- Issued:
- 2016-10-18
- Updated:
- 2016-10-18
RHBA-2016:2075 - Bug Fix Advisory
Synopsis
ricci bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ricci packages that fix one bug are now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Description
The ricci packages contain a daemon and a client for remote configuring and managing of clusters.
This update fixes the following bug:
- Prior to this update, the ricci daemon accepted deprecated and insecure TLS 1.0 and TLS 1.1 connections, which could lead to security issues. With this update, TLS 1.0 and TLS 1.1 connections are refused, thus fixing this bug. (BZ#1352935)
Users of ricci are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 6.7 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 6.7 i386
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 6.7 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 6.7 i386
- Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support 6.7 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 6.7
SRPM | |
---|---|
ricci-0.16.2-81.el6_7.2.src.rpm | SHA-256: ed7e89031ecd2d5753467be90482b85a9a0bc04d85f39d15b0442b2d6fff7e14 |
x86_64 | |
ccs-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: cb803a7a892c8b94b2a43df857c616d9c1be6a93b445a97e1bb2ba501fbbd192 |
ricci-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: 752ce708ce06390a5172f8d2b74d784c138d1899a77831d342cbb164078156d6 |
ricci-debuginfo-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: c81470bd1461ef3c62f7886f76175deb1ab33d2a0dcc4dcdd1e076b6ed0e6b67 |
i386 | |
ccs-0.16.2-81.el6_7.2.i686.rpm | SHA-256: 6510fc70e3670fcb62a1ac9ebf66911b3f1c2828f75c5d4e570e0fe829d85ba8 |
ricci-0.16.2-81.el6_7.2.i686.rpm | SHA-256: 4e0c829ae976a71ee8fa1c5c4d7a53b89f5563a6b4048a35dc7b69581e626263 |
ricci-debuginfo-0.16.2-81.el6_7.2.i686.rpm | SHA-256: 8144c9a1bcafbe5bbcd493a1a878dd8bfc0641d13f3b0f77ee57291a2e81b727 |
Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 6.7
SRPM | |
---|---|
ricci-0.16.2-81.el6_7.2.src.rpm | SHA-256: ed7e89031ecd2d5753467be90482b85a9a0bc04d85f39d15b0442b2d6fff7e14 |
x86_64 | |
ccs-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: cb803a7a892c8b94b2a43df857c616d9c1be6a93b445a97e1bb2ba501fbbd192 |
ricci-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: 752ce708ce06390a5172f8d2b74d784c138d1899a77831d342cbb164078156d6 |
ricci-debuginfo-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: c81470bd1461ef3c62f7886f76175deb1ab33d2a0dcc4dcdd1e076b6ed0e6b67 |
i386 | |
ccs-0.16.2-81.el6_7.2.i686.rpm | SHA-256: 6510fc70e3670fcb62a1ac9ebf66911b3f1c2828f75c5d4e570e0fe829d85ba8 |
ricci-0.16.2-81.el6_7.2.i686.rpm | SHA-256: 4e0c829ae976a71ee8fa1c5c4d7a53b89f5563a6b4048a35dc7b69581e626263 |
ricci-debuginfo-0.16.2-81.el6_7.2.i686.rpm | SHA-256: 8144c9a1bcafbe5bbcd493a1a878dd8bfc0641d13f3b0f77ee57291a2e81b727 |
Red Hat Enterprise Linux for SAP Solutions for x86_64 - Extended Update Support 6.7
SRPM | |
---|---|
ricci-0.16.2-81.el6_7.2.src.rpm | SHA-256: ed7e89031ecd2d5753467be90482b85a9a0bc04d85f39d15b0442b2d6fff7e14 |
x86_64 | |
ccs-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: cb803a7a892c8b94b2a43df857c616d9c1be6a93b445a97e1bb2ba501fbbd192 |
ricci-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: 752ce708ce06390a5172f8d2b74d784c138d1899a77831d342cbb164078156d6 |
ricci-debuginfo-0.16.2-81.el6_7.2.x86_64.rpm | SHA-256: c81470bd1461ef3c62f7886f76175deb1ab33d2a0dcc4dcdd1e076b6ed0e6b67 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.