Login
Newsletter
Werbung

Sicherheit: Fehlerhafter Permission-Check in Cyrus
Aktuelle Meldungen Distributionen
Name: Fehlerhafter Permission-Check in Cyrus
ID: RHSA-2000:094-01
Distribution: Red Hat
Plattformen: Red Hat Linux
Datum: Do, 26. Oktober 2000, 13:00
Referenzen: Keine Angabe
Applikationen: Cyrus SASL

Originalnachricht

---------------------------------------------------------------------
Red Hat, Inc. Security Advisory

Synopsis: Updated cyrus-sasl packages available for Red Hat Linux 7
Advisory ID: RHSA-2000:094-01
Issue date: 2000-10-26
Updated on: 2000-10-26
Product: Red Hat Linux
Keywords: cyrus-sasl authorization
Cross references: N/A
---------------------------------------------------------------------

1. Topic:

Updated cyrus-sasl packages are now available for Red Hat Linux 7.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - i386

3. Problem description:

An error existed in the authorization checks in the version of cyrus-sasl
shipped with Red Hat Linux 7. Due to this bug, users who had been
successfully authenticated could be allowed access to resources even if the
system had been configured to deny these users access.

Versions of cyrus-sasl included in previous releases of Red Hat Power Tools
did not implement this function and are not affected by this bug.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

18968 - cyrus-sasl-1.5.24 is not the "real" 1.5.24


6. RPMs required:

Red Hat Linux 7.0:

i386:
ftp://updates.redhat.com/7.0/i386/cyrus-sasl-1.5.24-11.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/cyrus-sasl-1.5.24-11.src.rpm

7. Verification:

MD5 sum Package Name
--------------------------------------------------------------------------
6a969df3702bb670ae65cf0824146472 7.0/SRPMS/cyrus-sasl-1.5.24-11.src.rpm
59aaec92c60ddaed257bd581d976055b 7.0/i386/cyrus-sasl-1.5.24-11.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

N/A


Copyright(c) 2000 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung