Bug 165816

Summary: Security-update for buffer-overflow-vuln needed
Product: [Fedora] Fedora Reporter: Stefan Neufeind <redhat>
Component: fetchmailAssignee: Miloslav Trmač <mitr>
Status: CLOSED NOTABUG QA Contact: Brock Organ <borgan>
Severity: medium Docs Contact:
Priority: medium    
Version: 3Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-08-12 15:08:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Stefan Neufeind 2005-08-12 14:58:38 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6

Description of problem:
fetchmail-6.2.5-7.fc3.1 seems to be the latest fetchmail-release for FC3 and was issued before the buffer-overflow-advisories (e.g. http://secunia.com/advisories/16176/). The version-number indicates that FC3 thereby might be vulnerable. If so, could a fix be "backported" or the package also be updated in FC3?

Version-Release number of selected component (if applicable):
fetchmail-6.2.5-7.fc3.1

How reproducible:
Always

Steps to Reproduce:
1.See advisory
2.
3.
  

Additional info:

Comment 1 Miloslav Trmač 2005-08-12 15:08:32 UTC
Thanks for checking.

fetchmail-62.5-7.fc3.1 does fix CVE CAN-2005-2335. The 2005-2355 is the changelog
is a typo.