Mandriva 1273 Published by

An updated kolab-server package has been released for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: kolab-server
Advisory ID: MDKSA-2004:052
Date: May 26th, 2004

Affected versions: 10.0
______________________________________________________________________

Problem Description:

Luca Villani reported the disclosure of critical configuration information within Kolab, the KDE Groupware server. The affected versions store OpenLDAP passwords in plain text. The heart of Kolab is an engine written in Perl that rewrites configuration for certain applications based on templates. The build() function in the engine left slapd.conf world-readable exhibiting the OpenLDAP root password.



_______________________________________________________________________

References:

http://www.kolab.org/pipermail/kolab-users/2004-April/000215.html
______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
cc7b01619905b25dbbd3ae6c51ed05fd 10.0/RPMS/kolab-server-1.0-0.23.100mdk.i586.rpm
085c3f72bad177369279ce71e47a90c8 10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
7e3bce42c30cc11a6bc71ac39296a197 amd64/10.0/RPMS/kolab-server-1.0-0.23.100mdk.amd64.rpm
085c3f72bad177369279ce71e47a90c8 amd64/10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com