bugzilla@redhat.com
2001-Nov-02 10:42 UTC
[RHSA-2001:101-07] New ucd-snmp package to fix several security vulnerabilities
--------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: New ucd-snmp package to fix several security vulnerabilities Advisory ID: RHSA-2001:101-07 Issue date: 2001-08-15 Updated on: 2001-10-31 Product: Red Hat Linux Keywords: ucd-snmp security fix Cross references: Obsoletes: --------------------------------------------------------------------- 1. Topic: Updated ucd-snmp packages are now available for Red Hat Linux 6.2, 7 and 7.1. These packages include fixes for the following problems: - /tmp race and setgroups() privilege problem - Various buffer overflow and format string issues - One signedness problem in ASN handling It is recommended that all users update to the fixed packages. 2. Relevant releases/architectures: Red Hat Linux 6.2 - alpha, i386, sparc Red Hat Linux 7.0 - alpha, i386 Red Hat Linux 7.1 - alpha, i386, ia64 3. Problem description: Due to the mentioned security problems a remote attacker might obtain superuser privileges on a vulnerable host. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm sparc: ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm alpha: ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm ia64: ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 50fbf0b59533287c6ca7f2e831097ca1 6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm fc1f7b4b390e55623a4f112d6d22df3f 6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm 02df074653c0f12c1ff91623068e37b7 6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm ebb4943126a26503eeb63f69272ced55 6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm 4525cae85645e8b90f3df6e7b304969b 6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm 431a301c54348c1e3db4598a48ed8a7f 6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm 199fef0186401d6aaebad5cb420f1f5a 6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm 6767ded2ab1c9be85ed6bdef3ef99bb0 6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm 88393bda9bdcb8eaff5446ef99706780 6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm 35697b8870fb665ce7bd320ec553406d 6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm 324fe7a1b365aee05ab0ea021e2fa31b 7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm 923fcf52bca69c7e0158694b5d36cff8 7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm e93308a3f78d56128699365c02cc4104 7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm bf73c635ea5ae22e8a807c9b693074b7 7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm bf77ed26156daf3a677aa5309624b375 7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm e6928929f4eb9f0fd0e1981fa233d421 7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm 0ecc7a4a846747b857943b0f90862f32 7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm 324fe7a1b365aee05ab0ea021e2fa31b 7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm 923fcf52bca69c7e0158694b5d36cff8 7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm e93308a3f78d56128699365c02cc4104 7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm bf73c635ea5ae22e8a807c9b693074b7 7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm bf77ed26156daf3a677aa5309624b375 7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm e6928929f4eb9f0fd0e1981fa233d421 7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm 0ecc7a4a846747b857943b0f90862f32 7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm 95bee57049321a71a652378a5d9bc924 7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm 7da94da3bddc150e3c49f8e90c7f08eb 7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm 59d0791af0a8c717d6fdad0e967d823a 7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001 Red Hat, Inc.
Seemingly Similar Threads
- [RHSA-2001:163-20] Updated ucd-snmp packages available
- Security Update: [CSSA-2001-031.0] Linux -security issues in ucd-snmp
- CESA-2005:720-01: Low CentOS 2 i386 ucd-snmp security update
- CESA-2008:0528-01: Moderate CentOS 2 i386 ucd-snmp security update
- UCD-SNMP rpm