Re: [SECURITY] [DSA 900-1] New fetchmail packages fix potential information leak
Whatabout fetchmail-ssl? On systems with fetchmail-ssl installed,
fetchmail-common and fetchmailconfig are kept back due to this.
CU
Christian
Am Freitag, 18. November 2005 08:55 schrieb Martin Schulze:
> --------------------------------------------------------------------------
> Debian Security Advisory DSA 900-1 security@debian.org
> http://www.debian.org/security/ Martin Schulze
> November 18th, 2005
> http://www.debian.org/security/faq
> --------------------------------------------------------------------------
>
> Package : fetchmail
> Vulnerability : programming error
> Problem type : local
> Debian-specific: no
> CVE ID : CVE-2005-3088
> Debian Bug : 336096
>
> Thomas Wolff discovered that the fetchmailconfig program which is
> provided as part of fetchmail, an SSL enabled POP3, APOP, IMAP mail
> gatherer/forwarder, creates the new configuration in an insecure
> fashion that can lead to leaking passwords for mail accounts to local
> users.
>
> This update also fixes a regression in the package for stable caused
> by the last security update.
>
> For the old stable distribution (woody) this problem has been fixed in
> version 5.9.11-6.3.
>
> For the stable distribution (sarge) this problem has been fixed in
> version 6.2.5-12sarge3.
>
> For the unstable distribution (sid) this problem has been fixed in
> version 6.2.5.4-1.
>
> We recommend that you upgrade your fetchmail package.
>
>
> Upgrade Instructions
> --------------------
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 3.0 alias woody
> --------------------------------
>
> Source archives:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3.dsc Size/MD5 checksum: 712 a0202bbfb89a964b38465ab99dac26ed
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3.diff.gz Size/MD5 checksum: 300489 a43d4b0751865e409d127f6569d78524
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11.o
>rig.tar.gz Size/MD5 checksum: 950273 fff00cbf7be1d01a17605fee23ac96dd
>
> Architecture independent components:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-common_5
>.9.11-6.3_all.deb Size/MD5 checksum: 165446
> 303e0f26a717123abc01d437b4cf1974
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_5.9.
>11-6.3_all.deb Size/MD5 checksum: 92808 e0a1f45234ad0b383dae4247022ff6ba
>
> Alpha architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_alpha.deb Size/MD5 checksum: 307102 8d4c758ec374023ec8f140f3b2eef52d
>
> ARM architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_arm.deb Size/MD5 checksum: 290750 e41f41c442f557d0aa2e38cb40a7efeb
>
> Intel IA-32 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_i386.deb Size/MD5 checksum: 286466 c5dff26534fdc8c64a79192221885788
>
> Intel IA-64 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_ia64.deb Size/MD5 checksum: 329958 8f1065e6d3cf76ba2f79b09ac07bdd0e
>
> HP Precision architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_hppa.deb Size/MD5 checksum: 299072 24ed41433f2a9ef4892bf824b1993c3e
>
> Motorola 680x0 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_m68k.deb Size/MD5 checksum: 281252 a43b569cba25dcac5dbcdb536c3aefd7
>
> Big endian MIPS architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_mips.deb Size/MD5 checksum: 296526 3af7a165324f15a03d7692ccaef40afb
>
> Little endian MIPS architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_mipsel.deb Size/MD5 checksum: 296000 76f6728f33f773675d82b13d633eaab2
>
> PowerPC architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_powerpc.deb Size/MD5 checksum: 291508 0220931bcbacb71e6fa7e779c8ef4e47
>
> IBM S/390 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_s390.deb Size/MD5 checksum: 288954 4489b6d67616d3a3f7a3e32d0cc37f69
>
> Sun Sparc architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6
>.3_sparc.deb Size/MD5 checksum: 293570 292404ed1be18eba63d9405e71381701
>
>
> Debian GNU/Linux 3.1 alias sarge
> --------------------------------
>
> Source archives:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3.dsc Size/MD5 checksum: 650 6dd801f3e8877367a3000f1facc0126d
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3.diff.gz Size/MD5 checksum: 150051 4d0139fa9e5454ab9fdc6f1eb48283e0
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.or
>ig.tar.gz Size/MD5 checksum: 1257376 9956b30139edaa4f5f77c4d0dbd80225
>
> Architecture independent components:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.
>5-12sarge3_all.deb Size/MD5 checksum: 42164
> 3fbfce00d6a72c377a86e0cb95824705
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.
>5-12sarge3_all.deb Size/MD5 checksum: 101250
> 04f2e561760abcd1c66aeec0c0b117f6
>
> Alpha architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_alpha.deb Size/MD5 checksum: 572866
> f4e4242c913c81d52bf9a42e66159506
>
> AMD64 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_amd64.deb Size/MD5 checksum: 555584
> 314cbb3efc21c4470c854a7399fd1155
>
> ARM architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_arm.deb Size/MD5 checksum: 549084 56ea374911ac1d67350f2a0d1e8ac70f
>
> Intel IA-32 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_i386.deb Size/MD5 checksum: 547594 593b3e0674a1cdc1c21a408182f0bcb2
>
> Intel IA-64 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_ia64.deb Size/MD5 checksum: 596932 91869ec27cc91940fb2894424cd10826
>
> HP Precision architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_hppa.deb Size/MD5 checksum: 561514 4f99dcd9b420193560c634538e84bd42
>
> Motorola 680x0 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_m68k.deb Size/MD5 checksum: 537822 89797886e97b38be63f159e70160573b
>
> Big endian MIPS architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_mips.deb Size/MD5 checksum: 556576 5a7959621e3316944a7990bad898c6e4
>
> Little endian MIPS architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_mipsel.deb Size/MD5 checksum: 556324
> 8ec394bd9a4fcb73b6a416f0f15a5aad
>
> PowerPC architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_powerpc.deb Size/MD5 checksum: 556144
> 6437a64037de6c104f815db8a2e3de82
>
> IBM S/390 architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_s390.deb Size/MD5 checksum: 554390 0aa60368270eef9d254fb6a24bda535e
>
> Sun Sparc architecture:
>
>
> http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12
>sarge3_sparc.deb Size/MD5 checksum: 549088
> 4420c57d6f0489df813bf72459e45e5e
>
>
> These files will probably be moved into the stable distribution on
> its next update.
>
> ---------------------------------------------------------------------------
>------ For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security
> dists/stable/updates/main Mailing list:
> debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
Reply to: