It was discovered that weechat, a fast and light chat client, is prone
to a buffer overflow vulnerability in the IRC plugin, allowing a remote
attacker to cause a denial-of-service by sending a specially crafted
filename via DCC.
For the stable distribution (jessie), this problem has been fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you upgrade your weechat packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
Debian Security Advisory DSA-3836-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
April 27, 2017 https://www.debian.org/security/faq