aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGravatar Peter Korsgaard <peter@korsgaard.com>2017-10-24 01:08:36 +0200
committerGravatar Peter Korsgaard <peter@korsgaard.com>2017-10-26 15:14:45 +0200
commit2fbb653713d89da1a1f032a8b30833a1aad29205 (patch)
tree56f45da25516ec26006e4075afab9c13f722a212
parent98bd08f6037d5157a6cd8dff78a2fcd7049531f0 (diff)
downloadbuildroot-2fbb653713d89da1a1f032a8b30833a1aad29205.tar.gz
buildroot-2fbb653713d89da1a1f032a8b30833a1aad29205.tar.bz2
irssi: security bump to version 1.0.5
Fixes the following security issues: (a) When installing themes with unterminated colour formatting sequences, Irssi may access data beyond the end of the string. (CWE-126) Found by Hanno Böck. CVE-2017-15228 was assigned to this issue. (b) While waiting for the channel synchronisation, Irssi may incorrectly fail to remove destroyed channels from the query list, resulting in use after free conditions when updating the state later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672) CVE-2017-15227 was assigned to this issue. (c) Certain incorrectly formatted DCC CTCP messages could cause NULL pointer dereference. Found by Joseph Bisch. This is a separate, but similar issue to CVE-2017-9468. (CWE-690) CVE-2017-15721 was assigned to this issue. (d) Overlong nicks or targets may result in a NULL pointer dereference while splitting the message. Found by Joseph Bisch. (CWE-690) CVE-2017-15723 was assigned to this issue. (e) In certain cases Irssi may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string. Found by Joseph Bisch. (CWE-126) CVE-2017-15722 was assigned to this issue. For more details, see the advisory: https://irssi.org/security/irssi_sa_2017_10.txt While we're at it, also add a hash for the license file. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit a9a4ec0dcce4500319e00e7d875414d6bc6606fa) Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
-rw-r--r--package/irssi/irssi.hash4
-rw-r--r--package/irssi/irssi.mk2
2 files changed, 4 insertions, 2 deletions
diff --git a/package/irssi/irssi.hash b/package/irssi/irssi.hash
index 7b019025d8..0a6c3f614a 100644
--- a/package/irssi/irssi.hash
+++ b/package/irssi/irssi.hash
@@ -1,2 +1,4 @@
# Locally calculated after checking pgp signature
-sha256 b85c07dbafe178213eccdc69f5f8f0ac024dea01c67244668f91ec1c06b986ca irssi-1.0.4.tar.xz
+sha256 c2556427e12eb06cabfed40839ac6f57eb8b1aa6365fab6dfcd331b7a04bb914 irssi-1.0.5.tar.xz
+# Locally calculated
+sha256 a1a27cb2ecee8d5378fbb3562f577104a445d6d66fee89286e16758305e63e2b COPYING
diff --git a/package/irssi/irssi.mk b/package/irssi/irssi.mk
index 4fef1125b1..3ea81a95db 100644
--- a/package/irssi/irssi.mk
+++ b/package/irssi/irssi.mk
@@ -4,7 +4,7 @@
#
################################################################################
-IRSSI_VERSION = 1.0.4
+IRSSI_VERSION = 1.0.5
IRSSI_SOURCE = irssi-$(IRSSI_VERSION).tar.xz
# Do not use the github helper here. The generated tarball is *NOT* the
# same as the one uploaded by upstream for the release.