LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Red Hat: 'up2date' required update Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux New versions of the up2date and rhn_register clients are available andare required for continued access to Red Hat Network.

---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          New up2date available with updated SSL certificate authority file
Advisory ID:       RHSA-2003:267-01
Issue date:        2003-08-29
Updated on:        2003-08-29
Product:           Red Hat Linux
Keywords:          up2date Red Hat Network rhn_register
Cross references:
Obsoletes:
---------------------------------------------------------------------

1. Topic:

New versions of the up2date and rhn_register clients are available and
are required for continued access to Red Hat Network.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - i386
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

The rhn_register and up2date packages contain the software necessary to
take advantage of Red Hat Network functionality.

This erratum includes an updated RHNS-CA-CERT file, which contains a new CA
certificate.  This new certificate is needed so that up2date can continue
to communicate with Red Hat Network after 28 August 2003.  Without this
updated certificate, users will see SSL Connection Errors reported by
up2date or rhn_register.

All users must upgrade to these erratum packages in order to continue to
use Red Hat Network.  This includes both interactive use of up2date, as
well as actions scheduled by the RHN website.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Because the previous Certificate Authority has expired, up2date will
present 'SSL Certificate Errors' if you attempt to use it to apply this
errata.  Therefore, this update cannot be applied directly with up2date and
 instead must be applied as indicated above.

In addition to the Red Hat FTP site, the latest versions of up2date and
rhn_register are also available at

    https://rhn.Red Hat.com/help/latest-up2date.pxt

For users who would prefer to install the new certificate directly, it is
available at:

    https://rhn.Red Hat.com/help/ssl_cert.pxt

5. RPMs required:

Red Hat Linux 7.1:

SRPMS: 
ftp://updates.Red Hat.com/7.1/en/os/SRPMS/up2date-2.8.40-1.7.1.src.rpm

i386: 
ftp://updates.Red Hat.com/7.1/en/os/i386/up2date-2.8.40-1.7.1.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/up2date-gnome-2.8.40-1.7.1.i386.rpm

Red Hat Linux 7.2:

SRPMS: 
ftp://updates.Red Hat.com/7.2/en/os/SRPMS/up2date-2.8.40-2.7.2.src.rpm

i386: 
ftp://updates.Red Hat.com/7.2/en/os/i386/up2date-2.8.40-2.7.2.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/up2date-gnome-2.8.40-2.7.2.i386.rpm

ia64: 
ftp://updates.Red Hat.com/7.2/en/os/ia64/up2date-2.8.40-2.7.2.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/up2date-gnome-2.8.40-2.7.2.ia64.rpm

Red Hat Linux 7.3:

SRPMS: 
ftp://updates.Red Hat.com/7.3/en/os/SRPMS/up2date-2.8.40-3.7.3.src.rpm

i386: 
ftp://updates.Red Hat.com/7.3/en/os/i386/up2date-2.8.40-3.7.3.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/up2date-gnome-2.8.40-3.7.3.i386.rpm

Red Hat Linux 8.0:

SRPMS: 
ftp://updates.Red Hat.com/8.0/en/os/SRPMS/up2date-3.0.7.2-1.src.rpm

i386: 
ftp://updates.Red Hat.com/8.0/en/os/i386/up2date-3.0.7.2-1.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/up2date-gnome-3.0.7.2-1.i386.rpm

Red Hat Linux 9:

SRPMS: 
ftp://updates.Red Hat.com/9/en/os/SRPMS/up2date-3.1.23.2-1.src.rpm

i386: 
ftp://updates.Red Hat.com/9/en/os/i386/up2date-3.1.23.2-1.i386.rpm 
ftp://updates.Red Hat.com/9/en/os/i386/up2date-gnome-3.1.23.2-1.i386.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
b67ea5065c3115d523e17561aac5cb7c 7.1/en/os/SRPMS/up2date-2.8.40-1.7.1.src.rpm
71f2f6e4bfcdee8f4f46ef037c7a1c8d 7.1/en/os/i386/up2date-2.8.40-1.7.1.i386.rpm
2205d1e5832dbb67d60103104eb59fec 7.1/en/os/i386/up2date-gnome-2.8.40-1.7.1.i386.rpm
3deea256b106e71ee6d5890639d872b3 7.2/en/os/SRPMS/up2date-2.8.40-2.7.2.src.rpm
21bc8e1f03e9f28590d46df60a9458b5 7.2/en/os/i386/up2date-2.8.40-2.7.2.i386.rpm
3d3d7c6dca73d521a0f541b859f13eb3 7.2/en/os/i386/up2date-gnome-2.8.40-2.7.2.i386.rpm
ac5161a5bbe122896eccbc312bef9273 7.2/en/os/ia64/up2date-2.8.40-2.7.2.ia64.rpm
c789fbf88d7faf82504eb4189b767f90 7.2/en/os/ia64/up2date-gnome-2.8.40-2.7.2.ia64.rpm
23d8868920cb7df21925669f04fb2ad2 7.3/en/os/SRPMS/up2date-2.8.40-3.7.3.src.rpm
3643d7774d7e60a1aeb79c8fecbf624c 7.3/en/os/i386/up2date-2.8.40-3.7.3.i386.rpm
89977334ec0d3a2a720c3303602fc8dd 7.3/en/os/i386/up2date-gnome-2.8.40-3.7.3.i386.rpm
17ad92db4579d046d84c84a16784ba98 8.0/en/os/SRPMS/up2date-3.0.7.2-1.src.rpm
15bc5dc918916bca3a5c29148979716e 8.0/en/os/i386/up2date-3.0.7.2-1.i386.rpm
1ae89cf79880f3bc5de7b86eb1d47a2b 8.0/en/os/i386/up2date-gnome-3.0.7.2-1.i386.rpm
b8a5b2d548869a846cbaf373f3637555 9/en/os/SRPMS/up2date-3.1.23.2-1.src.rpm
3faabcb9cc610627fe378b88d0b2b928 9/en/os/i386/up2date-3.1.23.2-1.i386.rpm
733d0aca17c15af0b1fa709ba86337dc 9/en/os/i386/up2date-gnome-3.1.23.2-1.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.Red Hat.com/security/keys.html

You can verify each package with the following command:

    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:

    md5sum 

7. Contact:

The Red Hat security contact is <secalert@Red Hat.com>.  More contact
details at https://www.Red Hat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DARPA-derived secure microkernel goes open source tomorrow
Hacker Gary McKinnon turns into a search expert
Hackers seed Amazon cloud with potent denial-of-service bots
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.