Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0181 - Security Advisory
Issued:
2010-03-30
Updated:
2010-03-30

RHSA-2010:0181 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: brltty security and bug fix update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated brltty packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

brltty (Braille TTY) is a background process (daemon) which provides access
to the Linux console (when in text mode) for a blind person using a
refreshable braille display. It drives the braille display, and provides
complete screen review functionality.

It was discovered that a brltty library had an insecure relative RPATH
(runtime library search path) set in the ELF (Executable and Linking
Format) header. A local user able to convince another user to run an
application using brltty in an attacker-controlled directory, could run
arbitrary code with the privileges of the victim. (CVE-2008-3279)

These updated packages also provide fixes for the following bugs:

  • the brltty configuration file is documented in the brltty manual page,

but there is no separate manual page for the /etc/brltty.conf configuration
file: running "man brltty.conf" returned "No manual entry for brltty.conf"
rather than opening the brltty manual entry. This update adds brltty.conf.5
as an alias to the brltty manual page. Consequently, running "man
brltty.conf" now opens the manual entry documenting the brltty.conf
specification. (BZ#530554)

  • previously, the brltty-pm.conf configuration file was installed in the

/etc/brltty/ directory. This file, which configures Papenmeier Braille
Terminals for use with Red Hat Enterprise Linux, is optional. As well, it
did not come with a corresponding manual page. With this update, the file
has been moved to /usr/share/doc/brltty-3.7.2/BrailleDrivers/Papenmeier/.
This directory also includes a README document that explains the file's
purpose and format. (BZ#530554)

  • during the brltty packages installation, the message

Creating screen inspection device /dev/vcsa...done.

was presented at the console. This was inadequate, especially during the
initial install of the system. These updated packages do not send any
message to the console during installation. (BZ#529163)

  • although brltty contains ELF objects, the brltty-debuginfo package was

empty. With this update, the -debuginfo package contains valid debugging
information as expected. (BZ#500545)

  • the MAX_NR_CONSOLES definition was acquired by brltty by #including

linux/tty.h in Programs/api_client.c. MAX_NR_CONSOLES has since moved to
linux/vt.h but the #include in api_client.c was not updated. Consequently,
brltty could not be built from the source RPM against the Red Hat
Enterprise Linux 5 kernel. This update corrects the #include in
api_client.c to linux/vt.h and brltty now builds from source as expected.
(BZ#456247)

All brltty users are advised to upgrade to these updated packages, which
resolve these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 456247 - brltty doesn't build with kernel 2.6.18-92.1.1
  • BZ - 457942 - CVE-2008-3279 brltty: insecure relative RPATH
  • BZ - 500545 - brltty-debuginfo is empty
  • BZ - 529163 - Creating screen inspection device /dev/vcsa...done.
  • BZ - 530554 - Missing man-pages

CVEs

  • CVE-2008-3279

References

  • http://www.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
brltty-3.7.2-4.el5.src.rpm SHA-256: d426e8d23706300a7aefb352f9ca8a7fd2be21756ed21766c00935ea00715f47
x86_64
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-0.4.1-4.el5.x86_64.rpm SHA-256: 5b8d00632e9d309b98c4c96e7947cba1074b7ab629b74748b60d196a3fa05006
brlapi-devel-0.4.1-4.el5.i386.rpm SHA-256: 177a0b966d0fce98015774b5241946af9ba0d69eef431acd5dba74709f04d014
brlapi-devel-0.4.1-4.el5.x86_64.rpm SHA-256: 9cbdfc46cffba4c2c5fd95d5b9aa08572fd531076cef0ab3790a5ce036d19b26
brltty-3.7.2-4.el5.x86_64.rpm SHA-256: cc2e6cb077798683ed7bb5b4cb8ce242b62ea0363029ab88edfd38d7447e6e66
ia64
brlapi-0.4.1-4.el5.ia64.rpm SHA-256: 3eb2a2f67ab8df318243dd1e09327bc4a8857e074a4dd8e36a662f1a074b1293
brlapi-devel-0.4.1-4.el5.ia64.rpm SHA-256: 168e099af8acbb1efc434b15665805174e9d81eb0ffef1c53b1a223140b0cdec
brltty-3.7.2-4.el5.ia64.rpm SHA-256: 4799cbd414d732b359a6595478a639fa1f97379a30fcc99236ca8c19e64cf953
i386
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-devel-0.4.1-4.el5.i386.rpm SHA-256: 177a0b966d0fce98015774b5241946af9ba0d69eef431acd5dba74709f04d014
brltty-3.7.2-4.el5.i386.rpm SHA-256: fb9b49ae9845f91f2c679efd91f3656fb72f557b454e52c37277c778250dacb1

Red Hat Enterprise Linux Workstation 5

SRPM
brltty-3.7.2-4.el5.src.rpm SHA-256: d426e8d23706300a7aefb352f9ca8a7fd2be21756ed21766c00935ea00715f47
x86_64
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-0.4.1-4.el5.x86_64.rpm SHA-256: 5b8d00632e9d309b98c4c96e7947cba1074b7ab629b74748b60d196a3fa05006
brlapi-devel-0.4.1-4.el5.i386.rpm SHA-256: 177a0b966d0fce98015774b5241946af9ba0d69eef431acd5dba74709f04d014
brlapi-devel-0.4.1-4.el5.x86_64.rpm SHA-256: 9cbdfc46cffba4c2c5fd95d5b9aa08572fd531076cef0ab3790a5ce036d19b26
brltty-3.7.2-4.el5.x86_64.rpm SHA-256: cc2e6cb077798683ed7bb5b4cb8ce242b62ea0363029ab88edfd38d7447e6e66
i386
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-devel-0.4.1-4.el5.i386.rpm SHA-256: 177a0b966d0fce98015774b5241946af9ba0d69eef431acd5dba74709f04d014
brltty-3.7.2-4.el5.i386.rpm SHA-256: fb9b49ae9845f91f2c679efd91f3656fb72f557b454e52c37277c778250dacb1

Red Hat Enterprise Linux Desktop 5

SRPM
brltty-3.7.2-4.el5.src.rpm SHA-256: d426e8d23706300a7aefb352f9ca8a7fd2be21756ed21766c00935ea00715f47
x86_64
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-0.4.1-4.el5.x86_64.rpm SHA-256: 5b8d00632e9d309b98c4c96e7947cba1074b7ab629b74748b60d196a3fa05006
brltty-3.7.2-4.el5.x86_64.rpm SHA-256: cc2e6cb077798683ed7bb5b4cb8ce242b62ea0363029ab88edfd38d7447e6e66
i386
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brltty-3.7.2-4.el5.i386.rpm SHA-256: fb9b49ae9845f91f2c679efd91f3656fb72f557b454e52c37277c778250dacb1

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
brltty-3.7.2-4.el5.src.rpm SHA-256: d426e8d23706300a7aefb352f9ca8a7fd2be21756ed21766c00935ea00715f47
s390x
brlapi-0.4.1-4.el5.s390.rpm SHA-256: f02d52f6b011ade92c7a3c822bca707a7c689d5df121d31fee2f57b85f77ae59
brlapi-0.4.1-4.el5.s390x.rpm SHA-256: 1abb23997896b9b7a47c1c384749832c53327ea16405024bd7062f9a1de945d2
brlapi-devel-0.4.1-4.el5.s390.rpm SHA-256: d158684b729b5bdb23e090c15fd99f4bd612eb55ec47eefe2e15d6c6c27ab181
brlapi-devel-0.4.1-4.el5.s390x.rpm SHA-256: 3f1b19108770b574b95f661184dd803089ede9c1c75e7049783734aff8811f13
brltty-3.7.2-4.el5.s390x.rpm SHA-256: 47878e70c3d504e22e8ee54160f8a3d1d97853193864b30ceda9d837eaa99d4f

Red Hat Enterprise Linux for Power, big endian 5

SRPM
brltty-3.7.2-4.el5.src.rpm SHA-256: d426e8d23706300a7aefb352f9ca8a7fd2be21756ed21766c00935ea00715f47
ppc
brlapi-0.4.1-4.el5.ppc.rpm SHA-256: 81d9c2928c2afca8b42979dcc0e249a6f400e667cddd4cf888e751f38c998fce
brlapi-0.4.1-4.el5.ppc64.rpm SHA-256: 357ed561ac82000778112eefc7e4d248cb245257d847bd2d8d963886c549e180
brlapi-devel-0.4.1-4.el5.ppc.rpm SHA-256: 98f8f2499eb688a2660fe3fe592f847e75c476215adb168381905a6689b01627
brlapi-devel-0.4.1-4.el5.ppc64.rpm SHA-256: 1c26698f27a3317f297786f601161223ac949d118aa01eb7b86862262a57fb4c
brltty-3.7.2-4.el5.ppc.rpm SHA-256: d4f7bb42d436d89bfbb2d50c799d25ccc84c316c916863c33fe74359f32b95fc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
brltty-3.7.2-4.el5.src.rpm SHA-256: d426e8d23706300a7aefb352f9ca8a7fd2be21756ed21766c00935ea00715f47
x86_64
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-0.4.1-4.el5.x86_64.rpm SHA-256: 5b8d00632e9d309b98c4c96e7947cba1074b7ab629b74748b60d196a3fa05006
brlapi-devel-0.4.1-4.el5.i386.rpm SHA-256: 177a0b966d0fce98015774b5241946af9ba0d69eef431acd5dba74709f04d014
brlapi-devel-0.4.1-4.el5.x86_64.rpm SHA-256: 9cbdfc46cffba4c2c5fd95d5b9aa08572fd531076cef0ab3790a5ce036d19b26
brltty-3.7.2-4.el5.x86_64.rpm SHA-256: cc2e6cb077798683ed7bb5b4cb8ce242b62ea0363029ab88edfd38d7447e6e66
i386
brlapi-0.4.1-4.el5.i386.rpm SHA-256: ed16d10f2367df47176c350c4d7a6fbf8d287c185dd4166cded956cd06dca182
brlapi-devel-0.4.1-4.el5.i386.rpm SHA-256: 177a0b966d0fce98015774b5241946af9ba0d69eef431acd5dba74709f04d014
brltty-3.7.2-4.el5.i386.rpm SHA-256: fb9b49ae9845f91f2c679efd91f3656fb72f557b454e52c37277c778250dacb1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility