- Issued:
- 2005-06-09
- Updated:
- 2005-06-09
RHBA-2005:287 - Bug Fix Advisory
Synopsis
openCryptoki bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openCryptoki package that fixes incorrect directory permissions
in /etc/pkcs11 is now available.
Description
The PKCS#11 Version 2.11 API implemented for the IBM Crypto cards. This
package includes support for the IBM 4758 Cryptographic CoProcessor (with
the PKCS#11 firmware loaded) and the IBM eServer Cryptographic Accelerator
(FC 4960 on eServer pSeries).
A bug in openCryptoki set the permissions of /etc/pkcs11 so that only root
could use hardware crypto. This has been fixed.
All users of openCryptoki should upgrade to this updated package, which
resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
openCryptoki-2.1.5-8.40.2.src.rpm | SHA-256: 152dc10802b382014e42b51be7b6604e56bc369f402c5d2f477c85be03d827b3 |
s390x | |
openCryptoki-2.1.5-8.40.2.s390.rpm | SHA-256: 802ec4c83f593961f44160de45dd7845ebe247a83385ccf1b38dd8fd4772e5d5 |
openCryptoki-2.1.5-8.40.2.s390x.rpm | SHA-256: 6dccde39c2a4c1f8ff46c6f0e1f9649746b4289e385225885d8193149587f833 |
s390 | |
openCryptoki-2.1.5-8.40.2.s390.rpm | SHA-256: 802ec4c83f593961f44160de45dd7845ebe247a83385ccf1b38dd8fd4772e5d5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.