CVE-2012-1836: Buffer overflow
Bug #982509 reported by
Julian Taylor
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
inspircd (Debian) |
Fix Released
|
Unknown
|
|||
inspircd (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
High
|
Steve Beattie | ||
Natty |
Fix Released
|
High
|
Steve Beattie | ||
Oneiric |
Fix Released
|
High
|
Steve Beattie | ||
Precise |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Imported from Debian bug http://
Package: inspircd
Severity: grave
Tags: security
Please see http://
for details and a link to the upstream fix.
Cheers,
Moritz
Related branches
lp:~jtaylor/ubuntu/oneiric/inspircd/CVE-2012-1836
- Ubuntu branches: Pending requested
-
Diff: 157 lines (+137/-0)3 files modifieddebian/changelog (+9/-0)
debian/patches/00list (+1/-0)
debian/patches/06_CVE-2012-1836.dpatch (+127/-0)
CVE References
Changed in inspircd (Debian): | |
importance: | Undecided → Unknown |
status: | New → Fix Released |
To post a comment you must log in.
This bug was fixed in the package inspircd - 1.1.22+ dfsg-4ubuntu2
--------------- dfsg-4ubuntu2) precise; urgency=low
inspircd (1.1.22+
* SECURITY UPDATE: remote code execution (LP: #982509) patches/ 06_CVE- 2012-1836. dpatch:
- debian/
Fix buffer overflow in dns.cpp, thanks to Jonathan Wiltshire
- CVE-2012-1836
-- Julian Taylor <email address hidden> Sun, 15 Apr 2012 20:33:41 +0200