erlug
[Top] [All Lists]

[Erlug] Da BUGTRAQ - Problemi con MDK e fetchmail!

To: erlug@xxxxxxxxxxxxxx
Subject: [Erlug] Da BUGTRAQ - Problemi con MDK e fetchmail!
From: Giovanni Caruso <pecico@xxxxxxxxx>
Date: Fri, 6 Jul 2001 11:23:56 +0200
Arrivano fresche di ieri!:-)

Giovanni Caruso
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-- Frase Casuale --

Never trust anyone who says money is no object.

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
----------------------------------------------
#               ICQ: 99-76-27-88             #
----------------------------------------------

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           xinetd
Date:                   July 5th, 2001
Original Advisory Date: June 11th, 2001
Advisory ID:            MDKSA-2001:055-1

Affected versions:      7.2, 8.0, Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

 A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with
 TCP connections with the WAIT state that prevents linuxconf-web from
 working properly.  As well, xinetd contains a security flaw in which
 it defaults to a umask of 0.  This means that applications using the
 xinetd umask that do not set permissions themselves (like SWAT, a web
 configuration tool for Samba), will create world writable files.  This
 update sets the default umask to 022.

Update:

 This update forces the TMPDIR to /tmp instead of obtaining it from the
 root user by default, which uses /root/tmp.  As well, this version of
 xinetd also fixed a possible buffer overflow in the logging code that
 was reported by zen-parse on bugtraq, but was not mentioned in the
 previous advisory.
________________________________________________________________________

References:

 http://www.securityfocus.com/bid/2826
 http://www.securityfocus.com/bid/2840
________________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Mandrake Linux Security Team at
  http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 7.2:
681f8a35afdaea2781d4fc32d93993ab  7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b  7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm

Mandrake Linux 8.0:
d9e1bdc5a29712a75608c4753f6d6490  8.0/RPMS/xinetd-2.3.0-1.1mdk.i586.rpm
9f95def40b777f13fc8339bf321b9547  8.0/RPMS/xinetd-ipv6-2.3.0-1.1mdk.i586.rpm
5820ae84905e550320601fe422a9a1b4  8.0/SRPMS/xinetd-2.3.0-1.1mdk.src.rpm

Single Network Firewall 7.2:
681f8a35afdaea2781d4fc32d93993ab  snf7.2/RPMS/xinetd-2.3.0-1.2mdk.i586.rpm
1b3650c4d3bf4f110a795639fbf4000b  snf7.2/SRPMS/xinetd-2.3.0-1.2mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

3610 - linuxconf denial of service
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites


  http://www.linux-mandrake.com/en/ftp.php3.

Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Mandrake Linux 8.0, look for it in "updates/8.0/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.


ED INOLTRE

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           fetchmail
Date:                   July 5th, 2001
Advisory ID:            MDKSA-2001:063

Affected versions:      7.1, 7.2, 8.0, Corporate Server 1.0.1,
                        Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

 Wolfram Kleff reported recently that the fetchmail program would
 segfault when receiving emails with a very large "To:" header.  This is
 due to a buffer overflow within the header parsing code, which can be
 exploited remotely.
________________________________________________________________________

References:

 http://bugs.debian.org/100394
________________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Mandrake Linux Security Team at
  http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 7.1:
dde4353600605b2c7007e66084a2adbc  7.1/RPMS/fetchmail-5.3.8-4.1mdk.i586.rpm
799409e78645f9bace3e19bcf5e499f3  7.1/RPMS/fetchmailconf-5.3.8-4.1mdk.i586.rpm
0ec22d1bd0d69c5942e5ceb9a24a7a1e  7.1/SRPMS/fetchmail-5.3.8-4.1mdk.src.rpm

Linux-Mandrake 7.2:
f9726971c69d2c305e47896fec5f1c3d  7.2/RPMS/fetchmail-5.5.2-5.1mdk.i586.rpm
c8ae081f14e5c7fc0007a459e81b9229  
7.2/RPMS/fetchmail-daemon-5.5.2-5.1mdk.i586.rpm
873ce5f00faada719f061d109351fe73  7.2/RPMS/fetchmailconf-5.5.2-5.1mdk.i586.rpm
bacf55efa2adb11a4669afe2ade7284b  7.2/SRPMS/fetchmail-5.5.2-5.1mdk.src.rpm

Mandrake Linux 8.0:
3b1e12c828e28e9a31947bf5046a59d0  8.0/RPMS/fetchmail-5.7.4-5.1mdk.i586.rpm
d4efb43e905b1e7039b407a6649c2812  
8.0/RPMS/fetchmail-daemon-5.7.4-5.1mdk.i586.rpm
18f72c84c4eeb6740ebcd71825a0605a  8.0/RPMS/fetchmailconf-5.7.4-5.1mdk.i586.rpm
94b828fda9cf2d223a81399f135c42ca  8.0/SRPMS/fetchmail-5.7.4-5.1mdk.src.rpm

Corporate Server 1.0.1:
dde4353600605b2c7007e66084a2adbc  1.0.1/RPMS/fetchmail-5.3.8-4.1mdk.i586.rpm
799409e78645f9bace3e19bcf5e499f3  1.0.1/RPMS/fetchmailconf-5.3.8-4.1mdk.i586.rpm
0ec22d1bd0d69c5942e5ceb9a24a7a1e  1.0.1/SRPMS/fetchmail-5.3.8-4.1mdk.src.rpm

Single Network Firewall 7.2:
f9726971c69d2c305e47896fec5f1c3d  snf7.2/RPMS/fetchmail-5.5.2-5.1mdk.i586.rpm
c8ae081f14e5c7fc0007a459e81b9229  
snf7.2/RPMS/fetchmail-daemon-5.5.2-5.1mdk.i586.rpm
873ce5f00faada719f061d109351fe73  
snf7.2/RPMS/fetchmailconf-5.5.2-5.1mdk.i586.rpm
bacf55efa2adb11a4669afe2ade7284b  snf7.2/SRPMS/fetchmail-5.5.2-5.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:

  http://www.linux-mandrake.com/en/ftp.php3.

Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Mandrake Linux 8.0, look for it in "updates/8.0/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.
       



<Prev in Thread] Current Thread [Next in Thread>
  • [Erlug] Da BUGTRAQ - Problemi con MDK e fetchmail!, Giovanni Caruso <=