USN-215-1: fetchmailconf vulnerability

08 November 2005

fetchmailconf vulnerability

Releases

Details

Thomas Wolff and Miloslav Trmac discovered a race condition in the
fetchmailconf program. The output configuration file was initially
created with insecure permissions, and secure permissions were applied
after writing the configuration into the file. During this time, the
file was world readable on a standard system (unless the user manually
tightened his umask setting), which could expose email passwords to
local users.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 5.10
  • fetchmailconf -
Ubuntu 5.04
  • fetchmailconf -
Ubuntu 4.10
  • fetchmailconf -

In general, a standard system update will make all the necessary changes.

References