[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200501261509.35418.security-announce@turbolinux.co.jp>
From: security-announce at turbolinux.co.jp (Turbolinux)
Subject: [TURBOLINUX SECURITY INFO] 26/Jan/2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is an announcement only email list for the x86 architecture.
============================================================
Turbolinux Security Announcement 26/Jan/2005
============================================================
The following page contains the security information of Turbolinux Inc.
- Turbolinux Security Center
http://www.turbolinux.com/security/
(1) ImageMagick -> Buffer overflow
(2) a2ps -> File name sanitization issue allows arbitrary command execution
(3) gzip -> Possible symlink attack may allow arbitrary file overwriting
(4) iptables -> The iptables module is not loaded by default
(5) libxml -> Buffer overflow vulnerabilites exist in libxml
(6) libxml2 -> Buffer overflow vulnerabilites exist in libxml2
===========================================================
* ImageMagick -> Buffer overflow
===========================================================
More information:
ImageMagick(TM) is an image display and manipulation tool for the X
Window System. ImageMagick can read and write JPEG, TIFF, PNM, GIF and
Photo CD image file formats.
Multiple buffer overflow vulnerabilities in ImageMagick allowing remote
attackers to execute arbitrary code via a malformed image or video file.
Impact:
The vulnerability can allows remote attackers to execute arbitrary code via a certain image file.
Affected Products:
- Turbolinux 10 Server
- Turbolinux Home
- Turbolinux 10 F...
- Turbolinux 10 Desktop
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
# turboupdate
or
# zabom -u mageMagick ImageMagick-devel
---------------------------------------------
<Turbolinux 10 Server>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/ImageMagick-6.0.5-6.src.rpm
7511941 17adae3379d5fe2d2c8d0cc7ee8d2b56
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-6.0.5-6.i586.rpm
4363797 68a19b63569e6a59595b2d945d5e7237
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-c++-6.0.5-6.i586.rpm
306696 c03cb913e8741f3af87fd443bc307404
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-devel-6.0.5-6.i586.rpm
786243 70452d358cb3bf7d0df592561e7c7da4
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-perl-6.0.5-6.i586.rpm
73904 f899a6e397e9d1b67d8f9282a3756a3e
<Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/ImageMagick-6.0.5-6.src.rpm
7511941 2b293d79210909e845b1ca1536016b48
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/ImageMagick-6.0.5-6.i586.rpm
4370606 a25ae2ba0ebd7ed3f04911c2ba45a411
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/ImageMagick-devel-6.0.5-6.i586.rpm
784965 30175afd0bc34e8c46ba487539b926b7
References:
CVE
[CAN-2004-0981]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981
===========================================================
* a2ps -> File name sanitization issue allows arbitrary command execution
===========================================================
More information:
a2ps is a text to PostScript filter with pretty-printing capabilities.
Vulnerabilities in a2ps can allow remote attackers to execute arbitrary
commands by placing shell metacharacters in filenames.
Impact:
An attacker can cause arbitrary shell commands to be executed by a2ps.
Affected Products:
- Turbolinux 10 Server
- Turbolinux Home
- Turbolinux 10 F...
- Turbolinux 10 Desktop
- Turbolinux 8 Server
- Turbolinux 8 Workstation
- Turbolinux 7 Server
- Turbolinux 7 Workstation
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
[Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F...,
Turbolinux Home]
# turbopkg
or
# zabom -u a2ps
[other]
# turbopkg
or
# zabom update a2ps
---------------------------------------------
<Turbolinux 10 Server>
Source Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/a2ps-4.13-9.src.rpm
1987071 0dec4f3618d7e32b0687d76213fb92df
Binary Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/a2ps-4.13-9.i586.rpm
965274 a3d79d28a78bdd732b474ab77e8d4688
<Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>
Source Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/a2ps-4.13-9.src.rpm
1987071 c35e3b9d7363517dde3e9a32dfa067ea
Binary Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/a2ps-4.13-9.i586.rpm
688661 56e6872b9138ce795824524e2a34d196
<Turbolinux 8 Server>
Source Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/a2ps-4.13-9.src.rpm
1987071 3223869042a6ea7eed654cac2143686f
Binary Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/a2ps-4.13-9.i586.rpm
689304 f99ce2a2d1a06bc8faafeed2d7601c8b
<Turbolinux 8 Workstation>
Source Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/a2ps-4.13-9.src.rpm
1987071 c965972eedc095def78b7d82083a8517
Binary Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/a2ps-4.13-9.i586.rpm
689678 c3d17ecf390ed87469295fa91099ceeb
<Turbolinux 7 Server>
Source Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/a2ps-4.13-9.src.rpm
1987071 3ab202306117826905ed8ccad1ba6620
Binary Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/a2ps-4.13-9.i586.rpm
678614 ecf1ddf66639409b320756ac3226c9f6
<Turbolinux 7 Workstation>
Source Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/a2ps-4.13-9.src.rpm
1987071 fccba4d124c8af048daa1162d772b21d
Binary Packages
size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/a2ps-4.13-9.i586.rpm
678336 4c78ac597a79b1523f80cd5f87fd76f8
References:
CVE
[CAN-2004-1170]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170
===========================================================
* gzip -> Possible symlink attack may allow arbitrary file overwriting
===========================================================
More information:
gzip is a compression utility designed to be a replacement for compress.
A vulnerability in the manner in which gzip handles temporary files
could allow local users to overwrite arbitrary files via a symlink attack.
Impact:
This vulerability may allow local users to overwrite arbitrary files
via a symbolic link attack.
Affected Products:
- Turbolinux Appliance Server 1.0 Hosting Edition
- Turbolinux Appliance Server 1.0 Workgroup Edition
- Turbolinux 10 Server
- Turbolinux Home
- Turbolinux 10 F...
- Turbolinux 10 Desktop
- Turbolinux 8 Server
- Turbolinux 8 Workstation
- Turbolinux 7 Server
- Turbolinux 7 Workstation
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
[Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F...,
Turbolinux Home]
# turbopkg
or
# zabom -u gzip
[other]
# turbopkg
or
# zabom update gzip
---------------------------------------------
<Turbolinux Appliance Server 1.0 Hosting Edition>
Source Packages
Size : MD5
gzip-1.3.3-5.src.rpm
330678 0b4aeb40c5791cb69e7f889624f649ce
Binary Packages
Size : MD5
gzip-1.3.3-5.i586.rpm
96268 56021edc714862f99b36d35a862a249e
<Turbolinux Appliance Server 1.0 Workgroup Edition>
Source Packages
Size : MD5
gzip-1.3.3-5.src.rpm
330678 bda93bc97f98b6b64a88618b2522fe7b
Binary Packages
Size : MD5
gzip-1.3.3-5.i586.rpm
96425 54c5f4f79161110b2e1e593a78572e74
<Turbolinux 10 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/gzip-1.3.3-5.src.rpm
330678 ba5f93e1f166fbd28ec09d511c158660
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/gzip-1.3.3-5.i586.rpm
97741 5fc0e455c2aa615ec07f887fa550f922
<Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/gzip-1.3.3-5.src.rpm
330678 cd2e575c7712a6707a5f251d6860294d
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/gzip-1.3.3-5.i586.rpm
97867 555cbc0ef8c85b65ec213173b5b97a6f
<Turbolinux 8 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/gzip-1.3.3-5.src.rpm
330678 6882ac6a387053736e57d8710fb5e4e8
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/gzip-1.3.3-5.i586.rpm
96459 0b494d773435cc8318005f11b5f6d3e5
<Turbolinux 8 Workstation>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/gzip-1.3.3-5.src.rpm
330678 3ecc8d56bce9d3952ac8107640e760dc
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/gzip-1.3.3-5.i586.rpm
96430 36a89d5a23778a8f5e23292645b3837a
<Turbolinux 7 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/gzip-1.3.3-5.src.rpm
330678 7694ead88f8ec5d357723810fa7682f7
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/gzip-1.3.3-5.i586.rpm
95347 88a3663e794481891caa4cd54adbe526
<Turbolinux 7 Workstation>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/gzip-1.3.3-5.src.rpm
330678 ba1efebdc5263f3bc42df4ba04b15869
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/gzip-1.3.3-5.i586.rpm
95474 a1ca43139819e82d33b9cbf89af1b1d7
References:
CVE
[CAN-2004-0970]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0970
===========================================================
* iptables -> The iptables module is not loaded by default
===========================================================
More information:
The iptables module is part of a framework within the Linux kernel enabling
packet filtering and network addresss and port translation.
The iptables module allows you to set up firewalls, IP masquerading, etc.
Under certain conditions, at system startup, the iptables module does
not properly load other required kernel modules.
Impact:
This vulnerability may cause some firewall rules to not be enabled.
Affected Products:
- Turbolinux 10 Server
- Turbolinux Home
- Turbolinux 10 F...
- Turbolinux 10 Desktop
- Turbolinux 8 Server
- Turbolinux 8 Workstation
- Turbolinux 7 Server
- Turbolinux 7 Workstation
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
[Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F...,
Turbolinux Home]
# turbopkg
or
# zabom -u iptables iptables-ipv6
[other]
# turbopkg
or
# zabom update iptables iptables-ipv6
---------------------------------------------
<Turbolinux 10 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/iptables-1.2.11-3.src.rpm
171392 f8d209c404a0c80a1cb39769b0dd0752
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/iptables-1.2.11-3.i586.rpm
128949 18665c1391bcacc008b42f878ba8bf66
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/iptables-ipv6-1.2.11-3.i586.rpm
86570 31a0bee5bdf37f815415cb4497ffccc2
<Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/iptables-1.2.5-6.src.rpm
249503 db14fb59045bf441b3b29ce441ecafb4
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/iptables-1.2.5-6.i586.rpm
112221 cde32d0ebb914aa24b5b701138944166
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
43308 769ab23520744ecec5c18eb46a18713f
<Turbolinux 8 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/iptables-1.2.5-6.src.rpm
249503 2793cddd92d0a4d46fa16044a3b1bbd5
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/iptables-1.2.5-6.i586.rpm
112368 97b59758bad5e851add2eb910e5f1509
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
43544 29cbe3100477c7794167ac5159a92ee1
<Turbolinux 8 Workstation>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/iptables-1.2.5-6.src.rpm
249503 662423ea544c38fbb0b1673ce4f26191
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/iptables-1.2.5-6.i586.rpm
112279 3f0ed78324c4bfd83f57058485d55f54
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
43528 87ddac3e83341e365a23df157f149805
<Turbolinux 7 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/iptables-1.2.5-6.src.rpm
249503 90eea0042084c29924d3fe3a699bf4be
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/iptables-1.2.5-6.i586.rpm
108811 2c12ce067ffbad17752497d1995bbd0b
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
42332 732477a482bf315c41a88a7b03554b56
<Turbolinux 7 Workstation>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/iptables-1.2.5-6.src.rpm
249503 672e50ae6dd331223ad640dd621e76a8
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/iptables-1.2.5-6.i586.rpm
108845 3e9364b62881492e087d932a355a05dd
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
42300 3a9eac9ded16f9076d70cbec2b149880
References:
CVE
[CAN-2004-0986]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0986
===========================================================
* libxml -> Buffer overflow vulnerabilites exist in libxml
===========================================================
More information:
The libxml library provides procedures for XML file manipulation.
Multiple buffer overflow vulnerabilities have been discovered in libxml.
Impact:
These vulnerabilities may allow remote attackers to execute arbitrary
code via malformed XML files.
Affected Products:
- Turbolinux Appliance Server 1.0 Hosting Edition
- Turbolinux Appliance Server 1.0 Workgroup Edition
- Turbolinux 10 Server
- Turbolinux Home
- Turbolinux 10 F...
- Turbolinux 10 Desktop
- Turbolinux 8 Server
- Turbolinux 8 Workstation
- Turbolinux 7 Server
- Turbolinux 7 Workstation
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
[Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F...,
Turbolinux Home]
# turbopkg
or
# zabom -u libxml libxml-devel
[other]
# turbopkg
or
# zabom update libxml libxml-devel
---------------------------------------------
<Turbolinux Appliance Server 1.0 Hosting Edition>
Source Packages
Size : MD5
libxml-1.8.17-3.src.rpm
1002313 a221f0ae0340d529e37e77277cbc724b
Binary Packages
Size : MD5
libxml-1.8.17-3.i586.rpm
197379 ff1877cc078406b8542e27363ff47bb4
libxml-devel-1.8.17-3.i586.rpm
267417 6140caa6998d3b6dab87e9da1600f394
<Turbolinux Appliance Server 1.0 Workgroup Edition>
Source Packages
Size : MD5
libxml-1.8.17-3.src.rpm
1002313 efc0c920f2a1d03ba8290986af100c09
Binary Packages
Size : MD5
libxml-1.8.17-3.i586.rpm
197463 b94753d90641384139abc612ce92a603
libxml-devel-1.8.17-3.i586.rpm
267603 b925e86432763f2266455e6bbabc01c0
<Turbolinux 10 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/libxml-1.8.17-3.src.rpm
1002313 d8873df37efe921a792fcb62919720e9
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml-1.8.17-3.i586.rpm
208266 c8bdee5a3eb42c5a53d10f572df68903
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
285035 7c78bfdda81835baf911362ebab11e36
<Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/libxml-1.8.17-3.src.rpm
1002313 95b1482d1e41c6e7ec8a23feb1f856c3
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml-1.8.17-3.i586.rpm
208150 317a18fc61a84af641518856a976cc93
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
285207 f3b283f1bb5ab4d2e0df616791b41568
<Turbolinux 8 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/libxml-1.8.17-3.src.rpm
1002313 b597b8284d425ed90f16e3b501c6e0f6
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml-1.8.17-3.i586.rpm
197536 42bdd8f06b235dff2ed179975966717e
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
267740 b7c7bfa7870db1d07ab297a2fb489d9b
<Turbolinux 8 Workstation>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/libxml-1.8.17-3.src.rpm
1002313 eda8c4d80ce75656cd4bb9872b144693
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml-1.8.17-3.i586.rpm
197510 4ecd20f98c08f1e57c83ad4afb91c5b6
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
267558 39820f6abe5ae9b97550c97df3dd1a1e
<Turbolinux 7 Server>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/libxml-1.8.14-2.src.rpm
966346 53b518434c062a8c9fb669e03c11a7ec
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml-1.8.14-2.i586.rpm
189070 fbac2b8ab90a15a0bffcc99b0e93db23
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml-devel-1.8.14-2.i586.rpm
254630 a9ac85fee62e78fdbc42ea439c68445a
<Turbolinux 7 Workstation>
Source Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/libxml-1.8.14-2.src.rpm
966346 020e595b4f37e36fcd8163c702108309
Binary Packages
Size : MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml-1.8.14-2.i586.rpm
189024 65e1c7e7d7970ac3a2c5bcb758bb5e62
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml-devel-1.8.14-2.i586.rpm
254787 b4c33a50660d1031a1056ce691998394
References:
CVE
[CAN-2004-0989]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989
===========================================================
* libxml2 -> Buffer overflow vulnerabilites exist in libxml2
===========================================================
More information:
The libxml2 library provides procedures for XML file manipulation.
Multiple buffer overflow vulnerabilities have been discovered in libxml2.
Impact:
These vulnerabilities may allow remote attackers to execute arbitrary
code via malformed XML files.
Affected Products:
- Turbolinux Appliance Server 1.0 Hosting Edition
- Turbolinux Appliance Server 1.0 Workgroup Edition
- Turbolinux 10 Server
- Turbolinux Home
- Turbolinux 10 F...
- Turbolinux 10 Desktop
- Turbolinux 8 Server
- Turbolinux 8 Workstation
- Turbolinux 7 Server
- Turbolinux 7 Workstation
Solution:
Please use the turbopkg (zabom) tool to apply the update.
---------------------------------------------
[Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F...,
Turbolinux Home]
# turbopkg
or
# zabom -u libxml2 libxml2-devel
[other]
# turbopkg
or
# zabom update libxml2 libxml2-devel
---------------------------------------------
<Turbolinux Appliance Server 1.0 Hosting Edition>
Source Packages
Size: MD5
libxml2-2.4.22-3.src.rpm
1546095 45e4878e24d9c3ea37a74e606b98b36b
Binary Packages
Size: MD5
libxml2-2.4.22-3.i586.rpm
348726 3536b4e41bfcbe790bddb71dcbe82454
libxml2-devel-2.4.22-3.i586.rpm
672112 35415f29d7bb3bb37bdc64551f2bb39b
libxml2-python-2.4.22-3.i586.rpm
119866 92be4a854e5eae388387f5b6992bf1a3
<Turbolinux Appliance Server 1.0 Workgroup Edition>
Source Packages
Size: MD5
libxml2-2.4.22-3.src.rpm
1546095 c3c1b644325030da4be5f88773c5e62b
Binary Packages
Size: MD5
libxml2-2.4.22-3.i586.rpm
348918 6a37a0890286bd39c8cbdcea39e80bb1
libxml2-devel-2.4.22-3.i586.rpm
673104 08c514e9ff536f3abddfbd37b47640f0
libxml2-python-2.4.22-3.i586.rpm
120058 e26e9e2fc43a91c3945440458d9ef2db
<Turbolinux 10 Server>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/libxml2-2.6.11-3.src.rpm
3676235 c83ca34b6b043df8bdbf71074a01d8ad
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-2.6.11-3.i586.rpm
931885 e0c079d1fced4b79406d8137f7ae51cb
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-debug-2.6.11-3.i586.rpm
1261976 e56ed4aafbc708d5b82cbd7420dc3688
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-devel-2.6.11-3.i586.rpm
1833564 c4fa232aa88a3a9ad8e6599674eb5215
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-python-2.6.11-3.i586.rpm
219714 975a999a695a80addc291c9a086f6c70
<Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/libxml2-2.6.2-3.src.rpm
2494574 5074efa52a7b7fbb048d32195e939072
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml2-2.6.2-3.i586.rpm
513161 3fdaa041b1f0b43edf73478314ef17da
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml2-devel-2.6.2-3.i586.rpm
1068458 2d3f0d198946eeccf3a43c4ca56ed87c
<Turbolinux 8 Server>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/libxml2-2.4.22-3.src.rpm
1546095 8c4bd8f791a125332e4a88095c33799c
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml2-2.4.22-3.i586.rpm
348792 e6562126f8981e907a75ef3a2da69873
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml2-devel-2.4.22-3.i586.rpm
672844 987ab841df3e43eca6c4512a0507e8df
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml2-python-2.4.22-3.i586.rpm
119991 50216a9da56ed1f136ac8954152d6599
<Turbolinux 8 Workstation>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/libxml2-2.4.19-3.src.rpm
1935708 338be398b6817e3dad7a6cb96847c930
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml2-2.4.19-3.i586.rpm
343441 8be8c1ada3f99ea2098874d66840ec3a
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml2-devel-2.4.19-3.i586.rpm
648314 32d33253943c3a1f40ba9c90df74c2e2
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml2-python-2.4.19-3.i586.rpm
118291 7627209852457adfad6f41e7ef715655
<Turbolinux 7 Server>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/libxml2-2.4.28-3.src.rpm
2499363 16ed867be21e9d3cdfb329939e652019
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml2-2.4.28-3.i586.rpm
388291 5f063aebeba773a4303f30bd7d70c468
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml2-devel-2.4.28-3.i586.rpm
971341 e83302e5593a0903362078f2288ba90e
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml2-python-2.4.28-3.i586.rpm
155374 ab3939602ce9d4ec7fcbb303680c22ea
<Turbolinux 7 Workstation>
Source Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/libxml2-2.4.28-3.src.rpm
2499363 818aea961b5deab575384742a7012a59
Binary Packages
Size: MD5
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml2-2.4.28-3.i586.rpm
388163 f37ef635700f96e2125ce4c7e0e043db
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml2-devel-2.4.28-3.i586.rpm
971519 9214c44cf80e7ae6bd218aacbaaa8ce7
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml2-python-2.4.28-3.i586.rpm
155359 7d0e098faaf3884eec9332ba6773160f
References:
CVE
[CAN-2004-0989]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989
* You may need to update the turbopkg tool before applying the update.
Please refer to the following URL for detailed information.
http://www.turbolinux.com/download/zabom.html
http://www.turbolinux.com/download/zabomupdate.html
Package Update Path
http://www.turbolinux.com/update/
============================================================
* To obtain the public key
Here is the public key
http://www.turbolinux.com/security/
* To unsubscribe from the list
If you ever want to remove yourself from this mailing list,
you can send a message to <server-users-e-ctl@...bolinux.co.jp> with
the word `unsubscribe' in the body (don't include the quotes).
unsubscribe
* To change your email address
If you ever want to chage email address in this mailing list,
you can send a message to <server-users-e-ctl@...bolinux.co.jp> with
the following command in the message body:
chaddr 'old address' 'new address'
If you have any questions or problems, please contact
<supp_info@...bolinux.co.jp>
Thank you!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFB9zQYK0LzjOqIJMwRAr5BAJ9JOt4iq0/Mbpx0sXQKrF6tLA6yrgCfU3uP
epQkEOA/b94qKfvU9DQ8KRg=
=SJsL
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists