An updated kolab-server package has been released for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: kolab-server
Advisory ID: MDKSA-2004:052
Date: May 26th, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
Luca Villani reported the disclosure of critical configuration information within Kolab, the KDE Groupware server. The affected versions store OpenLDAP passwords in plain text. The heart of Kolab is an engine written in Perl that rewrites configuration for certain applications based on templates. The build() function in the engine left slapd.conf world-readable exhibiting the OpenLDAP root password.
_______________________________________________________________________
References:
http://www.kolab.org/pipermail/kolab-users/2004-April/000215.html
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
cc7b01619905b25dbbd3ae6c51ed05fd 10.0/RPMS/kolab-server-1.0-0.23.100mdk.i586.rpm
085c3f72bad177369279ce71e47a90c8 10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
7e3bce42c30cc11a6bc71ac39296a197 amd64/10.0/RPMS/kolab-server-1.0-0.23.100mdk.amd64.rpm
085c3f72bad177369279ce71e47a90c8 amd64/10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: kolab-server
Advisory ID: MDKSA-2004:052
Date: May 26th, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
Luca Villani reported the disclosure of critical configuration information within Kolab, the KDE Groupware server. The affected versions store OpenLDAP passwords in plain text. The heart of Kolab is an engine written in Perl that rewrites configuration for certain applications based on templates. The build() function in the engine left slapd.conf world-readable exhibiting the OpenLDAP root password.
_______________________________________________________________________
References:
http://www.kolab.org/pipermail/kolab-users/2004-April/000215.html
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
cc7b01619905b25dbbd3ae6c51ed05fd 10.0/RPMS/kolab-server-1.0-0.23.100mdk.i586.rpm
085c3f72bad177369279ce71e47a90c8 10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
7e3bce42c30cc11a6bc71ac39296a197 amd64/10.0/RPMS/kolab-server-1.0-0.23.100mdk.amd64.rpm
085c3f72bad177369279ce71e47a90c8 amd64/10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com