ALT-BU-2017-2883-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2016-10128
Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95338
- https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
- https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
- https://libgit2.github.com/security/
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95338
- https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
- https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
- https://libgit2.github.com/security/
Modified: 2025-04-20
CVE-2016-10129
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95339
- https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
- https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
- https://libgit2.github.com/security/
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95339
- https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
- https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
- https://libgit2.github.com/security/
Modified: 2025-04-20
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95359
- https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
- https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
- https://libgit2.github.com/security/
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
- http://www.openwall.com/lists/oss-security/2017/01/10/5
- http://www.openwall.com/lists/oss-security/2017/01/11/6
- http://www.securityfocus.com/bid/95359
- https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
- https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
- https://libgit2.github.com/security/
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-04302
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04303
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04304
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04305
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06328
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06329
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06330
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06331
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06332
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06333
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06334
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06335
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09787
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2014-3467
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/59021
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59408
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/60415
- http://secunia.com/advisories/61888
- http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html
- http://www.debian.org/security/2014/dsa-3056
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://www.novell.com/support/kb/doc.php?id=7015303
- https://bugzilla.redhat.com/show_bug.cgi?id=1102022
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/59021
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59408
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/60415
- http://secunia.com/advisories/61888
- http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html
- http://www.debian.org/security/2014/dsa-3056
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://www.novell.com/support/kb/doc.php?id=7015303
- https://bugzilla.redhat.com/show_bug.cgi?id=1102022
Modified: 2025-04-12
CVE-2014-3468
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/59021
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59408
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/60415
- http://secunia.com/advisories/61888
- http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html
- http://www.debian.org/security/2014/dsa-3056
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://www.novell.com/support/kb/doc.php?id=7015303
- https://bugzilla.redhat.com/show_bug.cgi?id=1102323
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/59021
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59408
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/60415
- http://secunia.com/advisories/61888
- http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html
- http://www.debian.org/security/2014/dsa-3056
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://www.novell.com/support/kb/doc.php?id=7015303
- https://bugzilla.redhat.com/show_bug.cgi?id=1102323
Modified: 2025-04-12
CVE-2014-3469
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/59021
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59408
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/60415
- http://secunia.com/advisories/61888
- http://www.debian.org/security/2014/dsa-3056
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://www.novell.com/support/kb/doc.php?id=7015303
- https://bugzilla.redhat.com/show_bug.cgi?id=1102329
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/59021
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59408
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/60415
- http://secunia.com/advisories/61888
- http://www.debian.org/security/2014/dsa-3056
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://www.novell.com/support/kb/doc.php?id=7015303
- https://bugzilla.redhat.com/show_bug.cgi?id=1102329
Closed vulnerabilities
Modified: 2025-04-11
CVE-2010-1155
Irssi before 0.8.15, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IRC servers via an arbitrary certificate.
- http://github.com/ensc/irssi-proxy/commit/85bbc05b21678e80423815d2ef1dfe26208491ab
- http://irssi.org/news
- http://irssi.org/news/ChangeLog
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://marc.info/?l=oss-security&m=127098845125270&w=2
- http://marc.info/?l=oss-security&m=127110132019166&w=2
- http://marc.info/?l=oss-security&m=127116251220784&w=2
- http://marc.info/?l=oss-security&m=127119240204394&w=2
- http://secunia.com/advisories/39365
- http://secunia.com/advisories/39620
- http://secunia.com/advisories/39797
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301
- http://www.ubuntu.com/usn/USN-929-1
- http://www.vupen.com/english/advisories/2010/0856
- http://www.vupen.com/english/advisories/2010/0987
- http://www.vupen.com/english/advisories/2010/1107
- http://www.vupen.com/english/advisories/2010/1110
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57790
- http://github.com/ensc/irssi-proxy/commit/85bbc05b21678e80423815d2ef1dfe26208491ab
- http://irssi.org/news
- http://irssi.org/news/ChangeLog
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://marc.info/?l=oss-security&m=127098845125270&w=2
- http://marc.info/?l=oss-security&m=127110132019166&w=2
- http://marc.info/?l=oss-security&m=127116251220784&w=2
- http://marc.info/?l=oss-security&m=127119240204394&w=2
- http://secunia.com/advisories/39365
- http://secunia.com/advisories/39620
- http://secunia.com/advisories/39797
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301
- http://www.ubuntu.com/usn/USN-929-1
- http://www.vupen.com/english/advisories/2010/0856
- http://www.vupen.com/english/advisories/2010/0987
- http://www.vupen.com/english/advisories/2010/1107
- http://www.vupen.com/english/advisories/2010/1110
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57790
Modified: 2025-04-11
CVE-2010-1156
core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.
- http://irssi.org/news
- http://irssi.org/news/ChangeLog
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://marc.info/?l=oss-security&m=127098845125270&w=2
- http://marc.info/?l=oss-security&m=127110132019166&w=2
- http://marc.info/?l=oss-security&m=127111071631857&w=2
- http://marc.info/?l=oss-security&m=127115784314970&w=2
- http://marc.info/?l=oss-security&m=127119240204394&w=2
- http://secunia.com/advisories/39365
- http://secunia.com/advisories/39620
- http://secunia.com/advisories/39797
- http://securitytracker.com/id?1023845
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301
- http://svn.irssi.org/cgi-bin/viewvc.cgi/irssi/trunk/src/core/nicklist.c?root=irssi&r1=4922&r2=5126
- http://www.ubuntu.com/usn/USN-929-1
- http://www.vupen.com/english/advisories/2010/0856
- http://www.vupen.com/english/advisories/2010/0987
- http://www.vupen.com/english/advisories/2010/1107
- http://www.vupen.com/english/advisories/2010/1110
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57791
- http://irssi.org/news
- http://irssi.org/news/ChangeLog
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://marc.info/?l=oss-security&m=127098845125270&w=2
- http://marc.info/?l=oss-security&m=127110132019166&w=2
- http://marc.info/?l=oss-security&m=127111071631857&w=2
- http://marc.info/?l=oss-security&m=127115784314970&w=2
- http://marc.info/?l=oss-security&m=127119240204394&w=2
- http://secunia.com/advisories/39365
- http://secunia.com/advisories/39620
- http://secunia.com/advisories/39797
- http://securitytracker.com/id?1023845
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301
- http://svn.irssi.org/cgi-bin/viewvc.cgi/irssi/trunk/src/core/nicklist.c?root=irssi&r1=4922&r2=5126
- http://www.ubuntu.com/usn/USN-929-1
- http://www.vupen.com/english/advisories/2010/0856
- http://www.vupen.com/english/advisories/2010/0987
- http://www.vupen.com/english/advisories/2010/1107
- http://www.vupen.com/english/advisories/2010/1110
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57791
Modified: 2025-04-12
CVE-2016-7044
The unformat_24bit_color function in the format parsing code in Irssi before 0.8.20, when compiled with true-color enabled, allows remote attackers to cause a denial of service (heap corruption and crash) via an incomplete 24bit color code.
- http://www.debian.org/security/2016/dsa-3672
- http://www.securitytracker.com/id/1036868
- http://www.ubuntu.com/usn/USN-3086-1
- https://irssi.org/security/irssi_sa_2016.txt
- http://www.debian.org/security/2016/dsa-3672
- http://www.securitytracker.com/id/1036868
- http://www.ubuntu.com/usn/USN-3086-1
- https://irssi.org/security/irssi_sa_2016.txt
Modified: 2025-04-12
CVE-2016-7045
The format_send_to_gui function in the format parsing code in Irssi before 0.8.20 allows remote attackers to cause a denial of service (heap corruption and crash) via vectors involving the length of a string.
- http://www.debian.org/security/2016/dsa-3672
- http://www.securitytracker.com/id/1036868
- http://www.ubuntu.com/usn/USN-3086-1
- https://irssi.org/security/irssi_sa_2016.txt
- http://www.debian.org/security/2016/dsa-3672
- http://www.securitytracker.com/id/1036868
- http://www.ubuntu.com/usn/USN-3086-1
- https://irssi.org/security/irssi_sa_2016.txt
Modified: 2025-04-20
CVE-2017-5193
The nickcmp function in Irssi before 0.8.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a message without a nick.
- http://www.openwall.com/lists/oss-security/2017/01/06/1
- http://www.securityfocus.com/bid/95310
- https://irssi.org/security/irssi_sa_2017_01.txt
- https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
- https://security.gentoo.org/glsa/201701-45
- http://www.openwall.com/lists/oss-security/2017/01/06/1
- http://www.securityfocus.com/bid/95310
- https://irssi.org/security/irssi_sa_2017_01.txt
- https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
- https://security.gentoo.org/glsa/201701-45
Modified: 2025-04-20
CVE-2017-5194
Use-after-free vulnerability in Irssi before 0.8.21 allows remote attackers to cause a denial of service (crash) via an invalid nick message.
- http://www.openwall.com/lists/oss-security/2017/01/06/1
- http://www.securityfocus.com/bid/95310
- https://irssi.org/security/irssi_sa_2017_01.txt
- https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
- https://security.gentoo.org/glsa/201701-45
- http://www.openwall.com/lists/oss-security/2017/01/06/1
- http://www.securityfocus.com/bid/95310
- https://irssi.org/security/irssi_sa_2017_01.txt
- https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
- https://security.gentoo.org/glsa/201701-45
Modified: 2025-04-20
CVE-2017-5356
Irssi before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a string containing a formatting sequence (%[) without a closing bracket (]).
- http://www.openwall.com/lists/oss-security/2017/01/12/8
- http://www.openwall.com/lists/oss-security/2017/01/13/2
- http://www.securityfocus.com/bid/96581
- https://blog.fuzzing-project.org/55-Fuzzing-Irssi-with-Perl-Scripts.html
- https://irssi.org/security/irssi_sa_2017_01.txt
- https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
- http://www.openwall.com/lists/oss-security/2017/01/12/8
- http://www.openwall.com/lists/oss-security/2017/01/13/2
- http://www.securityfocus.com/bid/96581
- https://blog.fuzzing-project.org/55-Fuzzing-Irssi-with-Perl-Scripts.html
- https://irssi.org/security/irssi_sa_2017_01.txt
- https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html