CVE-2019-15717
https://notcve.org/view.php?id=CVE-2019-15717
Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP. Irssi versiones 1.2.x anteriores a 1.2.2, presenta un uso de la memoria previamente liberada si el servidor IRC envía un doble CAP. • http://www.openwall.com/lists/oss-security/2019/08/29/3 http://www.openwall.com/lists/oss-security/2019/08/29/5 https://irssi.org/security/irssi_sa_2019_08.txt https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDDRTNKDDO52CO5USJ73BE6XVG7BD4KP https://usn.ubuntu.com/4119-1 • CWE-416: Use After Free •
CVE-2019-13045 – irssi: use after free when sending SASL login to server
https://notcve.org/view.php?id=CVE-2019-13045
Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when SASL is enabled, has a use after free when sending SASL login to the server. Irssi anterior a versión 1.0.8, versión 1.1.x anterior a 1.1.3 y versión 1.2.x anterior a 1.2.1, cuando SASL está habilitado, presenta un uso de memoria previamente libera cuando se envía el inicio de sesión de SASL hacia el servidor. • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00030.html http://packetstormsecurity.com/files/153480/Slackware-Security-Advisory-irssi-Updates.html http://www.openwall.com/lists/oss-security/2019/06/29/1 http://www.securityfocus.com/bid/108998 https://github.com/irssi/irssi/commit/d23b0d22cc611e43c88d99192a59f413f951a955 https://irssi.org/security/irssi_sa_2019_06.txt https://seclists.org/bugtraq/2019/Jun/41& • CWE-416: Use After Free •