---------------------------------------------------------------------Fedora Update Notification
FEDORA-2005-132
2005-02-10
---------------------------------------------------------------------Product     : Fedora Core 3
Name        : mailman
Version     : 2.1.5                      
Release     : 30.fc3                  
Summary     : Mailing list manager with built in Web access.
Description :
Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and allows users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
<-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5

---------------------------------------------------------------------Update Information:


There is a critical security flaw in Mailman 2.1.5 which will allow
attackers to read arbitrary files.

The extent of the vulnerability depends on what version of Apache
(httpd) you are running, and (possibly) how you have configured your
web server. It is believed the vulnerability is not available when
Mailman is paired with a version of Apache >= 2.0, however earlier
versions of Apache, e.g. version 1.3, will allow the exploit when
executing a Mailman CGI script. All versions of Fedora have shipped
with the later 2.0 version of Apache and thus if you are running a
Fedora release you are not likely to be vulnerable to the exploit
unless you have explicitly downgraded the version of your web
server. However, installing this version of mailman with a security
patch represents a prudent safeguard.

This issue has been assigned CVE number CAN-2005-0202.

The bug report associated with this is:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343

The errata associated with this for RHEL releases is:
https://access.redhat.com/errata/RHSA-2005:136.html

For additional piece of mind, it is recommended that you regenerate
your list member passwords.  Instructions on how to do this, and more
information about this vulnerability are available here:

        https://www.list.org/security.html

---------------------------------------------------------------------* Tue Feb 08 2005 John Dennis  - 3:2.1.5-30.fc3

- fix security vulnerability CAN-2005-0202, errata RHSA-2005:137, bug #147343

* Tue Nov 09 2004 John Dennis  3:2.1.5-29.fc3

- fix bug #137863, buildroot path in .pyc files

* Mon Nov 08 2004 John Dennis  3:2.1.5-27

- rebuild to fix bug #137863, python embeds build root in .pyc files


---------------------------------------------------------------------This update can be downloaded from:
  
457b27f2f15c18b8de0e5fcff977d171  SRPMS/mailman-2.1.5-30.fc3.src.rpm
da424d3d5227650d843654acb22e23c3  x86_64/mailman-2.1.5-30.fc3.x86_64.rpm
e408bc622edf77f04680ead0cdae36cf  x86_64/debug/mailman-debuginfo-2.1.5-30.fc3.x86_64.rpm
ec264fec376555f5af505f9b320020c6  i386/mailman-2.1.5-30.fc3.i386.rpm
fad64f3280cfdb4fcdd4520cf79a16b9  i386/debug/mailman-debuginfo-2.1.5-30.fc3.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.  
---------------------------------------------------------------------
-- 
John Dennis 

--fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list

Fedora Core 3 Update: mailman-2.1.5-30.fc3

February 10, 2005
There is a critical security flaw in Mailman 2.1.5 which will allow attackers to read arbitrary files.

Summary

Mailman is software to help manage email discussion lists, much like

Majordomo and Smartmail. Unlike most similar products, Mailman gives

each mailing list a webpage, and allows users to subscribe,

unsubscribe, etc. over the Web. Even the list manager can administer

his or her list entirely from the Web. Mailman also integrates most

things people want to do with mailing lists, including archiving, mail

<-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.5

There is a critical security flaw in Mailman 2.1.5 which will allow

attackers to read arbitrary files.

The extent of the vulnerability depends on what version of Apache

(httpd) you are running, and (possibly) how you have configured your

web server. It is believed the vulnerability is not available when

Mailman is paired with a version of Apache >= 2.0, however earlier

versions of Apache, e.g. version 1.3, will allow the exploit when

executing a Mailman CGI script. All versions of Fedora have shipped

with the later 2.0 version of Apache and thus if you are running a

Fedora release you are not likely to be vulnerable to the exploit

unless you have explicitly downgraded the version of your web

server. However, installing this version of mailman with a security

patch represents a prudent safeguard.

This issue has been assigned CVE number CAN-2005-0202.

The bug report associated with this is:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343

The errata associated with this for RHEL releases is:

https://access.redhat.com/errata/RHSA-2005:136.html

For additional piece of mind, it is recommended that you regenerate

your list member passwords. Instructions on how to do this, and more

information about this vulnerability are available here:

https://www.list.org/security.html

- fix security vulnerability CAN-2005-0202, errata RHSA-2005:137, bug #147343

* Tue Nov 09 2004 John Dennis 3:2.1.5-29.fc3

- fix bug #137863, buildroot path in .pyc files

* Mon Nov 08 2004 John Dennis 3:2.1.5-27

- rebuild to fix bug #137863, python embeds build root in .pyc files

457b27f2f15c18b8de0e5fcff977d171 SRPMS/mailman-2.1.5-30.fc3.src.rpm

da424d3d5227650d843654acb22e23c3 x86_64/mailman-2.1.5-30.fc3.x86_64.rpm

e408bc622edf77f04680ead0cdae36cf x86_64/debug/mailman-debuginfo-2.1.5-30.fc3.x86_64.rpm

ec264fec376555f5af505f9b320020c6 i386/mailman-2.1.5-30.fc3.i386.rpm

fad64f3280cfdb4fcdd4520cf79a16b9 i386/debug/mailman-debuginfo-2.1.5-30.fc3.i386.rpm

This update can also be installed with the Update Agent; you can

launch the Update Agent with the 'up2date' command.

--

John Dennis

--fedora-announce-list mailing list

fedora-announce-list@redhat.com

http://www.redhat.com/mailman/listinfo/fedora-announce-list

FEDORA-2005-132 2005-02-10 Name : mailman Version : 2.1.5 Release : 30.fc3 Summary : Mailing list manager with built in Web access. Description : Mailman is software to help manage email discussion lists, much like Majordomo and Smartmail. Unlike most similar products, Mailman gives each mailing list a webpage, and allows users to subscribe, unsubscribe, etc. over the Web. Even the list manager can administer his or her list entirely from the Web. Mailman also integrates most things people want to do with mailing lists, including archiving, mail <-> news gateways, and so on. Documentation can be found in: /usr/share/doc/mailman-2.1.5 There is a critical security flaw in Mailman 2.1.5 which will allow attackers to read arbitrary files. The extent of the vulnerability depends on what version of Apache (httpd) you are running, and (possibly) how you have configured your web server. It is believed the vulnerability is not available when Mailman is paired with a version of Apache >= 2.0, however earlier versions of Apache, e.g. version 1.3, will allow the exploit when executing a Mailman CGI script. All versions of Fedora have shipped with the later 2.0 version of Apache and thus if you are running a Fedora release you are not likely to be vulnerable to the exploit unless you have explicitly downgraded the version of your web server. However, installing this version of mailman with a security patch represents a prudent safeguard. This issue has been assigned CVE number CAN-2005-0202. The bug report associated with this is: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343 The errata associated with this for RHEL releases is: https://access.redhat.com/errata/RHSA-2005:136.html For additional piece of mind, it is recommended that you regenerate your list member passwords. Instructions on how to do this, and more information about this vulnerability are available here: https://www.list.org/security.html - fix security vulnerability CAN-2005-0202, errata RHSA-2005:137, bug #147343 * Tue Nov 09 2004 John Dennis 3:2.1.5-29.fc3 - fix bug #137863, buildroot path in .pyc files * Mon Nov 08 2004 John Dennis 3:2.1.5-27 - rebuild to fix bug #137863, python embeds build root in .pyc files 457b27f2f15c18b8de0e5fcff977d171 SRPMS/mailman-2.1.5-30.fc3.src.rpm da424d3d5227650d843654acb22e23c3 x86_64/mailman-2.1.5-30.fc3.x86_64.rpm e408bc622edf77f04680ead0cdae36cf x86_64/debug/mailman-debuginfo-2.1.5-30.fc3.x86_64.rpm ec264fec376555f5af505f9b320020c6 i386/mailman-2.1.5-30.fc3.i386.rpm fad64f3280cfdb4fcdd4520cf79a16b9 i386/debug/mailman-debuginfo-2.1.5-30.fc3.i386.rpm This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command. -- John Dennis --fedora-announce-list mailing list fedora-announce-list@redhat.com http://www.redhat.com/mailman/listinfo/fedora-announce-list

Change Log

References

Update Instructions

Severity
Name : mailman
Version : 2.1.5
Release : 30.fc3
Summary : Mailing list manager with built in Web access.

Related News