[RHSA-2000:008-01] ircii buffer overflow

2000-03-30 Thread bugzilla
to the fixed pacakges: Compatibility note: ircii's library directory has moved from /usr/lib/irc to /usr/share/irc. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla

[LIH] [RHSA-2000:037-01] New Linux kernel fixes security bug

2000-06-23 Thread bugzilla
was fixed. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 11998 - Local root vulnerability in the kernel capabilities feature 6. RPMs required

[RHSA-2001:001-05] glibc file read or write access local vulnerability

2001-01-12 Thread bugzilla
. Solution: Pick packages for your architecture and run: rpm -Uvh glibc-[2c]* rpm -Fvh glibc-[dp]* nscd-* 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 18332 - internet programs leave too many connections open 23562 - RESOLV_HOST_CONF can be used to read privileged files 23176

[RHSA-2001:002-03] glibc local write access vulnerability

2001-01-16 Thread bugzilla
it vulnerable to various link attacks. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 20832 - Unknown system type Nautilus 6. RPMs required: Red Hat

[RHSA-2001:003-07] Updated mysql packages available for Red Hat Linux 7

2001-01-23 Thread bugzilla
database fails after upgrade - to ensure a smooth upgrade, shut the database down before upgrading: service mysqld stop 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 24381 - Buffer Overflow in MySQL 3.23.31 22649 - encrypt() function not supported 24589 - mysql logrotate

[RHSA-2000:136-10] Updated PHP packages available for Red Hat Linux 5.2, 6.x, and 7

2001-01-25 Thread bugzilla
/etc/rc.d/init.d/httpd restart 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 19906 - PHP 3.0.17-1.6.2 crashes apache reproducable 21291 - php should be rebuild on new environment 21620 - configure option --enable-wddx not used 21664 - updated redhat 7 PHP rpm's broken 2

[RHSA-2001:028-02] buffer overflow in slrn

2001-03-14 Thread bugzilla
Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2

[RHSA-2001:029-02] New mutt packages fix IMAP vulnerability/incompatibility

2001-03-14 Thread bugzilla
upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 19326 - Updated version of Mutt (1.2) has IMAP security hole fixed 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/SRPMS/mutt-1.2.5i-8.5.src.rpm alpha: ftp://updates.redhat.com/5.2

[RHSA-2001:027-02] Updated sgml-tools packages fix insecure temporary file handling

2001-03-14 Thread bugzilla
on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/SRPMS/sgml-tools-1.0.7-1.1.src.rpm alpha: ftp://updates.redhat.com/5.2/alpha/sgml-tools-1.0.7-1.1.alpha.rpm i386: ftp

[RHSA-2001:019-02] Updated sudo packages fixing buffer overrun available

2001-03-22 Thread bugzilla
command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 29097 - buffer overflow in sudo 6. RPMs required: Red Hat Powertools 6.2: SRPMS: ftp

[RHSA-2001:022-03] Updated licq packages fixing security problems available

2001-03-22 Thread bugzilla
with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/SRPMS/licq

[RHSA-2001:023-03] Updated licq packages fixing security problems available

2001-03-22 Thread bugzilla
the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Powertools 6.2: SRPMS: ftp

[RHSA-2001:008-02] Updated vim packages available

2001-03-22 Thread bugzilla
the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 25194 - priviledge elevation via simple text file 6

[RHSA-2001:033-04] Updated openssh packages available

2001-03-27 Thread bugzilla
(http://bugzilla.redhat.com/bugzilla for more info): 30293 - Where is sftp? 32977 - ssh unable to connect to certain servers using v2 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/SRPMS/openssh-2.5.2p2-1.7.src.rpm alpha: ftp://updates.redhat.com/7.0/alpha/openssh

[RHSA-2001:025-14] Updated Kerberos 5 and pam_krb5 packages available

2001-03-27 Thread bugzilla
in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 11588 - RH6.2 krb5 errata breaks credential forwarding over rsh 14301 - workstation 1.1.1-21 ftp core dumps on put nfs* when symlink present. 6. RPMs required: Red Hat Linux 6.2

[RHSA-2001:041-02] Updated openssh packages available

2001-04-03 Thread bugzilla
with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 33633 - openssh-2.5.2p2 upgrade kills master sshd, won't restart 6. RPMs required

[RHSA-2001:045-05] Network Time Daemon (ntpd) has potential remote root exploit

2001-04-09 Thread bugzilla
: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 34813 - ntpd security hole 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/en/os

[RHSA-2001:042-02] Updated pine packages available

2001-04-11 Thread bugzilla
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 20865 - Pine 4.30 crashes on certain folders 21158 - spell check ceases to function with pine-4.30-1.62 21271 - gpg

[RHSA-2001:046-03] New netscape packages available

2001-04-11 Thread bugzilla
://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/netscape-4.77-0.6.2.src.rpm ftp://updates.redhat.com/6.2/en/os/SRPMS/netscape-alpha-4.77-0.6.2.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/netscape-common-4.77

[RHSA-2001:047-03] Linux kernel 2.2.19 now available, provides security fixes, enhancements

2001-04-17 Thread bugzilla
://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html Please read the directions for your architecture carefully before proceeding with the kernel upgrade. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 34594 - ptrace/execve race condition still exists in kernel

[RHSA-2001:052-02] FTP iptables vulnerability in 2.4 kernel

2001-04-20 Thread bugzilla
ions through the firewall, you are not vulnerable to attack. 4. Solution: Red Hat will be releasing a kernel with this and other bugs fixed shortly. In the meantime, we strongly recommend that users of iptables not allow FTP "RELATED" connections. 5. Bug IDs fixed (http://bugzilla.redhat

[RHSA-2001:053-06] gftp format string vulnerability corrected

2001-04-26 Thread bugzilla
being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 36479 - gftp2.0.8 has format string errors 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/gftp-2.0.8-1.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os

[RHSA-2001:059-03] Updated kdelibs packages fixing security problem and memory leaks available

2001-04-30 Thread bugzilla
RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/kdelibs-2.1.2-1.src.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/kdelibs-2.1.2-1.i386.rpm ftp

[RHSA-2001:058-04] Updated mount package available

2001-05-02 Thread bugzilla
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/mount-2.11b-3.src.rpm i386: ftp

[RHSA-2001:061-02] Updated nedit packages available

2001-05-11 Thread bugzilla
this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla

[RHSA-2001:044-08] New samba packages available to fix /tmp races

2001-05-15 Thread bugzilla
that the packages for Red Hat Linux 6.2 requre an updated logrotate package. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 33509 - Samba uses mktemp 33915 - Samba + Quota allows user to pass hard limit; but with gibberish data not correct files 31632 - Quota do not work

[RHSA-2001:065-05] New Zope packages are available

2001-05-15 Thread bugzilla
Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat

[RHSA-2001:063-02] Updated gnupg packages available

2001-05-17 Thread bugzilla
Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 33473 - secret keyring compromise leading to secret key

[RHSA-2001:060-04] Updated Kerberos 5 packages available

2001-05-17 Thread bugzilla
Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 34372 - krb5-server-1.2.2-4.alpha.rpm i386 compatibility 35978

[RHSA-2001:070-02] Updated mktemp packages available

2001-05-21 Thread bugzilla
Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat

[RHSA-2001:074-03] Updated ispell packages available for Red Hat Linux 5.2 and 6.2

2001-06-05 Thread bugzilla
process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 42210 - ispell uses mktemp/fopen for tempfiles. 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/en/os/SRPMS/ispell-3.1.20

[RHSA-2001:073-04] Updated GnuPG packages available

2001-06-07 Thread bugzilla
in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 42674 - gnupg 1.0.6 out, fixing format string exploit 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/gnupg-1.0.6-0.6.x.src.rpm alpha: ftp

[RHSA-2001:077-05] LPRng fails to drop supplemental group membership

2001-06-13 Thread bugzilla
in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 43341 - lpd fails to drop groups of root 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/LPRng-3.7.4-23.src.rpm alpha: ftp

[RHSA-2001:078-05] Format string bug fixed

2001-06-19 Thread bugzilla
/bugzilla for more info): 44077 - local printf format attack in exim-3.22-10 6. RPMs required: Red Hat Powertools 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/powertools/SRPMS/exim-3.22-6x.src.rpm alpha: ftp://updates.redhat.com/6.2/en/powertools/alpha/exim-3.22-6x.alpha.rpm ftp://updates.redhat.com/6.2

[RHSA-2001:084-03] Kernel: FTP iptables vulnerability in 2.4 kernel and general bug fixes

2001-06-22 Thread bugzilla
being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 26999 - drm:r128_do_wait_for_fifo 29140 - Garbage output reported in kernel startup scanning DMA zones 29573 - erroneous IRQ conflict message 29555 - [aic7xxx] Installer hangs loading the aic7xxx

[RHSA-2001:086-06] New Samba packages available for Red Hat Linux 5.2, 6.2, 7 and 7.1

2001-06-26 Thread bugzilla
command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/en/os/SRPMS/samba-2.0.10

[RHSA-2001:092-02] Updated xinetd package available for Red Hat Linux 7 and 7.1

2001-07-07 Thread bugzilla
Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp

[RHSA-2001:088-04] New xloadimage packages available

2001-07-10 Thread bugzilla
system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 46186 - remotely exploitable overflow via Netscape 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/xloadimage-4.1-19.6.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha

[RHSA-2001:051-18] Updated openssl packages available

2001-07-19 Thread bugzilla
: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 37730 - OpenSSL-0.9.6a has security fixes 24079 - openssl in updates area built for wrong arch 6. RPMs required

[RHSA-2001:093-03] Updated procmail packages available for Red Hat Linux 5.2, 6.2, 7 and 7.1

2001-07-19 Thread bugzilla
://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp://updates.redhat.com/5.2/en/os/SRPMS/procmail-3.21-0.52.src.rpm alpha: ftp://updates.redhat.com/5.2/en/os/alpha/procmail-3.21-0.52.alpha.rpm i386: ftp://updates.redhat.com/5.2/en/os/i386/procmail-3.21

[RHSA-2001:097-04] New squid packages for Red Hat Linux 7.0

2001-07-19 Thread bugzilla
. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 48026 - Squid passes acl's in httpd_accel mode in squid-2.3.STABLE4 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/squid-2.3.STABLE4-9.7.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os

[RHSA-2001:095-04] New util-linux packages available to fix vipw permissions problems

2001-07-16 Thread bugzilla
in the appropriate RPMs being upgraded on your system. Also note that users of vipw may want to run (as root): chmod 0400 /etc/shadow to ensure that the file has the correct permissions. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 48786 - Serious security problem in vipw, util

[RHSA-2001:091-07] New elm packages available for Red Hat Linux 5.2, 6.2, 7 and 7.1

2001-07-16 Thread bugzilla
an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 44025 - elm buffer overflow on messages with long Message-ID header 6. RPMs required: Red Hat Linux 5.2: SRPMS: ftp

[RHSA-2002:053-12] Race conditions in logwatch

2002-04-05 Thread bugzilla
process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 62055 - A /tmp race condition leads to root 46371 - Handle accepted packets, not just reject and deny 56191 - logwatch is too noisy 58578 - Problem

[RHSA-2002:054-09] Race conditions in logwatch

2002-04-05 Thread bugzilla
with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 62055 - A /tmp race condition leads to root 46371 - Handle accepted packets

[RHSA-2001:089-08] Updated tcpdump packages available for Red Hat Linux 6.2 and 7.x

2002-04-09 Thread bugzilla
://bugzilla.redhat.com/bugzilla for more info): 45520 - Remote root exploit 49294 - security problem in tcpdump-3.6.2 AFS printing 47174 - libpcap-0.4-39.i386.rpm does not contain shared library libpcap.so.0 52654 - Tcpdump get spurious packets before kernel filter kicks in 57711 - arpwatch depends on csh

[RHSA-2002:063-05] Updated icecast packages are available

2002-04-25 Thread bugzilla
IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Powertools 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/powertools/SRPMS/icecast-1.3.12-1.src.rpm alpha: ftp://updates.redhat.com/7.0/en/powertools/alpha/icecast-1.3.12-1.alpha.rpm i386: ftp

[RHSA-2002:072-07] Updated sudo packages are available

2002-04-25 Thread bugzilla
find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla

[RHSA-2002:062-08] Insecure DocBook stylesheet option

2002-05-01 Thread bugzilla
RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/stylesheets-1.54.13rh-1.1.src.rpm noarch: ftp://updates.redhat.com/6.2/en/os/noarch/stylesheets

[RHSA-2002:070-06] Updated mod_python packages available

2002-05-02 Thread bugzilla
in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/mod_python-2.7.8-1.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/mod_python

[RHSA-2002:081-06] perl-Digest-MD5 UTF8 bug results in incorrect MD5 sums

2002-05-10 Thread bugzilla
system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/perl-Digest-MD5-2.20-1.src.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/perl-Digest-MD5-2.20-1.i386.rpm 7. Verification: MD5

[RHSA-2002:065-13] Updated sharutils package fixes uudecode issue

2002-05-14 Thread bugzilla
system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/sharutils-4.2.1-2.6.x.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/sharutils-4.2.1-2.6.x.alpha.rpm i386: ftp

[RHSA-2002:079-13] Updated Mozilla packages fix a security issue

2002-05-15 Thread bugzilla
on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 64283 - XMLHttpRequest allows reading of local files 6. RPMs required: Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/mozilla-0.9.9-12.7.2.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS

[RHSA-2002:092-11] Buffer overflow in UW imap daemon

2002-05-24 Thread bugzilla
this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more

[RHSA-2002:094-08] Updated tcpdump packages fix buffer overflow

2002-05-30 Thread bugzilla
updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 55145

[RHSA-2002:105-09] Updated bind packages fix denial of service attack

2002-06-04 Thread bugzilla
the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.1: SRPMS: ftp

[RHSA-2002:083-22] Ghostscript command execution vulnerability

2002-06-04 Thread bugzilla
the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp

[RHSA-2002:099-04] Updated mailman packages available

2002-06-10 Thread bugzilla
on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/mailman-2.0.11-1.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/mailman-2.0.11-1.i386.rpm ia64: ftp

[RHSA-2002:100-03] Updated mailman packages available

2002-06-10 Thread bugzilla
system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Powertools 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/powertools/SRPMS/mailman-2.0.11-0.7.src.rpm alpha: ftp://updates.redhat.com/7.0/en/powertools/alpha/mailman-2.0.11-0.7.alpha.rpm i386

[RHSA-2002:051-16] New Squid packages available

2002-07-04 Thread bugzilla
Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2

[RHSA-2002:134-12] Updated mod_ssl packages available

2002-07-16 Thread bugzilla
, it will be necessary to manually restart the server with the following command: /sbin/service httpd restart 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/mod_ssl-2.8.5-5.src.rpm alpha: ftp

[RHSA-2002:139-10] Updated glibc packages fix vulnerabilities in resolver

2002-07-25 Thread bugzilla
on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/glibc-2.1.3-24.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/glibc-2.1.3-24.alpha.rpm ftp://updates.redhat.com

[RHSA-2002:132-14] Updated util-linux package fixes password locking race

2002-07-29 Thread bugzilla
://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/util-linux-2.10f-7.6.2.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/util-linux-2.10f-7.6.2.alpha.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386

[RHSA-2002:155-11] Updated openssl packages fix remote vulnerabilities

2002-07-30 Thread bugzilla
. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required

[RHSA-2002:153-07] Updated mm packages fix temporary file handling

2002-07-31 Thread bugzilla
process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 59504 - *-config scripts suggests bad CFLAGS 68895 - mm not compiled to use SysV shared memory or semaphores 68896 - mm doesn't change ownership

[RHSA-2002:133-13] Updated bind packages fix buffer overflow in resolver library

2002-08-09 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated bind packages fix buffer overflow in resolver library Advisory ID: RHSA-2002:133-13 Issue date:2002-07-01 Updated on:

[RHSA-2002:172-07] Updated krb5 packages fix remote buffer overflow

2002-08-15 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated krb5 packages fix remote buffer overflow Advisory ID: RHSA-2002:172-07 Issue date:2002-08-02 Updated on:2002-08-14

[RHSA-2002:151-21] Updated libpng packages fix buffer overflow

2002-08-19 Thread bugzilla
to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 69716

[RHSA-2002:102-26] New PHP packages fix vulnerability in safemode

2002-08-20 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: New PHP packages fix vulnerability in safemode Advisory ID: RHSA-2002:102-26 Issue date:2002-05-27 Updated on:2002-08-19

[RHSA-2002:109-07] Updated bugzilla packages fix security issues

2002-08-21 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated bugzilla packages fix security issues Advisory ID: RHSA-2002:109-07 Issue date:2002-06-09 Updated on:2002-08-20

[RHSA-2002:158-09] New kernel update available, fixes i810 video oops, several security issues

2002-08-21 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel update available, fixes i810 video oops, several security issues Advisory ID: RHSA-2002:158-09 Issue date:2002-07-26

[RHSA-2002:169-13] Updated ethereal packages are available

2002-08-29 Thread bugzilla
with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 68154 - ethereal 0.9.4 security issues 71099 - false dependency on gtk-1.2 6

[RHSA-2002:162-12] PXE server crashes from certain DHCP packets

2002-08-30 Thread bugzilla
, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 66825 - DHCP packets from Cisco VOIP phone crash

[RHSA-2002:186-07] Updated scrollkeeper packages fix tempfile vulnerability

2002-09-02 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated scrollkeeper packages fix tempfile vulnerability Advisory ID: RHSA-2002:186-07 Issue date:2002-08-19 Updated on:

[RHSA-2002:060-17] Updated Zope packages are available

2002-09-25 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated Zope packages are available Advisory ID: RHSA-2002:060-17 Issue date:2002-04-11 Updated on:2002-09-24 Product:

[RHSA-2002:096-24] Updated unzip and tar packages fix vulnerabilities

2002-09-30 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated unzip and tar packages fix vulnerabilities Advisory ID: RHSA-2002:096-24 Issue date:2002-05-20 Updated on:2002-09-18

[RHSA-2002:212-06] Updated packages fix PostScript and PDF security issue

2002-10-04 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated packages fix PostScript and PDF security issue Advisory ID: RHSA-2002:212-06 Issue date:2002-09-25 Updated on:

[RHSA-2002:197-06] Updated glibc packages fix vulnerabilities in resolver

2002-10-05 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated glibc packages fix vulnerabilities in resolver Advisory ID: RHSA-2002:197-06 Issue date:2002-09-10 Updated on:

[RHSA-2002:175-16] Updated nss_ldap packages fix buffer overflow

2002-10-05 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated nss_ldap packages fix buffer overflow Advisory ID: RHSA-2002:175-16 Issue date:2002-08-12 Updated on:2002-10-03

[RHSA-2002:207-14] Updated packages fix PostScript and PDF security issue

2002-10-10 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated packages fix PostScript and PDF security issue Advisory ID: RHSA-2002:207-14 Issue date:2002-09-23 Updated on:

[RHSA-2002:204-10] Updated squirrelmail packages close cross-site scripting vulnerabilities

2002-10-11 Thread bugzilla
this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla

[RHSA-2002:194-18] Command execution vulnerability in dvips

2002-10-14 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Command execution vulnerability in dvips Advisory ID: RHSA-2002:194-18 Issue date:2002-09-04 Updated on:2002-10-08 Product:

[RHSA-2002:196-09] Updated xinetd packages fix denial of service vulnerability

2002-10-15 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated xinetd packages fix denial of service vulnerability Advisory ID: RHSA-2002:196-09 Issue date:2002-09-06 Updated on:

[RHSA-2002:192-13] Updated Mozilla packages fix security vulnerabilities

2002-10-18 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated Mozilla packages fix security vulnerabilities Advisory ID: RHSA-2002:192-13 Issue date:2002-08-28 Updated on:2002-10-09

[RHSA-2002:223-07] Updated ypserv packages fixes memory leak

2002-10-24 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated ypserv packages fixes memory leak Advisory ID: RHSA-2002:223-07 Issue date:2002-10-08 Updated on:2002-10-24 Product:

[RHSA-2002:206-12] New kernel fixes local security issues

2002-10-17 Thread bugzilla
in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 73339 - apm locks up Asus A7N266VM (nForce chipset) 74879 - aha152x driver broken 71622

[RHSA-2002:205-15] New kernel fixes local security issues

2002-10-17 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel fixes local security issues Advisory ID: RHSA-2002:205-15 Issue date:2002-09-20 Updated on:2002-10-15 Product:

[RHSA-2002:210-06] New kernel 2.2 packages fix local vulnerabilities

2002-10-17 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel 2.2 packages fix local vulnerabilities Advisory ID: RHSA-2002:210-06 Issue date:2002-09-23 Updated on:2002-10-10

[RHSA-2002:242-06] Updated kerberos packages available

2002-11-07 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated kerberos packages available Advisory ID: RHSA-2002:242-06 Issue date:2002-11-07 Updated on:2002-11-06 Product:

[RHSA-2002:197-09] Updated glibc packages fix vulnerabilities in resolver

2002-11-07 Thread bugzilla
way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info

[RHSA-2002:213-06] New PHP packages fix vulnerability in mail function

2002-11-11 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: New PHP packages fix vulnerability in mail function Advisory ID: RHSA-2002:213-06 Issue date:2002-11-11 Updated on:2002-11-11

[RHSA-2002:262-07] New kernel fixes local denial of service issue

2002-11-18 Thread bugzilla
/bugzilla for more info): 77834 - Working Dos from bugtraq mailing list 69920 - Kernel Crashes in TG3 Driver 76171 - kernel-2.4.18-17.7.x update caused maestro3 to stop working 77138 - Sound Modules Fail for Enigma kernel 2.4.18-17.7.x on Dell Latitude J750 76555 - problems with kernel-2.4.18-17.8.0

[RHSA-2002:264-05] New kernel 2.2 packages fix local denial of service issue

2002-11-26 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: New kernel 2.2 packages fix local denial of service issue Advisory ID: RHSA-2002:264-05 Issue date:2002-09-23 Updated on:

[RHSA-2002:196-19] Updated xinetd packages fix denial of service vulnerability

2002-12-02 Thread bugzilla
fixed (http://bugzilla.redhat.com/bugzilla for more info): 74696 - Broken tcp_wrappers support 76146 - xinetd 2.3.9 causes hanging CLOSE_WAIT connections 77781 - xinetd stop serving the services because Too many open files 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0

[RHSA-2002:220-40] Updated KDE packages fix security issues

2002-12-04 Thread bugzilla
in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 73412 - KDE screensaver just blanks screen 74071 - Better way to handle desktop file renames 75085 - Banner of Taiwan 6. RPMs required: Red Hat Linux 7.2: SRPMS: ftp

[RHSA-2002:254-05] Updated Webalizer packages fix vulnerability

2002-12-04 Thread bugzilla
with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 60295 - Webalizer configuration file error 64392 - dns_cache missing

[RHSA-2002:246-18] Updated Canna packages fix vulnerabilities

2002-12-10 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated Canna packages fix vulnerabilities Advisory ID: RHSA-2002:246-18 Issue date:2002-12-10 Updated on:2002-12-04 Product:

[RHSA-2002:222-21] Updated apache, httpd, and mod_ssl packages available

2002-12-12 Thread bugzilla
://bugzilla.redhat.com/bugzilla for more info): 74882 - XSS vulnerabilities 76327 - Apache 1.3.27 released fixing multiple security issues 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/apache-1.3.27-1.6.2.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha

[RHSA-2002:293-09] Updated Fetchmail packages fix security vulnerability

2002-12-17 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated Fetchmail packages fix security vulnerability Advisory ID: RHSA-2002:293-09 Issue date:2002-12-16 Updated on:2002-12-17

[RHSA-2002:270-16] Updated pine packages available

2003-01-03 Thread bugzilla
to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info

  1   2   >