7663176 2001-12-11 15:56 -0200 /105 rader/ <secure@conectiva.com.br> Sänt av: joel@lysator.liu.se Importerad: 2001-12-13 07:51 av Brevbäraren Extern mottagare: conectiva-updates@papaleguas.conectiva.com.br Extern mottagare: linsec@lists.seifried.org Extern mottagare: lwn@lwn.net Extern mottagare: bugtraq@securityfocus.com Extern mottagare: security-alerts@linuxsecurity.com Mottagare: Bugtraq (import) <20125> Ärende: [CLA-2001:444] Conectiva Linux Security Announcement - sasl ------------------------------------------------------------ From: secure@conectiva.com.br To: conectiva-updates@papaleguas.conectiva.com.br, linsec@lists.seifried.org, lwn@lwn.net, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com Message-ID: <200112111756.PAA13456@frajuto.distro.conectiva> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : sasl SUMMARY : sasl format string vulnerability DATE : 2001-12-11 15:54:00 ID : CLA-2001:444 RELEVANT RELEASES : 6.0, 7.0 - ------------------------------------------------------------------------- DESCRIPTION Cyrus-SASL is an open-source implementation of SASL, the "Simple Authentication and Security Layer", which is an useful API for adding authentication, authorization, and security to network protocols. Examples of applications linked to sasl include sendmail, OpenLDAP and several mail clients. Kari Hurtta reported[1] a format string bug[2] in one of the logging functions that could be exploited by an attacker to gain access to a machine or to acquire higher privileges. SOLUTION All users should upgrade. REFERENCES: 1.http://www.securityfocus.com/archive/1/224148 2.http://www.securityfocus.com/bid/3498 DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/sasl-1.5.24-15U60_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-plug-digestmd5-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-programs-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-plug-anonymous-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-plug-crammd5-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-plug-plain-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-devel-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sasl-doc-1.5.24-15U60_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/sasl-1.5.24-15U70_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-plug-crammd5-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-devel-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-plug-digestmd5-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-doc-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-plug-anonymous-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-programs-1.5.24-15U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sasl-plug-plain-1.5.24-15U70_1cl.i386.rpm ADDITIONAL INSTRUCTIONS Users of Conectiva Linux version 6.0 or higher may use apt to perform upgrades of RPM packages: - add the following line to /etc/apt/sources.list if it is not there yet (you may also use linuxconf to do this): rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates (replace 6.0 with the correct version number if you are not running CL6.0) - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8FkjN42jd0JmAcZARAgYhAJ9qShVf2EJuv3jRv2klvNL6v7aELQCgzlA7 etClc0mHVsijtMR942Ju0O8= =Vvwn -----END PGP SIGNATURE----- (7663176) / <secure@conectiva.com.br>/----(Ombruten)