Security update for package siga
Knowledgebase
(Last modified: 16JAN2003)
solutions Security update for package siga SuSE Linux Maintenance Web (79b89d263c7b85cbaa5acec7a28a0603)
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Openexchange Server 4
Package: siga
Release: 20030116
Obsoletes: db1eb27602d05e13790bbf7dbfba89f0
siga
is the System Information Gathering tool, designed to collect detailed information about the hard- and software configuration
of your system to be used by the SuSE support to have useful information
available for a precise problem analysis.
siga
is used by theYaST2 support module.
This update addresses wrong permissions of a file necessary for the CUPS printing subsystem. It could happen that
siga
leaves a file behind with mode 0644 that must be executable for CUPS to work properly.In addition to that, the two fixes for the security problems from the previous
siga
update are included in this update as well. For completeness, the description for these fixes are included here: The first deals with insecure handling of files in /tmp
where a local attacker could trick siga
to overwrite arbitrary files. The second problem consists of improper password information blanking when gathering information from the directory /etc/ppp
. The fix for this problem is to leave the files /etc/ppp/chap-secrets
and /etc/ppp/pap-secrets
untouched to not risk the user's privacy. We recommend to have this update package installed on every installation of UnitedLinux.
rpm -Fvh siga.rpm
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.