bh: doc/www/src/security kolab-vendor-notice-12.txt,NONE,1.1

cvs at cvs at
Mon Oct 9 18:47:05 CEST 2006

Author: bh

Update of /kolabrepository/doc/www/src/security
In directory doto:/tmp/cvs-serv25867/www/src/security

Added Files:
Log Message:
Added Kolab Security Issue 11 and corresponding news item.

--- NEW FILE: kolab-vendor-notice-12.txt ---
Hash: SHA1

Kolab Security Issue 12 20061009

Package:              openssl
Vulnerability:        denial of service, may allow execution of arbitrary code
Kolab Specific:       no
Dependent Packages:   apache curl imap imapd openldap perl perl-crypto
                      php postfix proftpd


The openssl package for the Kolab Server 2.0 branch from the previous
Kolab Security Issue, No. 11 from 20061002, introduced a new problem
together with the fix for CVE-2006-2940.  The new problem is the
possible use of an uninitialized local variable which may lead to
program crashes and may allow execution of arbitrary code.

Affected Versions

The updated RPMs from Kolab Security Issue 11 for the Kolab Server 2.0
are affected.  More specifically, it affects the
openssl-0.9.7l-20061002_kolab RPM and dependent packages.

The updated RPMs for the Kolab Server 2.1 branch are NOT affected.  The
openssl RPM from OpenPKG used for that branch already contains the fix
for the new problem.


Note: The fix described here is for Kolab Server 2.0.4.  If you still
run an older version, please upgrade to 2.0.4 first.  You do not need to
apply Kolab Security Issue 11 because this update completely replaces

An updated OpenPKG package for openssl is available from the usual kolab
mirrors under the directory security-updates/20061009/ .  While the
mirrors are catching up, you can also get the files via rsync: 
# rsync -tzvr rsync:// .

Under that directory there is one directory with the new source RPMs
(sources/) and one with updated RPMs for Debian sarge (ix86-debian3.1)
If you installed the Kolab Server from sources, download the sources
directory for your kolab Server branch.  If you installed from binaries,
download the appropriate binaries directory for your Kolab Server

Both directories contain the new OpenSSL package plus obmtool and
obmtool.conf files like a Kolab release.  In addition, the binary
directory contains updated binaries of the dependent packages.

In any case, download all files in the appropriate directory, chdir into
the downloaded directory and run

  /kolab/bin/openpkg rc all stop
  ./obmtool kolab

This will install the new openssl package and rebuild/reinstall the
dependent packages.  Afterwards start the server again, making sure to
regenerate the config files as you would for a normal Kolab Server

	Kolab Security Notice 11 with the updates
	OpenPKG Security Advisory OpenPKG-SA-2006.021
	OpenSSL Security Advisory on the vendor's site
	Common Vulnerabilities and Exposures (CVE): CAN-2006-2940

    20060928 OpenSSL vendor released patch and new versions containing the fix
    20060928 OpenPKG created new package containing the fix
    20061002 Kolab update and security advisory 11 published
    20061009 Kolab update and security advisory 12 published

Version: GnuPG v1.4.3 (GNU/Linux)


More information about the commits mailing list