Bug 515804 (CVE-2009-2666)
Summary: | CVE-2009-2666 fetchmail: SSL null terminator bypass | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | kreilly, nalin, vcrhonek | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2666 | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2009-11-19 16:41:42 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 516266, 516267, 516268, 516269, 516270, 516275 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Vincent Danen
2009-08-05 19:18:03 UTC
Created attachment 356415 [details]
upstream patch (r5389) to correct the issue (untested)
Upstream released version 6.3.11 to address this flaw, upstream advisory: http://www.fetchmail.info/fetchmail-SA-2009-01.txt fetchmail-6.3.8-9.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/fetchmail-6.3.8-9.fc10 fetchmail-6.3.9-5.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/fetchmail-6.3.9-5.fc11 fetchmail-6.3.9-5.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. fetchmail-6.3.8-9.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2009:1427 https://rhn.redhat.com/errata/RHSA-2009-1427.html |