Fedora 35: weechat 2022-127b6e8a95 | LinuxSecurity.com
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-127b6e8a95
2022-06-01 01:25:20.629804
--------------------------------------------------------------------------------

Name        : weechat
Product     : Fedora 35
Version     : 3.5
Release     : 2.fc35
URL         : https://weechat.org
Summary     : Portable, fast, light and extensible IRC client
Description :
WeeChat (Wee Enhanced Environment for Chat) is a portable, fast, light and
extensible IRC client. Everything can be done with a keyboard.
It is customizable and extensible with scripts.

--------------------------------------------------------------------------------
Update Information:

Update to new upstream version.
--------------------------------------------------------------------------------
ChangeLog:

* Sun May 22 2022 Paul Komkoff  3.5-2
- Update to new upstream version 3.5
* Sun May 22 2022 Paul Komkoff  3.5-1
- Update to new upstream version 3.5
* Wed Jan 26 2022 Mamoru TASAKA  3.4-8
- F-36: rebuild against ruby31
* Sat Jan 22 2022 Fedora Release Engineering  3.4-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2063588 - weechat-3.5 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2063588
  [ 2 ] Bug #2063855 - weechat: SSL verification vulnerability [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2063855
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-127b6e8a95' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 35: weechat 2022-127b6e8a95

May 31, 2022
Update to new upstream version.

Summary

WeeChat (Wee Enhanced Environment for Chat) is a portable, fast, light and

extensible IRC client. Everything can be done with a keyboard.

It is customizable and extensible with scripts.

Update Information:

Update to new upstream version.

Change Log

* Sun May 22 2022 Paul Komkoff 3.5-2 - Update to new upstream version 3.5 * Sun May 22 2022 Paul Komkoff 3.5-1 - Update to new upstream version 3.5 * Wed Jan 26 2022 Mamoru TASAKA 3.4-8 - F-36: rebuild against ruby31 * Sat Jan 22 2022 Fedora Release Engineering 3.4-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild

References

[ 1 ] Bug #2063588 - weechat-3.5 is available https://bugzilla.redhat.com/show_bug.cgi?id=2063588 [ 2 ] Bug #2063855 - weechat: SSL verification vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2063855

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-127b6e8a95' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : weechat
Product : Fedora 35
Version : 3.5
Release : 2.fc35
URL : https://weechat.org
Summary : Portable, fast, light and extensible IRC client

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.