Bug 165816 - Security-update for buffer-overflow-vuln needed
Security-update for buffer-overflow-vuln needed
Status: CLOSED NOTABUG
Product: Fedora
Classification: Fedora
Component: fetchmail (Show other bugs)
3
All Linux
medium Severity medium
: ---
: ---
Assigned To: Miloslav Trmač
Brock Organ
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-08-12 10:58 EDT by Stefan Neufeind
Modified: 2007-11-30 17:11 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-08-12 11:08:32 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Stefan Neufeind 2005-08-12 10:58:38 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6

Description of problem:
fetchmail-6.2.5-7.fc3.1 seems to be the latest fetchmail-release for FC3 and was issued before the buffer-overflow-advisories (e.g. http://secunia.com/advisories/16176/). The version-number indicates that FC3 thereby might be vulnerable. If so, could a fix be "backported" or the package also be updated in FC3?

Version-Release number of selected component (if applicable):
fetchmail-6.2.5-7.fc3.1

How reproducible:
Always

Steps to Reproduce:
1.See advisory
2.
3.
  

Additional info:
Comment 1 Miloslav Trmač 2005-08-12 11:08:32 EDT
Thanks for checking.

fetchmail-62.5-7.fc3.1 does fix CVE CAN-2005-2335. The 2005-2355 is the changelog
is a typo.

Note You need to log in before you can comment on or make changes to this bug.