Bug 1848414 (CVE-2020-14148) - CVE-2020-14148 nigircd: Server-Server protocol implementation leads to out-of-bounds access
Summary: CVE-2020-14148 nigircd: Server-Server protocol implementation leads to out-of...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2020-14148
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1848415 1848416
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-06-18 10:45 UTC by Dhananjay Arunesh
Modified: 2020-06-18 11:20 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-06-18 11:20:33 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-06-18 10:45:30 UTC
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.

References:
https://github.com/ngircd/ngircd/issues/274
https://github.com/ngircd/ngircd/issues/277
https://github.com/ngircd/ngircd/pull/275
https://github.com/ngircd/ngircd/pull/276
https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2

Comment 1 Dhananjay Arunesh 2020-06-18 10:47:43 UTC
Created ngircd tracking bugs for this issue:

Affects: epel-all [bug 1848416]
Affects: fedora-all [bug 1848415]

Comment 2 Product Security DevOps Team 2020-06-18 11:20:33 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.