Updated nuxwdog packages that fix one bug are now available for Red HatEnterprise Linux 7.

The nuxwdog packages provide a watchdog daemon that is used to start, stop, andmonitor system processes, as well as to prompt users for passwords whenrequired. Additionally, interfaces to the client code for various programminglanguages are included to allow clients to interact with the nuxwdog daemon.This update fixes the following bug:* When using the Dogtag Certificate System version 10, retrieving a storedpassword with the nuxwdog daemon previously caused the password not to becorrectly null-terminated. This update fixes the underlying code, and thepassword is null-terminated as expected in the described scenario. In addition,it is now possible to use nuxwdog to prompt for passwords for programs ordaemons started by the systemd service. (BZ#1216089)Users of nuxwdog are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server (v. 7)

SRPMS:
nuxwdog-1.0.1-11.el7_1.src.rpm
    MD5: 5a73b0a8254e3092476a5e1f121d3640SHA-256: 58afabc662501d953e80cdda7c02e2ceee5d6c3c6cd0671b8bd7912142f36dfa
 
x86_64:
nuxwdog-1.0.1-11.el7_1.i686.rpm
    MD5: 7e5a5a402e13dcdd99fec3e95f362649SHA-256: ef2d29949b61c561c5bddbcc343da16fd4c3ade7ab1ea208e3819c2370442891
nuxwdog-1.0.1-11.el7_1.x86_64.rpm
    MD5: 9a82b548404aaa9319f6b0fb915b527fSHA-256: 1749681ae5e3b7f0ea726bb8b5e91ad880dbabddc8252b7f00cd63fc5b975e31
nuxwdog-client-java-1.0.1-11.el7_1.x86_64.rpm
    MD5: ddd2d1686e9c55f5c8bd35a480c1d586SHA-256: 3a308a43ff0cd2f00df52c8e6713356d3ab3828ec90acd11cc8ef8ccf667a551
nuxwdog-debuginfo-1.0.1-11.el7_1.i686.rpm
    MD5: 9d048a988a99c85e8d8ba366932a8970SHA-256: 7adb8e53583b58677c76240bb314aa4f48c2668cd7dbaf99e038e0978fbf2e9b
nuxwdog-debuginfo-1.0.1-11.el7_1.x86_64.rpm
    MD5: a243f01c858caac2526f81f3fb3c5db5SHA-256: 3cb8334214a110dc1b20cb54dbfd7d91df1cd962f0455453224bb234a2365b27
nuxwdog-devel-1.0.1-11.el7_1.i686.rpm
    MD5: 79c749b6f9cc6186f8ea5230d3cb2d6dSHA-256: 4d8ef727ca69c1fead9e040387e26e7aba6f9b1ab2a476dbe4fe54556663b48a
nuxwdog-devel-1.0.1-11.el7_1.x86_64.rpm
    MD5: 6b5429a9ff598bd3e972df52cf329620SHA-256: 35f84c4bc0d374eafbc2fd2de375e951ce59bd0b677e779c06b425f58ab84418
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
nuxwdog-1.0.1-11.el7_1.src.rpm
    MD5: 5a73b0a8254e3092476a5e1f121d3640SHA-256: 58afabc662501d953e80cdda7c02e2ceee5d6c3c6cd0671b8bd7912142f36dfa
 
x86_64:
nuxwdog-1.0.1-11.el7_1.i686.rpm
    MD5: 7e5a5a402e13dcdd99fec3e95f362649SHA-256: ef2d29949b61c561c5bddbcc343da16fd4c3ade7ab1ea208e3819c2370442891
nuxwdog-1.0.1-11.el7_1.x86_64.rpm
    MD5: 9a82b548404aaa9319f6b0fb915b527fSHA-256: 1749681ae5e3b7f0ea726bb8b5e91ad880dbabddc8252b7f00cd63fc5b975e31
nuxwdog-client-java-1.0.1-11.el7_1.x86_64.rpm
    MD5: ddd2d1686e9c55f5c8bd35a480c1d586SHA-256: 3a308a43ff0cd2f00df52c8e6713356d3ab3828ec90acd11cc8ef8ccf667a551
nuxwdog-debuginfo-1.0.1-11.el7_1.i686.rpm
    MD5: 9d048a988a99c85e8d8ba366932a8970SHA-256: 7adb8e53583b58677c76240bb314aa4f48c2668cd7dbaf99e038e0978fbf2e9b
nuxwdog-debuginfo-1.0.1-11.el7_1.x86_64.rpm
    MD5: a243f01c858caac2526f81f3fb3c5db5SHA-256: 3cb8334214a110dc1b20cb54dbfd7d91df1cd962f0455453224bb234a2365b27
nuxwdog-devel-1.0.1-11.el7_1.i686.rpm
    MD5: 79c749b6f9cc6186f8ea5230d3cb2d6dSHA-256: 4d8ef727ca69c1fead9e040387e26e7aba6f9b1ab2a476dbe4fe54556663b48a
nuxwdog-devel-1.0.1-11.el7_1.x86_64.rpm
    MD5: 6b5429a9ff598bd3e972df52cf329620SHA-256: 35f84c4bc0d374eafbc2fd2de375e951ce59bd0b677e779c06b425f58ab84418
 
(The unlinked packages above are only available from the Red Hat Network)
1216089 – fixes for null termination needed, and allowing secrets retrieval post-init-phase

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply