-----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ SuSE Security Announcement Package: mirror-2.8.f4 Date: Fri Oct 01 22:21:15 MEST 1999 Affected: all Linux distributions using mirror <= 2.8.f4 _____________________________________________________________________________ A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. Please note, that that we provide this information on as "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. _____________________________________________________________________________ 1. Problem Description The mirror package is a tool to duplicate the contents of ftp servers. A vulnerability exists when attackers can create directory like " .." on the target mirror ftp server. 2. Impact Files can be created one level above the local target directory for the mirrored files. 3. Solution Update the mirror package. See below. ______________________________________________________________________________ Here are the md5 checksums of the upgrade packages, please verify these before installing the new packages: eaccdb63f04bd93fbed398103230d962 mirror-2.8.f4-89.i386.rpm (SuSE 5.3) b2830062371f924dedc12176d51ee01f mirror-2.8.f4-89.i386.rpm (SuSE 6.1) f196641d03d95fd0ed5352787ba2b323 mirror-2.8.f4-89.alpha.rpm (SuSE AXP) 3ede055671a41481f9296d94ec577bd5 mirror-2.8.f4-89.i386.rpm (SuSE 6.2) ______________________________________________________________________________ You will find the update on our ftp-Server: ftp://ftp.suse.com/pub/suse/i386/update/5.3/n1/mirror-2.8.f4-89.i386.rpm ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/mirror-2.8.f4-89.i386.rpm ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/mirror-2.8.f4-89.alpha.rpm ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/mirror-2.8.f4-89.i386.rpm Webpage for patches: http://www.suse.de/patches/index.html or try the following web pages for a list of mirrors: http://www.suse.de/ftp.html http://www.suse.com/ftp_new.html ______________________________________________________________________________ SuSE has got two free security mailing list services to which any interested party may subscribe: suse-security@suse.com - moderated and for general/linux/SuSE security discussions. All SuSE security announcements are send to this list. suse-security-announce@suse.com - SuSE's announce-only mailing list. Only SuSE's security annoucements are sent to this list. To subscribe, just send an emtpy message to suse-security-subscribe@suse.com or suse-security-announce-subscribe@suse.com like this: echo | mail suse-security-subscribe@suse.com or echo | mail suse-security-announce-subscribe@suse.com ______________________________________________________________________________ If you want to report *NEW* security bugs in the SuSE Linux Distribution please send an email to security@suse.de or call our support line. You may use pgp with the public key below to ensure confidentiality. ______________________________________________________________________________ This information is provided freely to everyone interested and may be redistributed provided that it is not altered in any way. Type Bits/KeyID Date User ID pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security@suse.de> - -------BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+ cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7 tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63 Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+ x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0 Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2 saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o L0oixF12Cg==pIeS - -------END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQEVAwUBN/PbhHey5gA9JdPZAQEEQgf/f3AcnaMoP4rg7BNiJGnsIFwnWLlHkVCV TquWxZ4+GDNloeK3hfMEZi9VgDVUsdOW0q47PQ+J+phdcxgbqB0eOaCDk4ggnXoX 1A+mPhzezB9fq7a9PWc04xbREQJAYHHbKKtzEAT01mQt7dGsbetJlw8EvFwy6PFJ zIEsFujEtQiA5jG2FB3fwKaGho345cowx0UPRPgjmfaOrnNMdPovBCfWtsgUATBI z/iKsQcwq//YhzOz8tRgy9PwmF+scNotPE62C4lSirK7HSpq/yPQdwXEvACxTX/j yJGBMlPsoyKcv738bWdumfETjdlQp77l0DokF0KNT60V9oW5E+s73Q==dazV -----END PGP SIGNATURE----- From mail@mail.redhat.com Tue Oct 5 19:34:12 1999 Received: (qmail 375 invoked from network); 5 Oct 1999 23:34:16 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 5 Oct 1999 23:34:16 -0000 Received: from rosie.bitwizard.nl (root@16dyn81.delft.casema.net [212.64.79.81]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id TAA01833 for <linux-security@redhat.com>; Tue, 5 Oct 1999 19:34:12 -0400 Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1]) by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id BAA27216 for <linux-security@redhat.com>; Wed, 6 Oct 1999 01:34:02 +0200 Received: (from wolff@localhost) by cave.bitwizard.nl (8.9.3/8.9.3) id BAA16526 for linux-security@redhat.com; Wed, 6 Oct 1999 01:34:00 +0200 Delivered-To: wolff@bitwizard.nl Approved: R.E.Wolff@BitWizard.nl Received: (qmail 7685 invoked by alias); 5 Oct 1999 15:44:32 -0000 Delivered-To: r.e.wolff@BitWizard.nl Received: (qmail 7682 invoked from network); 5 Oct 1999 15:44:32 -0000 Received: from lists.redhat.com (199.183.24.247) by www.bitwizard.nl with SMTP; 5 Oct 1999 15:44:32 -0000 Received: (qmail 21310 invoked by uid 501); 5 Oct 1999 15:44:26 -0000 Received: (qmail 21286 invoked from network); 5 Oct 1999 15:44:26 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 5 Oct 1999 15:44:26 -0000 Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com [207.175.42.154]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id LAA00390; Tue, 5 Oct 1999 11:44:26 -0400 Received: from bobby.devel.redhat.com (IDENT:root@bobby.devel.redhat.com [207.175.42.14]) by lacrosse.corp.redhat.com (8.9.3/8.9.3) with ESMTP id LAA03359; Tue, 5 Oct 1999 11:44:23 -0400 Received: (from notting@localhost) by bobby.devel.redhat.com (8.9.3/8.9.3) id LAA12904; Tue, 5 Oct 1999 11:44:20 -0400 Date: Tue, 5 Oct 1999 11:44:19 -0400 From: Bill Nottingham <notting@redhat.com> To: redhat-watch-list@redhat.com Cc: linux-security@redhat.com Subject: [RHSA-1999:039-01] New netscape packages available Message-ID: <19991005114419.A12868@bobby.devel.redhat.com> Mail-Followup-To: redhat-watch-list@redhat.com, linux-security@redhat.com Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="vtzGhvizbBRQ85DL" X-Mailer: Mutt 1.0pre3us X-moderate: yes --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New netscape packages available Advisory ID: RHSA-1999:039-01 Issue date: 1999-10-04 Updated on: Keywords: netscape 4.7 communicator navigator Cross references: --------------------------------------------------------------------- 1. Topic: A new version of Netscape has been released. This release fixes some security problems in Javascript and form signing. 2. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info): None. 3. Relevant releases/architectures: Red Hat Linux 5.x, Intel Red Hat Linux 6.x, Intel Sparc packages will be available if/when Netscape updates their Sparc releases. 4. Obsoleted by: 5. Conflicts with: 6. RPMs required: Red Hat Linux 5.x: Intel: ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-common-4.7-0.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-communicator-4.7-0.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/5.2/i386/netscape-navigator-4.7-0.i386.rpm Sparc: ftp://ftp.redhat.com/pub/redhat/updates/5.2/sparc/netscape-common-4.51-0.sparc.rpm Source packages: ftp://ftp.redhat.com/pub/redhat/updates/5.2/SRPMS/netscape-4.7-0.src.rpm Red Hat Linux 6.x: Intel: ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-common-4.7-1.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-communicator-4.7-1.i386.rpm ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/netscape-navigator-4.7-1.i386.rpm Source packages: ftp://ftp.redhat.com/pub/redhat/updates/6.1/SRPMS/netscape-4.7-1.src.rpm 7. Problem description: A new version of Netscape has been released. This release fixes some security problems in Javascript and form signing, as well as adding some new features. For more information, please see: http://home.netscape.com/eng/mozilla/4.7/relnotes/unix-4.7.html 8. Solution: For each RPM for your particular architecture, run: rpm -Uvh <filename> where filename is the name of the RPM. 9. Verification: MD5 sum Package Name -------------------------------------------------------------------------- f604d7e8032fe13f630373e5f9ad0940 i386/netscape-common-4.7-0.i386.rpm 3fcc5fca33ba3fc647fb5a7bf6aabf41 i386/netscape-communicator-4.7-0.i386.rpm 33818607fdc893a047dbf03c4b46ce34 i386/netscape-navigator-4.7-0.i386.rpm c32b3f430a9eaf84c2c3f1e35f402229 SRPMS/netscape-4.7-0.src.rpm f01c5658d5d264bee329aa51f3b09fe5 i386/netscape-common-4.7-1.i386.rpm 59de608731eea3293b12cbe370551403 i386/netscape-communicator-4.7-1.i386.rpm 3303e827932687615c0537e116660b21 i386/netscape-navigator-4.7-1.i386.rpm aafb6d8c787771c3e2cff67bb0fff608 SRPMS/netscape-4.7-1.src.rpm These packages are signed with GnuPG by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html and is also attached to this annoucement. You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> Note that you need RPM >= 3.0 to check GnuPG keys. 10. References: --vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename=RPM-GPG-KEY The following public key can be used to verify RPM packages built and signed by Red Hat Software using `rpm -K' using the GNU GPG package. Questions about this key should be sent to ewt@redhat.com. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.0 (GNU/Linux) Comment: For info see http://www.gnupg.org mQGiBDfqVDgRBADBKr3Bl6PO8BQ0H8sJoD6p9U7Yyl7pjtZqioviPwXP+DCWd4u8 HQzcxAZ57m8ssA1LK1Fx93coJhDzM130+p5BG9mYSWShLabR3N1KXdXQYYcowTOM GxdwYRGr1Spw8QydLhjVfU1VSl4xt6bupPbWJbyjkg5Z3P7BlUOUJmrx3wCgobNV EDGaWYJcch5z5B1of/41G8kEAKii6q7Gu/vhXXnLS6m15oNnPVybyngiw/23dKjS ZVG7rKANEK2mxg1VB+vc/uUc4k49UxJJfCZg1gu1sPFV3GSa+Y/7jsiLktQvCiLP lncQt1dV+ENmHR5BdIDPWDzKBVbgWnSDnqQ6KrZ7T6AlZ74VMpjGxxkWU6vV2xsW XCLPA/9P/vtImA8CZN3jxGgtK5GGtDNJ/cMhhuv5tnfwFg4b/VGo2Jr8mhLUqoIb E6zeGAmZbUpdckDco8D5fiFmqTf5+++pCEpJLJkkzel/32N2w4qzPrcRMCiBURES PjCLd4Y5rPoU8E4kOHc/4BuHN903tiCsCPloCrWsQZ7UdxfQ5LQiUmVkIEhhdCwg SW5jIDxzZWN1cml0eUByZWRoYXQuY29tPohVBBMRAgAVBQI36lQ4AwsKAwMVAwID FgIBAheAAAoJECGRgM3bQqYOsBQAnRVtg7B25Hm11PHcpa8FpeddKiq2AJ9aO8sB XmLDmPOEFI75mpTrKYHF6rkCDQQ36lRyEAgAokgI2xJ+3bZsk8jRA8ORIX8DH05U lMH27qFYzLbT6npXwXYIOtVn0K2/iMDj+oEB1Aa2au4OnddYaLWp06v3d+XyS0t+ 5ab2ZfIQzdh7wCwxqRkzR+/H5TLYbMG+hvtTdylfqIX0WEfoOXMtWEGSVwyUsnM3 Jy3LOi48rQQSCKtCAUdV20FoIGWhwnb/gHU1BnmES6UdQujFBE6EANqPhp0coYoI hHJ2oIO8ujQItvvNaU88j/s/izQv5e7MXOgVSjKe/WX3s2JtB/tW7utpy12wh1J+ JsFdbLV/t8CozUTpJgx5mVA3RKlxjTA+On+1IEUWioB+iVfT7Ov/0kcAzwADBQf9 E4SKCWRand8K0XloMYgmipxMhJNnWDMLkokvbMNTUoNpSfRoQJ9EheXDxwMpTPwK ti/PYrrL2J11P2ed0x7zm8v3gLrY0cue1iSba+8glY+p31ZPOr5ogaJw7ZARgoS8 BwjyRymXQp+8Dete0TELKOL2/itDOPGHW07SsVWOR6cmX4VlRRcWB5KejaNvdrE5 4XFtOd04NMgWI63uqZc4zkRa+kwEZtmbz3tHSdRCCE+Y7YVP6IUf/w6YPQFQriWY FiA6fD10eB+BlIUqIw80VgjsBKmCwvKkn4jg8kibXgj4/TzQSx77uYokw1EqQ2wk OZoaEtcubsNMquuLCMWijYhGBBgRAgAGBQI36lRyAAoJECGRgM3bQqYOhyYAnj7h VDY/FJAGqmtZpwVp9IlitW5tAJ4xQApr/jNFZCTksnI+4O1765F7tA==3AHZ -----END PGP PUBLIC KEY BLOCK----- --vtzGhvizbBRQ85DL--