First published: Sun Nov 10 2024(Updated: )
WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WeeChat | >=0.1.6<4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46613 is classified with a high severity due to its potential to cause integer and buffer overflows.
To fix CVE-2024-46613, upgrade WeeChat to version 4.4.2 or later.
CVE-2024-46613 affects functions in core/core-string.c related to string handling and list management.
There is no known workaround for CVE-2024-46613, and upgrading is the recommended mitigation.
CVE-2024-46613 was reported for versions of WeeChat prior to 4.4.2.