Red Hat Essential and Critical Security Patch Updates

Find the information you need for your favorite open source distribution .

RedHat: PostScript and PDF vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A local buffer overflow was found in gv version 3.5.8 and earlier. ggv versions 1.0.2 and earlier contain code derived from gv and therefore have the same vulnerability. An attacker can create a carefully crafted malformed PDF or PostScript file in such a way that when that file is viewed arbitrary commands can be executed.

RedHat: Bugzilla Vulnerabilities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bugzilla is a bug-tracking system from mozilla.org. There are approximately 9 vulnerabilities with Bugzilla. All users of Bugzilla are advised to upgrade to these errata packages containing Bugzilla version 2.14.3 which is not vulnerable to these issues.

RedHat: PHP mail vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PHP versions 4.0.5 through 4.1.0 in safe mode do not properly cleanse the 5th parameter to the mail() function. This vulnerability allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

RedHat: libpng buffer overflow

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Versions of libpng prior to 1.0.14 contain a buffer overflow in the progressive reader when the PNG datastream contains more IDAT data than indicated by the IHDR chunk. Such deliberately malformed datastreams would crash applications that are linked to libpng and that use the progressive reading feature.