Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Multiple fixes have been made to the previous advisory released.
Updated imlib packages are now available for Red Hat Linux 6.2, 7,7.1 and 7.2 which fix potential problems loading untrusted images.
A buffer overflow in the ippRead function of CUPS before version 1.1.14 mayallow attackers to execute arbitrary code via long attribute names orlanguage values.
Updated secureweb packages are now available for Red Hat Secure Web Server3.2 (U.S.). These updates close a buffer overflow in mod_ssl.
This vulnerability makes it easy to perform various denial-of-service attacks against such programs. It is also possible that an attacker could manage a more significant exploit, such as running arbitrary code on the affected system.
This vulnerability makes it easy to perform various denial-of-service attacks against such programs. It is also possible that an attacker could manage a more significant exploit, such as running arbitrary code on the affected system.
Updated openssh packages are now available for Red Hat Linux 7, 7.1, and7.2 which close a remotely-exploitable vulnerability in sshd.
Updated mod_ssl packages for Red Hat Linux 7, 7.1, and7.2 are available which close a buffer overflow in mod_ssl.
Various vulnerabilities have been found in CistronRADIUS as well as other RADIUS servers and clients.In versions of Cistron RADIUS 1.6.5 and earlier, malformed packets could beused to gain additional privileges.
Updated PHP packages are available to fix vulnerabilities in the functionsthat parse multipart MIME data, which are used when uploading filesthrough forms.
The Linux Netfilter team has found a problem in the "IRC connectiontracking" component of the firewall within the linux kernel. This problemaffects Red Hat Linux versions 7.1 and 7.2.
New squid packages are available that fix various vulnerabilities. Some ofthese vulnerabilities could be used to perform a denial of service (DoS)attack or allow remote users to execute code as the user squid.
A problem has been found in ncurses version 5.0 that could cause a bufferoverflow. This overflow could be locally exploited if the library islinked into a program that runs setuid or setgid.
These packages prevent possible denial of service attacks andsecurity breaches as discovered by the Oulu University Secure Programming Group.
This updated at package fixes two minor problems and one majorproblem where the environment can get wiped out prior to the execution of ascheduled command.
These packages fix a problem where buffer overflows can provide root access to local users.
There was an error in the original bugfix patch for thesecurity problem - the new rsync could fail under some circumstances. Thishas been fixed in a new build.
There exist several signedness bugs within the rsync program which allow remote attackers to write 0-bytes to almost arbitrary stack-locations, therefore being able to control the programflow and obtaining a shell remotely.
A security vunlerability in the Linux CIPE (VPN tunnel) implementation hasbeen fixed.
Updated OpenLDAP packages are now available for Red Hat Linux 7, 7.1, and7.2. These updates resolve a vulnerability which would allow users toremove non-mandatory attributes from any object in a directory.