[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
(fwd) fetchmail update -- Immunix OS 6.2, 7.0-beta, 7.0
[I seem to have missed this fetchmail announcement. Please upgrade:
most distributions have an updated fetchmail package available.
Apologies if this already made it to the list -- Raju]
This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="LYw3s/afESlflPpp"
Content-Disposition: inline
Return-Path: <bugtraq-return-431-raju=linux-delhi.org@xxxxxxxxxxxxxxxxx>
Mailing-List: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@xxxxxxxxxxxxxxxxx>
List-Help: <mailto:bugtraq-help@xxxxxxxxxxxxxxxxx>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@xxxxxxxxxxxxxxxxx>
List-Subscribe: <mailto:bugtraq-subscribe@xxxxxxxxxxxxxxxxx>
Delivered-To: mailing list bugtraq@xxxxxxxxxxxxxxxxx
Delivered-To: moderator for bugtraq@xxxxxxxxxxxxxxxxx
Received: (qmail 18200 invoked from network); 15 Jun 2001 00:00:20 -0000
Message-ID: <20010614165435.A4196@xxxxxxxxx>
Mail-Followup-To: bugtraq@xxxxxxxxxxxxxxxxx
User-Agent: Mutt/1.2.5i
From: Immunix Security Team <security@xxxxxxxxx>
To: bugtraq@xxxxxxxxxxxxxxxxx
Subject: fetchmail update -- Immunix OS 6.2, 7.0-beta, 7.0
Date: Thu, 14 Jun 2001 16:54:35 -0700
--LYw3s/afESlflPpp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
-----------------------------------------------------------------------
Immunix OS Security Advisory
Packages updated: fetchmail
Affected products: Immunix OS 6.2, 7.0-beta, and 7.0
Bugs fixed: immunix/1618
Date: Wed Jun 13 2001
Advisory ID: IMNX-2001-70-025-01
Author: Seth Arnold <sarnold@xxxxxxxxx>
-----------------------------------------------------------------------
Description:
Fetchmail, as shipped with Immunix OS 6.2 and 7.0, contains a buffer
overflow in the handling of headers. StackGuard will prevent exploits
from granting privileges; however, denial of service attacks are
possible.
References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=3Dno&bug=3D100394
Thanks go to Wolfram Kleff for finding this problem and Henrique de
Moraes Holschuh for supplying a fix.
Package names and locations:
Precompiled binary packages for Immunix 6.2 are available at:
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/fetchmail-5.3.1-2_St=
ackGuard.i386.rpm
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/fetchmailconf-5.3.1-=
2_StackGuard.i386.rpm
Source packages for Immunix 6.2 are available at:
http://download.immunix.org/ImmunixOS/6.2/updates/SRPMS/fetchmail-5.3.1-2_S=
tackGuard.src.rpm
Precompiled binary packages for Immunix 7.0-beta and 7.0 are available at:
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/fetchmail-5.5.0-4_im=
nx.i386.rpm
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/fetchmailconf-5.5.0-=
4_imnx.i386.rpm
Source package for Immunix 7.0-beta and 7.0 is available at:
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/fetchmail-5.5.0-4_i=
mnx.src.rpm
md5sums of the packages:
6.2:
ea10b64694935dd20be38df09924736a RPMS/fetchmail-5.3.1-2_StackGuard.i386.=
rpm
fdebb78fcabdc43a811f9ed546252850 RPMS/fetchmailconf-5.3.1-2_StackGuard.i=
386.rpm
eb7af556575d1d0e6e59976aa5b09730 SRPMS/fetchmail-5.3.1-2_StackGuard.src.=
rpm
7.0:
e8169308534f68bc978ed2c1bc0aeeca RPMS/fetchmail-5.5.0-4_imnx.i386.rpm
242f4aa0fe21c71f1ddce4cf5c6cb0a0 RPMS/fetchmailconf-5.5.0-4_imnx.i386.rpm
c8c4069439fe66caf013fea502947ada SRPMS/fetchmail-5.5.0-4_imnx.src.rpm
GPG verification: =
=20
Our public key is available at <http://wirex.com/security/GPG_KEY>. =
=20
*** NOTE *** This key is different from the one used in advisories =
=20
IMNX-2001-70-020-01 and earlier.
Online version of all Immunix 6.2 updates and advisories:
http://immunix.org/ImmunixOS/6.2/updates/
Online version of all Immunix 7.0-beta updates and advisories:
http://immunix.org/ImmunixOS/7.0-beta/updates/
Online version of all Immunix 7.0 updates and advisories:
http://immunix.org/ImmunixOS/7.0/updates/
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
Contact information:
To report vulnerabilities, please contact security@xxxxxxxxxx WireX=20
attempts to conform to the RFP vulnerability disclosure protocol
<http://www.wiretrip.net/rfp/policy.html>.
--LYw3s/afESlflPpp
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjspTroACgkQVQcWL60UVMuDaACfSKjU0Te0cUDHmhZ4A+wjVJpS
QxUAnR7lh2XJv6ry/uVrtTDbSaa7m3Dr
=GGjX
-----END PGP SIGNATURE-----
--LYw3s/afESlflPpp--
------------------------------
End of this Digest
******************
--
Raju Mathur raju@xxxxxxxxxxxxx http://kandalaya.org/