A remotely exploitable off-by-one was found in irssi 0.8.13. It's exloitable from a server only. See $URL and http://xorl.wordpress.com/2009/05/28/irssi-event_wallops-off-by-one-readwrite/
The patch from svn has been included in irssi-0.8.13-r1.
Arches, please test and mark stable: =net-irc/irssi-0.8.13-r1 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
ppc64 done
Stable on amd64
alpha/arm/ia64/s390/sh/sparc/x86 stable
Stable for HPPA.
ppc stable
CVE-2009-1959 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1959): Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.
GLSA request filed.
Sven, can we remove the older, vulnerable versions?
(In reply to comment #10) > Sven, can we remove the older, vulnerable versions? we're still missing mips keywording, 0.8.12 is the last stable mips version.
MIPS has dropped stable support, you can simply remove that old stable ebuild and remove stable keywords from all that depends on it. Adding MIPS team to confirm this.
Any reason to have vulnerable ebuilds in tree?
I've removed them, dropping the mips stable keyword.
still the glsa that needs to be sent, it's already in the queue
GLSA 200909-13