Bug 1473234 (CVE-2017-10966)

Summary: CVE-2017-10966 irssi: Use-after-free while updating the internal nick list
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: huzaifas, jskarvad, mmahut, rosser.bjr
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: irssi 1.0.4 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-07-24 09:51:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1473235    

Description Andrej Nemec 2017-07-20 09:35:36 UTC
An issue was discovered in Irssi. While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it. This would then result in use-after-free conditions on each access of the hash table.

Upstream patch:

https://github.com/irssi/irssi/commit/5e26325317c72a04c1610ad952974e206384d291

External References:

https://irssi.org/security/irssi_sa_2017_07.txt

Comment 1 Cedric Buissart 2017-07-24 09:50:48 UTC
Lowering severity based on the fact that a rogue IRC server would be needed to take advantage of the vulnerability.