uw-imap (8:2007b~dfsg-1.1) unstable; urgency=high
* Non-maintainer upload by the Security Team.
* Fix denial of service vulnerability because of rfc822_output_char() not
checking for a full buffer and writing one byte ahead the buffer, later
resulting in memcpy getting called with a possible size argument of -1
(0003_CVE-2008-5514.patch; Closes: #510918)
Date: Mon, 30 Mar 2009 10:51:28 +0100
Changed-By: Stephan Hermann <[email protected]>
Maintainer: Jonas Smedegaard <[email protected]>
Origin: Debian/unstable
https://launchpad.net/ubuntu/jaunty/+source/uw-imap/8:2007b~dfsg-1.1
Origin: Debian/unstable
Format: 1.7
Date: Mon, 30 Mar 2009 10:51:28 +0100
Source: uw-imap
Binary: uw-imapd, ipopd, libc-client2007b-dev, libc-client2007b, mlock,
uw-mailutils
Architecture: source
Version: 8:2007b~dfsg-1.1
Distribution: jaunty
Urgency: high
Maintainer: Jonas Smedegaard <[email protected]>
Changed-By: Stephan Hermann <[email protected]>
Closes: 510918
Changes:
uw-imap (8:2007b~dfsg-1.1) unstable; urgency=high
.
* Non-maintainer upload by the Security Team.
* Fix denial of service vulnerability because of rfc822_output_char() not
checking for a full buffer and writing one byte ahead the buffer, later
resulting in memcpy getting called with a possible size argument of -1
(0003_CVE-2008-5514.patch; Closes: #510918)
Files:
c3f3e7aea719032f76403a34e853a769 1404 mail optional uw-imap_2007b~dfsg-1.1.dsc
b52edf46ef70df81ee71f75190275c11 103450 mail optional
uw-imap_2007b~dfsg-1.1.diff.gz
--
Jaunty-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/jaunty-changes