From bugzilla@REDHAT.COM Tue Nov 21 17:08:19 2000 From: bugzilla@REDHAT.COM To: BUGTRAQ@SECURITYFOCUS.COM Date: Mon, 20 Nov 2000 10:21:00 -0500 Subject: [BUGTRAQ] [RHSA-2000:110-06] Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7 [The following text is in the "iso-8859-1" character set] [Your display is set for the "US-ASCII" character set] [Some characters may be displayed incorrectly] --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7 Advisory ID: RHSA-2000:110-06 Issue date: 2000-11-17 Updated on: 2000-11-20 Product: Red Hat Linux Keywords: joe DEADJOE symlink vulnerability Cross references: N/A --------------------------------------------------------------------- 1. Topic: Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7. 2. Relevant releases/architectures: Red Hat Linux 5.2 - i386, alpha, sparc Red Hat Linux 6.0 - i386, alpha, sparc Red Hat Linux 6.1 - i386, alpha, sparc Red Hat Linux 6.2 - i386, alpha, sparc Red Hat Linux 6.2EE - i386 Red Hat Linux 7.0 - i386 3. Problem description: When exiting joe in a nonstandard way (such as a system crash, closing an xterm, or a network connection going down), joe will unconditionally append its open buffers to the file "DEADJOE". This could be exploited by the creation of DEADJOE symlinks in directories where root would normally use joe. In this way, joe could be used to append garbage to potentially-sensitive files, resulting in a denial of service. Users of Red Hat Linux 6.x and 5.2 should also note that joe's configuration files have been moved from /usr/lib/joe to /etc/joe 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): N/A 6. RPMs required: Red Hat Linux 5.2: alpha: ftp://updates.redhat.com/5.2/alpha/joe-2.8-42.52.alpha.rpm sparc: ftp://updates.redhat.com/5.2/sparc/joe-2.8-42.52.sparc.rpm i386: ftp://updates.redhat.com/5.2/i386/joe-2.8-42.52.i386.rpm sources: ftp://updates.redhat.com/5.2/SRPMS/joe-2.8-42.52.src.rpm Red Hat Linux 6.0: sparc: ftp://updates.redhat.com/6.0/sparc/joe-2.8-42.62.sparc.rpm i386: ftp://updates.redhat.com/6.0/i386/joe-2.8-42.62.i386.rpm alpha: ftp://updates.redhat.com/6.0/alpha/joe-2.8-42.62.alpha.rpm sources: ftp://updates.redhat.com/6.0/SRPMS/joe-2.8-42.62.src.rpm Red Hat Linux 6.1: alpha: ftp://updates.redhat.com/6.1/alpha/joe-2.8-42.62.alpha.rpm sparc: ftp://updates.redhat.com/6.1/sparc/joe-2.8-42.62.sparc.rpm i386: ftp://updates.redhat.com/6.1/i386/joe-2.8-42.62.i386.rpm sources: ftp://updates.redhat.com/6.1/SRPMS/joe-2.8-42.62.src.rpm Red Hat Linux 6.2: alpha: ftp://updates.redhat.com/6.2/alpha/joe-2.8-42.62.alpha.rpm sparc: ftp://updates.redhat.com/6.2/sparc/joe-2.8-42.62.sparc.rpm i386: ftp://updates.redhat.com/6.2/i386/joe-2.8-42.62.i386.rpm sources: ftp://updates.redhat.com/6.2/SRPMS/joe-2.8-42.62.src.rpm Red Hat Linux 7.0: i386: ftp://updates.redhat.com/7.0/i386/joe-2.8-43.i386.rpm sources: ftp://updates.redhat.com/7.0/SRPMS/joe-2.8-43.src.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 7b78c81b253833ae849d162457d318dd 5.2/SRPMS/joe-2.8-42.52.src.rpm 0959bddd216c47426e5c335e6dbaa922 5.2/alpha/joe-2.8-42.52.alpha.rpm d5dc1a23953544964c04ad1eaa9c1a26 5.2/i386/joe-2.8-42.52.i386.rpm d5ce7e5469be6ff16373d4610c2b8fb3 5.2/sparc/joe-2.8-42.52.sparc.rpm 6eb2d2741296250f71667d5a1c1467fc 6.0/SRPMS/joe-2.8-42.62.src.rpm c53a34db6539d412adc86493e17e9725 6.0/alpha/joe-2.8-42.62.alpha.rpm d6afd50052ee0f5354a7398849d6c5b5 6.0/i386/joe-2.8-42.62.i386.rpm 0b1e58283c4f4d4c41c55948b0117f80 6.0/sparc/joe-2.8-42.62.sparc.rpm 6eb2d2741296250f71667d5a1c1467fc 6.1/SRPMS/joe-2.8-42.62.src.rpm c53a34db6539d412adc86493e17e9725 6.1/alpha/joe-2.8-42.62.alpha.rpm d6afd50052ee0f5354a7398849d6c5b5 6.1/i386/joe-2.8-42.62.i386.rpm 0b1e58283c4f4d4c41c55948b0117f80 6.1/sparc/joe-2.8-42.62.sparc.rpm 6eb2d2741296250f71667d5a1c1467fc 6.2/SRPMS/joe-2.8-42.62.src.rpm c53a34db6539d412adc86493e17e9725 6.2/alpha/joe-2.8-42.62.alpha.rpm d6afd50052ee0f5354a7398849d6c5b5 6.2/i386/joe-2.8-42.62.i386.rpm 0b1e58283c4f4d4c41c55948b0117f80 6.2/sparc/joe-2.8-42.62.sparc.rpm 67e2ddb6f4c903672782467684fbb7d3 7.0/SRPMS/joe-2.8-43.src.rpm 1578b0e184b76b23d2a30b101f1665d4 7.0/i386/joe-2.8-43.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg 8. References: N/A Copyright(c) 2000 Red Hat, Inc.