From redhat: "Ludwig Nussel reported a flaw in libc-client / uw-imap: The rfc822_output_char() function in the uw-imap c-client library does not check whether the buffer is already full and may therefore write one byte too much. This leads to a segfault in rfc822_output_data() later due to memcpy with size -1. Issue was fixed in imap-2007e: Updated: 16 December 2008 imap-2007e is a maintenance release, consisting primarily of bugfixes to problems discovered in the release that affected a small number of users plus a security fix for users of the RFC822BUFFER routines."
gunnar, can you please provide an updated ebuild?
net-libs/c-client-2007e is in the tree. Targets: alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86
ppc64 done
ppc stable
amd64 stable
sparc stable
Stable for HPPA.
x86 stable
alpha/ia64 stable
time for vote. Since it can be used on servers too, i vote yes.
YES, filed.
CVE-2009-0671 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0671): Format string vulnerability in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit imap-2007d and other applications, allows remote attackers to execute arbitrary code via format string specifiers in the initial request to the IMAP port (143/tcp).
I think it fits, so let's handle that one in the glsa, too.
Craig, you can't simply add CVEs that require [ebuild] status to a [glsa] bug.
Whoops, sorry, I thought it might be ok, because of the affected versions, but well, I failed a bit. :/
arm/s390/sh stable
245425
eehh.. GLSA 200911-03