- Issued:
- 2009-12-09
- Updated:
- 2010-03-30
RHBA-2009:1656 - Bug Fix Advisory
Synopsis
system-config-securitylevel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated system-config-securitylevel packages that fix several bugs are now
available.
Description
system-config-securitylevel is a graphical program for configuring firewall
and SELinux settings.
These updated packages address the following bugs:
- when a new port is added to a firewall -- via the Firewall Options >
Other ports > Add dialog box -- its service name is derived from the port
number. Service names containing hyphens (eg iascontrol-oms, 1156/TCP, the
Oracle Application Server control port) were incorrectly assumed to be port
ranges. This caused them to be split, with the individual sections found to
be invalid. Note: this validation failure did not prevent the port from
being added to the firewall, as could be seen with the iptables-save
command. The port was not listed in the "Other ports" list, however. With
this update service names with hyphens are treated correctly, the added
port is validated correctly and it is listed in "Other ports" as expected.
(BZ#503588)
- system-config-securitylevel-tui, the text-based equivalent to
system-config-securitylevel, relies on the setenforce command but did not
have an explicit dependency on libselinux, the package that provides the
setenforce command. With this update, the system-config-securitylevel spec
file has been updated to require libselinux, ensuring
system-config-securitylevel-tui always has the setenforce command available
as needed. (BZ#532947)
- lokkit calls referenced setenforce without explicitly noting its path:
/usr/sbin/setenforce. The default PATH for ordinary users on Red Hat
Enterprise Linux does not include /usr/sbin/, however. If such users had
sudo-based permission to run system-config-securitylevel-tui, attempting to
run this application resulted in a "sh: setenforce: command not found"
error. lokkit now references setenforce's path explicitly and ordinary
users with appropriate permissions can run system-config-securitylevel-tui
as expected. Note: /usr/sbin is in the default PATH of the root user on Red
Hat Enterprise Linux. If system-config-securitylevel-tui was only run by
the root user, this error did not present. (BZ#532948)
All users are advised to upgrade to these updated packages, which resolve
these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 503588 - 'Other Port' validation broken
- BZ - 532947 - system-config-securitylevel-tui depens on libselinux-utils
- BZ - 532948 - system-config-securitylevel-tui assumes /usr/sbin is in PATH
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
system-config-securitylevel-1.6.29.1-5.el5.src.rpm | SHA-256: 4dc2ed6eb773f84ee2f020f5934b42d08806e34a7c5f5cff11525fdccaad1ff4 |
x86_64 | |
system-config-securitylevel-1.6.29.1-5.el5.x86_64.rpm | SHA-256: afb56f03f2bd3ff8200ef3faa419a329e511eb5cae9ed37abe5af012935f7918 |
system-config-securitylevel-tui-1.6.29.1-5.el5.x86_64.rpm | SHA-256: 366ebb0bbd189f941a8d44e2d4bafd658084810d63835278af80e70a077df96b |
ia64 | |
system-config-securitylevel-1.6.29.1-5.el5.ia64.rpm | SHA-256: 06009fe2c8652727e5a1aa50ccde512f68ef734128b76d46fe3b3af7e693479e |
system-config-securitylevel-tui-1.6.29.1-5.el5.ia64.rpm | SHA-256: 61fccfb5bb6fea0ecd8998bda3bf9a23bfc45ac8c6eafbdbfaf66b3578d7aaea |
i386 | |
system-config-securitylevel-1.6.29.1-5.el5.i386.rpm | SHA-256: 3dc8d2dd95d03dcf352fb299472123f0958a7fa5ec00ae2be1fa036dd201fb5c |
system-config-securitylevel-tui-1.6.29.1-5.el5.i386.rpm | SHA-256: ca6315580db963ae239e70692074c65961c66ed7bf6afa77199dd513f91912fc |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
system-config-securitylevel-1.6.29.1-5.el5.src.rpm | SHA-256: 4dc2ed6eb773f84ee2f020f5934b42d08806e34a7c5f5cff11525fdccaad1ff4 |
x86_64 | |
system-config-securitylevel-1.6.29.1-5.el5.x86_64.rpm | SHA-256: afb56f03f2bd3ff8200ef3faa419a329e511eb5cae9ed37abe5af012935f7918 |
system-config-securitylevel-tui-1.6.29.1-5.el5.x86_64.rpm | SHA-256: 366ebb0bbd189f941a8d44e2d4bafd658084810d63835278af80e70a077df96b |
i386 | |
system-config-securitylevel-1.6.29.1-5.el5.i386.rpm | SHA-256: 3dc8d2dd95d03dcf352fb299472123f0958a7fa5ec00ae2be1fa036dd201fb5c |
system-config-securitylevel-tui-1.6.29.1-5.el5.i386.rpm | SHA-256: ca6315580db963ae239e70692074c65961c66ed7bf6afa77199dd513f91912fc |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
system-config-securitylevel-1.6.29.1-5.el5.src.rpm | SHA-256: 4dc2ed6eb773f84ee2f020f5934b42d08806e34a7c5f5cff11525fdccaad1ff4 |
x86_64 | |
system-config-securitylevel-1.6.29.1-5.el5.x86_64.rpm | SHA-256: afb56f03f2bd3ff8200ef3faa419a329e511eb5cae9ed37abe5af012935f7918 |
system-config-securitylevel-tui-1.6.29.1-5.el5.x86_64.rpm | SHA-256: 366ebb0bbd189f941a8d44e2d4bafd658084810d63835278af80e70a077df96b |
i386 | |
system-config-securitylevel-1.6.29.1-5.el5.i386.rpm | SHA-256: 3dc8d2dd95d03dcf352fb299472123f0958a7fa5ec00ae2be1fa036dd201fb5c |
system-config-securitylevel-tui-1.6.29.1-5.el5.i386.rpm | SHA-256: ca6315580db963ae239e70692074c65961c66ed7bf6afa77199dd513f91912fc |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
system-config-securitylevel-1.6.29.1-5.el5.src.rpm | SHA-256: 4dc2ed6eb773f84ee2f020f5934b42d08806e34a7c5f5cff11525fdccaad1ff4 |
s390x | |
system-config-securitylevel-1.6.29.1-5.el5.s390x.rpm | SHA-256: 5aae4daacadb7a937c79e0d454471ac8834d3f6e47f690def4204a1e1e4dc5db |
system-config-securitylevel-tui-1.6.29.1-5.el5.s390x.rpm | SHA-256: 005534e0b553967374e0968d4efecce691ee6fd0d157abde86115f7cf29f4f4e |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
system-config-securitylevel-1.6.29.1-5.el5.src.rpm | SHA-256: 4dc2ed6eb773f84ee2f020f5934b42d08806e34a7c5f5cff11525fdccaad1ff4 |
ppc | |
system-config-securitylevel-1.6.29.1-5.el5.ppc.rpm | SHA-256: b65842777a0de716b82b8d1f8cfea2524e403ac6b843b7470cccb7ecff0a1b01 |
system-config-securitylevel-tui-1.6.29.1-5.el5.ppc.rpm | SHA-256: e02e7479b7510b4ef09a4e4f355f0391fe23f71cf7699daaa18a51000ec0eace |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
system-config-securitylevel-1.6.29.1-5.el5.src.rpm | SHA-256: 4dc2ed6eb773f84ee2f020f5934b42d08806e34a7c5f5cff11525fdccaad1ff4 |
x86_64 | |
system-config-securitylevel-1.6.29.1-5.el5.x86_64.rpm | SHA-256: afb56f03f2bd3ff8200ef3faa419a329e511eb5cae9ed37abe5af012935f7918 |
system-config-securitylevel-tui-1.6.29.1-5.el5.x86_64.rpm | SHA-256: 366ebb0bbd189f941a8d44e2d4bafd658084810d63835278af80e70a077df96b |
i386 | |
system-config-securitylevel-1.6.29.1-5.el5.i386.rpm | SHA-256: 3dc8d2dd95d03dcf352fb299472123f0958a7fa5ec00ae2be1fa036dd201fb5c |
system-config-securitylevel-tui-1.6.29.1-5.el5.i386.rpm | SHA-256: ca6315580db963ae239e70692074c65961c66ed7bf6afa77199dd513f91912fc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.