Download Red Hat Enterprise Linux 5 5.8 Technical Notes
Transcript
Chapter 4. Package Updates BZ #625016 Previously, the mcstransd daemon modified labels for the crond daemon. When the crond daemon attempted to use the modified label and mcstransd was not running, crond used an incorrect label. Consequently, Security-Enhanced Linux (SELinux) denials filled up the cron log, no jobs were executed, and crond had to be restarted. With this update, both mcstransd and crond use raw SELinux labels, which prevents the problem. BZ #699620, BZ #699621 Previously, the crontab(1) and cron(8) manual pages contained multiple typographical errors. T his update fixes those errors. Enhancement BZ #24 9512 Previously, the crontab utility did not use the Pluggable Authentication Module (PAM) for verification of users. As a consequence, a user could access crontab even if access had been restricted (usually by being denied in the access.conf file). With this update, crontab returns an error message that the user is not allowed to access crontab because of PAM configuration. All vixie-cron users should upgrade to this updated package, which resolves these issues and adds this enhancement. 4.208. vsftpd 4.208.1. RHBA-2012:0187 — vsftpd bug fix and enhancement update An updated vsftpd package that fixes three bugs and adds three enhancements is now available for Red Hat Enterprise Linux 5. T he vsftpd package includes a Very Secure FT P (File T ransfer Protocol) daemon. Bug Fixes BZ #513828 T he "delay_failed_login" and "max_login_fails" options, which can be set in the vsftpd.conf file, did not work correctly. Consequently, the user had an unlimited number of login attempts if the "userlist_enabled=YES" and "userlist_deny=NO" rules were specified in the vsftpd.conf file. T he vsftpd daemon now properly uses a delay between two unsuccessful login attempts and also refuses any connection after a specified number of unsuccessful login attempts. BZ #7174 09 T he vsftpd daemon did not handle file transfer failures correctly if the ftp-data port was blocked on the FT P client. As a consequence, vsftpd became unresponsive under these circumstances. T he updated vsftpd daemon now reports such failures to the FT P client and the data transfer is terminated as expected. BZ #759364 An attempt to list files could lead to a data type overflow error if a directory contained files with owner's UID or GID that was higher then the maximum value of the "signed int" data type (that 303
Related documents
6.7 Technical Notes - Red Hat Customer Portal
Debian reference guide (23 Feb 2010)
v7 Hardware Certification Test Suite 1 Technical Notes
Red Hat APPLICATION STACK 1.2 RELEASE Installation guide
Red Hat Enterprise Linux 5 DM Multipath
5.11 Technical Notes - Red Hat Customer Portal
NASA Technical Memorandum X-2417
Ubuntu Server Guide
Zarafa Collaboration Platform
Oracle® Private Cloud Appliance
"user manual"
Oracle® Private Cloud Appliance