Security vulnerabilities in version 2.7.1

This page lists all known and fixed security vulnerabilities in version 2.7.1 (back to the list of all versions).

Overview: 5 vulnerabilities

WSA CVE Score Severity Issue Vulnerability type Scope Versions Fix Release date
WSA-2025-3 - 3.9
Integer overflow in conversion of version to an integer number. Integer Overflow or Wraparound Core 0.3.2 → 4.6.2 4.6.3
WSA-2025-2 - 3.9
Integer overflow in base32 decode/encode functions. Integer Overflow or Wraparound Core 2.4 → 4.6.2 4.6.3
WSA-2025-1 - 3.9
Integer overflow with decimal numbers in calculation of expression. Integer Overflow or Wraparound Core 2.7 → 4.6.2 4.6.3
WSA-2024-1 CVE-2024-46613 3.8
Integer overflow in loops on lists. Integer Overflow or Wraparound Core, Plugins 0.1.6 → 4.4.1 4.4.2
WSA-2021-1 CVE-2021-40516 7.5
Crash on malformed websocket frame in relay plugin. Out-of-bounds read Relay 0.4.1 → 3.2 3.2.1

WSA-2025-3: [Core] Integer overflow in conversion of version to an integer number.

Vulnerability
CVE
Not available
CVSS vector
AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C (detail)
CVSS score
3.9 / 10
Severity
medium
Vulnerability type
Integer Overflow or Wraparound (detail)
Scope
Core
Affected versions
0.3.2 → 4.6.2
Fixed version
4.6.3 () - ChangeLog
Tracker
Not available
Commits
Description
Integer overflow happens in conversion of a version as string to an integer number, if the version is greater than 0x7FFFFFFF (127.255.255.255), so if the version is at least 0x80000000 (128.0.0.0).
Mitigation
There is no known mitigation.
The upgrade to the latest stable version is highly recommended.

WSA-2025-2: [Core] Integer overflow in base32 decode/encode functions.

Vulnerability
CVE
Not available
CVSS vector
AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C (detail)
CVSS score
3.9 / 10
Severity
medium
Vulnerability type
Integer Overflow or Wraparound (detail)
Scope
Core
Affected versions
2.4 → 4.6.2
Fixed version
4.6.3 () - ChangeLog
Tracker
Not available
Commits
Description
An integer overflow may happen in base32 encode/decode functions.
Mitigation
There is no known mitigation.
The upgrade to the latest stable version is highly recommended.

WSA-2025-1: [Core] Integer overflow with decimal numbers in calculation of expression.

Vulnerability
CVE
Not available
CVSS vector
AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C (detail)
CVSS score
3.9 / 10
Severity
medium
Vulnerability type
Integer Overflow or Wraparound (detail)
Scope
Core
Affected versions
2.7 → 4.6.2
Fixed version
4.6.3 () - ChangeLog
Tracker
Not available
Commits
Description
An integer overflow happens when using numbers with 9 or more decimals in calculation of expression, for example: /eval -n ${calc:0.123456789}.
Mitigation
There is no known mitigation.
The upgrade to the latest stable version is highly recommended.

WSA-2024-1: [Core, Plugins] Integer overflow in loops on lists.

Vulnerability
CVE
CVE-2024-46613 [ MITRE / NVD ]
CVSS vector
AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C (detail)
CVSS score
3.8 / 10
Severity
low
Vulnerability type
Integer Overflow or Wraparound (detail)
Scope
Core, Plugins
Affected versions
0.1.6 → 4.4.1
Fixed version
4.4.2 () - ChangeLog
Tracker
Description
An integer overflow can happen when looping over items in a list.
This can only happen in rare conditions on 32 and 64-bit systems, as the list must contain more than 2,147,483,647 elements.
On 16-bit systems, this happens with a list that contains more than 32,767 elements.
Mitigation
There is no known mitigation.
The upgrade to the latest stable version is highly recommended.
Credit
The issue was discovered by Yiheng Cao.

WSA-2021-1: [Relay] Crash on malformed websocket frame in relay plugin.

Vulnerability
CVE
CVE-2021-40516 [ MITRE / NVD ]
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (detail)
CVSS score
7.5 / 10
Severity
high
Vulnerability type
Out-of-bounds read (detail)
Scope
Relay
Affected versions
0.4.1 → 3.2
Fixed version
3.2.1 () - ChangeLog
Tracker
Not available
Commits
Description
A crash happens when decoding a malformed websocket frame in relay plugin.
This happens even if a password is set in relay plugin, the malformed websocket frame can be received before the authentication of the client.
Mitigation
There are multiple ways to mitigate this issue:
Credit
The issue was discovered by Stuart Nevans Locke.