to the
fixed pacakges:
Compatibility note: ircii's library directory has
moved from /usr/lib/irc to /usr/share/irc.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
was fixed.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
11998 - Local root vulnerability in the kernel capabilities feature
6. RPMs required
. Solution:
Pick packages for your architecture and run:
rpm -Uvh glibc-[2c]*
rpm -Fvh glibc-[dp]* nscd-*
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
18332 - internet programs leave too many connections open
23562 - RESOLV_HOST_CONF can be used to read privileged files
23176
it vulnerable to various link attacks.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
20832 - Unknown system type Nautilus
6. RPMs required:
Red Hat
database fails after
upgrade - to ensure a smooth upgrade, shut the database down before
upgrading:
service mysqld stop
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
24381 - Buffer Overflow in MySQL 3.23.31
22649 - encrypt() function not supported
24589 - mysql logrotate
/etc/rc.d/init.d/httpd restart
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
19906 - PHP 3.0.17-1.6.2 crashes apache reproducable
21291 - php should be rebuild on new environment
21620 - configure option --enable-wddx not used
21664 - updated redhat 7 PHP rpm's broken
2
Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2
upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
19326 - Updated version of Mutt (1.2) has IMAP security hole fixed
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp://updates.redhat.com/5.2/SRPMS/mutt-1.2.5i-8.5.src.rpm
alpha:
ftp://updates.redhat.com/5.2
on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp://updates.redhat.com/5.2/SRPMS/sgml-tools-1.0.7-1.1.src.rpm
alpha:
ftp://updates.redhat.com/5.2/alpha/sgml-tools-1.0.7-1.1.alpha.rpm
i386:
ftp
command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
29097 - buffer overflow in sudo
6. RPMs required:
Red Hat Powertools 6.2:
SRPMS:
ftp
with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/SRPMS/licq
the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Powertools 6.2:
SRPMS:
ftp
the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
25194 - priviledge elevation via simple text file
6
(http://bugzilla.redhat.com/bugzilla for more info):
30293 - Where is sftp?
32977 - ssh unable to connect to certain servers using v2
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/SRPMS/openssh-2.5.2p2-1.7.src.rpm
alpha:
ftp://updates.redhat.com/7.0/alpha/openssh
in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
11588 - RH6.2 krb5 errata breaks credential forwarding over rsh
14301 - workstation 1.1.1-21 ftp core dumps on put nfs* when symlink present.
6. RPMs required:
Red Hat Linux 6.2
with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
33633 - openssh-2.5.2p2 upgrade kills master sshd, won't restart
6. RPMs required
:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
34813 - ntpd security hole
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp://updates.redhat.com/5.2/en/os
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
20865 - Pine 4.30 crashes on certain folders
21158 - spell check ceases to function with pine-4.30-1.62
21271 - gpg
://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/netscape-4.77-0.6.2.src.rpm
ftp://updates.redhat.com/6.2/en/os/SRPMS/netscape-alpha-4.77-0.6.2.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/netscape-common-4.77
://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
34594 - ptrace/execve race condition still exists in kernel
ions through the firewall, you are not
vulnerable to attack.
4. Solution:
Red Hat will be releasing a kernel with this and other bugs fixed
shortly. In the meantime, we strongly recommend that users of
iptables not allow FTP "RELATED" connections.
5. Bug IDs fixed (http://bugzilla.redhat
being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
36479 - gftp2.0.8 has format string errors
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/gftp-2.0.8-1.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kdelibs-2.1.2-1.src.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/kdelibs-2.1.2-1.i386.rpm
ftp
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/mount-2.11b-3.src.rpm
i386:
ftp
this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
that the packages for Red Hat Linux 6.2 requre an updated
logrotate package.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
33509 - Samba uses mktemp
33915 - Samba + Quota allows user to pass hard limit; but with gibberish data not
correct files
31632 - Quota do not work
Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat
Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
33473 - secret keyring compromise leading to secret key
Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
34372 - krb5-server-1.2.2-4.alpha.rpm i386 compatibility
35978
Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat
process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
42210 - ispell uses mktemp/fopen for tempfiles.
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp://updates.redhat.com/5.2/en/os/SRPMS/ispell-3.1.20
in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
42674 - gnupg 1.0.6 out, fixing format string exploit
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/gnupg-1.0.6-0.6.x.src.rpm
alpha:
ftp
in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
43341 - lpd fails to drop groups of root
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/LPRng-3.7.4-23.src.rpm
alpha:
ftp
/bugzilla for more info):
44077 - local printf format attack in exim-3.22-10
6. RPMs required:
Red Hat Powertools 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/powertools/SRPMS/exim-3.22-6x.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/powertools/alpha/exim-3.22-6x.alpha.rpm
ftp://updates.redhat.com/6.2
being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
26999 - drm:r128_do_wait_for_fifo
29140 - Garbage output reported in kernel startup scanning DMA zones
29573 - erroneous IRQ conflict message
29555 - [aic7xxx] Installer hangs loading the aic7xxx
command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp://updates.redhat.com/5.2/en/os/SRPMS/samba-2.0.10
Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp
system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
46186 - remotely exploitable overflow via Netscape
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/xloadimage-4.1-19.6.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha
:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
37730 - OpenSSL-0.9.6a has security fixes
24079 - openssl in updates area built for wrong arch
6. RPMs required
://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp://updates.redhat.com/5.2/en/os/SRPMS/procmail-3.21-0.52.src.rpm
alpha:
ftp://updates.redhat.com/5.2/en/os/alpha/procmail-3.21-0.52.alpha.rpm
i386:
ftp://updates.redhat.com/5.2/en/os/i386/procmail-3.21
. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
48026 - Squid passes acl's in httpd_accel mode in squid-2.3.STABLE4
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/squid-2.3.STABLE4-9.7.src.rpm
alpha:
ftp://updates.redhat.com/7.0/en/os
in the appropriate
RPMs being upgraded on your system.
Also note that users of vipw may want to run (as root):
chmod 0400 /etc/shadow
to ensure that the file has the correct permissions.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
48786 - Serious security problem in vipw, util
an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
44025 - elm buffer overflow on messages with long Message-ID header
6. RPMs required:
Red Hat Linux 5.2:
SRPMS:
ftp
process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
62055 - A /tmp race condition leads to root
46371 - Handle accepted packets, not just reject and deny
56191 - logwatch is too noisy
58578 - Problem
with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
62055 - A /tmp race condition leads to root
46371 - Handle accepted packets
://bugzilla.redhat.com/bugzilla for more info):
45520 - Remote root exploit
49294 - security problem in tcpdump-3.6.2 AFS printing
47174 - libpcap-0.4-39.i386.rpm does not contain shared library libpcap.so.0
52654 - Tcpdump get spurious packets before kernel filter kicks in
57711 - arpwatch depends on csh
IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Powertools 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/powertools/SRPMS/icecast-1.3.12-1.src.rpm
alpha:
ftp://updates.redhat.com/7.0/en/powertools/alpha/icecast-1.3.12-1.alpha.rpm
i386:
ftp
find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/stylesheets-1.54.13rh-1.1.src.rpm
noarch:
ftp://updates.redhat.com/6.2/en/os/noarch/stylesheets
in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/mod_python-2.7.8-1.src.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/mod_python
system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/perl-Digest-MD5-2.20-1.src.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/perl-Digest-MD5-2.20-1.i386.rpm
7. Verification:
MD5
system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/sharutils-4.2.1-2.6.x.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/sharutils-4.2.1-2.6.x.alpha.rpm
i386:
ftp
on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
64283 - XMLHttpRequest allows reading of local files
6. RPMs required:
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/mozilla-0.9.9-12.7.2.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS
this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more
updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
55145
the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.1:
SRPMS:
ftp
the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp
on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/mailman-2.0.11-1.src.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/mailman-2.0.11-1.i386.rpm
ia64:
ftp
system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Powertools 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/powertools/SRPMS/mailman-2.0.11-0.7.src.rpm
alpha:
ftp://updates.redhat.com/7.0/en/powertools/alpha/mailman-2.0.11-0.7.alpha.rpm
i386
Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2
, it will be necessary to
manually restart the server with the following command:
/sbin/service httpd restart
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/mod_ssl-2.8.5-5.src.rpm
alpha:
ftp
on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/glibc-2.1.3-24.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-2.1.3-24.alpha.rpm
ftp://updates.redhat.com
://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/util-linux-2.10f-7.6.2.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/util-linux-2.10f-7.6.2.alpha.rpm
i386:
ftp://updates.redhat.com/6.2/en/os/i386
. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required
process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
59504 - *-config scripts suggests bad CFLAGS
68895 - mm not compiled to use SysV shared memory or semaphores
68896 - mm doesn't change ownership
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated bind packages fix buffer overflow in resolver library
Advisory ID: RHSA-2002:133-13
Issue date:2002-07-01
Updated on:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated krb5 packages fix remote buffer overflow
Advisory ID: RHSA-2002:172-07
Issue date:2002-08-02
Updated on:2002-08-14
to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
69716
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New PHP packages fix vulnerability in safemode
Advisory ID: RHSA-2002:102-26
Issue date:2002-05-27
Updated on:2002-08-19
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated bugzilla packages fix security issues
Advisory ID: RHSA-2002:109-07
Issue date:2002-06-09
Updated on:2002-08-20
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New kernel update available, fixes i810 video oops, several
security issues
Advisory ID: RHSA-2002:158-09
Issue date:2002-07-26
with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
68154 - ethereal 0.9.4 security issues
71099 - false dependency on gtk-1.2
6
,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
66825 - DHCP packets from Cisco VOIP phone crash
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated scrollkeeper packages fix tempfile vulnerability
Advisory ID: RHSA-2002:186-07
Issue date:2002-08-19
Updated on:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated Zope packages are available
Advisory ID: RHSA-2002:060-17
Issue date:2002-04-11
Updated on:2002-09-24
Product:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated unzip and tar packages fix vulnerabilities
Advisory ID: RHSA-2002:096-24
Issue date:2002-05-20
Updated on:2002-09-18
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated packages fix PostScript and PDF security issue
Advisory ID: RHSA-2002:212-06
Issue date:2002-09-25
Updated on:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated glibc packages fix vulnerabilities in resolver
Advisory ID: RHSA-2002:197-06
Issue date:2002-09-10
Updated on:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated nss_ldap packages fix buffer overflow
Advisory ID: RHSA-2002:175-16
Issue date:2002-08-12
Updated on:2002-10-03
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated packages fix PostScript and PDF security issue
Advisory ID: RHSA-2002:207-14
Issue date:2002-09-23
Updated on:
this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Command execution vulnerability in dvips
Advisory ID: RHSA-2002:194-18
Issue date:2002-09-04
Updated on:2002-10-08
Product:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated xinetd packages fix denial of service vulnerability
Advisory ID: RHSA-2002:196-09
Issue date:2002-09-06
Updated on:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated Mozilla packages fix security vulnerabilities
Advisory ID: RHSA-2002:192-13
Issue date:2002-08-28
Updated on:2002-10-09
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated ypserv packages fixes memory leak
Advisory ID: RHSA-2002:223-07
Issue date:2002-10-08
Updated on:2002-10-24
Product:
in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
73339 - apm locks up Asus A7N266VM (nForce chipset)
74879 - aha152x driver broken
71622
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New kernel fixes local security issues
Advisory ID: RHSA-2002:205-15
Issue date:2002-09-20
Updated on:2002-10-15
Product:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New kernel 2.2 packages fix local vulnerabilities
Advisory ID: RHSA-2002:210-06
Issue date:2002-09-23
Updated on:2002-10-10
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated kerberos packages available
Advisory ID: RHSA-2002:242-06
Issue date:2002-11-07
Updated on:2002-11-06
Product:
way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New PHP packages fix vulnerability in mail function
Advisory ID: RHSA-2002:213-06
Issue date:2002-11-11
Updated on:2002-11-11
/bugzilla for more info):
77834 - Working Dos from bugtraq mailing list
69920 - Kernel Crashes in TG3 Driver
76171 - kernel-2.4.18-17.7.x update caused maestro3 to stop working
77138 - Sound Modules Fail for Enigma kernel 2.4.18-17.7.x on Dell Latitude J750
76555 - problems with kernel-2.4.18-17.8.0
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New kernel 2.2 packages fix local denial of service issue
Advisory ID: RHSA-2002:264-05
Issue date:2002-09-23
Updated on:
fixed (http://bugzilla.redhat.com/bugzilla for more info):
74696 - Broken tcp_wrappers support
76146 - xinetd 2.3.9 causes hanging CLOSE_WAIT connections
77781 - xinetd stop serving the services because Too many open files
6. RPMs required:
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0
in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
73412 - KDE screensaver just blanks screen
74071 - Better way to handle desktop file renames
75085 - Banner of Taiwan
6. RPMs required:
Red Hat Linux 7.2:
SRPMS:
ftp
with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
60295 - Webalizer configuration file error
64392 - dns_cache missing
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated Canna packages fix vulnerabilities
Advisory ID: RHSA-2002:246-18
Issue date:2002-12-10
Updated on:2002-12-04
Product:
://bugzilla.redhat.com/bugzilla for more info):
74882 - XSS vulnerabilities
76327 - Apache 1.3.27 released fixing multiple security issues
6. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/apache-1.3.27-1.6.2.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated Fetchmail packages fix security vulnerability
Advisory ID: RHSA-2002:293-09
Issue date:2002-12-16
Updated on:2002-12-17
to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info
1 - 100 of 158 matches
Mail list logo