Red Hat Essential and Critical Security Patch Updates
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Esound, the Gnome sound server, contains a race condition that a malicioususer could exploit to change permissions of any file owned by the esounduser.
lpr has a format string security bug. It also mishandles any extension to the lpd communication protocol, and assumes that the instructions contained in the extension are a file it should try to print.
LPRng has a string format bug in the use_syslog function which could lead to root compromise.
glint blindly follows a symlink in /tmp, overwriting the target file, so it can conceivably be used to destroy any file on the system.
Various vulnerabilities exist in syslogd/klogd. By exploiting these vulnerabilities, it could be possible for local users to gain root access.
Security hole in screen in Red Hat Linux 5.2 and earlier releases
There is a security problem when using tmpnam() and fopen() in versions prior to 0.91.
The mgetty-sendfax package contains a vulnerability. Updated packages are available.
Several bugs were discovered in glibc which could allow local users togain root privileges.
Updated usermode packages are now available for Red Hat Linux 6.0, 6.1, and6.2.
Updated perl and mailx package are now available which fix a potentialexploit made possible by incorrect assumptions made in suidperl.
New Netscape packages are available to fix a serious securityproblem with Java. It is recommended that all netscape usersupdate to the new packages. Users of Red Hat Linux 6.0 and 6.1should use the packages for Red Hat Linux 6.2.
Vulnerabilities exist with all Zope-2.0 releases. This advisory supercedesthe advisory issued on 2000-08-11. Please use the packages listed in thisadvisory instead of the packages refered to previously.
Vulnerabilities exist with all Zope-2.0 releases. This advisory supercedesthe advisory issued on 2000-08-11. Please use the packages listed in thisadvisory instead of the packages refered to previously.
A buffer overflow has been discovered in all releases of mopd-linuxincluded in the 6.0, 6.1, and 6.2 releases of Powertools.
The version of ntop which was included in Red Hat Powertools 6.2 has aremote exploit in which arbitrary files can be read on the host machine.
The umb-scheme package included with Red Hat Linux 6.2 included twoworld-writable files.