|
Message-ID: <fccdd50d1a8afe0fa1b3d9d45a92aa245ad05121.camel@gmail.com> Date: Thu, 29 Aug 2019 17:59:34 +0200 From: Ailin Nemui <ailin.nemui@...il.com> To: oss-security <oss-security@...ts.openwall.com> Subject: Irssi 1.2.2:CVE-2019-15717 IRSSI-SA-2019-08 Irssi Security Advisory [1] ============================================ CVE-2019-15717 Description ----------- (a) Use after free when receiving duplicate CAP found by Joseph Bisch. (CWE-416) CVE-2019-15717 [2] was assigned to this issue. Impact ------ May affect the stability of Irssi. Affected versions ----------------- (a) Irssi 1.2.0 and later Fixed in -------- Irssi 1.2.2 Recommended action ------------------ Upgrade to Irssi 1.2.2. We've published maintenance releases, without any new features. After installing the updated packages, one can issue the /upgrade command to load the new binary. TLS connections will require /reconnect. Mitigating facts ---------------- Most servers do not send duplicate CAP References ---------- [1] https://irssi.org/security/irssi_sa_2019_08.txt [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15717
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.