Updated chkconfig packages that fix one bug are now available for Red HatEnterprise Linux 6.

The basic system utility chkconfig updates and queries runlevel information forsystem services.This update fixes the following bug:* Previously, when the chkconfig utility modified a file in the /etc/xinetd.d/directory, it set the file permissions to “644” and the SELinux context to”root:object_r:etc_t”. Such permissions, however, do not adhere to the DefenseInformation Systems Agency’s (DISA) Security Technical Implementation Guide(STIG), which requires files in /etc/xinetd.d/ to be unreadable by other users.With this update, chkconfig ensures that the xinetd files it modifies have the”600″ permissions and the correct SELinux context is preserved. (BZ#965103)Users of chkconfig are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
chkconfig-1.3.49.3-5.el6.src.rpm
    MD5: bdd0f3dc98d7e667b1304193ff09ca47SHA-256: 15316376d91e68b1578b767de1c8c35cc0f52ae3d4db7623f20ec7b8e0fea6d0
 
IA-32:
chkconfig-1.3.49.3-5.el6.i686.rpm
    MD5: 6ca1f8c81144dc2541bf491544cd9f50SHA-256: 58443d8e65e68807408b477d4cf157e3431645f6779971481024c0ab2f76fd08
chkconfig-debuginfo-1.3.49.3-5.el6.i686.rpm
    MD5: b0a6ee533cfc1967d7b7ce111b042a98SHA-256: 4758bf30fc30f87227415bed127a664459a29f665c6473aac23ea2e7cdba9a6b
ntsysv-1.3.49.3-5.el6.i686.rpm
    MD5: 3b745cc7e25ba4950b8514633a2f1574SHA-256: 9081e45ba14347c84123342c8838acdcac8aba5abc18d22b0247ad8a5b4da4a8
 
x86_64:
chkconfig-1.3.49.3-5.el6.x86_64.rpm
    MD5: a1cf9a10881e5faf518d6f9a65067a8fSHA-256: d9337259dcd899ba9098196250f497a432d440d1fab82b6e543990e423903957
chkconfig-debuginfo-1.3.49.3-5.el6.x86_64.rpm
    MD5: 5bd26d33c7cf20d8f3b34ece6db8a4b6SHA-256: ff4b81d2a92acecf46247cae8ea05675b6679003b7d08ff1df2d9b5833de4aa9
ntsysv-1.3.49.3-5.el6.x86_64.rpm
    MD5: 7da2d9810ff8084051ec1780f9f17ba3SHA-256: 66604ccbe3d7411077eeed048cb9db6ce8574db6a96f5f87055ded7dcac7c9e7
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
chkconfig-1.3.49.3-5.el6.src.rpm
    MD5: bdd0f3dc98d7e667b1304193ff09ca47SHA-256: 15316376d91e68b1578b767de1c8c35cc0f52ae3d4db7623f20ec7b8e0fea6d0
 
x86_64:
chkconfig-1.3.49.3-5.el6.x86_64.rpm
    MD5: a1cf9a10881e5faf518d6f9a65067a8fSHA-256: d9337259dcd899ba9098196250f497a432d440d1fab82b6e543990e423903957
chkconfig-debuginfo-1.3.49.3-5.el6.x86_64.rpm
    MD5: 5bd26d33c7cf20d8f3b34ece6db8a4b6SHA-256: ff4b81d2a92acecf46247cae8ea05675b6679003b7d08ff1df2d9b5833de4aa9
ntsysv-1.3.49.3-5.el6.x86_64.rpm
    MD5: 7da2d9810ff8084051ec1780f9f17ba3SHA-256: 66604ccbe3d7411077eeed048cb9db6ce8574db6a96f5f87055ded7dcac7c9e7
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
chkconfig-1.3.49.3-5.el6.src.rpm
    MD5: bdd0f3dc98d7e667b1304193ff09ca47SHA-256: 15316376d91e68b1578b767de1c8c35cc0f52ae3d4db7623f20ec7b8e0fea6d0
 
IA-32:
chkconfig-1.3.49.3-5.el6.i686.rpm
    MD5: 6ca1f8c81144dc2541bf491544cd9f50SHA-256: 58443d8e65e68807408b477d4cf157e3431645f6779971481024c0ab2f76fd08
chkconfig-debuginfo-1.3.49.3-5.el6.i686.rpm
    MD5: b0a6ee533cfc1967d7b7ce111b042a98SHA-256: 4758bf30fc30f87227415bed127a664459a29f665c6473aac23ea2e7cdba9a6b
ntsysv-1.3.49.3-5.el6.i686.rpm
    MD5: 3b745cc7e25ba4950b8514633a2f1574SHA-256: 9081e45ba14347c84123342c8838acdcac8aba5abc18d22b0247ad8a5b4da4a8
 
PPC:
chkconfig-1.3.49.3-5.el6.ppc64.rpm
    MD5: 645f9fdfe75cb7fc1a1aa140688c8519SHA-256: 3301da7abbde61a16f77aebfc5152f061303efd5c4685e6c51f38202917732fa
chkconfig-debuginfo-1.3.49.3-5.el6.ppc64.rpm
    MD5: 1ae2b5563b1135bc5c6d9b45913ebc33SHA-256: 436183ab5700a271638ec12b3e4cbe7be311b5844294910aa773c862a747adde
ntsysv-1.3.49.3-5.el6.ppc64.rpm
    MD5: f5a6b2c8dcc71e2a2fcf40b25dad0c82SHA-256: f11b05ca33edd0a657fc6e228d6543376062381553754d3ee90803e3e054de3a
 
s390x:
chkconfig-1.3.49.3-5.el6.s390x.rpm
    MD5: 05730f2c475994a4b4f6d47b2c2a256bSHA-256: dae9f8c080addb22047e4e68d5c4ac96c029301a32cf0fe0d12b628b692b2560
chkconfig-debuginfo-1.3.49.3-5.el6.s390x.rpm
    MD5: d1bd1af57d89b032092bf9b7ab10c972SHA-256: ea6b6828c426550853b8206dfe82d4efa5002eca4d37132e03cfea30836cf219
ntsysv-1.3.49.3-5.el6.s390x.rpm
    MD5: a4647e759441121c480402555790e7b8SHA-256: bffe55005a75598c8c269f454bcaea22bfd3b36878174bdc7073bf203087f564
 
x86_64:
chkconfig-1.3.49.3-5.el6.x86_64.rpm
    MD5: a1cf9a10881e5faf518d6f9a65067a8fSHA-256: d9337259dcd899ba9098196250f497a432d440d1fab82b6e543990e423903957
chkconfig-debuginfo-1.3.49.3-5.el6.x86_64.rpm
    MD5: 5bd26d33c7cf20d8f3b34ece6db8a4b6SHA-256: ff4b81d2a92acecf46247cae8ea05675b6679003b7d08ff1df2d9b5833de4aa9
ntsysv-1.3.49.3-5.el6.x86_64.rpm
    MD5: 7da2d9810ff8084051ec1780f9f17ba3SHA-256: 66604ccbe3d7411077eeed048cb9db6ce8574db6a96f5f87055ded7dcac7c9e7
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
chkconfig-1.3.49.3-5.el6.src.rpm
    MD5: bdd0f3dc98d7e667b1304193ff09ca47SHA-256: 15316376d91e68b1578b767de1c8c35cc0f52ae3d4db7623f20ec7b8e0fea6d0
 
IA-32:
chkconfig-1.3.49.3-5.el6.i686.rpm
    MD5: 6ca1f8c81144dc2541bf491544cd9f50SHA-256: 58443d8e65e68807408b477d4cf157e3431645f6779971481024c0ab2f76fd08
chkconfig-debuginfo-1.3.49.3-5.el6.i686.rpm
    MD5: b0a6ee533cfc1967d7b7ce111b042a98SHA-256: 4758bf30fc30f87227415bed127a664459a29f665c6473aac23ea2e7cdba9a6b
ntsysv-1.3.49.3-5.el6.i686.rpm
    MD5: 3b745cc7e25ba4950b8514633a2f1574SHA-256: 9081e45ba14347c84123342c8838acdcac8aba5abc18d22b0247ad8a5b4da4a8
 
x86_64:
chkconfig-1.3.49.3-5.el6.x86_64.rpm
    MD5: a1cf9a10881e5faf518d6f9a65067a8fSHA-256: d9337259dcd899ba9098196250f497a432d440d1fab82b6e543990e423903957
chkconfig-debuginfo-1.3.49.3-5.el6.x86_64.rpm
    MD5: 5bd26d33c7cf20d8f3b34ece6db8a4b6SHA-256: ff4b81d2a92acecf46247cae8ea05675b6679003b7d08ff1df2d9b5833de4aa9
ntsysv-1.3.49.3-5.el6.x86_64.rpm
    MD5: 7da2d9810ff8084051ec1780f9f17ba3SHA-256: 66604ccbe3d7411077eeed048cb9db6ce8574db6a96f5f87055ded7dcac7c9e7
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply