Red Hat Security Advisory

Synopsis:          Updated semi packages fix flim vulnerability
Advisory ID:       RHSA-2004:344-01
Issue date:        2004-08-18
Updated on:        2004-08-18
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0422
- ---------------------------------------------------------------------

1. Summary:

Updated semi packages that fix vulnerabilities in flim temporary file
handling are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - noarch
Red Hat Linux Advanced Workstation 2.1 - noarch
Red Hat Enterprise Linux ES version 2.1 - noarch
Red Hat Enterprise Linux WS version 2.1 - noarch

3. Problem description:

The semi package includes a MIME library for GNU Emacs and XEmacs used by
the wl mail package.

Tatsuya Kinoshita discovered a vulnerability in flim, an emacs library
for working with Internet messages included in the semi package. Temporary
files were being created without taking adequate precautions, and therefore
a local user could potentially overwrite files with the privileges of the
user running emacs.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0422 to this issue.

Users of semi are advised to upgrade to these packages, which contain
a backported patch fixing this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/


5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

124396 - CAN-2004-0422 flim temporary file vulnerability affects semi packages

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 

dfcfc66f790902402b72eedd3a806284  semi-1.14.3-8.72.EL.1.src.rpm

noarch:
23c1b96f8d9fc3d3aefa21812adbd5a1  semi-1.14.3-8.72.EL.1.noarch.rpm
2e5dc06d5aadf594ae7222706e230e0e  semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 

dfcfc66f790902402b72eedd3a806284  semi-1.14.3-8.72.EL.1.src.rpm

noarch:
23c1b96f8d9fc3d3aefa21812adbd5a1  semi-1.14.3-8.72.EL.1.noarch.rpm
2e5dc06d5aadf594ae7222706e230e0e  semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 

dfcfc66f790902402b72eedd3a806284  semi-1.14.3-8.72.EL.1.src.rpm

noarch:
23c1b96f8d9fc3d3aefa21812adbd5a1  semi-1.14.3-8.72.EL.1.noarch.rpm
2e5dc06d5aadf594ae7222706e230e0e  semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 

dfcfc66f790902402b72eedd3a806284  semi-1.14.3-8.72.EL.1.src.rpm

noarch:
23c1b96f8d9fc3d3aefa21812adbd5a1  semi-1.14.3-8.72.EL.1.noarch.rpm
2e5dc06d5aadf594ae7222706e230e0e  semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
 

7. References:
 
Debian -- Security Information -- DSA-500-1 flim  
CVE -CVE-2004-0422

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: semi Insecure temporary file vulnerability

Temporary files were being created without taking adequate precautions, and therefore a local user could potentially overwrite files with the privileges of the user running emacs.

Summary



Summary

The semi package includes a MIME library for GNU Emacs and XEmacs used bythe wl mail package.Tatsuya Kinoshita discovered a vulnerability in flim, an emacs libraryfor working with Internet messages included in the semi package. Temporaryfiles were being created without taking adequate precautions, and thereforea local user could potentially overwrite files with the privileges of theuser running emacs. The Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2004-0422 to this issue.Users of semi are advised to upgrade to these packages, which containa backported patch fixing this issue.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
124396 - CAN-2004-0422 flim temporary file vulnerability affects semi packages
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
dfcfc66f790902402b72eedd3a806284 semi-1.14.3-8.72.EL.1.src.rpm
noarch: 23c1b96f8d9fc3d3aefa21812adbd5a1 semi-1.14.3-8.72.EL.1.noarch.rpm 2e5dc06d5aadf594ae7222706e230e0e semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
dfcfc66f790902402b72eedd3a806284 semi-1.14.3-8.72.EL.1.src.rpm
noarch: 23c1b96f8d9fc3d3aefa21812adbd5a1 semi-1.14.3-8.72.EL.1.noarch.rpm 2e5dc06d5aadf594ae7222706e230e0e semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
dfcfc66f790902402b72eedd3a806284 semi-1.14.3-8.72.EL.1.src.rpm
noarch: 23c1b96f8d9fc3d3aefa21812adbd5a1 semi-1.14.3-8.72.EL.1.noarch.rpm 2e5dc06d5aadf594ae7222706e230e0e semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
dfcfc66f790902402b72eedd3a806284 semi-1.14.3-8.72.EL.1.src.rpm
noarch: 23c1b96f8d9fc3d3aefa21812adbd5a1 semi-1.14.3-8.72.EL.1.noarch.rpm 2e5dc06d5aadf594ae7222706e230e0e semi-xemacs-1.14.3-8.72.EL.1.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from

Package List


Severity
Advisory ID: RHSA-2004:344-01
Issued Date: : 2004-08-18
Updated on: 2004-08-18
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-0422

Topic

Updated semi packages that fix vulnerabilities in flim temporary filehandling are now available.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - noarch

Red Hat Linux Advanced Workstation 2.1 - noarch

Red Hat Enterprise Linux ES version 2.1 - noarch

Red Hat Enterprise Linux WS version 2.1 - noarch


Bugs Fixed


Related News