ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-519-1] elinks vulnerability (Kees Cook)
2. [USN-520-1] fetchmail vulnerabilities (Kees Cook)
----------------------------------------------------------------------
Message: 1
Date: Tue, 25 Sep 2007 14:51:37 -0700
From: Kees Cook <kees@ubuntu.com>
Subject: [USN-519-1] elinks vulnerability
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Message-ID: <20070925215137.GR22678@outflux.net>
Content-Type: text/plain; charset="us-ascii"
===========================================================
Ubuntu Security Notice USN-519-1 September 25, 2007
elinks vulnerability
CVE-2007-5034
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
elinks 0.10.6-1ubuntu3.2
Ubuntu 6.10:
elinks 0.11.1-1ubuntu2.2
Ubuntu 7.04:
elinks 0.11.1-1.2ubuntu2.2
In general, a standard system upgrade is sufficient to affect the
necessary changes.
Details follow:
Kalle Olavi Niemitalo discovered that if elinks makes a POST request
to an HTTPS URL through a proxy, information may be sent in clear-text
between elinks and the proxy. Attackers with access to the network
could steal sensitive information (such as passwords).
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.diff.gz
Size/MD5: 31374 745db778d8da48d5bd8fd62313c299d9
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.dsc
Size/MD5: 738 c0ea523a913d279a70c8a74ae91710be
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz
Size/MD5: 3651428 0243203b9e54cf0cf002fca31244ce79
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_amd64.deb
Size/MD5: 906814 2923d69aaad9fdf510f0778938a52890
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_amd64.deb
Size/MD5: 732418 08d581518d511b015357b636b4b4bec2
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_i386.deb
Size/MD5: 845344 b17b1d3b39e18b37244fa9803d727e28
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_i386.deb
Size/MD5: 682980 7c5d2abc9e6be4a33d751cbeea3eacac
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_powerpc.deb
Size/MD5: 889800 008c03be901b15f7245786b29c835712
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_powerpc.deb
Size/MD5: 720926 d035afed6c4fefd680961719da376c66
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_sparc.deb
Size/MD5: 862606 47b706af007c5e742d292975d2976d40
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_sparc.deb
Size/MD5: 697554 6a69e45f969f2f9322c2e120b024cc59
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.diff.gz
Size/MD5: 30804 7375454f7de82c81875704c8ace8fbfa
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.dsc
Size/MD5: 747 ac4ab40f6c646071391977da8803c6a3
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
Size/MD5: 3863617 dce0fa7cb2b6e7194ddd00e34825218b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_amd64.deb
Size/MD5: 663838 f01381b5e0c58a16def5bbe48400033d
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_amd64.deb
Size/MD5: 460418 374d2e22edbaa346dec5f20d8959fbe3
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_i386.deb
Size/MD5: 621490 8b7c70e58374453a00d9be6985287f6b
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_i386.deb
Size/MD5: 418576 c46df44d6a25bd29f9e1030ac1736fc5
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_powerpc.deb
Size/MD5: 656474 6a91b696b81c1498201610c53e475488
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_powerpc.deb
Size/MD5: 453276 5490e3dccea1d7e4e9217b060eafdac7
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_sparc.deb
Size/MD5: 623180 88567da087d6bafc207e1c2ae36f00f9
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_sparc.deb
Size/MD5: 420738 a93466a63b8738442b9b7b8a8956d172
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.diff.gz
Size/MD5: 30996 47f76e223281a4766374ad9bfd28b2b4
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.dsc
Size/MD5: 835 04e6aa0377c01a16a342b0515f4ed67d
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
Size/MD5: 3863617 dce0fa7cb2b6e7194ddd00e34825218b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_amd64.deb
Size/MD5: 667320 1ac7f9264a8116cfa941714ef2883baf
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_amd64.deb
Size/MD5: 469024 4a9ed475d63bb65ff94b1e2e6cf4f22b
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_i386.deb
Size/MD5: 625670 73987ab1453f8064741a48c1b1c29c3e
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_i386.deb
Size/MD5: 425266 61137c1a5ed972040f2ce3866dbc4960
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_powerpc.deb
Size/MD5: 665316 9322259cb40f15081498b34af26ccae4
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_powerpc.deb
Size/MD5: 463014 b743d08aae093f63c2181f702a5ec810
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_sparc.deb
Size/MD5: 631170 b163c245dadaadc10352694f741fe0d9
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_sparc.deb
Size/MD5: 430040 ff48526da8dd46fd2e3c012756fa52de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20070925/3da008b0/attachment-0001.pgp
------------------------------
Message: 2
Date: Tue, 25 Sep 2007 19:15:13 -0700
From: Kees Cook <kees@ubuntu.com>
Subject: [USN-520-1] fetchmail vulnerabilities
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Message-ID: <20070926021513.GV22678@outflux.net>
Content-Type: text/plain; charset="us-ascii"
===========================================================
Ubuntu Security Notice USN-520-1 September 26, 2007
fetchmail vulnerabilities
CVE-2007-1558, CVE-2007-4565
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
fetchmail 6.3.2-2ubuntu2.2
Ubuntu 6.10:
fetchmail 6.3.4-1ubuntu4.2
Ubuntu 7.04:
fetchmail 6.3.6-1ubuntu2.1
In general, a standard system upgrade is sufficient to affect the
necessary changes.
Details follow:
Gaetan Leurent discovered a vulnerability in the APOP protocol based
on MD5 collisions. As fetchmail supports the APOP protocol, this
vulnerability can be used by attackers to discover a portion of the APOP
user's authentication credentials. (CVE-2007-1558)
Earl Chew discovered that fetchmail can be made to de-reference a NULL
pointer when contacting SMTP servers. This vulnerability can be used
by attackers who control the SMTP server to crash fetchmail and cause
a denial of service. (CVE-2007-4565)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2.diff.gz
Size/MD5: 190508 b6f34c90edfb5be3fa625572e440d46f
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2.dsc
Size/MD5: 766 b0ee07dc6149dff8fcabf8e3806fb14c
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2.orig.tar.gz
Size/MD5: 1522264 a661735496077232acedb82a901fa499
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/fetchmail/fetchmailconf_6.3.2-2ubuntu2.2_all.deb
Size/MD5: 114918 183fcecaabaa9fd0dc78f5fa0cf66899
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_amd64.deb
Size/MD5: 346852 0562c7d3159da530a247492eb4c83c17
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_i386.deb
Size/MD5: 333422 1d96517ee7118ddb6c154b42f20282c3
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_powerpc.deb
Size/MD5: 345546 1ab1bc976af5e02880ccfeb277a1e3ab
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_sparc.deb
Size/MD5: 339632 5eae85ff0d41ca36030c985d828cc1b9
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2.diff.gz
Size/MD5: 54883 9f96afa7114c4ff7d83d52ddff3a7734
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2.dsc
Size/MD5: 765 5896f0d44a778f5aa234e5645fde1d1c
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4.orig.tar.gz
Size/MD5: 1313880 023a27d8281e5362323dec3e1ccca1c8
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/fetchmail/fetchmailconf_6.3.4-1ubuntu4.2_all.deb
Size/MD5: 60460 60c7b0de630485e35a5ab49c14ab5dc3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_amd64.deb
Size/MD5: 350904 da444d4475fae7453552a5112124912d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_i386.deb
Size/MD5: 341816 5367a81a858f9c590c4a4947f1a45983
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_powerpc.deb
Size/MD5: 350320 d82081bf97a28bc745a5342cfba46988
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_sparc.deb
Size/MD5: 345394 745ec98c5d2dec4bf6d630650798e92a
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1.diff.gz
Size/MD5: 56402 05af2c1bb84df24da58935e51d7b6002
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1.dsc
Size/MD5: 966 8dee518a1b9c90ff5bd5f3eb6a007c1d
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6.orig.tar.gz
Size/MD5: 1680200 04175459cdf32fdb10d9e8fc46b633c3
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/fetchmail/fetchmailconf_6.3.6-1ubuntu2.1_all.deb
Size/MD5: 63826 dd31c4c75cd18947cc49ae649ac8717f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_amd64.deb
Size/MD5: 376182 19d7655fafa90d200b5defae11de58ac
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_i386.deb
Size/MD5: 365590 a54d1d43f960ae118a4dee6b3aba4a42
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_powerpc.deb
Size/MD5: 377260 eb1373f300d8ea78b944bb788d9ca6dd
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_sparc.deb
Size/MD5: 370316 9211fd7fb44b2f3d620958b42d3ddaf7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20070925/0f63bb46/attachment-0001.pgp
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 36, Issue 10
********************************************************
No comments:
Post a Comment