[LWN Logo]
[LWN.net]
From:	 TurboLinux Security Team <security@www1.turbolinux.com>
To:	 tl-security-announce@www1.turbolinux.com
Subject: [TL-Security-Announce] TLSA2001018 xemacs-21.1.14-1
Date:	 Fri, 18 May 2001 15:44:16 -0700 (PDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


_____________________________________________________________________________________________

                        Turbolinux Security Announcement

        Package:  xemacs
        Vulnerable Packages: All versions prior to xemacs-21.1.14-1
        Date: 05/18/2001 5:00 PDT

        Affected Turbolinux platforms:  TL Server 6.5

        Turbolinux Advisory ID#:  TLSA2001018

        Reference:  
  http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-019.php3?dis=7.2
_____________________________________________________________________________________________

A security hole was discovered in the package mentioned above.
Please update the packages in your installation as soon as possible.
_____________________________________________________________________________________________

1. Problem Summary(From the MandrakeSoft Security Advisory)

   There are problems in the gnuserv application.  It is possible to
   overrun the magic cookie buffer, and prefixes of valid magic cookies
   are accepted (i.e. "12" can be used if the cookie is "12345678").


2. Impact(Also from the MandrakeSoft Security Advisory)

   It is possible for an attacker to execute arbitrary code.


3. Solution

 Update the packages from our ftp server by using the following procedure:

 First, uninstall the previous versions of the xemacs packages by
 performing the following commands in the given order:

  	rpm -e xemacs-sumo-el
        rpm -e xemacs-sumo
        rpm -e xemacs-extra
        rpm -e xemacs-el
        rpm -e xemacs

 Then, install the updated versions of xemacs using the following command:

	 rpm -Uvh ftp_path_to_filename

   Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-21.1.14-1.i386.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-sumo-20001023-1.noarch.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-sumo-el-20001023-1.noarch.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-el-21.1.14-1.i386.rpm

 Finally, upgrade the xemacs-extra package using:

         rpm -Uvh --force ftp_path_to_filename

   Where ftp_path_to_filename is the following:
  
ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-extra-21.1.14-1.i386.rpm

The source RPMs can be downloaded here:

 ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/xemacs-21.1.14-1.src.rpm
 ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/xemacs-sumo-20001023-1.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

 Please verify the MD5 checksums of the updates before you install:

  MD5 sum                               Package Name
- ---------------------------------------------------------------------------------------------
71bff7e86e689492268f5c35d44e02ef        xemacs-21.1.14-1.i386.rpm
b112aa7a78cca5928a96a6bc3aeffd5a        xemacs-extra-21.1.14-1.i386.rpm
0e2370e870834d8d220f7ffbd927a0c4        xemacs-sumo-20001023-1.noarch.rpm
c87e9d3acb0742c23ad5c3a721701100        xemacs-sumo-el-20001023-1.noarch.rpm
47f9f8badfcae163d7e5f40df31963b6        xemacs-el-21.1.14-1.i386.rpm
e2efb03026505588622cce2e8ce42287        xemacs-21.1.14-1.src.rpm
5d9e1a5ca5c06b211ff4be2baf9a4ce4        xemacs-sumo-20001023-1.src.rpm
_____________________________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

_____________________________________________________________________________________________

You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ 

for TL6.x Workstation and Server security updates
   
Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   security@turbolinux.com
______________________________________________________________________________________________

Subscribe to the Turbolinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues
                Turbolinux products.

  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security
                         updates and alerts.  Subscribe at:

      http://www.turbolinux.com/mailman/listinfo/tl-security-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: pgpenvelope 2.10.0 - http://pgpenvelope.sourceforge.net/

iD8DBQE7BaXQcpw52/ZatwoRAhP4AJ9R8BavJviTPrLICpJRhs8KFu5/4QCeL4nY
3x0CPAQahaqpSoTNINQLY6I=
=CC62
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce