<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    <tt>Oracle Linux Security Advisory ELSA-2011-0953<br>
      <br>
      <a class="moz-txt-link-freetext"
        href="https://rhn.redhat.com/errata/RHSA-2011-0953.html">https://rhn.redhat.com/errata/RHSA-2011-0953.html</a><br>
      <br>
      The following updated rpms for Oracle Linux 6 have been uploaded
      to the Unbreakable Linux Network:<br>
      <br>
      i386:<br>
      system-config-firewall-1.2.27-3.el6_1.3.noarch.rpm<br>
      system-config-firewall-base-1.2.27-3.el6_1.3.noarch.rpm<br>
      system-config-firewall-tui-1.2.27-3.el6_1.3.noarch.rpm<br>
      system-config-printer-1.1.16-17.el6_1.2.i686.rpm<br>
      system-config-printer-libs-1.1.16-17.el6_1.2.i686.rpm<br>
      system-config-printer-udev-1.1.16-17.el6_1.2.i686.rpm<br>
      <br>
      x86_64:<br>
      system-config-firewall-1.2.27-3.el6_1.3.noarch.rpm<br>
      system-config-firewall-base-1.2.27-3.el6_1.3.noarch.rpm<br>
      system-config-firewall-tui-1.2.27-3.el6_1.3.noarch.rpm<br>
      system-config-printer-1.1.16-17.el6_1.2.x86_64.rpm<br>
      system-config-printer-libs-1.1.16-17.el6_1.2.x86_64.rpm<br>
      system-config-printer-udev-1.1.16-17.el6_1.2.x86_64.rpm<br>
      <br>
      <br>
      SRPMS:<br>
      <a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol6/SRPMS-updates/system-config-firewall-1.2.27-3.el6_1.3.src.rpm">http://oss.oracle.com/ol6/SRPMS-updates/system-config-firewall-1.2.27-3.el6_1.3.src.rpm</a><br>
      <a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol6/SRPMS-updates/system-config-printer-1.1.16-17.el6_1.2.src.rpm">http://oss.oracle.com/ol6/SRPMS-updates/system-config-printer-1.1.16-17.el6_1.2.src.rpm</a><br>
      <br>
      <br>
      Description of changes:<br>
      <br>
      system-config-firewall:<br>
      <br>
      [1.2.27-3.3]<br>
      - fixed possible privilege escalation flaw via use of python
      pickle<br>
        (CVE-2011-2520), replaced pickle by json (rhbz#717985)<br>
      - stop D-BUS firewall mechanism on update<br>
      <br>
      system-config-printer:<br>
      <br>
      [1.1.16-17:.2]<br>
      - Build pycups with -fno-strict-aliasing compiler option to avoid<br>
        compiler warnings.<br>
      <br>
      [1.1.16-17:.1]<br>
      - Adapted to system-config-firewall API change (bug #717985,
      CVE-2011-2520).</tt><br>
     <!-- This signature was generated by the MyDesktop Oracle Business Signature utility version 3.5.7 -->
  </body>
</html>