d1e2d290d9
Notice that this fixes a security issue: CWE-416 (use after free condition during netjoin processing). No CVE assigned yet: https://irssi.org/security/irssi_sa_2017_03.txt But the 0.8.x series is not believed to be vulnerable to this specific issue. From the advisory: Affected versions ----------------- Irssi up to and including 1.0.1 We believe Irssi 0.8.21 and prior are not affected since a different code path causes the netjoins to be flushed prior to reaching the use after free condition. Openssl is no longer optional, so select it and drop the enable/disable handling. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
3 lines
141 B
Plaintext
3 lines
141 B
Plaintext
# Locally calculated after checking pgp signature
|
|
sha256 5c1c3cc2caf103aad073fadeb000e0f8cb3b416833a7f43ceb8bd9fcf275fbe9 irssi-1.0.2.tar.xz
|