Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 29 Aug 2019 17:59:34 +0200
From: Ailin Nemui <ailin.nemui@...il.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: Irssi 1.2.2:CVE-2019-15717

IRSSI-SA-2019-08 Irssi Security Advisory [1]
============================================
CVE-2019-15717

Description
-----------

(a) Use after free when receiving duplicate CAP found by Joseph Bisch.
    (CWE-416)

    CVE-2019-15717 [2] was assigned to this issue.


Impact
------

May affect the stability of Irssi.


Affected versions
-----------------

(a) Irssi 1.2.0 and later


Fixed in
--------

Irssi 1.2.2


Recommended action
------------------

Upgrade to Irssi 1.2.2. We've published maintenance releases, without
any new features.

After installing the updated packages, one can issue the /upgrade
command to load the new binary. TLS connections will require /reconnect.


Mitigating facts
----------------

Most servers do not send duplicate CAP



References
----------

[1] https://irssi.org/security/irssi_sa_2019_08.txt
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15717


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.