Name | CVE-2022-28352 |
Description | WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
weechat (PTS) | bullseye | 3.0-1+deb11u1 | fixed |
bookworm | 3.8-1 | fixed | |
trixie, sid | 4.4.3-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
weechat | source | stretch | (not affected) | |||
weechat | source | buster | (not affected) | |||
weechat | source | bullseye | (not affected) | |||
weechat | source | (unstable) | 3.4.1-1 |
[bullseye] - weechat <not-affected> (Vulnerable code introduced later)
[buster] - weechat <not-affected> (Vulnerable code introduced later)
[stretch] - weechat <not-affected> (Vulnerable code introduced later)
https://weechat.org/doc/security/WSA-2022-1/
https://github.com/weechat/weechat/issues/1763
Fixed by: https://github.com/weechat/weechat/commit/710247891cdfd4e66ee6d1715e93626def6871f1 (v3.4.1)
weechat.network.gnutls_ca_system/gnutls_ca_user introduced by: https://github.com/weechat/weechat/commit/c588ee21bc8fd33678893d5c67616033281032e3 (v3.2-rc1)