Red Hat has released the following Security Advisories for Red Hat Enterprise Linux
- [RHSA-2010:0520-01] Important: libtiff security update
- [RHSA-2010:0521-01] Moderate: gfs-kmod security update
- [RHSA-2010:0528-01] Moderate: avahi security update
[RHSA-2010:0520-01] Important: libtiff security update
=====================================================================
Red Hat Security Advisory
Synopsis: Important: libtiff security update
Advisory ID: RHSA-2010:0520-01
Product: Red Hat Enterprise Linux
Advisory URL: rhn.redhat.com | Red Hat Support
Issue date: 2010-07-08
CVE Names: CVE-2010-1411 CVE-2010-2598
=====================================================================
1. Summary:
Updated libtiff packages that fix two security issues are now available for
Red Hat Enterprise Linux 3.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Description:
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.
Multiple integer overflow flaws, leading to a buffer overflow, were
discovered in libtiff. An attacker could use these flaws to create a
specially-crafted TIFF file that, when opened, would cause an application
linked against libtiff to crash or, possibly, execute arbitrary code.
(CVE-2010-1411)
An input validation flaw was discovered in libtiff. An attacker could use
this flaw to create a specially-crafted TIFF file that, when opened, would
cause an application linked against libtiff to crash. (CVE-2010-2598)
Red Hat would like to thank Apple Product Security for responsibly
reporting the CVE-2010-1411 flaw, who credit Kevin Finisterre of
digitalmunition.com for the discovery of the issue.
All libtiff users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. All running
applications linked against libtiff must be restarted for this update to
take effect.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
301 Moved Permanently
5. Bugs fixed (http://bugzilla.redhat.com/):
592361 - CVE-2010-1411 libtiff: integer overflows leading to heap overflow in Fax3SetupState
610786 - CVE-2010-2598 libtiff: crash when reading image with not configured compression
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/libtiff-3.5.7-34.el3.src.rpm
i386:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-devel-3.5.7-34.el3.i386.rpm
ia64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.ia64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.ia64.rpm
libtiff-devel-3.5.7-34.el3.ia64.rpm
ppc:
libtiff-3.5.7-34.el3.ppc.rpm
libtiff-3.5.7-34.el3.ppc64.rpm
libtiff-debuginfo-3.5.7-34.el3.ppc.rpm
libtiff-debuginfo-3.5.7-34.el3.ppc64.rpm
libtiff-devel-3.5.7-34.el3.ppc.rpm
s390:
libtiff-3.5.7-34.el3.s390.rpm
libtiff-debuginfo-3.5.7-34.el3.s390.rpm
libtiff-devel-3.5.7-34.el3.s390.rpm
s390x:
libtiff-3.5.7-34.el3.s390.rpm
libtiff-3.5.7-34.el3.s390x.rpm
libtiff-debuginfo-3.5.7-34.el3.s390.rpm
libtiff-debuginfo-3.5.7-34.el3.s390x.rpm
libtiff-devel-3.5.7-34.el3.s390x.rpm
x86_64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.x86_64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.x86_64.rpm
libtiff-devel-3.5.7-34.el3.x86_64.rpm
Red Hat Desktop version 3:
Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/libtiff-3.5.7-34.el3.src.rpm
i386:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-devel-3.5.7-34.el3.i386.rpm
x86_64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.x86_64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.x86_64.rpm
libtiff-devel-3.5.7-34.el3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/libtiff-3.5.7-34.el3.src.rpm
i386:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-devel-3.5.7-34.el3.i386.rpm
ia64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.ia64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.ia64.rpm
libtiff-devel-3.5.7-34.el3.ia64.rpm
x86_64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.x86_64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.x86_64.rpm
libtiff-devel-3.5.7-34.el3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/libtiff-3.5.7-34.el3.src.rpm
i386:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-devel-3.5.7-34.el3.i386.rpm
ia64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.ia64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.ia64.rpm
libtiff-devel-3.5.7-34.el3.ia64.rpm
x86_64:
libtiff-3.5.7-34.el3.i386.rpm
libtiff-3.5.7-34.el3.x86_64.rpm
libtiff-debuginfo-3.5.7-34.el3.i386.rpm
libtiff-debuginfo-3.5.7-34.el3.x86_64.rpm
libtiff-devel-3.5.7-34.el3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
redhat.com | GPG Keys
7. References:
redhat.com | CVE-2010-1411
redhat.com | CVE-2010-2598
redhat.com | Severity Ratings
8. Contact:
The Red Hat security contact is . More contact
details at redhat.com | Contact Security Response Team
Copyright 2010 Red Hat, Inc.
[RHSA-2010:0521-01] Moderate: gfs-kmod security update
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: gfs-kmod security update
Advisory ID: RHSA-2010:0521-01
Product: Red Hat Enterprise Linux
Advisory URL: rhn.redhat.com | Red Hat Support
Issue date: 2010-07-08
CVE Names: CVE-2010-0727
=====================================================================
1. Summary:
Updated gfs-kmod packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.4 Extended Update Support, kernel release
2.6.18-164.19.1.el5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
RHEL Cluster-Storage (v. 5.4.Z server) - i386, ia64, ppc, x86_64
3. Description:
The gfs-kmod packages contain modules that provide the ability to mount and
use GFS file systems.
A flaw was found in the gfs_lock() implementation. The GFS locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS file system mounted could use this flaw to cause
a kernel panic. (CVE-2010-0727)
These updated gfs-kmod packages are in sync with the latest kernel
(2.6.18-164.19.1.el5). The modules in earlier gfs-kmod packages failed to
load because they did not match the running kernel. It was possible to
force-load the modules. With this update, however, users no longer need to.
Users are advised to upgrade to these latest gfs-kmod packages, updated for
use with the 2.6.18-164.19.1.el5 kernel, which contain a backported patch
to correct this issue.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
301 Moved Permanently
5. Bugs fixed (http://bugzilla.redhat.com/):
570863 - CVE-2010-0727 bug in GFS/GFS2 locking code leads to dos
6. Package List:
RHEL Cluster-Storage (v. 5.4.Z server):
Source:
gfs-kmod-0.1.34-2.el5_4.3.src.rpm
i386:
gfs-kmod-debuginfo-0.1.34-2.el5_4.3.i686.rpm
kmod-gfs-0.1.34-2.el5_4.3.i686.rpm
kmod-gfs-PAE-0.1.34-2.el5_4.3.i686.rpm
kmod-gfs-xen-0.1.34-2.el5_4.3.i686.rpm
ia64:
gfs-kmod-debuginfo-0.1.34-2.el5_4.3.ia64.rpm
kmod-gfs-0.1.34-2.el5_4.3.ia64.rpm
kmod-gfs-xen-0.1.34-2.el5_4.3.ia64.rpm
ppc:
gfs-kmod-debuginfo-0.1.34-2.el5_4.3.ppc64.rpm
kmod-gfs-0.1.34-2.el5_4.3.ppc64.rpm
x86_64:
gfs-kmod-debuginfo-0.1.34-2.el5_4.3.x86_64.rpm
kmod-gfs-0.1.34-2.el5_4.3.x86_64.rpm
kmod-gfs-xen-0.1.34-2.el5_4.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
redhat.com | GPG Keys
7. References:
redhat.com | CVE-2010-0727
redhat.com | Severity Ratings
8. Contact:
The Red Hat security contact is . More contact
details at redhat.com | Contact Security Response Team
Copyright 2010 Red Hat, Inc.
[RHSA-2010:0528-01] Moderate: avahi security update
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: avahi security update
Advisory ID: RHSA-2010:0528-01
Product: Red Hat Enterprise Linux
Advisory URL: rhn.redhat.com | Red Hat Support
Issue date: 2010-07-13
CVE Names: CVE-2009-0758 CVE-2010-2244
=====================================================================
1. Summary:
Updated avahi packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. Description:
Avahi is an implementation of the DNS Service Discovery and Multicast DNS
specifications for Zero Configuration Networking. It facilitates service
discovery on a local network. Avahi and Avahi-aware applications allow you
to plug your computer into a network and, with no configuration, view other
people to chat with, view printers to print to, and find shared files on
other computers.
A flaw was found in the way the Avahi daemon (avahi-daemon) processed
Multicast DNS (mDNS) packets with corrupted checksums. An attacker on the
local network could use this flaw to cause avahi-daemon on a target system
to exit unexpectedly via specially-crafted mDNS packets. (CVE-2010-2244)
A flaw was found in the way avahi-daemon processed incoming unicast mDNS
messages. If the mDNS reflector were enabled on a system, an attacker on
the local network could send a specially-crafted unicast mDNS message to
that system, resulting in its avahi-daemon flooding the network with a
multicast packet storm, and consuming a large amount of CPU. Note: The mDNS
reflector is disabled by default. (CVE-2009-0758)
All users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the update,
avahi-daemon will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
301 Moved Permanently
5. Bugs fixed (http://bugzilla.redhat.com/):
488314 - CVE-2009-0758 avahi: remote DoS via legacy unicast mDNS queries
607293 - CVE-2010-2244 avahi: assertion failure after receiving a packet with corrupted checksum
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/avahi-0.6.16-9.el5_5.src.rpm
i386:
avahi-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.i386.rpm
avahi-debuginfo-0.6.16-9.el5_5.i386.rpm
avahi-devel-0.6.16-9.el5_5.i386.rpm
avahi-glib-0.6.16-9.el5_5.i386.rpm
avahi-glib-devel-0.6.16-9.el5_5.i386.rpm
avahi-qt3-0.6.16-9.el5_5.i386.rpm
avahi-qt3-devel-0.6.16-9.el5_5.i386.rpm
avahi-tools-0.6.16-9.el5_5.i386.rpm
x86_64:
avahi-0.6.16-9.el5_5.i386.rpm
avahi-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-howl-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.x86_64.rpm
avahi-debuginfo-0.6.16-9.el5_5.i386.rpm
avahi-debuginfo-0.6.16-9.el5_5.x86_64.rpm
avahi-glib-0.6.16-9.el5_5.i386.rpm
avahi-glib-0.6.16-9.el5_5.x86_64.rpm
avahi-qt3-0.6.16-9.el5_5.i386.rpm
avahi-qt3-0.6.16-9.el5_5.x86_64.rpm
avahi-tools-0.6.16-9.el5_5.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/avahi-0.6.16-9.el5_5.src.rpm
i386:
avahi-compat-howl-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.i386.rpm
avahi-debuginfo-0.6.16-9.el5_5.i386.rpm
avahi-devel-0.6.16-9.el5_5.i386.rpm
avahi-glib-devel-0.6.16-9.el5_5.i386.rpm
avahi-qt3-devel-0.6.16-9.el5_5.i386.rpm
x86_64:
avahi-compat-howl-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-debuginfo-0.6.16-9.el5_5.i386.rpm
avahi-debuginfo-0.6.16-9.el5_5.x86_64.rpm
avahi-devel-0.6.16-9.el5_5.i386.rpm
avahi-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-glib-devel-0.6.16-9.el5_5.i386.rpm
avahi-glib-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-qt3-devel-0.6.16-9.el5_5.i386.rpm
avahi-qt3-devel-0.6.16-9.el5_5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/avahi-0.6.16-9.el5_5.src.rpm
i386:
avahi-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.i386.rpm
avahi-debuginfo-0.6.16-9.el5_5.i386.rpm
avahi-devel-0.6.16-9.el5_5.i386.rpm
avahi-glib-0.6.16-9.el5_5.i386.rpm
avahi-glib-devel-0.6.16-9.el5_5.i386.rpm
avahi-qt3-0.6.16-9.el5_5.i386.rpm
avahi-qt3-devel-0.6.16-9.el5_5.i386.rpm
avahi-tools-0.6.16-9.el5_5.i386.rpm
ia64:
avahi-0.6.16-9.el5_5.ia64.rpm
avahi-compat-howl-0.6.16-9.el5_5.ia64.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.ia64.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.ia64.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.ia64.rpm
avahi-debuginfo-0.6.16-9.el5_5.ia64.rpm
avahi-devel-0.6.16-9.el5_5.ia64.rpm
avahi-glib-0.6.16-9.el5_5.ia64.rpm
avahi-glib-devel-0.6.16-9.el5_5.ia64.rpm
avahi-qt3-0.6.16-9.el5_5.ia64.rpm
avahi-qt3-devel-0.6.16-9.el5_5.ia64.rpm
avahi-tools-0.6.16-9.el5_5.ia64.rpm
ppc:
avahi-0.6.16-9.el5_5.ppc.rpm
avahi-0.6.16-9.el5_5.ppc64.rpm
avahi-compat-howl-0.6.16-9.el5_5.ppc.rpm
avahi-compat-howl-0.6.16-9.el5_5.ppc64.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.ppc.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.ppc64.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.ppc.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.ppc64.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.ppc.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.ppc64.rpm
avahi-debuginfo-0.6.16-9.el5_5.ppc.rpm
avahi-debuginfo-0.6.16-9.el5_5.ppc64.rpm
avahi-devel-0.6.16-9.el5_5.ppc.rpm
avahi-devel-0.6.16-9.el5_5.ppc64.rpm
avahi-glib-0.6.16-9.el5_5.ppc.rpm
avahi-glib-0.6.16-9.el5_5.ppc64.rpm
avahi-glib-devel-0.6.16-9.el5_5.ppc.rpm
avahi-glib-devel-0.6.16-9.el5_5.ppc64.rpm
avahi-qt3-0.6.16-9.el5_5.ppc.rpm
avahi-qt3-0.6.16-9.el5_5.ppc64.rpm
avahi-qt3-devel-0.6.16-9.el5_5.ppc.rpm
avahi-qt3-devel-0.6.16-9.el5_5.ppc64.rpm
avahi-tools-0.6.16-9.el5_5.ppc.rpm
s390x:
avahi-0.6.16-9.el5_5.s390.rpm
avahi-0.6.16-9.el5_5.s390x.rpm
avahi-compat-howl-0.6.16-9.el5_5.s390.rpm
avahi-compat-howl-0.6.16-9.el5_5.s390x.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.s390.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.s390x.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.s390.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.s390x.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.s390.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.s390x.rpm
avahi-debuginfo-0.6.16-9.el5_5.s390.rpm
avahi-debuginfo-0.6.16-9.el5_5.s390x.rpm
avahi-devel-0.6.16-9.el5_5.s390.rpm
avahi-devel-0.6.16-9.el5_5.s390x.rpm
avahi-glib-0.6.16-9.el5_5.s390.rpm
avahi-glib-0.6.16-9.el5_5.s390x.rpm
avahi-glib-devel-0.6.16-9.el5_5.s390.rpm
avahi-glib-devel-0.6.16-9.el5_5.s390x.rpm
avahi-qt3-0.6.16-9.el5_5.s390.rpm
avahi-qt3-0.6.16-9.el5_5.s390x.rpm
avahi-qt3-devel-0.6.16-9.el5_5.s390.rpm
avahi-qt3-devel-0.6.16-9.el5_5.s390x.rpm
avahi-tools-0.6.16-9.el5_5.s390x.rpm
x86_64:
avahi-0.6.16-9.el5_5.i386.rpm
avahi-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-howl-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-howl-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-0.6.16-9.el5_5.x86_64.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.i386.rpm
avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-debuginfo-0.6.16-9.el5_5.i386.rpm
avahi-debuginfo-0.6.16-9.el5_5.x86_64.rpm
avahi-devel-0.6.16-9.el5_5.i386.rpm
avahi-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-glib-0.6.16-9.el5_5.i386.rpm
avahi-glib-0.6.16-9.el5_5.x86_64.rpm
avahi-glib-devel-0.6.16-9.el5_5.i386.rpm
avahi-glib-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-qt3-0.6.16-9.el5_5.i386.rpm
avahi-qt3-0.6.16-9.el5_5.x86_64.rpm
avahi-qt3-devel-0.6.16-9.el5_5.i386.rpm
avahi-qt3-devel-0.6.16-9.el5_5.x86_64.rpm
avahi-tools-0.6.16-9.el5_5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
redhat.com | GPG Keys
7. References:
redhat.com | CVE-2009-0758
redhat.com | CVE-2010-2244
redhat.com | Severity Ratings
8. Contact:
The Red Hat security contact is . More contact
details at redhat.com | Contact Security Response Team
Copyright 2010 Red Hat, Inc.
scsi-target-utils/libtiff Security Updates for RHELLady Gaga slept in a car park on Saturday
This entry was posted
on 3:03 AM
.
Archives
-
▼
2010
(391)
-
▼
July
(50)
- CompatDB Updates 07/30/10
- java-1.4.2-ibm security update
- More CentOS Updates
- lvm2-cluster security update for RHEL
- Arch + XFCE: The perfect Desktop (for now)
- A few Ubuntu 10.04 fixes
- Thunderbird/Firefox/Seamonkey Update for Slackware
- Which Is Faster: Debian Linux or FreeBSD?
- PHP 5.3.3 packages for Debian Lenny are available
- PHP 5.2.14 for Debian Lenny
- The Perfect Desktop - Mandriva One 2010.1 Spring W...
- PHP 5.3.3 and 5.2.14 released
- Firefox/Seamonkey/Thunderbird Update for RHEL
- Lubuntu 10.04 Review
- 34 Security Updates for CentOS
- The Perfect Server - Mandriva 2010.1 (Spring) Free...
- 3 Security Updates for RHEL
- DSA 2072-1: New libpng packages fix several vulner...
- How to Create Your Own Customized Ubuntu Live CD
- 5 things to look forward to in Ubuntu 10.10
- OpenSUSE 11.3 LXDE Screenshots
- Wine release 1.2 released
- Speed up your Ubuntu machine boot time
- CompatDB Updates 07/14/10
- openSUSE 11.3 released
- CentOS Security Updates for perl-Archive-Tar/kernel
- How To Run Your Own Name Server With ISPConfig 3 A...
- How To Make Ubuntu A perfect Mac File Server and T...
- SUSE Security Announcement: Acrobat Reader (SUSE-S...
- Wine release 1.2 Release Candidate 7
- CompatDB Updates 07/09/10
- scsi-target-utils/libtiff Security Updates for RHEL
- GParted 0.6.1 Released
- SUSE Security Announcement: Mozilla Firefox (SUSE-...
- Install / Test Firefox 4.0 Beta in Ubuntu 10.04 Lu...
- Installing PowerDNS (With MySQL Backend) And Power...
- How To Install Latest Intel Driver 2.12 On Ubuntu ...
- Storage Management with an LVM GUI
- DSA 2059-2: New pcsc-lite packages fix regression
- Change your MAC address in Linux with MACchanger-GTK
- Wine release 1.2 Release Candidate 6
- How to Enable Icons on the Ubuntu System Menu (Min...
- Applications to make your KDE more powerful and sm...
- DSA-2067-1: New mahara packages fix several vulner...
- CompatDB Updates 07/04/10
- Enabling Compiz Fusion On A Fedora 13 GNOME Deskto...
- CompatDB Updates 07/02/10
- Ubuntu 10.10 Alpha 2 released
- Enabling Compiz Fusion On An Ubuntu 10.04 Desktop ...
- Install Linux Without Burning An ISO To CD/DVD - U...
-
▼
July
(50)