[CLA-2001:420] Conectiva Linux Security Announcement - mailman

From: secureat_private
Date: Wed Sep 05 2001 - 14:03:33 PDT

  • Next message: edvice Security Services: "Various problems in Baltimore WebSweeper URL filtering"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    CONECTIVA LINUX SECURITY ANNOUNCEMENT 
    - --------------------------------------------------------------------------
    
    PACKAGE   : mailman
    SUMMARY   : 
    DATE      : 2001-09-05 17:58:00
    ID        : CLA-2001:420
    RELEVANT
    RELEASES  : 4.1, 4.2, 5.0, 5.1, 6.0, 7.0
    
    - -------------------------------------------------------------------------
    
    DESCRIPTION
     Mailman is a mailing list manager.
     This update fixes two security problems and some other issues not
     related to security:
     
     1. Versions prior do 2.0.2 (affects CL<=6.0) have a vulnerability
     which allows a list administrador to obtain the list password of a
     subscriber. This is not a regular security problem because the list
     administrator does not need that password to gain access to a user's
     subscription, but it is quite possible that the user shares this
     password with other services, such as an email account, even though
     the web interface gives a clear warning about this password and how
     it is handled (by default, the password is mailed out every month).
     
     2. Versions prior do 2.0.6 (affects CL<=7.0) have a vulnerability
     which could allow non-authorized users to gain access to the
     administrative interface of a list. For this to happen, the global
     password (located in the data/adm.pw file) has to be empty, which is
     not very likely. If it is empty, the administrative interface will
     accept any password as valid.
     
     3. This update also brings a logrotate configuration file to our
     mailman package. This will regularly rotate the logs in
     /usr/lib/mailman/logs.
     
     4. Version 2.0.5 (affects CL<=7.0) fixed a problem with stale lock
     files which can cause a list to be inaccessible for long periods of
     time until the lock expires or is removed manually.
    
    
    SOLUTION
     All mailman administrators should upgrade. It is recommended that the
     update be applied while the server is inactive, that is, the web
     interface should be disabled during this period as well as the MTA
     and crond, since many mailman processes are started at different
     times via cron.
     
     
     REFERENCES
     1.http://mail.python.org/pipermail/mailman-announce/2001-July/000028.html
     2.http://mail.python.org/pipermail/mailman-announce/2001-March/000022.html
     3.http://mail.python.org/pipermail/mailman-announce/2001-May/000026.html
    
    
    DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
    ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/mailman-2.0.6-1U41_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/4.1/i386/mailman-2.0.6-1U41_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/mailman-2.0.6-1U42_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/4.2/i386/mailman-2.0.6-1U42_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/mailman-2.0.6-1U50_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/5.0/i386/mailman-2.0.6-1U50_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/mailman-2.0.6-1U51_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/5.1/i386/mailman-2.0.6-1U51_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/mailman-2.0.6-1U60_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mailman-2.0.6-1U60_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mailman-2.0.6-1U70_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mailman-2.0.6-1U70_1cl.i386.rpm
    
    
    ADDITIONAL INSTRUCTIONS
     Users of Conectiva Linux version 6.0 or higher may use apt to perform 
     upgrades of RPM packages:
     - add the following line to /etc/apt/sources.list if it is not there yet
       (you may also use linuxconf to do this):
    
     rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
    
    (replace 6.0 with the correct version number if you are not running CL6.0)
    
     - run:                 apt-get update
     - after that, execute: apt-get upgrade
    
     Detailed instructions reagarding the use of apt and upgrade examples 
     can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
    
    
    - -------------------------------------------------------------------------
    All packages are signed with Conectiva's GPG key. The key and instructions
    on how to import it can be found at 
    http://distro.conectiva.com.br/seguranca/chave/?idioma=en
    Instructions on how to check the signatures of the RPM packages can be
    found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
    - -------------------------------------------------------------------------
    All our advisories and generic update instructions can be viewed at
    http://distro.conectiva.com.br/atualizacoes/?idioma=en
    
    - -------------------------------------------------------------------------
    subscribe: conectiva-updates-subscribeat_private
    unsubscribe: conectiva-updates-unsubscribeat_private
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE7lpMk42jd0JmAcZARAmIMAKDhGG92BoCXK5FArqWFzeO3dcKPBQCgzfRn
    tZkBGA9zmYb9GZ7Cs5XtWRQ=
    =NMpe
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Sep 05 2001 - 16:30:06 PDT