guile – 2.8-1ubuntu0.1~esm1 | |||
weechat-core – 2.8-1ubuntu0.1~esm1 | |||
weechat-tcl – 2.8-1ubuntu0.1~esm1 | |||
weechat-ruby – 2.8-1ubuntu0.1~esm1 | |||
weechat-php – 2.8-1ubuntu0.1~esm1 | |||
weechat-perl – 2.8-1ubuntu0.1~esm1 | |||
weechat – 2.8-1ubuntu0.1~esm1 | |||
weechat-lua – 2.8-1ubuntu0.1~esm1 | |||
weechat-headless – 2.8-1ubuntu0.1~esm1 | |||
18.04 bionic | weechat-core – 1.9.1-1ubuntu1+esm1 | ||
weechat-curses – 1.9.1-1ubuntu1+esm1 | |||
weechat-plugins – 1.9.1-1ubuntu1+esm1 | |||
weechat – 1.9.1-1ubuntu1+esm1 | |||
16.04 xenial | weechat-core – 1.4-2ubuntu0.1+esm1 | ||
weechat-curses – 1.4-2ubuntu0.1+esm1 | |||
weechat-plugins – 1.4-2ubuntu0.1+esm1 | |||
weechat – 1.4-2ubuntu0.1+esm1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.