Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 51461

Summary: net-misc/cadaver-0.22.1 -- buffer overflow
Product: Gentoo Security Reporter: Sune Kloppenborg Jeppesen (RETIRED) <jaervosz>
Component: GLSA ErrorsAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: plasmaroo
Priority: High    
Version: unspecified   
Hardware: All   
OS: All   
Whiteboard:
Package list:
Runtime testing required: ---

Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-05-19 08:52:13 UTC
From http://www.debian.org/security/2004/dsa-507
Stefan Esser discovered a problem in neon, an HTTP and WebDAV client library, which is also present in cadaver, a command-line client for WebDAV server. User input is copied into variables not large enough for all cases. This can lead to an overflow of a static heap variable.
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-05-19 08:54:06 UTC
New version 0.22.2 available. Compiles cleanly with a version bump.
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2004-05-19 14:10:27 UTC
plasmaroo : no maintainer, and you did the last security bump. Do you think you can bump this one too ?
Comment 3 Tim Yamin (RETIRED) gentoo-dev 2004-05-19 14:46:04 UTC
Now in Portage. I've kept the "x86 ~sparc ~ppc" KEYWORDS since that's how they were for the previous version; since the ~-KEYWORDS were added after the previous fixed version was issued.
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2004-05-20 14:02:06 UTC
GLSA 200405-15