|
|
Message-ID: <fccdd50d1a8afe0fa1b3d9d45a92aa245ad05121.camel@gmail.com>
Date: Thu, 29 Aug 2019 17:59:34 +0200
From: Ailin Nemui <ailin.nemui@...il.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: Irssi 1.2.2:CVE-2019-15717
IRSSI-SA-2019-08 Irssi Security Advisory [1]
============================================
CVE-2019-15717
Description
-----------
(a) Use after free when receiving duplicate CAP found by Joseph Bisch.
(CWE-416)
CVE-2019-15717 [2] was assigned to this issue.
Impact
------
May affect the stability of Irssi.
Affected versions
-----------------
(a) Irssi 1.2.0 and later
Fixed in
--------
Irssi 1.2.2
Recommended action
------------------
Upgrade to Irssi 1.2.2. We've published maintenance releases, without
any new features.
After installing the updated packages, one can issue the /upgrade
command to load the new binary. TLS connections will require /reconnect.
Mitigating facts
----------------
Most servers do not send duplicate CAP
References
----------
[1] https://irssi.org/security/irssi_sa_2019_08.txt
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15717
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.