Fedora Essential and Critical Security Patch Updates - Page 896
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
An updated utempter package that fixes a potential symlink vulnerability is now available.
This is a backport of an older patch which prevented crafted URLs from being able to ignore Squid's ACLs.
This patch fixes vulnerabilities that may allow execution of arbitrary code, as well as other bugfixes.
This patch fixes a variety of buffer overflow and information leak vulnerabilities.
This update includes OpenSSL packages to fix two security issues affecting OpenSSL 0.9.7a which allow denial of service attacks.
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code.
A cross-site scripting bug in the 'create' CGI script affects versionsof Mailman 2.1 before 2.1.3.
Crafted packets could result in a denial of service, or possibly execute arbitrary code as the 'pcap' user.
Rollup rpms fix recently reported kernel vulnerabilities in Red Hat 7.2-8.
Carefully crafted packets can cause denial of service in tcpdump, or execute code as 'pcap' user.
Using carefully crafted messages, an attacker can bring about denial of service.
Updated libxml2 packages are available to fix an overflow when parsing the URI for remote resources.
The previous security errata (2.4.22-1.2173) unfortunatly contained a bug which made some systems unbootable, due to breakage in the aacraid scsi driver.
Paul Starzetz discovered a flaw in return value checking in mremap() in the Linux kernel versions 2.4.24 and previous that may allow a local attacker to gain root privileges.
Under some circumstances, Samba 3.0.0 and 3.0.1 could overwrite the password field of a disabled account with uninitialized memory.
This version corrects a flaw in 0.9.2 (and all earlier versions of the server) which may allow an attacker to DoS the server.
This update fixes recent gaim security problems as discussed on both the gaim web site and was addressed by a recent Red Hat errata.
Updated XFree86 packages that fix a privilege escalation vulnerability arenow available.