Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1486328074.8813.2.camel@gmail.com>
Date: Sun, 05 Feb 2017 21:54:34 +0100
From: Ailin Nemui <ailin.nemui@...il.com>
To: oss-security@...ts.openwall.com
Subject: Irssi 1.0.0 minor remote memory leak

Hi,

Joseph Bisch has detected a remote memory leak in some cases where a
hostile server would send certain incomplete SASL replies. According to
his calculations, the server would need to send 13 times the amount of
memory it wants to leak. The issue is a missing free of the base64
data. Please advise whether that issue needs a CVE?  

Patch: https://github.com/irssi/irssi/commit/19c51789967a2f63da033e60f6
ef08848b9cd144

Furthermore, Hanno Böck found the issue of a missing NULL sentinel when
initialising Perl, which crashes under ASan. Since this happens only on
boot and is not exposed to the net, we have no reason to believe that
there is any issue here. Also, that bug has been around since the
inception of Perl scripting module.

Patch: https://github.com/irssi/irssi/pull/619/commits/677fb1f55ca52d0e
43c93f7d8361d333ff5bffd6

In any case, those issues have been addressed in Irssi 1.0.1

Thanks for your attention,

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.