Skip to navigation

Security Advisory New up2date available with updated SSL certificate authority file

Advisory: RHSA-2003:267-10
Type: Security Advisory
Severity: N/A
Issued on: 2003-08-29
Last updated on: 2003-08-29
Affected Products: Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
Red Hat Linux 9

Details

New versions of the up2date and rhn_register clients are available and
are required for continued access to Red Hat Network.

The rhn_register and up2date packages contain the software necessary to
take advantage of Red Hat Network functionality.

This erratum includes an updated RHNS-CA-CERT file, which contains a new CA
certificate. This new certificate is needed so that up2date can continue
to communicate with Red Hat Network after 28 August 2003. Without this
updated certificate, users will see SSL Connection Errors reported by
up2date or rhn_register.

All users must upgrade to these erratum packages in order to continue to
use Red Hat Network. This includes both interactive use of up2date, as
well as actions scheduled by the RHN website.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Because the previous Certificate Authority has expired, up2date will
present 'SSL Certificate Errors' if you attempt to use it to apply this
errata. Therefore, this update cannot be applied directly with up2date and
instead must be applied as indicated above.

In addition to the Red Hat FTP site, the latest versions of up2date and
rhn_register are also available at

https://rhn.redhat.com/help/latest-up2date.pxt

For users who would prefer to install the new certificate directly, it is
available at:

https://rhn.redhat.com/help/ssl_cert.pxt

Updated packages

Red Hat Linux 7.1

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-1.7.1/SRPMS/up2date-2.8.40-1.7.1.src.rpm
Missing file
    MD5: b67ea5065c3115d523e17561aac5cb7c
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-1.7.1/i386/up2date-2.8.40-1.7.1.i386.rpm
Missing file
    MD5: 71f2f6e4bfcdee8f4f46ef037c7a1c8d
ftp://updates.redhat.com/rhn/repository/NULL/up2date-gnome/2.8.40-1.7.1/i386/up2date-gnome-2.8.40-1.7.1.i386.rpm
Missing file
    MD5: 2205d1e5832dbb67d60103104eb59fec
 
Red Hat Linux 7.2

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-2.7.2/SRPMS/up2date-2.8.40-2.7.2.src.rpm
Missing file
    MD5: 3deea256b106e71ee6d5890639d872b3
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-2.7.2/i386/up2date-2.8.40-2.7.2.i386.rpm
Missing file
    MD5: 21bc8e1f03e9f28590d46df60a9458b5
ftp://updates.redhat.com/rhn/repository/NULL/up2date-gnome/2.8.40-2.7.2/i386/up2date-gnome-2.8.40-2.7.2.i386.rpm
Missing file
    MD5: 3d3d7c6dca73d521a0f541b859f13eb3
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-2.7.2/ia64/up2date-2.8.40-2.7.2.ia64.rpm
Missing file
    MD5: ac5161a5bbe122896eccbc312bef9273
ftp://updates.redhat.com/rhn/repository/NULL/up2date-gnome/2.8.40-2.7.2/ia64/up2date-gnome-2.8.40-2.7.2.ia64.rpm
Missing file
    MD5: c789fbf88d7faf82504eb4189b767f90
 
Red Hat Linux 7.3

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-3.7.3/SRPMS/up2date-2.8.40-3.7.3.src.rpm
Missing file
    MD5: 23d8868920cb7df21925669f04fb2ad2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/2.8.40-3.7.3/i386/up2date-2.8.40-3.7.3.i386.rpm
Missing file
    MD5: 3643d7774d7e60a1aeb79c8fecbf624c
ftp://updates.redhat.com/rhn/repository/NULL/up2date-gnome/2.8.40-3.7.3/i386/up2date-gnome-2.8.40-3.7.3.i386.rpm
Missing file
    MD5: 89977334ec0d3a2a720c3303602fc8dd
 
Red Hat Linux 8.0

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/3.0.7.2-1/SRPMS/up2date-3.0.7.2-1.src.rpm
Missing file
    MD5: 17ad92db4579d046d84c84a16784ba98
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/3.0.7.2-1/i386/up2date-3.0.7.2-1.i386.rpm
Missing file
    MD5: 15bc5dc918916bca3a5c29148979716e
ftp://updates.redhat.com/rhn/repository/NULL/up2date-gnome/3.0.7.2-1/i386/up2date-gnome-3.0.7.2-1.i386.rpm
Missing file
    MD5: 1ae89cf79880f3bc5de7b86eb1d47a2b
 
Red Hat Linux 9

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/3.1.23.2-1/SRPMS/up2date-3.1.23.2-1.src.rpm
Missing file
    MD5: b8a5b2d548869a846cbaf373f3637555
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/up2date/3.1.23.2-1/i386/up2date-3.1.23.2-1.i386.rpm
Missing file
    MD5: 3faabcb9cc610627fe378b88d0b2b928
ftp://updates.redhat.com/rhn/repository/NULL/up2date-gnome/3.1.23.2-1/i386/up2date-gnome-3.1.23.2-1.i386.rpm
Missing file
    MD5: 733d0aca17c15af0b1fa709ba86337dc
 

Keywords

Hat, Network, Red, rhn_register, up2date


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/