From bugzilla at redhat.com Mon Jun 1 08:25:52 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 1 Jun 2009 04:25:52 -0400 Subject: [RHSA-2009:1076-01] Low: Red Hat Enterprise Linux 2.1 - End Of Life Message-ID: <200906010825.n518PqTI000939@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise Linux 2.1 - End Of Life Advisory ID: RHSA-2009:1076-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1076.html Issue date: 2009-06-01 ===================================================================== 1. Summary: This is the End Of Life notification for Red Hat Enterprise Linux 2.1. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Description: In accordance with the Red Hat Enterprise Linux Errata Support Policy, the 7 year life-cycle of Red Hat Enterprise Linux 2.1 has ended. Red Hat has discontinued the technical support services, bug fix, enhancement, and security errata updates for the following versions: * Red Hat Enterprise Linux AS 2.1 * Red Hat Enterprise Linux ES 2.1 * Red Hat Enterprise Linux WS 2.1 * Red Hat Linux Advanced Server 2.1 * Red Hat Linux Advanced Workstation 2.1 Servers subscribed to Red Hat Enterprise Linux 2.1 channels on the Red Hat Network will become unsubscribed. As a benefit of the Red Hat subscription model, those subscriptions can be used to entitle any system on any currently supported release of Red Hat Enterprise Linux. Details of the Red Hat Enterprise Linux life-cycle for all releases can be found on the Red Hat website: http://www.redhat.com/security/updates/errata/ As part of the End Of Life process, the Red Hat Network will cease to carry the Red Hat Enterprise Linux 2.1 binaries. The source code and security advisories will continue to be available. 4. Solution: This errata contains an updated redhat-release package that provides a copy of this End Of Life notice in the "/usr/share/doc/" directory. 5. Bugs fixed (http://bugzilla.redhat.com/): 500331 - Send Out RHEL 2.1 final EOL Notice 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/redhat-release-as-2.1AS-125.src.rpm ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/redhat-release-as-2.1AS-25.src.rpm i386: redhat-release-as-2.1AS-25.i386.rpm ia64: redhat-release-as-2.1AS-125.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/redhat-release-aw-2.1AW-25.src.rpm ia64: redhat-release-aw-2.1AW-25.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/redhat-release-es-2.1ES-25.src.rpm i386: redhat-release-es-2.1ES-25.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/redhat-release-ws-2.1WS-25.src.rpm i386: redhat-release-ws-2.1WS-25.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://www.redhat.com/security/updates/classification/#low http://www.redhat.com/security/updates/errata/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKI5BuXlSAg2UNWIIRAumIAJ9EV609h5wYiE0q4RkA7frcud4FtwCeJIeE KPQMkVWiNqJ7QUTjYQabyUY= =PR81 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 2 16:50:47 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Jun 2009 12:50:47 -0400 Subject: [RHSA-2009:1077-01] Important: kernel security and bug fix update Message-ID: <200906021650.n52Gol2K028047@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2009:1077-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1077.html Issue date: 2009-06-02 CVE Names: CVE-2009-1336 CVE-2009-1337 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues and two bugs are now available for Red Hat Enterprise Linux 4.7 Extended Update Support. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4.7.z - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 4.7.z - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update includes backported fixes for two approved security issues. These issues only affected users of Red Hat Enterprise Linux 4.7 Extended Update Support, as they have already been addressed for users of Red Hat Enterprise Linux 4 in the 4.8 update, RHSA-2009:1024. * the exit_notify() function in the Linux kernel did not properly reset the exit signal if a process executed a set user ID (setuid) application before exiting. This could allow a local, unprivileged user to elevate their privileges. (CVE-2009-1337, Important) * the Linux kernel implementation of the Network File System (NFS) version 4 did not properly initialize the file name limit in the nfs_server data structure. This flaw could possibly lead to a denial of service on a client mounting an NFSv4 share. (CVE-2009-1336, Moderate) This update fixes the following bugs: * on IBM System z systems, if the cio driver was used for DASD devices, and the last path to a DASD device was varied off, it was still possible to attempt read and write operations to that device, resulting in errors. In this update, path verification is used in this situation, which resolves this issue. Also, a bug may have caused errors when subchannels were unregistered. (BZ#437486) * a bug prevented the Broadcom NetXtreme II 57710 network device from working correctly on some Dell PowerEdge R805 systems. This device was correctly shown in "lspci" output, but "ifup" failed and an IP address was not assigned. In this update, the device works correctly on Dell PowerEdge R805 systems. (BZ#491752) Users should upgrade to these updated packages, which contain backported patches to correct these issues. For this update to take effect, the system must be rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 491752 - For Broadcom(r) BMC57710, modprobe bnx2* fails citing memory allocation failures 493771 - CVE-2009-1337 kernel: exit_notify: kill the wrong capable(CAP_KILL) check 494074 - CVE-2009-1336 kernel: nfsv4 client can be crashed by stating a long filename 6. Package List: Red Hat Enterprise Linux AS version 4.7.z: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-78.0.24.EL.src.rpm i386: kernel-2.6.9-78.0.24.EL.i686.rpm kernel-debuginfo-2.6.9-78.0.24.EL.i686.rpm kernel-devel-2.6.9-78.0.24.EL.i686.rpm kernel-hugemem-2.6.9-78.0.24.EL.i686.rpm kernel-hugemem-devel-2.6.9-78.0.24.EL.i686.rpm kernel-smp-2.6.9-78.0.24.EL.i686.rpm kernel-smp-devel-2.6.9-78.0.24.EL.i686.rpm kernel-xenU-2.6.9-78.0.24.EL.i686.rpm kernel-xenU-devel-2.6.9-78.0.24.EL.i686.rpm ia64: kernel-2.6.9-78.0.24.EL.ia64.rpm kernel-debuginfo-2.6.9-78.0.24.EL.ia64.rpm kernel-devel-2.6.9-78.0.24.EL.ia64.rpm kernel-largesmp-2.6.9-78.0.24.EL.ia64.rpm kernel-largesmp-devel-2.6.9-78.0.24.EL.ia64.rpm noarch: kernel-doc-2.6.9-78.0.24.EL.noarch.rpm ppc: kernel-2.6.9-78.0.24.EL.ppc64.rpm kernel-2.6.9-78.0.24.EL.ppc64iseries.rpm kernel-debuginfo-2.6.9-78.0.24.EL.ppc64.rpm kernel-debuginfo-2.6.9-78.0.24.EL.ppc64iseries.rpm kernel-devel-2.6.9-78.0.24.EL.ppc64.rpm kernel-devel-2.6.9-78.0.24.EL.ppc64iseries.rpm kernel-largesmp-2.6.9-78.0.24.EL.ppc64.rpm kernel-largesmp-devel-2.6.9-78.0.24.EL.ppc64.rpm s390: kernel-2.6.9-78.0.24.EL.s390.rpm kernel-debuginfo-2.6.9-78.0.24.EL.s390.rpm kernel-devel-2.6.9-78.0.24.EL.s390.rpm s390x: kernel-2.6.9-78.0.24.EL.s390x.rpm kernel-debuginfo-2.6.9-78.0.24.EL.s390x.rpm kernel-devel-2.6.9-78.0.24.EL.s390x.rpm x86_64: kernel-2.6.9-78.0.24.EL.x86_64.rpm kernel-debuginfo-2.6.9-78.0.24.EL.x86_64.rpm kernel-devel-2.6.9-78.0.24.EL.x86_64.rpm kernel-largesmp-2.6.9-78.0.24.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-78.0.24.EL.x86_64.rpm kernel-smp-2.6.9-78.0.24.EL.x86_64.rpm kernel-smp-devel-2.6.9-78.0.24.EL.x86_64.rpm kernel-xenU-2.6.9-78.0.24.EL.x86_64.rpm kernel-xenU-devel-2.6.9-78.0.24.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4.7.z: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-78.0.24.EL.src.rpm i386: kernel-2.6.9-78.0.24.EL.i686.rpm kernel-debuginfo-2.6.9-78.0.24.EL.i686.rpm kernel-devel-2.6.9-78.0.24.EL.i686.rpm kernel-hugemem-2.6.9-78.0.24.EL.i686.rpm kernel-hugemem-devel-2.6.9-78.0.24.EL.i686.rpm kernel-smp-2.6.9-78.0.24.EL.i686.rpm kernel-smp-devel-2.6.9-78.0.24.EL.i686.rpm kernel-xenU-2.6.9-78.0.24.EL.i686.rpm kernel-xenU-devel-2.6.9-78.0.24.EL.i686.rpm ia64: kernel-2.6.9-78.0.24.EL.ia64.rpm kernel-debuginfo-2.6.9-78.0.24.EL.ia64.rpm kernel-devel-2.6.9-78.0.24.EL.ia64.rpm kernel-largesmp-2.6.9-78.0.24.EL.ia64.rpm kernel-largesmp-devel-2.6.9-78.0.24.EL.ia64.rpm noarch: kernel-doc-2.6.9-78.0.24.EL.noarch.rpm x86_64: kernel-2.6.9-78.0.24.EL.x86_64.rpm kernel-debuginfo-2.6.9-78.0.24.EL.x86_64.rpm kernel-devel-2.6.9-78.0.24.EL.x86_64.rpm kernel-largesmp-2.6.9-78.0.24.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-78.0.24.EL.x86_64.rpm kernel-smp-2.6.9-78.0.24.EL.x86_64.rpm kernel-smp-devel-2.6.9-78.0.24.EL.x86_64.rpm kernel-xenU-2.6.9-78.0.24.EL.x86_64.rpm kernel-xenU-devel-2.6.9-78.0.24.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1336 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKJVf9XlSAg2UNWIIRAoqQAKCdA9VS09hy4LZ7CQNdIgBaaW+lRQCeM9K5 JRMPsFzX6I1Y4v52XvvkTaw= =clEY -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 3 16:01:14 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 3 Jun 2009 12:01:14 -0400 Subject: [RHSA-2009:1081-01] Important: kernel-rt security and bug fix update Message-ID: <200906031601.n53G1EB9011182@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2009:1081-01 Product: Red Hat Enterprise MRG for RHEL-5 Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1081.html Issue date: 2009-06-03 CVE Names: CVE-2009-1072 CVE-2009-1192 CVE-2009-1338 CVE-2009-1439 ===================================================================== 1. Summary: Updated kernel-rt packages that fix several security issues and various bugs are now available for Red Hat Enterprise MRG 1.1.3. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: MRG Realtime for RHEL 5 Server - i386, noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * a buffer overflow flaw was found in the CIFSTCon() function of the Linux kernel Common Internet File System (CIFS) implementation. When mounting a CIFS share, a malicious server could send an overly-long string to the client, possibly leading to a denial of service or privilege escalation on the client mounting the CIFS share. (CVE-2009-1439, Important) * the Linux kernel Network File System daemon (nfsd) implementation did not drop the CAP_MKNOD capability when handling requests from local, unprivileged users. This flaw could possibly lead to an information leak or privilege escalation. (CVE-2009-1072, Moderate) * a deficiency was found in the Linux kernel signals implementation. The kill_something_info() function did not check if a process was outside the caller's namespace before sending the kill signal, making it possible to kill processes in all process ID (PID) namespaces, breaking PID namespace isolation. (CVE-2009-1338, Moderate) * a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and agp_generic_alloc_pages() functions did not zero out the memory pages they allocate, which may later be available to user-space processes. This flaw could possibly lead to an information leak. (CVE-2009-1192, Low) These updated packages also fix the following bugs: * the "-fwrapv" flag was added to the gcc build options to prevent gcc from optimizing away wrapping arithmetic, as optimizing away wrapping may lead to unexpected results. (BZ#491264) * the bnx2x driver may have failed when highly-stressed by network stress-tests, resulting in network access being unavailable. This driver has been updated to resolve this issue. (BZ#495472) * the file system mask, which lists capabilities for users with a file system user ID (fsuid) of 0, was missing the CAP_MKNOD and CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with an fsuid other than 0 to perform actions on some file system types that would otherwise be prevented. This update adds these capabilities. (BZ#497047) * "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes able to use the ptrace() call on a given process; however, certain information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used to reconstruct memory maps, making it possible to bypass the Address Space Layout Randomization (ASLR) security feature. This update addresses this issue. (BZ#499550) * the get_random_int() function returned the same number until the jiffies counter (which ticks at a clock interrupt frequency) or process ID (PID) changed, making it possible to predict the random numbers. This may have helped to bypass the ASLR security feature. With this update, get_random_int() is more random and no longer uses a common seed value. This reduces the possibility of predicting the values get_random_int() returns. (BZ#499787) All Red Hat Enterprise MRG users should upgrade to these updated packages, which contain backported patches to resolve these issues. Note: The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 491264 - kernel-rt should be built with -fwrapv [mrg-1] 491572 - CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root 494275 - CVE-2009-1439 kernel: cifs: memory overwrite when saving nativeFileSystem field during mount 495472 - [Broadcom10gb] daEth stress breaks bnx2x driver in MRG1.1 496031 - CVE-2009-1338 kernel: 'kill sig -1' must only apply to caller's pid namespace 497020 - CVE-2009-1192 kernel: agp: zero pages before sending to userspace 497047 - kernel: add some long-missing capabilities to fs_mask 499550 - kernel: proc: avoid information leaks to non-privileged processes [mrg-1] 499787 - kernel: random: make get_random_int() more random [mrg-1] 6. Package List: MRG Realtime for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/kernel-rt-2.6.24.7-117.el5rt.src.rpm i386: kernel-rt-2.6.24.7-117.el5rt.i686.rpm kernel-rt-debug-2.6.24.7-117.el5rt.i686.rpm kernel-rt-debug-debuginfo-2.6.24.7-117.el5rt.i686.rpm kernel-rt-debug-devel-2.6.24.7-117.el5rt.i686.rpm kernel-rt-debuginfo-2.6.24.7-117.el5rt.i686.rpm kernel-rt-debuginfo-common-2.6.24.7-117.el5rt.i686.rpm kernel-rt-devel-2.6.24.7-117.el5rt.i686.rpm kernel-rt-trace-2.6.24.7-117.el5rt.i686.rpm kernel-rt-trace-debuginfo-2.6.24.7-117.el5rt.i686.rpm kernel-rt-trace-devel-2.6.24.7-117.el5rt.i686.rpm kernel-rt-vanilla-2.6.24.7-117.el5rt.i686.rpm kernel-rt-vanilla-debuginfo-2.6.24.7-117.el5rt.i686.rpm kernel-rt-vanilla-devel-2.6.24.7-117.el5rt.i686.rpm noarch: kernel-rt-doc-2.6.24.7-117.el5rt.noarch.rpm x86_64: kernel-rt-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-debug-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-debug-debuginfo-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-debug-devel-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-debuginfo-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-debuginfo-common-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-devel-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-trace-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-trace-debuginfo-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-trace-devel-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-vanilla-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-vanilla-debuginfo-2.6.24.7-117.el5rt.x86_64.rpm kernel-rt-vanilla-devel-2.6.24.7-117.el5rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1338 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKJp07XlSAg2UNWIIRAll6AKCbfB6SuiR5x0MLd5azamdiOoZvggCdFjZq xKDYRt3qEqkALt29cyVa3KE= =OhiE -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 3 16:02:28 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 3 Jun 2009 12:02:28 -0400 Subject: [RHSA-2009:1082-01] Important: cups security update Message-ID: <200906031602.n53G2S2r012454@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: cups security update Advisory ID: RHSA-2009:1082-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1082.html Issue date: 2009-06-03 CVE Names: CVE-2009-0949 ===================================================================== 1. Summary: Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The Common UNIX? Printing System (CUPS) provides a portable printing layer for UNIX operating systems. The Internet Printing Protocol (IPP) allows users to print and manage printing-related tasks over a network. A NULL pointer dereference flaw was found in the CUPS IPP routine, used for processing incoming IPP requests for the CUPS scheduler. An attacker could use this flaw to send specially-crafted IPP requests that would crash the cupsd daemon. (CVE-2009-0949) Red Hat would like to thank Anibal Sacco from Core Security Technologies for reporting this issue. Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the cupsd daemon will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 500972 - CVE-2009-0949 cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.3.7-8.el5_3.6.src.rpm i386: cups-1.3.7-8.el5_3.6.i386.rpm cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-libs-1.3.7-8.el5_3.6.i386.rpm cups-lpd-1.3.7-8.el5_3.6.i386.rpm x86_64: cups-1.3.7-8.el5_3.6.x86_64.rpm cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-debuginfo-1.3.7-8.el5_3.6.x86_64.rpm cups-libs-1.3.7-8.el5_3.6.i386.rpm cups-libs-1.3.7-8.el5_3.6.x86_64.rpm cups-lpd-1.3.7-8.el5_3.6.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.3.7-8.el5_3.6.src.rpm i386: cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-devel-1.3.7-8.el5_3.6.i386.rpm x86_64: cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-debuginfo-1.3.7-8.el5_3.6.x86_64.rpm cups-devel-1.3.7-8.el5_3.6.i386.rpm cups-devel-1.3.7-8.el5_3.6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cups-1.3.7-8.el5_3.6.src.rpm i386: cups-1.3.7-8.el5_3.6.i386.rpm cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-devel-1.3.7-8.el5_3.6.i386.rpm cups-libs-1.3.7-8.el5_3.6.i386.rpm cups-lpd-1.3.7-8.el5_3.6.i386.rpm ia64: cups-1.3.7-8.el5_3.6.ia64.rpm cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-debuginfo-1.3.7-8.el5_3.6.ia64.rpm cups-devel-1.3.7-8.el5_3.6.ia64.rpm cups-libs-1.3.7-8.el5_3.6.i386.rpm cups-libs-1.3.7-8.el5_3.6.ia64.rpm cups-lpd-1.3.7-8.el5_3.6.ia64.rpm ppc: cups-1.3.7-8.el5_3.6.ppc.rpm cups-debuginfo-1.3.7-8.el5_3.6.ppc.rpm cups-debuginfo-1.3.7-8.el5_3.6.ppc64.rpm cups-devel-1.3.7-8.el5_3.6.ppc.rpm cups-devel-1.3.7-8.el5_3.6.ppc64.rpm cups-libs-1.3.7-8.el5_3.6.ppc.rpm cups-libs-1.3.7-8.el5_3.6.ppc64.rpm cups-lpd-1.3.7-8.el5_3.6.ppc.rpm s390x: cups-1.3.7-8.el5_3.6.s390x.rpm cups-debuginfo-1.3.7-8.el5_3.6.s390.rpm cups-debuginfo-1.3.7-8.el5_3.6.s390x.rpm cups-devel-1.3.7-8.el5_3.6.s390.rpm cups-devel-1.3.7-8.el5_3.6.s390x.rpm cups-libs-1.3.7-8.el5_3.6.s390.rpm cups-libs-1.3.7-8.el5_3.6.s390x.rpm cups-lpd-1.3.7-8.el5_3.6.s390x.rpm x86_64: cups-1.3.7-8.el5_3.6.x86_64.rpm cups-debuginfo-1.3.7-8.el5_3.6.i386.rpm cups-debuginfo-1.3.7-8.el5_3.6.x86_64.rpm cups-devel-1.3.7-8.el5_3.6.i386.rpm cups-devel-1.3.7-8.el5_3.6.x86_64.rpm cups-libs-1.3.7-8.el5_3.6.i386.rpm cups-libs-1.3.7-8.el5_3.6.x86_64.rpm cups-lpd-1.3.7-8.el5_3.6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKJp5PXlSAg2UNWIIRAtdcAJ9QO/S9addOirBzshz4y6YEcySEjQCgpPFL MD2YG7rHC3eoe+jMn38lOao= =OkCA -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 3 16:03:37 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 3 Jun 2009 12:03:37 -0400 Subject: [RHSA-2009:1083-01] Important: cups security update Message-ID: <200906031603.n53G3bBE013155@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: cups security update Advisory ID: RHSA-2009:1083-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1083.html Issue date: 2009-06-03 CVE Names: CVE-2009-0791 CVE-2009-0949 CVE-2009-1196 ===================================================================== 1. Summary: Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The Common UNIX? Printing System (CUPS) provides a portable printing layer for UNIX operating systems. The Internet Printing Protocol (IPP) allows users to print and manage printing-related tasks over a network. The CUPS "pdftops" filter converts Portable Document Format (PDF) files to PostScript. "pdftops" is based on Xpdf and the CUPS imaging library. A NULL pointer dereference flaw was found in the CUPS IPP routine, used for processing incoming IPP requests for the CUPS scheduler. An attacker could use this flaw to send specially-crafted IPP requests that would crash the cupsd daemon. (CVE-2009-0949) A use-after-free flaw was found in the CUPS scheduler directory services routine, used to process data about available printers and printer classes. An attacker could use this flaw to cause a denial of service (cupsd daemon stop or crash). (CVE-2009-1196) Multiple integer overflows flaws, leading to heap-based buffer overflows, were found in the CUPS "pdftops" filter. An attacker could create a malicious PDF file that would cause "pdftops" to crash or, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-0791) Red Hat would like to thank Anibal Sacco from Core Security Technologies for reporting the CVE-2009-0949 flaw, and Swen van Brussel for reporting the CVE-2009-1196 flaw. Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cupsd daemon will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 491840 - CVE-2009-0791 cups: Multiple integer overflows in the CUPS "pdftops" filter 497135 - CVE-2009-1196 cups: DoS (stop, crash) by renewing CUPS browse packets 500972 - CVE-2009-0949 cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cups-1.1.17-13.3.62.src.rpm i386: cups-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-devel-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.i386.rpm ia64: cups-1.1.17-13.3.62.ia64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.ia64.rpm cups-devel-1.1.17-13.3.62.ia64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.ia64.rpm ppc: cups-1.1.17-13.3.62.ppc.rpm cups-debuginfo-1.1.17-13.3.62.ppc.rpm cups-debuginfo-1.1.17-13.3.62.ppc64.rpm cups-devel-1.1.17-13.3.62.ppc.rpm cups-libs-1.1.17-13.3.62.ppc.rpm cups-libs-1.1.17-13.3.62.ppc64.rpm s390: cups-1.1.17-13.3.62.s390.rpm cups-debuginfo-1.1.17-13.3.62.s390.rpm cups-devel-1.1.17-13.3.62.s390.rpm cups-libs-1.1.17-13.3.62.s390.rpm s390x: cups-1.1.17-13.3.62.s390x.rpm cups-debuginfo-1.1.17-13.3.62.s390.rpm cups-debuginfo-1.1.17-13.3.62.s390x.rpm cups-devel-1.1.17-13.3.62.s390x.rpm cups-libs-1.1.17-13.3.62.s390.rpm cups-libs-1.1.17-13.3.62.s390x.rpm x86_64: cups-1.1.17-13.3.62.x86_64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.x86_64.rpm cups-devel-1.1.17-13.3.62.x86_64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/cups-1.1.17-13.3.62.src.rpm i386: cups-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-devel-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.i386.rpm x86_64: cups-1.1.17-13.3.62.x86_64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.x86_64.rpm cups-devel-1.1.17-13.3.62.x86_64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cups-1.1.17-13.3.62.src.rpm i386: cups-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-devel-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.i386.rpm ia64: cups-1.1.17-13.3.62.ia64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.ia64.rpm cups-devel-1.1.17-13.3.62.ia64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.ia64.rpm x86_64: cups-1.1.17-13.3.62.x86_64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.x86_64.rpm cups-devel-1.1.17-13.3.62.x86_64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cups-1.1.17-13.3.62.src.rpm i386: cups-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-devel-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.i386.rpm ia64: cups-1.1.17-13.3.62.ia64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.ia64.rpm cups-devel-1.1.17-13.3.62.ia64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.ia64.rpm x86_64: cups-1.1.17-13.3.62.x86_64.rpm cups-debuginfo-1.1.17-13.3.62.i386.rpm cups-debuginfo-1.1.17-13.3.62.x86_64.rpm cups-devel-1.1.17-13.3.62.x86_64.rpm cups-libs-1.1.17-13.3.62.i386.rpm cups-libs-1.1.17-13.3.62.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cups-1.1.22-0.rc1.9.32.el4_8.3.src.rpm i386: cups-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm ia64: cups-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm ppc: cups-1.1.22-0.rc1.9.32.el4_8.3.ppc.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.ppc.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.ppc64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.ppc.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.ppc.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.ppc64.rpm s390: cups-1.1.22-0.rc1.9.32.el4_8.3.s390.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.s390.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.s390.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.s390.rpm s390x: cups-1.1.22-0.rc1.9.32.el4_8.3.s390x.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.s390.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.s390x.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.s390x.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.s390.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.s390x.rpm x86_64: cups-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cups-1.1.22-0.rc1.9.32.el4_8.3.src.rpm i386: cups-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm x86_64: cups-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cups-1.1.22-0.rc1.9.32.el4_8.3.src.rpm i386: cups-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm ia64: cups-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm x86_64: cups-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cups-1.1.22-0.rc1.9.32.el4_8.3.src.rpm i386: cups-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm ia64: cups-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.ia64.rpm x86_64: cups-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-debuginfo-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-devel-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.i386.rpm cups-libs-1.1.22-0.rc1.9.32.el4_8.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1196 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKJp6ZXlSAg2UNWIIRAlzIAJ9F8fzq1q9WNhPtjlXgh67L9kYAdQCggtJb 6XEOZHSLXuX8BlfypjYoddc= =BA5Y -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 9 14:46:27 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Jun 2009 10:46:27 -0400 Subject: [RHSA-2009:1087-01] Important: mod_jk security update Message-ID: <200906091446.n59EkRxp032358@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mod_jk security update Advisory ID: RHSA-2009:1087-01 Product: Red Hat Application Server Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1087.html Issue date: 2009-06-09 CVE Names: CVE-2008-5519 ===================================================================== 1. Summary: Updated mod_jk packages that fix one security issue are now available for Red Hat Application Server v2. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Application Server v2 4AS - i386, ia64, ppc, x86_64 Red Hat Application Server v2 4ES - i386, ia64, x86_64 Red Hat Application Server v2 4WS - i386, ia64, x86_64 3. Description: mod_jk is an Apache Tomcat connector that allows Apache Tomcat and the Apache HTTP Server to communicate with each other. An information disclosure flaw was found in mod_jk. In certain situations, if a faulty client set the "Content-Length" header without providing data, or if a user sent repeated requests very quickly, one user may view a response intended for another user. (CVE-2008-5519) All mod_jk users are advised to upgrade to these updated packages. They provide mod_jk 1.2.28, which is not vulnerable to this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 490201 - CVE-2008-5519 mod_jk: session information leak 6. Package List: Red Hat Application Server v2 4AS: Source: ftp://updates.redhat.com/enterprise/4AS/en/RHAPS/SRPMS/mod_jk-1.2.28-1jpp_3rh.src.rpm i386: mod_jk-ap20-1.2.28-1jpp_3rh.i386.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.i386.rpm mod_jk-manual-1.2.28-1jpp_3rh.i386.rpm ia64: mod_jk-ap20-1.2.28-1jpp_3rh.ia64.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.ia64.rpm mod_jk-manual-1.2.28-1jpp_3rh.ia64.rpm ppc: mod_jk-ap20-1.2.28-1jpp_3rh.ppc.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.ppc.rpm mod_jk-manual-1.2.28-1jpp_3rh.ppc.rpm x86_64: mod_jk-ap20-1.2.28-1jpp_3rh.x86_64.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.x86_64.rpm mod_jk-manual-1.2.28-1jpp_3rh.x86_64.rpm Red Hat Application Server v2 4ES: Source: ftp://updates.redhat.com/enterprise/4ES/en/RHAPS/SRPMS/mod_jk-1.2.28-1jpp_3rh.src.rpm i386: mod_jk-ap20-1.2.28-1jpp_3rh.i386.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.i386.rpm mod_jk-manual-1.2.28-1jpp_3rh.i386.rpm ia64: mod_jk-ap20-1.2.28-1jpp_3rh.ia64.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.ia64.rpm mod_jk-manual-1.2.28-1jpp_3rh.ia64.rpm x86_64: mod_jk-ap20-1.2.28-1jpp_3rh.x86_64.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.x86_64.rpm mod_jk-manual-1.2.28-1jpp_3rh.x86_64.rpm Red Hat Application Server v2 4WS: Source: ftp://updates.redhat.com/enterprise/4WS/en/RHAPS/SRPMS/mod_jk-1.2.28-1jpp_3rh.src.rpm i386: mod_jk-ap20-1.2.28-1jpp_3rh.i386.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.i386.rpm mod_jk-manual-1.2.28-1jpp_3rh.i386.rpm ia64: mod_jk-ap20-1.2.28-1jpp_3rh.ia64.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.ia64.rpm mod_jk-manual-1.2.28-1jpp_3rh.ia64.rpm x86_64: mod_jk-ap20-1.2.28-1jpp_3rh.x86_64.rpm mod_jk-debuginfo-1.2.28-1jpp_3rh.x86_64.rpm mod_jk-manual-1.2.28-1jpp_3rh.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKLnVlXlSAg2UNWIIRAlgMAJ9WQyTF5Gf7BRDQkZwR7CBj0uPU0wCeKHvm hA3HxFjrL4/7mOyst8XZIzg= =hJi+ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 11 23:22:12 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 11 Jun 2009 19:22:12 -0400 Subject: [RHSA-2009:1095-01] Critical: firefox security update Message-ID: <200906112322.n5BNMCfN003578@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2009:1095-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1095.html Issue date: 2009-06-11 CVE Names: CVE-2009-1392 CVE-2009-1832 CVE-2009-1833 CVE-2009-1834 CVE-2009-1835 CVE-2009-1836 CVE-2009-1837 CVE-2009-1838 CVE-2009-1839 CVE-2009-1840 CVE-2009-1841 ===================================================================== 1. Summary: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1837, CVE-2009-1838, CVE-2009-1841) Multiple flaws were found in the processing of malformed, local file content. If a user loaded malicious, local content via the file:// URL, it was possible for that content to access other local data. (CVE-2009-1835, CVE-2009-1839) A script, privilege elevation flaw was found in the way Firefox loaded XML User Interface Language (XUL) scripts. Firefox and certain add-ons could load malicious content when certain policy checks did not happen. (CVE-2009-1840) A flaw was found in the way Firefox displayed certain Unicode characters in International Domain Names (IDN). If an IDN contained invalid characters, they may have been displayed as spaces, making it appear to the user that they were visiting a trusted site. (CVE-2009-1834) A flaw was found in the way Firefox handled error responses returned from proxy servers. If an attacker is able to conduct a man-in-the-middle attack against a Firefox instance that is using a proxy server, they may be able to steal sensitive information from the site the user is visiting. (CVE-2009-1836) For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.0.11. You can find a link to the Mozilla advisories in the References section of this errata. All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.11, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 488570 - frequent firefox crashes against clearspace 503568 - CVE-2009-1392 Firefox browser engine crashes 503569 - CVE-2009-1832 Firefox double frame construction flaw 503570 - CVE-2009-1833 Firefox JavaScript engine crashes 503573 - CVE-2009-1834 Firefox URL spoofing with invalid unicode characters 503576 - CVE-2009-1835 Firefox Arbitrary domain cookie access by local file: resources 503578 - CVE-2009-1836 Firefox SSL tampering via non-200 responses to proxy CONNECT requests 503579 - CVE-2009-1837 Firefox Race condition while accessing the private data of a NPObject JS wrapper class object 503580 - CVE-2009-1838 Firefox arbitrary code execution flaw 503581 - CVE-2009-1839 Firefox information disclosure flaw 503582 - CVE-2009-1840 Firefox XUL scripts skip some security checks 503583 - CVE-2009-1841 Firefox JavaScript arbitrary code execution 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-3.0.11-4.el4.src.rpm i386: firefox-3.0.11-4.el4.i386.rpm firefox-debuginfo-3.0.11-4.el4.i386.rpm ia64: firefox-3.0.11-4.el4.ia64.rpm firefox-debuginfo-3.0.11-4.el4.ia64.rpm ppc: firefox-3.0.11-4.el4.ppc.rpm firefox-debuginfo-3.0.11-4.el4.ppc.rpm s390: firefox-3.0.11-4.el4.s390.rpm firefox-debuginfo-3.0.11-4.el4.s390.rpm s390x: firefox-3.0.11-4.el4.s390x.rpm firefox-debuginfo-3.0.11-4.el4.s390x.rpm x86_64: firefox-3.0.11-4.el4.x86_64.rpm firefox-debuginfo-3.0.11-4.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-3.0.11-4.el4.src.rpm i386: firefox-3.0.11-4.el4.i386.rpm firefox-debuginfo-3.0.11-4.el4.i386.rpm x86_64: firefox-3.0.11-4.el4.x86_64.rpm firefox-debuginfo-3.0.11-4.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-3.0.11-4.el4.src.rpm i386: firefox-3.0.11-4.el4.i386.rpm firefox-debuginfo-3.0.11-4.el4.i386.rpm ia64: firefox-3.0.11-4.el4.ia64.rpm firefox-debuginfo-3.0.11-4.el4.ia64.rpm x86_64: firefox-3.0.11-4.el4.x86_64.rpm firefox-debuginfo-3.0.11-4.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-3.0.11-4.el4.src.rpm i386: firefox-3.0.11-4.el4.i386.rpm firefox-debuginfo-3.0.11-4.el4.i386.rpm ia64: firefox-3.0.11-4.el4.ia64.rpm firefox-debuginfo-3.0.11-4.el4.ia64.rpm x86_64: firefox-3.0.11-4.el4.x86_64.rpm firefox-debuginfo-3.0.11-4.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-3.0.11-2.el5_3.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.0.11-3.el5_3.src.rpm i386: firefox-3.0.11-2.el5_3.i386.rpm firefox-debuginfo-3.0.11-2.el5_3.i386.rpm xulrunner-1.9.0.11-3.el5_3.i386.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.i386.rpm x86_64: firefox-3.0.11-2.el5_3.i386.rpm firefox-3.0.11-2.el5_3.x86_64.rpm firefox-debuginfo-3.0.11-2.el5_3.i386.rpm firefox-debuginfo-3.0.11-2.el5_3.x86_64.rpm xulrunner-1.9.0.11-3.el5_3.i386.rpm xulrunner-1.9.0.11-3.el5_3.x86_64.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.i386.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.0.11-3.el5_3.src.rpm i386: xulrunner-debuginfo-1.9.0.11-3.el5_3.i386.rpm xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.i386.rpm x86_64: xulrunner-debuginfo-1.9.0.11-3.el5_3.i386.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.x86_64.rpm xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm xulrunner-devel-1.9.0.11-3.el5_3.x86_64.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-3.0.11-2.el5_3.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-1.9.0.11-3.el5_3.src.rpm i386: firefox-3.0.11-2.el5_3.i386.rpm firefox-debuginfo-3.0.11-2.el5_3.i386.rpm xulrunner-1.9.0.11-3.el5_3.i386.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.i386.rpm xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.i386.rpm ia64: firefox-3.0.11-2.el5_3.ia64.rpm firefox-debuginfo-3.0.11-2.el5_3.ia64.rpm xulrunner-1.9.0.11-3.el5_3.ia64.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.ia64.rpm xulrunner-devel-1.9.0.11-3.el5_3.ia64.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.ia64.rpm ppc: firefox-3.0.11-2.el5_3.ppc.rpm firefox-debuginfo-3.0.11-2.el5_3.ppc.rpm xulrunner-1.9.0.11-3.el5_3.ppc.rpm xulrunner-1.9.0.11-3.el5_3.ppc64.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.ppc.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.ppc64.rpm xulrunner-devel-1.9.0.11-3.el5_3.ppc.rpm xulrunner-devel-1.9.0.11-3.el5_3.ppc64.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.ppc.rpm s390x: firefox-3.0.11-2.el5_3.s390.rpm firefox-3.0.11-2.el5_3.s390x.rpm firefox-debuginfo-3.0.11-2.el5_3.s390.rpm firefox-debuginfo-3.0.11-2.el5_3.s390x.rpm xulrunner-1.9.0.11-3.el5_3.s390.rpm xulrunner-1.9.0.11-3.el5_3.s390x.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.s390.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.s390x.rpm xulrunner-devel-1.9.0.11-3.el5_3.s390.rpm xulrunner-devel-1.9.0.11-3.el5_3.s390x.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.s390x.rpm x86_64: firefox-3.0.11-2.el5_3.i386.rpm firefox-3.0.11-2.el5_3.x86_64.rpm firefox-debuginfo-3.0.11-2.el5_3.i386.rpm firefox-debuginfo-3.0.11-2.el5_3.x86_64.rpm xulrunner-1.9.0.11-3.el5_3.i386.rpm xulrunner-1.9.0.11-3.el5_3.x86_64.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.i386.rpm xulrunner-debuginfo-1.9.0.11-3.el5_3.x86_64.rpm xulrunner-devel-1.9.0.11-3.el5_3.i386.rpm xulrunner-devel-1.9.0.11-3.el5_3.x86_64.rpm xulrunner-devel-unstable-1.9.0.11-3.el5_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1832 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1834 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1837 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1839 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1840 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841 http://www.redhat.com/security/updates/classification/#critical http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.11 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKMZF3XlSAg2UNWIIRAtZPAKC5iTzwG8fYp2bKjsRkysD79+Vn8ACglygg TSke2ogwC/K+NaWbbb28uHA= =o7q4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 11 23:22:58 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 11 Jun 2009 19:22:58 -0400 Subject: [RHSA-2009:1096-01] Critical: seamonkey security update Message-ID: <200906112322.n5BNMwu1003953@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2009:1096-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1096.html Issue date: 2009-06-11 CVE Names: CVE-2009-1392 CVE-2009-1833 CVE-2009-1835 CVE-2009-1838 CVE-2009-1841 ===================================================================== 1. Summary: Updated seamonkey packages that fix several security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: SeaMonkey is an open source Web browser, email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey. (CVE-2009-1392, CVE-2009-1833, CVE-2009-1838, CVE-2009-1841) A flaw was found in the processing of malformed, local file content. If a user loaded malicious, local content via the file:// URL, it was possible for that content to access other local data. (CVE-2009-1835) All SeaMonkey users should upgrade to these updated packages, which correct these issues. After installing the update, SeaMonkey must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 503568 - CVE-2009-1392 Firefox browser engine crashes 503570 - CVE-2009-1833 Firefox JavaScript engine crashes 503576 - CVE-2009-1835 Firefox Arbitrary domain cookie access by local file: resources 503580 - CVE-2009-1838 Firefox arbitrary code execution flaw 503583 - CVE-2009-1841 Firefox JavaScript arbitrary code execution 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.9-0.38.el3.src.rpm i386: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-chat-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-devel-1.0.9-0.38.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.38.el3.i386.rpm seamonkey-mail-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.38.el3.i386.rpm ia64: seamonkey-1.0.9-0.38.el3.ia64.rpm seamonkey-chat-1.0.9-0.38.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.ia64.rpm seamonkey-devel-1.0.9-0.38.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.ia64.rpm seamonkey-mail-1.0.9-0.38.el3.ia64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.ia64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.ia64.rpm ppc: seamonkey-1.0.9-0.38.el3.ppc.rpm seamonkey-chat-1.0.9-0.38.el3.ppc.rpm seamonkey-debuginfo-1.0.9-0.38.el3.ppc.rpm seamonkey-devel-1.0.9-0.38.el3.ppc.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.ppc.rpm seamonkey-js-debugger-1.0.9-0.38.el3.ppc.rpm seamonkey-mail-1.0.9-0.38.el3.ppc.rpm seamonkey-nspr-1.0.9-0.38.el3.ppc.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.ppc.rpm seamonkey-nss-1.0.9-0.38.el3.ppc.rpm seamonkey-nss-devel-1.0.9-0.38.el3.ppc.rpm s390: seamonkey-1.0.9-0.38.el3.s390.rpm seamonkey-chat-1.0.9-0.38.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.38.el3.s390.rpm seamonkey-devel-1.0.9-0.38.el3.s390.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.s390.rpm seamonkey-js-debugger-1.0.9-0.38.el3.s390.rpm seamonkey-mail-1.0.9-0.38.el3.s390.rpm seamonkey-nspr-1.0.9-0.38.el3.s390.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.s390.rpm seamonkey-nss-1.0.9-0.38.el3.s390.rpm seamonkey-nss-devel-1.0.9-0.38.el3.s390.rpm s390x: seamonkey-1.0.9-0.38.el3.s390x.rpm seamonkey-chat-1.0.9-0.38.el3.s390x.rpm seamonkey-debuginfo-1.0.9-0.38.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.38.el3.s390x.rpm seamonkey-devel-1.0.9-0.38.el3.s390x.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.s390x.rpm seamonkey-js-debugger-1.0.9-0.38.el3.s390x.rpm seamonkey-mail-1.0.9-0.38.el3.s390x.rpm seamonkey-nspr-1.0.9-0.38.el3.s390.rpm seamonkey-nspr-1.0.9-0.38.el3.s390x.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.s390x.rpm seamonkey-nss-1.0.9-0.38.el3.s390.rpm seamonkey-nss-1.0.9-0.38.el3.s390x.rpm seamonkey-nss-devel-1.0.9-0.38.el3.s390x.rpm x86_64: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-1.0.9-0.38.el3.x86_64.rpm seamonkey-chat-1.0.9-0.38.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.x86_64.rpm seamonkey-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.x86_64.rpm seamonkey-mail-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.9-0.38.el3.src.rpm i386: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-chat-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-devel-1.0.9-0.38.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.38.el3.i386.rpm seamonkey-mail-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.38.el3.i386.rpm x86_64: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-1.0.9-0.38.el3.x86_64.rpm seamonkey-chat-1.0.9-0.38.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.x86_64.rpm seamonkey-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.x86_64.rpm seamonkey-mail-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.9-0.38.el3.src.rpm i386: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-chat-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-devel-1.0.9-0.38.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.38.el3.i386.rpm seamonkey-mail-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.38.el3.i386.rpm ia64: seamonkey-1.0.9-0.38.el3.ia64.rpm seamonkey-chat-1.0.9-0.38.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.ia64.rpm seamonkey-devel-1.0.9-0.38.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.ia64.rpm seamonkey-mail-1.0.9-0.38.el3.ia64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.ia64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-1.0.9-0.38.el3.x86_64.rpm seamonkey-chat-1.0.9-0.38.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.x86_64.rpm seamonkey-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.x86_64.rpm seamonkey-mail-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.9-0.38.el3.src.rpm i386: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-chat-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-devel-1.0.9-0.38.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.38.el3.i386.rpm seamonkey-mail-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.38.el3.i386.rpm ia64: seamonkey-1.0.9-0.38.el3.ia64.rpm seamonkey-chat-1.0.9-0.38.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.ia64.rpm seamonkey-devel-1.0.9-0.38.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.ia64.rpm seamonkey-mail-1.0.9-0.38.el3.ia64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.ia64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.38.el3.i386.rpm seamonkey-1.0.9-0.38.el3.x86_64.rpm seamonkey-chat-1.0.9-0.38.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.38.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.38.el3.x86_64.rpm seamonkey-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.38.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.38.el3.x86_64.rpm seamonkey-mail-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.38.el3.i386.rpm seamonkey-nspr-1.0.9-0.38.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-1.0.9-0.38.el3.i386.rpm seamonkey-nss-1.0.9-0.38.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.38.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.9-43.el4_8.src.rpm i386: seamonkey-1.0.9-43.el4_8.i386.rpm seamonkey-chat-1.0.9-43.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-43.el4_8.i386.rpm seamonkey-devel-1.0.9-43.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-43.el4_8.i386.rpm seamonkey-mail-1.0.9-43.el4_8.i386.rpm ia64: seamonkey-1.0.9-43.el4_8.ia64.rpm seamonkey-chat-1.0.9-43.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.ia64.rpm seamonkey-devel-1.0.9-43.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.ia64.rpm seamonkey-mail-1.0.9-43.el4_8.ia64.rpm ppc: seamonkey-1.0.9-43.el4_8.ppc.rpm seamonkey-chat-1.0.9-43.el4_8.ppc.rpm seamonkey-debuginfo-1.0.9-43.el4_8.ppc.rpm seamonkey-devel-1.0.9-43.el4_8.ppc.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.ppc.rpm seamonkey-js-debugger-1.0.9-43.el4_8.ppc.rpm seamonkey-mail-1.0.9-43.el4_8.ppc.rpm s390: seamonkey-1.0.9-43.el4_8.s390.rpm seamonkey-chat-1.0.9-43.el4_8.s390.rpm seamonkey-debuginfo-1.0.9-43.el4_8.s390.rpm seamonkey-devel-1.0.9-43.el4_8.s390.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.s390.rpm seamonkey-js-debugger-1.0.9-43.el4_8.s390.rpm seamonkey-mail-1.0.9-43.el4_8.s390.rpm s390x: seamonkey-1.0.9-43.el4_8.s390x.rpm seamonkey-chat-1.0.9-43.el4_8.s390x.rpm seamonkey-debuginfo-1.0.9-43.el4_8.s390x.rpm seamonkey-devel-1.0.9-43.el4_8.s390x.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.s390x.rpm seamonkey-js-debugger-1.0.9-43.el4_8.s390x.rpm seamonkey-mail-1.0.9-43.el4_8.s390x.rpm x86_64: seamonkey-1.0.9-43.el4_8.x86_64.rpm seamonkey-chat-1.0.9-43.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.x86_64.rpm seamonkey-devel-1.0.9-43.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.x86_64.rpm seamonkey-mail-1.0.9-43.el4_8.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.9-43.el4_8.src.rpm i386: seamonkey-1.0.9-43.el4_8.i386.rpm seamonkey-chat-1.0.9-43.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-43.el4_8.i386.rpm seamonkey-devel-1.0.9-43.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-43.el4_8.i386.rpm seamonkey-mail-1.0.9-43.el4_8.i386.rpm x86_64: seamonkey-1.0.9-43.el4_8.x86_64.rpm seamonkey-chat-1.0.9-43.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.x86_64.rpm seamonkey-devel-1.0.9-43.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.x86_64.rpm seamonkey-mail-1.0.9-43.el4_8.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.9-43.el4_8.src.rpm i386: seamonkey-1.0.9-43.el4_8.i386.rpm seamonkey-chat-1.0.9-43.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-43.el4_8.i386.rpm seamonkey-devel-1.0.9-43.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-43.el4_8.i386.rpm seamonkey-mail-1.0.9-43.el4_8.i386.rpm ia64: seamonkey-1.0.9-43.el4_8.ia64.rpm seamonkey-chat-1.0.9-43.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.ia64.rpm seamonkey-devel-1.0.9-43.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.ia64.rpm seamonkey-mail-1.0.9-43.el4_8.ia64.rpm x86_64: seamonkey-1.0.9-43.el4_8.x86_64.rpm seamonkey-chat-1.0.9-43.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.x86_64.rpm seamonkey-devel-1.0.9-43.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.x86_64.rpm seamonkey-mail-1.0.9-43.el4_8.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.9-43.el4_8.src.rpm i386: seamonkey-1.0.9-43.el4_8.i386.rpm seamonkey-chat-1.0.9-43.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-43.el4_8.i386.rpm seamonkey-devel-1.0.9-43.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-43.el4_8.i386.rpm seamonkey-mail-1.0.9-43.el4_8.i386.rpm ia64: seamonkey-1.0.9-43.el4_8.ia64.rpm seamonkey-chat-1.0.9-43.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.ia64.rpm seamonkey-devel-1.0.9-43.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.ia64.rpm seamonkey-mail-1.0.9-43.el4_8.ia64.rpm x86_64: seamonkey-1.0.9-43.el4_8.x86_64.rpm seamonkey-chat-1.0.9-43.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-43.el4_8.x86_64.rpm seamonkey-devel-1.0.9-43.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-43.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-43.el4_8.x86_64.rpm seamonkey-mail-1.0.9-43.el4_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKMZGoXlSAg2UNWIIRArSVAJ97e04BfO7HKL+UvnJr7FROP2YywwCfWTi2 9vYMuCc6bfBAvuEp0jmAK8M= =xyiN -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 15 21:27:25 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 15 Jun 2009 17:27:25 -0400 Subject: [RHSA-2009:1100-01] Moderate: wireshark security update Message-ID: <200906152127.n5FLRPnN009495@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: wireshark security update Advisory ID: RHSA-2009:1100-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1100.html Issue date: 2009-06-15 CVE Names: CVE-2009-1210 CVE-2009-1268 CVE-2009-1269 CVE-2009-1829 ===================================================================== 1. Summary: Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. A format string flaw was found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-1210) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2009-1268, CVE-2009-1269, CVE-2009-1829) Users of wireshark should upgrade to these updated packages, which contain Wireshark version 1.0.8, and resolve these issues. All running instances of Wireshark must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 493973 - CVE-2009-1210 wireshark: format string in PROFINET dissector 495119 - CVE-2009-1268 Wireshark CHAP dissector crash 495121 - CVE-2009-1269 Wireshark Tektronix .rf5 file crash 501929 - CVE-2009-1829 wireshark: PCNFSD dissector crash 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/wireshark-1.0.8-EL3.1.src.rpm i386: wireshark-1.0.8-EL3.1.i386.rpm wireshark-debuginfo-1.0.8-EL3.1.i386.rpm wireshark-gnome-1.0.8-EL3.1.i386.rpm ia64: wireshark-1.0.8-EL3.1.ia64.rpm wireshark-debuginfo-1.0.8-EL3.1.ia64.rpm wireshark-gnome-1.0.8-EL3.1.ia64.rpm ppc: wireshark-1.0.8-EL3.1.ppc.rpm wireshark-debuginfo-1.0.8-EL3.1.ppc.rpm wireshark-gnome-1.0.8-EL3.1.ppc.rpm s390: wireshark-1.0.8-EL3.1.s390.rpm wireshark-debuginfo-1.0.8-EL3.1.s390.rpm wireshark-gnome-1.0.8-EL3.1.s390.rpm s390x: wireshark-1.0.8-EL3.1.s390x.rpm wireshark-debuginfo-1.0.8-EL3.1.s390x.rpm wireshark-gnome-1.0.8-EL3.1.s390x.rpm x86_64: wireshark-1.0.8-EL3.1.x86_64.rpm wireshark-debuginfo-1.0.8-EL3.1.x86_64.rpm wireshark-gnome-1.0.8-EL3.1.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/wireshark-1.0.8-EL3.1.src.rpm i386: wireshark-1.0.8-EL3.1.i386.rpm wireshark-debuginfo-1.0.8-EL3.1.i386.rpm wireshark-gnome-1.0.8-EL3.1.i386.rpm x86_64: wireshark-1.0.8-EL3.1.x86_64.rpm wireshark-debuginfo-1.0.8-EL3.1.x86_64.rpm wireshark-gnome-1.0.8-EL3.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/wireshark-1.0.8-EL3.1.src.rpm i386: wireshark-1.0.8-EL3.1.i386.rpm wireshark-debuginfo-1.0.8-EL3.1.i386.rpm wireshark-gnome-1.0.8-EL3.1.i386.rpm ia64: wireshark-1.0.8-EL3.1.ia64.rpm wireshark-debuginfo-1.0.8-EL3.1.ia64.rpm wireshark-gnome-1.0.8-EL3.1.ia64.rpm x86_64: wireshark-1.0.8-EL3.1.x86_64.rpm wireshark-debuginfo-1.0.8-EL3.1.x86_64.rpm wireshark-gnome-1.0.8-EL3.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/wireshark-1.0.8-EL3.1.src.rpm i386: wireshark-1.0.8-EL3.1.i386.rpm wireshark-debuginfo-1.0.8-EL3.1.i386.rpm wireshark-gnome-1.0.8-EL3.1.i386.rpm ia64: wireshark-1.0.8-EL3.1.ia64.rpm wireshark-debuginfo-1.0.8-EL3.1.ia64.rpm wireshark-gnome-1.0.8-EL3.1.ia64.rpm x86_64: wireshark-1.0.8-EL3.1.x86_64.rpm wireshark-debuginfo-1.0.8-EL3.1.x86_64.rpm wireshark-gnome-1.0.8-EL3.1.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/wireshark-1.0.8-1.el4_8.1.src.rpm i386: wireshark-1.0.8-1.el4_8.1.i386.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.i386.rpm wireshark-gnome-1.0.8-1.el4_8.1.i386.rpm ia64: wireshark-1.0.8-1.el4_8.1.ia64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.ia64.rpm wireshark-gnome-1.0.8-1.el4_8.1.ia64.rpm ppc: wireshark-1.0.8-1.el4_8.1.ppc.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.ppc.rpm wireshark-gnome-1.0.8-1.el4_8.1.ppc.rpm s390: wireshark-1.0.8-1.el4_8.1.s390.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.s390.rpm wireshark-gnome-1.0.8-1.el4_8.1.s390.rpm s390x: wireshark-1.0.8-1.el4_8.1.s390x.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.s390x.rpm wireshark-gnome-1.0.8-1.el4_8.1.s390x.rpm x86_64: wireshark-1.0.8-1.el4_8.1.x86_64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.x86_64.rpm wireshark-gnome-1.0.8-1.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/wireshark-1.0.8-1.el4_8.1.src.rpm i386: wireshark-1.0.8-1.el4_8.1.i386.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.i386.rpm wireshark-gnome-1.0.8-1.el4_8.1.i386.rpm x86_64: wireshark-1.0.8-1.el4_8.1.x86_64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.x86_64.rpm wireshark-gnome-1.0.8-1.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/wireshark-1.0.8-1.el4_8.1.src.rpm i386: wireshark-1.0.8-1.el4_8.1.i386.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.i386.rpm wireshark-gnome-1.0.8-1.el4_8.1.i386.rpm ia64: wireshark-1.0.8-1.el4_8.1.ia64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.ia64.rpm wireshark-gnome-1.0.8-1.el4_8.1.ia64.rpm x86_64: wireshark-1.0.8-1.el4_8.1.x86_64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.x86_64.rpm wireshark-gnome-1.0.8-1.el4_8.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/wireshark-1.0.8-1.el4_8.1.src.rpm i386: wireshark-1.0.8-1.el4_8.1.i386.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.i386.rpm wireshark-gnome-1.0.8-1.el4_8.1.i386.rpm ia64: wireshark-1.0.8-1.el4_8.1.ia64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.ia64.rpm wireshark-gnome-1.0.8-1.el4_8.1.ia64.rpm x86_64: wireshark-1.0.8-1.el4_8.1.x86_64.rpm wireshark-debuginfo-1.0.8-1.el4_8.1.x86_64.rpm wireshark-gnome-1.0.8-1.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/wireshark-1.0.8-1.el5_3.1.src.rpm i386: wireshark-1.0.8-1.el5_3.1.i386.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.i386.rpm x86_64: wireshark-1.0.8-1.el5_3.1.x86_64.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/wireshark-1.0.8-1.el5_3.1.src.rpm i386: wireshark-debuginfo-1.0.8-1.el5_3.1.i386.rpm wireshark-gnome-1.0.8-1.el5_3.1.i386.rpm x86_64: wireshark-debuginfo-1.0.8-1.el5_3.1.x86_64.rpm wireshark-gnome-1.0.8-1.el5_3.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/wireshark-1.0.8-1.el5_3.1.src.rpm i386: wireshark-1.0.8-1.el5_3.1.i386.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.i386.rpm wireshark-gnome-1.0.8-1.el5_3.1.i386.rpm ia64: wireshark-1.0.8-1.el5_3.1.ia64.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.ia64.rpm wireshark-gnome-1.0.8-1.el5_3.1.ia64.rpm ppc: wireshark-1.0.8-1.el5_3.1.ppc.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.ppc.rpm wireshark-gnome-1.0.8-1.el5_3.1.ppc.rpm s390x: wireshark-1.0.8-1.el5_3.1.s390x.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.s390x.rpm wireshark-gnome-1.0.8-1.el5_3.1.s390x.rpm x86_64: wireshark-1.0.8-1.el5_3.1.x86_64.rpm wireshark-debuginfo-1.0.8-1.el5_3.1.x86_64.rpm wireshark-gnome-1.0.8-1.el5_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829 http://www.redhat.com/security/updates/classification/#moderate http://www.wireshark.org/security/wnpa-sec-2009-02.html http://www.wireshark.org/security/wnpa-sec-2009-03.html 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKNryYXlSAg2UNWIIRAujvAJ91tUfx4MB6MEuqf/SlNlqmmBeBbQCeP0Um YRi9iUcfEx96dyyGK0/Ci80= =Poyu -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 15 21:28:08 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 15 Jun 2009 17:28:08 -0400 Subject: [RHSA-2009:1101-01] Moderate: cscope security update Message-ID: <200906152128.n5FLS8Re010165@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: cscope security update Advisory ID: RHSA-2009:1101-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1101.html Issue date: 2009-06-15 CVE Names: CVE-2004-2541 CVE-2006-4262 CVE-2009-0148 CVE-2009-1577 ===================================================================== 1. Summary: An updated cscope package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: cscope is a mature, ncurses-based, C source-code tree browsing tool. Multiple buffer overflow flaws were found in cscope. An attacker could create a specially crafted source code file that could cause cscope to crash or, possibly, execute arbitrary code when browsed with cscope. (CVE-2004-2541, CVE-2006-4262, CVE-2009-0148, CVE-2009-1577) All users of cscope are advised to upgrade to this updated package, which contains backported patches to fix these issues. All running instances of cscope must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 203645 - CVE-2006-4262 cscope: multiple buffer overflows 490667 - CVE-2004-2541, CVE-2009-0148 cscope: multiple buffer overflows 499174 - CVE-2009-1577 cscope: putstring buffer overflow 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cscope-15.5-16.RHEL3.src.rpm i386: cscope-15.5-16.RHEL3.i386.rpm cscope-debuginfo-15.5-16.RHEL3.i386.rpm ia64: cscope-15.5-16.RHEL3.ia64.rpm cscope-debuginfo-15.5-16.RHEL3.ia64.rpm ppc: cscope-15.5-16.RHEL3.ppc.rpm cscope-debuginfo-15.5-16.RHEL3.ppc.rpm s390: cscope-15.5-16.RHEL3.s390.rpm cscope-debuginfo-15.5-16.RHEL3.s390.rpm s390x: cscope-15.5-16.RHEL3.s390x.rpm cscope-debuginfo-15.5-16.RHEL3.s390x.rpm x86_64: cscope-15.5-16.RHEL3.x86_64.rpm cscope-debuginfo-15.5-16.RHEL3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/cscope-15.5-16.RHEL3.src.rpm i386: cscope-15.5-16.RHEL3.i386.rpm cscope-debuginfo-15.5-16.RHEL3.i386.rpm x86_64: cscope-15.5-16.RHEL3.x86_64.rpm cscope-debuginfo-15.5-16.RHEL3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cscope-15.5-16.RHEL3.src.rpm i386: cscope-15.5-16.RHEL3.i386.rpm cscope-debuginfo-15.5-16.RHEL3.i386.rpm ia64: cscope-15.5-16.RHEL3.ia64.rpm cscope-debuginfo-15.5-16.RHEL3.ia64.rpm x86_64: cscope-15.5-16.RHEL3.x86_64.rpm cscope-debuginfo-15.5-16.RHEL3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cscope-15.5-16.RHEL3.src.rpm i386: cscope-15.5-16.RHEL3.i386.rpm cscope-debuginfo-15.5-16.RHEL3.i386.rpm ia64: cscope-15.5-16.RHEL3.ia64.rpm cscope-debuginfo-15.5-16.RHEL3.ia64.rpm x86_64: cscope-15.5-16.RHEL3.x86_64.rpm cscope-debuginfo-15.5-16.RHEL3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cscope-15.5-10.RHEL4.3.src.rpm i386: cscope-15.5-10.RHEL4.3.i386.rpm cscope-debuginfo-15.5-10.RHEL4.3.i386.rpm ia64: cscope-15.5-10.RHEL4.3.ia64.rpm cscope-debuginfo-15.5-10.RHEL4.3.ia64.rpm ppc: cscope-15.5-10.RHEL4.3.ppc.rpm cscope-debuginfo-15.5-10.RHEL4.3.ppc.rpm s390: cscope-15.5-10.RHEL4.3.s390.rpm cscope-debuginfo-15.5-10.RHEL4.3.s390.rpm s390x: cscope-15.5-10.RHEL4.3.s390x.rpm cscope-debuginfo-15.5-10.RHEL4.3.s390x.rpm x86_64: cscope-15.5-10.RHEL4.3.x86_64.rpm cscope-debuginfo-15.5-10.RHEL4.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cscope-15.5-10.RHEL4.3.src.rpm i386: cscope-15.5-10.RHEL4.3.i386.rpm cscope-debuginfo-15.5-10.RHEL4.3.i386.rpm x86_64: cscope-15.5-10.RHEL4.3.x86_64.rpm cscope-debuginfo-15.5-10.RHEL4.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cscope-15.5-10.RHEL4.3.src.rpm i386: cscope-15.5-10.RHEL4.3.i386.rpm cscope-debuginfo-15.5-10.RHEL4.3.i386.rpm ia64: cscope-15.5-10.RHEL4.3.ia64.rpm cscope-debuginfo-15.5-10.RHEL4.3.ia64.rpm x86_64: cscope-15.5-10.RHEL4.3.x86_64.rpm cscope-debuginfo-15.5-10.RHEL4.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cscope-15.5-10.RHEL4.3.src.rpm i386: cscope-15.5-10.RHEL4.3.i386.rpm cscope-debuginfo-15.5-10.RHEL4.3.i386.rpm ia64: cscope-15.5-10.RHEL4.3.ia64.rpm cscope-debuginfo-15.5-10.RHEL4.3.ia64.rpm x86_64: cscope-15.5-10.RHEL4.3.x86_64.rpm cscope-debuginfo-15.5-10.RHEL4.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2541 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4262 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1577 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKNrzAXlSAg2UNWIIRArrIAJ0WxNf68eHd2MqqPEju6qsRaUsr2ACggfJ9 NgvDE6TPlnbWhos+yKjJ2os= =jBA3 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 15 21:28:33 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 15 Jun 2009 17:28:33 -0400 Subject: [RHSA-2009:1102-01] Moderate: cscope security update Message-ID: <200906152128.n5FLSX0x010524@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: cscope security update Advisory ID: RHSA-2009:1102-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1102.html Issue date: 2009-06-15 CVE Names: CVE-2004-2541 CVE-2009-0148 ===================================================================== 1. Summary: An updated cscope package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: cscope is a mature, ncurses-based, C source-code tree browsing tool. Multiple buffer overflow flaws were found in cscope. An attacker could create a specially crafted source code file that could cause cscope to crash or, possibly, execute arbitrary code when browsed with cscope. (CVE-2004-2541, CVE-2009-0148) All users of cscope are advised to upgrade to this updated package, which contains backported patches to fix these issues. All running instances of cscope must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 490667 - CVE-2004-2541, CVE-2009-0148 cscope: multiple buffer overflows 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cscope-15.5-15.1.el5_3.1.src.rpm i386: cscope-15.5-15.1.el5_3.1.i386.rpm cscope-debuginfo-15.5-15.1.el5_3.1.i386.rpm x86_64: cscope-15.5-15.1.el5_3.1.x86_64.rpm cscope-debuginfo-15.5-15.1.el5_3.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cscope-15.5-15.1.el5_3.1.src.rpm i386: cscope-15.5-15.1.el5_3.1.i386.rpm cscope-debuginfo-15.5-15.1.el5_3.1.i386.rpm ia64: cscope-15.5-15.1.el5_3.1.ia64.rpm cscope-debuginfo-15.5-15.1.el5_3.1.ia64.rpm ppc: cscope-15.5-15.1.el5_3.1.ppc.rpm cscope-debuginfo-15.5-15.1.el5_3.1.ppc.rpm s390x: cscope-15.5-15.1.el5_3.1.s390x.rpm cscope-debuginfo-15.5-15.1.el5_3.1.s390x.rpm x86_64: cscope-15.5-15.1.el5_3.1.x86_64.rpm cscope-debuginfo-15.5-15.1.el5_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2541 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKNrzqXlSAg2UNWIIRAmInAKCZFlnENfsuLC89lL/j10bKFm2/jACgty67 9U52SOXdexxIHvt6Akvf1qo= =wq3i -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 16 22:39:12 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Jun 2009 18:39:12 -0400 Subject: [RHSA-2009:1106-01] Important: kernel security and bug fix update Message-ID: <200906162239.n5GMdCVb027311@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2009:1106-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1106.html Issue date: 2009-06-16 CVE Names: CVE-2009-1072 CVE-2009-1192 CVE-2009-1439 CVE-2009-1630 CVE-2009-1633 CVE-2009-1758 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: * several flaws were found in the way the Linux kernel CIFS implementation handles Unicode strings. CIFS clients convert Unicode strings sent by a server to their local character sets, and then write those strings into memory. If a malicious server sent a long enough string, it could write past the end of the target memory region and corrupt other memory areas, possibly leading to a denial of service or privilege escalation on the client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important) * the Linux kernel Network File System daemon (nfsd) implementation did not drop the CAP_MKNOD capability when handling requests from local, unprivileged users. This flaw could possibly lead to an information leak or privilege escalation. (CVE-2009-1072, Moderate) * Frank Filz reported the NFSv4 client was missing a file permission check for the execute bit in some situations. This could allow local, unprivileged users to run non-executable files on NFSv4 mounted file systems. (CVE-2009-1630, Moderate) * a missing check was found in the hypervisor_callback() function in the Linux kernel provided by the kernel-xen package. This could cause a denial of service of a 32-bit guest if an application running in that guest accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate) * a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and agp_generic_alloc_pages() functions did not zero out the memory pages they allocate, which may later be available to user-space processes. This flaw could possibly lead to an information leak. (CVE-2009-1192, Low) Bug fixes: * a race in the NFS client between destroying cached access rights and unmounting an NFS file system could have caused a system crash. "Busy inodes" messages may have been logged. (BZ#498653) * nanosleep() could sleep several milliseconds less than the specified time on Intel Itanium?-based systems. (BZ#500349) * LEDs for disk drives in AHCI mode may have displayed a fault state when there were no faults. (BZ#500120) * ptrace_do_wait() reported tasks were stopped each time the process doing the trace called wait(), instead of reporting it once. (BZ#486945) * epoll_wait() may have caused a system lockup and problems for applications. (BZ#497322) * missing capabilities could possibly allow users with an fsuid other than 0 to perform actions on some file system types that would otherwise be prevented. (BZ#497271) * on NFS mounted file systems, heavy write loads may have blocked nfs_getattr() for long periods, causing commands that use stat(2), such as ls, to hang. (BZ#486926) * in rare circumstances, if an application performed multiple O_DIRECT reads per virtual memory page and also performed fork(2), the buffer storing the result of the I/O may have ended up with invalid data. (BZ#486921) * when using GFS2, gfs2_quotad may have entered an uninterpretable sleep state. (BZ#501742) * with this update, get_random_int() is more random and no longer uses a common seed value, reducing the possibility of predicting the values returned. (BZ#499783) * the "-fwrapv" flag was added to the gcc build options to prevent gcc from optimizing away wrapping. (BZ#501751) * a kernel panic when enabling and disabling iSCSI paths. (BZ#502916) * using the Broadcom NetXtreme BCM5704 network device with the tg3 driver caused high system load and very bad performance. (BZ#502837) * "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes able to use the ptrace() call on a given process; however, certain information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used to reconstruct memory maps. (BZ#499546) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 486921 - Corruption on ext3/xfs with O_DIRECT and unaligned user buffers 486926 - [RHEL5.2] nfs_getattr() hangs during heavy write workloads 486945 - waitpid() reports stopped process more than once 491572 - CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root 494275 - CVE-2009-1439 kernel: cifs: memory overwrite when saving nativeFileSystem field during mount 496572 - CVE-2009-1633 kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server 497020 - CVE-2009-1192 kernel: agp: zero pages before sending to userspace 497322 - crm #1896100 port epoll_wait fix from RHSA-2008-0665 to RHEL 5 498653 - fault in iget() - suspected race between nfs_access_cache_shrinker() and umount - Ref.: Bug #433249 499546 - kernel: proc: avoid information leaks to non-privileged processes [rhel-5.3.z] 499783 - kernel: random: make get_random_int() more random [rhel-5.3.z] 500120 - Problem with drive status leds after update to 2.6.18-128.el5 500297 - CVE-2009-1630 kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission 500349 - RHEL5.3.z LTP nanosleep02 Test Case Failure on Fujitsu Machine 500945 - CVE-2009-1758 kernel: xen: local denial of service 501742 - GFS2: gfs2_quotad in uninterruptible sleep while idle 501751 - kernel should be built with -fwrapv [rhel-5.3.z] 502837 - BCM5704 NIC results in CPU 100%SI , sluggish system performance 502916 - kernel BUG at drivers/scsi/libiscsi.c:301! 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-128.1.14.el5.src.rpm i386: kernel-2.6.18-128.1.14.el5.i686.rpm kernel-PAE-2.6.18-128.1.14.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm kernel-debug-2.6.18-128.1.14.el5.i686.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm kernel-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.i686.rpm kernel-devel-2.6.18-128.1.14.el5.i686.rpm kernel-headers-2.6.18-128.1.14.el5.i386.rpm kernel-xen-2.6.18-128.1.14.el5.i686.rpm kernel-xen-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm noarch: kernel-doc-2.6.18-128.1.14.el5.noarch.rpm x86_64: kernel-2.6.18-128.1.14.el5.x86_64.rpm kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.x86_64.rpm kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm kernel-debuginfo-2.6.18-128.1.14.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.x86_64.rpm kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-128.1.14.el5.x86_64.rpm kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-128.1.14.el5.src.rpm i386: kernel-2.6.18-128.1.14.el5.i686.rpm kernel-PAE-2.6.18-128.1.14.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm kernel-debug-2.6.18-128.1.14.el5.i686.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm kernel-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.i686.rpm kernel-devel-2.6.18-128.1.14.el5.i686.rpm kernel-headers-2.6.18-128.1.14.el5.i386.rpm kernel-xen-2.6.18-128.1.14.el5.i686.rpm kernel-xen-debuginfo-2.6.18-128.1.14.el5.i686.rpm kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm ia64: kernel-2.6.18-128.1.14.el5.ia64.rpm kernel-debug-2.6.18-128.1.14.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.ia64.rpm kernel-debug-devel-2.6.18-128.1.14.el5.ia64.rpm kernel-debuginfo-2.6.18-128.1.14.el5.ia64.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.ia64.rpm kernel-devel-2.6.18-128.1.14.el5.ia64.rpm kernel-headers-2.6.18-128.1.14.el5.ia64.rpm kernel-xen-2.6.18-128.1.14.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-128.1.14.el5.ia64.rpm kernel-xen-devel-2.6.18-128.1.14.el5.ia64.rpm noarch: kernel-doc-2.6.18-128.1.14.el5.noarch.rpm ppc: kernel-2.6.18-128.1.14.el5.ppc64.rpm kernel-debug-2.6.18-128.1.14.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.ppc64.rpm kernel-debug-devel-2.6.18-128.1.14.el5.ppc64.rpm kernel-debuginfo-2.6.18-128.1.14.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.ppc64.rpm kernel-devel-2.6.18-128.1.14.el5.ppc64.rpm kernel-headers-2.6.18-128.1.14.el5.ppc.rpm kernel-headers-2.6.18-128.1.14.el5.ppc64.rpm kernel-kdump-2.6.18-128.1.14.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-128.1.14.el5.ppc64.rpm kernel-kdump-devel-2.6.18-128.1.14.el5.ppc64.rpm s390x: kernel-2.6.18-128.1.14.el5.s390x.rpm kernel-debug-2.6.18-128.1.14.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.s390x.rpm kernel-debug-devel-2.6.18-128.1.14.el5.s390x.rpm kernel-debuginfo-2.6.18-128.1.14.el5.s390x.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.s390x.rpm kernel-devel-2.6.18-128.1.14.el5.s390x.rpm kernel-headers-2.6.18-128.1.14.el5.s390x.rpm kernel-kdump-2.6.18-128.1.14.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-128.1.14.el5.s390x.rpm kernel-kdump-devel-2.6.18-128.1.14.el5.s390x.rpm x86_64: kernel-2.6.18-128.1.14.el5.x86_64.rpm kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-128.1.14.el5.x86_64.rpm kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm kernel-debuginfo-2.6.18-128.1.14.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-128.1.14.el5.x86_64.rpm kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-128.1.14.el5.x86_64.rpm kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1758 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKOB73XlSAg2UNWIIRAisqAJ9/QkHHa689PVNLLxMHsAjC5DjWpgCfeIWG PpZHRZwT+OUTfXS0ch3MU9M= =i4vK -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 16 22:39:33 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Jun 2009 18:39:33 -0400 Subject: [RHSA-2009:1107-01] Moderate: apr-util security update Message-ID: <200906162239.n5GMdXRj027444@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: apr-util security update Advisory ID: RHSA-2009:1107-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1107.html Issue date: 2009-06-16 CVE Names: CVE-2009-0023 CVE-2009-1955 CVE-2009-1956 ===================================================================== 1. Summary: Updated apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: apr-util is a utility library used with the Apache Portable Runtime (APR). It aims to provide a free library of C data structures and routines. This library contains additional utility interfaces for APR; including support for XML, LDAP, database interfaces, URI parsing, and more. An off-by-one overflow flaw was found in the way apr-util processed a variable list of arguments. An attacker could provide a specially-crafted string as input for the formatted output conversion routine, which could, on big-endian platforms, potentially lead to the disclosure of sensitive information or a denial of service (application crash). (CVE-2009-1956) Note: The CVE-2009-1956 flaw only affects big-endian platforms, such as the IBM S/390 and PowerPC. It does not affect users using the apr-util package on little-endian platforms, due to their different organization of byte ordering used to represent particular data. A denial of service flaw was found in the apr-util Extensible Markup Language (XML) parser. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine. (CVE-2009-1955) A heap-based underwrite flaw was found in the way apr-util created compiled forms of particular search patterns. An attacker could formulate a specially-crafted search keyword, that would overwrite arbitrary heap memory locations when processed by the pattern preparation engine. (CVE-2009-0023) All apr-util users should upgrade to these updated packages, which contain backported patches to correct these issues. Applications using the Apache Portable Runtime library, such as httpd, must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 503928 - CVE-2009-0023 apr-util heap buffer underwrite 504390 - CVE-2009-1956 apr-util single NULL byte buffer overflow 504555 - CVE-2009-1955 apr-util billion laughs attack 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/apr-util-0.9.4-22.el4_8.1.src.rpm i386: apr-util-0.9.4-22.el4_8.1.i386.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.i386.rpm apr-util-devel-0.9.4-22.el4_8.1.i386.rpm ia64: apr-util-0.9.4-22.el4_8.1.ia64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.ia64.rpm apr-util-devel-0.9.4-22.el4_8.1.ia64.rpm ppc: apr-util-0.9.4-22.el4_8.1.ppc.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.ppc.rpm apr-util-devel-0.9.4-22.el4_8.1.ppc.rpm s390: apr-util-0.9.4-22.el4_8.1.s390.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.s390.rpm apr-util-devel-0.9.4-22.el4_8.1.s390.rpm s390x: apr-util-0.9.4-22.el4_8.1.s390x.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.s390x.rpm apr-util-devel-0.9.4-22.el4_8.1.s390x.rpm x86_64: apr-util-0.9.4-22.el4_8.1.x86_64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.x86_64.rpm apr-util-devel-0.9.4-22.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/apr-util-0.9.4-22.el4_8.1.src.rpm i386: apr-util-0.9.4-22.el4_8.1.i386.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.i386.rpm apr-util-devel-0.9.4-22.el4_8.1.i386.rpm x86_64: apr-util-0.9.4-22.el4_8.1.x86_64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.x86_64.rpm apr-util-devel-0.9.4-22.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/apr-util-0.9.4-22.el4_8.1.src.rpm i386: apr-util-0.9.4-22.el4_8.1.i386.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.i386.rpm apr-util-devel-0.9.4-22.el4_8.1.i386.rpm ia64: apr-util-0.9.4-22.el4_8.1.ia64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.ia64.rpm apr-util-devel-0.9.4-22.el4_8.1.ia64.rpm x86_64: apr-util-0.9.4-22.el4_8.1.x86_64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.x86_64.rpm apr-util-devel-0.9.4-22.el4_8.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/apr-util-0.9.4-22.el4_8.1.src.rpm i386: apr-util-0.9.4-22.el4_8.1.i386.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.i386.rpm apr-util-devel-0.9.4-22.el4_8.1.i386.rpm ia64: apr-util-0.9.4-22.el4_8.1.ia64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.ia64.rpm apr-util-devel-0.9.4-22.el4_8.1.ia64.rpm x86_64: apr-util-0.9.4-22.el4_8.1.x86_64.rpm apr-util-debuginfo-0.9.4-22.el4_8.1.x86_64.rpm apr-util-devel-0.9.4-22.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/apr-util-1.2.7-7.el5_3.1.src.rpm i386: apr-util-1.2.7-7.el5_3.1.i386.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.i386.rpm apr-util-docs-1.2.7-7.el5_3.1.i386.rpm x86_64: apr-util-1.2.7-7.el5_3.1.i386.rpm apr-util-1.2.7-7.el5_3.1.x86_64.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.i386.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.x86_64.rpm apr-util-docs-1.2.7-7.el5_3.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/apr-util-1.2.7-7.el5_3.1.src.rpm i386: apr-util-debuginfo-1.2.7-7.el5_3.1.i386.rpm apr-util-devel-1.2.7-7.el5_3.1.i386.rpm x86_64: apr-util-debuginfo-1.2.7-7.el5_3.1.i386.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.x86_64.rpm apr-util-devel-1.2.7-7.el5_3.1.i386.rpm apr-util-devel-1.2.7-7.el5_3.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/apr-util-1.2.7-7.el5_3.1.src.rpm i386: apr-util-1.2.7-7.el5_3.1.i386.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.i386.rpm apr-util-devel-1.2.7-7.el5_3.1.i386.rpm apr-util-docs-1.2.7-7.el5_3.1.i386.rpm ia64: apr-util-1.2.7-7.el5_3.1.ia64.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.ia64.rpm apr-util-devel-1.2.7-7.el5_3.1.ia64.rpm apr-util-docs-1.2.7-7.el5_3.1.ia64.rpm ppc: apr-util-1.2.7-7.el5_3.1.ppc.rpm apr-util-1.2.7-7.el5_3.1.ppc64.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.ppc.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.ppc64.rpm apr-util-devel-1.2.7-7.el5_3.1.ppc.rpm apr-util-devel-1.2.7-7.el5_3.1.ppc64.rpm apr-util-docs-1.2.7-7.el5_3.1.ppc.rpm s390x: apr-util-1.2.7-7.el5_3.1.s390.rpm apr-util-1.2.7-7.el5_3.1.s390x.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.s390.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.s390x.rpm apr-util-devel-1.2.7-7.el5_3.1.s390.rpm apr-util-devel-1.2.7-7.el5_3.1.s390x.rpm apr-util-docs-1.2.7-7.el5_3.1.s390x.rpm x86_64: apr-util-1.2.7-7.el5_3.1.i386.rpm apr-util-1.2.7-7.el5_3.1.x86_64.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.i386.rpm apr-util-debuginfo-1.2.7-7.el5_3.1.x86_64.rpm apr-util-devel-1.2.7-7.el5_3.1.i386.rpm apr-util-devel-1.2.7-7.el5_3.1.x86_64.rpm apr-util-docs-1.2.7-7.el5_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKOB8WXlSAg2UNWIIRAhB7AKCYI0kIQRvIRh3RngpZ+4gMv6grQgCfRs7P BZJCnchuk7bQ/A7llqXDT5Y= =Nh3A -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 16 22:39:54 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Jun 2009 18:39:54 -0400 Subject: [RHSA-2009:1108-01] Moderate: httpd security update Message-ID: <200906162239.n5GMdsSG027569@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: httpd security update Advisory ID: RHSA-2009:1108-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1108.html Issue date: 2009-06-16 CVE Names: CVE-2009-0023 CVE-2009-1955 CVE-2009-1956 ===================================================================== 1. Summary: Updated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Description: The Apache HTTP Server is a popular Web server. The httpd package shipped with Red Hat Enterprise Linux 3 contains an embedded copy of the Apache Portable Runtime (APR) utility library, a free library of C data structures and routines, which includes interfaces to support XML parsing, LDAP connections, database interfaces, URI parsing, and more. An off-by-one overflow flaw was found in the way apr-util processed a variable list of arguments. An attacker could provide a specially-crafted string as input for the formatted output conversion routine, which could, on big-endian platforms, potentially lead to the disclosure of sensitive information or a denial of service (application crash). (CVE-2009-1956) Note: The CVE-2009-1956 flaw only affects big-endian platforms, such as the IBM S/390 and PowerPC. It does not affect users using the httpd package on little-endian platforms, due to their different organization of byte ordering used to represent particular data. A denial of service flaw was found in the apr-util Extensible Markup Language (XML) parser. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine. (CVE-2009-1955) A heap-based underwrite flaw was found in the way apr-util created compiled forms of particular search patterns. An attacker could formulate a specially-crafted search keyword, that would overwrite arbitrary heap memory locations when processed by the pattern preparation engine. (CVE-2009-0023) All httpd users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 503928 - CVE-2009-0023 apr-util heap buffer underwrite 504390 - CVE-2009-1956 apr-util single NULL byte buffer overflow 504555 - CVE-2009-1955 apr-util billion laughs attack 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/httpd-2.0.46-73.ent.src.rpm i386: httpd-2.0.46-73.ent.i386.rpm httpd-debuginfo-2.0.46-73.ent.i386.rpm httpd-devel-2.0.46-73.ent.i386.rpm mod_ssl-2.0.46-73.ent.i386.rpm ia64: httpd-2.0.46-73.ent.ia64.rpm httpd-debuginfo-2.0.46-73.ent.ia64.rpm httpd-devel-2.0.46-73.ent.ia64.rpm mod_ssl-2.0.46-73.ent.ia64.rpm ppc: httpd-2.0.46-73.ent.ppc.rpm httpd-debuginfo-2.0.46-73.ent.ppc.rpm httpd-devel-2.0.46-73.ent.ppc.rpm mod_ssl-2.0.46-73.ent.ppc.rpm s390: httpd-2.0.46-73.ent.s390.rpm httpd-debuginfo-2.0.46-73.ent.s390.rpm httpd-devel-2.0.46-73.ent.s390.rpm mod_ssl-2.0.46-73.ent.s390.rpm s390x: httpd-2.0.46-73.ent.s390x.rpm httpd-debuginfo-2.0.46-73.ent.s390x.rpm httpd-devel-2.0.46-73.ent.s390x.rpm mod_ssl-2.0.46-73.ent.s390x.rpm x86_64: httpd-2.0.46-73.ent.x86_64.rpm httpd-debuginfo-2.0.46-73.ent.x86_64.rpm httpd-devel-2.0.46-73.ent.x86_64.rpm mod_ssl-2.0.46-73.ent.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/httpd-2.0.46-73.ent.src.rpm i386: httpd-2.0.46-73.ent.i386.rpm httpd-debuginfo-2.0.46-73.ent.i386.rpm httpd-devel-2.0.46-73.ent.i386.rpm mod_ssl-2.0.46-73.ent.i386.rpm x86_64: httpd-2.0.46-73.ent.x86_64.rpm httpd-debuginfo-2.0.46-73.ent.x86_64.rpm httpd-devel-2.0.46-73.ent.x86_64.rpm mod_ssl-2.0.46-73.ent.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/httpd-2.0.46-73.ent.src.rpm i386: httpd-2.0.46-73.ent.i386.rpm httpd-debuginfo-2.0.46-73.ent.i386.rpm httpd-devel-2.0.46-73.ent.i386.rpm mod_ssl-2.0.46-73.ent.i386.rpm ia64: httpd-2.0.46-73.ent.ia64.rpm httpd-debuginfo-2.0.46-73.ent.ia64.rpm httpd-devel-2.0.46-73.ent.ia64.rpm mod_ssl-2.0.46-73.ent.ia64.rpm x86_64: httpd-2.0.46-73.ent.x86_64.rpm httpd-debuginfo-2.0.46-73.ent.x86_64.rpm httpd-devel-2.0.46-73.ent.x86_64.rpm mod_ssl-2.0.46-73.ent.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/httpd-2.0.46-73.ent.src.rpm i386: httpd-2.0.46-73.ent.i386.rpm httpd-debuginfo-2.0.46-73.ent.i386.rpm httpd-devel-2.0.46-73.ent.i386.rpm mod_ssl-2.0.46-73.ent.i386.rpm ia64: httpd-2.0.46-73.ent.ia64.rpm httpd-debuginfo-2.0.46-73.ent.ia64.rpm httpd-devel-2.0.46-73.ent.ia64.rpm mod_ssl-2.0.46-73.ent.ia64.rpm x86_64: httpd-2.0.46-73.ent.x86_64.rpm httpd-debuginfo-2.0.46-73.ent.x86_64.rpm httpd-devel-2.0.46-73.ent.x86_64.rpm mod_ssl-2.0.46-73.ent.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKOB8pXlSAg2UNWIIRAofrAKCpHn1UokIT9wXA9NJ/i/b6GFb5KgCeOuL/ 5V5DfI6gBAgUZpq/HGlDPBY= =JR4g -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 17 09:18:40 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 17 Jun 2009 05:18:40 -0400 Subject: [RHSA-2009:1109-01] Critical: acroread security update Message-ID: <200906170918.n5H9Iemc020139@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: acroread security update Advisory ID: RHSA-2009:1109-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1109.html Issue date: 2009-06-17 CVE Names: CVE-2009-0198 CVE-2009-0509 CVE-2009-0510 CVE-2009-0511 CVE-2009-0512 CVE-2009-0888 CVE-2009-0889 CVE-2009-1855 CVE-2009-1856 CVE-2009-1857 CVE-2009-1858 CVE-2009-1859 CVE-2009-1861 CVE-2009-2028 ===================================================================== 1. Summary: Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 Extras - i386, x86_64 Red Hat Desktop version 3 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 3 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 3 Extras - i386, x86_64 Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64 Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 RHEL Desktop Supplementary (v. 5 client) - i386, x86_64 RHEL Supplementary (v. 5 server) - i386, x86_64 3. Description: Adobe Reader allows users to view and print documents in Portable Document Format (PDF). Multiple security flaws were discovered in Adobe Reader. A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2009-0198, CVE-2009-0509, CVE-2009-0510, CVE-2009-0511, CVE-2009-0512, CVE-2009-0888, CVE-2009-0889, CVE-2009-1855, CVE-2009-1856, CVE-2009-1857, CVE-2009-1858, CVE-2009-1859, CVE-2009-1861, CVE-2009-2028) All Adobe Reader users should install these updated packages. They contain Adobe Reader version 8.1.6, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 505049 - acroread: multiple security fixes in version 8.1.6 (APSB09-07) 6. Package List: Red Hat Enterprise Linux AS version 3 Extras: i386: acroread-8.1.6-1.i386.rpm acroread-plugin-8.1.6-1.i386.rpm x86_64: acroread-8.1.6-1.i386.rpm Red Hat Desktop version 3 Extras: i386: acroread-8.1.6-1.i386.rpm acroread-plugin-8.1.6-1.i386.rpm x86_64: acroread-8.1.6-1.i386.rpm Red Hat Enterprise Linux ES version 3 Extras: i386: acroread-8.1.6-1.i386.rpm acroread-plugin-8.1.6-1.i386.rpm x86_64: acroread-8.1.6-1.i386.rpm Red Hat Enterprise Linux WS version 3 Extras: i386: acroread-8.1.6-1.i386.rpm acroread-plugin-8.1.6-1.i386.rpm x86_64: acroread-8.1.6-1.i386.rpm Red Hat Enterprise Linux AS version 4 Extras: i386: acroread-8.1.6-1.el4.i386.rpm acroread-plugin-8.1.6-1.el4.i386.rpm x86_64: acroread-8.1.6-1.el4.i386.rpm Red Hat Desktop version 4 Extras: i386: acroread-8.1.6-1.el4.i386.rpm acroread-plugin-8.1.6-1.el4.i386.rpm x86_64: acroread-8.1.6-1.el4.i386.rpm Red Hat Enterprise Linux ES version 4 Extras: i386: acroread-8.1.6-1.el4.i386.rpm acroread-plugin-8.1.6-1.el4.i386.rpm x86_64: acroread-8.1.6-1.el4.i386.rpm Red Hat Enterprise Linux WS version 4 Extras: i386: acroread-8.1.6-1.el4.i386.rpm acroread-plugin-8.1.6-1.el4.i386.rpm x86_64: acroread-8.1.6-1.el4.i386.rpm RHEL Desktop Supplementary (v. 5 client): i386: acroread-8.1.6-2.el5.i386.rpm acroread-plugin-8.1.6-2.el5.i386.rpm x86_64: acroread-8.1.6-2.el5.i386.rpm acroread-plugin-8.1.6-2.el5.i386.rpm RHEL Supplementary (v. 5 server): i386: acroread-8.1.6-2.el5.i386.rpm acroread-plugin-8.1.6-2.el5.i386.rpm x86_64: acroread-8.1.6-2.el5.i386.rpm acroread-plugin-8.1.6-2.el5.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0888 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028 http://www.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb09-07.html 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKOLTAXlSAg2UNWIIRApNNAJ9xDHV1BSt4vrkhO4drc//0KagXEgCeNj+M ot0s22MwAAcx6Ida5u6z4S8= =tMmm -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 18 17:37:07 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 18 Jun 2009 13:37:07 -0400 Subject: [RHSA-2009:1116-01] Important: cyrus-imapd security update Message-ID: <200906181737.n5IHb7qj001081@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: cyrus-imapd security update Advisory ID: RHSA-2009:1116-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1116.html Issue date: 2009-06-18 CVE Names: CVE-2009-0688 ===================================================================== 1. Summary: Updated cyrus-imapd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support. It was discovered that the Cyrus SASL library (cyrus-sasl) does not always reliably terminate output from the sasl_encode64() function used by programs using this library. The Cyrus IMAP server (cyrus-imapd) relied on this function's output being properly terminated. Under certain conditions, improperly terminated output from sasl_encode64() could, potentially, cause cyrus-imapd to crash, disclose portions of its memory, or lead to SASL authentication failures. (CVE-2009-0688) Users of cyrus-imapd are advised to upgrade to these updated packages, which resolve this issue. After installing the update, cyrus-imapd will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 504207 - CVE-2009-0688 cyrus-imapd uses sasl_encode64() improperly 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cyrus-imapd-2.2.12-10.el4_8.1.src.rpm i386: cyrus-imapd-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.i386.rpm perl-Cyrus-2.2.12-10.el4_8.1.i386.rpm ia64: cyrus-imapd-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.ia64.rpm perl-Cyrus-2.2.12-10.el4_8.1.ia64.rpm ppc: cyrus-imapd-2.2.12-10.el4_8.1.ppc.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.ppc.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.ppc.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.ppc.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.ppc.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.ppc.rpm perl-Cyrus-2.2.12-10.el4_8.1.ppc.rpm s390: cyrus-imapd-2.2.12-10.el4_8.1.s390.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.s390.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.s390.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.s390.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.s390.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.s390.rpm perl-Cyrus-2.2.12-10.el4_8.1.s390.rpm s390x: cyrus-imapd-2.2.12-10.el4_8.1.s390x.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.s390x.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.s390x.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.s390x.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.s390x.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.s390x.rpm perl-Cyrus-2.2.12-10.el4_8.1.s390x.rpm x86_64: cyrus-imapd-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.x86_64.rpm perl-Cyrus-2.2.12-10.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cyrus-imapd-2.2.12-10.el4_8.1.src.rpm i386: cyrus-imapd-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.i386.rpm perl-Cyrus-2.2.12-10.el4_8.1.i386.rpm x86_64: cyrus-imapd-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.x86_64.rpm perl-Cyrus-2.2.12-10.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cyrus-imapd-2.2.12-10.el4_8.1.src.rpm i386: cyrus-imapd-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.i386.rpm perl-Cyrus-2.2.12-10.el4_8.1.i386.rpm ia64: cyrus-imapd-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.ia64.rpm perl-Cyrus-2.2.12-10.el4_8.1.ia64.rpm x86_64: cyrus-imapd-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.x86_64.rpm perl-Cyrus-2.2.12-10.el4_8.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cyrus-imapd-2.2.12-10.el4_8.1.src.rpm i386: cyrus-imapd-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.i386.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.i386.rpm perl-Cyrus-2.2.12-10.el4_8.1.i386.rpm ia64: cyrus-imapd-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.ia64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.ia64.rpm perl-Cyrus-2.2.12-10.el4_8.1.ia64.rpm x86_64: cyrus-imapd-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-devel-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-murder-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-nntp-2.2.12-10.el4_8.1.x86_64.rpm cyrus-imapd-utils-2.2.12-10.el4_8.1.x86_64.rpm perl-Cyrus-2.2.12-10.el4_8.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cyrus-imapd-2.3.7-2.el5_3.2.src.rpm i386: cyrus-imapd-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.i386.rpm x86_64: cyrus-imapd-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cyrus-imapd-2.3.7-2.el5_3.2.src.rpm i386: cyrus-imapd-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.i386.rpm ia64: cyrus-imapd-2.3.7-2.el5_3.2.ia64.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.ia64.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.ia64.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.ia64.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.ia64.rpm ppc: cyrus-imapd-2.3.7-2.el5_3.2.ppc.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.ppc.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.ppc64.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.ppc.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.ppc64.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.ppc.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.ppc.rpm s390x: cyrus-imapd-2.3.7-2.el5_3.2.s390x.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.s390.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.s390x.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.s390.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.s390x.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.s390x.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.s390x.rpm x86_64: cyrus-imapd-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.i386.rpm cyrus-imapd-devel-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-perl-2.3.7-2.el5_3.2.x86_64.rpm cyrus-imapd-utils-2.3.7-2.el5_3.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKOnsrXlSAg2UNWIIRAl7oAJ9MAe4ysz+zBB2G/TjcKoe+PdW9/gCgt+lV blhnfa17BtR0S75RM7C08PQ= =EFE5 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 14:19:44 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 10:19:44 -0400 Subject: [RHSA-2009:1122-01] Moderate: icu security update Message-ID: <200906251419.n5PEJiIG014400@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: icu security update Advisory ID: RHSA-2009:1122-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1122.html Issue date: 2009-06-25 CVE Names: CVE-2009-0153 ===================================================================== 1. Summary: Updated icu packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. A flaw was found in the way ICU processed certain, invalid byte sequences during Unicode conversion. If an application used ICU to decode malformed, multibyte character data, it may have been possible to bypass certain content protection mechanisms, or display information in a manner misleading to the user. (CVE-2009-0153) All users of icu should upgrade to these updated packages, which contain backported patches to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 503071 - CVE-2009-0153 icu: XSS vulnerability due to improper invalid byte sequence handling 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/icu-3.6-5.11.4.src.rpm i386: icu-3.6-5.11.4.i386.rpm icu-debuginfo-3.6-5.11.4.i386.rpm libicu-3.6-5.11.4.i386.rpm libicu-doc-3.6-5.11.4.i386.rpm x86_64: icu-3.6-5.11.4.x86_64.rpm icu-debuginfo-3.6-5.11.4.i386.rpm icu-debuginfo-3.6-5.11.4.x86_64.rpm libicu-3.6-5.11.4.i386.rpm libicu-3.6-5.11.4.x86_64.rpm libicu-doc-3.6-5.11.4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/icu-3.6-5.11.4.src.rpm i386: icu-debuginfo-3.6-5.11.4.i386.rpm libicu-devel-3.6-5.11.4.i386.rpm x86_64: icu-debuginfo-3.6-5.11.4.i386.rpm icu-debuginfo-3.6-5.11.4.x86_64.rpm libicu-devel-3.6-5.11.4.i386.rpm libicu-devel-3.6-5.11.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/icu-3.6-5.11.4.src.rpm i386: icu-3.6-5.11.4.i386.rpm icu-debuginfo-3.6-5.11.4.i386.rpm libicu-3.6-5.11.4.i386.rpm libicu-devel-3.6-5.11.4.i386.rpm libicu-doc-3.6-5.11.4.i386.rpm ia64: icu-3.6-5.11.4.ia64.rpm icu-debuginfo-3.6-5.11.4.ia64.rpm libicu-3.6-5.11.4.ia64.rpm libicu-devel-3.6-5.11.4.ia64.rpm libicu-doc-3.6-5.11.4.ia64.rpm ppc: icu-3.6-5.11.4.ppc.rpm icu-debuginfo-3.6-5.11.4.ppc.rpm icu-debuginfo-3.6-5.11.4.ppc64.rpm libicu-3.6-5.11.4.ppc.rpm libicu-3.6-5.11.4.ppc64.rpm libicu-devel-3.6-5.11.4.ppc.rpm libicu-devel-3.6-5.11.4.ppc64.rpm libicu-doc-3.6-5.11.4.ppc.rpm s390x: icu-3.6-5.11.4.s390x.rpm icu-debuginfo-3.6-5.11.4.s390.rpm icu-debuginfo-3.6-5.11.4.s390x.rpm libicu-3.6-5.11.4.s390.rpm libicu-3.6-5.11.4.s390x.rpm libicu-devel-3.6-5.11.4.s390.rpm libicu-devel-3.6-5.11.4.s390x.rpm libicu-doc-3.6-5.11.4.s390x.rpm x86_64: icu-3.6-5.11.4.x86_64.rpm icu-debuginfo-3.6-5.11.4.i386.rpm icu-debuginfo-3.6-5.11.4.x86_64.rpm libicu-3.6-5.11.4.i386.rpm libicu-3.6-5.11.4.x86_64.rpm libicu-devel-3.6-5.11.4.i386.rpm libicu-devel-3.6-5.11.4.x86_64.rpm libicu-doc-3.6-5.11.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ4d0XlSAg2UNWIIRAqqvAJ0T+txCEk0jhgybZ+U0ghDqv7tlJgCfSePT th0eJRmPwR9VitjtCgxSYv4= =8xOr -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 14:20:16 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 10:20:16 -0400 Subject: [RHSA-2009:1123-01] Moderate: gstreamer-plugins-good security update Message-ID: <200906251420.n5PEKGak015506@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gstreamer-plugins-good security update Advisory ID: RHSA-2009:1123-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1123.html Issue date: 2009-06-25 CVE Names: CVE-2009-1932 ===================================================================== 1. Summary: Updated gstreamer-plugins-good packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: GStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, good quality GStreamer plug-ins. Multiple integer overflow flaws, that could lead to a buffer overflow, were found in the GStreamer Good Plug-ins PNG decoding handler. An attacker could create a specially-crafted PNG file that would cause an application using the GStreamer Good Plug-ins library to crash or, potentially, execute arbitrary code as the user running the application when parsed. (CVE-2009-1932) All users of gstreamer-plugins-good are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the update, all applications using GStreamer Good Plug-ins (such as some media playing applications) must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 504199 - CVE-2009-1932 gstreamer-plugins-good: PNG decoder integer overflow 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gstreamer-plugins-good-0.10.9-1.el5_3.2.src.rpm i386: gstreamer-plugins-good-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.i386.rpm x86_64: gstreamer-plugins-good-0.10.9-1.el5_3.2.x86_64.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gstreamer-plugins-good-0.10.9-1.el5_3.2.src.rpm i386: gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.i386.rpm x86_64: gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.x86_64.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/gstreamer-plugins-good-0.10.9-1.el5_3.2.src.rpm i386: gstreamer-plugins-good-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.i386.rpm ia64: gstreamer-plugins-good-0.10.9-1.el5_3.2.ia64.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.ia64.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.ia64.rpm ppc: gstreamer-plugins-good-0.10.9-1.el5_3.2.ppc.rpm gstreamer-plugins-good-0.10.9-1.el5_3.2.ppc64.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.ppc.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.ppc64.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.ppc.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.ppc64.rpm s390x: gstreamer-plugins-good-0.10.9-1.el5_3.2.s390x.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.s390.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.s390x.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.s390.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.s390x.rpm x86_64: gstreamer-plugins-good-0.10.9-1.el5_3.2.x86_64.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-debuginfo-0.10.9-1.el5_3.2.x86_64.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.i386.rpm gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ4eEXlSAg2UNWIIRAiLdAKC5bZUNPxI4synr0j7CfbL3bPytMwCgoBCM Ae6GATtczLUJQ/rQQjhebV8= =BUjR -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 14:37:07 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 10:37:07 -0400 Subject: [RHSA-2009:1124-01] Moderate: net-snmp security update Message-ID: <200906251437.n5PEb7wT028260@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: net-snmp security update Advisory ID: RHSA-2009:1124-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1124.html Issue date: 2009-06-25 CVE Names: CVE-2009-1887 ===================================================================== 1. Summary: Updated net-snmp packages that fix a security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Description: The Simple Network Management Protocol (SNMP) is a protocol used for network management. A divide-by-zero flaw was discovered in the snmpd daemon. A remote attacker could issue a specially-crafted GETBULK request that could crash the snmpd daemon. (CVE-2009-1887) Note: An attacker must have read access to the SNMP server in order to exploit this flaw. In the default configuration, the community name "public" grants read-only access. In production deployments, it is recommended to change this default community name. All net-snmp users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the snmpd and snmptrapd daemons will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 506903 - CVE-2009-1887 net-snmp: DoS (division by zero) via SNMP GetBulk requests 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/net-snmp-5.0.9-2.30E.28.src.rpm i386: net-snmp-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-devel-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-perl-5.0.9-2.30E.28.i386.rpm net-snmp-utils-5.0.9-2.30E.28.i386.rpm ia64: net-snmp-5.0.9-2.30E.28.ia64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.ia64.rpm net-snmp-devel-5.0.9-2.30E.28.ia64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.ia64.rpm net-snmp-perl-5.0.9-2.30E.28.ia64.rpm net-snmp-utils-5.0.9-2.30E.28.ia64.rpm ppc: net-snmp-5.0.9-2.30E.28.ppc.rpm net-snmp-debuginfo-5.0.9-2.30E.28.ppc.rpm net-snmp-debuginfo-5.0.9-2.30E.28.ppc64.rpm net-snmp-devel-5.0.9-2.30E.28.ppc.rpm net-snmp-libs-5.0.9-2.30E.28.ppc.rpm net-snmp-libs-5.0.9-2.30E.28.ppc64.rpm net-snmp-perl-5.0.9-2.30E.28.ppc.rpm net-snmp-utils-5.0.9-2.30E.28.ppc.rpm s390: net-snmp-5.0.9-2.30E.28.s390.rpm net-snmp-debuginfo-5.0.9-2.30E.28.s390.rpm net-snmp-devel-5.0.9-2.30E.28.s390.rpm net-snmp-libs-5.0.9-2.30E.28.s390.rpm net-snmp-perl-5.0.9-2.30E.28.s390.rpm net-snmp-utils-5.0.9-2.30E.28.s390.rpm s390x: net-snmp-5.0.9-2.30E.28.s390x.rpm net-snmp-debuginfo-5.0.9-2.30E.28.s390.rpm net-snmp-debuginfo-5.0.9-2.30E.28.s390x.rpm net-snmp-devel-5.0.9-2.30E.28.s390x.rpm net-snmp-libs-5.0.9-2.30E.28.s390.rpm net-snmp-libs-5.0.9-2.30E.28.s390x.rpm net-snmp-perl-5.0.9-2.30E.28.s390x.rpm net-snmp-utils-5.0.9-2.30E.28.s390x.rpm x86_64: net-snmp-5.0.9-2.30E.28.x86_64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.x86_64.rpm net-snmp-devel-5.0.9-2.30E.28.x86_64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.x86_64.rpm net-snmp-perl-5.0.9-2.30E.28.x86_64.rpm net-snmp-utils-5.0.9-2.30E.28.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/net-snmp-5.0.9-2.30E.28.src.rpm i386: net-snmp-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-devel-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-perl-5.0.9-2.30E.28.i386.rpm net-snmp-utils-5.0.9-2.30E.28.i386.rpm x86_64: net-snmp-5.0.9-2.30E.28.x86_64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.x86_64.rpm net-snmp-devel-5.0.9-2.30E.28.x86_64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.x86_64.rpm net-snmp-perl-5.0.9-2.30E.28.x86_64.rpm net-snmp-utils-5.0.9-2.30E.28.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/net-snmp-5.0.9-2.30E.28.src.rpm i386: net-snmp-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-devel-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-perl-5.0.9-2.30E.28.i386.rpm net-snmp-utils-5.0.9-2.30E.28.i386.rpm ia64: net-snmp-5.0.9-2.30E.28.ia64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.ia64.rpm net-snmp-devel-5.0.9-2.30E.28.ia64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.ia64.rpm net-snmp-perl-5.0.9-2.30E.28.ia64.rpm net-snmp-utils-5.0.9-2.30E.28.ia64.rpm x86_64: net-snmp-5.0.9-2.30E.28.x86_64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.x86_64.rpm net-snmp-devel-5.0.9-2.30E.28.x86_64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.x86_64.rpm net-snmp-perl-5.0.9-2.30E.28.x86_64.rpm net-snmp-utils-5.0.9-2.30E.28.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/net-snmp-5.0.9-2.30E.28.src.rpm i386: net-snmp-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-devel-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-perl-5.0.9-2.30E.28.i386.rpm net-snmp-utils-5.0.9-2.30E.28.i386.rpm ia64: net-snmp-5.0.9-2.30E.28.ia64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.ia64.rpm net-snmp-devel-5.0.9-2.30E.28.ia64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.ia64.rpm net-snmp-perl-5.0.9-2.30E.28.ia64.rpm net-snmp-utils-5.0.9-2.30E.28.ia64.rpm x86_64: net-snmp-5.0.9-2.30E.28.x86_64.rpm net-snmp-debuginfo-5.0.9-2.30E.28.i386.rpm net-snmp-debuginfo-5.0.9-2.30E.28.x86_64.rpm net-snmp-devel-5.0.9-2.30E.28.x86_64.rpm net-snmp-libs-5.0.9-2.30E.28.i386.rpm net-snmp-libs-5.0.9-2.30E.28.x86_64.rpm net-snmp-perl-5.0.9-2.30E.28.x86_64.rpm net-snmp-utils-5.0.9-2.30E.28.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1887 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD4DBQFKQ4uCXlSAg2UNWIIRAkwFAJjK6JQbiqIGHkui4km8NXxeOWPGAKCEMmKr oGM/O6wCpuNPQX78L3042A== =7+7O -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 15:20:33 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 11:20:33 -0400 Subject: [RHSA-2009:1125-01] Moderate: thunderbird security update Message-ID: <200906251520.n5PFKXGR028280@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: thunderbird security update Advisory ID: RHSA-2009:1125-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1125.html Issue date: 2009-06-25 CVE Names: CVE-2009-1303 CVE-2009-1305 CVE-2009-1306 CVE-2009-1307 CVE-2009-1309 CVE-2009-1392 CVE-2009-1833 CVE-2009-1838 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2009-1392, CVE-2009-1303, CVE-2009-1305, CVE-2009-1833, CVE-2009-1838) Several flaws were found in the way malformed HTML mail content was processed. An HTML mail message containing malicious content could execute arbitrary JavaScript in the context of the mail message, possibly presenting misleading data to the user, or stealing sensitive information such as login credentials. (CVE-2009-1306, CVE-2009-1307, CVE-2009-1309) Note: JavaScript support is disabled by default in Thunderbird. None of the above issues are exploitable unless JavaScript is enabled. All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 496253 - CVE-2009-1303 Firefox 2 and 3 Layout engine crash 496256 - CVE-2009-1305 Firefox 2 and 3 JavaScript engine crash 496262 - CVE-2009-1306 Firefox jar: scheme ignores the content-disposition: header on the inner URI 496263 - CVE-2009-1307 Firefox Same-origin violations when Adobe Flash loaded via view-source: protocol 496267 - CVE-2009-1309 Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString 503568 - CVE-2009-1392 Firefox browser engine crashes 503570 - CVE-2009-1833 Firefox JavaScript engine crashes 503580 - CVE-2009-1838 Firefox arbitrary code execution flaw 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.12-23.el4.src.rpm i386: thunderbird-1.5.0.12-23.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-23.el4.i386.rpm ia64: thunderbird-1.5.0.12-23.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.ia64.rpm ppc: thunderbird-1.5.0.12-23.el4.ppc.rpm thunderbird-debuginfo-1.5.0.12-23.el4.ppc.rpm s390: thunderbird-1.5.0.12-23.el4.s390.rpm thunderbird-debuginfo-1.5.0.12-23.el4.s390.rpm s390x: thunderbird-1.5.0.12-23.el4.s390x.rpm thunderbird-debuginfo-1.5.0.12-23.el4.s390x.rpm x86_64: thunderbird-1.5.0.12-23.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.12-23.el4.src.rpm i386: thunderbird-1.5.0.12-23.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-23.el4.i386.rpm x86_64: thunderbird-1.5.0.12-23.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.12-23.el4.src.rpm i386: thunderbird-1.5.0.12-23.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-23.el4.i386.rpm ia64: thunderbird-1.5.0.12-23.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-23.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.12-23.el4.src.rpm i386: thunderbird-1.5.0.12-23.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-23.el4.i386.rpm ia64: thunderbird-1.5.0.12-23.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-23.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-23.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ5W2XlSAg2UNWIIRAnatAKCvi55u9VQGzGqskg8kiRrpPmiUvgCfaX7J CgKbp105yaojyMIk0JvU7yc= =Uvb6 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 15:20:47 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 11:20:47 -0400 Subject: [RHSA-2009:1126-01] Moderate: thunderbird security update Message-ID: <200906251520.n5PFKl04028453@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: thunderbird security update Advisory ID: RHSA-2009:1126-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1126.html Issue date: 2009-06-25 CVE Names: CVE-2009-1303 CVE-2009-1305 CVE-2009-1306 CVE-2009-1307 CVE-2009-1308 CVE-2009-1309 CVE-2009-1392 CVE-2009-1833 CVE-2009-1836 CVE-2009-1838 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML mail content. An HTML mail message containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2009-1392, CVE-2009-1303, CVE-2009-1305, CVE-2009-1833, CVE-2009-1838) Several flaws were found in the way malformed HTML mail content was processed. An HTML mail message containing malicious content could execute arbitrary JavaScript in the context of the mail message, possibly presenting misleading data to the user, or stealing sensitive information such as login credentials. (CVE-2009-1306, CVE-2009-1307, CVE-2009-1308, CVE-2009-1309) A flaw was found in the way Thunderbird handled error responses returned from proxy servers. If an attacker is able to conduct a man-in-the-middle attack against a Thunderbird instance that is using a proxy server, they may be able to steal sensitive information from the site Thunderbird is displaying. (CVE-2009-1836) Note: JavaScript support is disabled by default in Thunderbird. None of the above issues are exploitable unless JavaScript is enabled. All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 456202 - Launch thunderbird with option "-contentLocale" <locale> will get warning message 496253 - CVE-2009-1303 Firefox 2 and 3 Layout engine crash 496256 - CVE-2009-1305 Firefox 2 and 3 JavaScript engine crash 496262 - CVE-2009-1306 Firefox jar: scheme ignores the content-disposition: header on the inner URI 496263 - CVE-2009-1307 Firefox Same-origin violations when Adobe Flash loaded via view-source: protocol 496266 - CVE-2009-1308 Firefox XSS hazard using third-party stylesheets and XBL bindings 496267 - CVE-2009-1309 Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString 503568 - CVE-2009-1392 Firefox browser engine crashes 503570 - CVE-2009-1833 Firefox JavaScript engine crashes 503578 - CVE-2009-1836 Firefox SSL tampering via non-200 responses to proxy CONNECT requests 503580 - CVE-2009-1838 Firefox arbitrary code execution flaw 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-2.0.0.22-2.el5_3.src.rpm i386: thunderbird-2.0.0.22-2.el5_3.i386.rpm thunderbird-debuginfo-2.0.0.22-2.el5_3.i386.rpm x86_64: thunderbird-2.0.0.22-2.el5_3.x86_64.rpm thunderbird-debuginfo-2.0.0.22-2.el5_3.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-2.0.0.22-2.el5_3.src.rpm i386: thunderbird-2.0.0.22-2.el5_3.i386.rpm thunderbird-debuginfo-2.0.0.22-2.el5_3.i386.rpm x86_64: thunderbird-2.0.0.22-2.el5_3.x86_64.rpm thunderbird-debuginfo-2.0.0.22-2.el5_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ5XGXlSAg2UNWIIRAkjDAJ9Du5M9D1ihI93WrGBfCGBS/wajlgCeLIgS iBYRAOfSreGamk0/Pe2Ar/8= =k3Bd -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 16:43:04 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 12:43:04 -0400 Subject: [RHSA-2009:1127-01] Critical: kdelibs security update Message-ID: <200906251643.n5PGh4MN028458@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: kdelibs security update Advisory ID: RHSA-2009:1127-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1127.html Issue date: 2009-06-25 CVE Names: CVE-2009-1687 CVE-2009-1690 CVE-2009-1698 ===================================================================== 1. Summary: Updated kdelibs packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The kdelibs packages provide libraries for the K Desktop Environment (KDE). A flaw was found in the way the KDE CSS parser handled content for the CSS "style" attribute. A remote attacker could create a specially-crafted CSS equipped HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1698) A flaw was found in the way the KDE HTML parser handled content for the HTML "head" element. A remote attacker could create a specially-crafted HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1690) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the KDE JavaScript garbage collector handled memory allocation requests. A remote attacker could create a specially-crafted HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1687) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 505571 - CVE-2009-1690 kdelibs: KHTML Incorrect handling <head> element content once the <head> element was removed (DoS, ACE) 506453 - CVE-2009-1687 kdelibs: Integer overflow in KJS JavaScript garbage collector 506469 - CVE-2009-1698 kdelibs: KHTML CSS parser - incorrect handling CSS "style" attribute content (DoS, ACE) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kdelibs-3.3.1-14.el4.src.rpm i386: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-devel-3.3.1-14.el4.i386.rpm ia64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.ia64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.ia64.rpm kdelibs-devel-3.3.1-14.el4.ia64.rpm ppc: kdelibs-3.3.1-14.el4.ppc.rpm kdelibs-3.3.1-14.el4.ppc64.rpm kdelibs-debuginfo-3.3.1-14.el4.ppc.rpm kdelibs-debuginfo-3.3.1-14.el4.ppc64.rpm kdelibs-devel-3.3.1-14.el4.ppc.rpm s390: kdelibs-3.3.1-14.el4.s390.rpm kdelibs-debuginfo-3.3.1-14.el4.s390.rpm kdelibs-devel-3.3.1-14.el4.s390.rpm s390x: kdelibs-3.3.1-14.el4.s390.rpm kdelibs-3.3.1-14.el4.s390x.rpm kdelibs-debuginfo-3.3.1-14.el4.s390.rpm kdelibs-debuginfo-3.3.1-14.el4.s390x.rpm kdelibs-devel-3.3.1-14.el4.s390x.rpm x86_64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.x86_64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.x86_64.rpm kdelibs-devel-3.3.1-14.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kdelibs-3.3.1-14.el4.src.rpm i386: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-devel-3.3.1-14.el4.i386.rpm x86_64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.x86_64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.x86_64.rpm kdelibs-devel-3.3.1-14.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kdelibs-3.3.1-14.el4.src.rpm i386: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-devel-3.3.1-14.el4.i386.rpm ia64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.ia64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.ia64.rpm kdelibs-devel-3.3.1-14.el4.ia64.rpm x86_64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.x86_64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.x86_64.rpm kdelibs-devel-3.3.1-14.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kdelibs-3.3.1-14.el4.src.rpm i386: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-devel-3.3.1-14.el4.i386.rpm ia64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.ia64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.ia64.rpm kdelibs-devel-3.3.1-14.el4.ia64.rpm x86_64: kdelibs-3.3.1-14.el4.i386.rpm kdelibs-3.3.1-14.el4.x86_64.rpm kdelibs-debuginfo-3.3.1-14.el4.i386.rpm kdelibs-debuginfo-3.3.1-14.el4.x86_64.rpm kdelibs-devel-3.3.1-14.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdelibs-3.5.4-22.el5_3.src.rpm i386: kdelibs-3.5.4-22.el5_3.i386.rpm kdelibs-apidocs-3.5.4-22.el5_3.i386.rpm kdelibs-debuginfo-3.5.4-22.el5_3.i386.rpm x86_64: kdelibs-3.5.4-22.el5_3.i386.rpm kdelibs-3.5.4-22.el5_3.x86_64.rpm kdelibs-apidocs-3.5.4-22.el5_3.x86_64.rpm kdelibs-debuginfo-3.5.4-22.el5_3.i386.rpm kdelibs-debuginfo-3.5.4-22.el5_3.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdelibs-3.5.4-22.el5_3.src.rpm i386: kdelibs-debuginfo-3.5.4-22.el5_3.i386.rpm kdelibs-devel-3.5.4-22.el5_3.i386.rpm x86_64: kdelibs-debuginfo-3.5.4-22.el5_3.i386.rpm kdelibs-debuginfo-3.5.4-22.el5_3.x86_64.rpm kdelibs-devel-3.5.4-22.el5_3.i386.rpm kdelibs-devel-3.5.4-22.el5_3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kdelibs-3.5.4-22.el5_3.src.rpm i386: kdelibs-3.5.4-22.el5_3.i386.rpm kdelibs-apidocs-3.5.4-22.el5_3.i386.rpm kdelibs-debuginfo-3.5.4-22.el5_3.i386.rpm kdelibs-devel-3.5.4-22.el5_3.i386.rpm ia64: kdelibs-3.5.4-22.el5_3.ia64.rpm kdelibs-apidocs-3.5.4-22.el5_3.ia64.rpm kdelibs-debuginfo-3.5.4-22.el5_3.ia64.rpm kdelibs-devel-3.5.4-22.el5_3.ia64.rpm ppc: kdelibs-3.5.4-22.el5_3.ppc.rpm kdelibs-3.5.4-22.el5_3.ppc64.rpm kdelibs-apidocs-3.5.4-22.el5_3.ppc.rpm kdelibs-debuginfo-3.5.4-22.el5_3.ppc.rpm kdelibs-debuginfo-3.5.4-22.el5_3.ppc64.rpm kdelibs-devel-3.5.4-22.el5_3.ppc.rpm kdelibs-devel-3.5.4-22.el5_3.ppc64.rpm s390x: kdelibs-3.5.4-22.el5_3.s390.rpm kdelibs-3.5.4-22.el5_3.s390x.rpm kdelibs-apidocs-3.5.4-22.el5_3.s390x.rpm kdelibs-debuginfo-3.5.4-22.el5_3.s390.rpm kdelibs-debuginfo-3.5.4-22.el5_3.s390x.rpm kdelibs-devel-3.5.4-22.el5_3.s390.rpm kdelibs-devel-3.5.4-22.el5_3.s390x.rpm x86_64: kdelibs-3.5.4-22.el5_3.i386.rpm kdelibs-3.5.4-22.el5_3.x86_64.rpm kdelibs-apidocs-3.5.4-22.el5_3.x86_64.rpm kdelibs-debuginfo-3.5.4-22.el5_3.i386.rpm kdelibs-debuginfo-3.5.4-22.el5_3.x86_64.rpm kdelibs-devel-3.5.4-22.el5_3.i386.rpm kdelibs-devel-3.5.4-22.el5_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1687 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1690 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ6kVXlSAg2UNWIIRAo9XAJwKpMEhv/37duSqRlfqWFPKJuf6EwCfeAdz lPsEfDtUGZRxsZL1OqEvr54= =qIbs -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 16:43:18 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 12:43:18 -0400 Subject: [RHSA-2009:1128-01] Important: kdelibs security update Message-ID: <200906251643.n5PGhIrh028584@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kdelibs security update Advisory ID: RHSA-2009:1128-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1128.html Issue date: 2009-06-25 CVE Names: CVE-2009-1698 ===================================================================== 1. Summary: Updated kdelibs packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Description: The kdelibs packages provide libraries for the K Desktop Environment (KDE). A flaw was found in the way the KDE CSS parser handled content for the CSS "style" attribute. A remote attacker could create a specially-crafted CSS equipped HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1698) Users should upgrade to these updated packages, which contain a backported patch to correct this issue. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 506469 - CVE-2009-1698 kdelibs: KHTML CSS parser - incorrect handling CSS "style" attribute content (DoS, ACE) 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kdelibs-3.1.3-6.13.src.rpm i386: kdelibs-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-devel-3.1.3-6.13.i386.rpm ia64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.ia64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.ia64.rpm kdelibs-devel-3.1.3-6.13.ia64.rpm ppc: kdelibs-3.1.3-6.13.ppc.rpm kdelibs-3.1.3-6.13.ppc64.rpm kdelibs-debuginfo-3.1.3-6.13.ppc.rpm kdelibs-debuginfo-3.1.3-6.13.ppc64.rpm kdelibs-devel-3.1.3-6.13.ppc.rpm s390: kdelibs-3.1.3-6.13.s390.rpm kdelibs-debuginfo-3.1.3-6.13.s390.rpm kdelibs-devel-3.1.3-6.13.s390.rpm s390x: kdelibs-3.1.3-6.13.s390.rpm kdelibs-3.1.3-6.13.s390x.rpm kdelibs-debuginfo-3.1.3-6.13.s390.rpm kdelibs-debuginfo-3.1.3-6.13.s390x.rpm kdelibs-devel-3.1.3-6.13.s390x.rpm x86_64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.x86_64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.x86_64.rpm kdelibs-devel-3.1.3-6.13.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kdelibs-3.1.3-6.13.src.rpm i386: kdelibs-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-devel-3.1.3-6.13.i386.rpm x86_64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.x86_64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.x86_64.rpm kdelibs-devel-3.1.3-6.13.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kdelibs-3.1.3-6.13.src.rpm i386: kdelibs-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-devel-3.1.3-6.13.i386.rpm ia64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.ia64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.ia64.rpm kdelibs-devel-3.1.3-6.13.ia64.rpm x86_64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.x86_64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.x86_64.rpm kdelibs-devel-3.1.3-6.13.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kdelibs-3.1.3-6.13.src.rpm i386: kdelibs-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-devel-3.1.3-6.13.i386.rpm ia64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.ia64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.ia64.rpm kdelibs-devel-3.1.3-6.13.ia64.rpm x86_64: kdelibs-3.1.3-6.13.i386.rpm kdelibs-3.1.3-6.13.x86_64.rpm kdelibs-debuginfo-3.1.3-6.13.i386.rpm kdelibs-debuginfo-3.1.3-6.13.x86_64.rpm kdelibs-devel-3.1.3-6.13.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ6kdXlSAg2UNWIIRAo5tAJ0Zts1uZ0U5S7a6AiSnEwkEoTQqVgCfR9Rh FQeBEHnddU57Wi6g3b2P5ng= =JkeI -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 16:43:28 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2009 12:43:28 -0400 Subject: [RHSA-2009:1130-01] Critical: kdegraphics security update Message-ID: <200906251643.n5PGhSvF028650@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: kdegraphics security update Advisory ID: RHSA-2009:1130-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1130.html Issue date: 2009-06-25 CVE Names: CVE-2009-0945 CVE-2009-1709 ===================================================================== 1. Summary: Updated kdegraphics packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 3. Description: The kdegraphics packages contain applications for the K Desktop Environment (KDE). Scalable Vector Graphics (SVG) is an XML-based language to describe vector images. KSVG is a framework aimed at implementing the latest W3C SVG specifications. A use-after-free flaw was found in the KDE KSVG animation element implementation. A remote attacker could create a specially-crafted SVG image, which once opened by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1709) A NULL pointer dereference flaw was found in the KDE, KSVG SVGList interface implementation. A remote attacker could create a specially-crafted SVG image, which once opened by an unsuspecting user, would cause memory corruption, leading to a denial of service (Konqueror crash). (CVE-2009-0945) All users of kdegraphics should upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 506246 - CVE-2009-1709 kdegraphics: KSVG Pointer use-after-free error in the SVG animation element (DoS, ACE) 506703 - CVE-2009-0945 kdegraphics: KSVG NULL-pointer dereference in the SVGList interface implementation (ACE) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdegraphics-3.5.4-13.el5_3.src.rpm i386: kdegraphics-3.5.4-13.el5_3.i386.rpm kdegraphics-debuginfo-3.5.4-13.el5_3.i386.rpm x86_64: kdegraphics-3.5.4-13.el5_3.x86_64.rpm kdegraphics-debuginfo-3.5.4-13.el5_3.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdegraphics-3.5.4-13.el5_3.src.rpm i386: kdegraphics-debuginfo-3.5.4-13.el5_3.i386.rpm kdegraphics-devel-3.5.4-13.el5_3.i386.rpm x86_64: kdegraphics-debuginfo-3.5.4-13.el5_3.i386.rpm kdegraphics-debuginfo-3.5.4-13.el5_3.x86_64.rpm kdegraphics-devel-3.5.4-13.el5_3.i386.rpm kdegraphics-devel-3.5.4-13.el5_3.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kdegraphics-3.5.4-13.el5_3.src.rpm i386: kdegraphics-3.5.4-13.el5_3.i386.rpm kdegraphics-debuginfo-3.5.4-13.el5_3.i386.rpm kdegraphics-devel-3.5.4-13.el5_3.i386.rpm x86_64: kdegraphics-3.5.4-13.el5_3.x86_64.rpm kdegraphics-debuginfo-3.5.4-13.el5_3.i386.rpm kdegraphics-debuginfo-3.5.4-13.el5_3.x86_64.rpm kdegraphics-devel-3.5.4-13.el5_3.i386.rpm kdegraphics-devel-3.5.4-13.el5_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1709 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKQ6krXlSAg2UNWIIRApsVAJwLS5oXtRA131j2vAvGD0/PxXZU+wCeJNKd UVUGWZM2j0tnzzuj3ZmbOZk= =9si/ -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 30 08:07:14 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 30 Jun 2009 04:07:14 -0400 Subject: [RHSA-2009:1132-01] Important: kernel security and bug fix update Message-ID: <200906300807.n5U87EbJ012927@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2009:1132-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1132.html Issue date: 2009-06-30 CVE Names: CVE-2009-1072 CVE-2009-1192 CVE-2009-1385 CVE-2009-1630 CVE-2009-1758 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and various bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * a flaw was found in the Intel PRO/1000 network driver in the Linux kernel. Frames with sizes near the MTU of an interface may be split across multiple hardware receive descriptors. Receipt of such a frame could leak through a validation check, leading to a corruption of the length check. A remote attacker could use this flaw to send a specially-crafted packet that would cause a denial of service. (CVE-2009-1385, Important) * the Linux kernel Network File System daemon (nfsd) implementation did not drop the CAP_MKNOD capability when handling requests from local, unprivileged users. This flaw could possibly lead to an information leak or privilege escalation. (CVE-2009-1072, Moderate) * Frank Filz reported the NFSv4 client was missing a file permission check for the execute bit in some situations. This could allow local, unprivileged users to run non-executable files on NFSv4 mounted file systems. (CVE-2009-1630, Moderate) * a missing check was found in the hypervisor_callback() function in the Linux kernel provided by the kernel-xen package. This could cause a denial of service of a 32-bit guest if an application running in that guest accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate) * a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and agp_generic_alloc_pages() functions did not zero out the memory pages they allocate, which may later be available to user-space processes. This flaw could possibly lead to an information leak. (CVE-2009-1192, Low) These updated packages also fix the following bugs: * "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes able to use the ptrace() call on a given process; however, certain information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used to reconstruct memory maps, making it possible to bypass the Address Space Layout Randomization (ASLR) security feature. This update addresses this issue. (BZ#499549) * in some situations, the link count was not decreased when renaming unused files on NFS mounted file systems. This may have resulted in poor performance. With this update, the link count is decreased in these situations, the same as is done for other file operations, such as unlink and rmdir. (BZ#501802) * tcp_ack() cleared the probes_out variable even if there were outstanding packets. When low TCP keepalive intervals were used, this bug may have caused problems, such as connections terminating, when using remote tools such as rsh and rlogin. (BZ#501754) * off-by-one errors in the time normalization code could have caused clock_gettime() to return one billion nanoseconds, rather than adding an extra second. This bug could have caused the name service cache daemon (nscd) to consume excessive CPU resources. (BZ#501800) * a system panic could occur when one thread read "/proc/bus/input/devices" while another was removing a device. With this update, a mutex has been added to protect the input_dev_list and input_handler_list variables, which resolves this issue. (BZ#501804) * using netdump may have caused a kernel deadlock on some systems. (BZ#504565) * the file system mask, which lists capabilities for users with a file system user ID (fsuid) of 0, was missing the CAP_MKNOD and CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with an fsuid other than 0 to perform actions on some file system types that would otherwise be prevented. This update adds these capabilities. (BZ#497269) All Red Hat Enterprise Linux 4 users should upgrade to these updated packages, which contain backported patches to resolve these issues. Note: The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 491572 - CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root 497020 - CVE-2009-1192 kernel: agp: zero pages before sending to userspace 499549 - kernel: proc: avoid information leaks to non-privileged processes [rhel-4.8.z] 500297 - CVE-2009-1630 kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission 500945 - CVE-2009-1758 kernel: xen: local denial of service 501754 - Bug with TCP tcp_ack() [RHEL 4] 501800 - [RHEL4] Nscd consumes many cpu resources ( nearly 100% ) continuously. 501802 - [RHEL 4] inode of the overwritten file will remain in the icache causing performance issues. 501804 - [Stratus 4.9 bug] panic reading /proc/bus/input/devices during input device removal 502981 - CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service 504565 - e1000e: sporadic hang in netdump 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-89.0.3.EL.src.rpm i386: kernel-2.6.9-89.0.3.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.3.EL.i686.rpm kernel-devel-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm kernel-smp-2.6.9-89.0.3.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm ia64: kernel-2.6.9-89.0.3.EL.ia64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.ia64.rpm kernel-devel-2.6.9-89.0.3.EL.ia64.rpm kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm noarch: kernel-doc-2.6.9-89.0.3.EL.noarch.rpm ppc: kernel-2.6.9-89.0.3.EL.ppc64.rpm kernel-2.6.9-89.0.3.EL.ppc64iseries.rpm kernel-debuginfo-2.6.9-89.0.3.EL.ppc64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.ppc64iseries.rpm kernel-devel-2.6.9-89.0.3.EL.ppc64.rpm kernel-devel-2.6.9-89.0.3.EL.ppc64iseries.rpm kernel-largesmp-2.6.9-89.0.3.EL.ppc64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.ppc64.rpm s390: kernel-2.6.9-89.0.3.EL.s390.rpm kernel-debuginfo-2.6.9-89.0.3.EL.s390.rpm kernel-devel-2.6.9-89.0.3.EL.s390.rpm s390x: kernel-2.6.9-89.0.3.EL.s390x.rpm kernel-debuginfo-2.6.9-89.0.3.EL.s390x.rpm kernel-devel-2.6.9-89.0.3.EL.s390x.rpm x86_64: kernel-2.6.9-89.0.3.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.x86_64.rpm kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-89.0.3.EL.src.rpm i386: kernel-2.6.9-89.0.3.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.3.EL.i686.rpm kernel-devel-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm kernel-smp-2.6.9-89.0.3.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm noarch: kernel-doc-2.6.9-89.0.3.EL.noarch.rpm x86_64: kernel-2.6.9-89.0.3.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.x86_64.rpm kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-89.0.3.EL.src.rpm i386: kernel-2.6.9-89.0.3.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.3.EL.i686.rpm kernel-devel-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm kernel-smp-2.6.9-89.0.3.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm ia64: kernel-2.6.9-89.0.3.EL.ia64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.ia64.rpm kernel-devel-2.6.9-89.0.3.EL.ia64.rpm kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm noarch: kernel-doc-2.6.9-89.0.3.EL.noarch.rpm x86_64: kernel-2.6.9-89.0.3.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.x86_64.rpm kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-89.0.3.EL.src.rpm i386: kernel-2.6.9-89.0.3.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.3.EL.i686.rpm kernel-devel-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm kernel-smp-2.6.9-89.0.3.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-2.6.9-89.0.3.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm ia64: kernel-2.6.9-89.0.3.EL.ia64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.ia64.rpm kernel-devel-2.6.9-89.0.3.EL.ia64.rpm kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm noarch: kernel-doc-2.6.9-89.0.3.EL.noarch.rpm x86_64: kernel-2.6.9-89.0.3.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.3.EL.x86_64.rpm kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1758 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKScegXlSAg2UNWIIRApgsAJ42sZ8IRUZ4EiICZ00MFn+pBgjPTACglM0Y pqYdLSbJKesLk8wQidcuTno= =2PFx -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 30 14:59:40 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 30 Jun 2009 10:59:40 -0400 Subject: [RHSA-2009:1134-01] Important: seamonkey security update Message-ID: <200906301459.n5UExecV006834@int-mx1.corp.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: seamonkey security update Advisory ID: RHSA-2009:1134-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1134.html Issue date: 2009-06-30 CVE Names: CVE-2009-2210 ===================================================================== 1. Summary: Updated seamonkey packages that fix a security issue are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: SeaMonkey is an open source Web browser, email and newsgroup client, IRC chat client, and HTML editor. A flaw was found in the way that SeaMonkey parsed malformed HTML mail messages. If a user opened a specially-crafted HTML mail message, it could cause SeaMonkey to crash or, possibly, to execute arbitrary code as the user running SeaMonkey. (CVE-2009-2210) All SeaMonkey users should upgrade to these updated packages, which correct this issue. After installing the update, SeaMonkey must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 507812 - CVE-2009-2210 Thunderbird mail crash 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.9-0.39.el3.src.rpm i386: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-chat-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-devel-1.0.9-0.39.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.39.el3.i386.rpm seamonkey-mail-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.39.el3.i386.rpm ia64: seamonkey-1.0.9-0.39.el3.ia64.rpm seamonkey-chat-1.0.9-0.39.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.ia64.rpm seamonkey-devel-1.0.9-0.39.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.ia64.rpm seamonkey-mail-1.0.9-0.39.el3.ia64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.ia64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.ia64.rpm ppc: seamonkey-1.0.9-0.39.el3.ppc.rpm seamonkey-chat-1.0.9-0.39.el3.ppc.rpm seamonkey-debuginfo-1.0.9-0.39.el3.ppc.rpm seamonkey-devel-1.0.9-0.39.el3.ppc.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.ppc.rpm seamonkey-js-debugger-1.0.9-0.39.el3.ppc.rpm seamonkey-mail-1.0.9-0.39.el3.ppc.rpm seamonkey-nspr-1.0.9-0.39.el3.ppc.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.ppc.rpm seamonkey-nss-1.0.9-0.39.el3.ppc.rpm seamonkey-nss-devel-1.0.9-0.39.el3.ppc.rpm s390: seamonkey-1.0.9-0.39.el3.s390.rpm seamonkey-chat-1.0.9-0.39.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.39.el3.s390.rpm seamonkey-devel-1.0.9-0.39.el3.s390.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.s390.rpm seamonkey-js-debugger-1.0.9-0.39.el3.s390.rpm seamonkey-mail-1.0.9-0.39.el3.s390.rpm seamonkey-nspr-1.0.9-0.39.el3.s390.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.s390.rpm seamonkey-nss-1.0.9-0.39.el3.s390.rpm seamonkey-nss-devel-1.0.9-0.39.el3.s390.rpm s390x: seamonkey-1.0.9-0.39.el3.s390x.rpm seamonkey-chat-1.0.9-0.39.el3.s390x.rpm seamonkey-debuginfo-1.0.9-0.39.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.39.el3.s390x.rpm seamonkey-devel-1.0.9-0.39.el3.s390x.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.s390x.rpm seamonkey-js-debugger-1.0.9-0.39.el3.s390x.rpm seamonkey-mail-1.0.9-0.39.el3.s390x.rpm seamonkey-nspr-1.0.9-0.39.el3.s390.rpm seamonkey-nspr-1.0.9-0.39.el3.s390x.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.s390x.rpm seamonkey-nss-1.0.9-0.39.el3.s390.rpm seamonkey-nss-1.0.9-0.39.el3.s390x.rpm seamonkey-nss-devel-1.0.9-0.39.el3.s390x.rpm x86_64: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-1.0.9-0.39.el3.x86_64.rpm seamonkey-chat-1.0.9-0.39.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.x86_64.rpm seamonkey-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.x86_64.rpm seamonkey-mail-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.9-0.39.el3.src.rpm i386: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-chat-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-devel-1.0.9-0.39.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.39.el3.i386.rpm seamonkey-mail-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.39.el3.i386.rpm x86_64: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-1.0.9-0.39.el3.x86_64.rpm seamonkey-chat-1.0.9-0.39.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.x86_64.rpm seamonkey-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.x86_64.rpm seamonkey-mail-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.9-0.39.el3.src.rpm i386: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-chat-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-devel-1.0.9-0.39.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.39.el3.i386.rpm seamonkey-mail-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.39.el3.i386.rpm ia64: seamonkey-1.0.9-0.39.el3.ia64.rpm seamonkey-chat-1.0.9-0.39.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.ia64.rpm seamonkey-devel-1.0.9-0.39.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.ia64.rpm seamonkey-mail-1.0.9-0.39.el3.ia64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.ia64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-1.0.9-0.39.el3.x86_64.rpm seamonkey-chat-1.0.9-0.39.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.x86_64.rpm seamonkey-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.x86_64.rpm seamonkey-mail-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.9-0.39.el3.src.rpm i386: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-chat-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-devel-1.0.9-0.39.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.39.el3.i386.rpm seamonkey-mail-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.39.el3.i386.rpm ia64: seamonkey-1.0.9-0.39.el3.ia64.rpm seamonkey-chat-1.0.9-0.39.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.ia64.rpm seamonkey-devel-1.0.9-0.39.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.ia64.rpm seamonkey-mail-1.0.9-0.39.el3.ia64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.ia64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.39.el3.i386.rpm seamonkey-1.0.9-0.39.el3.x86_64.rpm seamonkey-chat-1.0.9-0.39.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.39.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.39.el3.x86_64.rpm seamonkey-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.39.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.39.el3.x86_64.rpm seamonkey-mail-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.39.el3.i386.rpm seamonkey-nspr-1.0.9-0.39.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-1.0.9-0.39.el3.i386.rpm seamonkey-nss-1.0.9-0.39.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.39.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.9-44.el4_8.src.rpm i386: seamonkey-1.0.9-44.el4_8.i386.rpm seamonkey-chat-1.0.9-44.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-44.el4_8.i386.rpm seamonkey-devel-1.0.9-44.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-44.el4_8.i386.rpm seamonkey-mail-1.0.9-44.el4_8.i386.rpm ia64: seamonkey-1.0.9-44.el4_8.ia64.rpm seamonkey-chat-1.0.9-44.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.ia64.rpm seamonkey-devel-1.0.9-44.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.ia64.rpm seamonkey-mail-1.0.9-44.el4_8.ia64.rpm ppc: seamonkey-1.0.9-44.el4_8.ppc.rpm seamonkey-chat-1.0.9-44.el4_8.ppc.rpm seamonkey-debuginfo-1.0.9-44.el4_8.ppc.rpm seamonkey-devel-1.0.9-44.el4_8.ppc.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.ppc.rpm seamonkey-js-debugger-1.0.9-44.el4_8.ppc.rpm seamonkey-mail-1.0.9-44.el4_8.ppc.rpm s390: seamonkey-1.0.9-44.el4_8.s390.rpm seamonkey-chat-1.0.9-44.el4_8.s390.rpm seamonkey-debuginfo-1.0.9-44.el4_8.s390.rpm seamonkey-devel-1.0.9-44.el4_8.s390.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.s390.rpm seamonkey-js-debugger-1.0.9-44.el4_8.s390.rpm seamonkey-mail-1.0.9-44.el4_8.s390.rpm s390x: seamonkey-1.0.9-44.el4_8.s390x.rpm seamonkey-chat-1.0.9-44.el4_8.s390x.rpm seamonkey-debuginfo-1.0.9-44.el4_8.s390x.rpm seamonkey-devel-1.0.9-44.el4_8.s390x.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.s390x.rpm seamonkey-js-debugger-1.0.9-44.el4_8.s390x.rpm seamonkey-mail-1.0.9-44.el4_8.s390x.rpm x86_64: seamonkey-1.0.9-44.el4_8.x86_64.rpm seamonkey-chat-1.0.9-44.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.x86_64.rpm seamonkey-devel-1.0.9-44.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.x86_64.rpm seamonkey-mail-1.0.9-44.el4_8.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.9-44.el4_8.src.rpm i386: seamonkey-1.0.9-44.el4_8.i386.rpm seamonkey-chat-1.0.9-44.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-44.el4_8.i386.rpm seamonkey-devel-1.0.9-44.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-44.el4_8.i386.rpm seamonkey-mail-1.0.9-44.el4_8.i386.rpm x86_64: seamonkey-1.0.9-44.el4_8.x86_64.rpm seamonkey-chat-1.0.9-44.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.x86_64.rpm seamonkey-devel-1.0.9-44.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.x86_64.rpm seamonkey-mail-1.0.9-44.el4_8.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.9-44.el4_8.src.rpm i386: seamonkey-1.0.9-44.el4_8.i386.rpm seamonkey-chat-1.0.9-44.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-44.el4_8.i386.rpm seamonkey-devel-1.0.9-44.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-44.el4_8.i386.rpm seamonkey-mail-1.0.9-44.el4_8.i386.rpm ia64: seamonkey-1.0.9-44.el4_8.ia64.rpm seamonkey-chat-1.0.9-44.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.ia64.rpm seamonkey-devel-1.0.9-44.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.ia64.rpm seamonkey-mail-1.0.9-44.el4_8.ia64.rpm x86_64: seamonkey-1.0.9-44.el4_8.x86_64.rpm seamonkey-chat-1.0.9-44.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.x86_64.rpm seamonkey-devel-1.0.9-44.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.x86_64.rpm seamonkey-mail-1.0.9-44.el4_8.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.9-44.el4_8.src.rpm i386: seamonkey-1.0.9-44.el4_8.i386.rpm seamonkey-chat-1.0.9-44.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-44.el4_8.i386.rpm seamonkey-devel-1.0.9-44.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-44.el4_8.i386.rpm seamonkey-mail-1.0.9-44.el4_8.i386.rpm ia64: seamonkey-1.0.9-44.el4_8.ia64.rpm seamonkey-chat-1.0.9-44.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.ia64.rpm seamonkey-devel-1.0.9-44.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.ia64.rpm seamonkey-mail-1.0.9-44.el4_8.ia64.rpm x86_64: seamonkey-1.0.9-44.el4_8.x86_64.rpm seamonkey-chat-1.0.9-44.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-44.el4_8.x86_64.rpm seamonkey-devel-1.0.9-44.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-44.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-44.el4_8.x86_64.rpm seamonkey-mail-1.0.9-44.el4_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKSig/XlSAg2UNWIIRAkt7AJ9h2Y750KI4hqVCS62tUz4+f/ISxgCdHFFd 8vbBU2ikCbfs9dcCUd52k7c= =wewi -----END PGP SIGNATURE-----