Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updated PostgreSQL packages that correct a buffer overflow in the to_asciiroutines are now available.
Updated Ethereal packages that fix a number of exploitable security issuesare now available.
Paul Mitcheson reported a situation where the CUPS Internet PrintingProtocol (IPP) implementation in CUPS versions prior to 1.1.19 would getinto a busy loop.
Georgi Guninski discovered a memory starvation denial of servicevulnerability in the ls program.
Updated CUPS packages that fix a problem where CUPS can hang are now available.
Passwords for MySQL users are stored in the Password field of theuser table. Under this bug, a Password field with a value greater than 16characters can cause a buffer overflow
The IP address of the remote host is only checked after the firstcommunication occurs, causing saned.conf restrictions to be ineffective forthe first communication.
Updated Perl packages that fix a security issue in Safe.pm and a cross-sitescripting (XSS) vulnerability in CGI.pm are now available.
An SSL/TLS testing suite developed by the NISCC (UK National Infrastructure Security Co-Ordination Centre) uncovered ASN.1 parsing vulnerabilities in OpenSSL. Exploitation of these vulnerabilities may result in a denial of service.
Updated Perl packages that fix a security issue in Safe.pm and a cross-sitescripting (XSS) vulnerability in CGI.pm are now available.
Updated Apache and mod_ssl packages that fix several minor security issuesare now available for Red Hat Linux 7.1, 7.2, and 7.3.
Updated Sendmail packages that fix a potentially-exploitable vulnerabilityare now available. The sucessful exploitation of this bug can leadto heap and stack structure overflows.
Updated packages are now available to fix additional buffer manipulationproblems which were fixed in OpenSSH 3.7.1.
Updated KDE packages that resolve a local security issue with KDM PAMsupport and weak session cookie generation are now available.
A bug has been found in OpenSSH's buffer handling where a buffer could be marked as grown when the actual reallocation failed.
A buffer overflow exists in the way unpatched versions of Pine prior to4.57 handle the 'message/external-body' type.
Alan Cox discovered that certain malformed messages could causethe Evolution mail component to crash due to a null pointer dereference inthe GtkHTML library.
Updated httpd packages that fix several minor security issues are nowavailable for Red Hat Linux 8.0 and 9.
New versions of the up2date and rhn_register clients are available andare required for continued access to Red Hat Network.
Updated Sendmail packages are available to fix a vulnerability in thehandling of DNS maps