Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Bcfg2
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Bcfg2
ID: FEDORA-2012-10391
Distribution: Fedora
Plattformen: Fedora 17
Datum: Mo, 29. Oktober 2012, 07:10
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3366
Applikationen: Bcfg2

Originalnachricht

Name        : bcfg2
Product : Fedora 17
Version : 1.2.3
Release : 1.fc17
URL : http://bcfg2.org
Summary : A configuration management system
Description :
Bcfg2 helps system administrators produce a consistent, reproducible,
and verifiable description of their environment, and offers
visualization and reporting tools to aid in day-to-day administrative
tasks. It is the fifth generation of configuration management tools
developed in the Mathematics and Computer Science Division of Argonne
National Laboratory.

It is based on an operational model in which the specification can be
used to validate and optionally change the state of clients, but in a
feature unique to Bcfg2 the client's response to the specification can
also be used to assess the completeness of the specification. Using
this feature, bcfg2 provides an objective measure of how good a job an
administrator has done in specifying the configuration of client
systems. Bcfg2 is therefore built to help administrators construct an
accurate, comprehensive specification.

-------------------------------------------------------------------------------
-
Update Information:

* Sat Jul 07 2012 Fabian Affolter <mail@fabian-affolter.ch> - 1.2.3-1
- Fix CVE-2012-3366
- Updated to new upstream version 1.2.3
-------------------------------------------------------------------------------
-
ChangeLog:

* Sat Jul 7 2012 Fabian Affolter <mail@fabian-affolter.ch> - 1.2.3-1
- Fix CVE-2012-3366
- Updated to new upstream version 1.2.3
* Tue May 1 2012 Fabian Affolter <mail@fabian-affolter.ch> - 1.2.2-2
- python-nose is needed by bcfg2-test
* Fri Apr 6 2012 Fabian Affolter <mail@fabian-affolter.ch> - 1.2.2-1
- Updated to new upstream version 1.2.2
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #835987 - bcfg2: arbitrary code execution flaw in Trigger plugin
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=835987
[ 2 ] Bug #835988 - bcfg2: arbitrary code execution flaw in Trigger plugin
[epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=835988
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update bcfg2' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung