----- Forwarded message from [EMAIL PROTECTED] ----- > From: [EMAIL PROTECTED] > Reply-To: [EMAIL PROTECTED] > Date: Tue, 8 Aug 2000 10:20:00 -0400 > To: [EMAIL PROTECTED] > Subject: [RHSA-2000:047-03] New umb-scheme packages are available. > > --------------------------------------------------------------------- > Red Hat, Inc. Security Advisory > > Synopsis: New umb-scheme packages are available. > Advisory ID: RHSA-2000:047-03 > Issue date: 2000-08-07 > Updated on: 2000-08-07 > Product: Red Hat Linux > Keywords: N/A > Cross references: N/A > --------------------------------------------------------------------- > > 1. Topic: > > New umb-scheme packages are available for Red Hat Linux 6.2 that fix a > problem with file permissions. > > 2. Relevant releases/architectures: > > Red Hat Linux 6.2 - i386, alpha, sparc > Red Hat Linux 6.2E - i386, alpha, sparc > > 3. Problem description: > > The umb-scheme package included with Red Hat Linux 6.2 included two > world-writable files. > > 4. Solution: > > For each RPM for your particular architecture, run: > > rpm -Fvh [filename] > > where filename is the name of the RPM. > > 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): > > N/A > > 6. RPMs required: > > Red Hat Linux 6.2: > > sparc: > ftp://updates.redhat.com/6.2/sparc/umb-scheme-3.2-12.sparc.rpm > > alpha: > ftp://updates.redhat.com/6.2/alpha/umb-scheme-3.2-12.alpha.rpm > > i386: > ftp://updates.redhat.com/6.2/i386/umb-scheme-3.2-12.i386.rpm > > sources: > ftp://updates.redhat.com/6.2/SRPMS/umb-scheme-3.2-12.src.rpm > > 7. Verification: > > MD5 sum Package Name > -------------------------------------------------------------------------- > cd1eb054070f9ac29a3b87a7bb92dd8b 6.2/SRPMS/umb-scheme-3.2-12.src.rpm > 4f4e0b4bfa74a3d21e5a287b2a9bd31c 6.2/alpha/umb-scheme-3.2-12.alpha.rpm > 93d84b648cbcc301be211d45ff89f30f 6.2/i386/umb-scheme-3.2-12.i386.rpm > 372da7c9c61ad6f242e5eeff9d6f943b 6.2/sparc/umb-scheme-3.2-12.sparc.rpm > > These packages are GPG signed by Red Hat, Inc. for security. Our key > is available at: > http://www.redhat.com/corp/contact.html > > You can verify each package with the following command: > rpm --checksig <filename> > > If you only wish to verify that each package has not been corrupted or > tampered with, examine only the md5sum with the following command: > rpm --checksig --nogpg <filename> > > 8. References: > > Thanks to Prasanth A. Kumar for pointing this error out. > > > Copyright(c) 2000 Red Hat, Inc. > > ----- End forwarded message ----- -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
