Bug 152156
Summary: | (sylpheed) Security update 1.0.4 available | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Rob van Nieuwkerk <robn> |
Component: | sylpheed | Assignee: | Akira TAGOH <tagoh> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3 | CC: | wtogami |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | 1.0.4-0.fc3 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-03-30 02:56:07 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Rob van Nieuwkerk
2005-03-25 13:55:43 UTC
http://people.redhat.com/wtogami/temp/sylpheed-1.0.4-0.fc2.i386.rpm http://people.redhat.com/wtogami/temp/sylpheed-1.0.4-0.fc3.i386.rpm Please test these binaries and report back. Well, 1.0.4 works fine as usual. However, though I've tried something against a diff file from the previous release, I couldn't find any way to reproduce this buffer overflow. the fixed code looks good at least. so we can push it for the update package anyway. The updated packages are now available. closing. |