lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200501261509.35418.security-announce@turbolinux.co.jp>
From: security-announce at turbolinux.co.jp (Turbolinux)
Subject: [TURBOLINUX SECURITY INFO] 26/Jan/2005

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This is an announcement only email list for the x86 architecture.
============================================================
Turbolinux Security Announcement 26/Jan/2005
============================================================

The following page contains the security information of Turbolinux Inc.

 - Turbolinux Security Center
   http://www.turbolinux.com/security/

 (1) ImageMagick -> Buffer overflow
 (2) a2ps -> File name sanitization issue allows arbitrary command execution
 (3) gzip -> Possible symlink attack may allow arbitrary file overwriting
 (4) iptables -> The iptables module is not loaded by default
 (5) libxml -> Buffer overflow vulnerabilites exist in libxml
 (6) libxml2 -> Buffer overflow vulnerabilites exist in libxml2

===========================================================
* ImageMagick -> Buffer overflow
===========================================================

 More information:
    ImageMagick(TM) is an image display and manipulation tool for the X
    Window System.  ImageMagick can read and write JPEG, TIFF, PNM, GIF and
    Photo CD image file formats.

    Multiple buffer overflow vulnerabilities in ImageMagick allowing remote
    attackers to execute arbitrary code via a malformed image or video file.

 Impact:
    The vulnerability can allows remote attackers to execute arbitrary code via a certain image file.

 Affected Products:
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 # turboupdate
 or
 # zabom -u mageMagick ImageMagick-devel
 ---------------------------------------------


 <Turbolinux 10 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/ImageMagick-6.0.5-6.src.rpm
      7511941 17adae3379d5fe2d2c8d0cc7ee8d2b56

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-6.0.5-6.i586.rpm
      4363797 68a19b63569e6a59595b2d945d5e7237
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-c++-6.0.5-6.i586.rpm
       306696 c03cb913e8741f3af87fd443bc307404
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-devel-6.0.5-6.i586.rpm
       786243 70452d358cb3bf7d0df592561e7c7da4
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/ImageMagick-perl-6.0.5-6.i586.rpm
        73904 f899a6e397e9d1b67d8f9282a3756a3e

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/ImageMagick-6.0.5-6.src.rpm
      7511941 2b293d79210909e845b1ca1536016b48

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/ImageMagick-6.0.5-6.i586.rpm
      4370606 a25ae2ba0ebd7ed3f04911c2ba45a411
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/ImageMagick-devel-6.0.5-6.i586.rpm
       784965 30175afd0bc34e8c46ba487539b926b7

 References:

 CVE
   [CAN-2004-0981]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981


===========================================================
* a2ps -> File name sanitization issue allows arbitrary command execution
===========================================================

 More information:
    a2ps is a text to PostScript filter with pretty-printing capabilities.

    Vulnerabilities in a2ps can allow remote attackers to execute arbitrary
    commands by placing shell metacharacters in filenames.

 Impact:
    An attacker can cause arbitrary shell commands to be executed by a2ps.

 Affected Products:
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F...,
  Turbolinux Home]
 # turbopkg
 or
 # zabom -u a2ps

 [other]
 # turbopkg
 or
 # zabom update a2ps
 ---------------------------------------------


 <Turbolinux 10 Server>

   Source Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/a2ps-4.13-9.src.rpm
      1987071 0dec4f3618d7e32b0687d76213fb92df

   Binary Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/a2ps-4.13-9.i586.rpm
       965274 a3d79d28a78bdd732b474ab77e8d4688

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/a2ps-4.13-9.src.rpm
      1987071 c35e3b9d7363517dde3e9a32dfa067ea

   Binary Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/a2ps-4.13-9.i586.rpm
       688661 56e6872b9138ce795824524e2a34d196

 <Turbolinux 8 Server>

   Source Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/a2ps-4.13-9.src.rpm
      1987071 3223869042a6ea7eed654cac2143686f

   Binary Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/a2ps-4.13-9.i586.rpm
       689304 f99ce2a2d1a06bc8faafeed2d7601c8b

 <Turbolinux 8 Workstation>

   Source Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/a2ps-4.13-9.src.rpm
      1987071 c965972eedc095def78b7d82083a8517

   Binary Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/a2ps-4.13-9.i586.rpm
       689678 c3d17ecf390ed87469295fa91099ceeb

 <Turbolinux 7 Server>

   Source Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/a2ps-4.13-9.src.rpm
      1987071 3ab202306117826905ed8ccad1ba6620

   Binary Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/a2ps-4.13-9.i586.rpm
       678614 ecf1ddf66639409b320756ac3226c9f6

 <Turbolinux 7 Workstation>

   Source Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/a2ps-4.13-9.src.rpm
      1987071 fccba4d124c8af048daa1162d772b21d

   Binary Packages
   size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/a2ps-4.13-9.i586.rpm
       678336 4c78ac597a79b1523f80cd5f87fd76f8


 References:

 CVE
   [CAN-2004-1170]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170


===========================================================
* gzip -> Possible symlink attack may allow arbitrary file overwriting
===========================================================

 More information:
    gzip is a compression utility designed to be a replacement for compress.

    A vulnerability in the manner in which gzip handles temporary files
    could allow local users to overwrite arbitrary files via a symlink attack.

 Impact:
    This vulerability may allow local users to overwrite arbitrary files
    via a symbolic link attack.

 Affected Products:
    - Turbolinux Appliance Server 1.0 Hosting Edition
    - Turbolinux Appliance Server 1.0 Workgroup Edition
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F..., 
  Turbolinux Home]
 # turbopkg
 or
 # zabom -u gzip

 [other]
 # turbopkg
 or
 # zabom update gzip
 ---------------------------------------------


 <Turbolinux Appliance Server 1.0 Hosting Edition>

   Source Packages
   Size : MD5

   gzip-1.3.3-5.src.rpm
       330678 0b4aeb40c5791cb69e7f889624f649ce

   Binary Packages
   Size : MD5

   gzip-1.3.3-5.i586.rpm
        96268 56021edc714862f99b36d35a862a249e

 <Turbolinux Appliance Server 1.0 Workgroup Edition>

   Source Packages
   Size : MD5

   gzip-1.3.3-5.src.rpm
       330678 bda93bc97f98b6b64a88618b2522fe7b

   Binary Packages
   Size : MD5

   gzip-1.3.3-5.i586.rpm
        96425 54c5f4f79161110b2e1e593a78572e74

 <Turbolinux 10 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/gzip-1.3.3-5.src.rpm
       330678 ba5f93e1f166fbd28ec09d511c158660

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/gzip-1.3.3-5.i586.rpm
        97741 5fc0e455c2aa615ec07f887fa550f922

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/gzip-1.3.3-5.src.rpm
       330678 cd2e575c7712a6707a5f251d6860294d

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/gzip-1.3.3-5.i586.rpm
        97867 555cbc0ef8c85b65ec213173b5b97a6f

 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/gzip-1.3.3-5.src.rpm
       330678 6882ac6a387053736e57d8710fb5e4e8

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/gzip-1.3.3-5.i586.rpm
        96459 0b494d773435cc8318005f11b5f6d3e5

 <Turbolinux 8 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/gzip-1.3.3-5.src.rpm
       330678 3ecc8d56bce9d3952ac8107640e760dc

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/gzip-1.3.3-5.i586.rpm
        96430 36a89d5a23778a8f5e23292645b3837a

 <Turbolinux 7 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/gzip-1.3.3-5.src.rpm
       330678 7694ead88f8ec5d357723810fa7682f7

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/gzip-1.3.3-5.i586.rpm
        95347 88a3663e794481891caa4cd54adbe526

 <Turbolinux 7 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/gzip-1.3.3-5.src.rpm
       330678 ba1efebdc5263f3bc42df4ba04b15869

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/gzip-1.3.3-5.i586.rpm
        95474 a1ca43139819e82d33b9cbf89af1b1d7


 References:

 CVE
   [CAN-2004-0970]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0970


===========================================================
* iptables -> The iptables module is not loaded by default
===========================================================

 More information:
    The iptables module is part of a framework within the Linux kernel enabling
    packet filtering and network addresss and port translation.
    
    The iptables module allows you to set up firewalls, IP masquerading, etc.

    Under certain conditions, at system startup, the iptables module does
    not properly load other required kernel modules.

 Impact:
    This vulnerability may cause some firewall rules to not be enabled.

 Affected Products:
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F..., 
  Turbolinux Home]
 # turbopkg
 or
 # zabom -u iptables iptables-ipv6

 [other]
 # turbopkg
 or
 # zabom update iptables iptables-ipv6
 ---------------------------------------------


 <Turbolinux 10 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/iptables-1.2.11-3.src.rpm
       171392 f8d209c404a0c80a1cb39769b0dd0752

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/iptables-1.2.11-3.i586.rpm
       128949 18665c1391bcacc008b42f878ba8bf66
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/iptables-ipv6-1.2.11-3.i586.rpm
        86570 31a0bee5bdf37f815415cb4497ffccc2

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/iptables-1.2.5-6.src.rpm
       249503 db14fb59045bf441b3b29ce441ecafb4

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/iptables-1.2.5-6.i586.rpm
       112221 cde32d0ebb914aa24b5b701138944166
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
        43308 769ab23520744ecec5c18eb46a18713f

 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/iptables-1.2.5-6.src.rpm
       249503 2793cddd92d0a4d46fa16044a3b1bbd5

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/iptables-1.2.5-6.i586.rpm
       112368 97b59758bad5e851add2eb910e5f1509
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
        43544 29cbe3100477c7794167ac5159a92ee1

 <Turbolinux 8 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/iptables-1.2.5-6.src.rpm
       249503 662423ea544c38fbb0b1673ce4f26191

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/iptables-1.2.5-6.i586.rpm
       112279 3f0ed78324c4bfd83f57058485d55f54
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
        43528 87ddac3e83341e365a23df157f149805

 <Turbolinux 7 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/iptables-1.2.5-6.src.rpm
       249503 90eea0042084c29924d3fe3a699bf4be

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/iptables-1.2.5-6.i586.rpm
       108811 2c12ce067ffbad17752497d1995bbd0b
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
        42332 732477a482bf315c41a88a7b03554b56

 <Turbolinux 7 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/iptables-1.2.5-6.src.rpm
       249503 672e50ae6dd331223ad640dd621e76a8

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/iptables-1.2.5-6.i586.rpm
       108845 3e9364b62881492e087d932a355a05dd
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/iptables-ipv6-1.2.5-6.i586.rpm
        42300 3a9eac9ded16f9076d70cbec2b149880


 References:

 CVE
   [CAN-2004-0986]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0986


===========================================================
* libxml -> Buffer overflow vulnerabilites exist in libxml
===========================================================

 More information:
    The libxml library provides procedures for XML file manipulation.

    Multiple buffer overflow vulnerabilities have been discovered in libxml.

 Impact:
    These vulnerabilities may allow remote attackers to execute arbitrary
    code via malformed XML files.

 Affected Products:
    - Turbolinux Appliance Server 1.0 Hosting Edition
    - Turbolinux Appliance Server 1.0 Workgroup Edition
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F..., 
  Turbolinux Home]
 # turbopkg
 or
 # zabom -u libxml libxml-devel

 [other]
 # turbopkg
 or
 # zabom update libxml libxml-devel
 ---------------------------------------------


 <Turbolinux Appliance Server 1.0 Hosting Edition>

   Source Packages
   Size : MD5

   libxml-1.8.17-3.src.rpm
      1002313 a221f0ae0340d529e37e77277cbc724b

   Binary Packages
   Size : MD5

   libxml-1.8.17-3.i586.rpm
       197379 ff1877cc078406b8542e27363ff47bb4
   libxml-devel-1.8.17-3.i586.rpm
       267417 6140caa6998d3b6dab87e9da1600f394

 <Turbolinux Appliance Server 1.0 Workgroup Edition>

   Source Packages
   Size : MD5

   libxml-1.8.17-3.src.rpm
      1002313 efc0c920f2a1d03ba8290986af100c09

   Binary Packages
   Size : MD5

   libxml-1.8.17-3.i586.rpm
       197463 b94753d90641384139abc612ce92a603
   libxml-devel-1.8.17-3.i586.rpm
       267603 b925e86432763f2266455e6bbabc01c0

 <Turbolinux 10 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/libxml-1.8.17-3.src.rpm
      1002313 d8873df37efe921a792fcb62919720e9

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml-1.8.17-3.i586.rpm
       208266 c8bdee5a3eb42c5a53d10f572df68903
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
       285035 7c78bfdda81835baf911362ebab11e36

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/libxml-1.8.17-3.src.rpm
      1002313 95b1482d1e41c6e7ec8a23feb1f856c3

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml-1.8.17-3.i586.rpm
       208150 317a18fc61a84af641518856a976cc93
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
       285207 f3b283f1bb5ab4d2e0df616791b41568

 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/libxml-1.8.17-3.src.rpm
      1002313 b597b8284d425ed90f16e3b501c6e0f6

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml-1.8.17-3.i586.rpm
       197536 42bdd8f06b235dff2ed179975966717e
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
       267740 b7c7bfa7870db1d07ab297a2fb489d9b

 <Turbolinux 8 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/libxml-1.8.17-3.src.rpm
      1002313 eda8c4d80ce75656cd4bb9872b144693

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml-1.8.17-3.i586.rpm
       197510 4ecd20f98c08f1e57c83ad4afb91c5b6
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml-devel-1.8.17-3.i586.rpm
       267558 39820f6abe5ae9b97550c97df3dd1a1e

 <Turbolinux 7 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/libxml-1.8.14-2.src.rpm
       966346 53b518434c062a8c9fb669e03c11a7ec

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml-1.8.14-2.i586.rpm
       189070 fbac2b8ab90a15a0bffcc99b0e93db23
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml-devel-1.8.14-2.i586.rpm
       254630 a9ac85fee62e78fdbc42ea439c68445a

 <Turbolinux 7 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/libxml-1.8.14-2.src.rpm
       966346 020e595b4f37e36fcd8163c702108309

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml-1.8.14-2.i586.rpm
       189024 65e1c7e7d7970ac3a2c5bcb758bb5e62
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml-devel-1.8.14-2.i586.rpm
       254787 b4c33a50660d1031a1056ce691998394


 References:

 CVE
   [CAN-2004-0989]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989


===========================================================
* libxml2 -> Buffer overflow vulnerabilites exist in libxml2
===========================================================

 More information:
    The libxml2 library provides procedures for XML file manipulation.

    Multiple buffer overflow vulnerabilities have been discovered in libxml2.

 Impact:
    These vulnerabilities may allow remote attackers to execute arbitrary
    code via malformed XML files.

 Affected Products:
    - Turbolinux Appliance Server 1.0 Hosting Edition
    - Turbolinux Appliance Server 1.0 Workgroup Edition
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F..., 
  Turbolinux Home]
 # turbopkg
 or
 # zabom -u libxml2 libxml2-devel

 [other]
 # turbopkg
 or
 # zabom update libxml2 libxml2-devel
 ---------------------------------------------


 <Turbolinux Appliance Server 1.0 Hosting Edition>

   Source Packages
   Size: MD5

   libxml2-2.4.22-3.src.rpm
      1546095 45e4878e24d9c3ea37a74e606b98b36b

   Binary Packages
   Size: MD5

   libxml2-2.4.22-3.i586.rpm
       348726 3536b4e41bfcbe790bddb71dcbe82454
   libxml2-devel-2.4.22-3.i586.rpm
       672112 35415f29d7bb3bb37bdc64551f2bb39b
   libxml2-python-2.4.22-3.i586.rpm
       119866 92be4a854e5eae388387f5b6992bf1a3

 <Turbolinux Appliance Server 1.0 Workgroup Edition>

   Source Packages
   Size: MD5

   libxml2-2.4.22-3.src.rpm
      1546095 c3c1b644325030da4be5f88773c5e62b

   Binary Packages
   Size: MD5

   libxml2-2.4.22-3.i586.rpm
       348918 6a37a0890286bd39c8cbdcea39e80bb1
   libxml2-devel-2.4.22-3.i586.rpm
       673104 08c514e9ff536f3abddfbd37b47640f0
   libxml2-python-2.4.22-3.i586.rpm
       120058 e26e9e2fc43a91c3945440458d9ef2db

 <Turbolinux 10 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/libxml2-2.6.11-3.src.rpm
      3676235 c83ca34b6b043df8bdbf71074a01d8ad

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-2.6.11-3.i586.rpm
       931885 e0c079d1fced4b79406d8137f7ae51cb
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-debug-2.6.11-3.i586.rpm
      1261976 e56ed4aafbc708d5b82cbd7420dc3688
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-devel-2.6.11-3.i586.rpm
      1833564 c4fa232aa88a3a9ad8e6599674eb5215
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/libxml2-python-2.6.11-3.i586.rpm
       219714 975a999a695a80addc291c9a086f6c70

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/libxml2-2.6.2-3.src.rpm
      2494574 5074efa52a7b7fbb048d32195e939072

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml2-2.6.2-3.i586.rpm
       513161 3fdaa041b1f0b43edf73478314ef17da
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/libxml2-devel-2.6.2-3.i586.rpm
      1068458 2d3f0d198946eeccf3a43c4ca56ed87c

 <Turbolinux 8 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/libxml2-2.4.22-3.src.rpm
      1546095 8c4bd8f791a125332e4a88095c33799c

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml2-2.4.22-3.i586.rpm
       348792 e6562126f8981e907a75ef3a2da69873
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml2-devel-2.4.22-3.i586.rpm
       672844 987ab841df3e43eca6c4512a0507e8df
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/libxml2-python-2.4.22-3.i586.rpm
       119991 50216a9da56ed1f136ac8954152d6599

 <Turbolinux 8 Workstation>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/libxml2-2.4.19-3.src.rpm
      1935708 338be398b6817e3dad7a6cb96847c930

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml2-2.4.19-3.i586.rpm
       343441 8be8c1ada3f99ea2098874d66840ec3a
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml2-devel-2.4.19-3.i586.rpm
       648314 32d33253943c3a1f40ba9c90df74c2e2
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/libxml2-python-2.4.19-3.i586.rpm
       118291 7627209852457adfad6f41e7ef715655

 <Turbolinux 7 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/libxml2-2.4.28-3.src.rpm
      2499363 16ed867be21e9d3cdfb329939e652019

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml2-2.4.28-3.i586.rpm
       388291 5f063aebeba773a4303f30bd7d70c468
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml2-devel-2.4.28-3.i586.rpm
       971341 e83302e5593a0903362078f2288ba90e
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/libxml2-python-2.4.28-3.i586.rpm
       155374 ab3939602ce9d4ec7fcbb303680c22ea

 <Turbolinux 7 Workstation>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/libxml2-2.4.28-3.src.rpm
      2499363 818aea961b5deab575384742a7012a59

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml2-2.4.28-3.i586.rpm
       388163 f37ef635700f96e2125ce4c7e0e043db
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml2-devel-2.4.28-3.i586.rpm
       971519 9214c44cf80e7ae6bd218aacbaaa8ce7
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/libxml2-python-2.4.28-3.i586.rpm
       155359 7d0e098faaf3884eec9332ba6773160f


 References:

 CVE
   [CAN-2004-0989]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989


 * You may need to update the turbopkg tool before applying the update.
Please refer to the following URL for detailed information.

  http://www.turbolinux.com/download/zabom.html
  http://www.turbolinux.com/download/zabomupdate.html

Package Update Path
http://www.turbolinux.com/update/

============================================================
 * To obtain the public key

Here is the public key

 http://www.turbolinux.com/security/

 * To unsubscribe from the list

If you ever want to remove yourself from this mailing list,
  you can send a message to <server-users-e-ctl@...bolinux.co.jp> with
the word `unsubscribe' in the body (don't include the quotes).

unsubscribe

 * To change your email address

If you ever want to chage email address in this mailing list,
  you can send a message to <server-users-e-ctl@...bolinux.co.jp> with
the following command in the message body:

  chaddr 'old address' 'new address'

If you have any questions or problems, please contact
<supp_info@...bolinux.co.jp>

Thank you!

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFB9zQYK0LzjOqIJMwRAr5BAJ9JOt4iq0/Mbpx0sXQKrF6tLA6yrgCfU3uP
epQkEOA/b94qKfvU9DQ8KRg=
=SJsL
-----END PGP SIGNATURE-----





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ