[RHSA-2001:107-07] New bugzilla packages are available

From: bugzillaat_private
Date: Mon Sep 10 2001 - 12:42:57 PDT

  • Next message: pestoat_private: "RE: Bug in remote GUI access in CheckPoint Firewall"

    ---------------------------------------------------------------------
                       Red Hat, Inc. Red Hat Security Advisory
    
    Synopsis:          New bugzilla packages are available
    Advisory ID:       RHSA-2001:107-07
    Issue date:        2001-08-30
    Updated on:        2001-09-10
    Product:           Red Hat Powertools
    Keywords:          
    Cross references:  
    Obsoletes:         
    ---------------------------------------------------------------------
    
    1. Topic:
    
    The updated bugzilla package fixes numerous security issues which were
    present in previous releases of bugzilla.
    
    2. Relevant releases/architectures:
    
    Red Hat Powertools 7.0 - alpha, i386, noarch
    
    Red Hat Powertools 7.1 - alpha, i386, noarch
    
    3. Problem description:
    
    Bugzilla-2.14 is a general security update. The serious security problems
    fixed are:
    
      - multiple instances where valid users could obtain data on
        "confidential" bugs without authorization.
    
      - multiple instances of security holes where parameters were not being
        checked/escaped properly.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    To update all RPMs for your particular architecture, run:
    
    rpm -Fvh [filenames]
    
    where [filenames] is a list of the RPMs you wish to upgrade.  Only those
    RPMs which are currently installed will be updated.  Those RPMs which are
    not installed but included in the list will not be updated.  Note that you
    can also use wildcards (*.rpm) if your current directory *only* contains
    the
    desired RPMs.
    
    Please note that this update is also available via Red Hat Network.  Many
    people find this to be an easier way to apply updates.  To use Red Hat
    Network, launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    
    
    6. RPMs required:
    
    Red Hat Powertools 7.0:
    
    SRPMS:
    ftp://updates.redhat.com/7.0/en/powertools/SRPMS/bugzilla-2.14-1.src.rpm
    ftp://updates.redhat.com/7.0/en/powertools/SRPMS/perl-Chart-0.99c.pre3-1.src.rpm
    ftp://updates.redhat.com/7.0/en/powertools/SRPMS/perl-GD-1.33-1.src.rpm
    ftp://updates.redhat.com/7.0/en/powertools/SRPMS/perl-DBD-MySQL-1.2215-1.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.0/en/powertools/alpha/perl-Chart-0.99c.pre3-1.alpha.rpm
    ftp://updates.redhat.com/7.0/en/powertools/alpha/perl-GD-1.33-1.alpha.rpm
    ftp://updates.redhat.com/7.0/en/powertools/alpha/perl-DBD-MySQL-1.2215-1.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/7.0/en/powertools/i386/perl-Chart-0.99c.pre3-1.i386.rpm
    ftp://updates.redhat.com/7.0/en/powertools/i386/perl-GD-1.33-1.i386.rpm
    ftp://updates.redhat.com/7.0/en/powertools/i386/perl-DBD-MySQL-1.2215-1.i386.rpm
    
    noarch:
    ftp://updates.redhat.com/7.0/en/powertools/noarch/bugzilla-2.14-1.noarch.rpm
    
    Red Hat Powertools 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/powertools/SRPMS/bugzilla-2.14-1.src.rpm
    ftp://updates.redhat.com/7.1/en/powertools/SRPMS/perl-Chart-0.99c.pre3-1.src.rpm
    ftp://updates.redhat.com/7.1/en/powertools/SRPMS/perl-GD-1.33-1.src.rpm
    ftp://updates.redhat.com/7.1/en/powertools/SRPMS/perl-DBD-MySQL-1.2215-1.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.1/en/powertools/alpha/perl-Chart-0.99c.pre3-1.alpha.rpm
    ftp://updates.redhat.com/7.1/en/powertools/alpha/perl-GD-1.33-1.alpha.rpm
    ftp://updates.redhat.com/7.1/en/powertools/alpha/perl-DBD-MySQL-1.2215-1.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/powertools/i386/perl-Chart-0.99c.pre3-1.i386.rpm
    ftp://updates.redhat.com/7.1/en/powertools/i386/perl-GD-1.33-1.i386.rpm
    ftp://updates.redhat.com/7.1/en/powertools/i386/perl-DBD-MySQL-1.2215-1.i386.rpm
    
    noarch:
    ftp://updates.redhat.com/7.1/en/powertools/noarch/bugzilla-2.14-1.noarch.rpm
    
    
    
    7. Verification:
    
    MD5 sum                           Package Name
    --------------------------------------------------------------------------
    4b5b23fb4e6f1f2c0568554abb6300f7 7.0/en/powertools/SRPMS/bugzilla-2.14-1.src.rpm
    b3a977c3c31eb4d5cbf87b1b8ef55a13 7.0/en/powertools/SRPMS/perl-Chart-0.99c.pre3-1.src.rpm
    e72ffef734b13a9f586b2a86df6f2065 7.0/en/powertools/SRPMS/perl-DBD-MySQL-1.2215-1.src.rpm
    7a953085c83ad66d175d44d7a270e258 7.0/en/powertools/SRPMS/perl-GD-1.33-1.src.rpm
    018257d053fea78a90f72d33567e875e 7.0/en/powertools/alpha/perl-Chart-0.99c.pre3-1.alpha.rpm
    7b858e398d33475e5299016495672abc 7.0/en/powertools/alpha/perl-DBD-MySQL-1.2215-1.alpha.rpm
    91f49c6d4fef569f6540cf3ea2c37876 7.0/en/powertools/alpha/perl-GD-1.33-1.alpha.rpm
    90dd575efe9bb5fa967b78be84f2bcd9 7.0/en/powertools/i386/perl-Chart-0.99c.pre3-1.i386.rpm
    1e1babf666f35b529dd4831e8d4f49a6 7.0/en/powertools/i386/perl-DBD-MySQL-1.2215-1.i386.rpm
    2867be3dbdc4c2fdc3d026578d55b4aa 7.0/en/powertools/i386/perl-GD-1.33-1.i386.rpm
    e41ef14ad7ecfeab1e540f6afcb5b1e0 7.0/en/powertools/noarch/bugzilla-2.14-1.noarch.rpm
    4b5b23fb4e6f1f2c0568554abb6300f7 7.1/en/powertools/SRPMS/bugzilla-2.14-1.src.rpm
    b3a977c3c31eb4d5cbf87b1b8ef55a13 7.1/en/powertools/SRPMS/perl-Chart-0.99c.pre3-1.src.rpm
    e72ffef734b13a9f586b2a86df6f2065 7.1/en/powertools/SRPMS/perl-DBD-MySQL-1.2215-1.src.rpm
    7a953085c83ad66d175d44d7a270e258 7.1/en/powertools/SRPMS/perl-GD-1.33-1.src.rpm
    018257d053fea78a90f72d33567e875e 7.1/en/powertools/alpha/perl-Chart-0.99c.pre3-1.alpha.rpm
    7b858e398d33475e5299016495672abc 7.1/en/powertools/alpha/perl-DBD-MySQL-1.2215-1.alpha.rpm
    91f49c6d4fef569f6540cf3ea2c37876 7.1/en/powertools/alpha/perl-GD-1.33-1.alpha.rpm
    90dd575efe9bb5fa967b78be84f2bcd9 7.1/en/powertools/i386/perl-Chart-0.99c.pre3-1.i386.rpm
    1e1babf666f35b529dd4831e8d4f49a6 7.1/en/powertools/i386/perl-DBD-MySQL-1.2215-1.i386.rpm
    2867be3dbdc4c2fdc3d026578d55b4aa 7.1/en/powertools/i386/perl-GD-1.33-1.i386.rpm
    e41ef14ad7ecfeab1e540f6afcb5b1e0 7.1/en/powertools/noarch/bugzilla-2.14-1.noarch.rpm
    
    These packages are GPG signed by Red Hat, Inc. for security.  Our key
    is available at:
        http://www.redhat.com/corp/contact.html
    
    You can verify each package with the following command:
        rpm --checksig  <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        rpm --checksig --nogpg <filename>
    
    8. References:
    
    http://www.securityfocus.com/templates/archive.pike?threads=0&end=2001-09-01&list=1&fromthread=0&mid=210980&start=2001-08-26&
    
    
    Copyright(c) 2000, 2001 Red Hat, Inc.
    



    This archive was generated by hypermail 2b30 : Mon Sep 10 2001 - 16:23:57 PDT