The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[linux-security] [RHSA-1999:042-01] screen defaults to not using Unix98 ptys


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 20 Oct 1999 23:49:28 -0400
From: Bill Nottingham <[email protected]>
To: [email protected]
Subject: [linux-security] [RHSA-1999:042-01] screen defaults to not using Unix98 ptys
Cc: [email protected], [email protected]

---------------------------------------------------------------------
		   Red Hat, Inc. Security Advisory

Synopsis:		screen defaults to not using Unix98 ptys
Advisory ID:		RHSA-1999:042-01
Issue date:		1999-10-20
Updated on:		
Ключевые слова:  (найти похожие документы)
Cross references: screen unix98 pty permissions --------------------------------------------------------------------- 1. Topic: Screen uses ptys with world read/write permissions. 2. Problem description: The version of screen that shipped with Red Hat Linux 6.1 defaulted to not using Unix98 ptys. Since screen is not setuid root, this means that it leaves the ptys with insecure permissions. The updated packages restore the Unix98 pty support. Thanks go to Chris Evans for noting this vulnerability. Previous versions of Red Hat Linux are not affected by this problem. 3. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info): 6100 4. Relevant releases/architectures: Red Hat Linux 6.1, Intel 5. Obsoleted by: 6. Conflicts with: 7. RPMs required: Red Hat Linux 6.1: Intel: ftp://ftp.redhat.com/pub/redhat/updates/6.1/i386/screen-3.9.4-3.i386.rpm Source package: ftp://ftp.redhat.com/pub/redhat/updates/6.1/SRPMS/screen-3.9.4-3.src.rpm 8. Solution: For each RPM for your particular architecture, run: rpm -Uvh 'filename' where filename is the name of the RPM. 9. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 2e5ada61d3d06408bae76bf581d2bf69 screen-3.9.4-3.i386.rpm 09277e5b10b709ac2d974b952cb29e9b screen-3.9.4-3.src.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig 'filename' If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg 'filename' 10. References: -- ---------------------------------------------------------------------- Please refer to the information about this list as well as general information about Linux security at http://www.aoy.com/Linux/Security. ---------------------------------------------------------------------- To unsubscribe: mail -s unsubscribe [email protected] < /dev/null

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру