Bug 99698 - japanese/mutt-devel: Fix IMAP buffer overflow vulnerability
Summary: japanese/mutt-devel: Fix IMAP buffer overflow vulnerability
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Shaun Amott
Depends on:
Reported: 2006-07-01 21:40 UTC by Shaun Amott
Modified: 2006-07-03 16:44 UTC (History)
0 users

See Also:

mutt-devel.diff (1.51 KB, patch)
2006-07-01 21:40 UTC, Shaun Amott
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Shaun Amott freebsd_committer 2006-07-01 21:40:16 UTC
Add patch to fix IMAP buffer overflow vulnerability:
Comment 1 Edwin Groothuis freebsd_committer 2006-07-01 22:04:07 UTC
Responsible Changed
From-To: freebsd-ports-bugs->shaun

Submitter has GNATS access
Comment 2 Edwin Groothuis freebsd_committer 2006-07-01 22:04:13 UTC
State Changed
From-To: open->feedback

Awaiting maintainers feedback
Comment 3 SHIOZAKI Takehiko 2006-07-03 03:12:16 UTC
Dear Edwin Groothuis et al

Thank you for your advice.
I approve the patch and would appreciate it if you'd commit it.


[On Jul  1, Edwin Groothuis <edwin@FreeBSD.org> wrote:]

>Maintainer of japanese/mutt-devel,
>Please note that PR ports/99698 has just been submitted.
>If it contains a patch for an upgrade, an enhancement or a bug fix
>you agree on, reply to this email stating that you approve the patch
>and a committer will take care of it.
>The full text of the PR can be found at:
>    http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/99698
>Edwin Groothuis

Comment 4 Shaun Amott freebsd_committer 2006-07-03 16:44:16 UTC
State Changed
From-To: feedback->closed

Committed, thanks!