11117991 2003-12-17 15:25 -0800 /162 rader/ SGI Security Coordinator <agent99@sgi.com>
Importerad: 2003-12-18 20:07 av Brevbäraren
Extern mottagare: agent99@sgi.com
Extern kopiemottagare: bugtraq@securityfocus.com
Extern kopiemottagare: full-disclosure@lists.netsys.com
Extern kopiemottagare: vulnwatch@vulnwatch.org
Mottagare: Bugtraq (import) <30400>
Ärende: SGI Advanced Linux Environment security update #7
------------------------------------------------------------
From: SGI Security Coordinator <agent99@sgi.com>
To: agent99@sgi.com
Cc: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com,
 vulnwatch@vulnwatch.org
Message-ID: <Pine.SGI.4.56.0312171524330.147178@einstein.csd.sgi.com>

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
                           SGI Security Advisory

  Title     : SGI Advanced Linux Environment security update #7
  Number    : 20031203-01-U
  Date      : December 17, 2003
  Reference : Red Hat Advisory RHSA-2003:312-06, CAN-2003-0855
  Reference : Red Hat Advisory RHSA-2003:360-08, CAN-2003-0542
  Reference : Red Hat Advisory RHSA-2003:372-08, CAN-2002-1565
  Reference : Red Hat Advisory RHSA-2003:395-13, CAN-2003-0971
  Fixed in  : Patch 10039 for SGI ProPack v2.3
______________________________________________________________________________

SGI provides this information freely to the SGI user community for
its consideration, interpretation, implementation and use.  SGI
recommends that this information be acted upon as soon as possible.

SGI provides the information in this Security Advisory on an "AS-IS"
basis only, and disclaims all warranties with respect thereto,
express, implied or otherwise, including, without limitation, any
warranty of merchantability or fitness for a particular purpose.  In
no event shall SGI be liable for any loss of profits, loss of
business, loss of data or for any indirect, special, exemplary,
incidental or consequential damages of any kind arising from your use
of, failure to use or improper use of any of the instructions or
information in this Security Advisory.
______________________________________________________________________________

- --------------
- --- Update ---
- --------------

SGI has released Patch 10039: SGI Advanced Linux Environment security
update #7, which includes updated RPMs for SGI ProPack v2.3 for the
Altix family of systems, in response to the following erratas
released by Red Hat:

 Updated Pan packages fix denial of service vulnerability
 http://rhn.redhat.com/errata/RHSA-2003-312.html

 Updated apache packages fix minor security vulnerability
 http://rhn.redhat.com/errata/RHSA-2003-360.html

 Updated wget packages include fix for buffer overrun
 http://rhn.redhat.com/errata/RHSA-2003-372.html

 Updated gnupg packages disable ElGamal keys
 http://rhn.redhat.com/errata/RHSA-2003-395.html

Patch 10039 is available from http://support.sgi.com/ and
ftp://patches.sgi.com/support/free/security/patches/ProPack/2.3/

The individual RPMs from Patch 10039 are available from:
ftp://oss.sgi.com/projects/sgi_propack/download/2.3/updates/RPMS
ftp://oss.sgi.com/projects/sgi_propack/download/2.3/updates/SRPMS


- -------------
- --- Links ---
- -------------

SGI Security Advisories can be found at:
http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/advisories/

Red Hat Errata: Security Alerts, Bugfixes, and Enhancements
http://www.redhat.com/apps/support/errata/

SGI Advanced Linux Environment security updates can found on:
ftp://oss.sgi.com/projects/sgi_propack/download/

SGI patches can be found at the following patch servers:
http://support.sgi.com/

The primary SGI anonymous FTP site for security advisories and
security patches is ftp://patches.sgi.com/support/free/security/


- -----------------------------------------
- --- SGI Security Information/Contacts ---
- -----------------------------------------

If there are questions about this document, email can be sent to
security-info@sgi.com.

                      ------oOo------

SGI provides security information and patches for use by the entire
SGI community.  This information is freely available to any person
needing the information and is available via anonymous FTP and the
Web.

The primary SGI anonymous FTP site for security advisories and
patches is patches.sgi.com.  Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/

The SGI Security Headquarters Web page is accessible at the URL:
http://www.sgi.com/support/security/

For issues with the patches on the FTP sites, email can be sent to
security-info@sgi.com.

For assistance obtaining or working with security patches, please
contact your SGI support provider.

                      ------oOo------

SGI provides a free security mailing list service called wiretap and
encourages interested parties to self-subscribe to receive (via
email) all SGI Security Advisories when they are
released. Subscribing to the mailing list can be done via the Web
(http://www.sgi.com/support/security/wiretap.html) or by sending
email to SGI as outlined below.

% mail wiretap-request@sgi.com
subscribe wiretap < YourEmailAddress such as midwatch@sgi.com >
end
^d

In the example above, <YourEmailAddress> is the email address that
you wish the mailing list information sent to.  The word end must be
on a separate line to indicate the end of the body of the
message. The control-d (^d) is used to indicate to the mail program
that you are finished composing the mail message.


                      ------oOo------

SGI provides a comprehensive customer World Wide Web site. This site
is located at http://www.sgi.com/support/security/ .

                      ------oOo------

If there are general security questions on SGI systems, email can be
sent to security-info@sgi.com.

For reporting *NEW* SGI security issues, email can be sent to
security-alert@sgi.com or contact your SGI support provider.  A
support contract is not required for submitting a security report.

______________________________________________________________________________
      This information is provided freely to all interested parties
      and may be redistributed provided that it is not altered in any
      way, SGI is appropriately credited and the document retains and
      includes its valid PGP signature.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBP+DkubQ4cFApAP75AQHbogQAppcMvovJC2PsA3xgBNWHDoSOMA91rpuu
8fihwVKGwCb11u2jmIknTMd3fzc/WKqlMxQzd9svSVkcQ9CedespkreVP8z6uZG2
f04CTdrSUU+ZnXD1pNROxf65lmmsFUP0xhVhkqcPSPRZup5X8Y+jKEiafAGzg3cq
42mkgmIzhD0=
=5iPn
-----END PGP SIGNATURE-----
(11117991) /SGI Security Coordinator <agent99@sgi.com>/(Ombruten)