All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] irssi: security bump to version 1.0.5
@ 2017-10-23 23:08 Peter Korsgaard
  2017-10-25  7:44 ` Peter Korsgaard
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-23 23:08 UTC (permalink / raw)
  To: buildroot

Fixes the following security issues:

(a) When installing themes with unterminated colour formatting
    sequences, Irssi may access data beyond the end of the
    string. (CWE-126) Found by Hanno B?ck.

    CVE-2017-15228 was assigned to this issue.

(b) While waiting for the channel synchronisation, Irssi may
    incorrectly fail to remove destroyed channels from the query list,
    resulting in use after free conditions when updating the state
    later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

    CVE-2017-15227 was assigned to this issue.

(c) Certain incorrectly formatted DCC CTCP messages could cause NULL
    pointer dereference. Found by Joseph Bisch. This is a separate,
    but similar issue to CVE-2017-9468. (CWE-690)

    CVE-2017-15721 was assigned to this issue.

(d) Overlong nicks or targets may result in a NULL pointer dereference
    while splitting the message. Found by Joseph Bisch. (CWE-690)

    CVE-2017-15723 was assigned to this issue.

(e) In certain cases Irssi may fail to verify that a Safe channel ID
    is long enough, causing reads beyond the end of the string. Found
    by Joseph Bisch. (CWE-126)

    CVE-2017-15722 was assigned to this issue.

For more details, see the advisory:
https://irssi.org/security/irssi_sa_2017_10.txt

While we're at it, also add a hash for the license file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/irssi/irssi.hash | 4 +++-
 package/irssi/irssi.mk   | 2 +-
 2 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/package/irssi/irssi.hash b/package/irssi/irssi.hash
index 7b019025d8..0a6c3f614a 100644
--- a/package/irssi/irssi.hash
+++ b/package/irssi/irssi.hash
@@ -1,2 +1,4 @@
 # Locally calculated after checking pgp signature
-sha256	b85c07dbafe178213eccdc69f5f8f0ac024dea01c67244668f91ec1c06b986ca	irssi-1.0.4.tar.xz
+sha256	c2556427e12eb06cabfed40839ac6f57eb8b1aa6365fab6dfcd331b7a04bb914  irssi-1.0.5.tar.xz
+# Locally calculated
+sha256	a1a27cb2ecee8d5378fbb3562f577104a445d6d66fee89286e16758305e63e2b  COPYING
diff --git a/package/irssi/irssi.mk b/package/irssi/irssi.mk
index d2b8169479..f9450783bc 100644
--- a/package/irssi/irssi.mk
+++ b/package/irssi/irssi.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-IRSSI_VERSION = 1.0.4
+IRSSI_VERSION = 1.0.5
 IRSSI_SOURCE = irssi-$(IRSSI_VERSION).tar.xz
 # Do not use the github helper here. The generated tarball is *NOT* the
 # same as the one uploaded by upstream for the release.
-- 
2.11.0

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] irssi: security bump to version 1.0.5
  2017-10-23 23:08 [Buildroot] [PATCH] irssi: security bump to version 1.0.5 Peter Korsgaard
@ 2017-10-25  7:44 ` Peter Korsgaard
  2017-10-26 13:17 ` Peter Korsgaard
  2017-10-26 13:20 ` Peter Korsgaard
  2 siblings, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-25  7:44 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes the following security issues:
 > (a) When installing themes with unterminated colour formatting
 >     sequences, Irssi may access data beyond the end of the
 >     string. (CWE-126) Found by Hanno B?ck.

 >     CVE-2017-15228 was assigned to this issue.

 > (b) While waiting for the channel synchronisation, Irssi may
 >     incorrectly fail to remove destroyed channels from the query list,
 >     resulting in use after free conditions when updating the state
 >     later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

 >     CVE-2017-15227 was assigned to this issue.

 > (c) Certain incorrectly formatted DCC CTCP messages could cause NULL
 >     pointer dereference. Found by Joseph Bisch. This is a separate,
 >     but similar issue to CVE-2017-9468. (CWE-690)

 >     CVE-2017-15721 was assigned to this issue.

 > (d) Overlong nicks or targets may result in a NULL pointer dereference
 >     while splitting the message. Found by Joseph Bisch. (CWE-690)

 >     CVE-2017-15723 was assigned to this issue.

 > (e) In certain cases Irssi may fail to verify that a Safe channel ID
 >     is long enough, causing reads beyond the end of the string. Found
 >     by Joseph Bisch. (CWE-126)

 >     CVE-2017-15722 was assigned to this issue.

 > For more details, see the advisory:
 > https://irssi.org/security/irssi_sa_2017_10.txt

 > While we're at it, also add a hash for the license file.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] irssi: security bump to version 1.0.5
  2017-10-23 23:08 [Buildroot] [PATCH] irssi: security bump to version 1.0.5 Peter Korsgaard
  2017-10-25  7:44 ` Peter Korsgaard
@ 2017-10-26 13:17 ` Peter Korsgaard
  2017-10-26 13:20 ` Peter Korsgaard
  2 siblings, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-26 13:17 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes the following security issues:
 > (a) When installing themes with unterminated colour formatting
 >     sequences, Irssi may access data beyond the end of the
 >     string. (CWE-126) Found by Hanno B?ck.

 >     CVE-2017-15228 was assigned to this issue.

 > (b) While waiting for the channel synchronisation, Irssi may
 >     incorrectly fail to remove destroyed channels from the query list,
 >     resulting in use after free conditions when updating the state
 >     later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

 >     CVE-2017-15227 was assigned to this issue.

 > (c) Certain incorrectly formatted DCC CTCP messages could cause NULL
 >     pointer dereference. Found by Joseph Bisch. This is a separate,
 >     but similar issue to CVE-2017-9468. (CWE-690)

 >     CVE-2017-15721 was assigned to this issue.

 > (d) Overlong nicks or targets may result in a NULL pointer dereference
 >     while splitting the message. Found by Joseph Bisch. (CWE-690)

 >     CVE-2017-15723 was assigned to this issue.

 > (e) In certain cases Irssi may fail to verify that a Safe channel ID
 >     is long enough, causing reads beyond the end of the string. Found
 >     by Joseph Bisch. (CWE-126)

 >     CVE-2017-15722 was assigned to this issue.

 > For more details, see the advisory:
 > https://irssi.org/security/irssi_sa_2017_10.txt

 > While we're at it, also add a hash for the license file.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.02.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] irssi: security bump to version 1.0.5
  2017-10-23 23:08 [Buildroot] [PATCH] irssi: security bump to version 1.0.5 Peter Korsgaard
  2017-10-25  7:44 ` Peter Korsgaard
  2017-10-26 13:17 ` Peter Korsgaard
@ 2017-10-26 13:20 ` Peter Korsgaard
  2 siblings, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-26 13:20 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes the following security issues:
 > (a) When installing themes with unterminated colour formatting
 >     sequences, Irssi may access data beyond the end of the
 >     string. (CWE-126) Found by Hanno B?ck.

 >     CVE-2017-15228 was assigned to this issue.

 > (b) While waiting for the channel synchronisation, Irssi may
 >     incorrectly fail to remove destroyed channels from the query list,
 >     resulting in use after free conditions when updating the state
 >     later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

 >     CVE-2017-15227 was assigned to this issue.

 > (c) Certain incorrectly formatted DCC CTCP messages could cause NULL
 >     pointer dereference. Found by Joseph Bisch. This is a separate,
 >     but similar issue to CVE-2017-9468. (CWE-690)

 >     CVE-2017-15721 was assigned to this issue.

 > (d) Overlong nicks or targets may result in a NULL pointer dereference
 >     while splitting the message. Found by Joseph Bisch. (CWE-690)

 >     CVE-2017-15723 was assigned to this issue.

 > (e) In certain cases Irssi may fail to verify that a Safe channel ID
 >     is long enough, causing reads beyond the end of the string. Found
 >     by Joseph Bisch. (CWE-126)

 >     CVE-2017-15722 was assigned to this issue.

 > For more details, see the advisory:
 > https://irssi.org/security/irssi_sa_2017_10.txt

 > While we're at it, also add a hash for the license file.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.08.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-10-26 13:20 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-10-23 23:08 [Buildroot] [PATCH] irssi: security bump to version 1.0.5 Peter Korsgaard
2017-10-25  7:44 ` Peter Korsgaard
2017-10-26 13:17 ` Peter Korsgaard
2017-10-26 13:20 ` Peter Korsgaard

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.