- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Low: mailman security and bug fix update
Advisory ID:       RHSA-2007:0779-02
Advisory URL:      https://access.redhat.com/errata/RHSA-2007:0779.html
Issue date:        2007-11-15
Updated on:        2007-11-15
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-4624 
- ---------------------------------------------------------------------1. Summary:

Updated mailman packages that fix a security issue and various bugs are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Mailman is a program used to help manage email discussion lists.

A flaw was found in Mailman. A remote attacker could spoof messages in
the error log, and possibly trick the administrator into visiting malicious
URLs via a carriage return/line feed sequence in the URI. (CVE-2006-4624)

As well, these updated packages fix the following bugs:

* canceling a subscription on the confirm subscription request page
caused mailman to crash.

* editing the sender filter caused all spam filter rules to be deleted.

* the migrate-fhs script was not included.

* the mailman init script returned a zero (success) exit code even when
an incorrect command was given. For example, the "mailman foo" command
returned a zero exit code. In these updated packages the mailmain init
script returns the correct exit codes.

Users of Mailman are advised to upgrade to these updated packages, which
resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at


5. Bug IDs fixed (http://bugzilla.redhat.com/):

200036 - Canceling subscription confirmation crashes mailman
205651 - CVE-2006-4624 mailman logfile CRLF injection
223191 - Spam filters gets deleted when sender filter is edited
230939 - mailman-2.1.5.1-34.rhel4.5 is missing migrate-fhs script
242677 - Wrong init script

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

ppc:
c9cfb9aa11a5c281b3a82313d2ea233a  mailman-2.1.5.1-34.rhel4.6.ppc.rpm
aa933b2d2a4b5062bcfac412d199ce46  mailman-debuginfo-2.1.5.1-34.rhel4.6.ppc.rpm

s390:
0130bfcf79c1bb852ee1a57664e0318d  mailman-2.1.5.1-34.rhel4.6.s390.rpm
ddd5c59638d686af3afb285a4dd1bc7e  mailman-debuginfo-2.1.5.1-34.rhel4.6.s390.rpm

s390x:
05f6bc35d89b64f54ea98e94962c79fc  mailman-2.1.5.1-34.rhel4.6.s390x.rpm
fd90039a9b1bc188234a04efb1703945  mailman-debuginfo-2.1.5.1-34.rhel4.6.s390x.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
cc98584c023f60a7b82b75ad32746ded  mailman-2.1.5.1-34.rhel4.6.src.rpm

i386:
abd6759ac2f46e50d9de6c6fffc9117a  mailman-2.1.5.1-34.rhel4.6.i386.rpm
8307354db23c68be6826122af40bdeea  mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm

ia64:
413aba0280251a5ad3da4bd35c235f8b  mailman-2.1.5.1-34.rhel4.6.ia64.rpm
92664a65306e390b3d2f2cfa4946b0a6  mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm

x86_64:
5f00ffd062da99497e20e27ae0b3fd2e  mailman-2.1.5.1-34.rhel4.6.x86_64.rpm
a79b911550a27718cf95a926113f968e  mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.

RedHat: Low: mailman security and bug fix update

Updated mailman packages that fix a security issue and various bugs are now available for Red Hat Enterprise Linux 4

Summary



Summary

Mailman is a program used to help manage email discussion lists. A flaw was found in Mailman. A remote attacker could spoof messages in the error log, and possibly trick the administrator into visiting malicious URLs via a carriage return/line feed sequence in the URI. (CVE-2006-4624) As well, these updated packages fix the following bugs: * canceling a subscription on the confirm subscription request page caused mailman to crash. * editing the sender filter caused all spam filter rules to be deleted. * the migrate-fhs script was not included. * the mailman init script returned a zero (success) exit code even when an incorrect command was given. For example, the "mailman foo" command returned a zero exit code. In these updated packages the mailmain init script returns the correct exit codes. Users of Mailman are advised to upgrade to these updated packages, which resolve these issues.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at

5. Bug IDs fixed (http://bugzilla.redhat.com/):
200036 - Canceling subscription confirmation crashes mailman 205651 - CVE-2006-4624 mailman logfile CRLF injection 223191 - Spam filters gets deleted when sender filter is edited 230939 - mailman-2.1.5.1-34.rhel4.5 is missing migrate-fhs script 242677 - Wrong init script
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
ia64: 413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm 92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm
ppc: c9cfb9aa11a5c281b3a82313d2ea233a mailman-2.1.5.1-34.rhel4.6.ppc.rpm aa933b2d2a4b5062bcfac412d199ce46 mailman-debuginfo-2.1.5.1-34.rhel4.6.ppc.rpm
s390: 0130bfcf79c1bb852ee1a57664e0318d mailman-2.1.5.1-34.rhel4.6.s390.rpm ddd5c59638d686af3afb285a4dd1bc7e mailman-debuginfo-2.1.5.1-34.rhel4.6.s390.rpm
s390x: 05f6bc35d89b64f54ea98e94962c79fc mailman-2.1.5.1-34.rhel4.6.s390x.rpm fd90039a9b1bc188234a04efb1703945 mailman-debuginfo-2.1.5.1-34.rhel4.6.s390x.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
ia64: 413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm 92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: cc98584c023f60a7b82b75ad32746ded mailman-2.1.5.1-34.rhel4.6.src.rpm
i386: abd6759ac2f46e50d9de6c6fffc9117a mailman-2.1.5.1-34.rhel4.6.i386.rpm 8307354db23c68be6826122af40bdeea mailman-debuginfo-2.1.5.1-34.rhel4.6.i386.rpm
ia64: 413aba0280251a5ad3da4bd35c235f8b mailman-2.1.5.1-34.rhel4.6.ia64.rpm 92664a65306e390b3d2f2cfa4946b0a6 mailman-debuginfo-2.1.5.1-34.rhel4.6.ia64.rpm
x86_64: 5f00ffd062da99497e20e27ae0b3fd2e mailman-2.1.5.1-34.rhel4.6.x86_64.rpm a79b911550a27718cf95a926113f968e mailman-debuginfo-2.1.5.1-34.rhel4.6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4624 http://www.redhat.com/security/updates/classification/#low

Package List


Severity
Advisory ID: RHSA-2007:0779-02
Advisory URL: https://access.redhat.com/errata/RHSA-2007:0779.html
Issued Date: : 2007-11-15
Updated on: 2007-11-15
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-4624 Updated mailman packages that fix a security issue and various bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having low security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News