[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87abl0rik0.fsf@mid.deneb.enyo.de>
Date: Sat, 15 Mar 2008 00:29:19 +0100
From: Florian Weimer <fw@...eb.enyo.de>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1516-1] New dovecot packages fix
privilege escalation
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ----------------------------------------------------------------------
Debian Security Advisory DSA-1516-1 security@...ian.org
http://www.debian.org/security/ Florian Weimer
March 14, 2008 http://www.debian.org/security/faq
- ----------------------------------------------------------------------
Package : dovecot
Vulnerability : privilege escalation
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2008-1199 CVE-2008-1218
Debian Bug : 469457
Prior to this update, the default configuration for Dovecot used by
Debian runs the server daemons with group mail privileges. This means
that users with write access to their mail directory by other means
(for example, through an SSH login) could read mailboxes owned by
other users for which they do not have direct write access
(CVE-2008-1199). In addition, an internal interpretation conflict in
password handling has been addressed proactively, even though it is
not known to be exploitable (CVE-2008-1218).
Note that applying this update requires manual action: The
configuration setting "mail_extra_groups = mail" has been replaced
with "mail_privileged_group = mail". The update will show a
configuration file conflict in /etc/dovecot/dovecot.conf. It is
recommended that you keep the currently installed configuration file,
and change the affected line. For your reference, the sample
configuration (without your local changes) will have been written to
/etc/dovecot/dovecot.conf.dpkg-new.
If your current configuration uses mail_extra_groups with a value
different from "mail", you may have to resort to the
mail_access_groups configuration directive.
For the stable distribution (etch), these problems have been fixed in
version 1.0.rc15-2etch4.
For the unstable distribution (sid), these problems have been fixed in
version 1.0.13-1.
For the old stable distribution (sarge), no updates are provided.
We recommend that you consider upgrading to the stable distribution.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Source archives:
http://security.debian.org/pool/updates/main/d/dovecot/dovecot_1.0.rc15-2etch4.dsc
Size/MD5 checksum: 1300 8146ccf246ed64e1ac8c0127489ec798
http://security.debian.org/pool/updates/main/d/dovecot/dovecot_1.0.rc15.orig.tar.gz
Size/MD5 checksum: 1463069 26f3d2b075856b1b1d180146363819e6
http://security.debian.org/pool/updates/main/d/dovecot/dovecot_1.0.rc15-2etch4.diff.gz
Size/MD5 checksum: 102991 21959fc45cf0f8932fa9eb890791ff39
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_alpha.deb
Size/MD5 checksum: 583482 a0d18885da096140ceb4110d525569d4
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_alpha.deb
Size/MD5 checksum: 1379844 6103bce830848d3f9bb4347f5c9b94f0
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_alpha.deb
Size/MD5 checksum: 621320 48127903af1fe2130cb84c57e5a607ff
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_amd64.deb
Size/MD5 checksum: 1222430 1c2e1ffeb6bf745ed88cde01c62d264a
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_amd64.deb
Size/MD5 checksum: 536634 4f64ed0cc16510e9c3d709342b3c57ca
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_amd64.deb
Size/MD5 checksum: 569588 c17bac715f188f55ae20e5a3c95109b1
arm architecture (ARM)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_arm.deb
Size/MD5 checksum: 1123030 47eb9fddcc68c2c213afa10c8e3d8747
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_arm.deb
Size/MD5 checksum: 506134 0f4d939f2cf68f4e5b01140c846e50bc
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_arm.deb
Size/MD5 checksum: 537564 82310ae4e42406429f8ade7cbb81abf0
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_hppa.deb
Size/MD5 checksum: 1298818 603d12284115b6349e1d0334263d2af0
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_hppa.deb
Size/MD5 checksum: 562192 413ac964849698428c1b08e9cc9075bc
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_hppa.deb
Size/MD5 checksum: 598934 811c32b5c7e2009e5bf2f0ee0ea26859
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_i386.deb
Size/MD5 checksum: 1133484 3bf26ab783ddffed0b3c5ee53225ba20
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_i386.deb
Size/MD5 checksum: 546528 d53c11fd1c39870bd208d684e70e7551
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_i386.deb
Size/MD5 checksum: 514280 e85dcbcdd9b85f6e09cdeb4c82b47916
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_ia64.deb
Size/MD5 checksum: 793878 106fe266dd26373615772b4e3636a914
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_ia64.deb
Size/MD5 checksum: 737582 18b15162711b22a704d0ff1ff26e0261
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_ia64.deb
Size/MD5 checksum: 1701788 7535b0a3407f664efa66bcf86966ff85
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_mips.deb
Size/MD5 checksum: 559520 96d7ff1bbd3a38fbdd3bd06b4bc939fb
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_mips.deb
Size/MD5 checksum: 594680 41536feb8048183b78f0d1742278520c
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_mips.deb
Size/MD5 checksum: 1265800 a42823e1253c78709d5d1c18668d9b40
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_mipsel.deb
Size/MD5 checksum: 1268408 25c8582fea24e3174283066b7c8b6525
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_mipsel.deb
Size/MD5 checksum: 594912 264c368593a3fe7a9268aadee2ab1292
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_mipsel.deb
Size/MD5 checksum: 558832 d2a20bbfe49d234d0f3c7911c17c9bfb
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_powerpc.deb
Size/MD5 checksum: 569772 e49cc25c54e4fa88217e0fa555de6039
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_powerpc.deb
Size/MD5 checksum: 536000 92330b2d1fa2ae8bf6c1b8f05cea3d59
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_powerpc.deb
Size/MD5 checksum: 1212096 e2339d417408e14eba21b28684926a5b
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_s390.deb
Size/MD5 checksum: 559786 3f7faca1fa56aa29a013068e14e7fada
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_s390.deb
Size/MD5 checksum: 1290186 5b8722445aab8b59ba15beae695e7f77
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_s390.deb
Size/MD5 checksum: 595498 ad3af123ee9c10dece62ff7cf0e84b35
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-imapd_1.0.rc15-2etch4_sparc.deb
Size/MD5 checksum: 533482 576d0f5a1a733dad01c868095488afcf
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-common_1.0.rc15-2etch4_sparc.deb
Size/MD5 checksum: 1108250 1ac8086c83312fec554abd74074cf7b2
http://security.debian.org/pool/updates/main/d/dovecot/dovecot-pop3d_1.0.rc15-2etch4_sparc.deb
Size/MD5 checksum: 501514 27d4aa890df60532d0a33167df7af219
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBR9sKlL97/wQC1SS+AQIS8Qf/aV1FmLW+On+sucRUCqhiEgjXV92BttV6
J6fcjCkEuh0icV3KRjaJfbkSJbIBOHP+5piXHr2iTf4DqDlGCr5ztaQb/n1Xr9GR
EYphV8s+RfyAHO/uj8a0rgDL07eRhZ1AyLi38ARJBh4p3elBJOV/4ZrJbZcsO8Bd
wnUAAerEcoFUS8Sz6VN92QoWlsYcGZwL1vbuUCswCwr4OiNjyWggbOz/P0fPd3VW
ofiN9Tifg/MVfU6uMbG4g8HTKbrX9ryVc+HgXLwZI/UuYwtXP2r+svn0pEt30XwM
EfPdxup0JaOne/AQccbtWF96tHopfMfTf5cbCq5raQ2ELwsNTiuTfA==
=nlXo
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists