Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updated packages are available to fix issues encountered with the previous errata packages.
Xinetd contains a denial-of-service (DoS) vulnerability.UPDATE 2002-12-02: Updated packages are available to fix issues encounteredwith the previous errata packages.
The kernel in Red Hat Linux 6.2 and 7 is vulnerable to a local denial of service attack.
There was a bug in the length checking for encrypted password change requests from clients.
The kernel in Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 are vulnerable toa local denial of service attack. Updated packages are available whichaddress this vulnerability, as well as bugs in several drivers.
Versions of Red Hat Linux since 7.1, and Red Hat Linux Advanced Servershipped with BIND 9 are are therefore not vulnerable to these issues.
PHP versions up to and including 4.2.2 contain vulnerabilities in the mail()function allowing local script authors to bypass safe mode restrictionsand possibly allowing remote attackers to insert arbitrary mail headers andcontent into the message.
A remotely exploitable stack buffer overflow has been found in the Kerberos v4 compatibility administration daemon distributed with the Red Hat Linux krb5 packages.
These are the updated glibc packages are available to fix a buffer overflow in the resolver.
When someone requests a map that doesn't exist, a previous mapname may be leaked. Repeated runs will result in the yp server using more and more memory, and running more slowly. It could also result in ypserv being killed due to the system being out of memory.
Updated kernel fixes local security issues and provides several updated drivers to support newer hardware and fix bugs under Red Hat Linux 7.3.
A new errata kernel based on the 2.4.18 kernel is available for Red Hat Linux 7.1 and Red Hat Linux 7.2 users. This is a major version change compared to the previous errata kernel for these releases (2.4.9-34).
Versions of Mozilla previous to version 1.0.1 contain various security vulnerabilities.
dvips contains a vulnerability allowing print users to execute arbitrary commands.
Two Cross-site scripting vulnerabilities have been found that affect SquirrelMail version 1.2.7 and earlier.
Updated packages for gv and ggv fix a local buffer overflow when reading malformed PDF or PostScript(R) files.
Updated packages for analog are available which fix a cross-site scripting problem and a denial of service problem.
Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links such as SLIP and PPP connections. Two bugs have been found in Fetchmail prior to 6.1.0.
Updated tcpdump, libpcap, and arpwatch packages are available for RedHat Linux 6.2 and 7.x. These updates close a buffer overflow when handlingNFS packets.