|
|
Subscribe / Log in / New account

rPath alert rPSA-2008-0307-1 (client)

From:  rPath Update Announcements <announce-noreply@rpath.com>
To:  security-announce@lists.rpath.com, update-announce@lists.rpath.com, security-announce@lists.rpath.com, update-announce@lists.rpath.com, product-announce@lists.rpath.com, product-announce@lists.rpath.com
Subject:  rPSA-2008-0307-1 nfs-client nfs-server nfs-utils
Date:  Thu, 30 Oct 2008 09:31:22 -0400
Message-ID:  <4909b72a.2FKgaXvUJmbfkE6j%announce-noreply@rpath.com>
Cc:  full-disclosure@lists.grok.org.uk, vulnwatch@vulnwatch.org, bugtraq@securityfocus.com, lwn@lwn.net, full-disclosure@lists.grok.org.uk, vulnwatch@vulnwatch.org, bugtraq@securityfocus.com, lwn@lwn.net

rPath Security Advisory: 2008-0307-1 Published: 2008-10-30 Products: rPath Appliance Platform Linux Service 1 rPath Appliance Platform Linux Service 2 rPath Linux 1 rPath Linux 2 Rating: Minor Exposure Level Classification: Remote Vulnerability Updated Versions: nfs-client=conary.rpath.com@rpl:1/1.0.7-14.13-1 nfs-client=conary.rpath.com@rpl:2/1.0.10-7.1-1 nfs-server=conary.rpath.com@rpl:2/1.0.10-7.1-1 nfs-utils=conary.rpath.com@rpl:1/1.0.7-14.13-1 nfs-utils=conary.rpath.com@rpl:2/1.0.10-7.1-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-2868 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552 Description: Previous versions of the nfs-utils package contain a bug that causes NIS netgroup restrictions to be ignored by TCP Wrappers, which may allow remote attackers to bypass intended access restrictions. http://wiki.rpath.com/Advisories:rPSA-2008-0307 Copyright 2008 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds