Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#14953 - [libsasl] buffer overflow vulnerability
Attached to Project:
Arch Linux
Opened by xduugu (xduugu) - Thursday, 04 June 2009, 13:11 GMT
Last edited by Tobias Powalowski (tpowa) - Tuesday, 09 June 2009, 05:10 GMT
Opened by xduugu (xduugu) - Thursday, 04 June 2009, 13:11 GMT
Last edited by Tobias Powalowski (tpowa) - Tuesday, 09 June 2009, 05:10 GMT
|
DetailsThere is a buffer overflow vulnerability in libsasl <= 2.1.22 [1], which has been addressed in 2.1.23 [2].
[1] http://www.kb.cert.org/vuls/id/238019 [2] http://lists.andrew.cmu.edu/pipermail/cyrus-sasl/2009-May/001728.html Additional info: * libsasl 2.1.22-8 |
This task depends upon
Comment by Tobias Powalowski (tpowa) -
Thursday, 04 June 2009, 15:32 GMT
fixed in testing