A new update is available for Red Hat Enterprise Linux. Here the announcement:
"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: cups security update
Advisory ID: RHSA-2008:0498-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0498.html
Issue date: 2008-06-04
CVE Names: CVE-2008-1722
=====================================================================
1. Summary:
Updated cups packages that fix a security issue are now available for Red
Hat Enterprise Linux 3, Red Hat Enterprise Linux 4, and Red Hat Enterprise
Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Description:
The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX operating systems.
An integer overflow flaw leading to a heap buffer overflow was discovered
in the Portable Network Graphics (PNG) decoding routines used by the CUPS
image converting filters "imagetops" and "imagetoraster". An attacker could
create a malicious PNG file that could possibly execute arbitrary code as
the "lp" user if the file was printed. (CVE-2008-1722)
All CUPS users are advised to upgrade to these updated packages, which
contain backported patch to resolve this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bugs fixed (http://bugzilla.redhat.com/):
441692 - CVE-2008-1722 cups: integer overflow in the image filter
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cups-1.1.17-13.3.53.src.rpm
i386:
cups-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-devel-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
ia64:
cups-1.1.17-13.3.53.ia64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.ia64.rpm
cups-devel-1.1.17-13.3.53.ia64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.ia64.rpm
ppc:
cups-1.1.17-13.3.53.ppc.rpm
cups-debuginfo-1.1.17-13.3.53.ppc.rpm
cups-debuginfo-1.1.17-13.3.53.ppc64.rpm
cups-devel-1.1.17-13.3.53.ppc.rpm
cups-libs-1.1.17-13.3.53.ppc.rpm
cups-libs-1.1.17-13.3.53.ppc64.rpm
s390:
cups-1.1.17-13.3.53.s390.rpm
cups-debuginfo-1.1.17-13.3.53.s390.rpm
cups-devel-1.1.17-13.3.53.s390.rpm
cups-libs-1.1.17-13.3.53.s390.rpm
s390x:
cups-1.1.17-13.3.53.s390x.rpm
cups-debuginfo-1.1.17-13.3.53.s390.rpm
cups-debuginfo-1.1.17-13.3.53.s390x.rpm
cups-devel-1.1.17-13.3.53.s390x.rpm
cups-libs-1.1.17-13.3.53.s390.rpm
cups-libs-1.1.17-13.3.53.s390x.rpm
x86_64:
cups-1.1.17-13.3.53.x86_64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.x86_64.rpm
cups-devel-1.1.17-13.3.53.x86_64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.x86_64.rpm
Red Hat Desktop version 3:
Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/cups-1.1.17-13.3.53.src.rpm
i386:
cups-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-devel-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
x86_64:
cups-1.1.17-13.3.53.x86_64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.x86_64.rpm
cups-devel-1.1.17-13.3.53.x86_64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cups-1.1.17-13.3.53.src.rpm
i386:
cups-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-devel-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
ia64:
cups-1.1.17-13.3.53.ia64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.ia64.rpm
cups-devel-1.1.17-13.3.53.ia64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.ia64.rpm
x86_64:
cups-1.1.17-13.3.53.x86_64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.x86_64.rpm
cups-devel-1.1.17-13.3.53.x86_64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cups-1.1.17-13.3.53.src.rpm
i386:
cups-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-devel-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
ia64:
cups-1.1.17-13.3.53.ia64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.ia64.rpm
cups-devel-1.1.17-13.3.53.ia64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.ia64.rpm
x86_64:
cups-1.1.17-13.3.53.x86_64.rpm
cups-debuginfo-1.1.17-13.3.53.i386.rpm
cups-debuginfo-1.1.17-13.3.53.x86_64.rpm
cups-devel-1.1.17-13.3.53.x86_64.rpm
cups-libs-1.1.17-13.3.53.i386.rpm
cups-libs-1.1.17-13.3.53.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cups-1.1.22-0.rc1.9.20.2.el4_6.8.src.rpm
i386:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
ia64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
ppc:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.ppc.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.ppc.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.ppc64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.ppc.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.ppc.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.ppc64.rpm
s390:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.s390.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.s390.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.s390.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.s390.rpm
s390x:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.s390x.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.s390.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.s390x.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.s390x.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.s390.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.s390x.rpm
x86_64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cups-1.1.22-0.rc1.9.20.2.el4_6.8.src.rpm
i386:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
x86_64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cups-1.1.22-0.rc1.9.20.2.el4_6.8.src.rpm
i386:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
ia64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
x86_64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cups-1.1.22-0.rc1.9.20.2.el4_6.8.src.rpm
i386:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
ia64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.ia64.rpm
x86_64:
cups-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-debuginfo-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-devel-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.i386.rpm
cups-libs-1.1.22-0.rc1.9.20.2.el4_6.8.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.18.el5_2.1.src.rpm
i386:
cups-1.2.4-11.18.el5_2.1.i386.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-libs-1.2.4-11.18.el5_2.1.i386.rpm
cups-lpd-1.2.4-11.18.el5_2.1.i386.rpm
x86_64:
cups-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-libs-1.2.4-11.18.el5_2.1.i386.rpm
cups-libs-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-lpd-1.2.4-11.18.el5_2.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.18.el5_2.1.src.rpm
i386:
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-devel-1.2.4-11.18.el5_2.1.i386.rpm
x86_64:
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-devel-1.2.4-11.18.el5_2.1.i386.rpm
cups-devel-1.2.4-11.18.el5_2.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cups-1.2.4-11.18.el5_2.1.src.rpm
i386:
cups-1.2.4-11.18.el5_2.1.i386.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-devel-1.2.4-11.18.el5_2.1.i386.rpm
cups-libs-1.2.4-11.18.el5_2.1.i386.rpm
cups-lpd-1.2.4-11.18.el5_2.1.i386.rpm
ia64:
cups-1.2.4-11.18.el5_2.1.ia64.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.ia64.rpm
cups-devel-1.2.4-11.18.el5_2.1.ia64.rpm
cups-libs-1.2.4-11.18.el5_2.1.i386.rpm
cups-libs-1.2.4-11.18.el5_2.1.ia64.rpm
cups-lpd-1.2.4-11.18.el5_2.1.ia64.rpm
ppc:
cups-1.2.4-11.18.el5_2.1.ppc.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.ppc.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.ppc64.rpm
cups-devel-1.2.4-11.18.el5_2.1.ppc.rpm
cups-devel-1.2.4-11.18.el5_2.1.ppc64.rpm
cups-libs-1.2.4-11.18.el5_2.1.ppc.rpm
cups-libs-1.2.4-11.18.el5_2.1.ppc64.rpm
cups-lpd-1.2.4-11.18.el5_2.1.ppc.rpm
s390x:
cups-1.2.4-11.18.el5_2.1.s390x.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.s390.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.s390x.rpm
cups-devel-1.2.4-11.18.el5_2.1.s390.rpm
cups-devel-1.2.4-11.18.el5_2.1.s390x.rpm
cups-libs-1.2.4-11.18.el5_2.1.s390.rpm
cups-libs-1.2.4-11.18.el5_2.1.s390x.rpm
cups-lpd-1.2.4-11.18.el5_2.1.s390x.rpm
x86_64:
cups-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.i386.rpm
cups-debuginfo-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-devel-1.2.4-11.18.el5_2.1.i386.rpm
cups-devel-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-libs-1.2.4-11.18.el5_2.1.i386.rpm
cups-libs-1.2.4-11.18.el5_2.1.x86_64.rpm
cups-lpd-1.2.4-11.18.el5_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFIRq2/XlSAg2UNWIIRAsyBAKCwEzXA65eLSfgjLH/6m83ZxU8biACfZAXl
8kpCCrBL1HmnRc7GuaBu+TI=
=U0Oy
-----END PGP SIGNATURE-----
"
RHSA-2008:0288-01 Critical: samba security update
RHSA-2008:0270-01 Important: libvorbis security update
This entry was posted
on 2:03 AM
.
Archives
-
▼
2008
(457)
-
▼
June
(48)
- The Perfect Desktop - OpenSUSE 11 (GNOME)
- USN-620-1: OpenSSL vulnerabilities
- CESA-2008:0290 Critical CentOS 5 x86_64 samba Update
- ruby (SSA:2008-179-01)
- Mot ships new Linux phones
- CESA-2008:0519 Important CentOS 5 x86_64 kernel Up...
- CESA-2008:0519 Important CentOS 5 i386 kernel Update
- Ubuntu MID Edition ships
- CESA-2008:0290 Critical CentOS 5 i386 samba Update
- Battle of the Titans - Mandriva vs openSUSE: The R...
- Open source phone goes mass-market
- RHSA-2008:0133-01 Moderate: IBMJava2 security update
- RHSA-2008:0508-01 Important: kernel security and b...
- Embedding Python In Apache2 With mod_python (Debia...
- CESA-2008:0556 Important CentOS 4 i386 freetype - ...
- CESA-2008:0556 Important CentOS 3 i386 freetype - ...
- CESA-2008:0558-01: Important CentOS 2 i386 freetyp...
- How To Set Up WebDAV With MySQL Authentication On ...
- GLSA 200806-07 X.Org X server: Multiple vulnerabi...
- USN-612-11: openssl-blacklist update
- Linux robot plays frenetic clarinet
- PCLinuxOS GNOME Review
- GNOME 2.23.4 Released
- Linux prominent in chip show awards
- GLSA 200806-06 Evolution: User-assisted execution...
- openSUSE 11.0 released
- CESA-2008:0503 Important CentOS 4 s390(x) xorg-x11...
- Damn Small Linux 4.4 Review
- CESA-2008:0522 Important CentOS 3 s390(x) perl - s...
- USN-617-1: Samba vulnerabilities
- GLSA 200806-05 cbrPager: User-assisted execution ...
- RHSA-2008:0532-01 Important: perl security update
- Mozilla previews Firefox Mobile
- GLSA 200806-04 rdesktop: Multiple vulnerabilities
- USN-612-10: OpenVPN regression
- CESA-2008:0498 Moderate CentOS 3 s390(x) cups - se...
- CESA-2008:0498 Moderate CentOS 3 i386 cups - secur...
- Linux macro benchmark tool stabilizes
- CESA-2008:0498 Moderate CentOS 3 x86_64 cups - sec...
- CESA-2008:0516 Critical CentOS 3 i386 evolution - ...
- GLSA 200806-02 libxslt: Execution of arbitrary code
- RHSA-2008:0498-01 Moderate: cups security update
- GLSA 200805-22 MPlayer: User-assisted execution o...
- CESA-2008:0288 Critical CentOS 4 x86_64 samba Update
- CESA-2008:0288 Critical CentOS 3 s390(x) samba - s...
- CESA-2008:0288 Critical CentOS 4 s390(x) samba - s...
- CESA-2008:0288-01: Critical CentOS 2 i386 samba se...
- RHSA-2008:0288-01 Critical: samba security update
-
▼
June
(48)