cyrus-imapd-2.2 (2.2.13-14ubuntu3.1) jaunty-security; urgency=low
* SECURITY UPDATE: Fix potential buffer overflows
- debian/patches/0024-upstream-fix-sieve.dpatch: Use snprintf to avoid buffer
overruns. Also fix for a buffer overflow in SIEVE filtering allowing for
privilege
ACK for jaunty. Thanks Brian!
Artur, while I agree DEP-3 is preferred, Brian took the patch straight
from Debian and as such, we can accept it as it. Brian gave proper
attribution.
--
Please, fix buffer overflow vulnerability in SIEVE
https://bugs.launchpad.net/bugs/438363
You received this bug
** Changed in: cyrus-imapd-2.2 (Ubuntu)
Status: Confirmed = Fix Committed
--
Please, fix buffer overflow vulnerability in SIEVE
https://bugs.launchpad.net/bugs/438363
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
Brian, please replenish your patch with more informations. Follow with
https://wiki.ubuntu.com/UbuntuDevelopment/PatchTaggingGuidelines
--
Please, fix buffer overflow vulnerability in SIEVE
https://bugs.launchpad.net/bugs/438363
You received this bug notification because you are a member of
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3235
--
Please, fix buffer overflow vulnerability in SIEVE
https://bugs.launchpad.net/bugs/438363
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
** Patch added: Jaunty debdiff
http://launchpadlibrarian.net/51306636/cyrus-imapd-2.2_2.2.13-14ubuntu3.1.debdiff
--
Please, fix buffer overflow vulnerability in SIEVE
https://bugs.launchpad.net/bugs/438363
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Unfortunately, I'm able to make a debdiff for Cyrus Jaunty's packages
only.
I don't have a testing environment for dapper, hardy, intrepid and
karmic packages.
--
Please, fix buffer overflow vulnerability in SIEVE
https://bugs.launchpad.net/bugs/438363
You received this bug notification because