A use-after-free was discovered in Irssi 0.8.18 and later when SASL messages from a server are received in unexpected order. A remote attacker, in control of an IRC server, could cause a crash in Irssi clients by leveraging this flaw. Upstream commit: https://github.com/irssi/irssi/commit/b8d3301d34f383f039071214872570385de1bb59 Upstream patch: https://github.com/irssi/irssi/commit/36564717c9f701e3a339da362ab46d220d27e0c1 References: https://irssi.org/security/irssi_sa_2018_02.txt
Created irssi tracking bugs for this issue: Affects: fedora-all [bug 1546227]
Statement: This issue did not affect the versions of Irssi as shipped with Red Hat Enterprise Linux 6 and 7 as they did not include support for SASL.