Updated irssi packages fix security vulnerabilities
Publication date: 30 Oct 2017Modification date: 30 Oct 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-15227 , CVE-2017-15228 , CVE-2017-15721 , CVE-2017-15722 , CVE-2017-15723
Description
While waiting for the channel synchronization, Irssi may incorrectly fail to remove destroyed channels from the query list, resulting in use after free conditions when updating the state later on (CVE-2017-15227). When installing themes with unterminated color formatting sequences, Irssi may access data beyond the end of the string. (CVE-2017-15228). Certain incorrectly formatted DCC CTCP messages could cause NULL pointer dereference (CVE-2017-15721). In certain cases Irssi may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string (CVE-2017-15722). Overlong nicks or targets may result in a NULL pointer dereference while splitting the message (CVE-2017-15723).
References
- https://bugs.mageia.org/show_bug.cgi?id=21918
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15227
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15722
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15723
SRPMS
6/core
- irssi-1.0.5-1.mga6
5/core
- irssi-0.8.21-1.3.mga5