Summary: | net-irc/bnc: Buffer overflow vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Luke Macken (RETIRED) <lewk> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.gotbnc.com/changes.html | ||
Whiteboard: | B1 [glsa] lewk | ||
Package list: | Runtime testing required: | --- |
Description
Luke Macken (RETIRED)
![]() Changelog: 2.9.1 1. SECURITY FIX: password check, was only letting incorrect passwords in 2. Fixed IP binding on listen 2.9.0 1. Added trailing newlines to log records 2. Added extra error handling on accepting connections 3. Fixed buffer overflow in getnickuserhost (reported by Leon Juranic) 4. Added extra check for gethostbyname2 5. Made password check more thorough 6. Fixed ipv6 dns resolving to random ipv4 === This advisory is about the buffer overflow fix in 2.9.0, but 2.9.1 also fixes another security issue. Vapier, please bump to 2.9.1. 2.9.1 is now in portage archs, please mark stable. Stable on sparc stable on ppc Stable on alpha. GLSA drafted Security please review. GLSA 200411-24 |