Articles / Red Hat

RSS All articles tagged with Red Hat

May 04, 2009 08:41 Red Hat: An updated gpdf package fixes multiple security ...

0

GPdf is a viewer for Portable Document Format (PDF) files. Multiple integer overflow flaws were found in GPdf’s JBIG2 decoder. An attacker could create a malicious PDF file that would cause GPdf to crash or, potentially, execute arbitrary code when opened. Multiple buffer overflow flaws were found in GPdf’s JBIG2 decoder. An attacker could create a malicious PDF file that would cause GPdf to crash or, potentially, execute arbitrary code when opened. Multiple flaws were found in GPdf’s JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause GPdf to crash or, potentially, execute arbitrary code when opened. Multiple input validation flaws were found in GPdf’s JBIG2 decoder. An attacker could create a malicious PDF file that would cause GPdf to crash or, potentially, execute arbitrary code when opened. Multiple denial of service flaws were found in GPdf’s JBIG2 decoder. An attacker could create a malicious PDF that would cause GPdf to crash when opened. Updated packages are available from updates.redhat.com.

May 04, 2009 08:40 Red Hat: Updated libwmf packages fix one security issue

0

libwmf is a library for reading and converting Windows Metafile Format (WMF) vector graphics. libwmf is used by applications such as GIMP and ImageMagick. A pointer use-after-free flaw was found in the GD graphics library embedded in libwmf. An attacker could create a specially-crafted WMF file that would cause an application using libwmf to crash or, potentially, execute arbitrary code as the user running the application when opened by a victim. Updated packages are available from updates.redhat.com.

May 04, 2009 08:36 Red Hat: Updated kernel-rt packages fix several security ...

0

The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A logic error was found in the do_setlk() function of the Network File System (NFS) implementation. This could cause a denial of service on the NFS server if a file descriptor was closed before its corresponding lock request returned. A deficiency was found in the system call auditing implementation on 64-bit systems. This could allow a local, unprivileged user to circumvent a system call audit configuration. Chris Evans reported a deficiency in the secure-computing implementation on 64-bit systems. This could allow a local, unprivileged user to bypass intended access restrictions. The exit_notify() function in the Linux kernel did not properly reset the exit signal if a process executed a set user ID (setuid) application before exiting. This could allow a local, unprivileged user to elevate their privileges. Chris Evans reported a deficiency in the Linux kernel signals implementation. This could lead to a denial of service of the parent. An off-by-two error was found in the set_selection() function of the Linux kernel. This could allow a local, unprivileged user to cause a denial of service. Updated packages are available from updates.redhat.com.

April 28, 2009 15:00 Red Hat: Updated firefox packages fix one security issue

0

Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. Updated packages are available from updates.redhat.com.

April 28, 2009 14:42 Red Hat: An updated mod_jk package that fixes a security ...

0

mod_jk is an Apache Tomcat connector that allows Apache Tomcat and the Apache HTTP Server to communicate with each other. An information disclosure flaw was found in mod_jk. In certain situations, if a faulty client set the “Content-Length” header without providing data, or if a user sent repeated requests very quickly, one user may view a response intended for another user. Updated packages are available from updates.redhat.com.

April 28, 2009 14:40 Red Hat: Updated java-1.4.2-ibm packages fix several secu...

0

The IBM® 1.4.2 SR13 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These vulnerabilities are summarized on the IBM “Security alerts” page linked to in the advisory. Updated packages are available from updates.redhat.com.

April 28, 2009 14:38 Red Hat: Updated giflib packages fix several security issues

0

The giflib packages contain a shared library of functions for loading and saving GIF image files. Several flaws were discovered in the way giflib decodes GIF images. An attacker could create a carefully crafted GIF image that could cause an application using giflib to crash or, possibly, execute arbitrary code when opened by a victim. Updated packages are available from updates.redhat.com.

April 28, 2009 14:11 Red Hat: Updated seamonkey packages fix several security ...

0

SeaMonkey is an open source Web browser, email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code or JavaScript, possibly presenting misleading data to a user, or stealing sensitive information such as login credentials. A flaw was found in the way SeaMonkey saved certain web pages to a local file. If a user saved the inner frame of a web page containing POST data, the POST data could be revealed to the inner frame, possibly surrendering sensitive information such as login credentials. Updated packages are available from updates.redhat.com.

April 28, 2009 14:09 Red Hat: Updated firefox packages fix several security is...

0

Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash, potentially, execute arbitrary code or JavaScript, possibly presenting misleading data to a user, or stealing sensitive information such as login credentials. A flaw was found in the way Firefox saved certain web pages to a local file. If a user saved the inner frame of a web page containing POST data, the POST data could be revealed to the inner frame, possibly surrendering sensitive information such as login credentials. Updated packages are available from updates.redhat.com.

April 20, 2009 12:58 Red Hat: Updated kdegraphics packages fix multiple securi...

0

The kdegraphics packages contain applications for the K Desktop Environment, including KPDF, a viewer for Portable Document Format (PDF) files. Multiple flaws were found in KPDF’s JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause KPDF to crash or, potentially, execute arbitrary code when opened. Updated packages are available from updates.redhat.com.

April 20, 2009 12:57 Red Hat: An updated xpdf package fixes multiple security ...

0

Xpdf is an X Window System based viewer for Portable Document Format (PDF) files. Multiple flaws were found in Xpdf’s JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause Xpdf to crash or, potentially, execute arbitrary code when opened. Multiple input validation flaws were found in Xpdf’s JBIG2 decoder. An attacker could create a malicious PDF file that would cause Xpdf to crash or, potentially, execute arbitrary code when opened. Updated packages are available from updates.redhat.com.

April 20, 2009 12:54 Red Hat: Updated cups packages that fix multiple security...

0

The Common UNIX® Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the “lp” user if the file was printed. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, “imagetops” and “imagetoraster”. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the “lp” user if the file was printed. Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash when printed. Updated packages are available from updates.redhat.com.

April 20, 2009 12:52 Red Hat: Updated cups packages fix one security issue

0

The Common UNIX® Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, “imagetops” and “imagetoraster”. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the “lp” user if the file was printed. Updated packages are available from updates.redhat.com.

April 20, 2009 12:51 Red Hat: Updated udev packages fix one security issue

0

udev provides a user-space API and implements a dynamic device directory, providing only the devices present on the system. udev replaces devfs in order to provide greater hot plug functionality. Netlink is a datagram oriented service, used to transfer information between kernel modules and user-space processes. It was discovered that udev did not properly check the origin of Netlink messages. A local attacker could use this flaw to gain root privileges via a crafted Netlink message sent to udev, causing it to create a world-writable block device file for an existing system block device (for example, the root file system). Updated packages are available from updates.redhat.com.

April 20, 2009 11:00 Red Hat: Updated ghostscript packages fix multiple securi...

0

Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. It was discovered that the Red Hat Security Advisory RHSA-2009:0345 did not address all possible integer overflow flaws in Ghostscript’s International Color Consortium Format library (icclib). Using specially-crafted ICC profiles, an attacker could create a malicious PostScript or PDF file with embedded images that could cause Ghostscript to crash or, potentially, execute arbitrary code when opened. A missing boundary check was found in Ghostscript’s CCITTFax decoding filter. An attacker could create a specially-crafted PostScript or PDF file that could cause Ghostscript to crash or, potentially, execute arbitrary code when opened. Updated packages are available from updates.redhat.com.

April 20, 2009 10:45 Red Hat: Updated device-mapper-multipath packages fix a s...

0

The device-mapper multipath packages provide tools to manage multipath devices by issuing instructions to the device-mapper multipath kernel module, and by managing the creation and removal of partitions for device-mapper devices. It was discovered that the multipathd daemon set incorrect permissions on the socket used to communicate with command line clients. An unprivileged, local user could use this flaw to send commands to multipathd, resulting in access disruptions to storage devices accessible via multiple paths and, possibly, file system corruption on these devices. Updated packages are available from updates.redhat.com.

April 20, 2009 10:43 Red Hat: Updated krb5 packages fix a security issue

0

Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third party, the Key Distribution Center (KDC). An input validation flaw was found in the ASN.1 (Abstract Syntax Notation One) decoder used by MIT Kerberos. A remote attacker could use this flaw to crash a network service using the MIT Kerberos library, such as kadmind or krb5kdc, by causing it to dereference or free an uninitialized pointer or, possibly, execute arbitrary code with the privileges of the user running the service. Updated packages are available from updates.redhat.com.

April 20, 2009 10:37 Red Hat: Updated krb5 packages fix various security issues

0

Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third party. An input validation flaw was found in the ASN.1 (Abstract Syntax Notation One) decoder used by MIT Kerberos. A remote attacker could use this flaw to crash a network service using the MIT Kerberos library, such as kadmind or krb5kdc, by causing it to dereference or free an uninitialized pointer. Multiple input validation flaws were found in the MIT Kerberos GSS-API library’s implementation of the SPNEGO mechanism. A remote attacker could use these flaws to crash any network service utilizing the MIT Kerberos GSS-API library to authenticate users or, possibly, leak portions of the service’s memory. Updated packages are available from updates.redhat.com.

April 20, 2009 10:34 Red Hat: Updated java-1.6.0-openjdk packages fix several ...

0

These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Among other problems, a flaw was found in the way that the Java Virtual Machine (JVM) handled temporary font files. A malicious applet could use this flaw to use large amounts of disk space, causing a denial of service. A memory leak flaw was found in LittleCMS (embedded in OpenJDK). An application using color profiles could use excessive amounts of memory, and possibly crash after using all available memory, if used to open specially-crafted images. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in the way LittleCMS handled color profiles. An attacker could use these flaws to create a specially-crafted image file which could cause a Java application to crash or, possibly, execute arbitrary code when opened. A null pointer dereference flaw was found in LittleCMS. An application using color profiles could crash while converting a specially-crafted image file. A flaw in the Java API for XML Web Services (JAX-WS) service endpoint handling could allow a remote attacker to cause a denial of service on the server application hosting the JAX-WS service endpoint. Updated packages are available from updates.redhat.com.

April 20, 2009 10:31 Red Hat: Updated gstreamer-plugins-base packages fix a se...

0

GStreamer is a streaming media framework based on graphs of filters which operate on media data. GStreamer Base Plug-ins is a collection of well-maintained base plug-ins. An integer overflow flaw which caused a heap-based buffer overflow was discovered in the Vorbis comment tags reader. An attacker could create a carefully-crafted Vorbis file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if opened by a victim. Updated packages are available from updates.redhat.com.

April 20, 2009 10:29 Red Hat: Updated php packages fix several security issues

0

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. A heap-based buffer overflow flaw was found in PHP’s mbstring extension. A remote attacker able to pass arbitrary input to a PHP script using mbstring conversion functions could cause the PHP interpreter to crash or, possibly, execute arbitrary code. A flaw was found in the handling of the “mbstring.func_overload” configuration setting. A value set for one virtual host, or in a user’s .htaccess file, was incorrectly applied to other virtual hosts on the same server, causing the handling of multibyte character strings to not work correctly. A buffer overflow flaw was found in PHP’s imageloadfont function. If a PHP script allowed a remote attacker to load a carefully crafted font file, it could cause the PHP interpreter to crash or, possibly, execute arbitrary code. A flaw was found in the way PHP handled certain file extensions when running in FastCGI mode. If the PHP interpreter was being executed via FastCGI, a remote attacker could create a request which would cause the PHP interpreter to crash. A memory disclosure flaw was found in the PHP gd extension’s imagerotate function. A remote attacker able to pass arbitrary values as the “background color” argument of the function could, possibly, view portions of the PHP interpreter’s memory. A cross-site scripting flaw was found in a way PHP reported errors for invalid cookies. If the PHP interpreter had “display_errors” enabled, a remote attacker able to set a specially-crafted cookie on a victim’s system could possibly inject arbitrary HTML into an error message generated by PHP. Updated packages are available from updates.redhat.com.

April 20, 2009 10:21 Red Hat: Updated php packages that fix several security i...

0

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. A heap-based buffer overflow flaw was found in PHP’s mbstring extension. A remote attacker able to pass arbitrary input to a PHP script using mbstring conversion functions could cause the PHP interpreter to crash or, possibly, execute arbitrary code. A flaw was found in the handling of the “mbstring.func_overload” configuration setting. A value set for one virtual host, or in a user’s .htaccess file, was incorrectly applied to other virtual hosts on the same server, causing the handling of multibyte character strings to not work correctly. A buffer overflow flaw was found in PHP’s imageloadfont function. If a PHP script allowed a remote attacker to load a carefully crafted font file, it could cause the PHP interpreter to crash or, possibly, execute arbitrary code. A flaw was found in the way PHP handled certain file extensions when running in FastCGI mode. If the PHP interpreter was being executed via FastCGI, a remote attacker could create a request which would cause the PHP interpreter to crash. A memory disclosure flaw was found in the PHP gd extension’s imagerotate function. A remote attacker able to pass arbitrary values as the “background color” argument of the function could, possibly, view portions of the PHP interpreter’s memory. Updated packages are available from updates.redhat.com.

April 01, 2009 15:21 Red Hat: Updated kernel packages fix several security issues

0

The kernel packages contain the Linux kernel, the core of any Linux operating system. Among other things, memory leaks were found on some error paths in the icmp_send() function in the Linux kernel. Chris Evans reported a deficiency in the clone() system call which could lead to a denial of service of the parent process. An off-by-one underflow flaw was found in the eCryptfs subsystem which could potentially cause a local denial of service. A deficiency was found in the Remote BIOS Update (RBU) driver for Dell systems which could allow a local, unprivileged user to cause a denial of service. An inverted logic flaw was found in the SysKonnect FDDI PCI adapter driver, allowing driver statistics to be reset. The sock_getsockopt() function in the Linux kernel did not properly initialize a data structure that could possibly lead to memory disclosure. The ext2 and ext3 file system code failed to properly handle corrupted data structures, leading to a possible local denial of service. A deficiency was found in the libATA implementation which could lead to a local denial of service. Updated packages are available from updates.redhat.com.

April 01, 2009 15:16 Red Hat: Updated openswan packages fix various security i...

0

Openswan is a free implementation of Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). Gerd v. Egidy discovered a flaw in the Dead Peer Detection (DPD) in Openswan’s pluto IKE daemon. A remote attacker could use a malicious DPD packet to crash the pluto daemon. It was discovered that Openswan’s livetest script created temporary files in an insecure manner. A local attacker could use this flaw to overwrite arbitrary files owned by the user running the script. Updated packages are available from updates.redhat.com.

April 01, 2009 15:09 Red Hat: Updated firefox packages fix two security issues

0

Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A memory corruption flaw was discovered in the way Firefox handles XML files containing an XSLT transform. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running Firefox. A flaw was discovered in the way Firefox handles certain XUL garbage collection events. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running Firefox. Updated packages are available from updates.redhat.com.

April 01, 2009 15:03 Red Hat: Updated seamonkey packages fix two security issues

0

SeaMonkey is an open source Web browser, email and newsgroup client, IRC chat client, and HTML editor. A memory corruption flaw was discovered in the way SeaMonkey handles XML files containing an XSLT transform. A remote attacker could use this flaw to crash SeaMonkey or, potentially, execute arbitrary code as the user running SeaMonkey. A flaw was discovered in the way SeaMonkey handles certain XUL garbage collection events. A remote attacker could use this flaw to crash SeaMonkey or, potentially, execute arbitrary code as the user running SeaMonkey. Updated packages are available from updates.redhat.com.

April 01, 2009 14:59 Red Hat: Updated kernel-rt packages fix several security ...

0

The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A memory leak exists in keyctl handling. A local, unprivileged user could use this flaw to deplete kernel memory. An off-by-one underflow flaw was found in the eCryptfs subsystem. This could potentially cause a denial of service. A deficiency was found in the Remote BIOS Update (RBU) driver for Dell systems. This could allow a local, unprivileged user to cause a denial of service. An inverted logic flaw was found in the SysKonnect FDDI PCI adapter driver, allowing driver statistics to be reset. The sock_getsockopt() function in the Linux kernel did not properly initialize a data structure. This flaw could possibly lead to memory disclosure. Updated packages are available from updates.redhat.com.

April 01, 2009 14:58 Red Hat: Updated java-1.5.0-sun packages correct several ...

0

The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and the Sun Java 5 Software Development Kit. This update fixes several vulnerabilities in the Sun Java 5 Runtime Environment and the Sun Java 5 Software Development Kit. These vulnerabilities are summarized on the “Advance notification of Security Updates for Java SE” page from Sun Microsystems, listed in the References section. Updated packages are available from updates.redhat.com.

April 01, 2009 14:56 Red Hat: Updated java-1.6.0-sun packages correct several ...

0

The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. These vulnerabilities are summarized on the “Advance notification of Security Updates for Java SE” page from Sun Microsystems, listed in the References section. Updated packages are available from updates.redhat.com.

April 01, 2009 14:55 Red Hat: Updated systemtap packages fix a security issue

0

SystemTap is an instrumentation infrastructure for systems running version 2.6 of the Linux kernel. SystemTap scripts can collect system operations data, greatly simplifying information gathering. Collected data can then assist in performance measuring, functional testing, and performance and function problem diagnosis. A race condition was discovered in SystemTap that could allow users in the stapusr group to elevate privileges to that of members of the stapdev group (and hence root), bypassing directory confinement restrictions and allowing them to insert arbitrary SystemTap kernel modules. Updated packages are available from updates.redhat.com.

Screenshot

Project Spotlight

barvinok

A tool that counts the number of integer points in parametric polytopes.

Screenshot

Project Spotlight

Flora

An innovative NoSQL database.