New upstream version
Fix arbitrary code execution due to call of shell when executing command within hook_process
Fix the security bug in the linked Bugzilla.
This update has been submitted for testing by stingray.
BZ#875181 CVE-2012-5854 weechat: Heap-based buffer overflow when decoding IRC colors
0
0
BZ#878025 CVE-2012-5534 weechat (scripts / plug-ins): Arbitrary code execution due to call of shell when executing command within hook_process
0
0
BZ#878027 CVE-2012-5534 weechat (scripts / plug-ins): Arbitrary code execution due to call of shell when executing command within hook_process [epel-6]
This update has been submitted for testing by stingray.
This update is currently being pushed to the Fedora EPEL 6 testing updates repository.
This update has been pushed to testing
This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by stingray.
This update is currently being pushed to the Fedora EPEL 6 stable updates repository.
This update has been pushed to stable