acpid-1.0.4-9.1.1AXS3
エラータID: AXSA:2009-429:03
Release date:
Wednesday, December 9, 2009 - 13:49
Subject:
acpid-1.0.4-9.1.1AXS3
Affected Channels:
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity:
High
Description:
acpid is a daemon that dispatches ACPI events to user-space programs.
Security issues fixed with this release:
CVE-2009-4033
No information available at the time of writing, see the CVE link below.
Other fixed bugs:
- start acpid before hal
- Updated the License entry
Solution:
Update packages.
CVEs:
CVE-2009-4033
A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.
A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.
Additional Info:
N/A
Download:
SRPMS
- acpid-1.0.4-9.1.1AXS3.src.rpm
MD5: dd1417201b5e73de9b592f18f10a3a5b
SHA-256: 38e9a0a7b780b1d04cdaea5bc522e53306a29c2efe2bd4d61aba75bd947e4536
Size: 37.91 kB
Asianux Server 3 for x86
- acpid-1.0.4-9.1.1AXS3.i386.rpm
MD5: 2a0ce5ab60fececc1b8a96f9daf36cc8
SHA-256: 0b2bd2b4c2cba89b9f0fe70cac7290da0533472254eeb0755fc30b8bee6c50d0
Size: 24.26 kB
Asianux Server 3 for x86_64
- acpid-1.0.4-9.1.1AXS3.x86_64.rpm
MD5: ef2b7666889ab3fca1e6c6b9fc437f56
SHA-256: 270095d5265b4cc8c667d09b87d29364f2e974637b6a31008dd2264e0616bf3f
Size: 24.88 kB