A vulnerability was found in Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP. Reference: https://github.com/irssi/irssi/commit/5a4e7ab659aba2855895c9f43e9a7a131f4e89b3
Created irssi tracking bugs for this issue: Affects: fedora-all [bug 1747347]
External References: https://irssi.org/security/irssi_sa_2019_08.txt
Statement: The versions of Irssi as shipped in Red Hat Enterprise Linux 6, 7 and 8 are not affected by this vulnerability. Only Irssi versions 1.2.x may be vulnerable.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-15717