Some of you may have noticed recent reports of security vulnerabilities in
the mailx and perl packages in various linux distributions. These
vulnerabilities may allow a malicious local user who has shell access to
gain root privileges. These circumstances should *never* occur with the
e-smith server and gateway - local users in general do not have local
shell access, and shell access is only available of the local
administrator has made custom changes. Local shell access should only be
granted to trusted local users.

Nevertheless, just in case there are any users or developers who have
granted shell access to some users, and wish to protect their server, I
have uploaded new RPMs to the update directory of ftp.e-smith.net.

To apply these updates, log in as root on a console, and do:

rpm -Uhv \
ftp://ftp.e-smith.net/pub/e-smith/e-smith-4.0/updates/RPMS/i386/\
mailx-8.1.1-16.i386.rpm
rpm -Uhv \
ftp://ftp.e-smith.net/pub/e-smith/e-smith-4.0/updates/RPMS/i386/\
perl-5.00503-11.i386.rpm

FYI, these RPMs are local rebuilds of the update RPMs issued by
RedHat. You may safely choose a local RedHat or e-smith mirror as the
source of these RPMs.

-- 

Charlie

Reply via email to