|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] elm mailer (SSA:2005-311-01)
Date: Mon, 7 Nov 2005 19:01:08 -0800 (PST) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] elm mailer (SSA:2005-311-01)
New Elm packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1,
10.2, and -current to fix a security issue. A buffer overflow in the
parsing of the Expires header could allow arbitrary code to be executed
as the user running Elm.
Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/elm-2.5.8-i486-1.tgz: Upgraded to elm2.5.8.
This fixes a buffer overflow in the parsing of the Expires header that
could be used to execute arbitrary code as the user running Elm.
Thanks to Ulf Harnhammar for finding the bug and reminding me to get
out updated packages to address the issue.
A reference to the original advisory:
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0688.html
+--------------------------+
Where to find the new packages:
+-----------------------------+
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/elm-2.5.8-i386-1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/elm-2.5.8-i386-1.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/elm-2.5.8-i486-1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/elm-2.5.8-i486-1.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/elm-2.5.8-i486-1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/elm-2.5.8-i486-1.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/elm-2.5.8-i486-1.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
a3141fde713f93b6e465706ea6e549de elm-2.5.8-i386-1.tgz
Slackware 9.0 package:
4191e9bca7f46593a2038f0fa21b6739 elm-2.5.8-i386-1.tgz
Slackware 9.1 package:
eec5009cf38b37482ac09774f0749033 elm-2.5.8-i486-1.tgz
Slackware 10.0 package:
c5d89f968b7d638ec8bc0a36d7eefeb2 elm-2.5.8-i486-1.tgz
Slackware 10.1 package:
d78292b2d8b7c558895051534a581261 elm-2.5.8-i486-1.tgz
Slackware 10.2 package:
ef299e453387788f0a8ad0ce7a74b0ef elm-2.5.8-i486-1.tgz
Slackware -current package:
3bf3b77966840d8bc383540c45103869 elm-2.5.8-i486-1.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg elm-2.5.8-i486-1.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)
iD8DBQFDcAemakRjwEAQIjMRAl3MAJ48YREE+rvpUeB3uFrWg1ar8Lhl4wCdFZDD
3IaEbmgq3c1wr0+0XK+VAXU=
=SlDl
-----END PGP SIGNATURE-----
|
| |