Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
These packages fix a security problem with remote clients giving specialNetBIOS names to the server.
A vulnerability in iptables "RELATED" connection tracking has beendiscovered. Other general bugfixes present as well.
A locally exploitable format string bug has been fixed in the code thathandles batch SMTP.
When LPRng drops uid and gid, it fails to drop membership in itssupplemental groups.
Updated GnuPG packages are now available for Red Hat Linux 6.2, 7, and 7.1.These updates include fixes for the recently-discovered format stringvulnerability.
The ispell program uses mktemp() to open temporary files - this makes itvulnerable to symlink attacks.
Applications using the xinetdumask and not setting the permissions themselves (like swat from the sambapackage), will create world writable files.
The version of mktemp shipped with Red Hat Linux prior to version 7 does not support creating temporary directories.
A heap overrun exists in the man packages shipped with Red Hat Linux5.x, 6.x and 7.0.Since man is setgid man, users could gain gid man privileges.
These updates close a potential vulnerability present in thegssapi-aware ftpd included in the krb5-workstation package.
These updates address a potential vulnerability which could allow anattacker to compute a user's secret key.
The issue is related to ZClasses in that any user can visit a ZClass declaration and change the ZClass permission mappings for methodsand other objects defined within the ZClass, possibly allowing forunauthorized access within the Zope instance.
By exploiting these vulnerabilities,local users could overwrite any file in the system.
The minicom program allows any user with local shell access to obtaingroup uucp priveledges.
nedit creates temporary files in an insecure fashion. This version has been patched to use mkstemp().
Swap files could potentially be world-readable, meaning every user could read data in the swap file(s), possibly including passwords.
This can be abused by a local user to gain access to the X server and can result in a compromise of the account kdesu accesses.
Update to gftp version 2.0.8, which improvesfunctionality and fixes a format string vulnerability.
Previously-issued mgetty packages did not log messages correctly. Previous packages would encounter errors when attempting to spool outgoing fax jobs. Log files for vgetty and vm were also not rotated.