CVE-2025-61962

NameCVE-2025-61962
DescriptionIn fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1117136

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fetchmail (PTS)bullseye6.4.16-4+deb11u1vulnerable
bookworm6.4.37-1vulnerable
trixie6.4.39-1vulnerable
forky6.6.0-1fixed
sid6.6.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fetchmailsource(unstable)6.5.6-11117136

Notes

[trixie] - fetchmail <no-dsa> (Minor issue)
[bookworm] - fetchmail <no-dsa> (Minor issue)
[bullseye] - fetchmail <postponed> (Minor issue)
https://www.fetchmail.info/fetchmail-SA-2025-01.txt
Fixed by: https://gitlab.com/fetchmail/fetchmail/-/commit/4c3cebfa4e659fb778ca2cae0ccb3f69201609a8 (6.5.6)
Followup: https://gitlab.com/fetchmail/fetchmail/-/commit/3c9e49d70e5d958f10b94fc58b3c5046f87cff7a (6.5.7)

Search for package or bug name: Reporting problems