Debian: DSA-2021-2: New spamass-milter packages fix regression

    Date26 Apr 2010
    CategoryDebian
    39
    Posted ByLinuxSecurity Advisories
    The latest DSA for spamass-milter introduced a regression: when running spamass-milter with -x, a zombie process is left around for every mail received. This update corrects this problem. For reference, the original advisory text is provided below.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2021-2                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Giuseppe Iuculano
    April 26, 2010                        http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : spamass-milter
    Vulnerability  : missing input sanitization
    Problem-Type   : remote
    Debian-specific: no
    CVE Id         : CVE-2010-1132
    Debian Bug     : 573228 575019
    
    The latest DSA for spamass-milter introduced a regression: when running
    spamass-milter with -x, a zombie process is left around for every mail
    received. This update corrects this problem. 
    For reference, the original advisory text is provided below.
    
    It was discovered a missing input sanitization in spamass-milter, a milter
    used to filter mail through spamassassin.
    This allows a remote attacker to inject and execute arbitrary shell commands.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 0.3.1-8+lenny2.
    
    For the testing (squeeze) and unstable (sid) distribution this problem
    has been fixed in version 0.3.1-9.
    
    We recommend that you upgrade your spamass-milter package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1.orig.tar.gz
        Size/MD5 checksum:   141144 ca6bf6a9c88db74a6bfea41f499c0ba6
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2.dsc
        Size/MD5 checksum:     1050 435e426d0273445fb52e165fbad3bdaa
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2.diff.gz
        Size/MD5 checksum:    35530 43455ddb3b2c2e3e9cf8669bed77cf1f
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_alpha.deb
        Size/MD5 checksum:    54706 955bfdc5d5ba59328202a5e0a0bb8dc8
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_amd64.deb
        Size/MD5 checksum:    52872 65cb3550e38e91b0becfe9fa815df423
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_arm.deb
        Size/MD5 checksum:    51398 8812a1fd5575f2527abc49063323ba72
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_armel.deb
        Size/MD5 checksum:    48034 b9faf59a827b530dc445874121e70d94
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_hppa.deb
        Size/MD5 checksum:    55664 cff474d7f19abc0341bb7d5dcddb69e7
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_i386.deb
        Size/MD5 checksum:    51194 1141ef8d5c7a875ec3237dc0bbc99c31
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_ia64.deb
        Size/MD5 checksum:    59570 c5a00577d909d11277102afe87a02d02
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_mips.deb
        Size/MD5 checksum:    51438 eb68d14fe14ecb6d7051bbf0a1d2dcf8
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_powerpc.deb
        Size/MD5 checksum:    55752 a68c767ee2dc132b1f31ed3cd7543edf
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_s390.deb
        Size/MD5 checksum:    51448 46dd94373ce2c8495e2b9826f2292c9e
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny2_sparc.deb
        Size/MD5 checksum:    50004 82fb4f0420995ebb65ebf30ebbc61220
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.