commit - e4b4bb5e71f93501489bfd1f54636d3afbf49697
commit + 598df07584d4a8ed69d39dde140a6e77c2d74fc4
blob - 74eed80e85145677abe95ed746013de8688d368d
blob + ea10e6db006eee4040f09b06fb191648deddd876
--- ChangeLog
+++ ChangeLog
ngIRCd 0.11.0-pre2 (2008-01-07)
- SECURITY: IRC_PART could reference invalid memory, causing
- ngircd to crash [from HEAD].
+ ngircd to crash [from HEAD]. (CVE-2008-0285)
ngIRCd 0.11.0-pre1 (2008-01-02)
- Use dotted-decimal IP address if hostname is >= 64.
ngIRCd 0.10.4 (2008-01-07)
- SECURITY: IRC_PART could reference invalid memory, causing
- ngircd to crash [from HEAD].
+ ngircd to crash [from HEAD]. (CVE-2008-0285)
ngIRCd 0.10.3 (2007-08-01)
- SECURITY: Fixed a severe bug in handling JOIN commands, which could
cause the server to crash. Thanks to Sebastian Vesper, <net@veoson.net>.
+ (CVE-2007-6062)
ngIRCd 0.10.2 (2007-06-08)
- Fixed a bug that could case a root exploit when the daemon is compiled
to do IDENT lookups and is logging to syslog. Bug discovered by CoKi,
<coki@nosystem.com.ar>, thanks a lot!
- (http://www.nosystem.com.ar/advisories/advisory-11.txt)
+ (CVE-2005-0226; http://www.nosystem.com.ar/advisories/advisory-11.txt)
ngIRCd 0.8.2 (2005-01-26)
- Added doc/SSL.txt to distribution.
- Fixed a buffer overflow that could cause the daemon to crash. Bug found
- by Florian Westphal, <westphal@foo.fh-furtwangen.de>.
+ by Florian Westphal, <westphal@foo.fh-furtwangen.de>. (CVE-2005-0199)
- Fixed a possible buffer underrun when reading the MOTD file. Thanks
to Florian Westphal, <westphal@foo.fh-furtwangen.de>.
- Fixed detection of IRC lines which are too long to send. Detected by