Fedora Essential and Critical Security Patch Updates - Page 897
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A local user could exploit this vulnerability to gain "slocate" group privileges and then read the entire slocate database.
This package fixes CAN-2004-0078, where a specifc message could cause mutt to crash.
update CAN-2003-1023 fix to still make vfs symlinks relative, but with bounds checking
Multiple security vulnerabilities may allow attackers to make Ethereal crash using intentionally malformed packets.
If the victim uses tcpdump, attack could result in a denial of service, or possibly execute arbitrary code as the 'pcap' user.
Vulnerabilities allow cvs to write to root filesystem and retain root privileges.
Updated screen packages are now available that fix a security vulnerability which may allow privilege escalation for local users.
A local user could exploit this vulnerability to gain "slocate" group privileges and then read the entire slocate database.
This update includes the latest stable release of Apache httpd 2.0,including a fix for the security issue CVE CAN-2003-0542, a bufferoverflow in the parsing of configuration files.
Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux kernel versions 2.4.23 and previous which may allow a local attacker to gain root privileges.
Both vulnerabilities will make the Ethereal application crash. The Q.931 vulnerability also affects Tethereal. It is not known if either vulnerability can be used to make Ethereal or Tethereal run arbitrary code.
An attacker could create a carefully crafted directory on a websitesuch that, if a user connects to that directory using the lftp clientand subsequently issues a 'ls' or 'rels' command, the attacker couldexecute arbitrary code on the users machine.
Phong Nguyen identified a severe bug in the way GnuPG creates anduses ElGamal keys, when those keys are used both to sign and encryptdata. This vulnerability can be used to trivially recover theprivate key.
XBoard 4.2.6 and older contains a script which writes to a file in /tmp with a predictable filename. Malicious users could use this vulnerability to force XBoard users to overwrite any file writableby them.
A heap overflow bug exists in rsync versions prior to 2.5.7. Onmachines where the rsync server has been enabled, a remote attackercould use this flaw to execute arbitrary code as an unprivileged user.
The kernel shipped with Fedora Core 1 was vulnerable to a bug in theerror return on a concurrent fork() with threaded exit() which could beexploited by a user level program to crash the kernel.
These updated ethereal packages fix a security problem found in versions prior to 0.9.16. It also fixes several other minor bugs and problems.