Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 728422 (CVE-2020-14148) - net-irc/ngircd: use-after-free vulnerability in server-to-server protocol (CVE-2020-14148)
Summary: net-irc/ngircd: use-after-free vulnerability in server-to-server protocol (CV...
Alias: CVE-2020-14148
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: C3 [upstream cve]
Depends on:
Reported: 2020-06-15 20:42 UTC by John Helmert III
Modified: 2020-06-17 00:16 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III gentoo-dev Security 2020-06-15 20:42:51 UTC
From $URL:

The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.

Maintainer, please bump.
Comment 1 Sam James archtester gentoo-dev Security 2020-06-17 00:15:20 UTC
Bleh. Upstream's view is understandable. We cannot do much for now.

From upstream (
"For ngIRCd 26 … nothing, I guess: as this seems to only affect the server-server protocol (which is „trusted by design“, we don’t have to handle invalid input here, this is bad practice, but as already pointed out, „by design“ – so removing this bug from the milestone)."