Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Versions 6.09 and below of tcsh are vulnerable to a symbolic link attack.
Versions of Ethereal prior to 0.8.14 are vulnerable to buffer overflows.The ethereal-0.8.14 packages correct this problem.
ghostscript makes use of mktemp instead of mkstemp to create temp files;and also uses improper LD_RUN_PATH values
If you are any setuid applications that use ncurses and its cursor movementfunctionality, local users may gain access to the program's privileges.
New Netscape packages are available that fix a buffer overflowin parsing HTML.
Updated pine packages fix DoS vulnerability and add SSL support to RH62.
New modutils release addresses more local root compromise possibilities.
Potential denial of service has been fixed in all current versions of Red Hat Linux.
A significant number of bugs, including tmp file creation vulnerabilities have been fixed.
The usermode package contains a potential format-string vulnerability.
A vulnerability in the mod_rewrite module and vulnerabilities in thevirtual hosting facility in versions of Apache prior to 1.3.14 may allowattackers to view files on the server which are meant to be inaccessible.Format string vulnerabilities have been found in PHP versions 3 and 4.
An error existed in the authorization checks in the version of cyrus-saslshipped with Red Hat Linux 7.
A race condition has been found in the nss_ldap package. On a systemrunning nscd, a malicious user can cause the system to hang.
An OpenSSH client will do agent or X11 forwarding at the request of a server, even if the user has not requested that it be done.
The << operator in bash 1.x used predictable filenames, leading to a potentialdenial of service attack.
If you are any setuid applications that use ncurses and its cursor movementfunctionality, local users may gain access to the program's privileges.
New modutils release addresses more local root compromise possibilities
ghostscript makes use of mktemp instead of mkstemp to create temp files.