commit - b01a9bd86473c3100be059b9e6f35f97bcbbf6d2
commit + 54e6a2dce5ef34a3ccc971af622fef33e6cb8950
blob - 18cadd747273c5d59ea93c9964dec2afcd30e033
blob + 0d5967d54ccbe18c6c4bcfdf8f0d15c634b342d0
--- ChangeLog
+++ ChangeLog
ngIRCd 0.11.0-pre2 (2008-01-07)
- SECURITY: IRC_PART could reference invalid memory, causing
- ngircd to crash [from HEAD].
+ ngircd to crash [from HEAD]. (CVE-2008-0285)
ngIRCd 0.11.0-pre1 (2008-01-02)
- Use dotted-decimal IP address if hostname is >= 64.
ngIRCd 0.10.4 (2008-01-07)
- SECURITY: IRC_PART could reference invalid memory, causing
- ngircd to crash [from HEAD].
+ ngircd to crash [from HEAD]. (CVE-2008-0285)
ngIRCd 0.10.3 (2007-08-01)
- SECURITY: Fixed a severe bug in handling JOIN commands, which could
cause the server to crash. Thanks to Sebastian Vesper, <net@veoson.net>.
+ (CVE-2007-6062)
ngIRCd 0.10.2 (2007-06-08)
- Fixed a bug that could case a root exploit when the daemon is compiled
to do IDENT lookups and is logging to syslog. Bug discovered by CoKi,
<coki@nosystem.com.ar>, thanks a lot!
- (http://www.nosystem.com.ar/advisories/advisory-11.txt)
+ (CVE-2005-0226; http://www.nosystem.com.ar/advisories/advisory-11.txt)
ngIRCd 0.8.2 (2005-01-26)
- Added doc/SSL.txt to distribution.
- Fixed a buffer overflow that could cause the daemon to crash. Bug found
- by Florian Westphal, <westphal@foo.fh-furtwangen.de>.
+ by Florian Westphal, <westphal@foo.fh-furtwangen.de>. (CVE-2005-0199)
- Fixed a possible buffer underrun when reading the MOTD file. Thanks
to Florian Westphal, <westphal@foo.fh-furtwangen.de>.
- Fixed detection of IRC lines which are too long to send. Detected by