<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body bgcolor="#ffffff" text="#000000">
<tt>Oracle Linux Security Advisory ELSA-2011-0953<br>
<br>
<a class="moz-txt-link-freetext"
href="https://rhn.redhat.com/errata/RHSA-2011-0953.html">https://rhn.redhat.com/errata/RHSA-2011-0953.html</a><br>
<br>
The following updated rpms for Oracle Linux 6 have been uploaded
to the Unbreakable Linux Network:<br>
<br>
i386:<br>
system-config-firewall-1.2.27-3.el6_1.3.noarch.rpm<br>
system-config-firewall-base-1.2.27-3.el6_1.3.noarch.rpm<br>
system-config-firewall-tui-1.2.27-3.el6_1.3.noarch.rpm<br>
system-config-printer-1.1.16-17.el6_1.2.i686.rpm<br>
system-config-printer-libs-1.1.16-17.el6_1.2.i686.rpm<br>
system-config-printer-udev-1.1.16-17.el6_1.2.i686.rpm<br>
<br>
x86_64:<br>
system-config-firewall-1.2.27-3.el6_1.3.noarch.rpm<br>
system-config-firewall-base-1.2.27-3.el6_1.3.noarch.rpm<br>
system-config-firewall-tui-1.2.27-3.el6_1.3.noarch.rpm<br>
system-config-printer-1.1.16-17.el6_1.2.x86_64.rpm<br>
system-config-printer-libs-1.1.16-17.el6_1.2.x86_64.rpm<br>
system-config-printer-udev-1.1.16-17.el6_1.2.x86_64.rpm<br>
<br>
<br>
SRPMS:<br>
<a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol6/SRPMS-updates/system-config-firewall-1.2.27-3.el6_1.3.src.rpm">http://oss.oracle.com/ol6/SRPMS-updates/system-config-firewall-1.2.27-3.el6_1.3.src.rpm</a><br>
<a class="moz-txt-link-freetext"
href="http://oss.oracle.com/ol6/SRPMS-updates/system-config-printer-1.1.16-17.el6_1.2.src.rpm">http://oss.oracle.com/ol6/SRPMS-updates/system-config-printer-1.1.16-17.el6_1.2.src.rpm</a><br>
<br>
<br>
Description of changes:<br>
<br>
system-config-firewall:<br>
<br>
[1.2.27-3.3]<br>
- fixed possible privilege escalation flaw via use of python
pickle<br>
(CVE-2011-2520), replaced pickle by json (rhbz#717985)<br>
- stop D-BUS firewall mechanism on update<br>
<br>
system-config-printer:<br>
<br>
[1.1.16-17:.2]<br>
- Build pycups with -fno-strict-aliasing compiler option to avoid<br>
compiler warnings.<br>
<br>
[1.1.16-17:.1]<br>
- Adapted to system-config-firewall API change (bug #717985,
CVE-2011-2520).</tt><br>
<!-- This signature was generated by the MyDesktop Oracle Business Signature utility version 3.5.7 -->
</body>
</html>