______________________________________________________________________________

                        SuSE Security Announcement

        Package:                nedit
        Announcement-ID:        SuSE-SA:2001:14
        Date:                   Wednesday, April 18th, 2001 13.06 MEST
        Affected SuSE versions: [6.1, 6.2] 6.3, 6.4, 7.0, 7.1
        Vulnerability Type:     locoal privilege escalation
        Severity (1-10):        3
        SuSE default package:   no
        Other affected systems: all systems using nedit

        Content of this advisory:
        1) security vulnerability resolved: nedit
           problem description, discussion, solution and upgrade information
        2) pending vulnerabilities, solutions, workarounds
        3) standard appendix (further information)

______________________________________________________________________________

1)  problem description, brief discussion, solution, upgrade information

    The Nirvana Editor, NEdit, is a GUI-style text editor based on popular
    Macintosh and MS Windows editors.
    When printing a whole text or selected parts of a text, nedit(1) creates
    a temporary file in an insecure manner. This behavior could be exploited
    to gain access to other users privileges, even root.

    There is no workaround possible, because tmpnam(3) ignores the TMPDIR
    environment variable. Just install the new RPM to fix this problem.

    Download the update package from locations described below and install
    the package with the command `rpm -Uhv file.rpm'. The md5sum for each
    file is in the line below. You can verify the integrity of the rpm
    files using the command
        `rpm --checksig --nogpg file.rpm',
    independently from the md5 signatures below.



    i386 Intel Platform:

    SuSE-7.1
      
      07efdf2fa5c475fcf40633d392d4ae1d
    source rpm:
      
      27e52c3688082257d7f7ecf81c461ad9

    SuSE-7.0
      
      b9846658b0f9c8330b8f9c5732b9e115
    source rpm:
      
      d2dc1c39dbad292326f953e1e84fe187

    SuSE-6.4
      
      c5c6eebe946463926583272690ca4d27
    source rpm:
      
      0a486fa81f4b84ab6f09bd5353b0fd4d

    SuSE-6.3
      
      e1e0baeca49ce972df89a5bb5ebfc6c2
    source rpm:
      
      9a3328dc8fb8a4da343be20c10cb0c02



    Sparc Platform:

    SuSE-7.1
      
      2370e09571b1037270d34afb555cc408
    source rpm:
      
      0ac1364f6b97d503444e6fcb4a0b20df

    SuSE-7.0
      
      a60e8f47d4ac4794f7ee472ef1d7ccb4
    source rpm:
      
      96c96dda6b1ba8b91bebbf3f1a9a56c6



    AXP Alpha Platform:

    SuSE-6.4
      
      cde274f25bec040ae289ef0fb8520b7e
    source rpm:
      
      4cdff5d4836bf4f926298bb3b3a1c513

    SuSE-6.3
      
      fc7fc98267dc76ceec30633068d72533
    source rpm:
      
      fc3ddc09f7c3383b01721e6462f77748



    PPC PowerPC Platform:

    SuSE-7.1
      
      1f413b9e77263ec37d0e42dde6cb55d1
    source rpm:
      
      403bcf64a6ba2824899316e3bd8ea41d

    SuSE-7.0
      
      e771c3bcd7cbc0121a527089ad40a336
    source rpm:
      
      f45e0786fefb5c92fbd61e8c4a36ab32

    SuSE-6.4
      
      7dcb7bf1110311063daac06df1f7cccb
    source rpm:
      
      5f1d6da7f268b8c10f7ea8a4f7a1fab5


______________________________________________________________________________

2)  Pending vulnerabilities in SuSE Distributions and Workarounds:

    - New RPMs for HylaFax, a Fax Server, are currently being build, which
      fix a format bug in hfaxd, which could lead to local root privilege.

    - Updated man RPMs will be available in a few days.

    - In the past weeks, some security related bugs in the Linux kernel 2.2
      and 2.4 were found. An announcement, that addresses this will be
      released this week.

    - Samba has serveral security problems, which could lead to local root
      access. Samba 2.0.8 fixes these problems. New RPMs are currently being
      build.

______________________________________________________________________________

3)  standard appendix:

    SuSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   general/linux/SuSE security discussion.
            All SuSE security announcements are sent to this list.
            To subscribe, send an email to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SuSE's announce-only mailing list.
            Only SuSE's security annoucements are sent to this list.
            To subscribe, send an email to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (faq)
    send mail to:
        <suse-security-info@suse.com> or
        <suse-security-faq@suse.com> respectively.

    ==============================================    SuSE's security contact is <security@suse.com>.
    ==============================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way.
    SuSE GmbH makes no warranties of any kind whatsoever with respect
    to the information contained in this security advisory.


SuSE: 'nedit' vulnerability

April 19, 2001
When printing a whole text or selected parts of a text, nedit(1) creates a temporary file in an insecure manner

Summary


______________________________________________________________________________

                        SuSE Security Announcement

        Package:                nedit
        Announcement-ID:        SuSE-SA:2001:14
        Date:                   Wednesday, April 18th, 2001 13.06 MEST
        Affected SuSE versions: [6.1, 6.2] 6.3, 6.4, 7.0, 7.1
        Vulnerability Type:     locoal privilege escalation
        Severity (1-10):        3
        SuSE default package:   no
        Other affected systems: all systems using nedit

        Content of this advisory:
        1) security vulnerability resolved: nedit
           problem description, discussion, solution and upgrade information
        2) pending vulnerabilities, solutions, workarounds
        3) standard appendix (further information)

______________________________________________________________________________

1)  problem description, brief discussion, solution, upgrade information

    The Nirvana Editor, NEdit, is a GUI-style text editor based on popular
    Macintosh and MS Windows editors.
    When printing a whole text or selected parts of a text, nedit(1) creates
    a temporary file in an insecure manner. This behavior could be exploited
    to gain access to other users privileges, even root.

    There is no workaround possible, because tmpnam(3) ignores the TMPDIR
    environment variable. Just install the new RPM to fix this problem.

    Download the update package from locations described below and install
    the package with the command `rpm -Uhv file.rpm'. The md5sum for each
    file is in the line below. You can verify the integrity of the rpm
    files using the command
        `rpm --checksig --nogpg file.rpm',
    independently from the md5 signatures below.



    i386 Intel Platform:

    SuSE-7.1
      
      07efdf2fa5c475fcf40633d392d4ae1d
    source rpm:
      
      27e52c3688082257d7f7ecf81c461ad9

    SuSE-7.0
      
      b9846658b0f9c8330b8f9c5732b9e115
    source rpm:
      
      d2dc1c39dbad292326f953e1e84fe187

    SuSE-6.4
      
      c5c6eebe946463926583272690ca4d27
    source rpm:
      
      0a486fa81f4b84ab6f09bd5353b0fd4d

    SuSE-6.3
      
      e1e0baeca49ce972df89a5bb5ebfc6c2
    source rpm:
      
      9a3328dc8fb8a4da343be20c10cb0c02



    Sparc Platform:

    SuSE-7.1
      
      2370e09571b1037270d34afb555cc408
    source rpm:
      
      0ac1364f6b97d503444e6fcb4a0b20df

    SuSE-7.0
      
      a60e8f47d4ac4794f7ee472ef1d7ccb4
    source rpm:
      
      96c96dda6b1ba8b91bebbf3f1a9a56c6



    AXP Alpha Platform:

    SuSE-6.4
      
      cde274f25bec040ae289ef0fb8520b7e
    source rpm:
      
      4cdff5d4836bf4f926298bb3b3a1c513

    SuSE-6.3
      
      fc7fc98267dc76ceec30633068d72533
    source rpm:
      
      fc3ddc09f7c3383b01721e6462f77748



    PPC PowerPC Platform:

    SuSE-7.1
      
      1f413b9e77263ec37d0e42dde6cb55d1
    source rpm:
      
      403bcf64a6ba2824899316e3bd8ea41d

    SuSE-7.0
      
      e771c3bcd7cbc0121a527089ad40a336
    source rpm:
      
      f45e0786fefb5c92fbd61e8c4a36ab32

    SuSE-6.4
      
      7dcb7bf1110311063daac06df1f7cccb
    source rpm:
      
      5f1d6da7f268b8c10f7ea8a4f7a1fab5


______________________________________________________________________________

2)  Pending vulnerabilities in SuSE Distributions and Workarounds:

    - New RPMs for HylaFax, a Fax Server, are currently being build, which
      fix a format bug in hfaxd, which could lead to local root privilege.

    - Updated man RPMs will be available in a few days.

    - In the past weeks, some security related bugs in the Linux kernel 2.2
      and 2.4 were found. An announcement, that addresses this will be
      released this week.

    - Samba has serveral security problems, which could lead to local root
      access. Samba 2.0.8 fixes these problems. New RPMs are currently being
      build.

______________________________________________________________________________

3)  standard appendix:

    SuSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   general/linux/SuSE security discussion.
            All SuSE security announcements are sent to this list.
            To subscribe, send an email to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SuSE's announce-only mailing list.
            Only SuSE's security annoucements are sent to this list.
            To subscribe, send an email to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (faq)
    send mail to:
        <suse-security-info@suse.com> or
        <suse-security-faq@suse.com> respectively.

    ==============================================    SuSE's security contact is <security@suse.com>.
    ==============================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way.
    SuSE GmbH makes no warranties of any kind whatsoever with respect
    to the information contained in this security advisory.


References

Severity

Related News