[ubuntu/zesty-security] irssi 0.8.20-2ubuntu2.3 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Wed Jan 10 13:21:00 UTC 2018
irssi (0.8.20-2ubuntu2.3) zesty-security; urgency=medium
* SECURITY UPDATE: buffer overread via incomplete escape codes
- debian/patches/CVE-2018-5205.patch: check for complete char in
src/core/misc.c.
- CVE-2018-5205
* SECURITY UPDATE: NULL dereference via setting channel topic without
specifying a sender
- debian/patches/CVE-2018-5206.patch: do not record topic change time
when sender is blank in src/irc/core/channel-events.c.
- CVE-2018-5206
* SECURITY UPDATE: buffer overread via incomplete variable argument
- debian/patches/CVE-2018-5207.patch: disable variable arguments code
in src/core/special-vars.c.
- CVE-2018-5207
* SECURITY UPDATE: heap overflow in completion code
- debian/patches/CVE-2018-5208.patch: check for direct match of
separator in src/fe-common/core/completion.c.
- CVE-2018-5208
Date: 2018-01-08 20:07:12.643770+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/irssi/0.8.20-2ubuntu2.3
-------------- next part --------------
Sorry, changesfile not available.
More information about the Zesty-changes
mailing list