It was discovered that Irssi incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service or to execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.8.15-5ubuntu3.6", "binary_name": "irssi" }, { "binary_version": "0.8.15-5ubuntu3.6", "binary_name": "irssi-dev" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.8.19-1ubuntu1.8", "binary_name": "irssi" }, { "binary_version": "0.8.19-1ubuntu1.8", "binary_name": "irssi-dev" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.0.5-1ubuntu4.1", "binary_name": "irssi" }, { "binary_version": "1.0.5-1ubuntu4.1", "binary_name": "irssi-dev" } ] }