fetchmail-6.2.5.2 security fix.
Reported by: |
ken@… |
Owned by: |
bdubbs@… |
Priority:
|
highest
|
Milestone:
|
|
Component:
|
BOOK
|
Version:
|
SVN
|
Severity:
|
normal
|
Keywords:
|
|
Cc:
|
|
|
|
Fetchmail is now at http://fetchmail.berlios.de and has released 6.2.5.2 to fix
CAN-2005-2335 remotely exploitable buffer overflow in POP-3 code, a malicious
server could cause execution of arbitrary code.
Change History
(4)
Milestone: |
future → 6.1
|
Owner: |
changed from blfs-book@… to bdubbs@…
|
Priority: |
high → highest
|
Resolution: |
→ fixed
|
Status: |
assigned → closed
|
Since this is a security update I am going to target this to 6.1 with a P1 priority.