[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

(fwd) fetchmail update -- Immunix OS 6.2, 7.0-beta, 7.0



[I seem to have missed this fetchmail announcement.  Please upgrade:
most distributions have an updated fetchmail package available.
Apologies if this already made it to the list -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="LYw3s/afESlflPpp"
Content-Disposition: inline
Return-Path: <bugtraq-return-431-raju=linux-delhi.org@xxxxxxxxxxxxxxxxx>
Mailing-List: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@xxxxxxxxxxxxxxxxx>
List-Help: <mailto:bugtraq-help@xxxxxxxxxxxxxxxxx>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@xxxxxxxxxxxxxxxxx>
List-Subscribe: <mailto:bugtraq-subscribe@xxxxxxxxxxxxxxxxx>
Delivered-To: mailing list bugtraq@xxxxxxxxxxxxxxxxx
Delivered-To: moderator for bugtraq@xxxxxxxxxxxxxxxxx
Received: (qmail 18200 invoked from network); 15 Jun 2001 00:00:20 -0000
Message-ID: <20010614165435.A4196@xxxxxxxxx>
Mail-Followup-To: bugtraq@xxxxxxxxxxxxxxxxx
User-Agent: Mutt/1.2.5i
From: Immunix Security Team <security@xxxxxxxxx>
To: bugtraq@xxxxxxxxxxxxxxxxx
Subject: fetchmail update -- Immunix OS 6.2, 7.0-beta, 7.0
Date: Thu, 14 Jun 2001 16:54:35 -0700

--LYw3s/afESlflPpp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

-----------------------------------------------------------------------
	Immunix OS Security Advisory

Packages updated:	fetchmail
Affected products:	Immunix OS 6.2, 7.0-beta, and 7.0
Bugs fixed:		immunix/1618
Date:			Wed Jun 13 2001
Advisory ID:		IMNX-2001-70-025-01
Author:			Seth Arnold <sarnold@xxxxxxxxx>
-----------------------------------------------------------------------

Description:
  Fetchmail, as shipped with Immunix OS 6.2 and 7.0, contains a buffer
  overflow in the handling of headers. StackGuard will prevent exploits
  from granting privileges; however, denial of service attacks are
  possible.

  References:
  http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=3Dno&bug=3D100394

  Thanks go to Wolfram Kleff for finding this problem and Henrique de
  Moraes Holschuh for supplying a fix.

Package names and locations:
  Precompiled binary packages for Immunix 6.2 are available at:
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/fetchmail-5.3.1-2_St=
ackGuard.i386.rpm
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/fetchmailconf-5.3.1-=
2_StackGuard.i386.rpm

  Source packages for Immunix 6.2 are available at:
http://download.immunix.org/ImmunixOS/6.2/updates/SRPMS/fetchmail-5.3.1-2_S=
tackGuard.src.rpm

  Precompiled binary packages for Immunix 7.0-beta and 7.0 are available at:
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/fetchmail-5.5.0-4_im=
nx.i386.rpm
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/fetchmailconf-5.5.0-=
4_imnx.i386.rpm

  Source package for Immunix 7.0-beta and 7.0 is available at:
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/fetchmail-5.5.0-4_i=
mnx.src.rpm

md5sums of the packages:
6.2:
  ea10b64694935dd20be38df09924736a  RPMS/fetchmail-5.3.1-2_StackGuard.i386.=
rpm
  fdebb78fcabdc43a811f9ed546252850  RPMS/fetchmailconf-5.3.1-2_StackGuard.i=
386.rpm
  eb7af556575d1d0e6e59976aa5b09730  SRPMS/fetchmail-5.3.1-2_StackGuard.src.=
rpm

7.0:
  e8169308534f68bc978ed2c1bc0aeeca  RPMS/fetchmail-5.5.0-4_imnx.i386.rpm
  242f4aa0fe21c71f1ddce4cf5c6cb0a0  RPMS/fetchmailconf-5.5.0-4_imnx.i386.rpm
  c8c4069439fe66caf013fea502947ada  SRPMS/fetchmail-5.5.0-4_imnx.src.rpm

GPG verification:                                                          =
    =20
  Our public key is available at <http://wirex.com/security/GPG_KEY>.      =
    =20
  *** NOTE *** This key is different from the one used in advisories       =
    =20
  IMNX-2001-70-020-01 and earlier.

Online version of all Immunix 6.2 updates and advisories:
  http://immunix.org/ImmunixOS/6.2/updates/

Online version of all Immunix 7.0-beta updates and advisories:
  http://immunix.org/ImmunixOS/7.0-beta/updates/

Online version of all Immunix 7.0 updates and advisories:
  http://immunix.org/ImmunixOS/7.0/updates/

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

Contact information:
  To report vulnerabilities, please contact security@xxxxxxxxxx WireX=20
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.

--LYw3s/afESlflPpp
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjspTroACgkQVQcWL60UVMuDaACfSKjU0Te0cUDHmhZ4A+wjVJpS
QxUAnR7lh2XJv6ry/uVrtTDbSaa7m3Dr
=GGjX
-----END PGP SIGNATURE-----

--LYw3s/afESlflPpp--

------------------------------

End of this Digest
******************

-- 
Raju Mathur          raju@xxxxxxxxxxxxx           http://kandalaya.org/