Summary: | <net-mail/vpopmail-5.4.33, <net-mail/qmailadmin-1.2.15-r1: Integer Overflow for user's quota | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stratos Psomadakis (RETIRED) <psomas> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | anf, eras, qmail-bugs+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.securityfocus.com/archive/1/503375 | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Stratos Psomadakis (RETIRED)
![]() *** Bug 378371 has been marked as a duplicate of this bug. *** I have fixed this in qmailadmin-1.2.15-r1 with a custom patch. This is already fixed in upstream vpopmail-5.4.33. Upstream vpopmail changelog: ==== 5.4.33 - Matt Brookings ... - Changed relevant quota code to use storage_t 64bit type ... === Arches, please stabilize vpopmail-5.4.33 and qmailadmin-1.2.15-r1. Target keywords: qmailadmin-1.2.15-r1: amd64 arm ppc s390 sh sparc x86 vpopmail-5.4.33: amd64 arm ia64 s390 sh sparc x86 amd64 stable x86 stable ia64 stable ppc stable sparc stable s390 stable sh stable arm stable, all arches done. GLSA vote: no. GLSA vote: no. Closing noglsa. |