Fedora Essential and Critical Security Patch Updates - Page 794
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Security fix release for Gallery 2.2 series. Multiple unspecified vulnerabilities in Gallery before 2.2.3 allow attackers to (1) rename items, (2) read and modify item properties, or (3) lock and replace items via unknown vectors in (a) the WebDAV module; and (4) edit unspecified data files using "linked items" in (a) WebDAV and (b) Reupload modules.
Security update fixing various format strings vulnerabilities and a DOS vulnerability in the vavoom server, this fixes: CVE-2007-4533, CVE-2007-4534 & CVE-2007-4535. Also see bugzilla bug 256621.
Ulf Harnhammar (Secunia Research) has discovered a format string vulnerability in sylpheed and claws-mail in inc_put_error() function in src/inc.c when displaying POP3 error reply. Problem can be exploited by malicious POP3 server via specially crafted POP3 server replies containing format specifiers. Successful exploitation may allow execution of arbitrary code, but requires that the user is tricked into connecting to a malicious POP3 server.
Upgrade to 1.8.2, Security fixes for 247582. Also corrects bug 245750, cron job problem.
This is an update to address a stack-based buffer overflow vulnerability in kword's pdf filter.
This update fixes the following vulnerability: "Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.6.x through 1.9.2, when $wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via a UTF-7 encoded value of the rs parameter, which is processed by Internet Explorer."
This update fixes a security problem concerning PDF handling. It also fixes printing speed with USB printers, and includes a fix for the LSPP support.
* Fri Aug 10 2007 Jindrich Novy 3.0-40.1 - backport upstream fix for xpdf integer overflow CVE-2007-3387 (#251514) - don't mess up file contexts while running texhash (#235032)
This is an update to address a vulnerability in kpdf, one that can cause a stack based buffer overflow.
This update primarily addresses problems with URL spoofing and consolekit/session permissions.
This update primarily addresses security issues around URL spoofing.
This update fixes a potential security problem (information leak) due to use of predictable name in /tmp. There is no CVE assignment yet
Multiple security flaws were found in libvorbis. This updated package fixes them all. Descriptions of the security bugs can be found in the Fedora bug reporting software.
This security update fixes a (minor) tempfile creation security issue (CVE-2007-4460) by using mkstemp (bugzilla 253553)
This security update of bochs fixes CVE-2007-2894: The emulated floppy disk controller in Bochs 2.3 allows local users of the guest operating system to cause a denial of service (virtual machine crash) via unspecified vectors, resulting in a divide-by-zero error.
The decode_choice function in net/netfilter/bf_conntrack_h323_asn1.c in the Linux kernel before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.
Gdm (the GNOME Display Manager) is a highly configurable reimplementation of xdm, the X Display Manager. JLANTHEA reported a denial of service flaw in the way that gdm listens on its unix domain socket. Any local user can crash the locally running X session.
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. This update fixes the following flaw. Allows cache-poisoning type of attack, no workaround, affect only outgoing queries.
Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the way Thunderbird processed certain malformed JavaScript code. A malicious HTML email message containing JavaScript code could cause Thunderbird to crash or potentially execute arbitrary code as the user running Thunderbird. JavaScript support is disabled by default in Thunderbird; these issues are not exploitable unless the user has enabled JavaScript.