The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[FLSA-2005:152787] Updated redhat-config-nfs package fixes security


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Sun, 18 Dec 2005 00:12:59 -0500
From: Marc Deslauriers <marcdeslauriers@videotron.ca.>
Subject: [FLSA-2005:152787] Updated redhat-config-nfs package fixes security
 issue
To: [email protected], [email protected]
Message-id: <43A4EFDB.8090507@videotron.ca.>
MIME-version: 1.0
Content-type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary=------------enig75A1C2777E22FB893EFDDB52
X-Accept-Language: en-us, en
X-Enigmail-Version: 0.92.0.0
User-Agent: Mozilla Thunderbird 1.0.7-1.1.fc4 (X11/20050929)
X-Virus-Scanned: antivirus-gw at tyumen.ru

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig75A1C2777E22FB893EFDDB52
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

---------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated redhat-config-nfs package fixes security
                   issue
Advisory ID:       FLSA:152787
Issue date:        2005-12-17
Ключевые слова: , , , , , , , , , Bugfix,  (найти похожие документы)
Product: Red Hat Linux, Fedora Core CVE Names: CVE-2004-0750 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: An updated redhat-config-nfs package that fixes a security issue is now available. redhat-config-nfs is a graphical user interface for creating, modifying, and deleting nfs shares. 2. Relevant releases/architectures: Red Hat Linux 9 - i386 Fedora Core 1 - i386 Fedora Core 2 - i386 3. Problem description: John Buswell discovered a flaw in redhat-config-nfs that could lead to incorrect permissions on exported shares when exporting to multiple hosts. This could cause an option such as "all_squash" to not be applied to all of the listed hosts. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0750 to this issue. Additionally, a bug was found that prevented redhat-config-nfs from being run if hosts didn't have options set in /etc/exports. All users of redhat-config-nfs should upgrade to this updated package, which includes a patch to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152787 6. RPMs required: Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/redhat-config-nfs-1.0.13-6.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/redhat-config-nfs-1.0.13-6.legacy.noarch.rpm Fedora Core 1: SRPM: http://download.fedoralegacy.org/fedora/1/updates/SRPMS/redhat-config-nfs-1.1.3-3.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/1/updates/i386/redhat-config-nfs-1.1.3-3.legacy.noarch.rpm Fedora Core 2: SRPM: http://download.fedoralegacy.org/fedora/2/updates/SRPMS/system-config-nfs-1.2.3-5.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/2/updates/i386/system-config-nfs-1.2.3-5.legacy.noarch.rpm 7. Verification: SHA1 sum Package Name --------------------------------------------------------------------- 6d0c5c269b0702a5f7ef352e1c01390dfcedf66e redhat/9/updates/i386/redhat-config-nfs-1.0.13-6.legacy.noarch.rpm 7dfd3e3cd3e937144b0a79b38967749caea1f779 redhat/9/updates/SRPMS/redhat-config-nfs-1.0.13-6.legacy.src.rpm 376cd7a13d85877976d606a2a8dc57e5a9de1766 fedora/1/updates/i386/redhat-config-nfs-1.1.3-3.legacy.noarch.rpm b1828331941b0d64625dc5981990b63fb8f5ee26 fedora/1/updates/SRPMS/redhat-config-nfs-1.1.3-3.legacy.src.rpm e9694cfe870c4370ab080ef81fe2ee5d09f23a34 fedora/2/updates/i386/system-config-nfs-1.2.3-5.legacy.noarch.rpm 6e4cee9467fa66760b8e757000e771f167225377 fedora/2/updates/SRPMS/system-config-nfs-1.2.3-5.legacy.src.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0750 9. Contact: The Fedora Legacy security contact is <secnotice@fedoralegacy.org.>. More project details at http://www.fedoralegacy.org --------------------------------------------------------------------- --------------enig75A1C2777E22FB893EFDDB52 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDpO/fLMAs/0C4zNoRArm5AJwMXKQQ9im/ZnUA54TkPIcm9DJImwCgmqs6 e8Y+obHLVtCJ4pBMfL8M4Fs= =jeI/ -----END PGP SIGNATURE----- --------------enig75A1C2777E22FB893EFDDB52--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру