Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandrake: Updated nut package provide Print E-mail
User Rating:      How can I rate this item?
Posted by Joseph Shakespeare   
Mandrake A bug in the upsd initscript used by nut exists where it starts the upsd/powerdown script earlier in the halt/shutdown process to ensure it still has access to USB.

                     Mandrakelinux Update Advisory

 Package name:           nut
 Advisory ID:            MDKA-2005:007
 Date:                   January 27th, 2005

 Affected versions:	 10.0, 10.1, Corporate Server 3.0

 Problem Description:

 A bug in the upsd initscript used by nut exists where it starts
 the upsd/powerdown script earlier in the halt/shutdown process to
 ensure it still has access to USB.  However, this was done too
 earlier, while the root partition was still mounted in read/write
 mode.  Due to this delay, it was possible that the UPS would run
 out of power before a clean halt.  The updated packages are fixed
 to remove the delay that could cause the problem.
 It is important to note that users make sure their UPS has at least a
 15 second delay before shutting down; most UPS units have this feature
 by default, but not all.  Users can also manage the shutdown delay in
 the nut configuration file if their nut-driver supports it.

 Updated Packages:
 Mandrakelinux 10.0:
 3fb12976bca541096177677cf5c5a5df  10.0/RPMS/nut-1.4.2-2.1.100mdk.i586.rpm
 3a12ecb4e9fc8d19767221aef154728f  10.0/RPMS/nut-cgi-1.4.2-2.1.100mdk.i586.rpm
 205273340acbf5c8f77f924e438102b6  10.0/RPMS/nut-devel-1.4.2-2.1.100mdk.i586.rpm
 56206fa81f41c55506acae12339a0616  10.0/RPMS/nut-server-1.4.2-2.1.100mdk.i586.rpm
 eeca869c29ac678899dee3c8c11f3536  10.0/SRPMS/nut-1.4.2-2.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 5bc6427733bfdbaae6bb03cd801f2643  amd64/10.0/RPMS/nut-1.4.2-2.1.100mdk.amd64.rpm
 c1c442139588012a9d60adcb8b03239c  amd64/10.0/RPMS/nut-cgi-1.4.2-2.1.100mdk.amd64.rpm
 add2afa10ddc33372ed2eb9cdc157e45  amd64/10.0/RPMS/nut-devel-1.4.2-2.1.100mdk.amd64.rpm
 4a7f27b5680d8c8234174ae610160829  amd64/10.0/RPMS/nut-server-1.4.2-2.1.100mdk.amd64.rpm
 eeca869c29ac678899dee3c8c11f3536  amd64/10.0/SRPMS/nut-1.4.2-2.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 28e2497023373434de009f5b168ce483  10.1/RPMS/nut-2.0.0-4.1.101mdk.i586.rpm
 f733586929b43899ebeff3fd5ec4798f  10.1/RPMS/nut-cgi-2.0.0-4.1.101mdk.i586.rpm
 9498cf1cf29ef052c6afe904b2ca4f8b  10.1/RPMS/nut-devel-2.0.0-4.1.101mdk.i586.rpm
 45eb02a04b3b7a29a8cb21234617d6ec  10.1/RPMS/nut-server-2.0.0-4.1.101mdk.i586.rpm
 c857cd8abb33ff5312f7ad76016c76ef  10.1/SRPMS/nut-2.0.0-4.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 108f789aa96a2ce2924e07da915b603e  x86_64/10.1/RPMS/nut-2.0.0-4.1.101mdk.x86_64.rpm
 ac450e7b0d92a457139709106f2be017  x86_64/10.1/RPMS/nut-cgi-2.0.0-4.1.101mdk.x86_64.rpm
 951b55730c72c4d47e09a8061cb5529f  x86_64/10.1/RPMS/nut-devel-2.0.0-4.1.101mdk.x86_64.rpm
 9c554431ccd0a257f68b6ca0253f9a9e  x86_64/10.1/RPMS/nut-server-2.0.0-4.1.101mdk.x86_64.rpm
 c857cd8abb33ff5312f7ad76016c76ef  x86_64/10.1/SRPMS/nut-2.0.0-4.1.101mdk.src.rpm

 Corporate Server 3.0:
 b6a0b3045bcfbedfb961bf3a804eb33d  corporate/3.0/RPMS/nut-1.4.2-2.1.C30mdk.i586.rpm
 7bd5324d33cf312a26b2f2004fe053e2  corporate/3.0/RPMS/nut-cgi-1.4.2-2.1.C30mdk.i586.rpm
 ebc1447781f0766904bb1c6cd3752127  corporate/3.0/RPMS/nut-devel-1.4.2-2.1.C30mdk.i586.rpm
 5155dd5578ebe388125d639dfe6026c0  corporate/3.0/RPMS/nut-server-1.4.2-2.1.C30mdk.i586.rpm
 f1a675e85eebe4cc62431d6435277a9d  corporate/3.0/SRPMS/nut-1.4.2-2.1.C30mdk.src.rpm

 Corporate Server 3.0/x86_64:
 fc731757f19de1712a24722eb6f258fd  x86_64/corporate/3.0/RPMS/nut-1.4.2-2.1.C30mdk.x86_64.rpm
 c330dcd8a8be65a737b5fde0d537a493  x86_64/corporate/3.0/RPMS/nut-cgi-1.4.2-2.1.C30mdk.x86_64.rpm
 ff6af3578fec9c6216162cb22beb9a42  x86_64/corporate/3.0/RPMS/nut-devel-1.4.2-2.1.C30mdk.x86_64.rpm
 eedee3179c245eea34030866a0e52adc  x86_64/corporate/3.0/RPMS/nut-server-1.4.2-2.1.C30mdk.x86_64.rpm
 f1a675e85eebe4cc62431d6435277a9d  x86_64/corporate/3.0/SRPMS/nut-1.4.2-2.1.C30mdk.src.rpm

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandrakelinux at:

 If you want to report vulnerabilities, please contact

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.