dcsimg
Linux Today: Linux News On Internet Time.





Security Digest: February 10, 2005

Feb 11, 2005, 04:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 672-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
February 9th, 2005 http://www.debian.org/security/faq


Package : xview
Vulnerability : buffer overflows
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2005-0076

Erik Sjölund discovered that programs linked against xview are vulnerable to a number of buffer overflows in the XView library. When the overflow is triggered in a program which is installed setuid root a malicious user could perhaps execute arbitrary code as privileged user.

For the stable distribution (woody) these problems have been fixed in version 3.2p1.4-16woody2.

For the unstable distribution (sid) these problems have been fixed in version 3.2p1.4-19.

We recommend that you upgrade your xview packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/x/xview/xview_3.2p1.4-16woody2.dsc
Size/MD5 checksum: 682 73f2ebae0581f04e9edf62333da56353
http://security.debian.org/pool/updates/main/x/xview/xview_3.2p1.4-16woody2.diff.gz
Size/MD5 checksum: 65663 526f16dcd2164713e792e19b9c9a42c2
http://security.debian.org/pool/updates/main/x/xview/xview_3.2p1.4.orig.tar.gz
Size/MD5 checksum: 3227552 b9ff26d6ad378af320bac45154ceaeba

Alpha architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_alpha.deb
Size/MD5 checksum: 242538 b02d3c329cd137288360c8dfa1d279ef
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_alpha.deb
Size/MD5 checksum: 166874 01c86265b4b1bb03924dc39f03d16e26
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_alpha.deb
Size/MD5 checksum: 82184 c90e02f6824b1966cab7c843f866f366
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_alpha.deb
Size/MD5 checksum: 282748 0f0d74d37511ef359a9cfa073d1c7a2e
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_alpha.deb
Size/MD5 checksum: 830458 396d5dcd0896c25bd5ef3db05356c29c
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_alpha.deb
Size/MD5 checksum: 1336468 15932deabc7a32861bca5dec52749ccc

ARM architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_arm.deb
Size/MD5 checksum: 213546 31b52257f06f8c5c9b75cc7d0d45cd25
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_arm.deb
Size/MD5 checksum: 146328 d3e5511c12ef36547e86b1798f000ef1
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_arm.deb
Size/MD5 checksum: 72314 b77af29123fa25750f470bcd3b9fa555
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_arm.deb
Size/MD5 checksum: 233808 f7feda439c8e0367a5b0270895924351
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_arm.deb
Size/MD5 checksum: 740040 28a2d8eb135764c7fe0026a65df32d9c
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_arm.deb
Size/MD5 checksum: 1119956 2e0e9dfc6641d46d6daac559bb32b233

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_i386.deb
Size/MD5 checksum: 183850 acf639933b6eb260f027a546c57d4136
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_i386.deb
Size/MD5 checksum: 127802 c6cc52741c73598aa3fc5e4158ecec0c
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_i386.deb
Size/MD5 checksum: 64396 d7770705890e14eee88d28768a483e5f
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_i386.deb
Size/MD5 checksum: 223156 5f3a95acb70658bfc66df2896e1223d9
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_i386.deb
Size/MD5 checksum: 646392 6055e545d592579dd5c012608a464752
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_i386.deb
Size/MD5 checksum: 934796 2f3c3c124dc19d5d14aa1dbf54c64784

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_ia64.deb
Size/MD5 checksum: 317404 576da684ffdf28de0b0715fdb4dcdcd3
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_ia64.deb
Size/MD5 checksum: 220186 316ad06d0819a284884bcb06a4114ff9
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_ia64.deb
Size/MD5 checksum: 95106 2b2e5ec4a072aac2d958e91c8c41c8f9
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_ia64.deb
Size/MD5 checksum: 287570 7b7967de5eedab4b9e34a66fe887a63d
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_ia64.deb
Size/MD5 checksum: 1079586 7200cb22efc8b346e4eaa83ec1897f74
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_ia64.deb
Size/MD5 checksum: 1482648 55b93aca51484c25e38c6a75f716cade

HP Precision architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_hppa.deb
Size/MD5 checksum: 230118 5282c987f39795033ef181fc52fb0361
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_hppa.deb
Size/MD5 checksum: 159716 57a57cc876a7d51f9e15e0dab24fc373
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_hppa.deb
Size/MD5 checksum: 77650 41d67effdaac9bbfae93b35c2d1a99e8
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_hppa.deb
Size/MD5 checksum: 257698 e49c1614bb05f896d4c0d2ea64567710
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_hppa.deb
Size/MD5 checksum: 830414 f0544907dd17dce7fbf5e0b2c48f044c
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_hppa.deb
Size/MD5 checksum: 1221342 e8f00721366a9bb20f2c65cc9ff51849

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_m68k.deb
Size/MD5 checksum: 174654 e9d4846e4431980b742f8fef19274d95
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_m68k.deb
Size/MD5 checksum: 121528 27740085ec299dc2f152824242880226
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_m68k.deb
Size/MD5 checksum: 62152 cd34146cd2266f438ffd8dde794244b2
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_m68k.deb
Size/MD5 checksum: 221572 d60602e378f194426fe223311429a76e
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_m68k.deb
Size/MD5 checksum: 609756 21606f2051ff57c2feadacd072129b16
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_m68k.deb
Size/MD5 checksum: 891654 833ce26f040f64bc4cc3b684416b5c25

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_mips.deb
Size/MD5 checksum: 233608 d1e233b9724bdc330fc65be9b053292c
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_mips.deb
Size/MD5 checksum: 162770 e792cab975f9a1fc4f1cb1b20548732d
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_mips.deb
Size/MD5 checksum: 73522 7b28384a8a7b0786752af6aed4bde04d
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_mips.deb
Size/MD5 checksum: 242610 a3b5ab6c3fa2586fcd6cc756ed276e6f
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_mips.deb
Size/MD5 checksum: 718426 feeba8a97bf24eead7e186f7954adec1
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_mips.deb
Size/MD5 checksum: 1152450 3b52fdfd2abcba003a40f62161e97249

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_mipsel.deb
Size/MD5 checksum: 232930 4c7ba7912711277c3bd43e906f182b86
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_mipsel.deb
Size/MD5 checksum: 162148 5a74c1afae73c463ad735d7b6d95e36c
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_mipsel.deb
Size/MD5 checksum: 73550 f7bfee56646b67b45234b9ff45e686c0
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_mipsel.deb
Size/MD5 checksum: 240548 db21fa02e89c56f2de7650c7c436c72c
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_mipsel.deb
Size/MD5 checksum: 713016 546f6ffb970b55020066d425b57b10b1
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_mipsel.deb
Size/MD5 checksum: 1148214 597d06b001a2840e3b833b0fbdceee8c

PowerPC architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_powerpc.deb
Size/MD5 checksum: 203952 e12cef8460e96bb8442e802a7dadfd2f
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_powerpc.deb
Size/MD5 checksum: 141172 a5b5baaf8985cb50f8af76a1f66bdb80
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_powerpc.deb
Size/MD5 checksum: 71612 373ec845cde8c0507a7bb0534550ad0b
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_powerpc.deb
Size/MD5 checksum: 235564 09c30509e8d8197fe408ec7548a8cd72
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_powerpc.deb
Size/MD5 checksum: 708600 b4637a98855afa87cd1f0f0852350409
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_powerpc.deb
Size/MD5 checksum: 1078698 8502065905a3e47870287397de3ec478

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_s390.deb
Size/MD5 checksum: 196944 52b2322fc1b8449d0621460cc9f148c8
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_s390.deb
Size/MD5 checksum: 138124 1dee9a95eff97d2efc1a57035da9d519
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_s390.deb
Size/MD5 checksum: 69010 fba4d2583f26b3824935630f1da4211d
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_s390.deb
Size/MD5 checksum: 238726 3d07b2a9aec170e5785dc625501a9247
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_s390.deb
Size/MD5 checksum: 718966 be18b0d190dbea53a46ac986d8c9ebed
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_s390.deb
Size/MD5 checksum: 996136 df7958201a7d422f838c699b58ce3457

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/x/xview/olvwm_4.4.3.2p1.4-16woody2_sparc.deb
Size/MD5 checksum: 196302 13ac28d455799ff897e7c18d6d7e9162
http://security.debian.org/pool/updates/main/x/xview/olwm_3.2p1.4-16woody2_sparc.deb
Size/MD5 checksum: 139756 d3428077114ef61a236991156daddf13
http://security.debian.org/pool/updates/main/x/xview/xview-clients_3.2p1.4-16woody2_sparc.deb
Size/MD5 checksum: 82644 60d3b85b20b5331408f361265e5cfba6
http://security.debian.org/pool/updates/main/x/xview/xview-examples_3.2p1.4-16woody2_sparc.deb
Size/MD5 checksum: 375160 1aa0dafb2e393a13b9de921c05641448
http://security.debian.org/pool/updates/main/x/xview/xviewg_3.2p1.4-16woody2_sparc.deb
Size/MD5 checksum: 695008 57e61ce2f7d51ca1adbbe80fe5de78f6
http://security.debian.org/pool/updates/main/x/xview/xviewg-dev_3.2p1.4-16woody2_sparc.deb
Size/MD5 checksum: 1031568 e9793f290c3b3aae31168fe0d5ccfa32

These files will probably be moved into the stable distribution on its next update.


Debian Security Advisory DSA 673-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
February 10th, 2005 http://www.debian.org/security/faq


Package : evolution
Vulnerability : integer overflow
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2005-0102
BugTraq ID : 12354

Max Vozeler discovered an integer overflow in a helper application inside of Evolution, a free grouware suite. A local attacker could cause the setuid root helper to execute arbitrary code with elevated privileges.

For the stable distribution (woody) this problem has been fixed in version 1.0.5-1woody2.

For the unstable distribution (sid) this problem has been fixed in version 2.0.3-1.2.

We recommend that you upgrade your evolution package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.dsc
Size/MD5 checksum: 990 135eae823f6a0159a5f7ec6bc72c72b0
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.diff.gz
Size/MD5 checksum: 16718 fdcc1244d1cfbe4c297cc49a577491b8
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5.orig.tar.gz
Size/MD5 checksum: 15010672 d2ffe374b453d28f5456db5af0a7983c

Alpha architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_alpha.deb
Size/MD5 checksum: 10271422 207d01d4b051c5350a6c1952bc5221ee
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_alpha.deb
Size/MD5 checksum: 947952 b74d9c65882ae4bafa47d6614a96596c
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_alpha.deb
Size/MD5 checksum: 623002 5b864fe6659626050ac55ebf5e8572e0

ARM architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_arm.deb
Size/MD5 checksum: 9282272 57853c1bd08388274b34399548bff183
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_arm.deb
Size/MD5 checksum: 663850 30e04aac4fbcda4e6b709aa1eb378f74
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_arm.deb
Size/MD5 checksum: 492650 96a58d81835fe40c118613994898a99f

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_i386.deb
Size/MD5 checksum: 8905428 cc4885b6fff4f47cc3b729765454ea3d
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_i386.deb
Size/MD5 checksum: 585986 53373ed37020c508d50c7f1c5006e6d3
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_i386.deb
Size/MD5 checksum: 470658 615259b21a7c889e8c7203b10e4e7b15

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_ia64.deb
Size/MD5 checksum: 11454804 a4545f6efeb590b2602f8b8c44c9072d
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_ia64.deb
Size/MD5 checksum: 948252 f24c513391cdbd5cf51e0ec5a01def13
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_ia64.deb
Size/MD5 checksum: 771184 2dbb984644f181bd46d996c6f06c2ac2

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_m68k.deb
Size/MD5 checksum: 8876466 b47fd595352d5535199dc889d9aa653d
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_m68k.deb
Size/MD5 checksum: 578364 821686bde02e2ab5a86a3f07f272af26
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_m68k.deb
Size/MD5 checksum: 483950 0927332469d079b3118ff012038b2865

PowerPC architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_powerpc.deb
Size/MD5 checksum: 9339162 e0df2bad032a3a996981b3483223f0f0
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_powerpc.deb
Size/MD5 checksum: 680544 be4b5ade6dcbe9264d30becd3f3789e1
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_powerpc.deb
Size/MD5 checksum: 511292 2bcda2165950f94d01630b13cb1264d1

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_s390.deb
Size/MD5 checksum: 9219484 065504345356c2993a8ff479c7ac4653
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_s390.deb
Size/MD5 checksum: 640874 627f5efbeccefd384ae0335dd784c82b
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_s390.deb
Size/MD5 checksum: 522850 d7055f0f6a273a52cd09fd783f88c525

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_sparc.deb
Size/MD5 checksum: 9393318 4325f6d1bccd22cda371be7dd0a3add8
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_sparc.deb
Size/MD5 checksum: 670336 f58f241480dbdd3b6f673fb038e100d4
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_sparc.deb
Size/MD5 checksum: 510008 adc53f31cc22856e321f2e200a4f0d20

These files will probably be moved into the stable distribution on its next update.


Debian Security Advisory DSA 674-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
February 10th, 2005 http://www.debian.org/security/faq


Package : mailman
Vulnerability : cross-site scripting, directory traversal
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1177 CAN-2005-0202

Two security related problems have been discovered in mailman, web-based GNU mailing list manager. The Common Vulnerabilities and Exposures project identifies the following problems:

CAN-2004-1177

Florian Weimer discovered a cross-site scripting vulnerability in mailman's automatically generated error messages. An attacker could craft an URL containing JavaScript (or other content embedded into HTML) which triggered a mailman error page that would include the malicious code verbatim.

CAN-2005-0202

Several listmasters have noticed unauthorised access to archives of private lists and the list configuration itself, including the users passwords. Administrators are advised to check the webserver logfiles for requests that contain "/...../" and the path to the archives or cofiguration. This does only seem to affect installations running on web servers that do not strip slashes, such as Apache 1.3.

For the stable distribution (woody) these problems have been fixed in version 2.0.11-1woody9.

For the unstable distribution (sid) these problems have been fixed in version 2.1.5-6.

We recommend that you upgrade your mailman package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9.dsc
Size/MD5 checksum: 595 774821799ef4968703a7e44ed9bbf648
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9.diff.gz
Size/MD5 checksum: 32974 3987fa82ba9a2fe22f0a8f131acbca33
http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11.orig.tar.gz
Size/MD5 checksum: 415129 915264cb1ac8d7b78ea9eff3ba38ee04

Alpha architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_alpha.deb
Size/MD5 checksum: 461524 5080358514f761e483b13fb4e369847a

ARM architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_arm.deb
Size/MD5 checksum: 459168 7c5ed235d7c1520f08a98a4f39d0a9bf

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_i386.deb
Size/MD5 checksum: 452242 cbde3d89ad2f09776c1f498f22858919

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_ia64.deb
Size/MD5 checksum: 462126 eb6151c02a2992afd21a6e04fecd75a5

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_hppa.deb
Size/MD5 checksum: 459788 5e6bcc87fbe00e4825ff25b9a8dd2fcd

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_m68k.deb
Size/MD5 checksum: 459270 932ff0948e56d6507c296323533a360f

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_mips.deb
Size/MD5 checksum: 459832 f049c56c07a33b4299241a459b832a1a

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_mipsel.deb
Size/MD5 checksum: 459964 2e0d7c83ace834ab970265e6ff61a6ea

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_powerpc.deb
Size/MD5 checksum: 460084 d32a6a4122bd26451ab40aa3da95711b

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_s390.deb
Size/MD5 checksum: 460116 7b727e56ca3cbf29dbbe147eadd3fec7

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/mailman/mailman_2.0.11-1woody9_sparc.deb
Size/MD5 checksum: 464776 64bfb2a76c42b520f4fcd343f695701b

These files will probably be moved into the stable distribution on its next update.


Debian Security Advisory DSA 675-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
February 10th, 2005 http://www.debian.org/security/faq


Package : hztty
Vulnerability : privilege escalation
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2005-0019

Erik Sjölund discovered that hztty, a converter for GB, Big5 and zW/HZ Chinese encodings in a tty session, can be triggered to execute arbitrary commands with group utmp privileges.

For the stable distribution (woody) this problem has been fixed in version 2.0-5.2woody2.

For the unstable distribution (sid) this problem has been fixed in version 2.0-6.1.

We recommend that you upgrade your hztty package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2.dsc
Size/MD5 checksum: 560 921462207b6301fc73d8d2613fbaa856
http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2.diff.gz
Size/MD5 checksum: 4158 910c17cb2807c3cd7d2df62d28f016a5
http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0.orig.tar.gz
Size/MD5 checksum: 229189 7ec5907ad55825780274b8a77b217e21

Alpha architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_alpha.deb
Size/MD5 checksum: 153974 56ea5146bfcbed6392913a2dd697ac4d

ARM architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_arm.deb
Size/MD5 checksum: 149808 a509091afb9f413571030158d8e172d8

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_i386.deb
Size/MD5 checksum: 149432 b5b290876059e43bf376d3f22546ad06

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_ia64.deb
Size/MD5 checksum: 157178 652c2a0a544458bca793e3b26fe64cdc

HP Precision architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_hppa.deb
Size/MD5 checksum: 153452 ca39d351f20620a31679b21312bf5d57

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_m68k.deb
Size/MD5 checksum: 149214 b2a2faee53606c7a2599da89e7dc0779

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_mips.deb
Size/MD5 checksum: 152704 2c94a83690bfaf39d26d5dadddfdd63e

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_mipsel.deb
Size/MD5 checksum: 152788 3ef6e11ca5cec6b8e077c22b99552bc5

PowerPC architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_powerpc.deb
Size/MD5 checksum: 150376 a9742687aec8d26f95bef974bb4de317

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_s390.deb
Size/MD5 checksum: 151002 7607b570894e11c9d3eeb8c84bf5e009

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/h/hztty/hztty_2.0-5.2woody2_sparc.deb
Size/MD5 checksum: 153880 3b8cc02ca85fcb1add110a01c700446f

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Fedora Core


Fedora Update Notification
FEDORA-2005-131
2005-02-10

Product : Fedora Core 2
Name : mailman
Version : 2.1.5
Release : 8.fc2
Summary : Mailing list manager with built in Web access.

Description :
Mailman is software to help manage email discussion lists, much like Majordomo and Smartmail. Unlike most similar products, Mailman gives each mailing list a webpage, and allows users to subscribe, unsubscribe, etc. over the Web. Even the list manager can administer his or her list entirely from the Web. Mailman also integrates most things people want to do with mailing lists, including archiving, mail <-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5


Update Information:

There is a critical security flaw in Mailman 2.1.5 which will allow attackers to read arbitrary files.

The extent of the vulnerability depends on what version of Apache (httpd) you are running, and (possibly) how you have configured your web server. It is believed the vulnerability is not available when Mailman is paired with a version of Apache >= 2.0, however earlier versions of Apache, e.g. version 1.3, will allow the exploit when executing a Mailman CGI script. All versions of Fedora have shipped with the later 2.0 version of Apache and thus if you are running a Fedora release you are not likely to be vulnerable to the exploit unless you have explicitly downgraded the version of your web server. However, installing this version of mailman with a security patch represents a prudent safeguard.

This issue has been assigned CVE number CAN-2005-0202.

The bug report associated with this is: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343

The errata associated with this for RHEL releases is: http://rhn.redhat.com/errata/RHSA-2005-136.html

For additional piece of mind, it is recommended that you regenerate your list member passwords. Instructions on how to do this, and more information about this vulnerability are available here:

http://www.list.org/security.html


  • Tue Feb 08 2005 John Dennis - 3:2.1.5-8.fc2
    • fix security vulnerability CAN-2005-0202, errata RHSA-2005:136, bug #147343

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

4664674e6a2f8cf94457f87541f6fdee SRPMS/mailman-2.1.5-8.fc2.src.rpm
c66f11090b5c284d5e5d0b804e844788 x86_64/mailman-2.1.5-8.fc2.x86_64.rpm
9f79a60e105043526ea9fe0b951c4310 x86_64/debug/mailman-debuginfo-2.1.5-8.fc2.x86_64.rpm
c9537949ed7ee6c9a96316d72277bbe4 i386/mailman-2.1.5-8.fc2.i386.rpm
52e1f9a0ec60bc34c84f52f8442355ac i386/debug/mailman-debuginfo-2.1.5-8.fc2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2005-132
2005-02-10

Product : Fedora Core 3
Name : mailman
Version : 2.1.5
Release : 30.fc3
Summary : Mailing list manager with built in Web access.

Description :
Mailman is software to help manage email discussion lists, much like Majordomo and Smartmail. Unlike most similar products, Mailman gives each mailing list a webpage, and allows users to subscribe, unsubscribe, etc. over the Web. Even the list manager can administer his or her list entirely from the Web. Mailman also integrates most things people want to do with mailing lists, including archiving, mail <-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5


Update Information:

There is a critical security flaw in Mailman 2.1.5 which will allow attackers to read arbitrary files.

The extent of the vulnerability depends on what version of Apache (httpd) you are running, and (possibly) how you have configured your web server. It is believed the vulnerability is not available when Mailman is paired with a version of Apache >= 2.0, however earlier versions of Apache, e.g. version 1.3, will allow the exploit when executing a Mailman CGI script. All versions of Fedora have shipped with the later 2.0 version of Apache and thus if you are running a Fedora release you are not likely to be vulnerable to the exploit unless you have explicitly downgraded the version of your web server. However, installing this version of mailman with a security patch represents a prudent safeguard.

This issue has been assigned CVE number CAN-2005-0202.

The bug report associated with this is: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343

The errata associated with this for RHEL releases is: http://rhn.redhat.com/errata/RHSA-2005-136.html

For additional piece of mind, it is recommended that you regenerate your list member passwords. Instructions on how to do this, and more information about this vulnerability are available here:

http://www.list.org/security.html


  • Tue Feb 08 2005 John Dennis - 3:2.1.5-30.fc3
    • fix security vulnerability CAN-2005-0202, errata RHSA-2005:137, bug #147343
  • Tue Nov 09 2004 John Dennis 3:2.1.5-29.fc3
    • fix bug #137863, buildroot path in .pyc files
  • Mon Nov 08 2004 John Dennis 3:2.1.5-27
    • rebuild to fix bug #137863, python embeds build root in .pyc files

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

457b27f2f15c18b8de0e5fcff977d171 SRPMS/mailman-2.1.5-30.fc3.src.rpm
da424d3d5227650d843654acb22e23c3 x86_64/mailman-2.1.5-30.fc3.x86_64.rpm
e408bc622edf77f04680ead0cdae36cf x86_64/debug/mailman-debuginfo-2.1.5-30.fc3.x86_64.rpm
ec264fec376555f5af505f9b320020c6 i386/mailman-2.1.5-30.fc3.i386.rpm
fad64f3280cfdb4fcdd4520cf79a16b9 i386/debug/mailman-debuginfo-2.1.5-30.fc3.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2005-139
2005-02-10

Product : Fedora Core 2
Name : mod_python
Version : 3.1.3
Release : 1.fc2.2
Summary : An embedded Python interpreter for the Apache Web server.

Description :
Mod_python is a module that embeds the Python language interpreter within the server, allowing Apache handlers to be written in Python.

Mod_python brings together the versatility of Python and the power of the Apache Web server for a considerable boost in flexibility and performance over the traditional CGI approach.


Update Information:

Graham Dumpleton discovered a flaw affecting the publisher handler of mod_python, used to make objects inside modules callable via URL. A remote user could visit a carefully crafted URL that would gain access to objects that should not be visible, leading to an information leak. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2005-0088 to this issue.

This update includes a patch which fixes this issue.


* Mon Jan 31 2005 Joe Orton <<A HREF="mailto:jorton@redhat.com">jorton@redhat.com> 3.1.3-1.fc2.2
  • add security fix for CVE CAN-2005-0088 (#146656)

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

cf23151b04a255effb2a138aaceb94f6 SRPMS/mod_python-3.1.3-1.fc2.2.src.rpm
59f9678fa03b908065cd3944bf7808a7 x86_64/mod_python-3.1.3-1.fc2.2.x86_64.rpm
d07a9c2cc5a95feb3ff830dd20d25ef5 x86_64/debug/mod_python-debuginfo-3.1.3-1.fc2.2.x86_64.rpm
e660f1f9839de749e7818cdaba49a2fb i386/mod_python-3.1.3-1.fc2.2.i386.rpm
24ff630cfbdbda45808def9370f06231 i386/debug/mod_python-debuginfo-3.1.3-1.fc2.2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2005-140
2005-02-10

Product : Fedora Core 3
Name : mod_python
Version : 3.1.3
Release : 5.2
Summary : An embedded Python interpreter for the Apache Web server.

Description :
Mod_python is a module that embeds the Python language interpreter within the server, allowing Apache handlers to be written in Python.

Mod_python brings together the versatility of Python and the power of the Apache Web server for a considerable boost in flexibility and performance over the traditional CGI approach.


Update Information:

Graham Dumpleton discovered a flaw affecting the publisher handler of mod_python, used to make objects inside modules callable via URL. A remote user could visit a carefully crafted URL that would gain access to objects that should not be visible, leading to an information leak. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2005-0088 to this issue.

This update includes a patch which fixes this issue.


* Mon Jan 31 2005 Joe Orton <<A HREF="mailto:jorton@redhat.com">jorton@redhat.com> 3.1.3-5.2
  • add security fix for CVE CAN-2005-0088 (#146655)

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

2f8f27de0ed294fb0df1dbcc4b459d1b SRPMS/mod_python-3.1.3-5.2.src.rpm
14821a1a3b89506fddc51b338f93a800 x86_64/mod_python-3.1.3-5.2.x86_64.rpm
07653b192939283ac05b094f6963af43 x86_64/debug/mod_python-debuginfo-3.1.3-5.2.x86_64.rpm
5908a986650071f30ab180724d3a461b i386/mod_python-3.1.3-5.2.i386.rpm
24f5c62133e734b1b2b109d3fe19a83b i386/debug/mod_python-debuginfo-3.1.3-5.2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.


Fedora Legacy


Fedora Legacy Update Advisory

Synopsis: Updated abiword resolves security vulnerabilities
Advisory ID: FLSA:1906
Issue date: 2005-02-08
Product: Red Hat Linux
Keywords: Security
Cross references: https://bugzilla.fedora.us/show_bug.cgi?id=3D1906
CVE Names: CAN-2004-0645



1. Topic:

Updated abiword packages that fix a security vulnerability are now available.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386

3. Problem description:

AbiWord is a cross-platform, open-source word processor.

A buffer overflow in the wv library included in abiword allows remote attackers to execute arbitrary code via a document with a long DateTime field.

All users are advised to upgrade to these updated packages, which contain a= =20
backported fix and are not vulnerable to this issue.

Fedora Legacy would like to thank Marc Deslauriers for reporting this issue, and Dave Botsch and Marc Deslauriers and preparing updated RPMs.

4. Solution:

Before applying this update, make sure all previously released errata=20 relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory only contains the desired RPMs.

Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get.

5. Bug IDs fixed:

http://bugzilla.fedora.us - 1906 - CAN-2004-0645-Abiword wv component buffer overflow

6. RPMs required:

Red Hat Linux 7.3:

SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/abiword-0.99.5-5.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/abiword-0.99.5-5.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/