diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2005-12-08 10:00:22 +0000 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2005-12-08 10:00:22 +0000 |
commit | c8283e5d52d549590f7cd8498f0f074639b880b9 (patch) | |
tree | d551b5bb6014070aad0a3ffc196b1641cc8cb534 /fetchmail-SA-2005-01.txt | |
parent | 74a9e65893f37b75b88fd72020c6cb86fdf7b6be (diff) | |
download | fetchmail-c8283e5d52d549590f7cd8498f0f074639b880b9.tar.gz fetchmail-c8283e5d52d549590f7cd8498f0f074639b880b9.tar.bz2 fetchmail-c8283e5d52d549590f7cd8498f0f074639b880b9.zip |
Update security announcements with 6.2.5.4/6.3.0 information.
svn path=/branches/BRANCH_6-3/; revision=4523
Diffstat (limited to 'fetchmail-SA-2005-01.txt')
-rw-r--r-- | fetchmail-SA-2005-01.txt | 26 |
1 files changed, 8 insertions, 18 deletions
diff --git a/fetchmail-SA-2005-01.txt b/fetchmail-SA-2005-01.txt index 753234e2..129fe434 100644 --- a/fetchmail-SA-2005-01.txt +++ b/fetchmail-SA-2005-01.txt @@ -3,7 +3,7 @@ fetchmail-SA-2005-01: security announcement Topic: remote code injection vulnerability in fetchmail Author: Matthias Andree -Version: 1.03 +Version: 1.04 Announced: 2005-07-21 Type: buffer overrun/stack corruption/code injection Impact: account or system compromise possible through malicious @@ -29,8 +29,8 @@ Affects: fetchmail version 6.2.5.1 (denial of service) (other versions have not been checked) Not affected: fetchmail 6.2.5.2 - fetchmail 6.2.6-pre7 - fetchmail 6.3.0 (not released yet) + fetchmail 6.2.5.4 + fetchmail 6.3.0 Older versions may not have THIS bug, but had been found to contain other security-relevant bugs. @@ -38,6 +38,8 @@ Not affected: fetchmail 6.2.5.2 Corrected: 2005-07-22 01:37 UTC (SVN) - committed bugfix (r4157) 2005-07-22 fetchmail-patch-6.2.5.2 released 2005-07-23 fetchmail-6.2.5.2 tarball released + 2005-11-13 fetchmail-6.2.5.4 tarball released + 2005-11-30 fetchmail-6.3.0 tarball released 0. Release history @@ -56,6 +58,8 @@ Corrected: 2005-07-22 01:37 UTC (SVN) - committed bugfix (r4157) - Add heise security URL. - Mention release of 6.2.5.2 tarball. 2005-10-27 1.03 - Update CVE Name after CVE naming change +2005-12-08 1.04 - Mention 6.2.5.4 and 6.3.0 releases "not affected" + - remove patch information 1. Background @@ -94,24 +98,10 @@ No reasonable workaround can be offered at this time. 5. Solution -Upgrade your fetchmail package to version 6.2.5.2. - -You can either download a complete tarball of fetchmail-6.2.5.2.tar.gz, -or you can download a patch against fetchmail-6.2.5 if you already have -the 6.2.5 tarball. Either is available from: +Upgrade your fetchmail package to version 6.3.0 or newer. <http://developer.berlios.de/project/showfiles.php?group_id=1824> -To use the patch: - - 1. download fetchmail-6.2.5.tar.gz (or retrieve the version you already - had downloaded) and fetchmail-patch-6.2.5.2.tar.gz - 2. unpack the tarball: gunzip -c fetchmail-6.2.5.tar.gz | tar xf - - 3. unpack the patch: gunzip fetchmail-patch-6.2.5.2.gz - 4. apply the patch: cd fetchmail-6.2.5 ; patch -p1 <../fetchmail-patch-6.2.5.2 - 5. now configure and build as usual - detailed instructions in the file - named "INSTALL". - A. References fetchmail home page: <http://fetchmail.berlios.de/> |