Synopsis: Low: openhpi security, bug fix, and enhancement update
Advisory ID: SLSA-2015:2369-1
Issue Date: 2015-11-19
CVE Numbers: CVE-2015-3248
—
It was found that the “/var/lib/openhpi” directory provided by OpenHPI
used world-writeable and world-readable permissions. A local user could
use this flaw to view, modify, and delete OpenHPI-related data, or even
fill up the storage device hosting the /var/lib directory. (CVE-2015-3248)
The openhpi packages have been upgraded to upstream version 3.4.0, which
provides a number of bug fixes and enhancements over the previous version.
This update also fixes the following bug:
* Network timeouts were handled incorrectly in the openhpid daemon. As a
consequence, network connections could fail when external plug-ins were
used. With this update, handling of network socket timeouts has been
improved in openhpid, and the described problem no longer occurs.
—
SL7
x86_64
openhpi-3.4.0-2.el7.i686.rpm
openhpi-3.4.0-2.el7.x86_64.rpm
openhpi-debuginfo-3.4.0-2.el7.i686.rpm
openhpi-debuginfo-3.4.0-2.el7.x86_64.rpm
openhpi-libs-3.4.0-2.el7.i686.rpm
openhpi-libs-3.4.0-2.el7.x86_64.rpm
openhpi-devel-3.4.0-2.el7.i686.rpm
openhpi-devel-3.4.0-2.el7.x86_64.rpm
– Scientific Linux Development Team