lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed Jun 14 22:45:09 2006
From: security at mandriva.com (security@...driva.com)
Subject: [ MDKSA-2006:103 ] - Updated spamassassin
	packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:103
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : spamassassin
 Date    : June 14, 2006
 Affected: 10.2, 2006.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 A flaw was discovered in the way that spamd processes the virtual POP
 usernames passed to it.  If running with the --vpopmail and --paranoid
 flags, it is possible for a remote user with the ability to connect to
 the spamd daemon to execute arbitrary commands as the user running
 spamd.
 
 By default, the Spamassassin packages do not start spamd with either
 of these flags and this usage is uncommon.
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.2:
 46d652b5f05d2cfbae963971c24d78d4  10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.3.102mdk.i586.rpm
 44a1224bd226519db22aebb270c42483  10.2/RPMS/spamassassin-3.0.4-0.3.102mdk.i586.rpm
 9f179cd3bfd20da13d362f5401852c6d  10.2/RPMS/spamassassin-spamc-3.0.4-0.3.102mdk.i586.rpm
 c60a25750b6ad0b230ae899d316e1541  10.2/RPMS/spamassassin-spamd-3.0.4-0.3.102mdk.i586.rpm
 e438cff191d2a2f476958e26db6dd73c  10.2/RPMS/spamassassin-tools-3.0.4-0.3.102mdk.i586.rpm
 9f045bc37ba54f4f7cf96160c8263684  10.2/SRPMS/spamassassin-3.0.4-0.3.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 10a7877e1f767e4362add79f63a4b59a  x86_64/10.2/RPMS/perl-Mail-SpamAssassin-3.0.4-0.3.102mdk.x86_64.rpm
 6758d4621bc87196c4f414671151f664  x86_64/10.2/RPMS/spamassassin-3.0.4-0.3.102mdk.x86_64.rpm
 d81349deafb0f75404bd0392aa0265c2  x86_64/10.2/RPMS/spamassassin-spamc-3.0.4-0.3.102mdk.x86_64.rpm
 729c50b086cf1615ae0b93899ab13be2  x86_64/10.2/RPMS/spamassassin-spamd-3.0.4-0.3.102mdk.x86_64.rpm
 fc6093c2bebb9529a50a4387d08c9f12  x86_64/10.2/RPMS/spamassassin-tools-3.0.4-0.3.102mdk.x86_64.rpm
 9f045bc37ba54f4f7cf96160c8263684  x86_64/10.2/SRPMS/spamassassin-3.0.4-0.3.102mdk.src.rpm

 Mandriva Linux 2006.0:
 5f9c4967f7d5ee68f3685fb73c4f9c00  2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk.i586.rpm
 84d2d9fd675db96f575c0eabeec7f504  2006.0/RPMS/spamassassin-3.0.4-3.3.20060mdk.i586.rpm
 4d138b95b964f971f2b7943f996e4fbc  2006.0/RPMS/spamassassin-spamc-3.0.4-3.3.20060mdk.i586.rpm
 aad1be80017b7532e55f713204e67246  2006.0/RPMS/spamassassin-spamd-3.0.4-3.3.20060mdk.i586.rpm
 5e4a07050a994dd497de42abaf3755da  2006.0/RPMS/spamassassin-tools-3.0.4-3.3.20060mdk.i586.rpm
 8fa7eb76024abfdca38fcdc567402a05  2006.0/SRPMS/spamassassin-3.0.4-3.3.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 0f8ac90b7835c2668071a7cb5a0b2df0  x86_64/2006.0/RPMS/perl-Mail-SpamAssassin-3.0.4-3.3.20060mdk.x86_64.rpm
 55d30c87ae9f1d4e7fc780227be56a7d  x86_64/2006.0/RPMS/spamassassin-3.0.4-3.3.20060mdk.x86_64.rpm
 8d4cdb3684ed973c7d2fa331293caf7f  x86_64/2006.0/RPMS/spamassassin-spamc-3.0.4-3.3.20060mdk.x86_64.rpm
 80a5662cbed250ae5a19b037eb394b79  x86_64/2006.0/RPMS/spamassassin-spamd-3.0.4-3.3.20060mdk.x86_64.rpm
 40d6535486f0ac104864ad84df2c480e  x86_64/2006.0/RPMS/spamassassin-tools-3.0.4-3.3.20060mdk.x86_64.rpm
 8fa7eb76024abfdca38fcdc567402a05  x86_64/2006.0/SRPMS/spamassassin-3.0.4-3.3.20060mdk.src.rpm

 Corporate 3.0:
 e9880dac2293151fee552116c8e5a902  corporate/3.0/RPMS/perl-Mail-SpamAssassin-2.63-3.1.C30mdk.i586.rpm
 4e170728b22d192b000815858b273eee  corporate/3.0/RPMS/spamassassin-2.63-3.1.C30mdk.i586.rpm
 d521f709485d50b855c01498bafd2ee9  corporate/3.0/RPMS/spamassassin-tools-2.63-3.1.C30mdk.i586.rpm
 9dd833ee9117769090e31737a3b5d3c0  corporate/3.0/SRPMS/spamassassin-2.63-3.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 522ceb2099aba82353b5d6c0b84e036b  x86_64/corporate/3.0/RPMS/perl-Mail-SpamAssassin-2.63-3.1.C30mdk.x86_64.rpm
 fed7d62ada9999eb881cd91c97813b12  x86_64/corporate/3.0/RPMS/spamassassin-2.63-3.1.C30mdk.x86_64.rpm
 6af7154dca6dde227556a29232c4936d  x86_64/corporate/3.0/RPMS/spamassassin-tools-2.63-3.1.C30mdk.x86_64.rpm
 9dd833ee9117769090e31737a3b5d3c0  x86_64/corporate/3.0/SRPMS/spamassassin-2.63-3.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEkFYHmqjQ0CJFipgRAlSVAJ9cY1AAwtDpxsv1JMxKsnLCyZtEywCgmZlq
bA4bUKgkrdNEVlvUfTUEbB0=
=BaSw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ