Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A vulnerabilitiy in unzip version 5.50 and earlier allows attackers to overwrite arbitrary files during archive extraction by placing invalid (non-printable) characters between two "." characters.
Since the last XFree86 update for Red Hat Linux 7.1 and 7.2, a number of security vulnerabilities have been found and fixed.
There are multiple vulnerabilities in XFree86.
A vulnerability has been discovered in the ypserv NIS server prior to version 2.7.
Updated Netscape 4.8 packages fixing various bugs and vulnerabilities arenow available.
Updated Xpdf packages are available that fix a vulnerability where amalicious PDF document could run arbitrary code.
We have retracted two bug fix advisories that affected only the S/390 architecture of Red Hat Linux 7.2.
Updated KDE packages that resolve a vulnerability in KDE's SSL implementation are now available.
A buffer overflow in kon2 allows local users to obtain root privileges.
Several security issues have been found that affect the Linux kernel. This update also fixes some driver issues.
These packages fix a ptrace-related vulnerability that can lead to elevated (root) privileges.
A flaw in unpatched versions of Ghostscript before 7.07 allows malicious postscript files to execute arbitrary commands even with -dSAFER enabled.
A bug in Apache 2.0 through 2.0.45 allows remote attackers to cause a denial of service, and may allow execution of arbitrary code.
A ptrace-related vulnerability has been discovered that could allow a local user to gain elevated (root) privileges without authorization.
This release also includes an updated RHNS-CA-CERT file, which contains an additional CA certificate. This is needed so that up2date can continue to communicate with Red Hat Network once the current CA certificate reaches its August 2003 expiration date.
Phil D'Amore of Red Hat discovered a vulnerability in the CUPS IPP implementation.
Updated gnupg packages correcting a bug in the GnuPG key validation functions are now available.
A bug has been found in versions of lv that read a .lv file in the current directory. Local attackers can use this to place an .lv file in any directory to which they have write access.
Updated tcpdump packages that correctly drop privileges on startup are now available.