Red Hat, Inc. Security Advisory
|
||
Package | amd | |
|
||
Synopsis | Buffer overrun in amd | |
|
||
Advisory ID | RHSA-1999:032-01 | |
|
||
Issue Date | 1999-08-30 | |
|
||
Updated on | ||
|
||
Keywords | amd am-utils buffer overflow remote exploit | |
|
||
1. Topic: 2. Bug IDs fixed: 3. Relevant releases/architectures: 4. Obsoleted by: 5. Conflicts with: The following is valid for all releases and arcitectures: the default configuration file format for amd that Red Hat used to ship has been changed. Initially the /etc/amd.conf file used to be the default map file that would allow access to the /net hierarchy. Now /etc/amd.conf is the amd configuration file and the default map is installed as /etc/amd.net. 6. RPMs required: Intel: ftp://updates.RedHat.com/6.0/i386/ am-utils-6.0.1s11-1.6.0.i386.rpm Alpha: ftp://updates.RedHat.com/6.0/alpha am-utils-6.0.1s11-1.6.0.alpha.rpm SPARC: ftp://updates.RedHat.com/6.0/sparc am-utils-6.0.1s11-1.6.0.sparc.rpm Source: ftp://updates.RedHat.com/6.0/SRPMS am-utils-6.0.1s11-1.6.0.src.rpm
Architecture neutral: ftp://updates.RedHat.com/6.0/noarch/
7. Problem description: Red Hat recommends anyone to upgrade to the fixed versions immediately. Thanks to Erez Zadok, the maintainer of am-utils for his assistance in resolving this problem.
8. Solution: rpm -Uvh filename where filename is the name of the RPM.
9. Verification: MD5 sum Package Name -------------------------------------------------------------------------0946dbc5539d208625eb27f506177ed2 i386/am-utils-6.0.1s11-1.6.0.i386.rpm 1a1ceb0ed50822776f605e60bbed1afb alpha/am-utils-6.0.1s11-1.6.0.alpha.rpm b68c6f2780f11ca71947673124bd8f11 sparc/am-utils-6.0.1s11-1.6.0.sparc.rpm 275997ded7f0c85efa6229963e84f668 SRPMS/am-utils-6.0.1s11-1.6.0.src.rpmThese packages are also PGP signed by Red Hat Inc. for security. Our key is available at: https://www.RedHat.com/corp/contact.html You can verify each package with the following command: rpm --checksig filename If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nopgp filename 10. References: |