7051716 2001-09-05 18:03 -0300 /121 rader/ <secure@conectiva.com.br> Sänt av: joel@lysator.liu.se Importerad: 2001-09-06 01:36 av Brevbäraren Extern mottagare: conectiva-updates@papaleguas.conectiva.com.br Extern mottagare: linuxlist@securityportal.com Extern mottagare: lwn@lwn.net Extern mottagare: bugtraq@securityfocus.com Extern mottagare: security-alerts@linuxsecurity.com Mottagare: Bugtraq (import) <19085> Ärende: [CLA-2001:420] Conectiva Linux Security Announcement - mailman ------------------------------------------------------------ From: secure@conectiva.com.br To: conectiva-updates@papaleguas.conectiva.com.br, linuxlist@securityportal.com, lwn@lwn.net, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com Message-ID: <200109052103.SAA31317@frajuto.distro.conectiva> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : mailman SUMMARY : DATE : 2001-09-05 17:58:00 ID : CLA-2001:420 RELEVANT RELEASES : 4.1, 4.2, 5.0, 5.1, 6.0, 7.0 - ------------------------------------------------------------------------- DESCRIPTION Mailman is a mailing list manager. This update fixes two security problems and some other issues not related to security: 1. Versions prior do 2.0.2 (affects CL<=6.0) have a vulnerability which allows a list administrador to obtain the list password of a subscriber. This is not a regular security problem because the list administrator does not need that password to gain access to a user's subscription, but it is quite possible that the user shares this password with other services, such as an email account, even though the web interface gives a clear warning about this password and how it is handled (by default, the password is mailed out every month). 2. Versions prior do 2.0.6 (affects CL<=7.0) have a vulnerability which could allow non-authorized users to gain access to the administrative interface of a list. For this to happen, the global password (located in the data/adm.pw file) has to be empty, which is not very likely. If it is empty, the administrative interface will accept any password as valid. 3. This update also brings a logrotate configuration file to our mailman package. This will regularly rotate the logs in /usr/lib/mailman/logs. 4. Version 2.0.5 (affects CL<=7.0) fixed a problem with stale lock files which can cause a list to be inaccessible for long periods of time until the lock expires or is removed manually. SOLUTION All mailman administrators should upgrade. It is recommended that the update be applied while the server is inactive, that is, the web interface should be disabled during this period as well as the MTA and crond, since many mailman processes are started at different times via cron. REFERENCES 1.http://mail.python.org/pipermail/mailman-announce/2001-July/000028.html 2.http://mail.python.org/pipermail/mailman-announce/2001-March/000022.html 3.http://mail.python.org/pipermail/mailman-announce/2001-May/000026.html DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/mailman-2.0.6-1U41_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/4.1/i386/mailman-2.0.6-1U41_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/mailman-2.0.6-1U42_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/4.2/i386/mailman-2.0.6-1U42_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/mailman-2.0.6-1U50_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/5.0/i386/mailman-2.0.6-1U50_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/mailman-2.0.6-1U51_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/5.1/i386/mailman-2.0.6-1U51_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/mailman-2.0.6-1U60_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mailman-2.0.6-1U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mailman-2.0.6-1U70_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mailman-2.0.6-1U70_1cl.i386.rpm ADDITIONAL INSTRUCTIONS Users of Conectiva Linux version 6.0 or higher may use apt to perform upgrades of RPM packages: - add the following line to /etc/apt/sources.list if it is not there yet (you may also use linuxconf to do this): rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates (replace 6.0 with the correct version number if you are not running CL6.0) - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE7lpMk42jd0JmAcZARAmIMAKDhGG92BoCXK5FArqWFzeO3dcKPBQCgzfRn tZkBGA9zmYb9GZ7Cs5XtWRQ= =NMpe -----END PGP SIGNATURE----- (7051716) / <secure@conectiva.com.br>/----(Ombruten)