From $URL : Description A vulnerability has been reported in ShadowIRCd, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA51694 The vulnerability is reported in versions prior to 6.3.3. Solution Update to version 6.3.3. Original Advisory https://github.com/shadowircd/shadowircd/blob/2b9892978e6562e82ace550a742b0795d7ea7b67/NEWS @JD can we stabilize?
(In reply to comment #0) > @JD can we stabilize? Go for it. Arches added.
Arches, please test and mark stable: =net-irc/shadowircd-6.3.3 Target keywords : "amd64 x86"
CVE-2012-6084 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6084): modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.
amd64 stable
x86 stable
GLSA vote: yes
GLSA Vote: yes, too. GLSA request filed.
This issue was resolved and addressed in GLSA 201405-21 at http://security.gentoo.org/glsa/glsa-201405-21.xml by GLSA coordinator Sean Amoss (ackle).