Bug 227791 - CVE-2007-160: centericq buffer overflow
CVE-2007-160: centericq buffer overflow
Status: CLOSED NEXTRELEASE
Product: Fedora
Classification: Fedora
Component: centericq (Show other bugs)
rawhide
All Linux
medium Severity high
: ---
: ---
Assigned To: Andreas Bierfert
Fedora Extras Quality Assurance
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-02-08 00:19 EST by Kevin Fenzi
Modified: 2007-11-30 17:11 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-02-10 02:20:24 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Kevin Fenzi 2007-02-08 00:19:15 EST
Description of problem:

centericq is vulnerable to a buffer overflow in it's livejournal support. 

See: 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160

All fedora extras versions seem to be vulnerable. 

More info, and a patch that debian is using is at: 
http://mailman.linuxpl.org/pipermail/cicq/2007-January/004866.html
Comment 1 Andy Shevchenko 2007-02-08 01:33:10 EST
The patches are not allowed. Received error like following: "Can not connect 
to host www2.speedblue.org".

I think the patches would be attached here directly.

P.S. Just my 2 cents.
Comment 2 Andreas Bierfert 2007-02-08 04:40:05 EST
Will look into the issue and try the debian patches asap.
Comment 3 Kevin Fenzi 2007-02-08 11:13:39 EST
In reply to comment #1: 

yeah, those links look dead. ;( 
Hopefully the patches can be fetched via the debian package?
Comment 4 Andreas Bierfert 2007-02-08 11:21:41 EST
Thats not a problem... I am just waiting to get home to grep them and make a
test build +)
Comment 5 Andreas Bierfert 2007-02-10 02:20:24 EST
Builds for fc{5,6} and devel have been queued. Thanks for reporting.

Note You need to log in before you can comment on or make changes to this bug.