Summary: | <net-irc/irssi-1.0.5: Multiple Vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Aleksandr Wagner (Kivak) <alwag> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | monsieurp, swegener |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 643704 | ||
Bug Blocks: |
Description
Aleksandr Wagner (Kivak)
2017-10-22 22:17:20 UTC
CVE-2017-15723 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15723): In Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message. CVE-2017-15722 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15722): In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string. CVE-2017-15721 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15721): In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468. CVE-2017-15228 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15228): Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string. CVE-2017-15227 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15227): Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on. Arch teams, Please stabilise: =net-irc/irssi-1.0.5 Thanks! x86 stable amd64 stable ia64 stable arm stable stabilization moved to bug 643704 GLSA vote: no cleanup will occur in bug #643704 |