[Security Announce] MDKA-2005:007 - Updated nut package provide
fixed initscript
[Posted February 1, 2005 by ris]
From: |
| Mandrakelinux Security Team <security-AT-linux-mandrake.com> |
To: |
| security-announce-AT-linux-mandrake.com |
Subject: |
| [Security Announce] MDKA-2005:007 - Updated nut package provide
fixed initscript |
Date: |
| Thu, 27 Jan 2005 15:16:58 -0700 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: nut
Advisory ID: MDKA-2005:007
Date: January 27th, 2005
Affected versions: 10.0, 10.1, Corporate Server 3.0
______________________________________________________________________
Problem Description:
A bug in the upsd initscript used by nut exists where it starts
the upsd/powerdown script earlier in the halt/shutdown process to
ensure it still has access to USB. However, this was done too
earlier, while the root partition was still mounted in read/write
mode. Due to this delay, it was possible that the UPS would run
out of power before a clean halt. The updated packages are fixed
to remove the delay that could cause the problem.
It is important to note that users make sure their UPS has at least a
15 second delay before shutting down; most UPS units have this feature
by default, but not all. Users can also manage the shutdown delay in
the nut configuration file if their nut-driver supports it.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
3fb12976bca541096177677cf5c5a5df 10.0/RPMS/nut-1.4.2-2.1.100mdk.i586.rpm
3a12ecb4e9fc8d19767221aef154728f 10.0/RPMS/nut-cgi-1.4.2-2.1.100mdk.i586.rpm
205273340acbf5c8f77f924e438102b6
10.0/RPMS/nut-devel-1.4.2-2.1.100mdk.i586.rpm
56206fa81f41c55506acae12339a0616
10.0/RPMS/nut-server-1.4.2-2.1.100mdk.i586.rpm
eeca869c29ac678899dee3c8c11f3536 10.0/SRPMS/nut-1.4.2-2.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
5bc6427733bfdbaae6bb03cd801f2643
amd64/10.0/RPMS/nut-1.4.2-2.1.100mdk.amd64.rpm
c1c442139588012a9d60adcb8b03239c
amd64/10.0/RPMS/nut-cgi-1.4.2-2.1.100mdk.amd64.rpm
add2afa10ddc33372ed2eb9cdc157e45
amd64/10.0/RPMS/nut-devel-1.4.2-2.1.100mdk.amd64.rpm
4a7f27b5680d8c8234174ae610160829
amd64/10.0/RPMS/nut-server-1.4.2-2.1.100mdk.amd64.rpm
eeca869c29ac678899dee3c8c11f3536
amd64/10.0/SRPMS/nut-1.4.2-2.1.100mdk.src.rpm
Mandrakelinux 10.1:
28e2497023373434de009f5b168ce483 10.1/RPMS/nut-2.0.0-4.1.101mdk.i586.rpm
f733586929b43899ebeff3fd5ec4798f 10.1/RPMS/nut-cgi-2.0.0-4.1.101mdk.i586.rpm
9498cf1cf29ef052c6afe904b2ca4f8b
10.1/RPMS/nut-devel-2.0.0-4.1.101mdk.i586.rpm
45eb02a04b3b7a29a8cb21234617d6ec
10.1/RPMS/nut-server-2.0.0-4.1.101mdk.i586.rpm
c857cd8abb33ff5312f7ad76016c76ef 10.1/SRPMS/nut-2.0.0-4.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
108f789aa96a2ce2924e07da915b603e
x86_64/10.1/RPMS/nut-2.0.0-4.1.101mdk.x86_64.rpm
ac450e7b0d92a457139709106f2be017
x86_64/10.1/RPMS/nut-cgi-2.0.0-4.1.101mdk.x86_64.rpm
951b55730c72c4d47e09a8061cb5529f
x86_64/10.1/RPMS/nut-devel-2.0.0-4.1.101mdk.x86_64.rpm
9c554431ccd0a257f68b6ca0253f9a9e
x86_64/10.1/RPMS/nut-server-2.0.0-4.1.101mdk.x86_64.rpm
c857cd8abb33ff5312f7ad76016c76ef
x86_64/10.1/SRPMS/nut-2.0.0-4.1.101mdk.src.rpm
Corporate Server 3.0:
b6a0b3045bcfbedfb961bf3a804eb33d
corporate/3.0/RPMS/nut-1.4.2-2.1.C30mdk.i586.rpm
7bd5324d33cf312a26b2f2004fe053e2
corporate/3.0/RPMS/nut-cgi-1.4.2-2.1.C30mdk.i586.rpm
ebc1447781f0766904bb1c6cd3752127
corporate/3.0/RPMS/nut-devel-1.4.2-2.1.C30mdk.i586.rpm
5155dd5578ebe388125d639dfe6026c0
corporate/3.0/RPMS/nut-server-1.4.2-2.1.C30mdk.i586.rpm
f1a675e85eebe4cc62431d6435277a9d
corporate/3.0/SRPMS/nut-1.4.2-2.1.C30mdk.src.rpm
Corporate Server 3.0/x86_64:
fc731757f19de1712a24722eb6f258fd
x86_64/corporate/3.0/RPMS/nut-1.4.2-2.1.C30mdk.x86_64.rpm
c330dcd8a8be65a737b5fde0d537a493
x86_64/corporate/3.0/RPMS/nut-cgi-1.4.2-2.1.C30mdk.x86_64.rpm
ff6af3578fec9c6216162cb22beb9a42
x86_64/corporate/3.0/RPMS/nut-devel-1.4.2-2.1.C30mdk.x86_64.rpm
eedee3179c245eea34030866a0e52adc
x86_64/corporate/3.0/RPMS/nut-server-1.4.2-2.1.C30mdk.x86_64.rpm
f1a675e85eebe4cc62431d6435277a9d
x86_64/corporate/3.0/SRPMS/nut-1.4.2-2.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFB+WhamqjQ0CJFipgRAtUQAJ0cDAwulN5WFe0n9NRx4abrtMtjGgCgwvug
cOOFz2Wq803I9qYGSrr0AcU=
=IuUT
-----END PGP SIGNATURE-----
____________________________________________________
Want to buy your Pack or Services from MandrakeSoft?
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________