tags 445883 patch
thanks

Hi

Attached you will find the NMU patch for the bug, which I just uploaded to 
unstable.

Cheers
Steffen
diff -u dircproxy-1.0.5/src/irc_server.c dircproxy-1.0.5/src/irc_server.c
--- dircproxy-1.0.5/src/irc_server.c
+++ dircproxy-1.0.5/src/irc_server.c
@@ -1078,7 +1078,7 @@
       
         if (!strcmp(cmsg.cmd, "ACTION")) {
           if (p->conn_class->log_events & IRC_LOG_ACTION)
-            irclog_ctcp(p, msg.params[0], msg.src.orig, "%s", cmsg.orig);
+            irclog_ctcp(p, (msg.params != NULL ) ? msg.params[0]: "none", msg.src.orig, "%s", cmsg.orig);
 
         } else if (!strcmp(cmsg.cmd, "DCC")
                    && p->conn_class->dcc_proxy_incoming) {
diff -u dircproxy-1.0.5/debian/changelog dircproxy-1.0.5/debian/changelog
--- dircproxy-1.0.5/debian/changelog
+++ dircproxy-1.0.5/debian/changelog
@@ -1,3 +1,12 @@
+dircproxy (1.0.5-5.1) unstable; urgency=high
+
+  * Non-maintainer upload by the testing-security team
+  * Backport upstream patch to fix a NULL pointer reference, which
+    can lead to a DoS (Closes: #445883)
+    Fixes: CVE-2007-5226
+
+ -- Steffen Joeris <[EMAIL PROTECTED]>  Tue, 09 Oct 2007 07:36:49 +0000
+
 dircproxy (1.0.5-5) unstable; urgency=low
 
   * Dropped stale dircproxy.net references from README. Thanks, Steen

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to