Name | TEMP-1081942-AF6ED5 |
Description | Integer Overflow to Buffer Overflow vulnerability in "string_free_split" functions |
Source | Automatically generated temporary name. Not for external reference. |
Debian Bugs | 1081942 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
weechat (PTS) | bullseye | 3.0-1+deb11u1 | vulnerable |
| bookworm | 3.8-1 | vulnerable |
| sid, trixie | 4.4.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
weechat | source | (unstable) | 4.4.2-1 | | | 1081942 |
Notes
[bookworm] - weechat <no-dsa> (Minor issue)
[bullseye] - weechat <postponed> (Minor issue)
https://weechat.org/doc/weechat/security/WSA-2024-1/
https://github.com/weechat/weechat/issues/2178
https://github.com/weechat/weechat/commit/315f769ab25643cf501a4bf8deb8025d92654303
https://github.com/weechat/weechat/commit/5564baf424d847144f13ee50f0988e4f3407e638
https://github.com/weechat/weechat/commit/62d0347d4bdee63694354184611b0b6af5028ff2
https://github.com/weechat/weechat/commit/970f20af31cbcce02a99368eb633e8c4082dfe64
https://github.com/weechat/weechat/commit/9aa0a94156c7cc367d52c31e60d8b03239d4dbd4