LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 25th, 2014
Linux Advisory Watch: July 18th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Redhat: 'joe' update Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7.

---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory

Synopsis:          Updated joe packages are available for Red Hat Linux 5.2,
6.x and 7
Advisory ID:       RHSA-2000:110-06
Issue date:        2000-11-17
Updated on:        2000-11-20
Product:           Red Hat Linux
Keywords:          joe DEADJOE symlink vulnerability
Cross references:  N/A
---------------------------------------------------------------------

1. Topic:

Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7.

2. Relevant releases/architectures:

Red Hat Linux 5.2 - i386, alpha, sparc
Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 6.2EE - i386
Red Hat Linux 7.0 - i386

3. Problem description:

When exiting joe in a nonstandard way (such as a system crash, closing an
xterm, or a network connection going down), joe will unconditionally append
its open  buffers to the file "DEADJOE". This could be exploited by the
creation of DEADJOE symlinks in directories where root would normally use
joe.  In this way, joe could be used to append garbage to
potentially-sensitive files, resulting in a denial of service.

Users of Red Hat Linux 6.x and 5.2 should also note that joe's
configuration files have been moved from /usr/lib/joe to /etc/joe

4. Solution:

For each RPM for your particular architecture, run:
rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed  (http://bugzilla.Red Hat.com/bugzilla for more info):

N/A

6. RPMs required:

Red Hat Linux 5.2:

alpha: 
ftp://updates.Red Hat.com/5.2/alpha/joe-2.8-42.52.alpha.rpm

sparc: 
ftp://updates.Red Hat.com/5.2/sparc/joe-2.8-42.52.sparc.rpm

i386: 
ftp://updates.Red Hat.com/5.2/i386/joe-2.8-42.52.i386.rpm

sources: 
ftp://updates.Red Hat.com/5.2/SRPMS/joe-2.8-42.52.src.rpm

Red Hat Linux 6.0:

sparc: 
ftp://updates.Red Hat.com/6.0/sparc/joe-2.8-42.62.sparc.rpm

i386: 
ftp://updates.Red Hat.com/6.0/i386/joe-2.8-42.62.i386.rpm

alpha: 
ftp://updates.Red Hat.com/6.0/alpha/joe-2.8-42.62.alpha.rpm

sources: 
ftp://updates.Red Hat.com/6.0/SRPMS/joe-2.8-42.62.src.rpm

Red Hat Linux 6.1:

alpha: 
ftp://updates.Red Hat.com/6.1/alpha/joe-2.8-42.62.alpha.rpm

sparc: 
ftp://updates.Red Hat.com/6.1/sparc/joe-2.8-42.62.sparc.rpm

i386: 
ftp://updates.Red Hat.com/6.1/i386/joe-2.8-42.62.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.1/SRPMS/joe-2.8-42.62.src.rpm

Red Hat Linux 6.2:

alpha: 
ftp://updates.Red Hat.com/6.2/alpha/joe-2.8-42.62.alpha.rpm

sparc: 
ftp://updates.Red Hat.com/6.2/sparc/joe-2.8-42.62.sparc.rpm

i386: 
ftp://updates.Red Hat.com/6.2/i386/joe-2.8-42.62.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.2/SRPMS/joe-2.8-42.62.src.rpm

Red Hat Linux 7.0:

i386: 
ftp://updates.Red Hat.com/7.0/i386/joe-2.8-43.i386.rpm

sources: 
ftp://updates.Red Hat.com/7.0/SRPMS/joe-2.8-43.src.rpm

7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
7b78c81b253833ae849d162457d318dd  5.2/SRPMS/joe-2.8-42.52.src.rpm
0959bddd216c47426e5c335e6dbaa922  5.2/alpha/joe-2.8-42.52.alpha.rpm
d5dc1a23953544964c04ad1eaa9c1a26  5.2/i386/joe-2.8-42.52.i386.rpm
d5ce7e5469be6ff16373d4610c2b8fb3  5.2/sparc/joe-2.8-42.52.sparc.rpm
6eb2d2741296250f71667d5a1c1467fc  6.0/SRPMS/joe-2.8-42.62.src.rpm
c53a34db6539d412adc86493e17e9725  6.0/alpha/joe-2.8-42.62.alpha.rpm
d6afd50052ee0f5354a7398849d6c5b5  6.0/i386/joe-2.8-42.62.i386.rpm
0b1e58283c4f4d4c41c55948b0117f80  6.0/sparc/joe-2.8-42.62.sparc.rpm
6eb2d2741296250f71667d5a1c1467fc  6.1/SRPMS/joe-2.8-42.62.src.rpm
c53a34db6539d412adc86493e17e9725  6.1/alpha/joe-2.8-42.62.alpha.rpm
d6afd50052ee0f5354a7398849d6c5b5  6.1/i386/joe-2.8-42.62.i386.rpm
0b1e58283c4f4d4c41c55948b0117f80  6.1/sparc/joe-2.8-42.62.sparc.rpm
6eb2d2741296250f71667d5a1c1467fc  6.2/SRPMS/joe-2.8-42.62.src.rpm
c53a34db6539d412adc86493e17e9725  6.2/alpha/joe-2.8-42.62.alpha.rpm
d6afd50052ee0f5354a7398849d6c5b5  6.2/i386/joe-2.8-42.62.i386.rpm
0b1e58283c4f4d4c41c55948b0117f80  6.2/sparc/joe-2.8-42.62.sparc.rpm
67e2ddb6f4c903672782467684fbb7d3  7.0/SRPMS/joe-2.8-43.src.rpm
1578b0e184b76b23d2a30b101f1665d4  7.0/i386/joe-2.8-43.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
     http://www.Red Hat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:

N/A


Copyright(c) 2000 Red Hat, Inc.


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How Hackers Hid a Money-Mining Botnet in Amazonís Cloud
Homeland Security gets into software security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.