| Summary: | <net-irc/znc-0.094: Denial of Service Vulnerabilities (CVE-2010-{2812,2934}) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | minor | CC: | wired |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://secunia.com/advisories/40919/ | ||
| Whiteboard: | B3 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Tim Sammut (RETIRED)
2010-08-12 21:12:30 UTC
added patch in =net-irc/znc-0.092-r1, using the upstream commits reported. wired * gentoo-x86/net-irc/znc/ (files/znc-0.092-dos-fix.patch ChangeLog znc-0.092-r1.ebuild): fixed security bug #332535 Arches, please test and mark stable: =net-irc/znc-0.094 Target keywords : "amd64 x86" amd64 done x86 stable, all arches done CVE-2010-2812 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2812): Client.cpp in ZNC 0.092 allows remote attackers to cause a denial of service (exception and daemon crash) via a PING command that lacks an argument. CVE-2010-2934 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2934): Multiple unspecified vulnerabilities in ZNC 0.092 allow remote attackers to cause a denial of service (exception and daemon crash) via unknown vectors related to "unsafe substr() calls." GLSA vote: NO. no too, closing. |