Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 635114 (CVE-2017-15227, CVE-2017-15228, CVE-2017-15721, CVE-2017-15722, CVE-2017-15723) - <net-irc/irssi-1.0.5: Multiple Vulnerabilities
Summary: <net-irc/irssi-1.0.5: Multiple Vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2017-15227, CVE-2017-15228, CVE-2017-15721, CVE-2017-15722, CVE-2017-15723
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on: CVE-2018-5205, CVE-2018-5206, CVE-2018-5207, CVE-2018-5208
Blocks:
  Show dependency tree
 
Reported: 2017-10-22 22:17 UTC by Aleksandr Wagner (Kivak)
Modified: 2018-03-22 23:34 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aleksandr Wagner (Kivak) 2017-10-22 22:17:20 UTC
CVE-2017-15722 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15722):

In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string. 

References:

http://openwall.com/lists/oss-security/2017/10/22/4
https://irssi.org/security/irssi_sa_2017_10.txt

CVE-2017-15723 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15723):

In Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message. 

References:

http://openwall.com/lists/oss-security/2017/10/22/4
https://irssi.org/security/irssi_sa_2017_10.txt

CVE-2017-15721 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15721):

In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468. 

References:

http://openwall.com/lists/oss-security/2017/10/22/4
https://irssi.org/security/irssi_sa_2017_10.txt

CVE-2017-15228 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15228):

Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string. 

References:

http://openwall.com/lists/oss-security/2017/10/22/4
https://irssi.org/security/irssi_sa_2017_10.txt

CVE-2017-15227 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15227):

Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on. 

http://openwall.com/lists/oss-security/2017/10/22/4
https://irssi.org/security/irssi_sa_2017_10.txt

@ Maintainer(s): Please state when version 1.0.5 is ready for stabilization.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2017-10-23 16:53:32 UTC
CVE-2017-15723 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15723):
  In Irssi before 1.0.5, overlong nicks or targets may result in a NULL
  pointer dereference while splitting the message.

CVE-2017-15722 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15722):
  In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel
  ID is long enough, causing reads beyond the end of the string.

CVE-2017-15721 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15721):
  In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could
  cause a NULL pointer dereference. This is a separate, but similar, issue
  relative to CVE-2017-9468.

CVE-2017-15228 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15228):
  Irssi before 1.0.5, when installing themes with unterminated colour
  formatting sequences, may access data beyond the end of the string.

CVE-2017-15227 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15227):
  Irssi before 1.0.5, while waiting for the channel synchronisation, may
  incorrectly fail to remove destroyed channels from the query list, resulting
  in use-after-free conditions when updating the state later on.
Comment 2 Patrice Clement gentoo-dev 2017-12-23 23:05:25 UTC
Arch teams,

Please stabilise:
=net-irc/irssi-1.0.5

Thanks!
Comment 3 Thomas Deutschmann gentoo-dev Security 2017-12-26 00:59:46 UTC
x86 stable
Comment 4 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2017-12-26 23:00:07 UTC
amd64 stable
Comment 5 Sergei Trofimovich (RETIRED) gentoo-dev 2017-12-27 20:31:53 UTC
ia64 stable
Comment 6 Markus Meier gentoo-dev 2018-01-07 20:51:13 UTC
arm stable
Comment 7 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-01-07 23:03:48 UTC
stabilization moved to bug 643704
Comment 8 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2018-01-17 19:59:55 UTC
GLSA vote: no
Comment 9 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-03-22 23:34:57 UTC
cleanup will occur in bug #643704