Yellow Dog Linux Security Announcement -------------------------------------- Package: xloadimage Issue Date: July 25, 2001 Priority: medium Advisory ID: YDU-20010725-11 1. Topic: The xloadimage package contains a possible overflow when called by a Netscape plugin. 2. Problem: "A buffer overflow existed in the faces reader for xloadimage. By making a specially constructed invalid faces file, and then having the server serve this file as a .tif file, arbitrary code could be executed on the client computer running Netscape." (from Red Hat's security advisory) 3. Solution: a) Updating via yup... We suggest that you use the Yellow Dog Update Program (yup) to keep your system up-to-date. The following command(s) will automatically retrieve and install the fixed version of this update onto your system: yup update xloadimage b) Updating manually... The update can also be retrieved manually from our ftp site below along with the rpm command that should be used to install the update. (Please use a mirror site) ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.0/ppc/RPMS/ rpm -Fvh xloadimage-4.1-20.ppc.rpm 4. Verification MD5 checksum Package -------------------------------- ---------------------------- c5c18c3cfb56a933ba4b4edfa5af3470 SRPMS/xloadimage-4.1-20.src.rpm 72a295a6e7e2621b094d29beae88bedf ppc/RPMS/xloadimage-4.1-20.ppc.rpm If you wish to verify that each package has not been corrupted or tampered with, examine the md5sum with the following command: rpm --checksig --nogpg filename 5. Misc. Terra Soft has setup a moderated mailing list where these security, bugfix, and package enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more information. For information regarding the usage of yup, the Yellow Dog Update Program, see http://http://www.yellowdoglinux.com/support/solutions/ydl_general/yup.shtml