lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1DyMja-0007gr-SH@mercury.mandriva.com>
Date: Fri Jul 29 05:44:46 2005
From: security at mandriva.com (Mandriva Security Team)
Subject: MDKSA-2005:126 - Updated fetchmail packages fix
	vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           fetchmail
 Advisory ID:            MDKSA-2005:126
 Date:                   July 28th, 2005

 Affected versions:	 10.1, 10.2, Corporate 3.0,
			 Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 A buffer overflow was discovered in fetchmail's POP3 client which
 could allow a malicious server to send a carefully crafted message
 UID, causing fetchmail to crash or potentially execute arbitrary
 code as the user running fetchmail.
 
 The updated packages have been patched to address this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2335
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.1:
 563f08174b32d11c7d072a7c86672cd6  10.1/RPMS/fetchmail-6.2.5-5.1.101mdk.i586.rpm
 322f5e01a8ccf9611119bf56c81b3c34  10.1/RPMS/fetchmail-daemon-6.2.5-5.1.101mdk.i586.rpm
 b41cd62c89bd4e728107b8fadb3d10dd  10.1/RPMS/fetchmailconf-6.2.5-5.1.101mdk.i586.rpm
 9193b1c0ccf4d8dc1158a2707ff73628  10.1/SRPMS/fetchmail-6.2.5-5.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 e160ad934bb3007cf35c050006bd9bec  x86_64/10.1/RPMS/fetchmail-6.2.5-5.1.101mdk.x86_64.rpm
 193c90622e9279417f0d89e7368162d2  x86_64/10.1/RPMS/fetchmail-daemon-6.2.5-5.1.101mdk.x86_64.rpm
 8b29df74bc7cc01ad0e57052908d96fb  x86_64/10.1/RPMS/fetchmailconf-6.2.5-5.1.101mdk.x86_64.rpm
 9193b1c0ccf4d8dc1158a2707ff73628  x86_64/10.1/SRPMS/fetchmail-6.2.5-5.1.101mdk.src.rpm

 Mandrakelinux 10.2:
 f25ca14a570b18627309b1ec6d6118bb  10.2/RPMS/fetchmail-6.2.5-10.1.102mdk.i586.rpm
 afdcff56a05aebf22b7cd138166d4ca7  10.2/RPMS/fetchmail-daemon-6.2.5-10.1.102mdk.i586.rpm
 6d58bd3064e22875011b97cee9c2d809  10.2/RPMS/fetchmailconf-6.2.5-10.1.102mdk.i586.rpm
 7d6ab32632446ed61fc18591f1c2fd00  10.2/SRPMS/fetchmail-6.2.5-10.1.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 8f0f018bb2807d5285ae2ef05bb57107  x86_64/10.2/RPMS/fetchmail-6.2.5-10.1.102mdk.x86_64.rpm
 870f31b16001b83be84e51cc93a92200  x86_64/10.2/RPMS/fetchmail-daemon-6.2.5-10.1.102mdk.x86_64.rpm
 2f464f9c3409880ef9c457b9986ae712  x86_64/10.2/RPMS/fetchmailconf-6.2.5-10.1.102mdk.x86_64.rpm
 7d6ab32632446ed61fc18591f1c2fd00  x86_64/10.2/SRPMS/fetchmail-6.2.5-10.1.102mdk.src.rpm

 Corporate Server 2.1:
 96185810b7b4ad91d4986fd0d946a15d  corporate/2.1/RPMS/fetchmail-6.1.0-1.3.C21mdk.i586.rpm
 268fdaf86ca3f5f33b9c1ac0a00efc4a  corporate/2.1/RPMS/fetchmail-daemon-6.1.0-1.3.C21mdk.i586.rpm
 647d592ec242a09fa869da6f37660299  corporate/2.1/RPMS/fetchmailconf-6.1.0-1.3.C21mdk.i586.rpm
 8d3e996da39619613de0046e7c9cb459  corporate/2.1/SRPMS/fetchmail-6.1.0-1.3.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 d19fab3b9b57c4f9c9e4fe6aebd6ea81  x86_64/corporate/2.1/RPMS/fetchmail-6.1.0-1.3.C21mdk.x86_64.rpm
 587dc00b22b6fd4e9b17f5bdb26457f6  x86_64/corporate/2.1/RPMS/fetchmail-daemon-6.1.0-1.3.C21mdk.x86_64.rpm
 1d44d1c54e69049966b222ada486e633  x86_64/corporate/2.1/RPMS/fetchmailconf-6.1.0-1.3.C21mdk.x86_64.rpm
 8d3e996da39619613de0046e7c9cb459  x86_64/corporate/2.1/SRPMS/fetchmail-6.1.0-1.3.C21mdk.src.rpm

 Corporate 3.0:
 9d67bcb3d6485a0ffb243f9ed23cda22  corporate/3.0/RPMS/fetchmail-6.2.5-3.1.C30mdk.i586.rpm
 f9283b89d96efbbb8f2ce98abe00c563  corporate/3.0/RPMS/fetchmail-daemon-6.2.5-3.1.C30mdk.i586.rpm
 4c170dbe398c93923d2a106dc6275c2e  corporate/3.0/RPMS/fetchmailconf-6.2.5-3.1.C30mdk.i586.rpm
 f7c51eab215fe7c2e46baf154c315d26  corporate/3.0/SRPMS/fetchmail-6.2.5-3.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 6e40e50873f3ca1b49d948e1a3be052a  x86_64/corporate/3.0/RPMS/fetchmail-6.2.5-3.1.C30mdk.x86_64.rpm
 77d83cddcb9d2daf4b04a8ce09da90b7  x86_64/corporate/3.0/RPMS/fetchmail-daemon-6.2.5-3.1.C30mdk.x86_64.rpm
 a90e50cc1bbec81fbc8949ef5da5b87f  x86_64/corporate/3.0/RPMS/fetchmailconf-6.2.5-3.1.C30mdk.x86_64.rpm
 f7c51eab215fe7c2e46baf154c315d26  x86_64/corporate/3.0/SRPMS/fetchmail-6.2.5-3.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFC6bQymqjQ0CJFipgRAmfLAJwKvk84UihIhXCD1wdz9nm+CpBwLACfWhfT
sYLrf/Af0isUirXO73e/Ygg=
=paDW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists