Fedora Linux 8561 Published by

A mailman security update is available for Fedora Core 3

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2005-132
2005-02-10
---------------------------------------------------------------------

Product : Fedora Core 3
Name : mailman
Version : 2.1.5
Release : 30.fc3
Summary : Mailing list manager with built in Web access.
Description :
Mailman is software to help manage email discussion lists, much like Majordomo and Smartmail. Unlike most similar products, Mailman gives each mailing list a webpage, and allows users to subscribe, unsubscribe, etc. over the Web. Even the list manager can administer his or her list entirely from the Web. Mailman also integrates most things people want to do with mailing lists, including archiving, mail news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5



---------------------------------------------------------------------
Update Information:


There is a critical security flaw in Mailman 2.1.5 which will allow attackers to read arbitrary files.

The extent of the vulnerability depends on what version of Apache (httpd) you are running, and (possibly) how you have configured your web server. It is believed the vulnerability is not available when Mailman is paired with a version of Apache >= 2.0, however earlier versions of Apache, e.g. version 1.3, will allow the exploit when executing a Mailman CGI script. All versions of Fedora have shipped with the later 2.0 version of Apache and thus if you are running a Fedora release you are not likely to be vulnerable to the exploit unless you have explicitly downgraded the version of your web server. However, installing this version of mailman with a security patch represents a prudent safeguard.

This issue has been assigned CVE number CAN-2005-0202.

The bug report associated with this is:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343

The errata associated with this for RHEL releases is:
http://rhn.redhat.com/errata/RHSA-2005-136.html

For additional piece of mind, it is recommended that you regenerate your list member passwords. Instructions on how to do this, and more information about this vulnerability are available here:

http://www.list.org/security.html

---------------------------------------------------------------------
* Tue Feb 08 2005 John Dennis jdennis@redhat.com - 3:2.1.5-30.fc3

- fix security vulnerability CAN-2005-0202, errata RHSA-2005:137, bug #147343

* Tue Nov 09 2004 John Dennis jdennis@redhat.com 3:2.1.5-29.fc3

- fix bug #137863, buildroot path in .pyc files

* Mon Nov 08 2004 John Dennis jdennis@redhat.com 3:2.1.5-27

- rebuild to fix bug #137863, python embeds build root in .pyc files


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

457b27f2f15c18b8de0e5fcff977d171 SRPMS/mailman-2.1.5-30.fc3.src.rpm
da424d3d5227650d843654acb22e23c3 x86_64/mailman-2.1.5-30.fc3.x86_64.rpm
e408bc622edf77f04680ead0cdae36cf x86_64/debug/mailman-debuginfo-2.1.5-30.fc3.x86_64.rpm
ec264fec376555f5af505f9b320020c6 i386/mailman-2.1.5-30.fc3.i386.rpm
fad64f3280cfdb4fcdd4520cf79a16b9 i386/debug/mailman-debuginfo-2.1.5-30.fc3.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.