-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  fetchmail (SSA:2005-203-05)


New fetchmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, and -current to fix security issues.  Connecting to a malicious or
compromised POP3 server may overflow fetchmail's stack causing a crash
or the execution of arbitrary code.

For more information about this issue, see:
  https://www.berlios.de/software/fetchmail/


Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
patches/packages/fetchmail-6.2.5.2-i486-1.tgz:
  Upgraded to fetchmail-6.2.5.2.
  This fixes an overflow by which malicious or compromised POP3 servers  may overflow fetchmail's stack.
  For more information, see:
    https://www.berlios.de/software/fetchmail/
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 8.1:

Updated package for Slackware 9.0:

Updated package for Slackware 9.1:

Updated package for Slackware 10.0:

Updated package for Slackware 10.1:

Updated package for Slackware -current:


MD5 signatures:
+-------------+

Slackware 8.1 package:
5c146fba82f2aef039e56336eefdb58a  fetchmail-6.2.5.2-i386-1.tgz

Slackware 9.0 package:
3294b7f7bd8e3c87cb9651dc599226de  fetchmail-6.2.5.2-i386-1.tgz

Slackware 9.1 package:
dfba7d4c4621265cb5ed95ebd7098bad  fetchmail-6.2.5.2-i486-1.tgz

Slackware 10.0 package:
ec892e656e164089cb7166b81880bd75  fetchmail-6.2.5.2-i486-1.tgz

Slackware 10.1 package:
46cc7c918e9ffaff726f37a4083ec0f9  fetchmail-6.2.5.2-i486-1.tgz

Slackware -current package:
a8273535ee8af6f7acad0f9626f4c819  fetchmail-6.2.5.2-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg fetchmail-6.2.5.2-i486-1.tgz


+-----+

Slackware: 2005-203-05: fetchmail Security Update

July 22, 2005
New fetchmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix security issues

Summary

Here are the details from the Slackware 10.1 ChangeLog: patches/packages/fetchmail-6.2.5.2-i486-1.tgz: Upgraded to fetchmail-6.2.5.2. This fixes an overflow by which malicious or compromised POP3 servers may overflow fetchmail's stack. For more information, see: https://www.berlios.de/software/fetchmail/ (* Security fix *)

Where Find New Packages

Updated package for Slackware 8.1:
Updated package for Slackware 9.0:
Updated package for Slackware 9.1:
Updated package for Slackware 10.0:
Updated package for Slackware 10.1:
Updated package for Slackware -current:

MD5 Signatures

Slackware 8.1 package: 5c146fba82f2aef039e56336eefdb58a fetchmail-6.2.5.2-i386-1.tgz
Slackware 9.0 package: 3294b7f7bd8e3c87cb9651dc599226de fetchmail-6.2.5.2-i386-1.tgz
Slackware 9.1 package: dfba7d4c4621265cb5ed95ebd7098bad fetchmail-6.2.5.2-i486-1.tgz
Slackware 10.0 package: ec892e656e164089cb7166b81880bd75 fetchmail-6.2.5.2-i486-1.tgz
Slackware 10.1 package: 46cc7c918e9ffaff726f37a4083ec0f9 fetchmail-6.2.5.2-i486-1.tgz
Slackware -current package: a8273535ee8af6f7acad0f9626f4c819 fetchmail-6.2.5.2-i486-1.tgz

Severity
[slackware-security] fetchmail (SSA:2005-203-05)
New fetchmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix security issues. Connecting to a malicious or compromised POP3 server may overflow fetchmail's stack causing a crash or the execution of arbitrary code.
For more information about this issue, see: https://www.berlios.de/software/fetchmail/

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg fetchmail-6.2.5.2-i486-1.tgz

Related News