MGASA-2017-0393

Source
https://advisories.mageia.org/MGASA-2017-0393.html
Import Source
https://advisories.mageia.org/MGASA-2017-0393.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0393
Related
Published
2017-10-30T19:23:17Z
Modified
2017-10-30T10:34:56Z
Summary
Updated irssi packages fix security vulnerabilities
Details

While waiting for the channel synchronization, Irssi may incorrectly fail to remove destroyed channels from the query list, resulting in use after free conditions when updating the state later on (CVE-2017-15227).

When installing themes with unterminated color formatting sequences, Irssi may access data beyond the end of the string. (CVE-2017-15228).

Certain incorrectly formatted DCC CTCP messages could cause NULL pointer dereference (CVE-2017-15721).

In certain cases Irssi may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string (CVE-2017-15722).

Overlong nicks or targets may result in a NULL pointer dereference while splitting the message (CVE-2017-15723).

References
Credits

Affected packages