Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updated Gnome-lokkit packages fix missing FORWARD ruleset in Red Hat Linux 8.0.
Updated file packages are available to close a buffer overflow vulnerability.
This update fixes a timing-based attack on CBC cipher suites used in SSL and TLS which OpenSSL was found to be vulnerable to.
Two vulnerabilities have been found that affect versions of SquirrelMail shipped with Red Hat Linux 8.0.
New im packages are available that fix the insecure handling of temporary files.
Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now available that fix a deadlock with the tg3 driver on certain revisions of the Broadcom 570x gigabit ethernet series.
Updated Sendmail packages are available to fix a vulnerability thatmay allow remote attackers to gain root privileges by sending acarefully crafted message.
Updated vte packages that fix a vulnerability in gnome-terminal are available for Red Hat Linux 8.0.
Updated VNC packages are available to fix a challenge replay vulnerability and a weak cookie vulnerability.
Updated shadow-utils packages correct a bug that caused the useradd tool to create mail spools with incorrect permissions.
A race condition in the recursive use of 'rm' and 'mv' in fileutils <=4.1 could allow local users to delete files and directories (as the user running fileutils).
Andreas Beck discovered that versions of pam_xauth supplied with Red Hat Linux since version 7.1 would forward authorization information from the root account to unprivileged users.
An insecure use of a temporary file has been found in Python. This erratumprovides updated Python packages.
Updated lynx packages are available that fix an error in the way lynxparses its command line arguments, which can lead to faked headers beingsent to a web server.
An updated kernel-utils package is available that removes the setuid bits incorrectly assigned to the uml_net binary.
Updated Xpdf packages are now available that fix a vulnerability in which a maliciously-crafted pdf document could run arbitrary code.
Al Viro found a buffer overflow in Window Maker 0.80.0 and earlier which may allow remote attackers to execute arbitrary code via a certain image file that is not properly handled when Window Maker uses width and height information to allocate a buffer.
In an audit of OpenLDAP by SuSE, a number of potential security issues were found.
A heap-based buffer overflow was found in the wordwrap() function in PHP versions after 4.1.2 and before 4.3.0.