Published: http://www.ubuntu.com/usn/usn-790-1
** Changed in: cyrus-sasl2 (Ubuntu Jaunty)
Status: Triaged = Fix Released
** Changed in: cyrus-sasl2 (Ubuntu Jaunty)
Assignee: (unassigned) = Kees Cook (kees)
** Changed in: cyrus-sasl2 (Ubuntu Intrepid)
Status: Fix Committed =
Is there an ETA for Hardy?
--
cyrus-sasl2 buffer overflow vulnerability: CVE-2009-0688
https://bugs.launchpad.net/bugs/383300
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cyrus-sasl2 in ubuntu.
--
Ubuntu-server-bugs mailing list
This has been fixed in karmic with the merge of cyrus-sasl2 2.1.23.dfsg-
1ubuntu1.
** Changed in: cyrus-sasl2 (Ubuntu Karmic)
Status: Triaged = Fix Released
--
cyrus-sasl2 buffer overflow vulnerability: CVE-2009-0688
https://bugs.launchpad.net/bugs/383300
You received this bug
Thank you for using Ubuntu and taking the time to report a bug.
Unfortunately, the upstream changes may break existing applications, so
all applications using cyrus-sasl need to be verified to not break or
patched.
** Visibility changed to: Public
** Changed in: cyrus-sasl2 (Ubuntu)
** Bug watch added: Debian Bug tracker #528749
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528749
** Also affects: cyrus-sasl2 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528749
Importance: Unknown
Status: Unknown
** Also affects: cyrus-sasl2 (Ubuntu
** Changed in: cyrus-sasl2 (Debian)
Status: Unknown = Fix Released
--
cyrus-sasl2 buffer overflow vulnerability: CVE-2009-0688
https://bugs.launchpad.net/bugs/383300
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cyrus-sasl2 in