Home / mailingsPDF  

[RHSA-2007:0779-02] Low: mailman security and bug fix update

Posted on 15 November 2007
RedHat

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Low: mailman security and bug fix update
Advisory ID: RHSA-2007:0779-02
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0779.html
Issue date: 2007-11-15
Updated on: 2007-11-15
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-4624
- ---------------------------------------------------------------------

1. Summary:

Updated mailman packages that fix a security issue and various bugs are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mailman is a program used to help manage email discussion lists.

A flaw was found in Mailman. A remote attacker could spoof messages in
the error log, and possibly trick the administrator into visiting malicious
URLs via a carriage return/line feed sequence in the URI. (CVE-2006-4624)

As well, these updated packages fix the following bugs:

* canceling a subscription on the confirm subscription request page
caused mailman to crash.

* editing the sender filter caused all spam filter rules to be deleted.

* the migrate-fhs script was not included.

* the mailman init script returned a zero (success) exit code even when
an incorrect command was given. For example, the "mailman foo" command
returned a zero exit code. In these updated packages the mailmain init
script returns the correct exit codes.

Users of Mailman are advised to upgrade to these updated packages, which
resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188


5. Bug IDs fixed (http://bugzilla.redhat.com/):

200036 - Canceling subscription confirmation crashes mailman
205651 - CVE-2006-4624 mailman logfile CRLF injection
223191 - Spam filters gets deleted when sender filter is edited
230939 - mailman-2.1.5.1-34.rhel4.5 is missing migrate-fhs script
242677 - Wrong init script

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

ppc:
c9cfb9aa11a5c281b3a82313d2ea233a mailman-2.1.5.1-34.rhel4.6.ppc.rpm
aa933b2d2a4b5062bcfac412d199ce46 mailman-debuginfo-2.1.5.1-34.rhel4.6.ppc.rpm

s390:
0130bfcf79c1bb852ee1a57664e0318d mailman-2.1.5.1-34.rhel4.6.s390.rpm
ddd5c59638d686af3afb285a4dd1bc7e mailman-debuginfo-2.1.5.1-34.rhel4.6.s390.rpm

s390x:
05f6bc35d89b64f54ea98e94962c79fc mailman-2.1.5.1-34.rhel4.6.s390x.rpm
fd90039a9b1bc188234a04efb1703945 mailman-debuginfo-2.1.5.1-34.rhel4.6.s390x.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mailman-2.1.5.1-34.rhel4.6.src.rpm
cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.

 

TOP