-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
                        SuSE Security Announcement
        Package:  mirror-2.8.f4
        Date:     Fri Oct 01 22:21:15 MEST 1999
        Affected: all Linux distributions using mirror <= 2.8.f4
_____________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note, that that we provide this information on as "as-is" basis
only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
   The mirror package is a tool to duplicate the contents of ftp servers.
   A vulnerability exists when attackers can create directory like "
.."
   on the target mirror ftp server.
2. Impact
   Files can be created one level above the local target directory for
   the mirrored files.
3. Solution
   Update the mirror package. See below.
______________________________________________________________________________
Here are the md5 checksums of the upgrade packages, please verify these
before installing the new packages:
eaccdb63f04bd93fbed398103230d962  mirror-2.8.f4-89.i386.rpm  (SuSE 5.3)
b2830062371f924dedc12176d51ee01f  mirror-2.8.f4-89.i386.rpm  (SuSE 6.1)
f196641d03d95fd0ed5352787ba2b323  mirror-2.8.f4-89.alpha.rpm (SuSE AXP)
3ede055671a41481f9296d94ec577bd5  mirror-2.8.f4-89.i386.rpm  (SuSE 6.2)
______________________________________________________________________________
You will find the update on our ftp-Server:
  ftp://ftp.suse.com/pub/suse/i386/update/5.3/n1/mirror-2.8.f4-89.i386.rpm
  ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/mirror-2.8.f4-89.i386.rpm
  ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/mirror-2.8.f4-89.alpha.rpm
  ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/mirror-2.8.f4-89.i386.rpm
Webpage for patches:
  http://www.suse.de/patches/index.html
or try the following web pages for a list of mirrors:
  http://www.suse.de/ftp.html
  http://www.suse.com/ftp_new.html
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com          - moderated and for general/linux/SuSE
                                  security discussions. All SuSE security
                                  announcements are send to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
                                  Only SuSE's security annoucements are sent
                                  to this list.
To subscribe, just send an emtpy message to suse-security-subscribe@suse.com
or suse-security-announce-subscribe@suse.com like this:
        echo | mail suse-security-subscribe@suse.com
or
        echo | mail suse-security-announce-subscribe@suse.com
______________________________________________________________________________
If you want to report *NEW* security bugs in the SuSE Linux Distribution
please send an email to security@suse.de or call our support line.
You may use pgp with the public key below to ensure confidentiality.
______________________________________________________________________________
  This information is provided freely to everyone interested and may
  be redistributed provided that it is not altered in any way.
Type Bits/KeyID    Date       User ID
pub  2048/3D25D3D9 1999/03/06 SuSE Security Team <security@suse.de>
- -------BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12Cg==pIeS
- -------END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBN/PbhHey5gA9JdPZAQEEQgf/f3AcnaMoP4rg7BNiJGnsIFwnWLlHkVCV
TquWxZ4+GDNloeK3hfMEZi9VgDVUsdOW0q47PQ+J+phdcxgbqB0eOaCDk4ggnXoX
1A+mPhzezB9fq7a9PWc04xbREQJAYHHbKKtzEAT01mQt7dGsbetJlw8EvFwy6PFJ
zIEsFujEtQiA5jG2FB3fwKaGho345cowx0UPRPgjmfaOrnNMdPovBCfWtsgUATBI
z/iKsQcwq//YhzOz8tRgy9PwmF+scNotPE62C4lSirK7HSpq/yPQdwXEvACxTX/j
yJGBMlPsoyKcv738bWdumfETjdlQp77l0DokF0KNT60V9oW5E+s73Q==dazV
-----END PGP SIGNATURE-----
From mail@mail.redhat.com Tue Oct 5 19:34:12 1999
Received: (qmail 375 invoked from network); 5 Oct 1999 23:34:16 -0000
Received: from mail.redhat.com (199.183.24.239)
  by lists.redhat.com with SMTP; 5 Oct 1999 23:34:16 -0000
Received: from rosie.bitwizard.nl (root@16dyn81.delft.casema.net [212.64.79.81])
	by mail.redhat.com (8.8.7/8.8.7) with ESMTP id TAA01833
	for <linux-security@redhat.com>; Tue, 5 Oct 1999 19:34:12 -0400
Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1])
	by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id BAA27216
	for <linux-security@redhat.com>; Wed, 6 Oct 1999 01:34:02 +0200
Received: (from wolff@localhost)
	by cave.bitwizard.nl (8.9.3/8.9.3) id BAA16526
	for linux-security@redhat.com; Wed, 6 Oct 1999 01:34:00 +0200
Delivered-To: wolff@bitwizard.nl
Approved: R.E.Wolff@BitWizard.nl
Received: (qmail 7685 invoked by alias); 5 Oct 1999 15:44:32 -0000
Delivered-To: r.e.wolff@BitWizard.nl
Received: (qmail 7682 invoked from network); 5 Oct 1999 15:44:32 -0000
Received: from lists.redhat.com (199.183.24.247)
  by www.bitwizard.nl with SMTP; 5 Oct 1999 15:44:32 -0000
Received: (qmail 21310 invoked by uid 501); 5 Oct 1999 15:44:26 -0000
Received: (qmail 21286 invoked from network); 5 Oct 1999 15:44:26 -0000
Received: from mail.redhat.com (199.183.24.239)
  by lists.redhat.com with SMTP; 5 Oct 1999 15:44:26 -0000
Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com
[207.175.42.154])
	by mail.redhat.com (8.8.7/8.8.7) with ESMTP id LAA00390;
	Tue, 5 Oct 1999 11:44:26 -0400
Received: from bobby.devel.redhat.com (IDENT:root@bobby.devel.redhat.com
[207.175.42.14])
	by lacrosse.corp.redhat.com (8.9.3/8.9.3) with ESMTP id LAA03359;
	Tue, 5 Oct 1999 11:44:23 -0400
Received: (from notting@localhost)
	by bobby.devel.redhat.com (8.9.3/8.9.3) id LAA12904;
	Tue, 5 Oct 1999 11:44:20 -0400
Date: Tue, 5 Oct 1999 11:44:19 -0400
From: Bill Nottingham <notting@redhat.com>
To: redhat-watch-list@redhat.com
Cc: linux-security@redhat.com
Subject: [RHSA-1999:039-01] New netscape packages available
Message-ID: <19991005114419.A12868@bobby.devel.redhat.com>
Mail-Followup-To: redhat-watch-list@redhat.com, linux-security@redhat.com
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="vtzGhvizbBRQ85DL"
X-Mailer: Mutt 1.0pre3us
X-moderate: yes
--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
---------------------------------------------------------------------
		   Red Hat, Inc. Security Advisory
Synopsis:		New netscape packages available
Advisory ID:		RHSA-1999:039-01
Issue date:		1999-10-04
Updated on:		
Keywords:		netscape 4.7 communicator navigator
Cross references:	
---------------------------------------------------------------------
1. Topic:
A new version of Netscape has been released. This release
fixes some security problems in Javascript and form signing.
2. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info):
None.
3. Relevant releases/architectures:
Red Hat Linux 5.x, Intel
Red Hat Linux 6.x, Intel
Sparc packages will be available if/when Netscape updates
their Sparc releases.
4. Obsoleted by:
5. Conflicts with:
6. RPMs required:
Red Hat Linux 5.x:
Intel:
 
ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-common-4.7-0.i386.rpm
 
ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-communicator-4.7-0.i386.rpm
 
ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-navigator-4.7-0.i386.rpm
Sparc:
 
ftp://ftp.redhat.com/pub/redhat/updates/5.2/sparc/netscape-common-4.51-0.sparc.rpm
Source packages:
  ftp://ftp.redhat.com/pub/redhat/updates/5.2/SRPMS/netscape-4.7-0.src.rpm
Red Hat Linux 6.x:
Intel:
 
ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-common-4.7-1.i386.rpm
 
ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-communicator-4.7-1.i386.rpm
 
ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-navigator-4.7-1.i386.rpm
Source packages:
  ftp://ftp.redhat.com/pub/redhat/updates/6.1/SRPMS/netscape-4.7-1.src.rpm
7. Problem description:
A new version of Netscape has been released. This release
fixes some security problems in Javascript and form signing,
as well as adding some new features. For more information,
please see:
http://home.netscape.com/eng/mozilla/4.7/relnotes/unix-4.7.html
8. Solution:
For each RPM for your particular architecture, run:
 
rpm -Uvh <filename>
 
where filename is the name of the RPM.
9. Verification:
MD5 sum                           Package Name
--------------------------------------------------------------------------
f604d7e8032fe13f630373e5f9ad0940  i386/netscape-common-4.7-0.i386.rpm
3fcc5fca33ba3fc647fb5a7bf6aabf41  i386/netscape-communicator-4.7-0.i386.rpm
33818607fdc893a047dbf03c4b46ce34  i386/netscape-navigator-4.7-0.i386.rpm
c32b3f430a9eaf84c2c3f1e35f402229  SRPMS/netscape-4.7-0.src.rpm
f01c5658d5d264bee329aa51f3b09fe5  i386/netscape-common-4.7-1.i386.rpm
59de608731eea3293b12cbe370551403  i386/netscape-communicator-4.7-1.i386.rpm
3303e827932687615c0537e116660b21  i386/netscape-navigator-4.7-1.i386.rpm
aafb6d8c787771c3e2cff67bb0fff608  SRPMS/netscape-4.7-1.src.rpm
These packages are signed with GnuPG by Red Hat Inc. for security.  Our key
is available at:
 
http://www.redhat.com/corp/contact.html
and is also attached to this annoucement.
 
You can verify each package with the following command:
 
rpm --checksig  <filename>
 
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
 
rpm --checksig --nogpg <filename>
Note that you need RPM >= 3.0 to check GnuPG keys.
10. References:
--vtzGhvizbBRQ85DL
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=RPM-GPG-KEY
The following public key can be used to verify RPM packages built and
signed by Red Hat Software using `rpm -K' using the GNU GPG package. 
Questions about this key should be sent to ewt@redhat.com.
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.0 (GNU/Linux)
Comment: For info see http://www.gnupg.org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3AHZ
-----END PGP PUBLIC KEY BLOCK-----
--vtzGhvizbBRQ85DL--