Linux Security
    Linux Security
    Linux Security

    Debian: New smartlist packages fix unauthorised un/subscription

    Date 03 May 2005
    Posted By Joe Shakespeare
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 720-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    May 3rd, 2005               
    - --------------------------------------------------------------------------
    Package        : smartlist
    Vulnerability  : wrong input processing
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-0157
    Jeroen van Wolffelaar noticed that the confirm add-on of SmartList,
    the listmanager used on, which is used on that host
    as well, could be tricked to subscribe arbitrary addresses to the
    For the stable distribution (woody) this problem has been fixed in
    version 3.15-5.woody.1.
    For the unstable distribution (sid) this problem has been fixed in
    version 3.15-18.
    We recommend that you upgrade your smartlist package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      591 3876af4dd42b57ffe3a442936050e2e0
          Size/MD5 checksum:    18960 72c921048d0aae96ba993e0431a2ac3b
          Size/MD5 checksum:   276652 105cb4a2bf22324afc10654236926f45
      Alpha architecture:
          Size/MD5 checksum:   100100 b747b361beeec6828168fd28b5e2a9bf
      ARM architecture:
          Size/MD5 checksum:    97380 c89d5ecf5bf17c6defe1ccd0ea5cf91e
      Intel IA-32 architecture:
          Size/MD5 checksum:    97346 1d3c7ae8e0a4972beccaaa2af5fdfa3c
      Intel IA-64 architecture:
          Size/MD5 checksum:   103260 ed3fea87f7329abcb807ae85fc77323e
      HP Precision architecture:
          Size/MD5 checksum:    99270 fed594324e9e63416b2b0b64f060e5ec
      Motorola 680x0 architecture:
          Size/MD5 checksum:    96684 eb186656e073b848ce8135d9bc21a471
      Big endian MIPS architecture:
          Size/MD5 checksum:    97736 4e9951dab3a2f10203b228a04b7f6eb1
      Little endian MIPS architecture:
          Size/MD5 checksum:    97798 1d572809bb860c0ddc8aa6e2be027758
      PowerPC architecture:
          Size/MD5 checksum:    97570 bdcf89fe0d8619942278be852db8493e
      IBM S/390 architecture:
          Size/MD5 checksum:    98268 e839fc7457330bf46bad0e00b2329778
      Sun Sparc architecture:
          Size/MD5 checksum:    97280 dc87465a7fe50d5ca2567038a4636ad5
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.