From bugzilla at redhat.com Mon Jan 5 07:13:13 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 5 Jan 2009 02:13:13 -0500 Subject: [RHSA-2008:0787-01] Important: kernel security update Message-ID: <200901050713.n057DDZg002712@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2008:0787-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0787.html Issue date: 2009-01-05 CVE Names: CVE-2007-3848 CVE-2006-4538 CVE-2006-4814 CVE-2007-4308 CVE-2007-2172 CVE-2007-6063 CVE-2007-6206 CVE-2007-6151 CVE-2008-0007 CVE-2008-2136 CVE-2008-3275 CVE-2008-3525 CVE-2008-4210 ===================================================================== 1. Summary: Updated kernel packages that fix a number of security issues are now available for Red Hat Enterprise Linux 2.1 running on 64-bit architectures. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * a flaw was found in the IPv4 forwarding base that allowed a local, unprivileged user to cause an out-of-bounds access. (CVE-2007-2172, Important) * a flaw was found in the handling of process death signals. This allowed a local, unprivileged user to send arbitrary signals to the suid-process executed by that user. Successful exploitation of this flaw depended on the structure of the suid-program and its signal handling. (CVE-2007-3848, Important) * when accessing kernel memory locations, certain Linux kernel drivers registering a fault handler did not perform required range checks. A local, unprivileged user could use this flaw to gain read or write access to arbitrary kernel memory, or possibly cause a kernel crash. (CVE-2008-0007, Important) * a possible kernel memory leak was found in the Linux kernel Simple Internet Transition (SIT) INET6 implementation. This could allow a local, unprivileged user to cause a denial of service. (CVE-2008-2136, Important) * missing capability checks were found in the SBNI WAN driver which could allow a local, unprivileged user to bypass intended capability restrictions. (CVE-2008-3525, Important) * a flaw was found in the way files were written using truncate() or ftruncate(). This could allow a local, unprivileged user to acquire the privileges of a different group and obtain access to sensitive information. (CVE-2008-4210, Important) * a flaw was found in the ELF handling on Itanium-based systems. This triggered a cross-region memory-mapping and allowed a local, unprivileged user to cause a local denial of service. (CVE-2006-4538, Moderate) * a race condition in the mincore system core allowed a local, unprivileged user to cause a local denial of service (system hang). (CVE-2006-4814, Moderate) * a flaw was found in the aacraid SCSI driver. This allowed a local, unprivileged user to make ioctl calls to the driver which should otherwise be restricted to privileged users. (CVE-2007-4308, Moderate) * two buffer overflow flaws were found in the Integrated Services Digital Network (ISDN) subsystem. A local, unprivileged user could use these flaws to cause a denial of service. (CVE-2007-6063, CVE-2007-6151, Moderate) * a flaw was found in the way core dump files were created. If a local, unprivileged user could make a root-owned process dump a core file into a user-writable directory, the user could gain read access to that core file, potentially compromising sensitive information. (CVE-2007-6206, Moderate) * a deficiency was found in the Linux kernel virtual file system (VFS) implementation. This could allow a local, unprivileged user to attempt file creation within deleted directories, possibly causing a local denial of service. (CVE-2008-3275, Moderate) All users of Red Hat Enterprise Linux 2.1 on 64-bit architectures should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 250429 - CVE-2007-2172 fib_semantics.c out of bounds access vulnerability 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG 252309 - CVE-2007-4308 kernel: Missing ioctl() permission checks in aacraid driver 289151 - CVE-2006-4538 kernel: Local DoS with corrupted ELF 306971 - CVE-2006-4814 kernel Race condition in mincore can cause "ps -ef" to hang 392101 - CVE-2007-6063 Linux Kernel isdn_net_setcfg buffer overflow 396861 - CVE-2007-6206 Issue with core dump owner 425111 - CVE-2007-6151 I4L: fix isdn_ioctl memory issue 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap 446031 - CVE-2008-2136 kernel: sit memory leak 457858 - CVE-2008-3275 Linux kernel local filesystem DoS 460401 - CVE-2008-3525 kernel: missing capability checks in sbni_ioctl() 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.18-e.67.src.rpm ia64: kernel-2.4.18-e.67.ia64.rpm kernel-doc-2.4.18-e.67.ia64.rpm kernel-smp-2.4.18-e.67.ia64.rpm kernel-source-2.4.18-e.67.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/kernel-2.4.18-e.67.src.rpm ia64: kernel-2.4.18-e.67.ia64.rpm kernel-doc-2.4.18-e.67.ia64.rpm kernel-smp-2.4.18-e.67.ia64.rpm kernel-source-2.4.18-e.67.ia64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4538 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJYbLEXlSAg2UNWIIRAgW2AKCr0WfvpkQp1GyF5MKaeewcVvo/ZQCgo5d0 U2oeQEBzmo04YPI0BUGQTw0= =KB/Z -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 10:32:50 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 05:32:50 -0500 Subject: [RHSA-2009:0002-01] Moderate: thunderbird security update Message-ID: <200901071032.n07AWpun031498@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: thunderbird security update Advisory ID: RHSA-2009:0002-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0002.html Issue date: 2009-01-07 CVE Names: CVE-2008-5500 CVE-2008-5501 CVE-2008-5502 CVE-2008-5503 CVE-2008-5506 CVE-2008-5507 CVE-2008-5508 CVE-2008-5511 CVE-2008-5512 CVE-2008-5513 ===================================================================== 1. Summary: Updated thunderbird packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5511, CVE-2008-5512, CVE-2008-5513) Several flaws were found in the way malformed content was processed. An HTML mail message containing specially-crafted content could potentially trick a Thunderbird user into surrendering sensitive information. (CVE-2008-5503, CVE-2008-5506, CVE-2008-5507) Note: JavaScript support is disabled by default in Thunderbird; the above issues are not exploitable unless JavaScript is enabled. A flaw was found in the way malformed URLs were processed by Thunderbird. This flaw could prevent various URL sanitization mechanisms from properly parsing a malicious URL. (CVE-2008-5508) All Thunderbird users should upgrade to these updated packages, which resolve these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.12-18.el4.src.rpm i386: thunderbird-1.5.0.12-18.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-18.el4.i386.rpm ia64: thunderbird-1.5.0.12-18.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.ia64.rpm ppc: thunderbird-1.5.0.12-18.el4.ppc.rpm thunderbird-debuginfo-1.5.0.12-18.el4.ppc.rpm s390: thunderbird-1.5.0.12-18.el4.s390.rpm thunderbird-debuginfo-1.5.0.12-18.el4.s390.rpm s390x: thunderbird-1.5.0.12-18.el4.s390x.rpm thunderbird-debuginfo-1.5.0.12-18.el4.s390x.rpm x86_64: thunderbird-1.5.0.12-18.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.12-18.el4.src.rpm i386: thunderbird-1.5.0.12-18.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-18.el4.i386.rpm x86_64: thunderbird-1.5.0.12-18.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.12-18.el4.src.rpm i386: thunderbird-1.5.0.12-18.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-18.el4.i386.rpm ia64: thunderbird-1.5.0.12-18.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-18.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.12-18.el4.src.rpm i386: thunderbird-1.5.0.12-18.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-18.el4.i386.rpm ia64: thunderbird-1.5.0.12-18.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-18.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-18.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-2.0.0.19-1.el5_2.src.rpm i386: thunderbird-2.0.0.19-1.el5_2.i386.rpm thunderbird-debuginfo-2.0.0.19-1.el5_2.i386.rpm x86_64: thunderbird-2.0.0.19-1.el5_2.x86_64.rpm thunderbird-debuginfo-2.0.0.19-1.el5_2.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-2.0.0.19-1.el5_2.src.rpm i386: thunderbird-2.0.0.19-1.el5_2.i386.rpm thunderbird-debuginfo-2.0.0.19-1.el5_2.i386.rpm x86_64: thunderbird-2.0.0.19-1.el5_2.x86_64.rpm thunderbird-debuginfo-2.0.0.19-1.el5_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 6. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513 http://www.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZIScXlSAg2UNWIIRAgmFAJ4zmlVVsMlt51NbR1rB6hzqYauL/wCgkzFO U7vA8uyEr3NoJxEyet6qyCg= =jsId -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 11:31:25 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 06:31:25 -0500 Subject: [RHSA-2009:0003-01] Moderate: xen security and bug fix update Message-ID: <200901071131.n07BVQch007690@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: xen security and bug fix update Advisory ID: RHSA-2009:0003-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0003.html Issue date: 2009-01-07 CVE Names: CVE-2008-4405 CVE-2008-4993 ===================================================================== 1. Summary: Updated xen packages that resolve several security issues and a bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Multi OS (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, x86_64 RHEL Virtualization (v. 5 server) - i386, ia64, x86_64 3. Description: The xen packages contain the Xen tools and management daemons needed to manage virtual machines running on Red Hat Enterprise Linux. Xen was found to allow unprivileged DomU domains to overwrite xenstore values which should only be changeable by the privileged Dom0 domain. An attacker controlling a DomU domain could, potentially, use this flaw to kill arbitrary processes in Dom0 or trick a Dom0 user into accessing the text console of a different domain running on the same host. This update makes certain parts of the xenstore tree read-only to the unprivileged DomU domains. (CVE-2008-4405) It was discovered that the qemu-dm.debug script created a temporary file in /tmp in an insecure way. A local attacker in Dom0 could, potentially, use this flaw to overwrite arbitrary files via a symlink attack. Note: This script is not needed in production deployments and therefore was removed and is not shipped with updated xen packages. (CVE-2008-4993) This update also fixes the following bug: * xen calculates its running time by adding the hypervisor's up-time to the hypervisor's boot-time record. In live migrations of para-virtualized guests, however, the guest would over-write the new hypervisor's boot-time record with the boot-time of the previous hypervisor. This caused time-dependent processes on the guests to fail (for example, crond would fail to start cron jobs). With this update, the new hypervisor's boot-time record is no longer over-written during live migrations. All xen users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. The Xen host must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 464455 - timer stops running after live migrate or dom0 reboot & save/restore of a Xen guest 464817 - CVE-2008-4405 xen: Multiple unsafe uses of guest-writable data from xenstore 470795 - CVE-2008-4993 xen: insecure temporary file use in qemu-dm.debug 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xen-3.0.3-64.el5_2.9.src.rpm i386: xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-libs-3.0.3-64.el5_2.9.i386.rpm x86_64: xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-debuginfo-3.0.3-64.el5_2.9.x86_64.rpm xen-libs-3.0.3-64.el5_2.9.i386.rpm xen-libs-3.0.3-64.el5_2.9.x86_64.rpm RHEL Desktop Multi OS (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xen-3.0.3-64.el5_2.9.src.rpm i386: xen-3.0.3-64.el5_2.9.i386.rpm xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-devel-3.0.3-64.el5_2.9.i386.rpm x86_64: xen-3.0.3-64.el5_2.9.x86_64.rpm xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-debuginfo-3.0.3-64.el5_2.9.x86_64.rpm xen-devel-3.0.3-64.el5_2.9.i386.rpm xen-devel-3.0.3-64.el5_2.9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xen-3.0.3-64.el5_2.9.src.rpm i386: xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-libs-3.0.3-64.el5_2.9.i386.rpm ia64: xen-debuginfo-3.0.3-64.el5_2.9.ia64.rpm xen-libs-3.0.3-64.el5_2.9.ia64.rpm x86_64: xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-debuginfo-3.0.3-64.el5_2.9.x86_64.rpm xen-libs-3.0.3-64.el5_2.9.i386.rpm xen-libs-3.0.3-64.el5_2.9.x86_64.rpm RHEL Virtualization (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xen-3.0.3-64.el5_2.9.src.rpm i386: xen-3.0.3-64.el5_2.9.i386.rpm xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-devel-3.0.3-64.el5_2.9.i386.rpm ia64: xen-3.0.3-64.el5_2.9.ia64.rpm xen-debuginfo-3.0.3-64.el5_2.9.ia64.rpm xen-devel-3.0.3-64.el5_2.9.ia64.rpm x86_64: xen-3.0.3-64.el5_2.9.x86_64.rpm xen-debuginfo-3.0.3-64.el5_2.9.i386.rpm xen-debuginfo-3.0.3-64.el5_2.9.x86_64.rpm xen-devel-3.0.3-64.el5_2.9.i386.rpm xen-devel-3.0.3-64.el5_2.9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4405 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4993 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZJKEXlSAg2UNWIIRAlEYAJ9akNLR2eW48i2WVMfgRajQ1y8i7QCggMwQ jlX8rCjJfi63wKFA6Ta20as= =F934 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 11:33:08 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 06:33:08 -0500 Subject: [RHSA-2009:0005-01] Moderate: gnome-vfs, gnome-vfs2 security update Message-ID: <200901071133.n07BX9bT009038@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gnome-vfs, gnome-vfs2 security update Advisory ID: RHSA-2009:0005-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0005.html Issue date: 2009-01-07 CVE Names: CVE-2005-0706 ===================================================================== 1. Summary: Updated GNOME VFS packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: GNOME VFS is the GNOME virtual file system. It provides a modular architecture and ships with several modules that implement support for various local and remote file systems as well as numerous protocols, including HTTP, FTP, and others. A buffer overflow flaw was discovered in the GNOME virtual file system when handling data returned by CDDB servers. If a user connected to a malicious CDDB server, an attacker could use this flaw to execute arbitrary code on the victim's machine. (CVE-2005-0706) Users of gnome-vfs and gnome-vfs2 are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running GNOME sessions must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 470552 - CVE-2005-0706 grip,libcdaudio: buffer overflow caused by large amount of CDDB replies 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gnome-vfs-1.0.1-18.2.src.rpm i386: gnome-vfs-1.0.1-18.2.i386.rpm gnome-vfs-devel-1.0.1-18.2.i386.rpm ia64: gnome-vfs-1.0.1-18.2.ia64.rpm gnome-vfs-devel-1.0.1-18.2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gnome-vfs-1.0.1-18.2.src.rpm ia64: gnome-vfs-1.0.1-18.2.ia64.rpm gnome-vfs-devel-1.0.1-18.2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gnome-vfs-1.0.1-18.2.src.rpm i386: gnome-vfs-1.0.1-18.2.i386.rpm gnome-vfs-devel-1.0.1-18.2.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gnome-vfs-1.0.1-18.2.src.rpm i386: gnome-vfs-1.0.1-18.2.i386.rpm gnome-vfs-devel-1.0.1-18.2.i386.rpm Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gnome-vfs2-2.2.5-2E.3.3.src.rpm i386: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-devel-2.2.5-2E.3.3.i386.rpm ia64: gnome-vfs2-2.2.5-2E.3.3.ia64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.ia64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.ia64.rpm ppc: gnome-vfs2-2.2.5-2E.3.3.ppc.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.ppc.rpm gnome-vfs2-devel-2.2.5-2E.3.3.ppc.rpm s390: gnome-vfs2-2.2.5-2E.3.3.s390.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.s390.rpm gnome-vfs2-devel-2.2.5-2E.3.3.s390.rpm s390x: gnome-vfs2-2.2.5-2E.3.3.s390x.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.s390x.rpm gnome-vfs2-devel-2.2.5-2E.3.3.s390x.rpm x86_64: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gnome-vfs2-2.2.5-2E.3.3.src.rpm i386: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-devel-2.2.5-2E.3.3.i386.rpm x86_64: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gnome-vfs2-2.2.5-2E.3.3.src.rpm i386: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-devel-2.2.5-2E.3.3.i386.rpm ia64: gnome-vfs2-2.2.5-2E.3.3.ia64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.ia64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.ia64.rpm x86_64: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gnome-vfs2-2.2.5-2E.3.3.src.rpm i386: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-devel-2.2.5-2E.3.3.i386.rpm ia64: gnome-vfs2-2.2.5-2E.3.3.ia64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.ia64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.ia64.rpm x86_64: gnome-vfs2-2.2.5-2E.3.3.i386.rpm gnome-vfs2-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.i386.rpm gnome-vfs2-debuginfo-2.2.5-2E.3.3.x86_64.rpm gnome-vfs2-devel-2.2.5-2E.3.3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gnome-vfs2-2.8.2-8.7.el4_7.2.src.rpm i386: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.i386.rpm ia64: gnome-vfs2-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.ia64.rpm ppc: gnome-vfs2-2.8.2-8.7.el4_7.2.ppc.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.ppc.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.ppc.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.ppc.rpm s390: gnome-vfs2-2.8.2-8.7.el4_7.2.s390.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.s390.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.s390.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.s390.rpm s390x: gnome-vfs2-2.8.2-8.7.el4_7.2.s390x.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.s390x.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.s390x.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.s390x.rpm x86_64: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gnome-vfs2-2.8.2-8.7.el4_7.2.src.rpm i386: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.i386.rpm x86_64: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gnome-vfs2-2.8.2-8.7.el4_7.2.src.rpm i386: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.i386.rpm ia64: gnome-vfs2-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.ia64.rpm x86_64: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gnome-vfs2-2.8.2-8.7.el4_7.2.src.rpm i386: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.i386.rpm ia64: gnome-vfs2-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.ia64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.ia64.rpm x86_64: gnome-vfs2-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.i386.rpm gnome-vfs2-debuginfo-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-devel-2.8.2-8.7.el4_7.2.x86_64.rpm gnome-vfs2-smb-2.8.2-8.7.el4_7.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0706 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZJLyXlSAg2UNWIIRAuawAJ9BrHP3Nl7isxX9cFT66IvY3g85EwCcDems /J16g19SRABzcXqJ3emVnkA= =No9C -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 11:33:15 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 06:33:15 -0500 Subject: [RHSA-2009:0018-01] Important: xterm security update Message-ID: <200901071133.n07BXG4F009068@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: xterm security update Advisory ID: RHSA-2009:0018-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0018.html Issue date: 2009-01-07 CVE Names: CVE-2008-2383 ===================================================================== 1. Summary: An updated xterm package to correct a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The xterm program is a terminal emulator for the X Window System. A flaw was found in the xterm handling of Device Control Request Status String (DECRQSS) escape sequences. An attacker could create a malicious text file (or log entry, if unfiltered) that could run arbitrary commands if read by a victim inside an xterm window. (CVE-2008-2383) All xterm users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. All running instances of xterm must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/xterm-179-11.EL3.src.rpm i386: xterm-179-11.EL3.i386.rpm xterm-debuginfo-179-11.EL3.i386.rpm ia64: xterm-179-11.EL3.ia64.rpm xterm-debuginfo-179-11.EL3.ia64.rpm ppc: xterm-179-11.EL3.ppc.rpm xterm-debuginfo-179-11.EL3.ppc.rpm s390: xterm-179-11.EL3.s390.rpm xterm-debuginfo-179-11.EL3.s390.rpm s390x: xterm-179-11.EL3.s390x.rpm xterm-debuginfo-179-11.EL3.s390x.rpm x86_64: xterm-179-11.EL3.x86_64.rpm xterm-debuginfo-179-11.EL3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/xterm-179-11.EL3.src.rpm i386: xterm-179-11.EL3.i386.rpm xterm-debuginfo-179-11.EL3.i386.rpm x86_64: xterm-179-11.EL3.x86_64.rpm xterm-debuginfo-179-11.EL3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/xterm-179-11.EL3.src.rpm i386: xterm-179-11.EL3.i386.rpm xterm-debuginfo-179-11.EL3.i386.rpm ia64: xterm-179-11.EL3.ia64.rpm xterm-debuginfo-179-11.EL3.ia64.rpm x86_64: xterm-179-11.EL3.x86_64.rpm xterm-debuginfo-179-11.EL3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/xterm-179-11.EL3.src.rpm i386: xterm-179-11.EL3.i386.rpm xterm-debuginfo-179-11.EL3.i386.rpm ia64: xterm-179-11.EL3.ia64.rpm xterm-debuginfo-179-11.EL3.ia64.rpm x86_64: xterm-179-11.EL3.x86_64.rpm xterm-debuginfo-179-11.EL3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xterm-192-8.el4_7.2.src.rpm i386: xterm-192-8.el4_7.2.i386.rpm xterm-debuginfo-192-8.el4_7.2.i386.rpm ia64: xterm-192-8.el4_7.2.ia64.rpm xterm-debuginfo-192-8.el4_7.2.ia64.rpm ppc: xterm-192-8.el4_7.2.ppc.rpm xterm-debuginfo-192-8.el4_7.2.ppc.rpm s390: xterm-192-8.el4_7.2.s390.rpm xterm-debuginfo-192-8.el4_7.2.s390.rpm s390x: xterm-192-8.el4_7.2.s390x.rpm xterm-debuginfo-192-8.el4_7.2.s390x.rpm x86_64: xterm-192-8.el4_7.2.x86_64.rpm xterm-debuginfo-192-8.el4_7.2.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xterm-192-8.el4_7.2.src.rpm i386: xterm-192-8.el4_7.2.i386.rpm xterm-debuginfo-192-8.el4_7.2.i386.rpm x86_64: xterm-192-8.el4_7.2.x86_64.rpm xterm-debuginfo-192-8.el4_7.2.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xterm-192-8.el4_7.2.src.rpm i386: xterm-192-8.el4_7.2.i386.rpm xterm-debuginfo-192-8.el4_7.2.i386.rpm ia64: xterm-192-8.el4_7.2.ia64.rpm xterm-debuginfo-192-8.el4_7.2.ia64.rpm x86_64: xterm-192-8.el4_7.2.x86_64.rpm xterm-debuginfo-192-8.el4_7.2.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xterm-192-8.el4_7.2.src.rpm i386: xterm-192-8.el4_7.2.i386.rpm xterm-debuginfo-192-8.el4_7.2.i386.rpm ia64: xterm-192-8.el4_7.2.ia64.rpm xterm-debuginfo-192-8.el4_7.2.ia64.rpm x86_64: xterm-192-8.el4_7.2.x86_64.rpm xterm-debuginfo-192-8.el4_7.2.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xterm-215-5.el5_2.2.src.rpm i386: xterm-215-5.el5_2.2.i386.rpm xterm-debuginfo-215-5.el5_2.2.i386.rpm x86_64: xterm-215-5.el5_2.2.x86_64.rpm xterm-debuginfo-215-5.el5_2.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xterm-215-5.el5_2.2.src.rpm i386: xterm-215-5.el5_2.2.i386.rpm xterm-debuginfo-215-5.el5_2.2.i386.rpm ia64: xterm-215-5.el5_2.2.ia64.rpm xterm-debuginfo-215-5.el5_2.2.ia64.rpm ppc: xterm-215-5.el5_2.2.ppc.rpm xterm-debuginfo-215-5.el5_2.2.ppc.rpm s390x: xterm-215-5.el5_2.2.s390x.rpm xterm-debuginfo-215-5.el5_2.2.s390x.rpm x86_64: xterm-215-5.el5_2.2.x86_64.rpm xterm-debuginfo-215-5.el5_2.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 6. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383 http://www.redhat.com/security/updates/classification/#important 7. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZJL6XlSAg2UNWIIRAqykAKCqpekyUANP10B+kFTzZLq+qWe0rgCgtDPO E/eWAR1EB/yr7XaR05aXIgY= =qxbZ -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 14:09:04 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 09:09:04 -0500 Subject: [RHSA-2009:0004-01] Important: openssl security update Message-ID: <200901071409.n07E95n4030463@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2009:0004-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0004.html Issue date: 2009-01-07 CVE Names: CVE-2008-5077 ===================================================================== 1. Summary: Updated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a "man in the middle" attack, could present a malformed SSL/TLS signature from a certificate chain to a vulnerable client and bypass validation. (CVE-2008-5077) All OpenSSL users should upgrade to these updated packages, which contain backported patches to resolve these issues. For the update to take effect, all running OpenSSL client applications must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 476671 - CVE-2008-5077 OpenSSL Incorrect checks for malformed signatures 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl-0.9.6b-49.src.rpm ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl095a-0.9.5a-34.src.rpm ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl096-0.9.6-34.src.rpm i386: openssl-0.9.6b-49.i386.rpm openssl-0.9.6b-49.i686.rpm openssl-devel-0.9.6b-49.i386.rpm openssl-perl-0.9.6b-49.i386.rpm openssl095a-0.9.5a-34.i386.rpm openssl096-0.9.6-34.i386.rpm ia64: openssl-0.9.6b-49.ia64.rpm openssl-devel-0.9.6b-49.ia64.rpm openssl-perl-0.9.6b-49.ia64.rpm openssl095a-0.9.5a-34.ia64.rpm openssl096-0.9.6-34.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl-0.9.6b-49.src.rpm ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl095a-0.9.5a-34.src.rpm ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl096-0.9.6-34.src.rpm ia64: openssl-0.9.6b-49.ia64.rpm openssl-devel-0.9.6b-49.ia64.rpm openssl-perl-0.9.6b-49.ia64.rpm openssl095a-0.9.5a-34.ia64.rpm openssl096-0.9.6-34.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/openssl-0.9.6b-49.src.rpm i386: openssl-0.9.6b-49.i386.rpm openssl-0.9.6b-49.i686.rpm openssl-devel-0.9.6b-49.i386.rpm openssl-perl-0.9.6b-49.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/openssl-0.9.6b-49.src.rpm i386: openssl-0.9.6b-49.i386.rpm openssl-0.9.6b-49.i686.rpm openssl-devel-0.9.6b-49.i386.rpm openssl-perl-0.9.6b-49.i386.rpm Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openssl-0.9.7a-33.25.src.rpm ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openssl096b-0.9.6b-16.49.src.rpm i386: openssl-0.9.7a-33.25.i386.rpm openssl-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.i386.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-devel-0.9.7a-33.25.i386.rpm openssl-perl-0.9.7a-33.25.i386.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm ia64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.ia64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.ia64.rpm openssl-devel-0.9.7a-33.25.ia64.rpm openssl-perl-0.9.7a-33.25.ia64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.ia64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.ia64.rpm ppc: openssl-0.9.7a-33.25.ppc.rpm openssl-0.9.7a-33.25.ppc64.rpm openssl-debuginfo-0.9.7a-33.25.ppc.rpm openssl-debuginfo-0.9.7a-33.25.ppc64.rpm openssl-devel-0.9.7a-33.25.ppc.rpm openssl-perl-0.9.7a-33.25.ppc.rpm openssl096b-0.9.6b-16.49.ppc.rpm openssl096b-debuginfo-0.9.6b-16.49.ppc.rpm s390: openssl-0.9.7a-33.25.s390.rpm openssl-debuginfo-0.9.7a-33.25.s390.rpm openssl-devel-0.9.7a-33.25.s390.rpm openssl-perl-0.9.7a-33.25.s390.rpm openssl096b-0.9.6b-16.49.s390.rpm openssl096b-debuginfo-0.9.6b-16.49.s390.rpm s390x: openssl-0.9.7a-33.25.s390.rpm openssl-0.9.7a-33.25.s390x.rpm openssl-debuginfo-0.9.7a-33.25.s390.rpm openssl-debuginfo-0.9.7a-33.25.s390x.rpm openssl-devel-0.9.7a-33.25.s390x.rpm openssl-perl-0.9.7a-33.25.s390x.rpm openssl096b-0.9.6b-16.49.s390.rpm openssl096b-debuginfo-0.9.6b-16.49.s390.rpm x86_64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.x86_64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.x86_64.rpm openssl-devel-0.9.7a-33.25.x86_64.rpm openssl-perl-0.9.7a-33.25.x86_64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.x86_64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openssl-0.9.7a-33.25.src.rpm ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openssl096b-0.9.6b-16.49.src.rpm i386: openssl-0.9.7a-33.25.i386.rpm openssl-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.i386.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-devel-0.9.7a-33.25.i386.rpm openssl-perl-0.9.7a-33.25.i386.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm x86_64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.x86_64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.x86_64.rpm openssl-devel-0.9.7a-33.25.x86_64.rpm openssl-perl-0.9.7a-33.25.x86_64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.x86_64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openssl-0.9.7a-33.25.src.rpm ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openssl096b-0.9.6b-16.49.src.rpm i386: openssl-0.9.7a-33.25.i386.rpm openssl-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.i386.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-devel-0.9.7a-33.25.i386.rpm openssl-perl-0.9.7a-33.25.i386.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm ia64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.ia64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.ia64.rpm openssl-devel-0.9.7a-33.25.ia64.rpm openssl-perl-0.9.7a-33.25.ia64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.ia64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.ia64.rpm x86_64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.x86_64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.x86_64.rpm openssl-devel-0.9.7a-33.25.x86_64.rpm openssl-perl-0.9.7a-33.25.x86_64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.x86_64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openssl-0.9.7a-33.25.src.rpm ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openssl096b-0.9.6b-16.49.src.rpm i386: openssl-0.9.7a-33.25.i386.rpm openssl-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.i386.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-devel-0.9.7a-33.25.i386.rpm openssl-perl-0.9.7a-33.25.i386.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm ia64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.ia64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.ia64.rpm openssl-devel-0.9.7a-33.25.ia64.rpm openssl-perl-0.9.7a-33.25.ia64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.ia64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.ia64.rpm x86_64: openssl-0.9.7a-33.25.i686.rpm openssl-0.9.7a-33.25.x86_64.rpm openssl-debuginfo-0.9.7a-33.25.i686.rpm openssl-debuginfo-0.9.7a-33.25.x86_64.rpm openssl-devel-0.9.7a-33.25.x86_64.rpm openssl-perl-0.9.7a-33.25.x86_64.rpm openssl096b-0.9.6b-16.49.i386.rpm openssl096b-0.9.6b-16.49.x86_64.rpm openssl096b-debuginfo-0.9.6b-16.49.i386.rpm openssl096b-debuginfo-0.9.6b-16.49.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openssl-0.9.7a-43.17.el4_7.2.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openssl096b-0.9.6b-22.46.el4_7.src.rpm i386: openssl-0.9.7a-43.17.el4_7.2.i386.rpm openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-perl-0.9.7a-43.17.el4_7.2.i386.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm ia64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.ia64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.ia64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.ia64.rpm ppc: openssl-0.9.7a-43.17.el4_7.2.ppc.rpm openssl-0.9.7a-43.17.el4_7.2.ppc64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.ppc.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.ppc64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.ppc.rpm openssl-devel-0.9.7a-43.17.el4_7.2.ppc64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.ppc.rpm openssl096b-0.9.6b-22.46.el4_7.ppc.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.ppc.rpm s390: openssl-0.9.7a-43.17.el4_7.2.s390.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.s390.rpm openssl-devel-0.9.7a-43.17.el4_7.2.s390.rpm openssl-perl-0.9.7a-43.17.el4_7.2.s390.rpm openssl096b-0.9.6b-22.46.el4_7.s390.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.s390.rpm s390x: openssl-0.9.7a-43.17.el4_7.2.s390.rpm openssl-0.9.7a-43.17.el4_7.2.s390x.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.s390.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.s390x.rpm openssl-devel-0.9.7a-43.17.el4_7.2.s390.rpm openssl-devel-0.9.7a-43.17.el4_7.2.s390x.rpm openssl-perl-0.9.7a-43.17.el4_7.2.s390x.rpm openssl096b-0.9.6b-22.46.el4_7.s390.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.s390.rpm x86_64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-devel-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.x86_64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openssl-0.9.7a-43.17.el4_7.2.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openssl096b-0.9.6b-22.46.el4_7.src.rpm i386: openssl-0.9.7a-43.17.el4_7.2.i386.rpm openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-perl-0.9.7a-43.17.el4_7.2.i386.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm x86_64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-devel-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.x86_64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openssl-0.9.7a-43.17.el4_7.2.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openssl096b-0.9.6b-22.46.el4_7.src.rpm i386: openssl-0.9.7a-43.17.el4_7.2.i386.rpm openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-perl-0.9.7a-43.17.el4_7.2.i386.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm ia64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.ia64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.ia64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.ia64.rpm x86_64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-devel-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.x86_64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openssl-0.9.7a-43.17.el4_7.2.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openssl096b-0.9.6b-22.46.el4_7.src.rpm i386: openssl-0.9.7a-43.17.el4_7.2.i386.rpm openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-perl-0.9.7a-43.17.el4_7.2.i386.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm ia64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.ia64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.ia64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.ia64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.ia64.rpm x86_64: openssl-0.9.7a-43.17.el4_7.2.i686.rpm openssl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i386.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.i686.rpm openssl-debuginfo-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-devel-0.9.7a-43.17.el4_7.2.i386.rpm openssl-devel-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl-perl-0.9.7a-43.17.el4_7.2.x86_64.rpm openssl096b-0.9.6b-22.46.el4_7.i386.rpm openssl096b-0.9.6b-22.46.el4_7.x86_64.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.i386.rpm openssl096b-debuginfo-0.9.6b-22.46.el4_7.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl-0.9.8b-10.el5_2.1.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl097a-0.9.7a-9.el5_2.1.src.rpm i386: openssl-0.9.8b-10.el5_2.1.i386.rpm openssl-0.9.8b-10.el5_2.1.i686.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i386.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i686.rpm openssl-perl-0.9.8b-10.el5_2.1.i386.rpm openssl097a-0.9.7a-9.el5_2.1.i386.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.i386.rpm x86_64: openssl-0.9.8b-10.el5_2.1.i686.rpm openssl-0.9.8b-10.el5_2.1.x86_64.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i686.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.x86_64.rpm openssl-perl-0.9.8b-10.el5_2.1.x86_64.rpm openssl097a-0.9.7a-9.el5_2.1.x86_64.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl-0.9.8b-10.el5_2.1.src.rpm i386: openssl-debuginfo-0.9.8b-10.el5_2.1.i386.rpm openssl-devel-0.9.8b-10.el5_2.1.i386.rpm x86_64: openssl-debuginfo-0.9.8b-10.el5_2.1.i386.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.x86_64.rpm openssl-devel-0.9.8b-10.el5_2.1.i386.rpm openssl-devel-0.9.8b-10.el5_2.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openssl-0.9.8b-10.el5_2.1.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openssl097a-0.9.7a-9.el5_2.1.src.rpm i386: openssl-0.9.8b-10.el5_2.1.i386.rpm openssl-0.9.8b-10.el5_2.1.i686.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i386.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i686.rpm openssl-devel-0.9.8b-10.el5_2.1.i386.rpm openssl-perl-0.9.8b-10.el5_2.1.i386.rpm openssl097a-0.9.7a-9.el5_2.1.i386.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.i386.rpm ia64: openssl-0.9.8b-10.el5_2.1.i686.rpm openssl-0.9.8b-10.el5_2.1.ia64.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i686.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.ia64.rpm openssl-devel-0.9.8b-10.el5_2.1.ia64.rpm openssl-perl-0.9.8b-10.el5_2.1.ia64.rpm openssl097a-0.9.7a-9.el5_2.1.ia64.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.ia64.rpm ppc: openssl-0.9.8b-10.el5_2.1.ppc.rpm openssl-0.9.8b-10.el5_2.1.ppc64.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.ppc.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.ppc64.rpm openssl-devel-0.9.8b-10.el5_2.1.ppc.rpm openssl-devel-0.9.8b-10.el5_2.1.ppc64.rpm openssl-perl-0.9.8b-10.el5_2.1.ppc.rpm openssl097a-0.9.7a-9.el5_2.1.ppc.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.ppc.rpm s390x: openssl-0.9.8b-10.el5_2.1.s390.rpm openssl-0.9.8b-10.el5_2.1.s390x.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.s390.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.s390x.rpm openssl-devel-0.9.8b-10.el5_2.1.s390.rpm openssl-devel-0.9.8b-10.el5_2.1.s390x.rpm openssl-perl-0.9.8b-10.el5_2.1.s390x.rpm openssl097a-0.9.7a-9.el5_2.1.s390x.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.s390x.rpm x86_64: openssl-0.9.8b-10.el5_2.1.i686.rpm openssl-0.9.8b-10.el5_2.1.x86_64.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i386.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.i686.rpm openssl-debuginfo-0.9.8b-10.el5_2.1.x86_64.rpm openssl-devel-0.9.8b-10.el5_2.1.i386.rpm openssl-devel-0.9.8b-10.el5_2.1.x86_64.rpm openssl-perl-0.9.8b-10.el5_2.1.x86_64.rpm openssl097a-0.9.7a-9.el5_2.1.x86_64.rpm openssl097a-debuginfo-0.9.7a-9.el5_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077 http://www.openssl.org/news/secadv_20090107.txt http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZLd8XlSAg2UNWIIRAqrQAKCpKTvjNenZ0PJoQadz3AKHfrxjXgCfXuqd T8fvghD1ZM0BgzhJY7sJ6oY= =+gDI -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 14:09:16 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 09:09:16 -0500 Subject: [RHSA-2009:0008-01] Moderate: dbus security update Message-ID: <200901071409.n07E9HtG030557@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: dbus security update Advisory ID: RHSA-2009:0008-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0008.html Issue date: 2009-01-07 CVE Names: CVE-2008-3834 ===================================================================== 1. Summary: Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) All users are advised to upgrade to these updated dbus packages, which contain backported patch which resolve this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using libdbus library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 464674 - CVE-2008-3834 dbus denial of service 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dbus-1.0.0-7.el5_2.1.src.rpm i386: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-x11-1.0.0-7.el5_2.1.i386.rpm x86_64: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-1.0.0-7.el5_2.1.x86_64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.x86_64.rpm dbus-x11-1.0.0-7.el5_2.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dbus-1.0.0-7.el5_2.1.src.rpm i386: dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm x86_64: dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.x86_64.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/dbus-1.0.0-7.el5_2.1.src.rpm i386: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm dbus-x11-1.0.0-7.el5_2.1.i386.rpm ia64: dbus-1.0.0-7.el5_2.1.ia64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.ia64.rpm dbus-devel-1.0.0-7.el5_2.1.ia64.rpm dbus-x11-1.0.0-7.el5_2.1.ia64.rpm ppc: dbus-1.0.0-7.el5_2.1.ppc.rpm dbus-1.0.0-7.el5_2.1.ppc64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.ppc.rpm dbus-debuginfo-1.0.0-7.el5_2.1.ppc64.rpm dbus-devel-1.0.0-7.el5_2.1.ppc.rpm dbus-devel-1.0.0-7.el5_2.1.ppc64.rpm dbus-x11-1.0.0-7.el5_2.1.ppc.rpm s390x: dbus-1.0.0-7.el5_2.1.s390.rpm dbus-1.0.0-7.el5_2.1.s390x.rpm dbus-debuginfo-1.0.0-7.el5_2.1.s390.rpm dbus-debuginfo-1.0.0-7.el5_2.1.s390x.rpm dbus-devel-1.0.0-7.el5_2.1.s390.rpm dbus-devel-1.0.0-7.el5_2.1.s390x.rpm dbus-x11-1.0.0-7.el5_2.1.s390x.rpm x86_64: dbus-1.0.0-7.el5_2.1.i386.rpm dbus-1.0.0-7.el5_2.1.x86_64.rpm dbus-debuginfo-1.0.0-7.el5_2.1.i386.rpm dbus-debuginfo-1.0.0-7.el5_2.1.x86_64.rpm dbus-devel-1.0.0-7.el5_2.1.i386.rpm dbus-devel-1.0.0-7.el5_2.1.x86_64.rpm dbus-x11-1.0.0-7.el5_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZLeGXlSAg2UNWIIRAvXmAKCKnZ/4/Fo1FtVq9Vx/fhR8bgCQ2ACgtmsg cvdHs948Um9ZMADDjlgQFng= =+aUj -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 14:09:29 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 09:09:29 -0500 Subject: [RHSA-2009:0011-01] Moderate: lcms security update Message-ID: <200901071409.n07E9UwJ030750@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: lcms security update Advisory ID: RHSA-2009:0011-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0011.html Issue date: 2009-01-07 CVE Names: CVE-2008-5316 CVE-2008-5317 ===================================================================== 1. Summary: Updated lcms packages that resolve several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Little Color Management System (LittleCMS, or simply "lcms") is a small-footprint, speed-optimized open source color management engine. Multiple insufficient input validation flaws were discovered in LittleCMS. An attacker could use these flaws to create a specially-crafted image file which could cause an application using LittleCMS to crash, or, possibly, execute arbitrary code when opened. (CVE-2008-5316, CVE-2008-5317) Users of lcms should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using lcms library must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 473462 - CVE-2008-5316 lcms: insufficient input validation in ReadEmbeddedTextTag 473463 - CVE-2008-5317 lcms: unsigned -> signed integer cast issue in cmsAllocGamma 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/lcms-1.15-1.2.2.el5_2.2.src.rpm i386: lcms-1.15-1.2.2.el5_2.2.i386.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm python-lcms-1.15-1.2.2.el5_2.2.i386.rpm x86_64: lcms-1.15-1.2.2.el5_2.2.i386.rpm lcms-1.15-1.2.2.el5_2.2.x86_64.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.x86_64.rpm python-lcms-1.15-1.2.2.el5_2.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/lcms-1.15-1.2.2.el5_2.2.src.rpm i386: lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm lcms-devel-1.15-1.2.2.el5_2.2.i386.rpm x86_64: lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.x86_64.rpm lcms-devel-1.15-1.2.2.el5_2.2.i386.rpm lcms-devel-1.15-1.2.2.el5_2.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/lcms-1.15-1.2.2.el5_2.2.src.rpm i386: lcms-1.15-1.2.2.el5_2.2.i386.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm lcms-devel-1.15-1.2.2.el5_2.2.i386.rpm python-lcms-1.15-1.2.2.el5_2.2.i386.rpm ia64: lcms-1.15-1.2.2.el5_2.2.i386.rpm lcms-1.15-1.2.2.el5_2.2.ia64.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.ia64.rpm lcms-devel-1.15-1.2.2.el5_2.2.ia64.rpm python-lcms-1.15-1.2.2.el5_2.2.ia64.rpm ppc: lcms-1.15-1.2.2.el5_2.2.ppc.rpm lcms-1.15-1.2.2.el5_2.2.ppc64.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.ppc.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.ppc64.rpm lcms-devel-1.15-1.2.2.el5_2.2.ppc.rpm lcms-devel-1.15-1.2.2.el5_2.2.ppc64.rpm python-lcms-1.15-1.2.2.el5_2.2.ppc.rpm s390x: lcms-1.15-1.2.2.el5_2.2.s390.rpm lcms-1.15-1.2.2.el5_2.2.s390x.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.s390.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.s390x.rpm lcms-devel-1.15-1.2.2.el5_2.2.s390.rpm lcms-devel-1.15-1.2.2.el5_2.2.s390x.rpm python-lcms-1.15-1.2.2.el5_2.2.s390x.rpm x86_64: lcms-1.15-1.2.2.el5_2.2.i386.rpm lcms-1.15-1.2.2.el5_2.2.x86_64.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.i386.rpm lcms-debuginfo-1.15-1.2.2.el5_2.2.x86_64.rpm lcms-devel-1.15-1.2.2.el5_2.2.i386.rpm lcms-devel-1.15-1.2.2.el5_2.2.x86_64.rpm python-lcms-1.15-1.2.2.el5_2.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5316 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5317 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZLeSXlSAg2UNWIIRAv7eAJ493RZDkCo25COZAoLV74pXeFQt7gCdED38 7bCf2II++XQP3oK1l7a7YtM= =UGXi -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 7 14:09:46 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Jan 2009 09:09:46 -0500 Subject: [RHSA-2009:0019-01] Important: hanterm-xf security update Message-ID: <200901071409.n07E9lI7030969@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: hanterm-xf security update Advisory ID: RHSA-2009:0019-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0019.html Issue date: 2009-01-07 CVE Names: CVE-2008-2383 ===================================================================== 1. Summary: An updated hanterm-xf package to correct a security issue is now available for Red Hat Enterprise Linux 2.1. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Description: Hanterm is a replacement for xterm, a X Window System terminal emulator, that supports Hangul input and output. A flaw was found in the Hanterm handling of Device Control Request Status String (DECRQSS) escape sequences. An attacker could create a malicious text file (or log entry, if unfiltered) that could run arbitrary commands if read by a victim inside a Hanterm window. (CVE-2008-2383) All hanterm-xf users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. All running instances of hanterm must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 478888 - CVE-2008-2383 xterm: arbitrary command injection 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/hanterm-xf-2.0.5-5.AS21.2.src.rpm i386: hanterm-xf-2.0.5-5.AS21.2.i386.rpm ia64: hanterm-xf-2.0.5-5.AS21.2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/hanterm-xf-2.0.5-5.AS21.2.src.rpm ia64: hanterm-xf-2.0.5-5.AS21.2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/hanterm-xf-2.0.5-5.AS21.2.src.rpm i386: hanterm-xf-2.0.5-5.AS21.2.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/hanterm-xf-2.0.5-5.AS21.2.src.rpm i386: hanterm-xf-2.0.5-5.AS21.2.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZLeeXlSAg2UNWIIRAliOAKCaV430CQUNsqLc5G8CMSmnpv/B2gCeLCFF k14+bGP20mrooFSynrDgRvI= =MvqF -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 8 15:50:13 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 8 Jan 2009 10:50:13 -0500 Subject: [RHSA-2009:0001-01] Important: kernel security update Message-ID: <200901081550.n08FoE8g000808@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2009:0001-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0001.html Issue date: 2009-01-08 CVE Names: CVE-2006-4814 CVE-2007-2172 CVE-2007-3848 CVE-2007-4308 CVE-2007-6063 CVE-2007-6151 CVE-2007-6206 CVE-2008-0007 CVE-2008-2136 CVE-2008-3275 CVE-2008-3525 CVE-2008-4210 ===================================================================== 1. Summary: Updated kernel packages that fix a number of security issues are now available for Red Hat Enterprise Linux 2.1 running on 32-bit architectures. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * a flaw was found in the IPv4 forwarding base. This could allow a local, unprivileged user to cause a denial of service. (CVE-2007-2172, Important) * a flaw was found in the handling of process death signals. This allowed a local, unprivileged user to send arbitrary signals to the suid-process executed by that user. Successful exploitation of this flaw depends on the structure of the suid-program and its signal handling. (CVE-2007-3848, Important) * when accessing kernel memory locations, certain Linux kernel drivers registering a fault handler did not perform required range checks. A local, unprivileged user could use this flaw to gain read or write access to arbitrary kernel memory, or possibly cause a denial of service. (CVE-2008-0007, Important) * a possible kernel memory leak was found in the Linux kernel Simple Internet Transition (SIT) INET6 implementation. This could allow a local, unprivileged user to cause a denial of service. (CVE-2008-2136, Important) * missing capability checks were found in the SBNI WAN driver which could allow a local, unprivileged user to bypass intended capability restrictions. (CVE-2008-3525, Important) * a flaw was found in the way files were written using truncate() or ftruncate(). This could allow a local, unprivileged user to acquire the privileges of a different group and obtain access to sensitive information. (CVE-2008-4210, Important) * a race condition in the mincore system core allowed a local, unprivileged user to cause a denial of service. (CVE-2006-4814, Moderate) * a flaw was found in the aacraid SCSI driver. This allowed a local, unprivileged user to make ioctl calls to the driver which should otherwise be restricted to privileged users. (CVE-2007-4308, Moderate) * two buffer overflow flaws were found in the Integrated Services Digital Network (ISDN) subsystem. A local, unprivileged user could use these flaws to cause a denial of service. (CVE-2007-6063, CVE-2007-6151, Moderate) * a flaw was found in the way core dump files were created. If a local, unprivileged user could make a root-owned process dump a core file into a user-writable directory, the user could gain read access to that core file, potentially compromising sensitive information. (CVE-2007-6206, Moderate) * a deficiency was found in the Linux kernel virtual file system (VFS) implementation. This could allow a local, unprivileged user to attempt file creation within deleted directories, possibly causing a denial of service. (CVE-2008-3275, Moderate) All users of Red Hat Enterprise Linux 2.1 on 32-bit architectures should upgrade to these updated packages which address these vulnerabilities. For this update to take effect, the system must be rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 250429 - CVE-2007-2172 fib_semantics.c out of bounds access vulnerability 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG 252309 - CVE-2007-4308 kernel: Missing ioctl() permission checks in aacraid driver 306971 - CVE-2006-4814 kernel Race condition in mincore can cause "ps -ef" to hang 392101 - CVE-2007-6063 Linux Kernel isdn_net_setcfg buffer overflow 396861 - CVE-2007-6206 Issue with core dump owner 425111 - CVE-2007-6151 I4L: fix isdn_ioctl memory issue 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap 446031 - CVE-2008-2136 kernel: sit memory leak 457858 - CVE-2008-3275 Linux kernel local filesystem DoS 460401 - CVE-2008-3525 kernel: missing capability checks in sbni_ioctl() 463661 - CVE-2008-4210 kernel: open() call allows setgid bit when user is not in new file's group 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.74.src.rpm i386: kernel-2.4.9-e.74.athlon.rpm kernel-2.4.9-e.74.i686.rpm kernel-BOOT-2.4.9-e.74.i386.rpm kernel-debug-2.4.9-e.74.i686.rpm kernel-doc-2.4.9-e.74.i386.rpm kernel-enterprise-2.4.9-e.74.i686.rpm kernel-headers-2.4.9-e.74.i386.rpm kernel-smp-2.4.9-e.74.athlon.rpm kernel-smp-2.4.9-e.74.i686.rpm kernel-source-2.4.9-e.74.i386.rpm kernel-summit-2.4.9-e.74.i686.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.74.src.rpm i386: kernel-2.4.9-e.74.athlon.rpm kernel-2.4.9-e.74.i686.rpm kernel-BOOT-2.4.9-e.74.i386.rpm kernel-debug-2.4.9-e.74.i686.rpm kernel-doc-2.4.9-e.74.i386.rpm kernel-headers-2.4.9-e.74.i386.rpm kernel-smp-2.4.9-e.74.athlon.rpm kernel-smp-2.4.9-e.74.i686.rpm kernel-source-2.4.9-e.74.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.74.src.rpm i386: kernel-2.4.9-e.74.athlon.rpm kernel-2.4.9-e.74.i686.rpm kernel-BOOT-2.4.9-e.74.i386.rpm kernel-debug-2.4.9-e.74.i686.rpm kernel-doc-2.4.9-e.74.i386.rpm kernel-enterprise-2.4.9-e.74.i686.rpm kernel-headers-2.4.9-e.74.i386.rpm kernel-smp-2.4.9-e.74.athlon.rpm kernel-smp-2.4.9-e.74.i686.rpm kernel-source-2.4.9-e.74.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZiCbXlSAg2UNWIIRApECAJ9zy9HfqPMpLxDRbDJHh1GCua0BLwCffkPy wjmlQKExcGKC6U2zBth2RGQ= =Gv8v -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 8 18:36:02 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 8 Jan 2009 13:36:02 -0500 Subject: [RHSA-2009:0020-01] Moderate: bind security update Message-ID: <200901081836.n08Ia347005557@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: bind security update Advisory ID: RHSA-2009:0020-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0020.html Issue date: 2009-01-08 CVE Names: CVE-2009-0025 ===================================================================== 1. Summary: Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 461047 - named dies due to assertion failure 478984 - CVE-2009-0025 bind: DSA_do_verify() returns check issue 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/bind-9.2.1-11.el2.src.rpm i386: bind-9.2.1-11.el2.i386.rpm bind-devel-9.2.1-11.el2.i386.rpm bind-utils-9.2.1-11.el2.i386.rpm ia64: bind-9.2.1-11.el2.ia64.rpm bind-devel-9.2.1-11.el2.ia64.rpm bind-utils-9.2.1-11.el2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/bind-9.2.1-11.el2.src.rpm ia64: bind-9.2.1-11.el2.ia64.rpm bind-devel-9.2.1-11.el2.ia64.rpm bind-utils-9.2.1-11.el2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/bind-9.2.1-11.el2.src.rpm i386: bind-9.2.1-11.el2.i386.rpm bind-devel-9.2.1-11.el2.i386.rpm bind-utils-9.2.1-11.el2.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/bind-9.2.1-11.el2.src.rpm i386: bind-9.2.1-11.el2.i386.rpm bind-devel-9.2.1-11.el2.i386.rpm bind-utils-9.2.1-11.el2.i386.rpm Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/bind-9.2.4-23.el3.src.rpm i386: bind-9.2.4-23.el3.i386.rpm bind-chroot-9.2.4-23.el3.i386.rpm bind-debuginfo-9.2.4-23.el3.i386.rpm bind-devel-9.2.4-23.el3.i386.rpm bind-libs-9.2.4-23.el3.i386.rpm bind-utils-9.2.4-23.el3.i386.rpm ia64: bind-9.2.4-23.el3.ia64.rpm bind-chroot-9.2.4-23.el3.ia64.rpm bind-debuginfo-9.2.4-23.el3.ia64.rpm bind-devel-9.2.4-23.el3.ia64.rpm bind-libs-9.2.4-23.el3.ia64.rpm bind-utils-9.2.4-23.el3.ia64.rpm ppc: bind-9.2.4-23.el3.ppc.rpm bind-chroot-9.2.4-23.el3.ppc.rpm bind-debuginfo-9.2.4-23.el3.ppc.rpm bind-devel-9.2.4-23.el3.ppc.rpm bind-libs-9.2.4-23.el3.ppc.rpm bind-utils-9.2.4-23.el3.ppc.rpm s390: bind-9.2.4-23.el3.s390.rpm bind-chroot-9.2.4-23.el3.s390.rpm bind-debuginfo-9.2.4-23.el3.s390.rpm bind-devel-9.2.4-23.el3.s390.rpm bind-libs-9.2.4-23.el3.s390.rpm bind-utils-9.2.4-23.el3.s390.rpm s390x: bind-9.2.4-23.el3.s390x.rpm bind-chroot-9.2.4-23.el3.s390x.rpm bind-debuginfo-9.2.4-23.el3.s390x.rpm bind-devel-9.2.4-23.el3.s390x.rpm bind-libs-9.2.4-23.el3.s390x.rpm bind-utils-9.2.4-23.el3.s390x.rpm x86_64: bind-9.2.4-23.el3.x86_64.rpm bind-chroot-9.2.4-23.el3.x86_64.rpm bind-debuginfo-9.2.4-23.el3.x86_64.rpm bind-devel-9.2.4-23.el3.x86_64.rpm bind-libs-9.2.4-23.el3.x86_64.rpm bind-utils-9.2.4-23.el3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/bind-9.2.4-23.el3.src.rpm i386: bind-9.2.4-23.el3.i386.rpm bind-chroot-9.2.4-23.el3.i386.rpm bind-debuginfo-9.2.4-23.el3.i386.rpm bind-devel-9.2.4-23.el3.i386.rpm bind-libs-9.2.4-23.el3.i386.rpm bind-utils-9.2.4-23.el3.i386.rpm x86_64: bind-9.2.4-23.el3.x86_64.rpm bind-chroot-9.2.4-23.el3.x86_64.rpm bind-debuginfo-9.2.4-23.el3.x86_64.rpm bind-devel-9.2.4-23.el3.x86_64.rpm bind-libs-9.2.4-23.el3.x86_64.rpm bind-utils-9.2.4-23.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/bind-9.2.4-23.el3.src.rpm i386: bind-9.2.4-23.el3.i386.rpm bind-chroot-9.2.4-23.el3.i386.rpm bind-debuginfo-9.2.4-23.el3.i386.rpm bind-devel-9.2.4-23.el3.i386.rpm bind-libs-9.2.4-23.el3.i386.rpm bind-utils-9.2.4-23.el3.i386.rpm ia64: bind-9.2.4-23.el3.ia64.rpm bind-chroot-9.2.4-23.el3.ia64.rpm bind-debuginfo-9.2.4-23.el3.ia64.rpm bind-devel-9.2.4-23.el3.ia64.rpm bind-libs-9.2.4-23.el3.ia64.rpm bind-utils-9.2.4-23.el3.ia64.rpm x86_64: bind-9.2.4-23.el3.x86_64.rpm bind-chroot-9.2.4-23.el3.x86_64.rpm bind-debuginfo-9.2.4-23.el3.x86_64.rpm bind-devel-9.2.4-23.el3.x86_64.rpm bind-libs-9.2.4-23.el3.x86_64.rpm bind-utils-9.2.4-23.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/bind-9.2.4-23.el3.src.rpm i386: bind-9.2.4-23.el3.i386.rpm bind-chroot-9.2.4-23.el3.i386.rpm bind-debuginfo-9.2.4-23.el3.i386.rpm bind-devel-9.2.4-23.el3.i386.rpm bind-libs-9.2.4-23.el3.i386.rpm bind-utils-9.2.4-23.el3.i386.rpm ia64: bind-9.2.4-23.el3.ia64.rpm bind-chroot-9.2.4-23.el3.ia64.rpm bind-debuginfo-9.2.4-23.el3.ia64.rpm bind-devel-9.2.4-23.el3.ia64.rpm bind-libs-9.2.4-23.el3.ia64.rpm bind-utils-9.2.4-23.el3.ia64.rpm x86_64: bind-9.2.4-23.el3.x86_64.rpm bind-chroot-9.2.4-23.el3.x86_64.rpm bind-debuginfo-9.2.4-23.el3.x86_64.rpm bind-devel-9.2.4-23.el3.x86_64.rpm bind-libs-9.2.4-23.el3.x86_64.rpm bind-utils-9.2.4-23.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/bind-9.2.4-30.el4_7.1.src.rpm i386: bind-9.2.4-30.el4_7.1.i386.rpm bind-chroot-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-devel-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-utils-9.2.4-30.el4_7.1.i386.rpm ia64: bind-9.2.4-30.el4_7.1.ia64.rpm bind-chroot-9.2.4-30.el4_7.1.ia64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.ia64.rpm bind-devel-9.2.4-30.el4_7.1.ia64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.ia64.rpm bind-utils-9.2.4-30.el4_7.1.ia64.rpm ppc: bind-9.2.4-30.el4_7.1.ppc.rpm bind-chroot-9.2.4-30.el4_7.1.ppc.rpm bind-debuginfo-9.2.4-30.el4_7.1.ppc.rpm bind-debuginfo-9.2.4-30.el4_7.1.ppc64.rpm bind-devel-9.2.4-30.el4_7.1.ppc.rpm bind-libs-9.2.4-30.el4_7.1.ppc.rpm bind-libs-9.2.4-30.el4_7.1.ppc64.rpm bind-utils-9.2.4-30.el4_7.1.ppc.rpm s390: bind-9.2.4-30.el4_7.1.s390.rpm bind-chroot-9.2.4-30.el4_7.1.s390.rpm bind-debuginfo-9.2.4-30.el4_7.1.s390.rpm bind-devel-9.2.4-30.el4_7.1.s390.rpm bind-libs-9.2.4-30.el4_7.1.s390.rpm bind-utils-9.2.4-30.el4_7.1.s390.rpm s390x: bind-9.2.4-30.el4_7.1.s390x.rpm bind-chroot-9.2.4-30.el4_7.1.s390x.rpm bind-debuginfo-9.2.4-30.el4_7.1.s390.rpm bind-debuginfo-9.2.4-30.el4_7.1.s390x.rpm bind-devel-9.2.4-30.el4_7.1.s390x.rpm bind-libs-9.2.4-30.el4_7.1.s390.rpm bind-libs-9.2.4-30.el4_7.1.s390x.rpm bind-utils-9.2.4-30.el4_7.1.s390x.rpm x86_64: bind-9.2.4-30.el4_7.1.x86_64.rpm bind-chroot-9.2.4-30.el4_7.1.x86_64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.x86_64.rpm bind-devel-9.2.4-30.el4_7.1.x86_64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.x86_64.rpm bind-utils-9.2.4-30.el4_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/bind-9.2.4-30.el4_7.1.src.rpm i386: bind-9.2.4-30.el4_7.1.i386.rpm bind-chroot-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-devel-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-utils-9.2.4-30.el4_7.1.i386.rpm x86_64: bind-9.2.4-30.el4_7.1.x86_64.rpm bind-chroot-9.2.4-30.el4_7.1.x86_64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.x86_64.rpm bind-devel-9.2.4-30.el4_7.1.x86_64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.x86_64.rpm bind-utils-9.2.4-30.el4_7.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/bind-9.2.4-30.el4_7.1.src.rpm i386: bind-9.2.4-30.el4_7.1.i386.rpm bind-chroot-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-devel-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-utils-9.2.4-30.el4_7.1.i386.rpm ia64: bind-9.2.4-30.el4_7.1.ia64.rpm bind-chroot-9.2.4-30.el4_7.1.ia64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.ia64.rpm bind-devel-9.2.4-30.el4_7.1.ia64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.ia64.rpm bind-utils-9.2.4-30.el4_7.1.ia64.rpm x86_64: bind-9.2.4-30.el4_7.1.x86_64.rpm bind-chroot-9.2.4-30.el4_7.1.x86_64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.x86_64.rpm bind-devel-9.2.4-30.el4_7.1.x86_64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.x86_64.rpm bind-utils-9.2.4-30.el4_7.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/bind-9.2.4-30.el4_7.1.src.rpm i386: bind-9.2.4-30.el4_7.1.i386.rpm bind-chroot-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-devel-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-utils-9.2.4-30.el4_7.1.i386.rpm ia64: bind-9.2.4-30.el4_7.1.ia64.rpm bind-chroot-9.2.4-30.el4_7.1.ia64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.ia64.rpm bind-devel-9.2.4-30.el4_7.1.ia64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.ia64.rpm bind-utils-9.2.4-30.el4_7.1.ia64.rpm x86_64: bind-9.2.4-30.el4_7.1.x86_64.rpm bind-chroot-9.2.4-30.el4_7.1.x86_64.rpm bind-debuginfo-9.2.4-30.el4_7.1.i386.rpm bind-debuginfo-9.2.4-30.el4_7.1.x86_64.rpm bind-devel-9.2.4-30.el4_7.1.x86_64.rpm bind-libs-9.2.4-30.el4_7.1.i386.rpm bind-libs-9.2.4-30.el4_7.1.x86_64.rpm bind-utils-9.2.4-30.el4_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.4-6.0.3.P1.el5_2.src.rpm i386: bind-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.i386.rpm x86_64: bind-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.4-6.0.3.P1.el5_2.src.rpm i386: bind-chroot-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.i386.rpm x86_64: bind-chroot-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.x86_64.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind-9.3.4-6.0.3.P1.el5_2.src.rpm i386: bind-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-chroot-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.i386.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.i386.rpm ia64: bind-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-chroot-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.ia64.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.ia64.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.ia64.rpm ppc: bind-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-chroot-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.ppc64.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.ppc64.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.ppc64.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.ppc64.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.ppc.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.ppc.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.ppc.rpm s390x: bind-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-chroot-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.s390.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.s390.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.s390.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.s390.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.s390x.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.s390x.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.s390x.rpm x86_64: bind-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-chroot-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-debuginfo-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-devel-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libbind-devel-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.i386.rpm bind-libs-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-sdb-9.3.4-6.0.3.P1.el5_2.x86_64.rpm bind-utils-9.3.4-6.0.3.P1.el5_2.x86_64.rpm caching-nameserver-9.3.4-6.0.3.P1.el5_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025 http://www.redhat.com/security/updates/classification/#moderate https://www.isc.org/node/373 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJZkeFXlSAg2UNWIIRAsKdAKCBpFaRC63jX/bTOgWIbWFWu960NgCgwhNG pDAsi5hZAPjakLEfhcPU+N4= =ymXB -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jan 12 14:29:16 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Jan 2009 09:29:16 -0500 Subject: [RHSA-2009:0010-01] Moderate: squirrelmail security update Message-ID: <200901121429.n0CETHr9023811@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: squirrelmail security update Advisory ID: RHSA-2009:0010-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0010.html Issue date: 2009-01-12 CVE Names: CVE-2008-2379 CVE-2008-3663 ===================================================================== 1. Summary: An updated squirrelmail package that resolves various security issues is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - noarch Red Hat Desktop version 3 - noarch Red Hat Enterprise Linux ES version 3 - noarch Red Hat Enterprise Linux WS version 3 - noarch Red Hat Enterprise Linux AS version 4 - noarch Red Hat Enterprise Linux Desktop version 4 - noarch Red Hat Enterprise Linux ES version 4 - noarch Red Hat Enterprise Linux WS version 4 - noarch RHEL Desktop Workstation (v. 5 client) - noarch Red Hat Enterprise Linux (v. 5 server) - noarch 3. Description: SquirrelMail is an easy-to-configure, standards-based, webmail package written in PHP. It includes built-in PHP support for the IMAP and SMTP protocols, and pure HTML 4.0 page-rendering (with no JavaScript required) for maximum browser-compatibility, strong MIME support, address books, and folder manipulation. Ivan Markovic discovered a cross-site scripting (XSS) flaw in SquirrelMail caused by insufficient HTML mail sanitization. A remote attacker could send a specially-crafted HTML mail or attachment that could cause a user's Web browser to execute a malicious script in the context of the SquirrelMail session when that email or attachment was opened by the user. (CVE-2008-2379) It was discovered that SquirrelMail allowed cookies over insecure connections (ie did not restrict cookies to HTTPS connections). An attacker who controlled the communication channel between a user and the SquirrelMail server, or who was able to sniff the user's network communication, could use this flaw to obtain the user's session cookie, if a user made an HTTP request to the server. (CVE-2008-3663) Note: After applying this update, all session cookies set for SquirrelMail sessions started over HTTPS connections will have the "secure" flag set. That is, browsers will only send such cookies over an HTTPS connection. If needed, you can revert to the previous behavior by setting the configuration option "$only_secure_cookies" to "false" in SquirrelMail's /etc/squirrelmail/config.php configuration file. Users of squirrelmail should upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 464183 - CVE-2008-3663 squirrelmail: session hijacking - secure flag not set for HTTPS-only cookies 473877 - CVE-2008-2379 squirrelmail: XSS issue caused by an insufficient html mail sanitation 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squirrelmail-1.4.8-8.el3.src.rpm noarch: squirrelmail-1.4.8-8.el3.noarch.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squirrelmail-1.4.8-8.el3.src.rpm noarch: squirrelmail-1.4.8-8.el3.noarch.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squirrelmail-1.4.8-8.el3.src.rpm noarch: squirrelmail-1.4.8-8.el3.noarch.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squirrelmail-1.4.8-8.el3.src.rpm noarch: squirrelmail-1.4.8-8.el3.noarch.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.2.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.2.noarch.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.2.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.2.noarch.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.2.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.2.noarch.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.2.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.2.noarch.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/squirrelmail-1.4.8-5.el5_2.2.src.rpm noarch: squirrelmail-1.4.8-5.el5_2.2.noarch.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/squirrelmail-1.4.8-5.el5_2.2.src.rpm noarch: squirrelmail-1.4.8-5.el5_2.2.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3663 http://www.redhat.com/security/updates/classification/#moderate http://www.squirrelmail.org/security/issue/2008-09-28 http://www.squirrelmail.org/security/issue/2008-12-04 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJa1OUXlSAg2UNWIIRAjYoAKCrseJGTbsrTt2ahY4oXeMdP7xslACgtqLn w5iTjh6rWIkR5xKGWREUIZg= =ioAP -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jan 12 14:29:59 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Jan 2009 09:29:59 -0500 Subject: [RHSA-2009:0013-01] Moderate: avahi security update Message-ID: <200901121430.n0CEU0G6024336@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: avahi security update Advisory ID: RHSA-2009:0013-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0013.html Issue date: 2009-01-12 CVE Names: CVE-2008-5081 ===================================================================== 1. Summary: Updated avahi packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zeroconf Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, see printers to print to, and find shared files on other computers. Hugo Dias discovered a denial of service flaw in avahi-daemon. A remote attacker on the same local area network (LAN) could send a specially-crafted mDNS (Multicast DNS) packet that would cause avahi-daemon to exit unexpectedly due to a failed assertion check. (CVE-2008-5081) All users are advised to upgrade to these updated packages, which contain a backported patch which resolves this issue. After installing the update, avahi-daemon will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 475964 - CVE-2008-5081 avahi: avahi-daemon DoS (application abort) via packet with source port 0 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/avahi-0.6.16-1.el5_2.1.src.rpm i386: avahi-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.i386.rpm avahi-debuginfo-0.6.16-1.el5_2.1.i386.rpm avahi-glib-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-0.6.16-1.el5_2.1.i386.rpm avahi-tools-0.6.16-1.el5_2.1.i386.rpm x86_64: avahi-0.6.16-1.el5_2.1.i386.rpm avahi-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-howl-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.x86_64.rpm avahi-debuginfo-0.6.16-1.el5_2.1.i386.rpm avahi-debuginfo-0.6.16-1.el5_2.1.x86_64.rpm avahi-glib-0.6.16-1.el5_2.1.i386.rpm avahi-glib-0.6.16-1.el5_2.1.x86_64.rpm avahi-qt3-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-0.6.16-1.el5_2.1.x86_64.rpm avahi-tools-0.6.16-1.el5_2.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/avahi-0.6.16-1.el5_2.1.src.rpm i386: avahi-compat-howl-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.i386.rpm avahi-debuginfo-0.6.16-1.el5_2.1.i386.rpm avahi-devel-0.6.16-1.el5_2.1.i386.rpm avahi-glib-devel-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.i386.rpm x86_64: avahi-compat-howl-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-debuginfo-0.6.16-1.el5_2.1.i386.rpm avahi-debuginfo-0.6.16-1.el5_2.1.x86_64.rpm avahi-devel-0.6.16-1.el5_2.1.i386.rpm avahi-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-glib-devel-0.6.16-1.el5_2.1.i386.rpm avahi-glib-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/avahi-0.6.16-1.el5_2.1.src.rpm i386: avahi-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.i386.rpm avahi-debuginfo-0.6.16-1.el5_2.1.i386.rpm avahi-devel-0.6.16-1.el5_2.1.i386.rpm avahi-glib-0.6.16-1.el5_2.1.i386.rpm avahi-glib-devel-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.i386.rpm avahi-tools-0.6.16-1.el5_2.1.i386.rpm ia64: avahi-0.6.16-1.el5_2.1.ia64.rpm avahi-compat-howl-0.6.16-1.el5_2.1.ia64.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.ia64.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.ia64.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.ia64.rpm avahi-debuginfo-0.6.16-1.el5_2.1.ia64.rpm avahi-devel-0.6.16-1.el5_2.1.ia64.rpm avahi-glib-0.6.16-1.el5_2.1.ia64.rpm avahi-glib-devel-0.6.16-1.el5_2.1.ia64.rpm avahi-qt3-0.6.16-1.el5_2.1.ia64.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.ia64.rpm avahi-tools-0.6.16-1.el5_2.1.ia64.rpm ppc: avahi-0.6.16-1.el5_2.1.ppc.rpm avahi-0.6.16-1.el5_2.1.ppc64.rpm avahi-compat-howl-0.6.16-1.el5_2.1.ppc.rpm avahi-compat-howl-0.6.16-1.el5_2.1.ppc64.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.ppc.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.ppc64.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.ppc.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.ppc64.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.ppc.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.ppc64.rpm avahi-debuginfo-0.6.16-1.el5_2.1.ppc.rpm avahi-debuginfo-0.6.16-1.el5_2.1.ppc64.rpm avahi-devel-0.6.16-1.el5_2.1.ppc.rpm avahi-devel-0.6.16-1.el5_2.1.ppc64.rpm avahi-glib-0.6.16-1.el5_2.1.ppc.rpm avahi-glib-0.6.16-1.el5_2.1.ppc64.rpm avahi-glib-devel-0.6.16-1.el5_2.1.ppc.rpm avahi-glib-devel-0.6.16-1.el5_2.1.ppc64.rpm avahi-qt3-0.6.16-1.el5_2.1.ppc.rpm avahi-qt3-0.6.16-1.el5_2.1.ppc64.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.ppc.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.ppc64.rpm avahi-tools-0.6.16-1.el5_2.1.ppc.rpm s390x: avahi-0.6.16-1.el5_2.1.s390.rpm avahi-0.6.16-1.el5_2.1.s390x.rpm avahi-compat-howl-0.6.16-1.el5_2.1.s390.rpm avahi-compat-howl-0.6.16-1.el5_2.1.s390x.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.s390.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.s390x.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.s390.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.s390x.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.s390.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.s390x.rpm avahi-debuginfo-0.6.16-1.el5_2.1.s390.rpm avahi-debuginfo-0.6.16-1.el5_2.1.s390x.rpm avahi-devel-0.6.16-1.el5_2.1.s390.rpm avahi-devel-0.6.16-1.el5_2.1.s390x.rpm avahi-glib-0.6.16-1.el5_2.1.s390.rpm avahi-glib-0.6.16-1.el5_2.1.s390x.rpm avahi-glib-devel-0.6.16-1.el5_2.1.s390.rpm avahi-glib-devel-0.6.16-1.el5_2.1.s390x.rpm avahi-qt3-0.6.16-1.el5_2.1.s390.rpm avahi-qt3-0.6.16-1.el5_2.1.s390x.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.s390.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.s390x.rpm avahi-tools-0.6.16-1.el5_2.1.s390x.rpm x86_64: avahi-0.6.16-1.el5_2.1.i386.rpm avahi-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-howl-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-howl-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-0.6.16-1.el5_2.1.x86_64.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-debuginfo-0.6.16-1.el5_2.1.i386.rpm avahi-debuginfo-0.6.16-1.el5_2.1.x86_64.rpm avahi-devel-0.6.16-1.el5_2.1.i386.rpm avahi-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-glib-0.6.16-1.el5_2.1.i386.rpm avahi-glib-0.6.16-1.el5_2.1.x86_64.rpm avahi-glib-devel-0.6.16-1.el5_2.1.i386.rpm avahi-glib-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-qt3-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-0.6.16-1.el5_2.1.x86_64.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.i386.rpm avahi-qt3-devel-0.6.16-1.el5_2.1.x86_64.rpm avahi-tools-0.6.16-1.el5_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJa1PFXlSAg2UNWIIRAqUaAKDDGOduaINb+tFC4nrA8yjvVHHgfwCdHzh3 2f97nqjtVaChIn4dPffHVL0= =gqky -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jan 13 21:39:30 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Jan 2009 16:39:30 -0500 Subject: [RHSA-2009:0015-01] Critical: java-1.6.0-ibm security update Message-ID: <200901132139.n0DLdVgR029963@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.6.0-ibm security update Advisory ID: RHSA-2009:0015-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0015.html Issue date: 2009-01-13 CVE Names: CVE-2008-2086 CVE-2008-5339 CVE-2008-5344 CVE-2008-5345 CVE-2008-5347 CVE-2008-5348 CVE-2008-5350 CVE-2008-5352 CVE-2008-5353 CVE-2008-5354 CVE-2008-5359 CVE-2008-5360 ===================================================================== 1. Summary: Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 Extras - i386, ppc, s390, s390x, x86_64 Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 RHEL Desktop Supplementary (v. 5 client) - i386, x86_64 RHEL Supplementary (v. 5 server) - i386, ppc, s390x, x86_64 3. Description: The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These are summarized in the "Security Alerts" from IBM. All users of java-1.6.0-ibm are advised to upgrade to these updated packages, containing the IBM 1.6.0 SR3 Java release. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 472201 - CVE-2008-5350 OpenJDK allows to list files within the user home directory (6484091) 472208 - CVE-2008-5347 OpenJDK applet privilege escalation via JAX package access (6592792) 472209 - CVE-2008-5348 OpenJDK Denial-Of-Service in kerberos authentication (6588160) 472211 - CVE-2008-5360 OpenJDK temporary files have guessable file names (6721753) 472212 - CVE-2008-5359 OpenJDK Buffer overflow in image processing (6726779) 472224 - CVE-2008-5353 OpenJDK calendar object deserialization allows privilege escalation (6734167) 472228 - CVE-2008-5354 OpenJDK Privilege escalation in command line applications (6733959) 472233 - CVE-2008-5352 OpenJDK Jar200 Decompression buffer overflow (6755943) 474556 - CVE-2008-2086 Java Web Start File Inclusion via System Properties Override 474772 - CVE-2008-5339 JavaWebStart allows unauthorized network connections 474792 - CVE-2008-5344 Java WebStart unprivileged local file and network access 474793 - CVE-2008-5345 JRE allows unauthorized file access and connections to localhost 6. Package List: Red Hat Enterprise Linux AS version 4 Extras: i386: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.i386.rpm ppc: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.ppc.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.ppc.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.ppc.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.ppc.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.ppc.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.3.el4.ppc.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.ppc.rpm s390: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.s390.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.s390.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.s390.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.s390.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.s390.rpm s390x: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.s390x.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.s390x.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.s390x.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.s390x.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.s390x.rpm x86_64: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.x86_64.rpm Red Hat Desktop version 4 Extras: i386: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.i386.rpm x86_64: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4 Extras: i386: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.i386.rpm x86_64: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4 Extras: i386: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.3.el4.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.i386.rpm x86_64: java-1.6.0-ibm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.3.el4.x86_64.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.3.el4.x86_64.rpm RHEL Desktop Supplementary (v. 5 client): i386: java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-accessibility-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.i386.rpm x86_64: java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-accessibility-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.x86_64.rpm RHEL Supplementary (v. 5 server): i386: java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-accessibility-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.i386.rpm ppc: java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.ppc64.rpm java-1.6.0-ibm-accessibility-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.ppc64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.ppc64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.ppc64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.ppc64.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.ppc.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.ppc64.rpm s390x: java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.s390.rpm java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-accessibility-1.6.0.3-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.s390.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.s390.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.s390.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.s390.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.s390x.rpm x86_64: java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-accessibility-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-demo-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-devel-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-javacomm-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-jdbc-1.6.0.3-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-plugin-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.i386.rpm java-1.6.0-ibm-src-1.6.0.3-1jpp.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360 http://www.redhat.com/security/updates/classification/#critical http://www-128.ibm.com/developerworks/java/jdk/alerts/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJbQoAXlSAg2UNWIIRAuWHAJ9wDXEudszF5hj7cCxzgaE2K/dLeACglM/u kJOhox6GQerZt1Zm2UVt/+c= =WCLR -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jan 13 21:40:34 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Jan 2009 16:40:34 -0500 Subject: [RHSA-2009:0016-01] Critical: java-1.5.0-ibm security update Message-ID: <200901132140.n0DLeZiY031124@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.5.0-ibm security update Advisory ID: RHSA-2009:0016-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0016.html Issue date: 2009-01-13 CVE Names: CVE-2008-2086 CVE-2008-5339 CVE-2008-5340 CVE-2008-5341 CVE-2008-5342 CVE-2008-5343 CVE-2008-5344 CVE-2008-5345 CVE-2008-5346 CVE-2008-5348 CVE-2008-5349 CVE-2008-5350 CVE-2008-5351 CVE-2008-5352 CVE-2008-5353 CVE-2008-5354 CVE-2008-5356 CVE-2008-5357 CVE-2008-5359 CVE-2008-5360 ===================================================================== 1. Summary: Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 Extras - i386, ppc, s390, s390x, x86_64 Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 RHEL Desktop Supplementary (v. 5 client) - i386, x86_64 RHEL Supplementary (v. 5 server) - i386, ppc, s390x, x86_64 3. Description: The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These are summarized in the "Security Alerts" from IBM. All users of java-1.5.0-ibm are advised to upgrade to these updated packages, containing the IBM 1.5.0 SR9 Java release. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 472201 - CVE-2008-5350 OpenJDK allows to list files within the user home directory (6484091) 472206 - CVE-2008-5349 OpenJDK RSA public key length denial-of-service (6497740) 472209 - CVE-2008-5348 OpenJDK Denial-Of-Service in kerberos authentication (6588160) 472211 - CVE-2008-5360 OpenJDK temporary files have guessable file names (6721753) 472212 - CVE-2008-5359 OpenJDK Buffer overflow in image processing (6726779) 472213 - CVE-2008-5351 OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) 472218 - CVE-2008-5356 OpenJDK Font processing vulnerability (6733336) 472224 - CVE-2008-5353 OpenJDK calendar object deserialization allows privilege escalation (6734167) 472228 - CVE-2008-5354 OpenJDK Privilege escalation in command line applications (6733959) 472231 - CVE-2008-5357 OpenJDK Truetype Font processing vulnerability (6751322) 472233 - CVE-2008-5352 OpenJDK Jar200 Decompression buffer overflow (6755943) 474556 - CVE-2008-2086 Java Web Start File Inclusion via System Properties Override 474772 - CVE-2008-5339 JavaWebStart allows unauthorized network connections 474773 - CVE-2008-5340 Java WebStart privilege escalation 474786 - CVE-2008-5341 Java Web Start exposes username and the pathname of the JWS cache 474789 - CVE-2008-5342 Java Web Start BasicService displays local files in the browser 474790 - CVE-2008-5343 Java WebStart allows hidden code privilege escalation 474792 - CVE-2008-5344 Java WebStart unprivileged local file and network access 474793 - CVE-2008-5345 JRE allows unauthorized file access and connections to localhost 474794 - CVE-2008-5346 JRE allows unauthorized memory read access via a crafted ZIP file 6. Package List: Red Hat Enterprise Linux AS version 4 Extras: i386: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.i386.rpm ppc: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.ppc.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.ppc.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.ppc.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.ppc.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.4.el4.ppc.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.4.el4.ppc.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.ppc.rpm s390: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.s390.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.s390.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.s390.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.4.el4.s390.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.s390.rpm s390x: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.s390x.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.s390x.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.s390x.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.s390x.rpm x86_64: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.x86_64.rpm Red Hat Desktop version 4 Extras: i386: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.i386.rpm x86_64: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4 Extras: i386: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.i386.rpm x86_64: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4 Extras: i386: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.4.el4.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.i386.rpm x86_64: java-1.5.0-ibm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.4.el4.x86_64.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.4.el4.x86_64.rpm RHEL Desktop Supplementary (v. 5 client): i386: java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-accessibility-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.i386.rpm x86_64: java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-accessibility-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.x86_64.rpm RHEL Supplementary (v. 5 server): i386: java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-accessibility-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.i386.rpm ppc: java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.ppc64.rpm java-1.5.0-ibm-accessibility-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.ppc64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.ppc64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.ppc64.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.ppc.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.ppc64.rpm s390x: java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.s390.rpm java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.s390x.rpm java-1.5.0-ibm-accessibility-1.5.0.9-1jpp.2.el5.s390x.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.s390.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.s390x.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.s390.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.s390x.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.2.el5.s390.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.s390.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.s390x.rpm x86_64: java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-accessibility-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-demo-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-devel-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-javacomm-1.5.0.9-1jpp.2.el5.x86_64.rpm java-1.5.0-ibm-jdbc-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-plugin-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.i386.rpm java-1.5.0-ibm-src-1.5.0.9-1jpp.2.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360 http://www.redhat.com/security/updates/classification/#critical http://www-128.ibm.com/developerworks/java/jdk/alerts/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJbQpCXlSAg2UNWIIRAp9OAJ47Y2m/8stZfIBFxrvlD74cDWb4vwCfQ2WF I8UPupGkTLdwz5y7MEqCd/0= =7gvh -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 14 18:06:47 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 14 Jan 2009 13:06:47 -0500 Subject: [RHSA-2009:0014-01] Important: kernel security and bug fix update Message-ID: <200901141806.n0EI6mlW012716@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2009:0014-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0014.html Issue date: 2009-01-14 CVE Names: CVE-2008-3275 CVE-2008-4933 CVE-2008-4934 CVE-2008-5025 CVE-2008-5029 CVE-2008-5300 CVE-2008-5702 ===================================================================== 1. Summary: Updated kernel packages that resolve several security issues and fix various bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update addresses the following security issues: * the sendmsg() function in the Linux kernel did not block during UNIX socket garbage collection. This could, potentially, lead to a local denial of service. (CVE-2008-5300, Important) * when fput() was called to close a socket, the __scm_destroy() function in the Linux kernel could make indirect recursive calls to itself. This could, potentially, lead to a local denial of service. (CVE-2008-5029, Important) * a deficiency was found in the Linux kernel virtual file system (VFS) implementation. This could allow a local, unprivileged user to make a series of file creations within deleted directories, possibly causing a denial of service. (CVE-2008-3275, Moderate) * a buffer underflow flaw was found in the Linux kernel IB700 SBC watchdog timer driver. This deficiency could lead to a possible information leak. By default, the "/dev/watchdog" device is accessible only to the root user. (CVE-2008-5702, Low) * the hfs and hfsplus file systems code failed to properly handle corrupted data structures. This could, potentially, lead to a local denial of service. (CVE-2008-4933, CVE-2008-5025, Low) * a flaw was found in the hfsplus file system implementation. This could, potentially, lead to a local denial of service when write operations were performed. (CVE-2008-4934, Low) This update also fixes the following bugs: * when running Red Hat Enterprise Linux 4.6 and 4.7 on some systems running Intel? CPUs, the cpuspeed daemon did not run, preventing the CPU speed from being changed, such as not being reduced to an idle state when not in use. * mmap() could be used to gain access to beyond the first megabyte of RAM, due to insufficient checks in the Linux kernel code. Checks have been added to prevent this. * attempting to turn keyboard LEDs on and off rapidly on keyboards with slow keyboard controllers, may have caused key presses to fail. * after migrating a hypervisor guest, the MAC address table was not updated, causing packet loss and preventing network connections to the guest. Now, a gratuitous ARP request is sent after migration. This refreshes the ARP caches, minimizing network downtime. * writing crash dumps with diskdump may have caused a kernel panic on Non-Uniform Memory Access (NUMA) systems with certain memory configurations. * on big-endian systems, such as PowerPC, the getsockopt() function incorrectly returned 0 depending on the parameters passed to it when the time to live (TTL) value equaled 255, possibly causing memory corruption and application crashes. * a problem in the kernel packages provided by the RHSA-2008:0508 advisory caused the Linux kernel's built-in memory copy procedure to return the wrong error code after recovering from a page fault on AMD64 and Intel 64 systems. This may have caused other Linux kernel functions to return wrong error codes. * a divide-by-zero bug in the Linux kernel process scheduler, which may have caused kernel panics on certain systems, has been resolved. * the netconsole kernel module caused the Linux kernel to hang when slave interfaces of bonded network interfaces were started, resulting in a system hang or kernel panic when restarting the network. * the "/proc/xen/" directory existed even if systems were not running Red Hat Virtualization. This may have caused problems for third-party software that checks virtualization-ability based on the existence of "/proc/xen/". Note: this update will remove the "/proc/xen/" directory on systems not running Red Hat Virtualization. All Red Hat Enterprise Linux 4 users should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 248710 - Local keyboard DoS through LED switching 457858 - CVE-2008-3275 Linux kernel local filesystem DoS 460862 - kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-4.7.z] 469631 - CVE-2008-4933 kernel: hfsplus: fix Buffer overflow with a corrupted image 469640 - CVE-2008-4934 kernel: hfsplus: check read_mapping_page() return value 469891 - lost packets when live migrating (RHEL4 XEN) 470034 - HP-Japan: RHEL4.6 diskdump fails when NUMA is on 470196 - getsockopt() returning incorrectly in PPC 470201 - CVE-2008-5029 kernel: Unix sockets kernel panic 470769 - CVE-2008-5025 kernel: hfs: fix namelength memory corruption 471015 - RHSA-2008:0508 linux-2.6.9-x86_64-copy_user-zero-tail.patch broken 471222 - erroneous load balancing for isolated CPUs leads to divide-by-zero panic in find_busiest_group() 471391 - netconsole hang the system on ifenslave operation 473259 - CVE-2008-5300 kernel: fix soft lockups/OOM issues with unix socket garbage collector 475733 - CVE-2008-5702 kernel: watchdog: ib700wdt.c - buffer_underflow bug 476534 - Xen balloon driver on RHEL4 x86_64 with 2.6.9-78.0.1.ELsmp 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-78.0.13.EL.src.rpm i386: kernel-2.6.9-78.0.13.EL.i686.rpm kernel-debuginfo-2.6.9-78.0.13.EL.i686.rpm kernel-devel-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm kernel-smp-2.6.9-78.0.13.EL.i686.rpm kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm ia64: kernel-2.6.9-78.0.13.EL.ia64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.ia64.rpm kernel-devel-2.6.9-78.0.13.EL.ia64.rpm kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm noarch: kernel-doc-2.6.9-78.0.13.EL.noarch.rpm ppc: kernel-2.6.9-78.0.13.EL.ppc64.rpm kernel-2.6.9-78.0.13.EL.ppc64iseries.rpm kernel-debuginfo-2.6.9-78.0.13.EL.ppc64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.ppc64iseries.rpm kernel-devel-2.6.9-78.0.13.EL.ppc64.rpm kernel-devel-2.6.9-78.0.13.EL.ppc64iseries.rpm kernel-largesmp-2.6.9-78.0.13.EL.ppc64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.ppc64.rpm s390: kernel-2.6.9-78.0.13.EL.s390.rpm kernel-debuginfo-2.6.9-78.0.13.EL.s390.rpm kernel-devel-2.6.9-78.0.13.EL.s390.rpm s390x: kernel-2.6.9-78.0.13.EL.s390x.rpm kernel-debuginfo-2.6.9-78.0.13.EL.s390x.rpm kernel-devel-2.6.9-78.0.13.EL.s390x.rpm x86_64: kernel-2.6.9-78.0.13.EL.x86_64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.x86_64.rpm kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-78.0.13.EL.src.rpm i386: kernel-2.6.9-78.0.13.EL.i686.rpm kernel-debuginfo-2.6.9-78.0.13.EL.i686.rpm kernel-devel-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm kernel-smp-2.6.9-78.0.13.EL.i686.rpm kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm noarch: kernel-doc-2.6.9-78.0.13.EL.noarch.rpm x86_64: kernel-2.6.9-78.0.13.EL.x86_64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.x86_64.rpm kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-78.0.13.EL.src.rpm i386: kernel-2.6.9-78.0.13.EL.i686.rpm kernel-debuginfo-2.6.9-78.0.13.EL.i686.rpm kernel-devel-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm kernel-smp-2.6.9-78.0.13.EL.i686.rpm kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm ia64: kernel-2.6.9-78.0.13.EL.ia64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.ia64.rpm kernel-devel-2.6.9-78.0.13.EL.ia64.rpm kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm noarch: kernel-doc-2.6.9-78.0.13.EL.noarch.rpm x86_64: kernel-2.6.9-78.0.13.EL.x86_64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.x86_64.rpm kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-78.0.13.EL.src.rpm i386: kernel-2.6.9-78.0.13.EL.i686.rpm kernel-debuginfo-2.6.9-78.0.13.EL.i686.rpm kernel-devel-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm kernel-smp-2.6.9-78.0.13.EL.i686.rpm kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-2.6.9-78.0.13.EL.i686.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm ia64: kernel-2.6.9-78.0.13.EL.ia64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.ia64.rpm kernel-devel-2.6.9-78.0.13.EL.ia64.rpm kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm noarch: kernel-doc-2.6.9-78.0.13.EL.noarch.rpm x86_64: kernel-2.6.9-78.0.13.EL.x86_64.rpm kernel-debuginfo-2.6.9-78.0.13.EL.x86_64.rpm kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4933 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4934 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5025 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5702 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJbimLXlSAg2UNWIIRAor8AKC1vFKmJ8FBi7sRFi2BUw5BRaZF8ACgvrlA LOKUwjVGPlOYesNoJbTPcl4= =2exf -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jan 19 21:21:46 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 19 Jan 2009 16:21:46 -0500 Subject: [RHSA-2009:0057-01] Important: squirrelmail security update Message-ID: <200901192121.n0JLLlH6014927@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: squirrelmail security update Advisory ID: RHSA-2009:0057-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0057.html Issue date: 2009-01-19 CVE Names: CVE-2009-0030 ===================================================================== 1. Summary: An updated squirrelmail package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - noarch Red Hat Desktop version 3 - noarch Red Hat Enterprise Linux ES version 3 - noarch Red Hat Enterprise Linux WS version 3 - noarch Red Hat Enterprise Linux AS version 4 - noarch Red Hat Enterprise Linux Desktop version 4 - noarch Red Hat Enterprise Linux ES version 4 - noarch Red Hat Enterprise Linux WS version 4 - noarch RHEL Desktop Workstation (v. 5 client) - noarch Red Hat Enterprise Linux (v. 5 server) - noarch 3. Description: SquirrelMail is an easy-to-configure, standards-based, webmail package written in PHP. It includes built-in PHP support for the IMAP and SMTP protocols, and pure HTML 4.0 page-rendering (with no JavaScript required) for maximum browser-compatibility, strong MIME support, address books, and folder manipulation. The Red Hat SquirrelMail packages provided by the RHSA-2009:0010 advisory introduced a session handling flaw. Users who logged back into SquirrelMail without restarting their web browsers were assigned fixed session identifiers. A remote attacker could make use of that flaw to hijack user sessions. (CVE-2009-0030) SquirrelMail users should upgrade to this updated package, which contains a patch to correct this issue. As well, all users who used affected versions of SquirrelMail should review their preferences. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 480224 - Squirrelmail session management broken by security backport 480488 - CVE-2009-0030 squirrelmail: session management flaw 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squirrelmail-1.4.8-9.el3.src.rpm noarch: squirrelmail-1.4.8-9.el3.noarch.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squirrelmail-1.4.8-9.el3.src.rpm noarch: squirrelmail-1.4.8-9.el3.noarch.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squirrelmail-1.4.8-9.el3.src.rpm noarch: squirrelmail-1.4.8-9.el3.noarch.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squirrelmail-1.4.8-9.el3.src.rpm noarch: squirrelmail-1.4.8-9.el3.noarch.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.3.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.3.noarch.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.3.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.3.noarch.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.3.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.3.noarch.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/squirrelmail-1.4.8-5.el4_7.3.src.rpm noarch: squirrelmail-1.4.8-5.el4_7.3.noarch.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/squirrelmail-1.4.8-5.el5_2.3.src.rpm noarch: squirrelmail-1.4.8-5.el5_2.3.noarch.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/squirrelmail-1.4.8-5.el5_2.3.src.rpm noarch: squirrelmail-1.4.8-5.el5_2.3.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0030 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJdO7NXlSAg2UNWIIRAgXeAJ447LxWcontLbAx+EEHZ5eagSvCHwCfQyk2 WRZhdlyvSOppFGTSThKLHpw= =7fXJ -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jan 20 19:31:30 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 20 Jan 2009 14:31:30 -0500 Subject: [RHSA-2009:0205-02] Low: dovecot security and bug fix update Message-ID: <200901201931.n0KJVVmu003440@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: dovecot security and bug fix update Advisory ID: RHSA-2009:0205-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0205.html Issue date: 2009-01-20 Keywords: initscript CVE Names: CVE-2008-4577 CVE-2008-4870 ===================================================================== 1. Summary: An updated dovecot package that corrects two security flaws and various bugs is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Dovecot is an IMAP server for Linux and UNIX-like systems, primarily written with security in mind. A flaw was found in Dovecot's ACL plug-in. The ACL plug-in treated negative access rights as positive rights, which could allow an attacker to bypass intended access restrictions. (CVE-2008-4577) A password disclosure flaw was found with Dovecot's configuration file. If a system had the "ssl_key_password" option defined, any local user could view the SSL key password. (CVE-2008-4870) Note: This flaw did not allow the attacker to acquire the contents of the SSL key. The password has no value without the key file which arbitrary users should not have read access to. To better protect even this value, however, the dovecot.conf file now supports the "!include_try" directive. The ssl_key_password option should be moved from dovecot.conf to a new file owned by, and only readable and writable by, root (ie 0600). This file should be referenced from dovecot.conf by setting the "!include_try [/path/to/password/file]" option. Additionally, this update addresses the following bugs: * the dovecot init script -- /etc/rc.d/init.d/dovecot -- did not check if the dovecot binary or configuration files existed. It also used the wrong pid file for checking the dovecot service's status. This update includes a new init script that corrects these errors. * the %files section of the dovecot spec file did not include "%dir %{ssldir}/private". As a consequence, the /etc/pki/private/ directory was not owned by dovecot. (Note: files inside /etc/pki/private/ were and are owned by dovecot.) With this update, the missing line has been added to the spec file, and the noted directory is now owned by dovecot. * in some previously released versions of dovecot, the authentication process accepted (and passed along un-escaped) passwords containing characters that had special meaning to dovecot's internal protocols. This updated release prevents such passwords from being passed back, instead returning the error, "Attempted login with password having illegal chars". Note: dovecot versions previously shipped with Red Hat Enterprise Linux 5 did not allow this behavior. This update addresses the issue above but said issue was only present in versions of dovecot not previously included with Red Hat Enterprise Linux 5. Users of dovecot are advised to upgrade to this updated package, which addresses these vulnerabilities and resolves these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 238016 - Wrong init script 436287 - dovecot.conf is world readable - possible password exposure 439369 - new dovecot security issues from the dovecot site 448089 - dovecot should own /etc/pki/dovecot/private directory 467436 - CVE-2008-4577 dovecot: incorrect handling of negative rights in the ACL plugin 469659 - CVE-2008-4870 dovecot: ssl_key_password disclosure due to an insecure dovecot.conf permissions 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dovecot-1.0.7-7.el5.src.rpm i386: dovecot-1.0.7-7.el5.i386.rpm dovecot-debuginfo-1.0.7-7.el5.i386.rpm x86_64: dovecot-1.0.7-7.el5.x86_64.rpm dovecot-debuginfo-1.0.7-7.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/dovecot-1.0.7-7.el5.src.rpm i386: dovecot-1.0.7-7.el5.i386.rpm dovecot-debuginfo-1.0.7-7.el5.i386.rpm ia64: dovecot-1.0.7-7.el5.ia64.rpm dovecot-debuginfo-1.0.7-7.el5.ia64.rpm ppc: dovecot-1.0.7-7.el5.ppc.rpm dovecot-debuginfo-1.0.7-7.el5.ppc.rpm s390x: dovecot-1.0.7-7.el5.s390x.rpm dovecot-debuginfo-1.0.7-7.el5.s390x.rpm x86_64: dovecot-1.0.7-7.el5.x86_64.rpm dovecot-debuginfo-1.0.7-7.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4577 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4870 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJdiZ+XlSAg2UNWIIRAiwvAKCBSrKaiISaD135RnLb7qreQQ37tgCfaAqu Rze6M2u8eTIxTkgOQLDH3EE= =632r -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jan 20 19:35:12 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 20 Jan 2009 14:35:12 -0500 Subject: [RHSA-2009:0225-02] Important: Red Hat Enterprise Linux 5.3 kernel security and bug fix update Message-ID: <200901201935.n0KJZDxh006140@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Enterprise Linux 5.3 kernel security and bug fix update Advisory ID: RHSA-2009:0225-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0225.html Issue date: 2009-01-20 Keywords: kernel update CVE Names: CVE-2008-5029 CVE-2008-5079 CVE-2008-5182 ===================================================================== 1. Summary: Updated kernel packages that fix three security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 5. This is the third regular update. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The Linux kernel (the core of the Linux operating system) These updated packages contain 730 bug fixes and enhancements for the Linux kernel. Space precludes a detailed description of each of these changes in this advisory and users are therefore directed to the release notes for Red Hat Enterprise Linux 5.3 for information on 97 of the most significant of these changes. Details of three security-related bug fixes are set out below, along with notes on other broad categories of change not covered in the release notes. For more detailed information on specific bug fixes or enhancements, please consult the Bugzilla numbers listed in this advisory. * when fput() was called to close a socket, the __scm_destroy() function in the Linux kernel could make indirect recursive calls to itself. This could, potentially, lead to a denial of service issue. (CVE-2008-5029, Important) * a flaw was found in the Asynchronous Transfer Mode (ATM) subsystem. A local, unprivileged user could use the flaw to listen on the same socket more than once, possibly causing a denial of service. (CVE-2008-5079, Important) * a race condition was found in the Linux kernel "inotify" watch removal and umount implementation. This could allow a local, unprivileged user to cause a privilege escalation or a denial of service. (CVE-2008-5182, Important) * Bug fixes and enhancements are provided for: * support for specific NICs, including products from the following manufacturers: Broadcom Chelsio Cisco Intel Marvell NetXen Realtek Sun * Fiber Channel support, including support for Qlogic qla2xxx, qla4xxx, and qla84xx HBAs and the FCoE, FCP, and zFCP protocols. * support for various CPUs, including: AMD Opteron processors with 45 nm SOI ("Shanghai") AMD Turion Ultra processors Cell processors Intel Core i7 processors * Xen support, including issues specific to the IA64 platform, systems using AMD processors, and Dell Optiplex GX280 systems * ext3, ext4, GFS2, NFS, and SPUFS * Infiniband (including eHCA, eHEA, and IPoIB) support * common I/O (CIO), direct I/O (DIO), and queued direct I/O (qdio) support * the kernel distributed lock manager (DLM) * hardware issues with: SCSI, IEEE 1394 (FireWire), RAID (including issues specific to Adaptec controllers), SATA (including NCQ), PCI, audio, serial connections, tape-drives, and USB * ACPI, some of a general nature and some related to specific hardware including: certain Lenovo Thinkpad notebooks, HP DC7700 systems, and certain machines based on Intel Centrino processor technology. * CIFS, including Kerberos support and a tech-preview of DFS support * networking support, including IPv6, PPPoE, and IPSec * support for Intel chipsets, including: Intel Cantiga chipsets Intel Eagle Lake chipsets Intel i915 chipsets Intel i965 chipsets Intel Ibex Peak chipsets Intel chipsets offering QuickPath Interconnects (QPI) * device mapping issues, including some in device mapper itself * various issues specific to IA64 and PPC * CCISS, including support for Compaq SMART Array controllers P711m and P712m and other new hardware * various issues affecting specific HP systems, including: DL785G5 XW4800 XW8600 XW8600 XW9400 * IOMMU support, including specific issues with AMD and IBM Calgary hardware * the audit subsystem * DASD support * iSCSI support, including issues specific to Chelsio T3 adapters * LVM issues * SCTP management information base (MIB) support * issues with: autofs, kdump, kobject_add, libata, lpar, ptrace, and utrace * platforms using Intel Enhanced Error Handling (EEH) * EDAC issues for AMD K8 and Intel i5000 * ALSA, including support for new hardware * futex support * hugepage support * Intelligent Platform Management Interface (IPMI) support * issues affecting NEC/Stratus servers * OFED support * SELinux * various Virtio issues All users are advised to upgrade to these updated packages, which resolve these issues and add these enhancements. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 228836 - acpi processor module displays errors if hyperthreading disabled 231369 - GFS2 will panic if you misspell any mount options 236750 - When bonding is used and IPV6 is enabled the message of 'kernel: bond0: duplicate address detected!' is output 239604 - [RHEL5] console: kobject_add failed 243526 - IPv6 default route does not work 244135 - audit tty input 249726 - Misspellings in RPM description, suggested clarifications 250104 - RHEL5 Kernel patches for blktap statistics 254195 - use after free in nlm subsystem 350281 - IPSec Packet has no Non-ESP marker 370471 - [RFE] Add support for Wacom PTZ-431W to kernel 376831 - Read from /proc/ppc64/rtas/error_log does not honor O_NONBLOCK 382491 - duplicate packet from ipt_CLUSTERIP module 390601 - [RHEL5] EDAC k8 MC0: extended error code: GART error 406051 - Marvell NIC using skge driver loses promiscuous mode on rewiring 412691 - kernel-xen panic when X shuts down 420961 - Driver sky2 lost support for Marvell 88E8056 network controller 423521 - memory leak on size-8192 buckets with NFSV4 425341 - Please add vscnprintf and down_write_trylock to KABI Whitelist 425955 - resize2fs online resize fails with small journal 426096 - Xenoprof check_ctrs/start/stop fixes for intel family 6 426895 - fix default route doesn't work. 428275 - Need EOE (End of Event) audit message sent from kernel. 428277 - Audit subsystem SIGUSR2 support 428696 - nVidia MCP55 MCP55 Ethernet (rev a3) not functional on kernel 2.6.18-53.1.4 428720 - [RHEL5 U2] Connectathon RHEL5 client to RHEL4 server, Connectathon failure 429054 - soft lockup while unmounting a read-only filesystem with errors 429142 - RHEL5.2: ecryptfs oops after lower persistent file creation failure 429337 - Make dm interfaces available for external modules. 429941 - [RHEL5 U2] Audit fails to shutdown properly 429950 - [firewire] unable to use disk (giving up on config rom) 429951 - [firewire] unable to use disk (fw_sbp2: failed to login to ...) 430300 - [firewire] ohci iso receive support incomplete 431183 - utrace: PTRACE_POKEUSR_AREA corrupts ACR0 431365 - SCSI IO errors do not propagate properly with certain SCSI devices 431868 - mounting CIFS subshare doesn't autoconvert prepath delimiters 432057 - GFS2: d_doio stuck in readv() waiting for pagelock. 432867 - memory corruption due to portmap call succeeding after parent rpc_clnt has been freed 433661 - kernel panic with voip traffic (h323) 434538 - sr #1768018 : numlock led does not reflect the status of numlock 434800 - xenkbd can crash when probe fails 434998 - utrace: ERESTARTSYS from calling a function from a debugger 435110 - fix up remaining sctp MIB problems 435115 - kernel freezes when running script which features ecryptfs parts of kernel 435144 - whitelist: iounmap(ia64) - Failed ABI dependencies for IA64 mpt SCSI drivers 435291 - LTC41974-Pages of a memory mapped NFS file get corrupted. 436004 - 50-75 % drop in nfs-server rewrite performance compared to rhel 4.6+ 436068 - [Areca 5.3 feat] Update arcmsr to version 1.20.00.15.RH1 436686 - tg3.c does not build on sparc with > 2.6.18-53.el5 436966 - e1000_clean_tx_irq: Detected Tx Unit Hang - 82546EB 437129 - Rpm install fails due to missing symbols required in myri10ge-kmod x86_64 rpm 437479 - remove extraneous error field from nfs_readdir_descriptor_t 437544 - fix bad merge in nfs3_write_done and nfs3_commit_done 437579 - batch kprobe unregister 437803 - gfs2 crash - BUG: unable to handle kernel NULL pointer dereference at virtual address 437882 - utrace: orig_rax 0x00000000ffffffff not recognized as -1 437958 - /proc/<pid>/environ not always accessible when receiving PTRACE_EVENT_EXIT 438153 - Poor LVM mirroring performance 438230 - ia64: suspecious compile warning in brew 438423 - backport patch to RHEL5 have it flip to synchronous writes when there is a write error 438761 - LTC:5.4:201049:DM-MP SCSI Hardware Handlers 439193 - Assertion failure in journal_next_log_block 439194 - Assertion failure in journal_start() at fs/jbd/transaction.c:274: 'handle->h_transaction->t_journal == journal' 439899 - [RFE] Add uvcvideo module to the kernel. 439917 - kernel: splice: fix bad unlock_page() in error case [rhel-5.3] 439918 - kernel: dio: zero struct dio with kzalloc instead of manually [rhel-5.3] 440261 - xen/ia64 asm missing srlz instruction 440413 - ecryptfs module incorrectly checks error codes in process_request_key_err 440506 - panic in aoe:aoecmd_ata_rsp during direct I/O to lvm [snap,mirror,stripe] 441615 - HP DC7700 ACPI problem 441640 - RHEL 5.1 will incorrectly mark SCSI devices as offline due to improper error handling 441716 - Fake ARP dropped after migration leading to loss of network connectivity 441832 - mptscsi race between hotremove and mptscsih_bus_reset 442426 - do not limit locked memory when RLIMIT_MEMLOCK is RLIM_INFINITY 442577 - Backport fix for possible data corruption in mark_buffer_dirty on SMP 442661 - [5.2][kdump][xen] crash failed to read vmcore from Dom0 Kernel 442723 - Xen Support more than 16 disk devices (kernel) 442736 - launching too many guests panics with "No available IRQ to bind to: increase NR_IRQS!" 442820 - IPV6DOD: ESP with 3des-cbc for encrypt and authentication set to "null" 442906 - libata: sata_nv - disable ADMA by default 442991 - Include xenpv-driver in bare metal kernel rpm. 443043 - fix setuid/setgid clearing by knfsd 443395 - cp -p does not copy mtime to CIFS share 443522 - ls shows two /proc/[pid]/limits files for every process 443618 - [REG][Xen][5.2beta] cannot open a vmcore of xen-kdump with crash 443627 - kernel dm snapshot: PPC64: kernel OOPS during activation of snapshot with small chunksize 443645 - ST Driver causing kernel panic condition 443853 - RHEL 5.3 NULL pointer dereferenced in powernowk8_init 443896 - RFE: [Ext4 enabler] backport vfs helpers to facilitate ext4 backport and testing 444582 - IPV6DOD: all MCAST_* socket options fail with 32-bit app, 64-bit kernel due to padding 444589 - xentop - incompatibility between HV and userspace toolset 444611 - kernel doesn't honor ADDR_NO_RANDOMIZE for stack 444759 - high I/O wait using 3w-9xxx 444776 - iBFT target info not parsed properly by the iscsi_ibft module 444865 - oops in cifs module while trying to stop a thread (kthread_stop) during filesystem mount 444961 - softlockup when repeatedly dropping caches 445095 - BusLogic module can't compile in the rhel 5.2 beta kernel 445211 - [RFE] DTR/DSR flow control 445422 - Feature: allow panic on softlockup warnings 445522 - clean up CIFS build warnings 445649 - [PATCH][RHEL5.1] Performance Improvement of fdatasync(2) in case of Overwrite 445674 - Direct I/O cache invalidation after sync writes 445787 - debugfs: file/directory creation error 446068 - [RHEL5] k8_edac: typo in 'EDAC k8 MC0: GART TLB errorr: ' 446076 - [RHEL5 U2] iwl4965 -> compat module taints kernel 446142 - CIFS: slab error in kmem_cache_destroy(): cache `cifs_request': Can't free all objects 446188 - BUG: Don't reserve crashkernel memory > 4 GB on ia64 446250 - IPV6DOD: xfrm reverse icmp feature does not seem to work correctly. 446599 - jbd races lead to EIO for O_DIRECT 446707 - Add support for filetype option in audit subsystem 446962 - Access to firewire devices is still allowed after the device is removed from the bus. 447400 - CIFS VFS: Send error in FindClose = -9 447586 - DM failing path due to a communication failure on a single i/o 447742 - JBD: Fix typo that could result in filesystem corruption. 447748 - GFS2: lock_dlm is not always delivering callbacks in the right order 448328 - ssh connection hangs when running command producing large text output after running "service iptables restart" 448762 - FEAT: Update ieee80211 component and associated drivers 448763 - FEAT: Add rt2x00 drivers 448764 - FEAT: Add rtl818x drivers 449668 - RHEL5.3: update ecryptfs kernelspace to 2.6.26 codebase 449787 - FEAT: RHEL5.3 update acpi-cpufreq driver 449945 - Guest OS install causes host machine to crash 449948 - Add gate.lds to Documentation/dontdiff 450130 - dlm: fixes for mixed endian cluster 450132 - dlm: fixes for recovery of user lockspace 450133 - dlm: keep cached master rsbs during recovery 450135 - dlm: save master info after failed no-queue request 450136 - dlm: check for null in device_write [rhel-5.3] 450137 - dlm: fix basts for granted CW waiting PR/CW 450138 - dlm: move plock code from gfs2 450184 - Ensure that 'noac' and/or 'actimeo=0' turn off attribute caching 450219 - bonding driver can leave rtnl_lock unbalanced 450276 - GFS2: cannot use fifo nodes (named pipes) 450566 - FEAT: RHEL5.3 backport fallocate syscall 450786 - [Stratus 5.3 bug] kernel NULL pointer dereference at usbdev_read 450855 - Unbalance reference count in ndisc_recv_ns 450921 - s2io intr_type documentation inaccurate 451007 - FEAT: RHEL 5.3 HDA ALSA driver update from mainstream 451008 - Rpmbuild generates incorrect packages due to typos in the kernel-2.6.spec file. 451157 - [Stratus 5.3][2/2] ttyS1 lost interrupt and it stops transmitting 451196 - ip tunnel can't be bound to another device 451317 - deadlock when rpc_malloc tries to flush NFS pages 451586 - RHEL5.3: SB600/700 SATA controller PMP support 451591 - Handle invalid ACPI SLIT table 451593 - Multiple outstanding ptc.g instruction support 451745 - a check for a buggy HP SAL caused problems booting as a guest in a virtual machine 451945 - Update 3w-xxxx to version 1.26.03.000-2.6.18RH 451946 - Update 3w-9xxx to version 2.26.08.003-2.6.18RH 452004 - gfs2: BUG: unable to handle kernel paging request at ffff81002690e000 452175 - kernel BUG at arch/i386/mm/highmem-xen.c:43! with errata/RHBA-2008-0314 installed 452535 - CONFIG_AUDITSYSCALL requires SELinux 452577 - Actual & placeholder funcs have differing param counts 452761 - r8169 driver broken in 2.6.18-92+ kernels. 453038 - Missing functions in UP kernel 453094 - deadlock when lockd tries to take f_sema that it already has 453394 - [RHEL5.2]: Running strace with a bad syscall doesn't return -ENOSYS 453441 - [QLogic 5.3 bug] qla2xxx- provide additional statistics to user 453462 - update CIFS for RHEL5.3 453472 - [aacraid] aac_srb: aac_fib_send failed with status 8195 453563 - RTL8111/8168B network card does not work 453574 - virtual ethernet device stops working on reception of duplicate backend state change signals 453680 - Error in the uhci code causes usb not to work with iommu=calgary boot option 453685 - [QLogic 5.3 feat] [1/n] qla2xxx- Upstream updates: 8.01.07-k7 453711 - [5.2][nfs] ls -l shows outdated timestamp 453990 - [RHEL5.3] LTP test failure in inotify02 testcase 454711 - 'xm info' does not show correct info in 'node_to_cpu' field on ia64 454792 - document divider= option in kernel docs 455060 - PTRACE_KILL does not kill the child process, rather than the child starts running freely. 455230 - v4l2 ioctl debug messages cannot be turned off 455238 - IPsec memory leak 455308 - Altix Partitioned System 455424 - x86: show apicid for cpu in proc 455425 - x86: don't call MP_processor_info for disabled cpu 455427 - x86: don't call MP_processor_info for disabled cpu (64bit) 455434 - x86: fix PAE pmd_bad bootup warning 455447 - FEAT: RHEL 5.3: (1/2) Increase deep idle state residency on idle platforms using Nehalem class processors 455449 - FEAT: RHEL 5.3: (2/2) Increase deep idle state residency on idle platforms using Nehalem class processors 455452 - RFE: delalloc helpers for ext4 455460 - kernel NULL pointer dereference in kobject_get_path 455471 - [NEC/Stratus 5.3 bug] various crashes in md - rdev removed in the middle of ITERATE_RDEV 455478 - 2.6.26 backport of "check physical address range in ioremap" into RHEL5-U3 455491 - backport of fix endless page faults in mount_block_root for Linux 2.6 from 2.6.26 to RHEL5-U3 455504 - Backport of don't use large pages to map the first 2/4MB of memory form 2.6.26 to RHEL5-U3 455729 - close system call returns -ERESTARTSYS 455813 - Under heavy memory usage dma_alloc_coherent does not return aligned address 455900 - [QLogic 5.3 feat] qla2xxx - mgmt. API, CT pass thru 456052 - kernel: fix array out of bounds when mounting with selinux options [rhel-5.3] 456169 - Need to add 3 dlm symbols to the kernel whitelist 456215 - RHEL 5.3 HDA ALSA driver update from upstream 2008-07-22 (fixes and support for new hw) 456218 - kernel: serial open/close loop disables irq [rhel-5.3] 456300 - IPMI: Restrict keyboard io port reservation 456334 - GFS2: glock dumping misses out some glocks 456453 - GFS2: d_rwdirectempty fails with short read 456638 - [Kdump] not work on HP-XW8600 456900 - [QLogic 5.3 feat] [0/n] qla2xxx- Netlink, FCoE management API 457006 - ipv6: use timer pending to fix bridge reference count problem [rhel-5.3] 457013 - pppoe: Check packet length on all receive paths [rhel-5.3] 457018 - pppoe: Unshare skb before anything else [rhel-5.3] 457025 - ide-cd: fix oops when using growisofs [rhel-5.3] 457058 - ecryptfs page-sized memory allocations can corrupt memory 457137 - [IA64] Fix SMP-unsafe with XENMEM_add_to_physmap on HVM 457143 - RHEL5.3: misc ecryptfs fixes from 2.6.27 457300 - hang in ad_rx_machine due to second attempt to lock spin_lock 457569 - dlm get_comm() uses NULL pointer 457798 - GFS2 : gfs2meta is FUBAR 457892 - RTL8101E performance problem 457958 - Backport NetXen nic driver from upstream kernel to RHEL5.3 457961 - kprobes remove causing kernel panic on ia64 with 2.6.18-92.1.10.el5 kernel 458019 - kernel: random32: seeding improvement [rhel-5.3] 458270 - [TAHI] DAD test failure when ipv6_autoconf=yes 458289 - GFS2: rm on multiple nodes causes panic 458360 - enable userspace kernel header check 458368 - [5.0] kdump hangs up by Sysrq+C trigger 458441 - Make oprofile recognize Nehalem 458620 - Problem with aic79xx 458684 - GFS2: glock deadlock in page fault path 458718 - FEAT: RHEL 5.3 ext4 tech preview 458749 - autofs problem with symbolic links 458760 - kernel: dlm: dlm/user.c input validation fixes [rhel-5.3] 458774 - Kernel BUG at fs/nfs/namespace.c:103 (:nfs:nfs_follow_mountpoint) 458824 - Oprofile need to enable/disable all the counters for intel family 6 458936 - write barriers not supported, ext3 does not complain 458988 - Panic while using pci=use_crs for resource allocation 459062 - pppoe: Fix skb_unshare_check call position [rhel-5.3] 459092 - kernel dm mpath: fix several problems in dm-mapth target error paths 459095 - kernel dm crypt: use cond_resched 459107 - [RHEL5.3]: Hang when booting an i386 domU on an i386 HV 459221 - RHEL5.3: Patch to support new AMD HDMI Audio 459337 - dm-snap.c: Data read from snapshot may be corrupt if origin is being written to simultaneously 459436 - ext4 assembly bitops failures on s390 459460 - kernel: cpufreq: fix format string bug [rhel-5.3] 459463 - kernel: binfmt_misc.c: avoid potential kernel stack overflow [rhel-5.3] 459527 - Performance degradation due to excessive spinlocking in the block layer when using logical volume that spans too many physical volumes 459556 - [TAHI] no echo reply for loopback address 459585 - dlm_recoverd in D state when using IPv6 to comunicate between nodes 459722 - [QLogic 5.3 feat] [3/n] qla2xxx - Upstream updates: 8.02.00-k5 to 8.02.00-k6 459738 - GFS2: Multiple writer performance issue. 459786 - utrace signal handling bug interferes with systemtap uprobes 459812 - IPsec crash with MAC longer than 16 bytes 459876 - network hangs and BUG() message at boot with -105.el5debug kernel 460047 - Kernel obsoletes existing Driver Updates on install 460063 - CIFS option forcedirectio fails to allow the appending of text to files. 460103 - kernel: alsa: asoc: fix double free and memory leak in many codec drivers [rhel-5.3] 460135 - CIFS: enable DFS support as tech-preview in RHEL5.3 460195 - Need SCSI transport and LLD netlink support. 460593 - backport upstream kernel support for private futexes to RHEL 5.3 kernel 460845 - Nested LVM can cause deadlock due to kcopyd 460846 - Deadlock possibility with nested LVMs with snapshots 460857 - kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-5.3] 461184 - Significant regression in time() performance 461414 - [QLogic 5.3 bug] qla2xxx/qla84xx: Fix 128Kb limitation in netlink messages; 461532 - /proc/xen on bare-metal and FV guests causes multiple issues 461537 - crypto: hmac(md5) self-test panics system 461671 - [RHEL5] nmi: crash during kdump kernel boot 461866 - net: Enable TSO if supported by at least one device 462109 - [qlogic 5.3 bug] qla2xxx - Set rport dev loss timeout consistently 462117 - [QLogic 5.3 bug] qla2xxx - Additional residual-count corrections during UNDERRUN handling. 462354 - dlm: add old plock interface 462416 - [QLogic 5.3 bug] Update qla2xxx - PCI EE error handling support 462441 - Fix NUL handling in TTY input auditing 462500 - BUG: warning when pata_sil680 loaded 462622 - spufs in RHEL5.3: missing context switch notification log 462663 - Netboot image for ppc too large 462743 - libata: rmmod pata_sil680 never returns from ata_port_detach 463206 - Regression: Tape commands are possibly retried if there is a loss of connectivity while it is running 463277 - RHEL5.3: ext4 warning on x86 build 463416 - RHEL 5.3: fix scsi regression causing udev to hang loading sr_mod 463470 - Regression: multipath was setting the REQ_FAILFAST flags which caused a performance drop 463478 - RHEL5.3: ecryptfs memory corruption 463500 - [RHEL5.3] Kernel-xen Oops EIP is at range_straddles_page_boundary+0x2c/0xd9 463503 - EEPROM/NVM of the e1000e becomes corrupted 464445 - xm trigger <domain> init causes kernel panic. 464681 - [QLogic 5.3 bug] qla2xxx/qla84xxx: Advertise qla84xx firmware rev. fix netlink code 464868 - incorrect ATA7 handing in kernel causing ABRT errors 465023 - [QLogic 5.3 bug] Update qla2xxx version to meet open source standards. 465396 - [5.3] makedumpfile: Can't get necessary symbols for excluding free pages. 465825 - panic in kcopyd during snapshot I/O 465856 - GFS2: recovery stuck 466167 - RHEL5.3: posix-timers race condition causes timer to seize up 466240 - Question for LUKS device passhprase unreadable when using Xen 466246 - Interactive installation fails with ext4dev root partition 466307 - /dev/agpart missing for intel i965 HW/82G965 Graphics 466422 - RHEL5.3: Modify SATA IDE mode quirk 466774 - [RHEL5.3] kernel kernel BUG at kernel/exit.c:1129! 467153 - [QLogic 5.3 bug] latest qlogic driver takes several minutes to find LUNs on older qla2xx controller 467216 - avc: denied { sys_resource } when using ext4dev partitions 467244 - On RHEL 5.2 32 bit rmmod bonding results in a kernel panic when configured in balance-tlb mode 467689 - GFS2: Hang when shrink_slab calls gfs2_delete_inode (the GFP_NOFS bit) 467845 - RHEL 5.3: allow tcp socket buffers grow to larger than a page size 467927 - [RHEL5] patch enabling deep C states makes a RHTS machine hang on boot 468034 - RHEL 5.3: minor virtio_net_fixes 468083 - kernel-xen doesn't boot on Dell Optiplex GX280 468148 - getsockopt() returning incorrectly in PPC 468187 - [autofs4] Incorrect "active offset mount" messages in syslog 468192 - writing data to file can fail and cause panic sometimes when using xattr on ecryptfs 468538 - dlm: add dlm_posix_set_fsid to kABI 468547 - RHEL5.3: Regression in ext3/jbd 468555 - [QLogic 5.3 bug] qla2xxx - restore disable by default of MSI, MSI-X 468573 - [QLogic 5.3 bug] qla2xxx - Correct Atmel flash-part handling 468870 - initscripts upgrade from 8.45.17 to 8.45.19 breaks arp_ip_target 468873 - [QLogic 5.3 bug] qla2xxx - fails to report Option Rom version information 468915 - [Stratus/NEC 5.3 bug] System can crash when removing input device 468922 - bnx2x + 57711 MCA on BL870c 468967 - iwlagn (Montevina & Santa Rosa) fails to get associated with AP by NetworkManager frequently 469414 - [QLogic 5.3 bug] qla3xxx, qla4xxx- Update version numbers and use new format. 469444 - [All Partners 5.3 bug] allow both ACPI code paths to use the same blacklist dmi_table correctly 469710 - Various firewire bugs fixed upstream 469711 - firewire module unload hangs 469715 - libata: avoid overflow in ata_tf_to_lba48() when tf->hba_lbal> 127 469754 - kernel panic seen in ptrace_induce_signal in run of rhts test /tools/gdb/gdb-any/ 469774 - RHEL53 Beta1: network installation through cxgb3 interface failed if the adapter firmware doesn't match the cxgb3 device driver requst firmware level in rhel53. 470201 - CVE-2008-5029 kernel: Unix sockets kernel panic 470267 - cifs: data corruption due to interleaved partial writes timing out 470449 - system-config-soundcard is not working on RHEL5.3 GA-snapshot1 470610 - [Emulex 5.3 bug] Update lpfc to version 8.2.0.33.3p 470625 - Netdump not functioning w/ bnx2 >= v1.8h (Broadcom Netxtreme II Network Card) 471112 - gdb on ppc hangs, then panics with a kill -9 471269 - [QLogic 5.3 bug] qla2xxx - No NPIV for Loop connections. 471576 - libata: Avoid overflow in ata_tf_read_block() when tf->hba_lbal > 127 471639 - max_phys_segments violation with dm-linear + md raid1 + cciss 471801 - statically linked uuid segfaults in uuid_generate() on Xen kernel 471871 - dlm: fix up memory allocation flags 471903 - [Broadcom 5.3 bug] bnx2: add PCI-IDs for 5716s 471933 - [Brocade/Dell 5.3 bug] hts failing memory test with EDAC i5000 Non-Fatal error 472095 - RHEL5.3 e1000e: enable ECC correction on 82571 silicon 472325 - CVE-2008-5182 kernel: fix inotify watch removal/umount races 472382 - [QLogic 5.3 bug] qla2xx/qla84xx - Failure to establish link. 472504 - Need to build xen-platform-pci as a module and not into the kernel 472844 - kernel panic when modprobe -r acpi_cpufreq on centrino platform with kernel newer than 2.6.18-118 473110 - RHEL 5.3: allow tun/tap support larger MTU sizes 473114 - RHEL 5.3: allow virtio_net support larger MTU sizes 473120 - RHEL 5.3: implement virtio_net mergeable receive buffer allocate scheme 473696 - CVE-2008-5079 Linux Kernel 'atm module' Local Denial of Service 474465 - RHEL5.3: Calgary DMA errors on IBM systems 474736 - [QLogic 5.3 bug] qla4xxx - Add checks for <TargetName, ISID, TargetPortGroupTag> 474935 - fcoe: fix terminate_rport_io related problems 475652 - kdump panic introduced by hpet fix on systems without HPET 475778 - [RHEL 5.3 Xen]: Guest hang on FV save/restore 476184 - RHEL5.3 pv guests crash randomly on reboot orders. 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-128.el5.src.rpm i386: kernel-2.6.18-128.el5.i686.rpm kernel-PAE-2.6.18-128.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-128.el5.i686.rpm kernel-PAE-devel-2.6.18-128.el5.i686.rpm kernel-debug-2.6.18-128.el5.i686.rpm kernel-debug-debuginfo-2.6.18-128.el5.i686.rpm kernel-debug-devel-2.6.18-128.el5.i686.rpm kernel-debuginfo-2.6.18-128.el5.i686.rpm kernel-debuginfo-common-2.6.18-128.el5.i686.rpm kernel-devel-2.6.18-128.el5.i686.rpm kernel-headers-2.6.18-128.el5.i386.rpm kernel-xen-2.6.18-128.el5.i686.rpm kernel-xen-debuginfo-2.6.18-128.el5.i686.rpm kernel-xen-devel-2.6.18-128.el5.i686.rpm noarch: kernel-doc-2.6.18-128.el5.noarch.rpm x86_64: kernel-2.6.18-128.el5.x86_64.rpm kernel-debug-2.6.18-128.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-128.el5.x86_64.rpm kernel-debug-devel-2.6.18-128.el5.x86_64.rpm kernel-debuginfo-2.6.18-128.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-128.el5.x86_64.rpm kernel-devel-2.6.18-128.el5.x86_64.rpm kernel-headers-2.6.18-128.el5.x86_64.rpm kernel-xen-2.6.18-128.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-128.el5.x86_64.rpm kernel-xen-devel-2.6.18-128.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-128.el5.src.rpm i386: kernel-2.6.18-128.el5.i686.rpm kernel-PAE-2.6.18-128.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-128.el5.i686.rpm kernel-PAE-devel-2.6.18-128.el5.i686.rpm kernel-debug-2.6.18-128.el5.i686.rpm kernel-debug-debuginfo-2.6.18-128.el5.i686.rpm kernel-debug-devel-2.6.18-128.el5.i686.rpm kernel-debuginfo-2.6.18-128.el5.i686.rpm kernel-debuginfo-common-2.6.18-128.el5.i686.rpm kernel-devel-2.6.18-128.el5.i686.rpm kernel-headers-2.6.18-128.el5.i386.rpm kernel-xen-2.6.18-128.el5.i686.rpm kernel-xen-debuginfo-2.6.18-128.el5.i686.rpm kernel-xen-devel-2.6.18-128.el5.i686.rpm ia64: kernel-2.6.18-128.el5.ia64.rpm kernel-debug-2.6.18-128.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-128.el5.ia64.rpm kernel-debug-devel-2.6.18-128.el5.ia64.rpm kernel-debuginfo-2.6.18-128.el5.ia64.rpm kernel-debuginfo-common-2.6.18-128.el5.ia64.rpm kernel-devel-2.6.18-128.el5.ia64.rpm kernel-headers-2.6.18-128.el5.ia64.rpm kernel-xen-2.6.18-128.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-128.el5.ia64.rpm kernel-xen-devel-2.6.18-128.el5.ia64.rpm noarch: kernel-doc-2.6.18-128.el5.noarch.rpm ppc: kernel-2.6.18-128.el5.ppc64.rpm kernel-debug-2.6.18-128.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-128.el5.ppc64.rpm kernel-debug-devel-2.6.18-128.el5.ppc64.rpm kernel-debuginfo-2.6.18-128.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-128.el5.ppc64.rpm kernel-devel-2.6.18-128.el5.ppc64.rpm kernel-headers-2.6.18-128.el5.ppc.rpm kernel-headers-2.6.18-128.el5.ppc64.rpm kernel-kdump-2.6.18-128.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-128.el5.ppc64.rpm kernel-kdump-devel-2.6.18-128.el5.ppc64.rpm s390x: kernel-2.6.18-128.el5.s390x.rpm kernel-debug-2.6.18-128.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-128.el5.s390x.rpm kernel-debug-devel-2.6.18-128.el5.s390x.rpm kernel-debuginfo-2.6.18-128.el5.s390x.rpm kernel-debuginfo-common-2.6.18-128.el5.s390x.rpm kernel-devel-2.6.18-128.el5.s390x.rpm kernel-headers-2.6.18-128.el5.s390x.rpm kernel-kdump-2.6.18-128.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-128.el5.s390x.rpm kernel-kdump-devel-2.6.18-128.el5.s390x.rpm x86_64: kernel-2.6.18-128.el5.x86_64.rpm kernel-debug-2.6.18-128.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-128.el5.x86_64.rpm kernel-debug-devel-2.6.18-128.el5.x86_64.rpm kernel-debuginfo-2.6.18-128.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-128.el5.x86_64.rpm kernel-devel-2.6.18-128.el5.x86_64.rpm kernel-headers-2.6.18-128.el5.x86_64.rpm kernel-xen-2.6.18-128.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-128.el5.x86_64.rpm kernel-xen-devel-2.6.18-128.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5182 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJdidIXlSAg2UNWIIRAvOeAJ4thof68NeyZeV/g1VIJ+7Dcxo4zQCfXLZJ 4Qvvy7k7wDkU3g0nuPVW/Mo= =mJJC -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 22 11:21:16 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 22 Jan 2009 06:21:16 -0500 Subject: [RHSA-2009:0009-02] Important: kernel security and bug fix update Message-ID: <200901221121.n0MBLGgK024585@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2009:0009-02 Product: Red Hat Enterprise MRG for RHEL-5 Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0009.html Issue date: 2009-01-22 CVE Names: CVE-2008-0598 CVE-2008-3528 CVE-2008-3831 CVE-2008-4554 CVE-2008-4576 CVE-2008-4618 CVE-2008-5029 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise MRG 1.0. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: MRG Realtime for RHEL 5 Server - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages address the following security issues: * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and 64-bit emulation. This could allow a local, unprivileged user to prepare and run a specially-crafted binary which would use this deficiency to leak uninitialized and potentially sensitive data. (CVE-2008-0598, Important) * Olaf Kirch reported a flaw in the i915 kernel driver that only affects the Intel G33 series and newer. This flaw could, potentially, lead to local privilege escalation. (CVE-2008-3831, Important) * Miklos Szeredi reported a missing check for files opened with O_APPEND in sys_splice(). This could allow a local, unprivileged user to bypass the append-only file restrictions. (CVE-2008-4554, Important) * a deficiency was found in the Linux kernel Stream Control Transmission Protocol (SCTP) implementation. This could lead to a possible denial of service if one end of a SCTP connection did not support the AUTH extension. (CVE-2008-4576, Important) * Wei Yongjun reported a flaw in the Linux kernel SCTP implementation. In certain code paths, sctp_sf_violation_paramlen() could be called with a wrong parameter data type. This could lead to a possible denial of service. (CVE-2008-4618, Important) * when fput() was called to close a socket, the __scm_destroy() function in the Linux kernel could make indirect recursive calls to itself. This could, potentially, lead to a denial of service issue. (CVE-2008-5029, Important) * the ext2 and ext3 filesystem code failed to properly handle corrupted data structures, leading to a possible local denial of service issue when read or write operations were performed. (CVE-2008-3528, Low) These updated packages also address numerous bugs, including the following: * several System on Chip (SoC) audio drivers allocated memory in the platform device probe function but did not free this memory in the event of an error. Instead, the memory was freed in the device probe function's error path. This could result in a 'double free' error. With this update, errors cause memory to be freed correctly. * when a check was made to see if the netlink attribute fitted into available memory, the value returned, "remaining", could become negative due to alignment in nla_next(). GCC set "remaining" to unsigned when testing against the sizeof(*nla), however. As a consequence, the test would always succeed and the function nla_for_each_attr() could, potentially, access memory outside the received buffer. With this update, sizeof is cast to an integer, ensuring sizeof(*nla) does a signed test and prevents an illegal memory de-reference. * if a user-space process used a SIGIO notification and did not disable it before closing the file descriptor, a stale pointer was left in the async_queue of the real-time clock. When a different user-space process subsequently used a SIGIO notification, the kernel de-referenced this pointer and crashed. With this updated kernel, SIGIO notifications are disabled when the file descriptor is closed, preventing this. * the real-time kernel included with Red Hat Enterprise Linux MRG did not randomize exec, heap or libc addresses. This update corrects this omission: exec, heap and libc addresses are now randomized. Numerous other bug fixes included with this update are noted in the Red Hat Enterprise MRG 1.0 Real Time Security Update Release Note, available at the location noted in the References section below. All Red Hat Enterprise MRG users should install this update which addresses these vulnerabilities and fixes these bugs. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 433938 - CVE-2008-0598 kernel: linux x86_64 ia32 emulation leaks uninitialized data 455095 - event trace syscall on i386 has bogus parameters 459577 - CVE-2008-3528 Linux kernel ext[234] directory corruption denial of service 460102 - kernel: alsa: asoc: fix double free and memory leak in many codec drivers [mrg-1] 461330 - Update realtime kernel's lpfc version to 8.2.0.29 462281 - kernel: netlink: fix overrun in attribute iteration 464502 - CVE-2008-3831 kernel: i915 kernel drm driver arbitrary ioremap 465730 - CVE-2008-4618 kernel: sctp: Fix kernel panic while process protocol violation parameter 465744 - kernel: rtc: fix kernel panic on second use of SIGIO notification 465862 - Warning from rt_mutex code while testing infiniband 466079 - CVE-2008-4576 kernel: sctp: Fix oops when INIT-ACK indicates that peer doesn't support AUTH 466153 - [Broadcom 5.3 feat] Update bnx2 to version 1.7.4+ 466341 - RT kernel fails to boot on Intel Canelands processors (16 and 24 cores) 466554 - Update qla2xxx driver with RHEL5.3 + upstream fixes 466557 - Update the e1000e driver with RHEL5.3 and upstream fixes 466558 - Update the tg3 driver with RHEL5.3 and upstream fixes 466707 - CVE-2008-4554 kernel: don't allow splice() to files opened with O_APPEND 467739 - Add amd64_edac driver from IBM 467781 - MRG kernel has the e1000e bug 467783 - SAN Patchset needs merging into MRG 468205 - Turn off building of ocfs2 filesystem module in MRG RT kernel 469186 - [FOCUS] Lockdep fixes cause latency regression 470201 - CVE-2008-5029 kernel: Unix sockets kernel panic 6. Package List: MRG Realtime for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/kernel-rt-2.6.24.7-93.el5rt.src.rpm i386: kernel-rt-2.6.24.7-93.el5rt.i686.rpm kernel-rt-debug-2.6.24.7-93.el5rt.i686.rpm kernel-rt-debug-debuginfo-2.6.24.7-93.el5rt.i686.rpm kernel-rt-debug-devel-2.6.24.7-93.el5rt.i686.rpm kernel-rt-debuginfo-2.6.24.7-93.el5rt.i686.rpm kernel-rt-debuginfo-common-2.6.24.7-93.el5rt.i686.rpm kernel-rt-devel-2.6.24.7-93.el5rt.i686.rpm kernel-rt-trace-2.6.24.7-93.el5rt.i686.rpm kernel-rt-trace-debuginfo-2.6.24.7-93.el5rt.i686.rpm kernel-rt-trace-devel-2.6.24.7-93.el5rt.i686.rpm kernel-rt-vanilla-2.6.24.7-93.el5rt.i686.rpm kernel-rt-vanilla-debuginfo-2.6.24.7-93.el5rt.i686.rpm kernel-rt-vanilla-devel-2.6.24.7-93.el5rt.i686.rpm noarch: kernel-rt-doc-2.6.24.7-93.el5rt.noarch.rpm x86_64: kernel-rt-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-debug-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-debug-debuginfo-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-debug-devel-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-debuginfo-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-debuginfo-common-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-devel-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-trace-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-trace-debuginfo-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-trace-devel-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-vanilla-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-vanilla-debuginfo-2.6.24.7-93.el5rt.x86_64.rpm kernel-rt-vanilla-devel-2.6.24.7-93.el5rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3831 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4554 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4576 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4618 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029 http://www.redhat.com/security/updates/classification/#important http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJeFalXlSAg2UNWIIRAuBvAJ9qKI3i3PrKt0RBPUmaNQlzFCLIKwCgnAKj YtQrwhczrzLowEwS2cfdgn8= =THNU -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 29 09:49:53 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 29 Jan 2009 04:49:53 -0500 Subject: [RHSA-2009:0046-01] Moderate: ntp security update Message-ID: <200901290949.n0T9ns9C020711@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ntp security update Advisory ID: RHSA-2009:0046-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-0046.html Issue date: 2009-01-29 CVE Names: CVE-2009-0021 ===================================================================== 1. Summary: Updated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source. A flaw was discovered in the way the ntpd daemon checked the return value of the OpenSSL EVP_VerifyFinal function. On systems using NTPv4 authentication, this could lead to an incorrect verification of cryptographic signatures, allowing time-spoofing attacks. (CVE-2009-0021) Note: This issue only affects systems that have enabled NTP authentication. By default, NTP authentication is not enabled. All ntp users are advised to upgrade to the updated packages, which contain a backported patch to resolve this issue. After installing the update, the ntpd daemon will restart automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 476807 - CVE-2009-0021 ntp incorrectly checks for malformed signatures 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ntp-4.2.0.a.20040617-8.el4_7.1.src.rpm i386: ntp-4.2.0.a.20040617-8.el4_7.1.i386.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.i386.rpm ia64: ntp-4.2.0.a.20040617-8.el4_7.1.ia64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.ia64.rpm ppc: ntp-4.2.0.a.20040617-8.el4_7.1.ppc.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.ppc.rpm s390: ntp-4.2.0.a.20040617-8.el4_7.1.s390.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.s390.rpm s390x: ntp-4.2.0.a.20040617-8.el4_7.1.s390x.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.s390x.rpm x86_64: ntp-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ntp-4.2.0.a.20040617-8.el4_7.1.src.rpm i386: ntp-4.2.0.a.20040617-8.el4_7.1.i386.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.i386.rpm x86_64: ntp-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ntp-4.2.0.a.20040617-8.el4_7.1.src.rpm i386: ntp-4.2.0.a.20040617-8.el4_7.1.i386.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.i386.rpm ia64: ntp-4.2.0.a.20040617-8.el4_7.1.ia64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.ia64.rpm x86_64: ntp-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ntp-4.2.0.a.20040617-8.el4_7.1.src.rpm i386: ntp-4.2.0.a.20040617-8.el4_7.1.i386.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.i386.rpm ia64: ntp-4.2.0.a.20040617-8.el4_7.1.ia64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.ia64.rpm x86_64: ntp-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm ntp-debuginfo-4.2.0.a.20040617-8.el4_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/ntp-4.2.2p1-9.el5_3.1.src.rpm i386: ntp-4.2.2p1-9.el5_3.1.i386.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.i386.rpm x86_64: ntp-4.2.2p1-9.el5_3.1.x86_64.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/ntp-4.2.2p1-9.el5_3.1.src.rpm i386: ntp-4.2.2p1-9.el5_3.1.i386.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.i386.rpm ia64: ntp-4.2.2p1-9.el5_3.1.ia64.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.ia64.rpm ppc: ntp-4.2.2p1-9.el5_3.1.ppc.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.ppc.rpm s390x: ntp-4.2.2p1-9.el5_3.1.s390x.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.s390x.rpm x86_64: ntp-4.2.2p1-9.el5_3.1.x86_64.rpm ntp-debuginfo-4.2.2p1-9.el5_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFJgXumXlSAg2UNWIIRAtr1AJ94UAhnyto2JyiVTP/MVr2s8naqngCdEcid 2gortoMBGP2wrCbIv79epJY= =dCyt -----END PGP SIGNATURE-----