balsa stable update for CVE-2007-5007
Nico Golde
nion at debian.org
Sat Jan 19 13:51:48 UTC 2008
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for balsa some time ago.
CVE-2007-5007[0]:
| Stack-based buffer overflow in the ir_fetch_seq function in balsa
| before 2.3.20 might allow remote IMAP servers to execute arbitrary
| code via a long response to a FETCH command.
Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.
However it would be nice if this could get fixed via a regular point update[1].
Please contact the release team for this.
This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.
You can find a patch on:
http://bugzilla.gnome.org/attachment.cgi?id=95088&action=view
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5007
[1] http://www.debian.org/doc/developers-reference/ch-pkgs.en.html#s-upload-stable
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20080119/f3339444/attachment.pgp
More information about the pkg-gnome-maintainers
mailing list