Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
When configured to use X.509 certificates to authenticate remote hosts, psec-tools versions 0.3.3 and earlier will attempt to verify that host certificate, but will not abort the key exchange if verification fails.
A malicious WAV file could cause arbitrary code to be executed when the file was played or converted.
The Samba team discovered a buffer overflow in the code used to support the 'mangling method = hash' smb.conf option.
Updated samba packages that fix buffer overflows, as well as other variousbugs, are now available.
Patch resolves memory_limit bug with allows execution of arbitrary code and strip_tags bug which allows XSS (Cross Site Scripting).
Updated httpd packages that fix a buffer overflow in mod_ssl and a remotely triggerable memory leak are now available.
Using NFS, a user could make unauthrized changes to files' GID.
Using NFS, a user could make unauthrized changes to files' GID.
This contains two similar advisories, once set fixing RHEE 3, and the other RHEE 2.1. Patch addresses two DoS attacks and several vulnerable drivers.
Updated libpng packages that fix a possible buffer overflow are now available.
Updated httpd and mod_ssl packages that fix minor security issues in the Apache Web server are now available for Red Hat Enterprise Linux 2.1.
If Tripwire is configured to send reports via email, a local user could gain privileges by creating a carefully crafted file.
This patch resolves cross-site scripting and SQL injection vulnerabilities.
If Squid is configured to use the NTLM authentication helper, a remote attacker could potentially execute arbitrary code by sending a lengthy password.
Updated Kerberos 5 (krb5) packages which correct buffer overflows in the krb5_aname_to_localname function are now available.
Patch fixes a buffer overflow plus several denail of service vulnerabilities
Updated cvs packages that fix remote denial of service vulnerabilities are now available. (This is a legacy Red Hat fix, released by the Fedora Project).
Upon receiving specially crafted ISAKMP packets, TCPDUMP would crash.
Ulf Harnhammar discovered two stack buffer overflows and two directory traversal flaws in LHA.