Arrivano fresche di ieri!:-)
Giovanni Caruso
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-- Frase Casuale --
Never trust anyone who says money is no object.
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
----------------------------------------------
# ICQ: 99-76-27-88 #
----------------------------------------------
________________________________________________________________________
Mandrake Linux Security Update Advisory
________________________________________________________________________
Package name: xinetd
Date: July 5th, 2001
Original Advisory Date: June 11th, 2001
Advisory ID: MDKSA-2001:055-1
Affected versions: 7.2, 8.0, Single Network Firewall 7.2
________________________________________________________________________
Problem Description:
A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with
TCP connections with the WAIT state that prevents linuxconf-web from
working properly. As well, xinetd contains a security flaw in which
it defaults to a umask of 0. This means that applications using the
xinetd umask that do not set permissions themselves (like SWAT, a web
configuration tool for Samba), will create world writable files. This
update sets the default umask to 022.
Update:
This update forces the TMPDIR to /tmp instead of obtaining it from the
root user by default, which uses /root/tmp. As well, this version of
xinetd also fixed a possible buffer overflow in the logging code that
was reported by zen-parse on bugtraq, but was not mentioned in the
previous advisory.
________________________________________________________________________
References:
http://www.securityfocus.com/bid/2826
http://www.securityfocus.com/bid/2840
________________________________________________________________________
Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:
rpm --checksig package.rpm
You can get the GPG public key of the Mandrake Linux Security Team at
http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.
Linux-Mandrake 7.2:
681f8a35afdaea2781d4fc32d93993ab 7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b 7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm
Mandrake Linux 8.0:
d9e1bdc5a29712a75608c4753f6d6490 8.0/RPMS/xinetd-2.3.0-1.1mdk.i586.rpm
9f95def40b777f13fc8339bf321b9547 8.0/RPMS/xinetd-ipv6-2.3.0-1.1mdk.i586.rpm
5820ae84905e550320601fe422a9a1b4 8.0/SRPMS/xinetd-2.3.0-1.1mdk.src.rpm
Single Network Firewall 7.2:
681f8a35afdaea2781d4fc32d93993ab snf7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b snf7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm
________________________________________________________________________
Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
3610 - linuxconf denial of service
________________________________________________________________________
To upgrade automatically, use MandrakeUpdate.
If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".
You can download the updates directly from one of the mirror sites
http://www.linux-mandrake.com/en/ftp.php3.
Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Mandrake Linux 8.0, look for it in "updates/8.0/RPMS/". Updated source
RPMs are available as well, but you generally do not need to download
them.
ED INOLTRE
________________________________________________________________________
Mandrake Linux Security Update Advisory
________________________________________________________________________
Package name: fetchmail
Date: July 5th, 2001
Advisory ID: MDKSA-2001:063
Affected versions: 7.1, 7.2, 8.0, Corporate Server 1.0.1,
Single Network Firewall 7.2
________________________________________________________________________
Problem Description:
Wolfram Kleff reported recently that the fetchmail program would
segfault when receiving emails with a very large "To:" header. This is
due to a buffer overflow within the header parsing code, which can be
exploited remotely.
________________________________________________________________________
References:
http://bugs.debian.org/100394
________________________________________________________________________
Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:
rpm --checksig package.rpm
You can get the GPG public key of the Mandrake Linux Security Team at
http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.
Linux-Mandrake 7.1:
dde4353600605b2c7007e66084a2adbc 7.1/RPMS/fetchmail-5.3.8-4.1mdk.i586.rpm
799409e78645f9bace3e19bcf5e499f3 7.1/RPMS/fetchmailconf-5.3.8-4.1mdk.i586.rpm
0ec22d1bd0d69c5942e5ceb9a24a7a1e 7.1/SRPMS/fetchmail-5.3.8-4.1mdk.src.rpm
Linux-Mandrake 7.2:
f9726971c69d2c305e47896fec5f1c3d 7.2/RPMS/fetchmail-5.5.2-5.1mdk.i586.rpm
c8ae081f14e5c7fc0007a459e81b9229
7.2/RPMS/fetchmail-daemon-5.5.2-5.1mdk.i586.rpm
873ce5f00faada719f061d109351fe73 7.2/RPMS/fetchmailconf-5.5.2-5.1mdk.i586.rpm
bacf55efa2adb11a4669afe2ade7284b 7.2/SRPMS/fetchmail-5.5.2-5.1mdk.src.rpm
Mandrake Linux 8.0:
3b1e12c828e28e9a31947bf5046a59d0 8.0/RPMS/fetchmail-5.7.4-5.1mdk.i586.rpm
d4efb43e905b1e7039b407a6649c2812
8.0/RPMS/fetchmail-daemon-5.7.4-5.1mdk.i586.rpm
18f72c84c4eeb6740ebcd71825a0605a 8.0/RPMS/fetchmailconf-5.7.4-5.1mdk.i586.rpm
94b828fda9cf2d223a81399f135c42ca 8.0/SRPMS/fetchmail-5.7.4-5.1mdk.src.rpm
Corporate Server 1.0.1:
dde4353600605b2c7007e66084a2adbc 1.0.1/RPMS/fetchmail-5.3.8-4.1mdk.i586.rpm
799409e78645f9bace3e19bcf5e499f3 1.0.1/RPMS/fetchmailconf-5.3.8-4.1mdk.i586.rpm
0ec22d1bd0d69c5942e5ceb9a24a7a1e 1.0.1/SRPMS/fetchmail-5.3.8-4.1mdk.src.rpm
Single Network Firewall 7.2:
f9726971c69d2c305e47896fec5f1c3d snf7.2/RPMS/fetchmail-5.5.2-5.1mdk.i586.rpm
c8ae081f14e5c7fc0007a459e81b9229
snf7.2/RPMS/fetchmail-daemon-5.5.2-5.1mdk.i586.rpm
873ce5f00faada719f061d109351fe73
snf7.2/RPMS/fetchmailconf-5.5.2-5.1mdk.i586.rpm
bacf55efa2adb11a4669afe2ade7284b snf7.2/SRPMS/fetchmail-5.5.2-5.1mdk.src.rpm
________________________________________________________________________
Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________
To upgrade automatically, use MandrakeUpdate.
If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".
You can download the updates directly from one of the mirror sites
listed at:
http://www.linux-mandrake.com/en/ftp.php3.
Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Mandrake Linux 8.0, look for it in "updates/8.0/RPMS/". Updated source
RPMs are available as well, but you generally do not need to download
them.
|