Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 88641 - libytnef-1.5.ebuild (New Package)
Summary: libytnef-1.5.ebuild (New Package)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All All
: Low enhancement (vote)
Assignee: Lars Wendler (Polynomial-C) (RETIRED)
URL:
Whiteboard: sunrise suggested
Keywords: EBUILD
: 364037 (view as bug list)
Depends on:
Blocks: 88644
  Show dependency tree
 
Reported: 2005-04-10 14:06 UTC by Tomas Kolda
Modified: 2018-01-24 08:37 UTC (History)
8 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
libytnef-1.5.ebuild (libytnef-1.5.ebuild,764 bytes, text/plain)
2005-04-10 14:08 UTC, Tomas Kolda
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Tomas Kolda 2005-04-10 14:06:30 UTC
Hi,

I attached libytnef-1.5.ebuild.

libytnef is used by ytnef. ytnef is a program to work with procmail to decode TNEF streams (winmail.dat attachments) like those created with Outlook. Unlike other similar programs, it can also create vCalendar/vCard entries from meeting requests, address cards, and task entries.

I will also submit ytnef ebuild later.

tom
Comment 1 Tomas Kolda 2005-04-10 14:08:21 UTC
Created attachment 55917 [details]
libytnef-1.5.ebuild
Comment 2 Martin Polak 2007-03-01 12:32:42 UTC
also builds on ~ppc
Comment 3 Nguyen Thai Ngoc Duy 2008-10-02 12:40:41 UTC
This one is needed for Evolution's TNEF plugin (auto detected during configure phase). Gnome herd, do you want to take care of this package? Outlook-related users would thank you a lot for it ;)
Comment 4 Gilles Dartiguelongue (RETIRED) gentoo-dev 2008-10-02 20:40:02 UTC
well if you want it, you can push it to the tree and add us as backup herd (please precise role in metadata.xml if so).
Comment 5 Gilles Dartiguelongue (RETIRED) gentoo-dev 2008-11-30 11:15:37 UTC
align ebuild requests to same values
Comment 6 Jeremy Olexa (darkside) (RETIRED) archtester gentoo-dev Security 2009-01-20 16:30:49 UTC
(this is an automated message based on filtering criteria that matched this bug)
'EBUILD' is in the KEYWORDS which should mean that there is a ebuild attached 
to this bug.
This bug is assigned to maintainer-wanted which means that it is not in the 
main tree.

Hello, The Gentoo Team would like to firstly thank you for your ebuild 
submission. We also apologize for not being able to accommodate you in a timely
manner. There are simply too many new packages.

Allow me to use this opportunity to introduce you to Gentoo Sunrise. The 
sunrise overlay[1] is a overlay for Gentoo which we allow trusted users to 
commit to and all users can have ebuilds reviewed by Gentoo devs for entry 
into the overlay. So, the sunrise team is suggesting that you look into this 
and submit your ebuild to the overlay where even *you* can commit to. =)

Because this is a mass message, we are also asking you to be patient with us. 
We anticipate a large number of requests in a short time. 

Thanks,
On behalf of the Gentoo Sunrise Team,
Jeremy.

[1]: http://www.gentoo.org/proj/en/sunrise/
[2]: http://overlays.gentoo.org/proj/sunrise/wiki/SunriseFaq
Comment 7 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-09-05 13:50:59 UTC
There has been a vulnerability report fro yTNEF:
oCERT-2009-013: http://www.ocert.org/advisories/ocert-2009-013.html

The vulnerabilities lead to arbitrary code execution with the privilege of the target user running the decoders.

The directory traversal vulnerability is caused by improper sanitization of the file name used for saving the attachments, as it is computed directly from properties contained in the TNEF structure without checking for conditions that allow to traverse outside the temporary directory used for attachment storage. This leads to arbitrary code execution in case the attacker crafts an attachment that would overwrite a file used for execution (as an example the bashrc profile).

Additionally buffer and heap overflow vulnerabilities can be triggered by passing a file name exceeding a fixed size of 256 bytes in the TNEF data structure. This can lead to arbitrary code execution if exploited.

There is no known version that resolves these issues. Please do not add this package to gentoo-x86 until a fixed version was released or a patch exists that can be applied. For more information, contact security@g.o.
Comment 8 Gilles Dartiguelongue (RETIRED) gentoo-dev 2011-04-18 15:36:46 UTC
*** Bug 364037 has been marked as a duplicate of this bug. ***
Comment 9 randall.hand 2014-08-04 00:25:59 UTC
As for 001/AUG/2014, I believe I have resolved these issues.   Newest version of ytnef can be found on Github : https://github.com/Yeraze/ytnef
Comment 10 Gilles Dartiguelongue (RETIRED) gentoo-dev 2018-01-24 08:37:45 UTC
ytnef is now in tree and evolution 3.24.6 has a USE flag for controlling the feature. Thanks for reporting.