Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updated kernel packages that fix a remote denial of service vulnerability in the TCP/IP stack, and a local privilege vulnerability, are now available.
Updated xinetd packages that fix a security vulnerability are now avaliable.
KDE fails in multiple places to properly quote URLs and file names before passing them to a command shell.
These vulnerabilitiesallow remote attackers to run arbitrary commands as the user under whichthe Web server is running.
Updated MySQL server packages fix both a double-free securityvulnerability and a root exploit security vulnerability.
Versions of man before 1.51 have a bug where a malformed man file can cause a program named "unsafe" to be run.
Updated MySQL server packages fix both a double-free security vulnerability and a root exploit security vulnerability.
Updated zlib packages are now available which fix a buffer overflow vulnerability.
Updated mICQ packages are available for Red Hat Linux versions 7.2 and 7.3 that fix a remote crash.
Updated LPRng packages resolving a temporary file vulnerability are now available.
Multiple vulnerabilities have been found which affect versions of SquirrelMail shipped with Red Hat Linux 8.0 and Red Hat Linux 9.
Updated ethereal packages are now available which fix a format string bug and a heap-based buffer overflow.
Updated tcpdump, libpcap, and arpwatch packages are available, fixing a number of vulnerabilities that could be used to cause a denial of service attack, or possibly execute arbitrary code.
GtkHTML supplied with versions of Evolution prior to 1.2.4 contain a bug when handling HTML messages.
Updated glibc packages are available to fix an integer overflow in the XDR decoder.
An updated version of the RHN Notification Tool is now available to fix several UI and behavior bugs, as well as a memory leak.
Updated httpd packages which fix a number of security issues arenow available for Red Hat Linux 8.0 and 9.
The kernel package version 2.4.20-6 has a security hole in ptrace. Using USB CD-ROMs on some ServerWorks systems can hang older versions of the kernel.
A security vulnerability has been found in versions of Samba up to and including 2.2.8.
Unpatched versions of mgetty prior to 1.1.29 would overflow an internal buffer if the caller name reported by the modem was too long.