[LWN Logo]

Date: Mon, 6 Dec 1999 13:10:55 -0500 (EST)
From: Elliot Lee <sopwith@redhat.com>
To: redhat-watch-list@redhat.com, redhat-announce-list@redhat.com
Subject: RHSA-1999:058 - ORBit, esound, gnome-core

---------------------------------------------------------------------
		   Red Hat, Inc. Security Advisory

Synopsis:		new ORBit, esound, and gnome-core packages
Advisory ID:		RHSA-1999:058-01
Issue date:		1999-12-03
---------------------------------------------------------------------

1. Topic:

ORBit and gnome-session each contained a denial-of-service hole.

ORBit and esound each contained a security hole.

2. Relevant releases/architectures:

Red Hat Linux 6.1

3. Problem description:

ORBit and esound used a source of random data that was easily guessable,
possibly allowing an attacker with local access to guess the
authentication keys used to control access to these services.

ORBit and gnome-session contained a bug that allowed attackers to remotely
crash a program under unusual circumstances. In addition to fixing these
problems, TCP Wrappers support has been added to gnome-session. ORBit
already makes use of TCP Wrappers. It is recommended that this
functionality be used when additional access controls are desired on
network access to these services.

4. Solution:

For each RPM for your particular architecture, run:
    rpm -Uvh <filename>
where filename is the name of the RPM.

5. RPMs required:

Intel:
  ftp://updates.redhat.com/6.1/i386/ORBit-0.5.0-2.i386.rpm
  ftp://updates.redhat.com/6.1/i386/ORBit-devel-0.5.0-2.i386.rpm
  ftp://updates.redhat.com/6.1/i386/esound-0.2.17-1.i386.rpm
  ftp://updates.redhat.com/6.1/i386/esound-devel-0.2.17-1.i386.rpm
  ftp://updates.redhat.com/6.1/i386/gnome-core-1.0.54-2.i386.rpm
  ftp://updates.redhat.com/6.1/i386/gnome-core-devel-1.0.54-2.i386.rpm

Sparc:
  ftp://updates.redhat.com/6.1/sparc/ORBit-0.5.0-2.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/ORBit-devel-0.5.0-2.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/esound-0.2.17-1.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/esound-devel-0.2.17-1.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/gnome-core-1.0.54-2.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/gnome-core-devel-1.0.54-2.sparc.rpm

Source packages:
  ftp://updates.redhat.com/6.1/SRPMS/ORBit-0.5.0-2.src.rpm
  ftp://updates.redhat.com/6.1/SRPMS/esound-0.2.17-1.src.rpm
  ftp://updates.redhat.com/6.1/SRPMS/gnome-core-1.0.54-2.src.rpm


9. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
35cb261853a01711fb47ee6d48149bd4  i386/ORBit-0.5.0-2.i386.rpm
808e9dca462f8ef765b454b25e017614  i386/ORBit-devel-0.5.0-2.i386.rpm
261e7063065c50f5eb4235cb373c85f1  i386/esound-0.2.17-1.i386.rpm
fa44e546df9b307cec6557cac0112eff  i386/esound-devel-0.2.17-1.i386.rpm
d8c3814f4b8c19c38af526271dd1c294  i386/gnome-core-1.0.54-2.i386.rpm
a689359b3ff0bbe3ebc908a4ab5aaaad  i386/gnome-core-devel-1.0.54-2.i386.rpm
4ce667c72a33146c5280cc7fecba0f4d  sparc/ORBit-0.5.0-2.sparc.rpm
473056e09906fe49914c1d79dd30dc98  sparc/ORBit-devel-0.5.0-2.sparc.rpm
8ed14577fb93f8c684a98962c564b772  sparc/esound-0.2.17-1.sparc.rpm
0f8965c2d13bc000a87ed26ab5459ffb  sparc/esound-devel-0.2.17-1.sparc.rpm
11a28ec13e110cbaabb403333efe27c1  sparc/gnome-core-1.0.54-2.sparc.rpm
7b86b6bb257376242e88096f1aafc722  sparc/gnome-core-devel-1.0.54-2.sparc.rpm
9fa749891ed4e9505b07cac512e80808  SRPMS/ORBit-0.5.0-2.src.rpm
4d34ef79104c3b754f368900a1f09370  SRPMS/esound-0.2.17-1.src.rpm
48f5b99bc92048e99e159a026b314871  SRPMS/gnome-core-1.0.54-2.src.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html
 
You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

-- Elliot



-- 
         To unsubscribe: mail redhat-watch-list-request@redhat.com with 
                       "unsubscribe" as the Subject.