irssi: bump version to version 1.0.2
authorPeter Korsgaard <peter@korsgaard.com>
Tue, 14 Mar 2017 15:00:39 +0000 (16:00 +0100)
committerPeter Korsgaard <peter@korsgaard.com>
Wed, 15 Mar 2017 10:50:05 +0000 (11:50 +0100)
commitd1e2d290d9fd4cc8b12bcae72725ebad1cac8edc
tree13bd8679181ae8b3dc31d486f72d12f1eff7f124
parentff6747473293035aa9e52ec5fbfdb41f806f2d9a
irssi: bump version to version 1.0.2

Notice that this fixes a security issue:

CWE-416 (use after free condition during netjoin processing). No CVE
assigned yet:

https://irssi.org/security/irssi_sa_2017_03.txt

But the 0.8.x series is not believed to be vulnerable to this specific
issue.  From the advisory:

Affected versions
-----------------

Irssi up to and including 1.0.1

We believe Irssi 0.8.21 and prior are not affected since a different
code path causes the netjoins to be flushed prior to reaching the use
after free condition.

Openssl is no longer optional, so select it and drop the enable/disable
handling.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/irssi/Config.in
package/irssi/irssi.hash
package/irssi/irssi.mk