Bug 165816 - Security-update for buffer-overflow-vuln needed
Summary: Security-update for buffer-overflow-vuln needed
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: fetchmail
Version: 3
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Miloslav Trmač
QA Contact: Brock Organ
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-08-12 14:58 UTC by Stefan Neufeind
Modified: 2007-11-30 22:11 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-08-12 15:08:32 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Stefan Neufeind 2005-08-12 14:58:38 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6

Description of problem:
fetchmail-6.2.5-7.fc3.1 seems to be the latest fetchmail-release for FC3 and was issued before the buffer-overflow-advisories (e.g. http://secunia.com/advisories/16176/). The version-number indicates that FC3 thereby might be vulnerable. If so, could a fix be "backported" or the package also be updated in FC3?

Version-Release number of selected component (if applicable):
fetchmail-6.2.5-7.fc3.1

How reproducible:
Always

Steps to Reproduce:
1.See advisory
2.
3.
  

Additional info:

Comment 1 Miloslav Trmač 2005-08-12 15:08:32 UTC
Thanks for checking.

fetchmail-62.5-7.fc3.1 does fix CVE CAN-2005-2335. The 2005-2355 is the changelog
is a typo.


Note You need to log in before you can comment on or make changes to this bug.