Buffer overflow flaw was reported and fixed in the GMime library,
in the code part responsible for calculating the maximum number
of output bytes generated by an uuencode operation.
If a local user was tricked into running a specially-crafted
application, using the library, it could lead to denial of
service (supplied application crash) or, potentially, to arbitrary
code execution with the privileges of the user running that
Upstream v2.4.15 changes file:
Diff between v2.4.14 and v2.4.15:
This issue affects the latest versions of the gmime and gmime22 packages,
as shipped with Fedora release of 11 (gmime-2.4.3-6.fc11,
gmime22-2.2.23-5.fc11) and 12 (gmime-2.4.11-1.fc12, gmime22-2.2.23-7.fc12).
This issue does NOT affect the versions of the gmime package, as
shipped within Extra Packages for Enterprise Linux -- EPEL-4
(gmime-2.2.1-2.el4) and EPEL-5 (gmime-2.2.3-3.1.el5) projects.
gmime22-2.2.23-8.fc11 has been submitted as an update for Fedora 11.
gmime22-2.2.23-8.fc12 has been submitted as an update for Fedora 12.
This is CVE-2010-0409.
gmime22-2.2.23-8.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
gmime22-2.2.23-8.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
Alex, Xavier, Bernard,
could you please schedule F11 and F12 gmime updates?
(current gmime-2.4.3-6.fc11 and gmime-2.4.11-1.fc12 are
still prone to this flaw).
Thanks && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team