Fedora Essential and Critical Security Patch Updates - Page 887
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updated tcpdump packages that fix multiple security vulnerabilities are now available.
Updated cadaver packages that fix multiple security vulnerability are now available.
This release fixes reconfig mode for system-config-display for Fedora Core 2.
This update fixes a denial of service problem causing loss of browse services. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0558 to this issue.
This package updates VNC to the latest released version, 4.0. It also fixes several bugs not fixed upstream.
This update includes the latest stable release of Subversion, including a security fix for information disclosure bugs in handling of metadata (such as log messages) in repositories using mod_authz_svn for path-based access-control (CAN-2004-0749).
This update includes the latest stable release of Apache httpd 2.0, including fixes for possible denial of service issues in mod_ssl (CAN-2004-0751, CAN-2004-0747) and mod_dav_fs (CAN-2004-0809), and a privilege elevation attack for local users (CAN-2004-0747).
The previous update for the gtk2 contained a bug which breaks image thumbnailing in Nautilus. This update fixes the problem.
Sebastian Krahmer reported a bug in the cupsomatic and foomatic-rip print filters, used by the CUPS print spooler. An attacker who has printing access could send a carefully named file to the print server causing arbitrary commands to be executed as root.
Testing using the Codenomicon HTTP Test Tool performed by the ApacheSoftware Foundation security group and Red Hat uncovered an inputvalidation issue in the IPv6 URI parsing routines in the apr-utillibrary.
Testing using the Codenomicon HTTP Test Tool performed by the ApacheSoftware Foundation security group and Red Hat uncovered an inputvalidation issue in the IPv6 URI parsing routines in the apr-utillibrary.
Several heap overflow vulnerabilities have been found in the imlib BMPimage handler. An attacker could create a carefully crafted BMP file insuch a way that it would cause an application linked with imlib toexecute arbitrary code when the file was opened by a victim.
Anyone who has manually suid /usr/bin/cdrecord should update to this version.
Anyone who has manually suid /usr/bin/cdrecord should update to this version.