Login
Newsletter
Werbung

Sicherheit: Security-Audit von ucp-snmp
Aktuelle Meldungen Distributionen
Name: Security-Audit von ucp-snmp
ID: RHSA-2001:101-07
Distribution: Red Hat
Plattformen: Red Hat Linux
Datum: Sa, 3. November 2001, 12:00
Referenzen: Keine Angabe
Applikationen: Net-SNMP

Originalnachricht

---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: New ucd-snmp package to fix several security vulnerabilities
Advisory ID: RHSA-2001:101-07
Issue date: 2001-08-15
Updated on: 2001-10-31
Product: Red Hat Linux
Keywords: ucd-snmp security fix
Cross references:
Obsoletes:
---------------------------------------------------------------------

1. Topic:

Updated ucd-snmp packages are now available for Red Hat Linux 6.2, 7 and
7.1. These packages include fixes for the following problems:

- /tmp race and setgroups() privilege problem
- Various buffer overflow and format string issues
- One signedness problem in ASN handling

It is recommended that all users update to the fixed packages.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc

Red Hat Linux 7.0 - alpha, i386

Red Hat Linux 7.1 - alpha, i386, ia64

3. Problem description:

Due to the mentioned security problems a remote attacker might obtain
superuser privileges on a vulnerable host.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):



6. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm



7. Verification:

MD5 sum Package Name
--------------------------------------------------------------------------
50fbf0b59533287c6ca7f2e831097ca1 6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm
fc1f7b4b390e55623a4f112d6d22df3f 6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm
02df074653c0f12c1ff91623068e37b7
6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm
ebb4943126a26503eeb63f69272ced55
6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm
4525cae85645e8b90f3df6e7b304969b 6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm
431a301c54348c1e3db4598a48ed8a7f
6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm
199fef0186401d6aaebad5cb420f1f5a
6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm
6767ded2ab1c9be85ed6bdef3ef99bb0 6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm
88393bda9bdcb8eaff5446ef99706780
6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm
35697b8870fb665ce7bd320ec553406d
6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm
324fe7a1b365aee05ab0ea021e2fa31b 7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm
923fcf52bca69c7e0158694b5d36cff8 7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
e93308a3f78d56128699365c02cc4104
7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
bf73c635ea5ae22e8a807c9b693074b7
7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm
bf77ed26156daf3a677aa5309624b375 7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
e6928929f4eb9f0fd0e1981fa233d421
7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
0ecc7a4a846747b857943b0f90862f32
7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm
324fe7a1b365aee05ab0ea021e2fa31b 7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm
923fcf52bca69c7e0158694b5d36cff8 7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
e93308a3f78d56128699365c02cc4104
7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
bf73c635ea5ae22e8a807c9b693074b7
7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm
bf77ed26156daf3a677aa5309624b375 7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
e6928929f4eb9f0fd0e1981fa233d421
7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
0ecc7a4a846747b857943b0f90862f32
7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm
95bee57049321a71a652378a5d9bc924 7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm
7da94da3bddc150e3c49f8e90c7f08eb
7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm
59d0791af0a8c717d6fdad0e967d823a
7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung