<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0025</id>
    <title>An update for irssi is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:00"/>
    <updated date="2023-01-05 02:56:00"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-5193" id="CVE-2017-5193" title="CVE-2017-5193 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-5206" id="CVE-2018-5206" title="CVE-2018-5206 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-5207" id="CVE-2018-5207" title="CVE-2018-5207 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-5205" id="CVE-2018-5205" title="CVE-2018-5205 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-7050" id="CVE-2018-7050" title="CVE-2018-7050 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-7052" id="CVE-2018-7052" title="CVE-2018-7052 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-10966" id="CVE-2017-10966" title="CVE-2017-10966 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-9469" id="CVE-2017-9469" title="CVE-2017-9469 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-5194" id="CVE-2017-5194" title="CVE-2017-5194 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-9468" id="CVE-2017-9468" title="CVE-2017-9468 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-7051" id="CVE-2018-7051" title="CVE-2018-7051 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-10965" id="CVE-2017-10965" title="CVE-2017-10965 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-5356" id="CVE-2017-5356" title="CVE-2017-5356 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

The nickcmp function in Irssi before 0.8.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a message without a nick. (CVE-2017-5193)

When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer. (CVE-2018-5206)

When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string. (CVE-2018-5207)

When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string. (CVE-2018-5205)

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. A NULL pointer dereference occurs for an &quot;empty&quot; nick. (CVE-2018-7050)

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. When the number of windows exceeds the available space, a crash due to a NULL pointer dereference would occur. (CVE-2018-7052)

An issue was discovered in Irssi before 1.0.4. While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it. This would then result in use-after-free conditions on each access of the hash table. (CVE-2017-10966)

In Irssi before 1.0.3, when receiving certain incorrectly quoted DCC files, it tries to find the terminating quote one byte before the allocated memory. Thus, remote attackers might be able to cause a crash. (CVE-2017-9469)

Use-after-free vulnerability in Irssi before 0.8.21 allows remote attackers to cause a denial of service (crash) via an invalid nick message. (CVE-2017-5194)

In Irssi before 1.0.3, when receiving a DCC message without source nick/host, it attempts to dereference a NULL pointer. Thus, remote IRC servers can cause a crash. (CVE-2017-9468)

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings. (CVE-2018-7051)

An issue was discovered in Irssi before 1.0.4. When receiving messages with invalid time stamps, Irssi would try to dereference a NULL pointer. (CVE-2017-10965)

Irssi before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a string containing a formatting sequence (%[) without a closing bracket (]). (CVE-2017-5356)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="irssi">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="irssi" version="0.8.15" release="18.hce1c">
          <filename>irssi-0.8.15-18.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
