From bugzilla at redhat.com Mon Apr 4 20:24:49 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 4 Apr 2011 14:24:49 -0600 Subject: [RHSA-2011:0412-01] Important: glibc security update Message-ID: <201104042024.p34KOn64006230@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: glibc security update Advisory ID: RHSA-2011:0412-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0412.html Issue date: 2011-04-04 CVE Names: CVE-2010-0296 CVE-2011-0536 CVE-2011-1071 CVE-2011-1095 ===================================================================== 1. Summary: Updated glibc packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contain the standard C and the standard math libraries. Without these two libraries, a Linux system cannot function properly. The fix for CVE-2010-3847 introduced a regression in the way the dynamic loader expanded the $ORIGIN dynamic string token specified in the RPATH and RUNPATH entries in the ELF library header. A local attacker could use this flaw to escalate their privileges via a setuid or setgid program using such a library. (CVE-2011-0536) It was discovered that the glibc addmntent() function did not sanitize its input properly. A local attacker could possibly use this flaw to inject malformed lines into /etc/mtab via certain setuid mount helpers, if the attacker were allowed to mount to an arbitrary directory under their control. (CVE-2010-0296) It was discovered that the glibc fnmatch() function did not properly restrict the use of alloca(). If the function was called on sufficiently large inputs, it could cause an application using fnmatch() to crash or, possibly, execute arbitrary code with the privileges of the application. (CVE-2011-1071) It was discovered that the locale command did not produce properly escaped output as required by the POSIX specification. If an attacker were able to set the locale environment variables in the environment of a script that performed shell evaluation on the output of the locale command, and that script were run with different privileges than the attacker's, it could execute arbitrary code with the privileges of the script. (CVE-2011-1095) All users should upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 559579 - CVE-2010-0296 glibc: Improper encoding of names with certain special character in utilities for writing to mtab table 625893 - CVE-2011-1095 glibc: insufficient quoting in the locale command output 667974 - CVE-2011-0536 glibc: CVE-2010-3847 fix causes linker to search CWD when running privileged program with $ORIGIN in R*PATH 681054 - CVE-2011-1071 glibc: fnmatch() alloca()-based memory corruption flaw 682991 - iconv regression 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/glibc-2.5-58.el5_6.2.src.rpm i386: glibc-2.5-58.el5_6.2.i386.rpm glibc-2.5-58.el5_6.2.i686.rpm glibc-common-2.5-58.el5_6.2.i386.rpm glibc-debuginfo-2.5-58.el5_6.2.i386.rpm glibc-debuginfo-2.5-58.el5_6.2.i686.rpm glibc-debuginfo-common-2.5-58.el5_6.2.i386.rpm glibc-devel-2.5-58.el5_6.2.i386.rpm glibc-headers-2.5-58.el5_6.2.i386.rpm glibc-utils-2.5-58.el5_6.2.i386.rpm nscd-2.5-58.el5_6.2.i386.rpm x86_64: glibc-2.5-58.el5_6.2.i686.rpm glibc-2.5-58.el5_6.2.x86_64.rpm glibc-common-2.5-58.el5_6.2.x86_64.rpm glibc-debuginfo-2.5-58.el5_6.2.i386.rpm glibc-debuginfo-2.5-58.el5_6.2.i686.rpm glibc-debuginfo-2.5-58.el5_6.2.x86_64.rpm glibc-debuginfo-common-2.5-58.el5_6.2.i386.rpm glibc-devel-2.5-58.el5_6.2.i386.rpm glibc-devel-2.5-58.el5_6.2.x86_64.rpm glibc-headers-2.5-58.el5_6.2.x86_64.rpm glibc-utils-2.5-58.el5_6.2.x86_64.rpm nscd-2.5-58.el5_6.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/glibc-2.5-58.el5_6.2.src.rpm i386: glibc-2.5-58.el5_6.2.i386.rpm glibc-2.5-58.el5_6.2.i686.rpm glibc-common-2.5-58.el5_6.2.i386.rpm glibc-debuginfo-2.5-58.el5_6.2.i386.rpm glibc-debuginfo-2.5-58.el5_6.2.i686.rpm glibc-debuginfo-common-2.5-58.el5_6.2.i386.rpm glibc-devel-2.5-58.el5_6.2.i386.rpm glibc-headers-2.5-58.el5_6.2.i386.rpm glibc-utils-2.5-58.el5_6.2.i386.rpm nscd-2.5-58.el5_6.2.i386.rpm ia64: glibc-2.5-58.el5_6.2.i686.rpm glibc-2.5-58.el5_6.2.ia64.rpm glibc-common-2.5-58.el5_6.2.ia64.rpm glibc-debuginfo-2.5-58.el5_6.2.i686.rpm glibc-debuginfo-2.5-58.el5_6.2.ia64.rpm glibc-devel-2.5-58.el5_6.2.ia64.rpm glibc-headers-2.5-58.el5_6.2.ia64.rpm glibc-utils-2.5-58.el5_6.2.ia64.rpm nscd-2.5-58.el5_6.2.ia64.rpm ppc: glibc-2.5-58.el5_6.2.ppc.rpm glibc-2.5-58.el5_6.2.ppc64.rpm glibc-common-2.5-58.el5_6.2.ppc.rpm glibc-debuginfo-2.5-58.el5_6.2.ppc.rpm glibc-debuginfo-2.5-58.el5_6.2.ppc64.rpm glibc-devel-2.5-58.el5_6.2.ppc.rpm glibc-devel-2.5-58.el5_6.2.ppc64.rpm glibc-headers-2.5-58.el5_6.2.ppc.rpm glibc-utils-2.5-58.el5_6.2.ppc.rpm nscd-2.5-58.el5_6.2.ppc.rpm s390x: glibc-2.5-58.el5_6.2.s390.rpm glibc-2.5-58.el5_6.2.s390x.rpm glibc-common-2.5-58.el5_6.2.s390x.rpm glibc-debuginfo-2.5-58.el5_6.2.s390.rpm glibc-debuginfo-2.5-58.el5_6.2.s390x.rpm glibc-devel-2.5-58.el5_6.2.s390.rpm glibc-devel-2.5-58.el5_6.2.s390x.rpm glibc-headers-2.5-58.el5_6.2.s390x.rpm glibc-utils-2.5-58.el5_6.2.s390x.rpm nscd-2.5-58.el5_6.2.s390x.rpm x86_64: glibc-2.5-58.el5_6.2.i686.rpm glibc-2.5-58.el5_6.2.x86_64.rpm glibc-common-2.5-58.el5_6.2.x86_64.rpm glibc-debuginfo-2.5-58.el5_6.2.i386.rpm glibc-debuginfo-2.5-58.el5_6.2.i686.rpm glibc-debuginfo-2.5-58.el5_6.2.x86_64.rpm glibc-debuginfo-common-2.5-58.el5_6.2.i386.rpm glibc-devel-2.5-58.el5_6.2.i386.rpm glibc-devel-2.5-58.el5_6.2.x86_64.rpm glibc-headers-2.5-58.el5_6.2.x86_64.rpm glibc-utils-2.5-58.el5_6.2.x86_64.rpm nscd-2.5-58.el5_6.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-0296.html https://www.redhat.com/security/data/cve/CVE-2011-0536.html https://www.redhat.com/security/data/cve/CVE-2011-1071.html https://www.redhat.com/security/data/cve/CVE-2011-1095.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNmikDXlSAg2UNWIIRAnYoAJ4/Bv3zM3pPsjcUy/+btFN/kad7qwCeIkG1 IicLIvSQr3scDzU3oOunl98= =Apuj -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 4 20:25:24 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 4 Apr 2011 14:25:24 -0600 Subject: [RHSA-2011:0413-01] Important: glibc security update Message-ID: <201104042025.p34KPOIo006819@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: glibc security update Advisory ID: RHSA-2011:0413-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0413.html Issue date: 2011-04-04 CVE Names: CVE-2011-0536 CVE-2011-1071 CVE-2011-1095 ===================================================================== 1. Summary: Updated glibc packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contain the standard C and the standard math libraries. Without these two libraries, a Linux system cannot function properly. The fix for CVE-2010-3847 introduced a regression in the way the dynamic loader expanded the $ORIGIN dynamic string token specified in the RPATH and RUNPATH entries in the ELF library header. A local attacker could use this flaw to escalate their privileges via a setuid or setgid program using such a library. (CVE-2011-0536) It was discovered that the glibc fnmatch() function did not properly restrict the use of alloca(). If the function was called on sufficiently large inputs, it could cause an application using fnmatch() to crash or, possibly, execute arbitrary code with the privileges of the application. (CVE-2011-1071) It was discovered that the locale command did not produce properly escaped output as required by the POSIX specification. If an attacker were able to set the locale environment variables in the environment of a script that performed shell evaluation on the output of the locale command, and that script were run with different privileges than the attacker's, it could execute arbitrary code with the privileges of the script. (CVE-2011-1095) All users should upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 625893 - CVE-2011-1095 glibc: insufficient quoting in the locale command output 667974 - CVE-2011-0536 glibc: CVE-2010-3847 fix causes linker to search CWD when running privileged program with $ORIGIN in R*PATH 681054 - CVE-2011-1071 glibc: fnmatch() alloca()-based memory corruption flaw 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm i386: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-common-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-headers-2.12-1.7.el6_0.5.i686.rpm glibc-utils-2.12-1.7.el6_0.5.i686.rpm nscd-2.12-1.7.el6_0.5.i686.rpm x86_64: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-2.12-1.7.el6_0.5.x86_64.rpm glibc-common-2.12-1.7.el6_0.5.x86_64.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.x86_64.rpm glibc-headers-2.12-1.7.el6_0.5.x86_64.rpm glibc-utils-2.12-1.7.el6_0.5.x86_64.rpm nscd-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm i386: glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-static-2.12-1.7.el6_0.5.i686.rpm x86_64: glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-static-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm x86_64: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-2.12-1.7.el6_0.5.x86_64.rpm glibc-common-2.12-1.7.el6_0.5.x86_64.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.x86_64.rpm glibc-headers-2.12-1.7.el6_0.5.x86_64.rpm glibc-utils-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm x86_64: glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-static-2.12-1.7.el6_0.5.x86_64.rpm nscd-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm i386: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-common-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-headers-2.12-1.7.el6_0.5.i686.rpm glibc-utils-2.12-1.7.el6_0.5.i686.rpm nscd-2.12-1.7.el6_0.5.i686.rpm ppc64: glibc-2.12-1.7.el6_0.5.ppc.rpm glibc-2.12-1.7.el6_0.5.ppc64.rpm glibc-common-2.12-1.7.el6_0.5.ppc64.rpm glibc-debuginfo-2.12-1.7.el6_0.5.ppc.rpm glibc-debuginfo-2.12-1.7.el6_0.5.ppc64.rpm glibc-devel-2.12-1.7.el6_0.5.ppc.rpm glibc-devel-2.12-1.7.el6_0.5.ppc64.rpm glibc-headers-2.12-1.7.el6_0.5.ppc64.rpm glibc-utils-2.12-1.7.el6_0.5.ppc64.rpm nscd-2.12-1.7.el6_0.5.ppc64.rpm s390x: glibc-2.12-1.7.el6_0.5.s390.rpm glibc-2.12-1.7.el6_0.5.s390x.rpm glibc-common-2.12-1.7.el6_0.5.s390x.rpm glibc-debuginfo-2.12-1.7.el6_0.5.s390.rpm glibc-debuginfo-2.12-1.7.el6_0.5.s390x.rpm glibc-devel-2.12-1.7.el6_0.5.s390.rpm glibc-devel-2.12-1.7.el6_0.5.s390x.rpm glibc-headers-2.12-1.7.el6_0.5.s390x.rpm glibc-utils-2.12-1.7.el6_0.5.s390x.rpm nscd-2.12-1.7.el6_0.5.s390x.rpm x86_64: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-2.12-1.7.el6_0.5.x86_64.rpm glibc-common-2.12-1.7.el6_0.5.x86_64.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.x86_64.rpm glibc-headers-2.12-1.7.el6_0.5.x86_64.rpm glibc-utils-2.12-1.7.el6_0.5.x86_64.rpm nscd-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm i386: glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-static-2.12-1.7.el6_0.5.i686.rpm ppc64: glibc-debuginfo-2.12-1.7.el6_0.5.ppc64.rpm glibc-static-2.12-1.7.el6_0.5.ppc64.rpm s390x: glibc-debuginfo-2.12-1.7.el6_0.5.s390x.rpm glibc-static-2.12-1.7.el6_0.5.s390x.rpm x86_64: glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-static-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm i386: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-common-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-headers-2.12-1.7.el6_0.5.i686.rpm glibc-utils-2.12-1.7.el6_0.5.i686.rpm nscd-2.12-1.7.el6_0.5.i686.rpm x86_64: glibc-2.12-1.7.el6_0.5.i686.rpm glibc-2.12-1.7.el6_0.5.x86_64.rpm glibc-common-2.12-1.7.el6_0.5.x86_64.rpm glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-devel-2.12-1.7.el6_0.5.i686.rpm glibc-devel-2.12-1.7.el6_0.5.x86_64.rpm glibc-headers-2.12-1.7.el6_0.5.x86_64.rpm glibc-utils-2.12-1.7.el6_0.5.x86_64.rpm nscd-2.12-1.7.el6_0.5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/glibc-2.12-1.7.el6_0.5.src.rpm i386: glibc-debuginfo-2.12-1.7.el6_0.5.i686.rpm glibc-static-2.12-1.7.el6_0.5.i686.rpm x86_64: glibc-debuginfo-2.12-1.7.el6_0.5.x86_64.rpm glibc-static-2.12-1.7.el6_0.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0536.html https://www.redhat.com/security/data/cve/CVE-2011-1071.html https://www.redhat.com/security/data/cve/CVE-2011-1095.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNmikkXlSAg2UNWIIRAv1EAJ9uG2hO6xCCFIS9dpnWEKjitDHOJQCZAcJY 3t8MMv3YK6ZDukjXTR+jXjc= =BUp7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 4 21:13:58 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 4 Apr 2011 15:13:58 -0600 Subject: [RHSA-2011:0414-01] Important: policycoreutils security update Message-ID: <201104042113.p34LDxlP016433@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: policycoreutils security update Advisory ID: RHSA-2011:0414-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0414.html Issue date: 2011-04-04 CVE Names: CVE-2011-1011 ===================================================================== 1. Summary: Updated policycoreutils packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: The policycoreutils packages contain the core utilities that are required for the basic operation of a Security-Enhanced Linux (SELinux) system and its policies. It was discovered that the seunshare utility did not enforce proper file permissions on the directory used as an alternate temporary directory mounted as /tmp/. A local user could use this flaw to overwrite files or, possibly, execute arbitrary code with the privileges of a setuid or setgid application that relies on proper /tmp/ permissions, by running that application via seunshare. (CVE-2011-1011) Red Hat would like to thank Tavis Ormandy for reporting this issue. This update also introduces the following changes: * The seunshare utility was moved from the main policycoreutils subpackage to the policycoreutils-sandbox subpackage. This utility is only required by the sandbox feature and does not need to be installed by default. * Updated selinux-policy packages that add the SELinux policy changes required by the seunshare fixes. All policycoreutils users should upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 633544 - CVE-2011-1011 policycoreutils: insecure temporary directory handling in seunshare 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/policycoreutils-2.0.83-19.8.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm i386: policycoreutils-2.0.83-19.8.el6_0.i686.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.i686.rpm policycoreutils-gui-2.0.83-19.8.el6_0.i686.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.i686.rpm policycoreutils-python-2.0.83-19.8.el6_0.i686.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.i686.rpm noarch: selinux-policy-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-minimum-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-mls-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-targeted-3.7.19-54.el6_0.5.noarch.rpm x86_64: policycoreutils-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-gui-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-python-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm noarch: selinux-policy-doc-3.7.19-54.el6_0.5.noarch.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/policycoreutils-2.0.83-19.8.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm noarch: selinux-policy-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-minimum-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-mls-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-targeted-3.7.19-54.el6_0.5.noarch.rpm x86_64: policycoreutils-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-python-2.0.83-19.8.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/policycoreutils-2.0.83-19.8.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm noarch: selinux-policy-doc-3.7.19-54.el6_0.5.noarch.rpm x86_64: policycoreutils-debuginfo-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-gui-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/policycoreutils-2.0.83-19.8.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm i386: policycoreutils-2.0.83-19.8.el6_0.i686.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.i686.rpm policycoreutils-gui-2.0.83-19.8.el6_0.i686.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.i686.rpm policycoreutils-python-2.0.83-19.8.el6_0.i686.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.i686.rpm noarch: selinux-policy-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-minimum-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-mls-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-targeted-3.7.19-54.el6_0.5.noarch.rpm ppc64: policycoreutils-2.0.83-19.8.el6_0.ppc64.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.ppc64.rpm policycoreutils-gui-2.0.83-19.8.el6_0.ppc64.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.ppc64.rpm policycoreutils-python-2.0.83-19.8.el6_0.ppc64.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.ppc64.rpm s390x: policycoreutils-2.0.83-19.8.el6_0.s390x.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.s390x.rpm policycoreutils-gui-2.0.83-19.8.el6_0.s390x.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.s390x.rpm policycoreutils-python-2.0.83-19.8.el6_0.s390x.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.s390x.rpm x86_64: policycoreutils-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-gui-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-python-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm noarch: selinux-policy-doc-3.7.19-54.el6_0.5.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/policycoreutils-2.0.83-19.8.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm i386: policycoreutils-2.0.83-19.8.el6_0.i686.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.i686.rpm policycoreutils-gui-2.0.83-19.8.el6_0.i686.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.i686.rpm policycoreutils-python-2.0.83-19.8.el6_0.i686.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.i686.rpm noarch: selinux-policy-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-minimum-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-mls-3.7.19-54.el6_0.5.noarch.rpm selinux-policy-targeted-3.7.19-54.el6_0.5.noarch.rpm x86_64: policycoreutils-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-debuginfo-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-gui-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-newrole-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-python-2.0.83-19.8.el6_0.x86_64.rpm policycoreutils-sandbox-2.0.83-19.8.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/selinux-policy-3.7.19-54.el6_0.5.src.rpm noarch: selinux-policy-doc-3.7.19-54.el6_0.5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1011.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNmjSHXlSAg2UNWIIRAv8GAJ9iOQYE92AU2vd59t4TdkMShty/AQCgiVOY gH3tfL7t+jyY+ANVBjrfoMM= =1M/q -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 6 23:27:18 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 6 Apr 2011 17:27:18 -0600 Subject: [RHSA-2011:0422-01] Moderate: postfix security update Message-ID: <201104062327.p36NRIWJ021873@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: postfix security update Advisory ID: RHSA-2011:0422-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0422.html Issue date: 2011-04-06 CVE Names: CVE-2008-2937 CVE-2011-0411 ===================================================================== 1. Summary: Updated postfix packages that fix two security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), and TLS. It was discovered that Postfix did not flush the received SMTP commands buffer after switching to TLS encryption for an SMTP session. A man-in-the-middle attacker could use this flaw to inject SMTP commands into a victim's session during the plain text phase. This would lead to those commands being processed by Postfix after TLS encryption is enabled, possibly allowing the attacker to steal the victim's mail or authentication credentials. (CVE-2011-0411) It was discovered that Postfix did not properly check the permissions of users' mailbox files. A local attacker able to create files in the mail spool directory could use this flaw to create mailbox files for other local users, and be able to read mail delivered to those users. (CVE-2008-2937) Red Hat would like to thank the CERT/CC for reporting CVE-2011-0411, and Sebastian Krahmer of the SuSE Security Team for reporting CVE-2008-2937. The CERT/CC acknowledges Wietse Venema as the original reporter of CVE-2011-0411. Users of Postfix are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. After installing this update, the postfix service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 456347 - CVE-2008-2937 postfix improper mailbox permissions 674814 - CVE-2011-0411 postfix: SMTP commands injection during plaintext to TLS session switch 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/postfix-2.2.10-1.4.el4.src.rpm i386: postfix-2.2.10-1.4.el4.i386.rpm postfix-debuginfo-2.2.10-1.4.el4.i386.rpm postfix-pflogsumm-2.2.10-1.4.el4.i386.rpm ia64: postfix-2.2.10-1.4.el4.ia64.rpm postfix-debuginfo-2.2.10-1.4.el4.ia64.rpm postfix-pflogsumm-2.2.10-1.4.el4.ia64.rpm ppc: postfix-2.2.10-1.4.el4.ppc.rpm postfix-debuginfo-2.2.10-1.4.el4.ppc.rpm postfix-pflogsumm-2.2.10-1.4.el4.ppc.rpm s390: postfix-2.2.10-1.4.el4.s390.rpm postfix-debuginfo-2.2.10-1.4.el4.s390.rpm postfix-pflogsumm-2.2.10-1.4.el4.s390.rpm s390x: postfix-2.2.10-1.4.el4.s390x.rpm postfix-debuginfo-2.2.10-1.4.el4.s390x.rpm postfix-pflogsumm-2.2.10-1.4.el4.s390x.rpm x86_64: postfix-2.2.10-1.4.el4.x86_64.rpm postfix-debuginfo-2.2.10-1.4.el4.x86_64.rpm postfix-pflogsumm-2.2.10-1.4.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/postfix-2.2.10-1.4.el4.src.rpm i386: postfix-2.2.10-1.4.el4.i386.rpm postfix-debuginfo-2.2.10-1.4.el4.i386.rpm postfix-pflogsumm-2.2.10-1.4.el4.i386.rpm x86_64: postfix-2.2.10-1.4.el4.x86_64.rpm postfix-debuginfo-2.2.10-1.4.el4.x86_64.rpm postfix-pflogsumm-2.2.10-1.4.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/postfix-2.2.10-1.4.el4.src.rpm i386: postfix-2.2.10-1.4.el4.i386.rpm postfix-debuginfo-2.2.10-1.4.el4.i386.rpm postfix-pflogsumm-2.2.10-1.4.el4.i386.rpm ia64: postfix-2.2.10-1.4.el4.ia64.rpm postfix-debuginfo-2.2.10-1.4.el4.ia64.rpm postfix-pflogsumm-2.2.10-1.4.el4.ia64.rpm x86_64: postfix-2.2.10-1.4.el4.x86_64.rpm postfix-debuginfo-2.2.10-1.4.el4.x86_64.rpm postfix-pflogsumm-2.2.10-1.4.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/postfix-2.2.10-1.4.el4.src.rpm i386: postfix-2.2.10-1.4.el4.i386.rpm postfix-debuginfo-2.2.10-1.4.el4.i386.rpm postfix-pflogsumm-2.2.10-1.4.el4.i386.rpm ia64: postfix-2.2.10-1.4.el4.ia64.rpm postfix-debuginfo-2.2.10-1.4.el4.ia64.rpm postfix-pflogsumm-2.2.10-1.4.el4.ia64.rpm x86_64: postfix-2.2.10-1.4.el4.x86_64.rpm postfix-debuginfo-2.2.10-1.4.el4.x86_64.rpm postfix-pflogsumm-2.2.10-1.4.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/postfix-2.3.3-2.2.el5_6.src.rpm i386: postfix-2.3.3-2.2.el5_6.i386.rpm postfix-debuginfo-2.3.3-2.2.el5_6.i386.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.i386.rpm x86_64: postfix-2.3.3-2.2.el5_6.x86_64.rpm postfix-debuginfo-2.3.3-2.2.el5_6.x86_64.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/postfix-2.3.3-2.2.el5_6.src.rpm i386: postfix-2.3.3-2.2.el5_6.i386.rpm postfix-debuginfo-2.3.3-2.2.el5_6.i386.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.i386.rpm ia64: postfix-2.3.3-2.2.el5_6.ia64.rpm postfix-debuginfo-2.3.3-2.2.el5_6.ia64.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.ia64.rpm ppc: postfix-2.3.3-2.2.el5_6.ppc.rpm postfix-debuginfo-2.3.3-2.2.el5_6.ppc.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.ppc.rpm s390x: postfix-2.3.3-2.2.el5_6.s390x.rpm postfix-debuginfo-2.3.3-2.2.el5_6.s390x.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.s390x.rpm x86_64: postfix-2.3.3-2.2.el5_6.x86_64.rpm postfix-debuginfo-2.3.3-2.2.el5_6.x86_64.rpm postfix-pflogsumm-2.3.3-2.2.el5_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2008-2937.html https://www.redhat.com/security/data/cve/CVE-2011-0411.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNnPbAXlSAg2UNWIIRArp6AJ0QaAiUj8euquMa5ssoLu72AwGdfACfUnDs h6aMFlOrO0VzXAvy1BPA5UE= =ozOT -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 6 23:27:59 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 6 Apr 2011 17:27:59 -0600 Subject: [RHSA-2011:0423-01] Moderate: postfix security update Message-ID: <201104062327.p36NRxcm002739@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: postfix security update Advisory ID: RHSA-2011:0423-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0423.html Issue date: 2011-04-06 CVE Names: CVE-2011-0411 ===================================================================== 1. Summary: Updated postfix packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), and TLS. It was discovered that Postfix did not flush the received SMTP commands buffer after switching to TLS encryption for an SMTP session. A man-in-the-middle attacker could use this flaw to inject SMTP commands into a victim's session during the plain text phase. This would lead to those commands being processed by Postfix after TLS encryption is enabled, possibly allowing the attacker to steal the victim's mail or authentication credentials. (CVE-2011-0411) Red Hat would like to thank the CERT/CC for reporting CVE-2011-0411. The CERT/CC acknowledges Wietse Venema as the original reporter. Users of Postfix are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the postfix service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 674814 - CVE-2011-0411 postfix: SMTP commands injection during plaintext to TLS session switch 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm i386: postfix-2.6.6-2.1.el6_0.i686.rpm postfix-debuginfo-2.6.6-2.1.el6_0.i686.rpm x86_64: postfix-2.6.6-2.1.el6_0.x86_64.rpm postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm i386: postfix-debuginfo-2.6.6-2.1.el6_0.i686.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.i686.rpm x86_64: postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm x86_64: postfix-2.6.6-2.1.el6_0.x86_64.rpm postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm x86_64: postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm i386: postfix-2.6.6-2.1.el6_0.i686.rpm postfix-debuginfo-2.6.6-2.1.el6_0.i686.rpm ppc64: postfix-2.6.6-2.1.el6_0.ppc64.rpm postfix-debuginfo-2.6.6-2.1.el6_0.ppc64.rpm s390x: postfix-2.6.6-2.1.el6_0.s390x.rpm postfix-debuginfo-2.6.6-2.1.el6_0.s390x.rpm x86_64: postfix-2.6.6-2.1.el6_0.x86_64.rpm postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm i386: postfix-debuginfo-2.6.6-2.1.el6_0.i686.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.i686.rpm ppc64: postfix-debuginfo-2.6.6-2.1.el6_0.ppc64.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.ppc64.rpm s390x: postfix-debuginfo-2.6.6-2.1.el6_0.s390x.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.s390x.rpm x86_64: postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm i386: postfix-2.6.6-2.1.el6_0.i686.rpm postfix-debuginfo-2.6.6-2.1.el6_0.i686.rpm x86_64: postfix-2.6.6-2.1.el6_0.x86_64.rpm postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/postfix-2.6.6-2.1.el6_0.src.rpm i386: postfix-debuginfo-2.6.6-2.1.el6_0.i686.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.i686.rpm x86_64: postfix-debuginfo-2.6.6-2.1.el6_0.x86_64.rpm postfix-perl-scripts-2.6.6-2.1.el6_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0411.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNnPbmXlSAg2UNWIIRArjjAJ9no1IivbfjzXL6NQTi1NKVP9DorACgi5Yq OAjkNbu7ke3ZJ1IxJOJbCyo= =timm -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 7 22:21:55 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 7 Apr 2011 16:21:55 -0600 Subject: [RHSA-2011:0426-01] Moderate: spice-xpi security update Message-ID: <201104072221.p37MLt1n010105@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: spice-xpi security update Advisory ID: RHSA-2011:0426-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0426.html Issue date: 2011-04-07 CVE Names: CVE-2011-0012 CVE-2011-1179 ===================================================================== 1. Summary: An updated spice-xpi package that fixes two security issues is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor, or on Red Hat Enterprise Virtualization Hypervisor. The spice-xpi package provides a plug-in that allows the SPICE client to run from within Mozilla Firefox. An uninitialized pointer use flaw was found in the SPICE Firefox plug-in. If a user were tricked into visiting a malicious web page with Firefox while the SPICE plug-in was enabled, it could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-1179) It was found that the SPICE Firefox plug-in used a predictable name for one of its log files. A local attacker could use this flaw to conduct a symbolic link attack, allowing them to overwrite arbitrary files accessible to the user running Firefox. (CVE-2011-0012) Users of spice-xpi should upgrade to this updated package, which contains backported patches to correct these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 639869 - CVE-2011-0012 spice-xpi: symlink attack on usbrdrctl log file 689931 - CVE-2011-1179 spice-xpi: unitialized pointer writes possible when getting plugin properties 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/spice-xpi-2.4-1.el6_0.2.src.rpm i386: spice-xpi-2.4-1.el6_0.2.i686.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.i686.rpm x86_64: spice-xpi-2.4-1.el6_0.2.x86_64.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/spice-xpi-2.4-1.el6_0.2.src.rpm x86_64: spice-xpi-2.4-1.el6_0.2.x86_64.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/spice-xpi-2.4-1.el6_0.2.src.rpm i386: spice-xpi-2.4-1.el6_0.2.i686.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.i686.rpm x86_64: spice-xpi-2.4-1.el6_0.2.x86_64.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/spice-xpi-2.4-1.el6_0.2.src.rpm i386: spice-xpi-2.4-1.el6_0.2.i686.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.i686.rpm x86_64: spice-xpi-2.4-1.el6_0.2.x86_64.rpm spice-xpi-debuginfo-2.4-1.el6_0.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0012.html https://www.redhat.com/security/data/cve/CVE-2011-1179.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNnjjzXlSAg2UNWIIRAmv/AKCGceDvQ9NsYf70tofzqJ1w/RuGagCff8WO efKpyjm+3gc/sohVKOSvEfE= =Smwx -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 7 22:22:20 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 7 Apr 2011 16:22:20 -0600 Subject: [RHSA-2011:0427-01] Moderate: spice-xpi security update Message-ID: <201104072222.p37MMKls006884@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: spice-xpi security update Advisory ID: RHSA-2011:0427-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0427.html Issue date: 2011-04-07 CVE Names: CVE-2011-1179 ===================================================================== 1. Summary: An updated spice-xpi package that fixes one security issue is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor, or on Red Hat Enterprise Virtualization Hypervisor. The spice-xpi package provides a plug-in that allows the SPICE client to run from within Mozilla Firefox. An uninitialized pointer use flaw was found in the SPICE Firefox plug-in. If a user were tricked into visiting a malicious web page with Firefox while the SPICE plug-in was enabled, it could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-1179) Users of spice-xpi should upgrade to this updated package, which contains a backported patch to correct this issue. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 689931 - CVE-2011-1179 spice-xpi: unitialized pointer writes possible when getting plugin properties 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/spice-xpi-2.2-2.3.el5_6.1.src.rpm i386: spice-xpi-2.2-2.3.el5_6.1.i386.rpm spice-xpi-debuginfo-2.2-2.3.el5_6.1.i386.rpm x86_64: spice-xpi-2.2-2.3.el5_6.1.x86_64.rpm spice-xpi-debuginfo-2.2-2.3.el5_6.1.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/spice-xpi-2.2-2.3.el5_6.1.src.rpm i386: spice-xpi-2.2-2.3.el5_6.1.i386.rpm spice-xpi-debuginfo-2.2-2.3.el5_6.1.i386.rpm x86_64: spice-xpi-2.2-2.3.el5_6.1.x86_64.rpm spice-xpi-debuginfo-2.2-2.3.el5_6.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1179.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNnjkNXlSAg2UNWIIRAg8GAKCW9L8vkDyP+EGx6ZtpVoo4e4Il/QCfc4up gkUmaEhRXc0k7kbnnPlFWjw= =i09u -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 8 03:01:31 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 7 Apr 2011 21:01:31 -0600 Subject: [RHSA-2011:0421-01] Important: kernel security and bug fix update Message-ID: <201104080301.p3831VIV022242@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2011:0421-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0421.html Issue date: 2011-04-07 CVE Names: CVE-2010-3296 CVE-2010-4346 CVE-2010-4526 CVE-2010-4648 CVE-2010-4655 CVE-2010-4656 CVE-2011-0521 CVE-2011-0695 CVE-2011-0710 CVE-2011-0716 CVE-2011-1478 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A flaw was found in the sctp_icmp_proto_unreachable() function in the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation. A remote attacker could use this flaw to cause a denial of service. (CVE-2010-4526, Important) * A missing boundary check was found in the dvb_ca_ioctl() function in the Linux kernel's av7110 module. On systems that use old DVB cards that require the av7110 module, a local, unprivileged user could use this flaw to cause a denial of service or escalate their privileges. (CVE-2011-0521, Important) * A race condition was found in the way the Linux kernel's InfiniBand implementation set up new connections. This could allow a remote user to cause a denial of service. (CVE-2011-0695, Important) * A heap overflow flaw in the iowarrior_write() function could allow a user with access to an IO-Warrior USB device, that supports more than 8 bytes per report, to cause a denial of service or escalate their privileges. (CVE-2010-4656, Moderate) * A flaw was found in the way the Linux Ethernet bridge implementation handled certain IGMP (Internet Group Management Protocol) packets. A local, unprivileged user on a system that has a network interface in an Ethernet bridge could use this flaw to crash that system. (CVE-2011-0716, Moderate) * A NULL pointer dereference flaw was found in the Generic Receive Offload (GRO) functionality in the Linux kernel's networking implementation. If both GRO and promiscuous mode were enabled on an interface in a virtual LAN (VLAN), it could result in a denial of service when a malformed VLAN frame is received on that interface. (CVE-2011-1478, Moderate) * A missing initialization flaw in the Linux kernel could lead to an information leak. (CVE-2010-3296, Low) * A missing security check in the Linux kernel's implementation of the install_special_mapping() function could allow a local, unprivileged user to bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low) * A logic error in the orinoco_ioctl_set_auth() function in the Linux kernel's ORiNOCO wireless extensions support implementation could render TKIP countermeasures ineffective when it is enabled, as it enabled the card instead of shutting it down. (CVE-2010-4648, Low) * A missing initialization flaw was found in the ethtool_get_regs() function in the Linux kernel's ethtool IOCTL handler. A local user who has the CAP_NET_ADMIN capability could use this flaw to cause an information leak. (CVE-2010-4655, Low) * An information leak was found in the Linux kernel's task_show_regs() implementation. On IBM S/390 systems, a local, unprivileged user could use this flaw to read /proc/[PID]/status files, allowing them to discover the CPU register values of processes. (CVE-2011-0710, Low) Red Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695; Kees Cook for reporting CVE-2010-4656 and CVE-2010-4655; Dan Rosenberg for reporting CVE-2010-3296; and Tavis Ormandy for reporting CVE-2010-4346. This update also fixes several bugs. Documentation for these bug fixes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to correct these issues, and fix the bugs noted in the Technical Notes. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 633149 - CVE-2010-3296 kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory 653648 - CVE-2011-0695 kernel: panic in ib_cm:cm_work_handler 662189 - CVE-2010-4346 kernel: install_special_mapping skips security_file_mmap check 664914 - CVE-2010-4526 kernel: sctp: a race between ICMP protocol unreachable and connect() 667907 - CVE-2010-4648 kernel: orinoco: fix TKIP countermeasure behaviour 672398 - CVE-2011-0521 kernel: av7110 negative array offset 672420 - CVE-2010-4656 kernel: iowarrior usb device heap overflow 672428 - CVE-2010-4655 kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl 677850 - CVE-2011-0710 kernel: s390 task_show_regs infoleak 678169 - CVE-2011-0716 kernel: deficiency in processing igmp host membership reports in br_multicast 678558 - virtio_console driver never returns from selecting for write when the queue is full [rhel-6.0.z] 678559 - Disallow 0-sized writes to virtio ports to go through to host (leading to VM crash) [rhel-6.0.z] 678562 - writing to a virtio serial port while no one is listening on the host side hangs the guest [rhel-6.0.z] 680080 - Start multi RHEL5.5 64 bit guests triggers rtl8169_interrupt hang [rhel-6.0.z] 683442 - backport set_iounmap_nonlazy() to speedup reading of /proc/vmcore [rhel-6.0.z] 683445 - Backport upstream cacheing fix for optimizing reads from /proc/vmcore [rhel-6.0.z] 683781 - kvm: guest stale memory after migration [rhel-6.0.z] 683783 - guest kernel panic when boot with nmi_watchdog=1 [rhel-6.0.z] 683822 - kernel: restrict unprivileged access to kernel syslog [rhel-6.1] [rhel-6.0.z] 684267 - kernel: missing CONFIG_STRICT_DEVMEM=y in S390x [rhel-6.0.z] 684268 - virtio_net: missing schedule on oom [rhel-6.0.z] 691270 - CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-71.24.1.el6.src.rpm i386: kernel-2.6.32-71.24.1.el6.i686.rpm kernel-debug-2.6.32-71.24.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm kernel-devel-2.6.32-71.24.1.el6.i686.rpm kernel-headers-2.6.32-71.24.1.el6.i686.rpm noarch: kernel-doc-2.6.32-71.24.1.el6.noarch.rpm kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm perf-2.6.32-71.24.1.el6.noarch.rpm x86_64: kernel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-71.24.1.el6.src.rpm noarch: kernel-doc-2.6.32-71.24.1.el6.noarch.rpm kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm perf-2.6.32-71.24.1.el6.noarch.rpm x86_64: kernel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-71.24.1.el6.src.rpm i386: kernel-2.6.32-71.24.1.el6.i686.rpm kernel-debug-2.6.32-71.24.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm kernel-devel-2.6.32-71.24.1.el6.i686.rpm kernel-headers-2.6.32-71.24.1.el6.i686.rpm noarch: kernel-doc-2.6.32-71.24.1.el6.noarch.rpm kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm perf-2.6.32-71.24.1.el6.noarch.rpm ppc64: kernel-2.6.32-71.24.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-71.24.1.el6.ppc64.rpm kernel-debug-2.6.32-71.24.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-71.24.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-71.24.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-71.24.1.el6.ppc64.rpm kernel-devel-2.6.32-71.24.1.el6.ppc64.rpm kernel-headers-2.6.32-71.24.1.el6.ppc64.rpm s390x: kernel-2.6.32-71.24.1.el6.s390x.rpm kernel-debug-2.6.32-71.24.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.s390x.rpm kernel-debug-devel-2.6.32-71.24.1.el6.s390x.rpm kernel-debuginfo-2.6.32-71.24.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-71.24.1.el6.s390x.rpm kernel-devel-2.6.32-71.24.1.el6.s390x.rpm kernel-headers-2.6.32-71.24.1.el6.s390x.rpm kernel-kdump-2.6.32-71.24.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-71.24.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-71.24.1.el6.s390x.rpm x86_64: kernel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-71.24.1.el6.src.rpm i386: kernel-2.6.32-71.24.1.el6.i686.rpm kernel-debug-2.6.32-71.24.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm kernel-devel-2.6.32-71.24.1.el6.i686.rpm kernel-headers-2.6.32-71.24.1.el6.i686.rpm noarch: kernel-doc-2.6.32-71.24.1.el6.noarch.rpm kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm perf-2.6.32-71.24.1.el6.noarch.rpm x86_64: kernel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-3296.html https://www.redhat.com/security/data/cve/CVE-2010-4346.html https://www.redhat.com/security/data/cve/CVE-2010-4526.html https://www.redhat.com/security/data/cve/CVE-2010-4648.html https://www.redhat.com/security/data/cve/CVE-2010-4655.html https://www.redhat.com/security/data/cve/CVE-2010-4656.html https://www.redhat.com/security/data/cve/CVE-2011-0521.html https://www.redhat.com/security/data/cve/CVE-2011-0695.html https://www.redhat.com/security/data/cve/CVE-2011-0710.html https://www.redhat.com/security/data/cve/CVE-2011-0716.html https://www.redhat.com/security/data/cve/CVE-2011-1478.html https://access.redhat.com/security/updates/classification/#important http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0421 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNnnnmXlSAg2UNWIIRAokpAJ47T5eKfpAoUk690nWwJe4hja5HKACfccAt 3GRPKwf17XCubve3Nh9UxFU= =2lM4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 8 14:44:19 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 8 Apr 2011 16:44:19 +0200 Subject: [RHSA-2011:0428-01] Important: dhcp security update Message-ID: <201104081444.p38EiJAW026015@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: dhcp security update Advisory ID: RHSA-2011:0428-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0428.html Issue date: 2011-04-08 CVE Names: CVE-2011-0997 ===================================================================== 1. Summary: Updated dhcp packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. It was discovered that the DHCP client daemon, dhclient, did not sufficiently sanitize certain options provided in DHCP server replies, such as the client hostname. A malicious DHCP server could send such an option with a specially-crafted value to a DHCP client. If this option's value was saved on the client system, and then later insecurely evaluated by a process that assumes the option is trusted, it could lead to arbitrary code execution with the privileges of that process. (CVE-2011-0997) Red Hat would like to thank Sebastian Krahmer of the SuSE Security Team for reporting this issue. All dhclient users should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 689832 - CVE-2011-0997 dhclient: insufficient sanitization of certain DHCP response values 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/dhcp-3.0.1-67.el4.src.rpm i386: dhclient-3.0.1-67.el4.i386.rpm dhcp-3.0.1-67.el4.i386.rpm dhcp-debuginfo-3.0.1-67.el4.i386.rpm dhcp-devel-3.0.1-67.el4.i386.rpm ia64: dhclient-3.0.1-67.el4.ia64.rpm dhcp-3.0.1-67.el4.ia64.rpm dhcp-debuginfo-3.0.1-67.el4.ia64.rpm dhcp-devel-3.0.1-67.el4.ia64.rpm ppc: dhclient-3.0.1-67.el4.ppc.rpm dhcp-3.0.1-67.el4.ppc.rpm dhcp-debuginfo-3.0.1-67.el4.ppc.rpm dhcp-devel-3.0.1-67.el4.ppc.rpm s390: dhclient-3.0.1-67.el4.s390.rpm dhcp-3.0.1-67.el4.s390.rpm dhcp-debuginfo-3.0.1-67.el4.s390.rpm dhcp-devel-3.0.1-67.el4.s390.rpm s390x: dhclient-3.0.1-67.el4.s390x.rpm dhcp-3.0.1-67.el4.s390x.rpm dhcp-debuginfo-3.0.1-67.el4.s390x.rpm dhcp-devel-3.0.1-67.el4.s390x.rpm x86_64: dhclient-3.0.1-67.el4.x86_64.rpm dhcp-3.0.1-67.el4.x86_64.rpm dhcp-debuginfo-3.0.1-67.el4.x86_64.rpm dhcp-devel-3.0.1-67.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/dhcp-3.0.1-67.el4.src.rpm i386: dhclient-3.0.1-67.el4.i386.rpm dhcp-3.0.1-67.el4.i386.rpm dhcp-debuginfo-3.0.1-67.el4.i386.rpm dhcp-devel-3.0.1-67.el4.i386.rpm x86_64: dhclient-3.0.1-67.el4.x86_64.rpm dhcp-3.0.1-67.el4.x86_64.rpm dhcp-debuginfo-3.0.1-67.el4.x86_64.rpm dhcp-devel-3.0.1-67.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/dhcp-3.0.1-67.el4.src.rpm i386: dhclient-3.0.1-67.el4.i386.rpm dhcp-3.0.1-67.el4.i386.rpm dhcp-debuginfo-3.0.1-67.el4.i386.rpm dhcp-devel-3.0.1-67.el4.i386.rpm ia64: dhclient-3.0.1-67.el4.ia64.rpm dhcp-3.0.1-67.el4.ia64.rpm dhcp-debuginfo-3.0.1-67.el4.ia64.rpm dhcp-devel-3.0.1-67.el4.ia64.rpm x86_64: dhclient-3.0.1-67.el4.x86_64.rpm dhcp-3.0.1-67.el4.x86_64.rpm dhcp-debuginfo-3.0.1-67.el4.x86_64.rpm dhcp-devel-3.0.1-67.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/dhcp-3.0.1-67.el4.src.rpm i386: dhclient-3.0.1-67.el4.i386.rpm dhcp-3.0.1-67.el4.i386.rpm dhcp-debuginfo-3.0.1-67.el4.i386.rpm dhcp-devel-3.0.1-67.el4.i386.rpm ia64: dhclient-3.0.1-67.el4.ia64.rpm dhcp-3.0.1-67.el4.ia64.rpm dhcp-debuginfo-3.0.1-67.el4.ia64.rpm dhcp-devel-3.0.1-67.el4.ia64.rpm x86_64: dhclient-3.0.1-67.el4.x86_64.rpm dhcp-3.0.1-67.el4.x86_64.rpm dhcp-debuginfo-3.0.1-67.el4.x86_64.rpm dhcp-devel-3.0.1-67.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dhcp-3.0.5-23.el5_6.4.src.rpm i386: dhclient-3.0.5-23.el5_6.4.i386.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-3.0.5-23.el5_6.4.i386.rpm x86_64: dhclient-3.0.5-23.el5_6.4.x86_64.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.i386.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.x86_64.rpm libdhcp4client-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-3.0.5-23.el5_6.4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dhcp-3.0.5-23.el5_6.4.src.rpm i386: dhcp-3.0.5-23.el5_6.4.i386.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.i386.rpm dhcp-devel-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.i386.rpm x86_64: dhcp-3.0.5-23.el5_6.4.x86_64.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.i386.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.x86_64.rpm dhcp-devel-3.0.5-23.el5_6.4.i386.rpm dhcp-devel-3.0.5-23.el5_6.4.x86_64.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/dhcp-3.0.5-23.el5_6.4.src.rpm i386: dhclient-3.0.5-23.el5_6.4.i386.rpm dhcp-3.0.5-23.el5_6.4.i386.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.i386.rpm dhcp-devel-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.i386.rpm ia64: dhclient-3.0.5-23.el5_6.4.ia64.rpm dhcp-3.0.5-23.el5_6.4.ia64.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.ia64.rpm dhcp-devel-3.0.5-23.el5_6.4.ia64.rpm libdhcp4client-3.0.5-23.el5_6.4.ia64.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.ia64.rpm ppc: dhclient-3.0.5-23.el5_6.4.ppc.rpm dhcp-3.0.5-23.el5_6.4.ppc.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.ppc.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.ppc64.rpm dhcp-devel-3.0.5-23.el5_6.4.ppc.rpm dhcp-devel-3.0.5-23.el5_6.4.ppc64.rpm libdhcp4client-3.0.5-23.el5_6.4.ppc.rpm libdhcp4client-3.0.5-23.el5_6.4.ppc64.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.ppc.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.ppc64.rpm s390x: dhclient-3.0.5-23.el5_6.4.s390x.rpm dhcp-3.0.5-23.el5_6.4.s390x.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.s390.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.s390x.rpm dhcp-devel-3.0.5-23.el5_6.4.s390.rpm dhcp-devel-3.0.5-23.el5_6.4.s390x.rpm libdhcp4client-3.0.5-23.el5_6.4.s390.rpm libdhcp4client-3.0.5-23.el5_6.4.s390x.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.s390.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.s390x.rpm x86_64: dhclient-3.0.5-23.el5_6.4.x86_64.rpm dhcp-3.0.5-23.el5_6.4.x86_64.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.i386.rpm dhcp-debuginfo-3.0.5-23.el5_6.4.x86_64.rpm dhcp-devel-3.0.5-23.el5_6.4.i386.rpm dhcp-devel-3.0.5-23.el5_6.4.x86_64.rpm libdhcp4client-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-3.0.5-23.el5_6.4.x86_64.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.i386.rpm libdhcp4client-devel-3.0.5-23.el5_6.4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm i386: dhclient-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm x86_64: dhclient-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm i386: dhcp-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm x86_64: dhcp-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm x86_64: dhclient-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm x86_64: dhcp-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm i386: dhclient-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm ppc64: dhclient-4.1.1-12.P1.el6_0.4.ppc64.rpm dhcp-4.1.1-12.P1.el6_0.4.ppc64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.ppc64.rpm s390x: dhclient-4.1.1-12.P1.el6_0.4.s390x.rpm dhcp-4.1.1-12.P1.el6_0.4.s390x.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.s390x.rpm x86_64: dhclient-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm i386: dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm ppc64: dhcp-debuginfo-4.1.1-12.P1.el6_0.4.ppc.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.ppc64.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.ppc.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.ppc64.rpm s390x: dhcp-debuginfo-4.1.1-12.P1.el6_0.4.s390.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.s390x.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.s390.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.s390x.rpm x86_64: dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm i386: dhclient-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm x86_64: dhclient-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dhcp-4.1.1-12.P1.el6_0.4.src.rpm i386: dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm x86_64: dhcp-debuginfo-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-debuginfo-4.1.1-12.P1.el6_0.4.x86_64.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm dhcp-devel-4.1.1-12.P1.el6_0.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0997.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNnx7WXlSAg2UNWIIRAhlkAJ9c0MQUo/aMNHgRaO1bV1RI1cqspgCcCcXS z+A170Jytnc7x+qVUeeBHxM= =GE+9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 11 20:27:40 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 11 Apr 2011 14:27:40 -0600 Subject: [RHSA-2011:0432-01] Moderate: xorg-x11 security update Message-ID: <201104112027.p3BKRfIp021515@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: xorg-x11 security update Advisory ID: RHSA-2011:0432-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0432.html Issue date: 2011-04-11 CVE Names: CVE-2011-0465 ===================================================================== 1. Summary: Updated xorg-x11 packages that fix one security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. A flaw was found in the X.Org X server resource database utility, xrdb. Certain variables were not properly sanitized during the launch of a user's graphical session, which could possibly allow a remote attacker to execute arbitrary code with root privileges, if they were able to make the display manager execute xrdb with a specially-crafted X client hostname. For example, by configuring the hostname on the target system via a crafted DHCP reply, or by using the X Display Manager Control Protocol (XDMCP) to connect to that system from a host that has a special DNS name. (CVE-2011-0465) Red Hat would like to thank Matthieu Herrb for reporting this issue. Upstream acknowledges Sebastian Krahmer of the SuSE Security Team as the original reporter. Users of xorg-x11 should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running X.Org server instances must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 680196 - CVE-2011-0465 xorg: xrdb code execution via crafted X client hostname 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.67.src.rpm i386: xorg-x11-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.67.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-doc-6.8.2-1.EL.67.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-sdk-6.8.2-1.EL.67.i386.rpm xorg-x11-tools-6.8.2-1.EL.67.i386.rpm xorg-x11-twm-6.8.2-1.EL.67.i386.rpm xorg-x11-xauth-6.8.2-1.EL.67.i386.rpm xorg-x11-xdm-6.8.2-1.EL.67.i386.rpm xorg-x11-xfs-6.8.2-1.EL.67.i386.rpm ia64: xorg-x11-6.8.2-1.EL.67.ia64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.ia64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.ia64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.ia64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.ia64.rpm xorg-x11-devel-6.8.2-1.EL.67.ia64.rpm xorg-x11-doc-6.8.2-1.EL.67.ia64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.ia64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.ia64.rpm xorg-x11-sdk-6.8.2-1.EL.67.ia64.rpm xorg-x11-tools-6.8.2-1.EL.67.ia64.rpm xorg-x11-twm-6.8.2-1.EL.67.ia64.rpm xorg-x11-xauth-6.8.2-1.EL.67.ia64.rpm xorg-x11-xdm-6.8.2-1.EL.67.ia64.rpm xorg-x11-xfs-6.8.2-1.EL.67.ia64.rpm ppc: xorg-x11-6.8.2-1.EL.67.ppc.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.ppc.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.ppc64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.ppc.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.ppc64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.ppc.rpm xorg-x11-Xnest-6.8.2-1.EL.67.ppc.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.ppc.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.ppc.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.ppc64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.ppc.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.ppc64.rpm xorg-x11-devel-6.8.2-1.EL.67.ppc.rpm xorg-x11-devel-6.8.2-1.EL.67.ppc64.rpm xorg-x11-doc-6.8.2-1.EL.67.ppc.rpm xorg-x11-font-utils-6.8.2-1.EL.67.ppc.rpm xorg-x11-libs-6.8.2-1.EL.67.ppc.rpm xorg-x11-libs-6.8.2-1.EL.67.ppc64.rpm xorg-x11-sdk-6.8.2-1.EL.67.ppc.rpm xorg-x11-tools-6.8.2-1.EL.67.ppc.rpm xorg-x11-twm-6.8.2-1.EL.67.ppc.rpm xorg-x11-xauth-6.8.2-1.EL.67.ppc.rpm xorg-x11-xdm-6.8.2-1.EL.67.ppc.rpm xorg-x11-xfs-6.8.2-1.EL.67.ppc.rpm s390: xorg-x11-6.8.2-1.EL.67.s390.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.s390.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.s390.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.s390.rpm xorg-x11-Xnest-6.8.2-1.EL.67.s390.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.s390.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.s390.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.s390.rpm xorg-x11-devel-6.8.2-1.EL.67.s390.rpm xorg-x11-font-utils-6.8.2-1.EL.67.s390.rpm xorg-x11-libs-6.8.2-1.EL.67.s390.rpm xorg-x11-tools-6.8.2-1.EL.67.s390.rpm xorg-x11-twm-6.8.2-1.EL.67.s390.rpm xorg-x11-xauth-6.8.2-1.EL.67.s390.rpm xorg-x11-xdm-6.8.2-1.EL.67.s390.rpm xorg-x11-xfs-6.8.2-1.EL.67.s390.rpm s390x: xorg-x11-6.8.2-1.EL.67.s390x.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.s390.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.s390x.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.s390.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.s390x.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.s390x.rpm xorg-x11-Xnest-6.8.2-1.EL.67.s390x.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.s390x.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.s390.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.s390x.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.s390.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.s390x.rpm xorg-x11-devel-6.8.2-1.EL.67.s390.rpm xorg-x11-devel-6.8.2-1.EL.67.s390x.rpm xorg-x11-font-utils-6.8.2-1.EL.67.s390x.rpm xorg-x11-libs-6.8.2-1.EL.67.s390.rpm xorg-x11-libs-6.8.2-1.EL.67.s390x.rpm xorg-x11-tools-6.8.2-1.EL.67.s390x.rpm xorg-x11-twm-6.8.2-1.EL.67.s390x.rpm xorg-x11-xauth-6.8.2-1.EL.67.s390x.rpm xorg-x11-xdm-6.8.2-1.EL.67.s390x.rpm xorg-x11-xfs-6.8.2-1.EL.67.s390x.rpm x86_64: xorg-x11-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.67.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.67.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.67.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.67.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xorg-x11-6.8.2-1.EL.67.src.rpm i386: xorg-x11-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.67.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-doc-6.8.2-1.EL.67.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-sdk-6.8.2-1.EL.67.i386.rpm xorg-x11-tools-6.8.2-1.EL.67.i386.rpm xorg-x11-twm-6.8.2-1.EL.67.i386.rpm xorg-x11-xauth-6.8.2-1.EL.67.i386.rpm xorg-x11-xdm-6.8.2-1.EL.67.i386.rpm xorg-x11-xfs-6.8.2-1.EL.67.i386.rpm x86_64: xorg-x11-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.67.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.67.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.67.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.67.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xorg-x11-6.8.2-1.EL.67.src.rpm i386: xorg-x11-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.67.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-doc-6.8.2-1.EL.67.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-sdk-6.8.2-1.EL.67.i386.rpm xorg-x11-tools-6.8.2-1.EL.67.i386.rpm xorg-x11-twm-6.8.2-1.EL.67.i386.rpm xorg-x11-xauth-6.8.2-1.EL.67.i386.rpm xorg-x11-xdm-6.8.2-1.EL.67.i386.rpm xorg-x11-xfs-6.8.2-1.EL.67.i386.rpm ia64: xorg-x11-6.8.2-1.EL.67.ia64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.ia64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.ia64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.ia64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.ia64.rpm xorg-x11-devel-6.8.2-1.EL.67.ia64.rpm xorg-x11-doc-6.8.2-1.EL.67.ia64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.ia64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.ia64.rpm xorg-x11-sdk-6.8.2-1.EL.67.ia64.rpm xorg-x11-tools-6.8.2-1.EL.67.ia64.rpm xorg-x11-twm-6.8.2-1.EL.67.ia64.rpm xorg-x11-xauth-6.8.2-1.EL.67.ia64.rpm xorg-x11-xdm-6.8.2-1.EL.67.ia64.rpm xorg-x11-xfs-6.8.2-1.EL.67.ia64.rpm x86_64: xorg-x11-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.67.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.67.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.67.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.67.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.67.src.rpm i386: xorg-x11-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.67.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-doc-6.8.2-1.EL.67.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-sdk-6.8.2-1.EL.67.i386.rpm xorg-x11-tools-6.8.2-1.EL.67.i386.rpm xorg-x11-twm-6.8.2-1.EL.67.i386.rpm xorg-x11-xauth-6.8.2-1.EL.67.i386.rpm xorg-x11-xdm-6.8.2-1.EL.67.i386.rpm xorg-x11-xfs-6.8.2-1.EL.67.i386.rpm ia64: xorg-x11-6.8.2-1.EL.67.ia64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.ia64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.ia64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.ia64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.ia64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.ia64.rpm xorg-x11-devel-6.8.2-1.EL.67.ia64.rpm xorg-x11-doc-6.8.2-1.EL.67.ia64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.ia64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.ia64.rpm xorg-x11-sdk-6.8.2-1.EL.67.ia64.rpm xorg-x11-tools-6.8.2-1.EL.67.ia64.rpm xorg-x11-twm-6.8.2-1.EL.67.ia64.rpm xorg-x11-xauth-6.8.2-1.EL.67.ia64.rpm xorg-x11-xdm-6.8.2-1.EL.67.ia64.rpm xorg-x11-xfs-6.8.2-1.EL.67.ia64.rpm x86_64: xorg-x11-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.67.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.67.i386.rpm xorg-x11-devel-6.8.2-1.EL.67.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.67.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.67.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.67.i386.rpm xorg-x11-libs-6.8.2-1.EL.67.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.67.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.67.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.67.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.67.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0465.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNo2QSXlSAg2UNWIIRAkhWAJ4ghHuTCZN43CRmYo5J46qxkPms+wCffz0k XRX4jPn8eVZJiEyQHtOuhHo= =h08Z -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 11 20:29:01 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 11 Apr 2011 14:29:01 -0600 Subject: [RHSA-2011:0433-01] Moderate: xorg-x11-server-utils security update Message-ID: <201104112029.p3BKT1lR001466@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: xorg-x11-server-utils security update Advisory ID: RHSA-2011:0433-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0433.html Issue date: 2011-04-11 CVE Names: CVE-2011-0465 ===================================================================== 1. Summary: An updated xorg-x11-server-utils package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The xorg-x11-server-utils package contains a collection of utilities used to modify and query the runtime configuration of the X.Org server. X.Org is an open source implementation of the X Window System. A flaw was found in the X.Org X server resource database utility, xrdb. Certain variables were not properly sanitized during the launch of a user's graphical session, which could possibly allow a remote attacker to execute arbitrary code with root privileges, if they were able to make the display manager execute xrdb with a specially-crafted X client hostname. For example, by configuring the hostname on the target system via a crafted DHCP reply, or by using the X Display Manager Control Protocol (XDMCP) to connect to that system from a host that has a special DNS name. (CVE-2011-0465) Red Hat would like to thank Matthieu Herrb for reporting this issue. Upstream acknowledges Sebastian Krahmer of the SuSE Security Team as the original reporter. Users of xorg-x11-server-utils should upgrade to this updated package, which contains a backported patch to resolve this issue. All running X.Org server instances must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 680196 - CVE-2011-0465 xorg: xrdb code execution via crafted X client hostname 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xorg-x11-server-utils-7.1-5.el5_6.1.src.rpm i386: xorg-x11-server-utils-7.1-5.el5_6.1.i386.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.i386.rpm x86_64: xorg-x11-server-utils-7.1-5.el5_6.1.x86_64.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xorg-x11-server-utils-7.1-5.el5_6.1.src.rpm i386: xorg-x11-server-utils-7.1-5.el5_6.1.i386.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.i386.rpm ia64: xorg-x11-server-utils-7.1-5.el5_6.1.ia64.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.ia64.rpm ppc: xorg-x11-server-utils-7.1-5.el5_6.1.ppc.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.ppc.rpm s390x: xorg-x11-server-utils-7.1-5.el5_6.1.s390x.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.s390x.rpm x86_64: xorg-x11-server-utils-7.1-5.el5_6.1.x86_64.rpm xorg-x11-server-utils-debuginfo-7.1-5.el5_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xorg-x11-server-utils-7.4-15.el6_0.1.src.rpm i386: xorg-x11-server-utils-7.4-15.el6_0.1.i686.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.i686.rpm x86_64: xorg-x11-server-utils-7.4-15.el6_0.1.x86_64.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xorg-x11-server-utils-7.4-15.el6_0.1.src.rpm x86_64: xorg-x11-server-utils-7.4-15.el6_0.1.x86_64.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xorg-x11-server-utils-7.4-15.el6_0.1.src.rpm i386: xorg-x11-server-utils-7.4-15.el6_0.1.i686.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.i686.rpm ppc64: xorg-x11-server-utils-7.4-15.el6_0.1.ppc64.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.ppc64.rpm s390x: xorg-x11-server-utils-7.4-15.el6_0.1.s390x.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.s390x.rpm x86_64: xorg-x11-server-utils-7.4-15.el6_0.1.x86_64.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xorg-x11-server-utils-7.4-15.el6_0.1.src.rpm i386: xorg-x11-server-utils-7.4-15.el6_0.1.i686.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.i686.rpm x86_64: xorg-x11-server-utils-7.4-15.el6_0.1.x86_64.rpm xorg-x11-server-utils-debuginfo-7.4-15.el6_0.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0465.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNo2RSXlSAg2UNWIIRAkcUAKCfJPORM1j2qwznw8RhNvEX3SceXACcD29j TgDd0azVrHMP62kESNsxuqk= =L10x -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 12 18:23:30 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 12 Apr 2011 12:23:30 -0600 Subject: [RHSA-2011:0429-01] Important: kernel security and bug fix update Message-ID: <201104121823.p3CINUBX031343@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2011:0429-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0429.html Issue date: 2011-04-12 CVE Names: CVE-2010-4346 CVE-2011-0521 CVE-2011-0710 CVE-2011-1010 CVE-2011-1090 CVE-2011-1478 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A missing boundary check was found in the dvb_ca_ioctl() function in the Linux kernel's av7110 module. On systems that use old DVB cards that require the av7110 module, a local, unprivileged user could use this flaw to cause a denial of service or escalate their privileges. (CVE-2011-0521, Important) * An inconsistency was found in the interaction between the Linux kernel's method for allocating NFSv4 (Network File System version 4) ACL data and the method by which it was freed. This inconsistency led to a kernel panic which could be triggered by a local, unprivileged user with files owned by said user on an NFSv4 share. (CVE-2011-1090, Moderate) * A NULL pointer dereference flaw was found in the Generic Receive Offload (GRO) functionality in the Linux kernel's networking implementation. If both GRO and promiscuous mode were enabled on an interface in a virtual LAN (VLAN), it could result in a denial of service when a malformed VLAN frame is received on that interface. (CVE-2011-1478, Moderate) * A missing security check in the Linux kernel's implementation of the install_special_mapping() function could allow a local, unprivileged user to bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low) * An information leak was found in the Linux kernel's task_show_regs() implementation. On IBM S/390 systems, a local, unprivileged user could use this flaw to read /proc/[PID]/status files, allowing them to discover the CPU register values of processes. (CVE-2011-0710, Low) * A missing validation check was found in the Linux kernel's mac_partition() implementation, used for supporting file systems created on Mac OS operating systems. A local attacker could use this flaw to cause a denial of service by mounting a disk that contains specially-crafted partitions. (CVE-2011-1010, Low) Red Hat would like to thank Ryan Sweat for reporting CVE-2011-1478; Tavis Ormandy for reporting CVE-2010-4346; and Timo Warns for reporting CVE-2011-1010. This update also fixes several bugs. Documentation for these bug fixes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to correct these issues, and fix the bugs noted in the Technical Notes. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 662189 - CVE-2010-4346 kernel: install_special_mapping skips security_file_mmap check 672398 - CVE-2011-0521 kernel: av7110 negative array offset 675664 - Kernel panic when restart network on vlan with bonding [rhel-5.6.z] 675909 - GFS2: Blocks not marked free on delete [rhel-5.6.z] 677173 - mpctl module doesn't release fasync_struct at file close [rhel-5.6.z] 677850 - CVE-2011-0710 kernel: s390 task_show_regs infoleak 679282 - CVE-2011-1010 kernel: fs/partitions: Validate map_count in Mac partition tables 680043 - [usb-audio] unable to set capture mixer levels [rhel-5.6.z] 680350 - WARNING: APIC timer calibration may be wrong [rhel-5.6.z] 681795 - [NetApp 5.6 Bug] Erroneous TPG ID check in SCSI ALUA Handler [rhel-5.6.z] 682641 - CVE-2011-1090 kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab 682673 - system fails to boot do to x86-64 kernel corrupting bios memory area [rhel-5.6.z] 683443 - kernel panic in pg_init_done - pgpath already deleted [rhel-5.6.z] 684128 - HP_GETHOSTINFO ioctl always causes mpt controller reset [rhel-5.6.z] 691270 - CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-238.9.1.el5.src.rpm i386: kernel-2.6.18-238.9.1.el5.i686.rpm kernel-PAE-2.6.18-238.9.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm kernel-debug-2.6.18-238.9.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.i686.rpm kernel-devel-2.6.18-238.9.1.el5.i686.rpm kernel-headers-2.6.18-238.9.1.el5.i386.rpm kernel-xen-2.6.18-238.9.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm noarch: kernel-doc-2.6.18-238.9.1.el5.noarch.rpm x86_64: kernel-2.6.18-238.9.1.el5.x86_64.rpm kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.9.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.x86_64.rpm kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.9.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-238.9.1.el5.src.rpm i386: kernel-2.6.18-238.9.1.el5.i686.rpm kernel-PAE-2.6.18-238.9.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm kernel-debug-2.6.18-238.9.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.i686.rpm kernel-devel-2.6.18-238.9.1.el5.i686.rpm kernel-headers-2.6.18-238.9.1.el5.i386.rpm kernel-xen-2.6.18-238.9.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.9.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm ia64: kernel-2.6.18-238.9.1.el5.ia64.rpm kernel-debug-2.6.18-238.9.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.ia64.rpm kernel-debug-devel-2.6.18-238.9.1.el5.ia64.rpm kernel-debuginfo-2.6.18-238.9.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.ia64.rpm kernel-devel-2.6.18-238.9.1.el5.ia64.rpm kernel-headers-2.6.18-238.9.1.el5.ia64.rpm kernel-xen-2.6.18-238.9.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-238.9.1.el5.ia64.rpm kernel-xen-devel-2.6.18-238.9.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-238.9.1.el5.noarch.rpm ppc: kernel-2.6.18-238.9.1.el5.ppc64.rpm kernel-debug-2.6.18-238.9.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-238.9.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-238.9.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.ppc64.rpm kernel-devel-2.6.18-238.9.1.el5.ppc64.rpm kernel-headers-2.6.18-238.9.1.el5.ppc.rpm kernel-headers-2.6.18-238.9.1.el5.ppc64.rpm kernel-kdump-2.6.18-238.9.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-238.9.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-238.9.1.el5.ppc64.rpm s390x: kernel-2.6.18-238.9.1.el5.s390x.rpm kernel-debug-2.6.18-238.9.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.s390x.rpm kernel-debug-devel-2.6.18-238.9.1.el5.s390x.rpm kernel-debuginfo-2.6.18-238.9.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.s390x.rpm kernel-devel-2.6.18-238.9.1.el5.s390x.rpm kernel-headers-2.6.18-238.9.1.el5.s390x.rpm kernel-kdump-2.6.18-238.9.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-238.9.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-238.9.1.el5.s390x.rpm x86_64: kernel-2.6.18-238.9.1.el5.x86_64.rpm kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.9.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.9.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.9.1.el5.x86_64.rpm kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.9.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-4346.html https://www.redhat.com/security/data/cve/CVE-2011-0521.html https://www.redhat.com/security/data/cve/CVE-2011-0710.html https://www.redhat.com/security/data/cve/CVE-2011-1010.html https://www.redhat.com/security/data/cve/CVE-2011-1090.html https://www.redhat.com/security/data/cve/CVE-2011-1478.html https://access.redhat.com/security/updates/classification/#important http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0429 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNpJiWXlSAg2UNWIIRArX+AKCsM5Z9LScHxsXNPOmicqSkCWbYFwCfeMGw uolUV68MsEfsDXtO+szt0XE= =yVdB -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 12 18:24:11 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 12 Apr 2011 12:24:11 -0600 Subject: [RHSA-2011:0436-01] Moderate: avahi security update Message-ID: <201104121824.p3CIOBpi015549@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: avahi security update Advisory ID: RHSA-2011:0436-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0436.html Issue date: 2011-04-12 CVE Names: CVE-2011-1002 ===================================================================== 1. Summary: Updated avahi packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print to, and find shared files on other computers. A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, avahi-daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 667187 - CVE-2011-1002 avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/avahi-0.6.16-10.el5_6.src.rpm i386: avahi-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm avahi-debuginfo-0.6.16-10.el5_6.i386.rpm avahi-glib-0.6.16-10.el5_6.i386.rpm avahi-qt3-0.6.16-10.el5_6.i386.rpm avahi-tools-0.6.16-10.el5_6.i386.rpm x86_64: avahi-0.6.16-10.el5_6.i386.rpm avahi-0.6.16-10.el5_6.x86_64.rpm avahi-compat-howl-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-0.6.16-10.el5_6.x86_64.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.x86_64.rpm avahi-debuginfo-0.6.16-10.el5_6.i386.rpm avahi-debuginfo-0.6.16-10.el5_6.x86_64.rpm avahi-glib-0.6.16-10.el5_6.i386.rpm avahi-glib-0.6.16-10.el5_6.x86_64.rpm avahi-qt3-0.6.16-10.el5_6.i386.rpm avahi-qt3-0.6.16-10.el5_6.x86_64.rpm avahi-tools-0.6.16-10.el5_6.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/avahi-0.6.16-10.el5_6.src.rpm i386: avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm avahi-debuginfo-0.6.16-10.el5_6.i386.rpm avahi-devel-0.6.16-10.el5_6.i386.rpm avahi-glib-devel-0.6.16-10.el5_6.i386.rpm avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm x86_64: avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.x86_64.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.x86_64.rpm avahi-debuginfo-0.6.16-10.el5_6.i386.rpm avahi-debuginfo-0.6.16-10.el5_6.x86_64.rpm avahi-devel-0.6.16-10.el5_6.i386.rpm avahi-devel-0.6.16-10.el5_6.x86_64.rpm avahi-glib-devel-0.6.16-10.el5_6.i386.rpm avahi-glib-devel-0.6.16-10.el5_6.x86_64.rpm avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm avahi-qt3-devel-0.6.16-10.el5_6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/avahi-0.6.16-10.el5_6.src.rpm i386: avahi-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm avahi-debuginfo-0.6.16-10.el5_6.i386.rpm avahi-devel-0.6.16-10.el5_6.i386.rpm avahi-glib-0.6.16-10.el5_6.i386.rpm avahi-glib-devel-0.6.16-10.el5_6.i386.rpm avahi-qt3-0.6.16-10.el5_6.i386.rpm avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm avahi-tools-0.6.16-10.el5_6.i386.rpm ia64: avahi-0.6.16-10.el5_6.ia64.rpm avahi-compat-howl-0.6.16-10.el5_6.ia64.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.ia64.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.ia64.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.ia64.rpm avahi-debuginfo-0.6.16-10.el5_6.ia64.rpm avahi-devel-0.6.16-10.el5_6.ia64.rpm avahi-glib-0.6.16-10.el5_6.ia64.rpm avahi-glib-devel-0.6.16-10.el5_6.ia64.rpm avahi-qt3-0.6.16-10.el5_6.ia64.rpm avahi-qt3-devel-0.6.16-10.el5_6.ia64.rpm avahi-tools-0.6.16-10.el5_6.ia64.rpm ppc: avahi-0.6.16-10.el5_6.ppc.rpm avahi-0.6.16-10.el5_6.ppc64.rpm avahi-compat-howl-0.6.16-10.el5_6.ppc.rpm avahi-compat-howl-0.6.16-10.el5_6.ppc64.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.ppc.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.ppc64.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.ppc.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.ppc64.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.ppc.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.ppc64.rpm avahi-debuginfo-0.6.16-10.el5_6.ppc.rpm avahi-debuginfo-0.6.16-10.el5_6.ppc64.rpm avahi-devel-0.6.16-10.el5_6.ppc.rpm avahi-devel-0.6.16-10.el5_6.ppc64.rpm avahi-glib-0.6.16-10.el5_6.ppc.rpm avahi-glib-0.6.16-10.el5_6.ppc64.rpm avahi-glib-devel-0.6.16-10.el5_6.ppc.rpm avahi-glib-devel-0.6.16-10.el5_6.ppc64.rpm avahi-qt3-0.6.16-10.el5_6.ppc.rpm avahi-qt3-0.6.16-10.el5_6.ppc64.rpm avahi-qt3-devel-0.6.16-10.el5_6.ppc.rpm avahi-qt3-devel-0.6.16-10.el5_6.ppc64.rpm avahi-tools-0.6.16-10.el5_6.ppc.rpm s390x: avahi-0.6.16-10.el5_6.s390.rpm avahi-0.6.16-10.el5_6.s390x.rpm avahi-compat-howl-0.6.16-10.el5_6.s390.rpm avahi-compat-howl-0.6.16-10.el5_6.s390x.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.s390.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.s390x.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.s390.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.s390x.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.s390.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.s390x.rpm avahi-debuginfo-0.6.16-10.el5_6.s390.rpm avahi-debuginfo-0.6.16-10.el5_6.s390x.rpm avahi-devel-0.6.16-10.el5_6.s390.rpm avahi-devel-0.6.16-10.el5_6.s390x.rpm avahi-glib-0.6.16-10.el5_6.s390.rpm avahi-glib-0.6.16-10.el5_6.s390x.rpm avahi-glib-devel-0.6.16-10.el5_6.s390.rpm avahi-glib-devel-0.6.16-10.el5_6.s390x.rpm avahi-qt3-0.6.16-10.el5_6.s390.rpm avahi-qt3-0.6.16-10.el5_6.s390x.rpm avahi-qt3-devel-0.6.16-10.el5_6.s390.rpm avahi-qt3-devel-0.6.16-10.el5_6.s390x.rpm avahi-tools-0.6.16-10.el5_6.s390x.rpm x86_64: avahi-0.6.16-10.el5_6.i386.rpm avahi-0.6.16-10.el5_6.x86_64.rpm avahi-compat-howl-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-0.6.16-10.el5_6.x86_64.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-howl-devel-0.6.16-10.el5_6.x86_64.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-0.6.16-10.el5_6.x86_64.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.x86_64.rpm avahi-debuginfo-0.6.16-10.el5_6.i386.rpm avahi-debuginfo-0.6.16-10.el5_6.x86_64.rpm avahi-devel-0.6.16-10.el5_6.i386.rpm avahi-devel-0.6.16-10.el5_6.x86_64.rpm avahi-glib-0.6.16-10.el5_6.i386.rpm avahi-glib-0.6.16-10.el5_6.x86_64.rpm avahi-glib-devel-0.6.16-10.el5_6.i386.rpm avahi-glib-devel-0.6.16-10.el5_6.x86_64.rpm avahi-qt3-0.6.16-10.el5_6.i386.rpm avahi-qt3-0.6.16-10.el5_6.x86_64.rpm avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm avahi-qt3-devel-0.6.16-10.el5_6.x86_64.rpm avahi-tools-0.6.16-10.el5_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1002.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD4DBQFNpJi3XlSAg2UNWIIRAlihAJiWBAKzXtwhkO7VP9Oj0lUrTarJAJ4tgx+U RPn8xXXpgls5VMDTOJaorw== =AaW/ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 14 18:21:14 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 14 Apr 2011 12:21:14 -0600 Subject: [RHSA-2011:0447-01] Moderate: krb5 security update Message-ID: <201104141821.p3EILEPE000769@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: krb5 security update Advisory ID: RHSA-2011:0447-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0447.html Issue date: 2011-04-14 CVE Names: CVE-2011-0285 ===================================================================== 1. Summary: Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). An invalid free flaw was found in the password-changing capability of the MIT Kerberos administration daemon, kadmind. A remote, unauthenticated attacker could use this flaw to cause kadmind to abort via a specially-crafted request. (CVE-2011-0285) All krb5 users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the kadmind daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 696334 - CVE-2011-0285 krb5: kadmind invalid pointer free() (MITKRB5-SA-004) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-1.8.2-3.el6_0.7.src.rpm i386: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.i686.rpm krb5-workstation-1.8.2-3.el6_0.7.i686.rpm x86_64: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-debuginfo-1.8.2-3.el6_0.7.x86_64.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.x86_64.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.x86_64.rpm krb5-workstation-1.8.2-3.el6_0.7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-1.8.2-3.el6_0.7.src.rpm i386: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-server-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm x86_64: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-debuginfo-1.8.2-3.el6_0.7.x86_64.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-1.8.2-3.el6_0.7.src.rpm x86_64: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-debuginfo-1.8.2-3.el6_0.7.x86_64.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-1.8.2-3.el6_0.7.src.rpm x86_64: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-debuginfo-1.8.2-3.el6_0.7.x86_64.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.x86_64.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.x86_64.rpm krb5-workstation-1.8.2-3.el6_0.7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/krb5-1.8.2-3.el6_0.7.src.rpm i386: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.i686.rpm krb5-server-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm krb5-workstation-1.8.2-3.el6_0.7.i686.rpm ppc64: krb5-debuginfo-1.8.2-3.el6_0.7.ppc.rpm krb5-debuginfo-1.8.2-3.el6_0.7.ppc64.rpm krb5-devel-1.8.2-3.el6_0.7.ppc.rpm krb5-devel-1.8.2-3.el6_0.7.ppc64.rpm krb5-libs-1.8.2-3.el6_0.7.ppc.rpm krb5-libs-1.8.2-3.el6_0.7.ppc64.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.ppc64.rpm krb5-server-1.8.2-3.el6_0.7.ppc64.rpm krb5-server-ldap-1.8.2-3.el6_0.7.ppc.rpm krb5-server-ldap-1.8.2-3.el6_0.7.ppc64.rpm krb5-workstation-1.8.2-3.el6_0.7.ppc64.rpm s390x: krb5-debuginfo-1.8.2-3.el6_0.7.s390.rpm krb5-debuginfo-1.8.2-3.el6_0.7.s390x.rpm krb5-devel-1.8.2-3.el6_0.7.s390.rpm krb5-devel-1.8.2-3.el6_0.7.s390x.rpm krb5-libs-1.8.2-3.el6_0.7.s390.rpm krb5-libs-1.8.2-3.el6_0.7.s390x.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.s390x.rpm krb5-server-1.8.2-3.el6_0.7.s390x.rpm krb5-server-ldap-1.8.2-3.el6_0.7.s390.rpm krb5-server-ldap-1.8.2-3.el6_0.7.s390x.rpm krb5-workstation-1.8.2-3.el6_0.7.s390x.rpm x86_64: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-debuginfo-1.8.2-3.el6_0.7.x86_64.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.x86_64.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.x86_64.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.x86_64.rpm krb5-workstation-1.8.2-3.el6_0.7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/krb5-1.8.2-3.el6_0.7.src.rpm i386: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.i686.rpm krb5-server-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm krb5-workstation-1.8.2-3.el6_0.7.i686.rpm x86_64: krb5-debuginfo-1.8.2-3.el6_0.7.i686.rpm krb5-debuginfo-1.8.2-3.el6_0.7.x86_64.rpm krb5-devel-1.8.2-3.el6_0.7.i686.rpm krb5-devel-1.8.2-3.el6_0.7.x86_64.rpm krb5-libs-1.8.2-3.el6_0.7.i686.rpm krb5-libs-1.8.2-3.el6_0.7.x86_64.rpm krb5-pkinit-openssl-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-1.8.2-3.el6_0.7.x86_64.rpm krb5-server-ldap-1.8.2-3.el6_0.7.i686.rpm krb5-server-ldap-1.8.2-3.el6_0.7.x86_64.rpm krb5-workstation-1.8.2-3.el6_0.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0285.html https://access.redhat.com/security/updates/classification/#moderate http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNpzsJXlSAg2UNWIIRAuUfAKDAAVI2MhYBE7zJ/X2gQUfOtKUr6wCfZAef aKLOrLuDNRF4UDAbNvzfBPY= =YYzO -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 18 15:52:03 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 18 Apr 2011 11:52:03 -0400 Subject: [RHSA-2011:0451-01] Critical: flash-plugin security update Message-ID: <201104181552.p3IFq3f8007663@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2011:0451-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0451.html Issue date: 2011-04-18 CVE Names: CVE-2011-0611 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB11-07, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code. (CVE-2011-0611) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.2.159.1. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 695546 - CVE-2011-0611 flash-plugin: crash and potential arbitrary code execution (APSB11-07) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-10.2.159.1-1.el5.i386.rpm x86_64: flash-plugin-10.2.159.1-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-10.2.159.1-1.el5.i386.rpm x86_64: flash-plugin-10.2.159.1-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-10.2.159.1-1.el6.i686.rpm x86_64: flash-plugin-10.2.159.1-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-10.2.159.1-1.el6.i686.rpm x86_64: flash-plugin-10.2.159.1-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-10.2.159.1-1.el6.i686.rpm x86_64: flash-plugin-10.2.159.1-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0611.html https://access.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb11-07.html 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNrF35XlSAg2UNWIIRAgwAAKCDejoDbG54chlp/axL4iNNCtRitQCfUJyR BaJsSqZvWmHqqxg7lKESafQ= =xXhK -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 18 15:54:46 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 18 Apr 2011 11:54:46 -0400 Subject: [RHSA-2011:0452-01] Important: libtiff security update Message-ID: <201104181554.p3IFskeO001270@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libtiff security update Advisory ID: RHSA-2011:0452-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0452.html Issue date: 2011-04-18 CVE Names: CVE-2009-5022 ===================================================================== 1. Summary: Updated libtiff packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. A heap-based buffer overflow flaw was found in the way libtiff processed certain TIFF image files that were compressed with the JPEG compression algorithm. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. (CVE-2009-5022) All libtiff users should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications linked against libtiff must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 695885 - CVE-2009-5022 libtiff ojpeg buffer overflow 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm i386: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm x86_64: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-3.9.4-1.el6_0.3.x86_64.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm i386: libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm libtiff-static-3.9.4-1.el6_0.3.i686.rpm x86_64: libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.x86_64.rpm libtiff-static-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm x86_64: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-3.9.4-1.el6_0.3.x86_64.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm x86_64: libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.x86_64.rpm libtiff-static-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm i386: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm ppc64: libtiff-3.9.4-1.el6_0.3.ppc.rpm libtiff-3.9.4-1.el6_0.3.ppc64.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.ppc.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.ppc64.rpm libtiff-devel-3.9.4-1.el6_0.3.ppc.rpm libtiff-devel-3.9.4-1.el6_0.3.ppc64.rpm s390x: libtiff-3.9.4-1.el6_0.3.s390.rpm libtiff-3.9.4-1.el6_0.3.s390x.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.s390.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.s390x.rpm libtiff-devel-3.9.4-1.el6_0.3.s390.rpm libtiff-devel-3.9.4-1.el6_0.3.s390x.rpm x86_64: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-3.9.4-1.el6_0.3.x86_64.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm i386: libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-static-3.9.4-1.el6_0.3.i686.rpm ppc64: libtiff-debuginfo-3.9.4-1.el6_0.3.ppc64.rpm libtiff-static-3.9.4-1.el6_0.3.ppc64.rpm s390x: libtiff-debuginfo-3.9.4-1.el6_0.3.s390x.rpm libtiff-static-3.9.4-1.el6_0.3.s390x.rpm x86_64: libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm libtiff-static-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm i386: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm x86_64: libtiff-3.9.4-1.el6_0.3.i686.rpm libtiff-3.9.4-1.el6_0.3.x86_64.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm libtiff-devel-3.9.4-1.el6_0.3.i686.rpm libtiff-devel-3.9.4-1.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libtiff-3.9.4-1.el6_0.3.src.rpm i386: libtiff-debuginfo-3.9.4-1.el6_0.3.i686.rpm libtiff-static-3.9.4-1.el6_0.3.i686.rpm x86_64: libtiff-debuginfo-3.9.4-1.el6_0.3.x86_64.rpm libtiff-static-3.9.4-1.el6_0.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-5022.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNrF6QXlSAg2UNWIIRAv4DAJ0VI6pJ9pqlFYBj/Uw95pwBy1SujQCcCkyW EJvoYiZbTchYOIwWQtW9ZgQ= =vsqt -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 19 18:44:12 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Apr 2011 14:44:12 -0400 Subject: [RHSA-2011:0455-01] Important: polkit security update Message-ID: <201104191844.p3JIiC4W032237@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: polkit security update Advisory ID: RHSA-2011:0455-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0455.html Issue date: 2011-04-19 CVE Names: CVE-2011-1485 ===================================================================== 1. Summary: Updated polkit packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 3. Description: PolicyKit is a toolkit for defining and handling authorizations. A race condition flaw was found in the PolicyKit pkexec utility and polkitd daemon. A local user could use this flaw to appear as a privileged user to pkexec, allowing them to execute arbitrary commands as root by running those commands with pkexec. (CVE-2011-1485) Red Hat would like to thank Neel Mehta of Google for reporting this issue. All polkit users should upgrade to these updated packages, which contain backported patches to correct this issue. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 692922 - CVE-2011-1485 polkitd/pkexec vulnerability 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/polkit-0.96-2.el6_0.1.src.rpm i386: polkit-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm noarch: polkit-desktop-policy-0.96-2.el6_0.1.noarch.rpm x86_64: polkit-0.96-2.el6_0.1.i686.rpm polkit-0.96-2.el6_0.1.x86_64.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/polkit-0.96-2.el6_0.1.src.rpm i386: polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-docs-0.96-2.el6_0.1.i686.rpm x86_64: polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.x86_64.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.x86_64.rpm polkit-docs-0.96-2.el6_0.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/polkit-0.96-2.el6_0.1.src.rpm x86_64: polkit-0.96-2.el6_0.1.i686.rpm polkit-0.96-2.el6_0.1.x86_64.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/polkit-0.96-2.el6_0.1.src.rpm noarch: polkit-desktop-policy-0.96-2.el6_0.1.noarch.rpm x86_64: polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.x86_64.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.x86_64.rpm polkit-docs-0.96-2.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/polkit-0.96-2.el6_0.1.src.rpm i386: polkit-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-docs-0.96-2.el6_0.1.i686.rpm noarch: polkit-desktop-policy-0.96-2.el6_0.1.noarch.rpm ppc64: polkit-0.96-2.el6_0.1.ppc.rpm polkit-0.96-2.el6_0.1.ppc64.rpm polkit-debuginfo-0.96-2.el6_0.1.ppc.rpm polkit-debuginfo-0.96-2.el6_0.1.ppc64.rpm polkit-devel-0.96-2.el6_0.1.ppc.rpm polkit-devel-0.96-2.el6_0.1.ppc64.rpm polkit-docs-0.96-2.el6_0.1.ppc64.rpm s390x: polkit-0.96-2.el6_0.1.s390.rpm polkit-0.96-2.el6_0.1.s390x.rpm polkit-debuginfo-0.96-2.el6_0.1.s390.rpm polkit-debuginfo-0.96-2.el6_0.1.s390x.rpm polkit-devel-0.96-2.el6_0.1.s390.rpm polkit-devel-0.96-2.el6_0.1.s390x.rpm polkit-docs-0.96-2.el6_0.1.s390x.rpm x86_64: polkit-0.96-2.el6_0.1.i686.rpm polkit-0.96-2.el6_0.1.x86_64.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.x86_64.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.x86_64.rpm polkit-docs-0.96-2.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/polkit-0.96-2.el6_0.1.src.rpm i386: polkit-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-docs-0.96-2.el6_0.1.i686.rpm noarch: polkit-desktop-policy-0.96-2.el6_0.1.noarch.rpm x86_64: polkit-0.96-2.el6_0.1.i686.rpm polkit-0.96-2.el6_0.1.x86_64.rpm polkit-debuginfo-0.96-2.el6_0.1.i686.rpm polkit-debuginfo-0.96-2.el6_0.1.x86_64.rpm polkit-devel-0.96-2.el6_0.1.i686.rpm polkit-devel-0.96-2.el6_0.1.x86_64.rpm polkit-docs-0.96-2.el6_0.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1485.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNrdfSXlSAg2UNWIIRAjbHAKCsp1nE2JGP+QLF91lUuse/a9I06wCfUfmb 9zt/uRecDR2eS9xNfUFV4Pk= =iRsO -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 21 17:02:50 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 21 Apr 2011 13:02:50 -0400 Subject: [RHSA-2011:0464-01] Moderate: kdelibs security update Message-ID: <201104211702.p3LH2oEM016404@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kdelibs security update Advisory ID: RHSA-2011:0464-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0464.html Issue date: 2011-04-21 CVE Names: CVE-2011-1094 CVE-2011-1168 ===================================================================== 1. Summary: Updated kdelibs packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 3. Description: The kdelibs packages provide libraries for the K Desktop Environment (KDE). A cross-site scripting (XSS) flaw was found in the way KHTML, the HTML layout engine used by KDE applications such as the Konqueror web browser, displayed certain error pages. A remote attacker could use this flaw to perform a cross-site scripting attack against victims by tricking them into visiting a specially-crafted URL. (CVE-2011-1168) A flaw was found in the way kdelibs checked the user specified hostname against the name in the server's SSL certificate. A man-in-the-middle attacker could use this flaw to trick an application using kdelibs into mistakenly accepting a certificate as if it was valid for the host, if that certificate was issued for an IP address to which the user specified hostname was resolved to. (CVE-2011-1094) Note: As part of the fix for CVE-2011-1094, this update also introduces stricter handling for wildcards used in servers' SSL certificates. Users should upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 632114 - CVE-2011-1094 kdelibs: SSL certificate for IP address accepted as valid for hosts that resolve to the IP 695398 - CVE-2011-1168 kdelibs: partially universal XSS in Konqueror error pages 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm i386: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-common-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm x86_64: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm i386: kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm noarch: kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm x86_64: kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm noarch: kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm x86_64: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm i386: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-common-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm noarch: kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm ppc64: kdelibs-4.3.4-11.el6_0.2.ppc.rpm kdelibs-4.3.4-11.el6_0.2.ppc64.rpm kdelibs-common-4.3.4-11.el6_0.2.ppc64.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.ppc.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.ppc64.rpm kdelibs-devel-4.3.4-11.el6_0.2.ppc.rpm kdelibs-devel-4.3.4-11.el6_0.2.ppc64.rpm s390x: kdelibs-4.3.4-11.el6_0.2.s390.rpm kdelibs-4.3.4-11.el6_0.2.s390x.rpm kdelibs-common-4.3.4-11.el6_0.2.s390x.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.s390.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.s390x.rpm kdelibs-devel-4.3.4-11.el6_0.2.s390.rpm kdelibs-devel-4.3.4-11.el6_0.2.s390x.rpm x86_64: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm i386: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-common-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm noarch: kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm x86_64: kdelibs-4.3.4-11.el6_0.2.i686.rpm kdelibs-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1094.html https://www.redhat.com/security/data/cve/CVE-2011-1168.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNsGMJXlSAg2UNWIIRAqRnAKCK+XCUdZEiMLrtrj8iKjv2jeLxAgCgh0Ud EJVwX7KtmkvXF3kXHSHeeho= =IesW -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 21 17:06:12 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 21 Apr 2011 13:06:12 -0400 Subject: [RHSA-2011:0465-01] Important: kdenetwork security update Message-ID: <201104211706.p3LH6Cna017847@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kdenetwork security update Advisory ID: RHSA-2011:0465-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0465.html Issue date: 2011-04-21 CVE Names: CVE-2011-1586 ===================================================================== 1. Summary: Updated kdenetwork packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The kdenetwork packages contain networking applications for the K Desktop Environment (KDE). A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. (CVE-2011-1586) Users of kdenetwork should upgrade to these updated packages, which contain a backported patch to resolve this issue. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 697042 - CVE-2011-1586 kdenetwork: incomplete fix for CVE-2010-1000 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kdenetwork-4.3.4-11.el6_0.1.src.rpm i386: kdenetwork-4.3.4-11.el6_0.1.i686.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-libs-4.3.4-11.el6_0.1.i686.rpm x86_64: kdenetwork-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-libs-4.3.4-11.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kdenetwork-4.3.4-11.el6_0.1.src.rpm i386: kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-devel-4.3.4-11.el6_0.1.i686.rpm x86_64: kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-devel-4.3.4-11.el6_0.1.i686.rpm kdenetwork-devel-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-libs-4.3.4-11.el6_0.1.i686.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kdenetwork-4.3.4-11.el6_0.1.src.rpm i386: kdenetwork-4.3.4-11.el6_0.1.i686.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-devel-4.3.4-11.el6_0.1.i686.rpm kdenetwork-libs-4.3.4-11.el6_0.1.i686.rpm ppc64: kdenetwork-4.3.4-11.el6_0.1.ppc64.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.ppc.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.ppc64.rpm kdenetwork-devel-4.3.4-11.el6_0.1.ppc.rpm kdenetwork-devel-4.3.4-11.el6_0.1.ppc64.rpm kdenetwork-libs-4.3.4-11.el6_0.1.ppc.rpm kdenetwork-libs-4.3.4-11.el6_0.1.ppc64.rpm s390x: kdenetwork-4.3.4-11.el6_0.1.s390x.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.s390.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.s390x.rpm kdenetwork-devel-4.3.4-11.el6_0.1.s390.rpm kdenetwork-devel-4.3.4-11.el6_0.1.s390x.rpm kdenetwork-libs-4.3.4-11.el6_0.1.s390.rpm kdenetwork-libs-4.3.4-11.el6_0.1.s390x.rpm x86_64: kdenetwork-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-devel-4.3.4-11.el6_0.1.i686.rpm kdenetwork-devel-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-libs-4.3.4-11.el6_0.1.i686.rpm kdenetwork-libs-4.3.4-11.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kdenetwork-4.3.4-11.el6_0.1.src.rpm i386: kdenetwork-4.3.4-11.el6_0.1.i686.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-devel-4.3.4-11.el6_0.1.i686.rpm kdenetwork-libs-4.3.4-11.el6_0.1.i686.rpm x86_64: kdenetwork-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.i686.rpm kdenetwork-debuginfo-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-devel-4.3.4-11.el6_0.1.i686.rpm kdenetwork-devel-4.3.4-11.el6_0.1.x86_64.rpm kdenetwork-libs-4.3.4-11.el6_0.1.i686.rpm kdenetwork-libs-4.3.4-11.el6_0.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1586.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNsGPNXlSAg2UNWIIRAszLAJ9cg3nHud/Vdlu8MCE6ukAYG7XDjwCgh8sN T1Se9G6smSCIqxLzwUBRcUs= =Nc7g -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 29 03:22:33 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 28 Apr 2011 23:22:33 -0400 Subject: [RHSA-2011:0471-01] Critical: firefox security update Message-ID: <201104290322.p3T3MZHa016752@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2011:0471-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0471.html Issue date: 2011-04-28 CVE Names: CVE-2011-0065 CVE-2011-0066 CVE-2011-0067 CVE-2011-0069 CVE-2011-0070 CVE-2011-0071 CVE-2011-0072 CVE-2011-0073 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 CVE-2011-1202 ===================================================================== 1. Summary: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could possibly lead to arbitrary code execution with the privileges of the user running Firefox. (CVE-2011-0080, CVE-2011-0081) An arbitrary memory write flaw was found in the way Firefox handled out-of-memory conditions. If all memory was consumed when a user visited a malicious web page, it could possibly lead to arbitrary code execution with the privileges of the user running Firefox. (CVE-2011-0078) An integer overflow flaw was found in the way Firefox handled the HTML frameset tag. A web page with a frameset tag containing large values for the "rows" and "cols" attributes could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running Firefox. (CVE-2011-0077) A flaw was found in the way Firefox handled the HTML iframe tag. A web page with an iframe tag containing a specially-crafted source address could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running Firefox. (CVE-2011-0075) A flaw was found in the way Firefox displayed multiple marquee elements. A malformed HTML document could cause Firefox to execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0074) A flaw was found in the way Firefox handled the nsTreeSelection element. Malformed content could cause Firefox to execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0073) A use-after-free flaw was found in the way Firefox appended frame and iframe elements to a DOM tree when the NoScript add-on was enabled. Malicious HTML content could cause Firefox to execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0072) A directory traversal flaw was found in the Firefox resource:// protocol handler. Malicious content could cause Firefox to access arbitrary files accessible to the user running Firefox. (CVE-2011-0071) A double free flaw was found in the way Firefox handled "application/http-index-format" documents. A malformed HTTP response could cause Firefox to execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0070) A flaw was found in the way Firefox handled certain JavaScript cross-domain requests. If malicious content generated a large number of cross-domain JavaScript requests, it could cause Firefox to execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0069) A flaw was found in the way Firefox displayed the autocomplete pop-up. Malicious content could use this flaw to steal form history information. (CVE-2011-0067) Two use-after-free flaws were found in the Firefox mObserverList and mChannel objects. Malicious content could use these flaws to execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0066, CVE-2011-0065) A flaw was found in the Firefox XSLT generate-id() function. This function returned the memory address of an object in memory, which could possibly be used by attackers to bypass address randomization protections. (CVE-2011-1202) For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.6.17. You can find a link to the Mozilla advisories in the References section of this erratum. All Firefox users should upgrade to these updated packages, which contain Firefox version 3.6.17, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 684386 - CVE-2011-1202 libxslt: Heap address leak in XLST 700603 - CVE-2011-0078 Mozilla OOM condition arbitrary memory write (MFSA 2011-12) 700613 - CVE-2011-0077 Mozilla integer overflow in frameset spec (MFSA 2011-12) 700615 - CVE-2011-0075 Mozilla crash from bad iframe source (MFSA 2011-12) 700617 - CVE-2011-0074 Mozilla crash from several marquee elements (MFSA 2011-12) 700619 - CVE-2011-0073 Mozilla dangling pointer flaw (MFSA 2011-13) 700622 - CVE-2011-0072 Mozilla use after free flaw (MFSA 2011-12) 700635 - CVE-2011-0071 Mozilla directory traversal via resource protocol (MFSA 2011-16) 700640 - CVE-2011-0070 Mozilla double free flaw (MFSA 2011-12) 700642 - CVE-2011-0069 Mozilla javascript crash (MFSA 2011-12) 700644 - CVE-2011-0067 Mozilla untrusted events can trigger autocomplete popup (MFSA 2011-14) 700657 - CVE-2011-0066 Mozilla mObserverList use after free (MFSA 2011-13) 700658 - CVE-2011-0065 Mozilla mChannel use after free (MFSA 2011-13) 700676 - CVE-2011-0081 Mozilla memory safety issue (MFSA 2011-12) 700677 - CVE-2011-0080 Mozilla memory safety issue (MFSA 2011-12) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-3.6.17-2.el4.src.rpm i386: firefox-3.6.17-2.el4.i386.rpm firefox-debuginfo-3.6.17-2.el4.i386.rpm ia64: firefox-3.6.17-2.el4.ia64.rpm firefox-debuginfo-3.6.17-2.el4.ia64.rpm ppc: firefox-3.6.17-2.el4.ppc.rpm firefox-debuginfo-3.6.17-2.el4.ppc.rpm s390: firefox-3.6.17-2.el4.s390.rpm firefox-debuginfo-3.6.17-2.el4.s390.rpm s390x: firefox-3.6.17-2.el4.s390x.rpm firefox-debuginfo-3.6.17-2.el4.s390x.rpm x86_64: firefox-3.6.17-2.el4.x86_64.rpm firefox-debuginfo-3.6.17-2.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-3.6.17-2.el4.src.rpm i386: firefox-3.6.17-2.el4.i386.rpm firefox-debuginfo-3.6.17-2.el4.i386.rpm x86_64: firefox-3.6.17-2.el4.x86_64.rpm firefox-debuginfo-3.6.17-2.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-3.6.17-2.el4.src.rpm i386: firefox-3.6.17-2.el4.i386.rpm firefox-debuginfo-3.6.17-2.el4.i386.rpm ia64: firefox-3.6.17-2.el4.ia64.rpm firefox-debuginfo-3.6.17-2.el4.ia64.rpm x86_64: firefox-3.6.17-2.el4.x86_64.rpm firefox-debuginfo-3.6.17-2.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-3.6.17-2.el4.src.rpm i386: firefox-3.6.17-2.el4.i386.rpm firefox-debuginfo-3.6.17-2.el4.i386.rpm ia64: firefox-3.6.17-2.el4.ia64.rpm firefox-debuginfo-3.6.17-2.el4.ia64.rpm x86_64: firefox-3.6.17-2.el4.x86_64.rpm firefox-debuginfo-3.6.17-2.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-3.6.17-1.el5_6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.2.17-3.el5_6.src.rpm i386: firefox-3.6.17-1.el5_6.i386.rpm firefox-debuginfo-3.6.17-1.el5_6.i386.rpm xulrunner-1.9.2.17-3.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.i386.rpm x86_64: firefox-3.6.17-1.el5_6.i386.rpm firefox-3.6.17-1.el5_6.x86_64.rpm firefox-debuginfo-3.6.17-1.el5_6.i386.rpm firefox-debuginfo-3.6.17-1.el5_6.x86_64.rpm xulrunner-1.9.2.17-3.el5_6.i386.rpm xulrunner-1.9.2.17-3.el5_6.x86_64.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.2.17-3.el5_6.src.rpm i386: xulrunner-debuginfo-1.9.2.17-3.el5_6.i386.rpm xulrunner-devel-1.9.2.17-3.el5_6.i386.rpm x86_64: xulrunner-debuginfo-1.9.2.17-3.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.x86_64.rpm xulrunner-devel-1.9.2.17-3.el5_6.i386.rpm xulrunner-devel-1.9.2.17-3.el5_6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-3.6.17-1.el5_6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-1.9.2.17-3.el5_6.src.rpm i386: firefox-3.6.17-1.el5_6.i386.rpm firefox-debuginfo-3.6.17-1.el5_6.i386.rpm xulrunner-1.9.2.17-3.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.i386.rpm xulrunner-devel-1.9.2.17-3.el5_6.i386.rpm ia64: firefox-3.6.17-1.el5_6.ia64.rpm firefox-debuginfo-3.6.17-1.el5_6.ia64.rpm xulrunner-1.9.2.17-3.el5_6.ia64.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.ia64.rpm xulrunner-devel-1.9.2.17-3.el5_6.ia64.rpm ppc: firefox-3.6.17-1.el5_6.ppc.rpm firefox-debuginfo-3.6.17-1.el5_6.ppc.rpm xulrunner-1.9.2.17-3.el5_6.ppc.rpm xulrunner-1.9.2.17-3.el5_6.ppc64.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.ppc.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.ppc64.rpm xulrunner-devel-1.9.2.17-3.el5_6.ppc.rpm xulrunner-devel-1.9.2.17-3.el5_6.ppc64.rpm s390x: firefox-3.6.17-1.el5_6.s390.rpm firefox-3.6.17-1.el5_6.s390x.rpm firefox-debuginfo-3.6.17-1.el5_6.s390.rpm firefox-debuginfo-3.6.17-1.el5_6.s390x.rpm xulrunner-1.9.2.17-3.el5_6.s390.rpm xulrunner-1.9.2.17-3.el5_6.s390x.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.s390.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.s390x.rpm xulrunner-devel-1.9.2.17-3.el5_6.s390.rpm xulrunner-devel-1.9.2.17-3.el5_6.s390x.rpm x86_64: firefox-3.6.17-1.el5_6.i386.rpm firefox-3.6.17-1.el5_6.x86_64.rpm firefox-debuginfo-3.6.17-1.el5_6.i386.rpm firefox-debuginfo-3.6.17-1.el5_6.x86_64.rpm xulrunner-1.9.2.17-3.el5_6.i386.rpm xulrunner-1.9.2.17-3.el5_6.x86_64.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.17-3.el5_6.x86_64.rpm xulrunner-devel-1.9.2.17-3.el5_6.i386.rpm xulrunner-devel-1.9.2.17-3.el5_6.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-3.6.17-1.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm i386: firefox-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm x86_64: firefox-3.6.17-1.el6_0.i686.rpm firefox-3.6.17-1.el6_0.x86_64.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.x86_64.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm i386: xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm x86_64: xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-3.6.17-1.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm x86_64: firefox-3.6.17-1.el6_0.i686.rpm firefox-3.6.17-1.el6_0.x86_64.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.x86_64.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-3.6.17-1.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm i386: firefox-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm ppc64: firefox-3.6.17-1.el6_0.ppc.rpm firefox-3.6.17-1.el6_0.ppc64.rpm firefox-debuginfo-3.6.17-1.el6_0.ppc.rpm firefox-debuginfo-3.6.17-1.el6_0.ppc64.rpm xulrunner-1.9.2.17-4.el6_0.ppc.rpm xulrunner-1.9.2.17-4.el6_0.ppc64.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.ppc.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.ppc64.rpm s390x: firefox-3.6.17-1.el6_0.s390.rpm firefox-3.6.17-1.el6_0.s390x.rpm firefox-debuginfo-3.6.17-1.el6_0.s390.rpm firefox-debuginfo-3.6.17-1.el6_0.s390x.rpm xulrunner-1.9.2.17-4.el6_0.s390.rpm xulrunner-1.9.2.17-4.el6_0.s390x.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.s390.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.s390x.rpm x86_64: firefox-3.6.17-1.el6_0.i686.rpm firefox-3.6.17-1.el6_0.x86_64.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.x86_64.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm i386: xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm ppc64: xulrunner-debuginfo-1.9.2.17-4.el6_0.ppc.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.ppc64.rpm xulrunner-devel-1.9.2.17-4.el6_0.ppc.rpm xulrunner-devel-1.9.2.17-4.el6_0.ppc64.rpm s390x: xulrunner-debuginfo-1.9.2.17-4.el6_0.s390.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.s390x.rpm xulrunner-devel-1.9.2.17-4.el6_0.s390.rpm xulrunner-devel-1.9.2.17-4.el6_0.s390x.rpm x86_64: xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-3.6.17-1.el6_0.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm i386: firefox-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm x86_64: firefox-3.6.17-1.el6_0.i686.rpm firefox-3.6.17-1.el6_0.x86_64.rpm firefox-debuginfo-3.6.17-1.el6_0.i686.rpm firefox-debuginfo-3.6.17-1.el6_0.x86_64.rpm xulrunner-1.9.2.17-4.el6_0.i686.rpm xulrunner-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-1.9.2.17-4.el6_0.src.rpm i386: xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm x86_64: xulrunner-debuginfo-1.9.2.17-4.el6_0.i686.rpm xulrunner-debuginfo-1.9.2.17-4.el6_0.x86_64.rpm xulrunner-devel-1.9.2.17-4.el6_0.i686.rpm xulrunner-devel-1.9.2.17-4.el6_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0065.html https://www.redhat.com/security/data/cve/CVE-2011-0066.html https://www.redhat.com/security/data/cve/CVE-2011-0067.html https://www.redhat.com/security/data/cve/CVE-2011-0069.html https://www.redhat.com/security/data/cve/CVE-2011-0070.html https://www.redhat.com/security/data/cve/CVE-2011-0071.html https://www.redhat.com/security/data/cve/CVE-2011-0072.html https://www.redhat.com/security/data/cve/CVE-2011-0073.html https://www.redhat.com/security/data/cve/CVE-2011-0074.html https://www.redhat.com/security/data/cve/CVE-2011-0075.html https://www.redhat.com/security/data/cve/CVE-2011-0077.html https://www.redhat.com/security/data/cve/CVE-2011-0078.html https://www.redhat.com/security/data/cve/CVE-2011-0080.html https://www.redhat.com/security/data/cve/CVE-2011-0081.html https://www.redhat.com/security/data/cve/CVE-2011-1202.html https://access.redhat.com/security/updates/classification/#critical http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.17 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNui6wXlSAg2UNWIIRAgVpAJ9IbCCG6uZdEr0HBmU2ilPW/j3b6ACfb3zE G+6522fLVq+Wc5YHmVpdz50= =sBjt -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 29 03:23:11 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 28 Apr 2011 23:23:11 -0400 Subject: [RHSA-2011:0472-01] Important: nss security update Message-ID: <201104290323.p3T3NDMa025155@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: nss security update Advisory ID: RHSA-2011:0472-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0472.html Issue date: 2011-04-28 ===================================================================== 1. Summary: Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support the development of security-enabled client and server applications. This erratum blacklists a small number of HTTPS certificates by adding them, flagged as untrusted, to the NSS Builtin Object Token (the libnssckbi.so library) certificate store. (BZ#689430) Note: This fix only applies to applications using the NSS Builtin Object Token. It does not blacklist the certificates for applications that use the NSS library, but do not use the NSS Builtin Object Token (such as curl). All NSS users should upgrade to these updated packages, which correct this issue. After installing the update, applications using NSS must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 689430 - Compromised certificates 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/nss-3.12.8-3.el4.src.rpm i386: nss-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-devel-3.12.8-3.el4.i386.rpm nss-tools-3.12.8-3.el4.i386.rpm ia64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.ia64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.ia64.rpm nss-devel-3.12.8-3.el4.ia64.rpm nss-tools-3.12.8-3.el4.ia64.rpm ppc: nss-3.12.8-3.el4.ppc.rpm nss-3.12.8-3.el4.ppc64.rpm nss-debuginfo-3.12.8-3.el4.ppc.rpm nss-debuginfo-3.12.8-3.el4.ppc64.rpm nss-devel-3.12.8-3.el4.ppc.rpm nss-tools-3.12.8-3.el4.ppc.rpm s390: nss-3.12.8-3.el4.s390.rpm nss-debuginfo-3.12.8-3.el4.s390.rpm nss-devel-3.12.8-3.el4.s390.rpm nss-tools-3.12.8-3.el4.s390.rpm s390x: nss-3.12.8-3.el4.s390.rpm nss-3.12.8-3.el4.s390x.rpm nss-debuginfo-3.12.8-3.el4.s390.rpm nss-debuginfo-3.12.8-3.el4.s390x.rpm nss-devel-3.12.8-3.el4.s390x.rpm nss-tools-3.12.8-3.el4.s390x.rpm x86_64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.x86_64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.x86_64.rpm nss-devel-3.12.8-3.el4.x86_64.rpm nss-tools-3.12.8-3.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/nss-3.12.8-3.el4.src.rpm i386: nss-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-devel-3.12.8-3.el4.i386.rpm nss-tools-3.12.8-3.el4.i386.rpm x86_64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.x86_64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.x86_64.rpm nss-devel-3.12.8-3.el4.x86_64.rpm nss-tools-3.12.8-3.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/nss-3.12.8-3.el4.src.rpm i386: nss-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-devel-3.12.8-3.el4.i386.rpm nss-tools-3.12.8-3.el4.i386.rpm ia64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.ia64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.ia64.rpm nss-devel-3.12.8-3.el4.ia64.rpm nss-tools-3.12.8-3.el4.ia64.rpm x86_64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.x86_64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.x86_64.rpm nss-devel-3.12.8-3.el4.x86_64.rpm nss-tools-3.12.8-3.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/nss-3.12.8-3.el4.src.rpm i386: nss-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-devel-3.12.8-3.el4.i386.rpm nss-tools-3.12.8-3.el4.i386.rpm ia64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.ia64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.ia64.rpm nss-devel-3.12.8-3.el4.ia64.rpm nss-tools-3.12.8-3.el4.ia64.rpm x86_64: nss-3.12.8-3.el4.i386.rpm nss-3.12.8-3.el4.x86_64.rpm nss-debuginfo-3.12.8-3.el4.i386.rpm nss-debuginfo-3.12.8-3.el4.x86_64.rpm nss-devel-3.12.8-3.el4.x86_64.rpm nss-tools-3.12.8-3.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/nss-3.12.8-4.el5_6.src.rpm i386: nss-3.12.8-4.el5_6.i386.rpm nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-tools-3.12.8-4.el5_6.i386.rpm x86_64: nss-3.12.8-4.el5_6.i386.rpm nss-3.12.8-4.el5_6.x86_64.rpm nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-debuginfo-3.12.8-4.el5_6.x86_64.rpm nss-tools-3.12.8-4.el5_6.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/nss-3.12.8-4.el5_6.src.rpm i386: nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-devel-3.12.8-4.el5_6.i386.rpm nss-pkcs11-devel-3.12.8-4.el5_6.i386.rpm x86_64: nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-debuginfo-3.12.8-4.el5_6.x86_64.rpm nss-devel-3.12.8-4.el5_6.i386.rpm nss-devel-3.12.8-4.el5_6.x86_64.rpm nss-pkcs11-devel-3.12.8-4.el5_6.i386.rpm nss-pkcs11-devel-3.12.8-4.el5_6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/nss-3.12.8-4.el5_6.src.rpm i386: nss-3.12.8-4.el5_6.i386.rpm nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-devel-3.12.8-4.el5_6.i386.rpm nss-pkcs11-devel-3.12.8-4.el5_6.i386.rpm nss-tools-3.12.8-4.el5_6.i386.rpm ia64: nss-3.12.8-4.el5_6.i386.rpm nss-3.12.8-4.el5_6.ia64.rpm nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-debuginfo-3.12.8-4.el5_6.ia64.rpm nss-devel-3.12.8-4.el5_6.ia64.rpm nss-pkcs11-devel-3.12.8-4.el5_6.ia64.rpm nss-tools-3.12.8-4.el5_6.ia64.rpm ppc: nss-3.12.8-4.el5_6.ppc.rpm nss-3.12.8-4.el5_6.ppc64.rpm nss-debuginfo-3.12.8-4.el5_6.ppc.rpm nss-debuginfo-3.12.8-4.el5_6.ppc64.rpm nss-devel-3.12.8-4.el5_6.ppc.rpm nss-devel-3.12.8-4.el5_6.ppc64.rpm nss-pkcs11-devel-3.12.8-4.el5_6.ppc.rpm nss-pkcs11-devel-3.12.8-4.el5_6.ppc64.rpm nss-tools-3.12.8-4.el5_6.ppc.rpm s390x: nss-3.12.8-4.el5_6.s390.rpm nss-3.12.8-4.el5_6.s390x.rpm nss-debuginfo-3.12.8-4.el5_6.s390.rpm nss-debuginfo-3.12.8-4.el5_6.s390x.rpm nss-devel-3.12.8-4.el5_6.s390.rpm nss-devel-3.12.8-4.el5_6.s390x.rpm nss-pkcs11-devel-3.12.8-4.el5_6.s390.rpm nss-pkcs11-devel-3.12.8-4.el5_6.s390x.rpm nss-tools-3.12.8-4.el5_6.s390x.rpm x86_64: nss-3.12.8-4.el5_6.i386.rpm nss-3.12.8-4.el5_6.x86_64.rpm nss-debuginfo-3.12.8-4.el5_6.i386.rpm nss-debuginfo-3.12.8-4.el5_6.x86_64.rpm nss-devel-3.12.8-4.el5_6.i386.rpm nss-devel-3.12.8-4.el5_6.x86_64.rpm nss-pkcs11-devel-3.12.8-4.el5_6.i386.rpm nss-pkcs11-devel-3.12.8-4.el5_6.x86_64.rpm nss-tools-3.12.8-4.el5_6.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm i386: nss-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-sysinit-3.12.8-3.el6_0.i686.rpm nss-tools-3.12.8-3.el6_0.i686.rpm x86_64: nss-3.12.8-3.el6_0.i686.rpm nss-3.12.8-3.el6_0.x86_64.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-sysinit-3.12.8-3.el6_0.x86_64.rpm nss-tools-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm i386: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm x86_64: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.x86_64.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm x86_64: nss-3.12.8-3.el6_0.i686.rpm nss-3.12.8-3.el6_0.x86_64.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-sysinit-3.12.8-3.el6_0.x86_64.rpm nss-tools-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm x86_64: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.x86_64.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm i386: nss-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-sysinit-3.12.8-3.el6_0.i686.rpm nss-tools-3.12.8-3.el6_0.i686.rpm ppc64: nss-3.12.8-3.el6_0.ppc.rpm nss-3.12.8-3.el6_0.ppc64.rpm nss-debuginfo-3.12.8-3.el6_0.ppc.rpm nss-debuginfo-3.12.8-3.el6_0.ppc64.rpm nss-devel-3.12.8-3.el6_0.ppc.rpm nss-devel-3.12.8-3.el6_0.ppc64.rpm nss-sysinit-3.12.8-3.el6_0.ppc64.rpm nss-tools-3.12.8-3.el6_0.ppc64.rpm s390x: nss-3.12.8-3.el6_0.s390.rpm nss-3.12.8-3.el6_0.s390x.rpm nss-debuginfo-3.12.8-3.el6_0.s390.rpm nss-debuginfo-3.12.8-3.el6_0.s390x.rpm nss-devel-3.12.8-3.el6_0.s390.rpm nss-devel-3.12.8-3.el6_0.s390x.rpm nss-sysinit-3.12.8-3.el6_0.s390x.rpm nss-tools-3.12.8-3.el6_0.s390x.rpm x86_64: nss-3.12.8-3.el6_0.i686.rpm nss-3.12.8-3.el6_0.x86_64.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.x86_64.rpm nss-sysinit-3.12.8-3.el6_0.x86_64.rpm nss-tools-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm i386: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm ppc64: nss-debuginfo-3.12.8-3.el6_0.ppc.rpm nss-debuginfo-3.12.8-3.el6_0.ppc64.rpm nss-pkcs11-devel-3.12.8-3.el6_0.ppc.rpm nss-pkcs11-devel-3.12.8-3.el6_0.ppc64.rpm s390x: nss-debuginfo-3.12.8-3.el6_0.s390.rpm nss-debuginfo-3.12.8-3.el6_0.s390x.rpm nss-pkcs11-devel-3.12.8-3.el6_0.s390.rpm nss-pkcs11-devel-3.12.8-3.el6_0.s390x.rpm x86_64: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm i386: nss-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-sysinit-3.12.8-3.el6_0.i686.rpm nss-tools-3.12.8-3.el6_0.i686.rpm x86_64: nss-3.12.8-3.el6_0.i686.rpm nss-3.12.8-3.el6_0.x86_64.rpm nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-devel-3.12.8-3.el6_0.i686.rpm nss-devel-3.12.8-3.el6_0.x86_64.rpm nss-sysinit-3.12.8-3.el6_0.x86_64.rpm nss-tools-3.12.8-3.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/nss-3.12.8-3.el6_0.src.rpm i386: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm x86_64: nss-debuginfo-3.12.8-3.el6_0.i686.rpm nss-debuginfo-3.12.8-3.el6_0.x86_64.rpm nss-pkcs11-devel-3.12.8-3.el6_0.i686.rpm nss-pkcs11-devel-3.12.8-3.el6_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNui7rXlSAg2UNWIIRAv92AKC5OV4jDTOpJupXUIBc7q5d5jgl+ACdHn+y AwmVJjTjlG2snb7dqtPqQ9Q= =PSGv -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 29 03:23:41 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 28 Apr 2011 23:23:41 -0400 Subject: [RHSA-2011:0473-01] Critical: seamonkey security update Message-ID: <201104290323.p3T3NhM8025241@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2011:0473-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0473.html Issue date: 2011-04-28 CVE Names: CVE-2011-0072 CVE-2011-0073 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 ===================================================================== 1. Summary: Updated seamonkey packages that fix several security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: SeaMonkey is an open source web browser, email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the processing of malformed web content. A web page containing malicious content could possibly lead to arbitrary code execution with the privileges of the user running SeaMonkey. (CVE-2011-0080) An arbitrary memory write flaw was found in the way SeaMonkey handled out-of-memory conditions. If all memory was consumed when a user visited a malicious web page, it could possibly lead to arbitrary code execution with the privileges of the user running SeaMonkey. (CVE-2011-0078) An integer overflow flaw was found in the way SeaMonkey handled the HTML frameset tag. A web page with a frameset tag containing large values for the "rows" and "cols" attributes could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running SeaMonkey. (CVE-2011-0077) A flaw was found in the way SeaMonkey handled the HTML iframe tag. A web page with an iframe tag containing a specially-crafted source address could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running SeaMonkey. (CVE-2011-0075) A flaw was found in the way SeaMonkey displayed multiple marquee elements. A malformed HTML document could cause SeaMonkey to execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-0074) A flaw was found in the way SeaMonkey handled the nsTreeSelection element. Malformed content could cause SeaMonkey to execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-0073) A use-after-free flaw was found in the way SeaMonkey appended frame and iframe elements to a DOM tree when the NoScript add-on was enabled. Malicious HTML content could cause SeaMonkey to execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-0072) All SeaMonkey users should upgrade to these updated packages, which correct these issues. After installing the update, SeaMonkey must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 700603 - CVE-2011-0078 Mozilla OOM condition arbitrary memory write (MFSA 2011-12) 700613 - CVE-2011-0077 Mozilla integer overflow in frameset spec (MFSA 2011-12) 700615 - CVE-2011-0075 Mozilla crash from bad iframe source (MFSA 2011-12) 700617 - CVE-2011-0074 Mozilla crash from several marquee elements (MFSA 2011-12) 700619 - CVE-2011-0073 Mozilla dangling pointer flaw (MFSA 2011-13) 700622 - CVE-2011-0072 Mozilla use after free flaw (MFSA 2011-12) 700677 - CVE-2011-0080 Mozilla memory safety issue (MFSA 2011-12) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.9-70.el4_8.src.rpm i386: seamonkey-1.0.9-70.el4_8.i386.rpm seamonkey-chat-1.0.9-70.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-70.el4_8.i386.rpm seamonkey-devel-1.0.9-70.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-70.el4_8.i386.rpm seamonkey-mail-1.0.9-70.el4_8.i386.rpm ia64: seamonkey-1.0.9-70.el4_8.ia64.rpm seamonkey-chat-1.0.9-70.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.ia64.rpm seamonkey-devel-1.0.9-70.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.ia64.rpm seamonkey-mail-1.0.9-70.el4_8.ia64.rpm ppc: seamonkey-1.0.9-70.el4_8.ppc.rpm seamonkey-chat-1.0.9-70.el4_8.ppc.rpm seamonkey-debuginfo-1.0.9-70.el4_8.ppc.rpm seamonkey-devel-1.0.9-70.el4_8.ppc.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.ppc.rpm seamonkey-js-debugger-1.0.9-70.el4_8.ppc.rpm seamonkey-mail-1.0.9-70.el4_8.ppc.rpm s390: seamonkey-1.0.9-70.el4_8.s390.rpm seamonkey-chat-1.0.9-70.el4_8.s390.rpm seamonkey-debuginfo-1.0.9-70.el4_8.s390.rpm seamonkey-devel-1.0.9-70.el4_8.s390.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.s390.rpm seamonkey-js-debugger-1.0.9-70.el4_8.s390.rpm seamonkey-mail-1.0.9-70.el4_8.s390.rpm s390x: seamonkey-1.0.9-70.el4_8.s390x.rpm seamonkey-chat-1.0.9-70.el4_8.s390x.rpm seamonkey-debuginfo-1.0.9-70.el4_8.s390x.rpm seamonkey-devel-1.0.9-70.el4_8.s390x.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.s390x.rpm seamonkey-js-debugger-1.0.9-70.el4_8.s390x.rpm seamonkey-mail-1.0.9-70.el4_8.s390x.rpm x86_64: seamonkey-1.0.9-70.el4_8.x86_64.rpm seamonkey-chat-1.0.9-70.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.x86_64.rpm seamonkey-devel-1.0.9-70.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.x86_64.rpm seamonkey-mail-1.0.9-70.el4_8.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.9-70.el4_8.src.rpm i386: seamonkey-1.0.9-70.el4_8.i386.rpm seamonkey-chat-1.0.9-70.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-70.el4_8.i386.rpm seamonkey-devel-1.0.9-70.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-70.el4_8.i386.rpm seamonkey-mail-1.0.9-70.el4_8.i386.rpm x86_64: seamonkey-1.0.9-70.el4_8.x86_64.rpm seamonkey-chat-1.0.9-70.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.x86_64.rpm seamonkey-devel-1.0.9-70.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.x86_64.rpm seamonkey-mail-1.0.9-70.el4_8.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.9-70.el4_8.src.rpm i386: seamonkey-1.0.9-70.el4_8.i386.rpm seamonkey-chat-1.0.9-70.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-70.el4_8.i386.rpm seamonkey-devel-1.0.9-70.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-70.el4_8.i386.rpm seamonkey-mail-1.0.9-70.el4_8.i386.rpm ia64: seamonkey-1.0.9-70.el4_8.ia64.rpm seamonkey-chat-1.0.9-70.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.ia64.rpm seamonkey-devel-1.0.9-70.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.ia64.rpm seamonkey-mail-1.0.9-70.el4_8.ia64.rpm x86_64: seamonkey-1.0.9-70.el4_8.x86_64.rpm seamonkey-chat-1.0.9-70.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.x86_64.rpm seamonkey-devel-1.0.9-70.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.x86_64.rpm seamonkey-mail-1.0.9-70.el4_8.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.9-70.el4_8.src.rpm i386: seamonkey-1.0.9-70.el4_8.i386.rpm seamonkey-chat-1.0.9-70.el4_8.i386.rpm seamonkey-debuginfo-1.0.9-70.el4_8.i386.rpm seamonkey-devel-1.0.9-70.el4_8.i386.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.i386.rpm seamonkey-js-debugger-1.0.9-70.el4_8.i386.rpm seamonkey-mail-1.0.9-70.el4_8.i386.rpm ia64: seamonkey-1.0.9-70.el4_8.ia64.rpm seamonkey-chat-1.0.9-70.el4_8.ia64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.ia64.rpm seamonkey-devel-1.0.9-70.el4_8.ia64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.ia64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.ia64.rpm seamonkey-mail-1.0.9-70.el4_8.ia64.rpm x86_64: seamonkey-1.0.9-70.el4_8.x86_64.rpm seamonkey-chat-1.0.9-70.el4_8.x86_64.rpm seamonkey-debuginfo-1.0.9-70.el4_8.x86_64.rpm seamonkey-devel-1.0.9-70.el4_8.x86_64.rpm seamonkey-dom-inspector-1.0.9-70.el4_8.x86_64.rpm seamonkey-js-debugger-1.0.9-70.el4_8.x86_64.rpm seamonkey-mail-1.0.9-70.el4_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0072.html https://www.redhat.com/security/data/cve/CVE-2011-0073.html https://www.redhat.com/security/data/cve/CVE-2011-0074.html https://www.redhat.com/security/data/cve/CVE-2011-0075.html https://www.redhat.com/security/data/cve/CVE-2011-0077.html https://www.redhat.com/security/data/cve/CVE-2011-0078.html https://www.redhat.com/security/data/cve/CVE-2011-0080.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNui8NXlSAg2UNWIIRAhCJAJ90ez34ELrReixxuLiZrt/VPLSZNgCeJlJN /WBj3jl3k7wkHen8AJh2b0I= =O0mV -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 29 03:24:04 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 28 Apr 2011 23:24:04 -0400 Subject: [RHSA-2011:0474-01] Critical: thunderbird security update Message-ID: <201104290324.p3T3O57P025318@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2011:0474-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0474.html Issue date: 2011-04-28 CVE Names: CVE-2011-0073 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML content. An HTML mail message containing malicious content could possibly lead to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0080) An arbitrary memory write flaw was found in the way Thunderbird handled out-of-memory conditions. If all memory was consumed when a user viewed a malicious HTML mail message, it could possibly lead to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0078) An integer overflow flaw was found in the way Thunderbird handled the HTML frameset tag. An HTML mail message with a frameset tag containing large values for the "rows" and "cols" attributes could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0077) A flaw was found in the way Thunderbird handled the HTML iframe tag. An HTML mail message with an iframe tag containing a specially-crafted source address could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0075) A flaw was found in the way Thunderbird displayed multiple marquee elements. A malformed HTML mail message could cause Thunderbird to execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0074) A flaw was found in the way Thunderbird handled the nsTreeSelection element. Malformed content could cause Thunderbird to execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0073) All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 700603 - CVE-2011-0078 Mozilla OOM condition arbitrary memory write (MFSA 2011-12) 700613 - CVE-2011-0077 Mozilla integer overflow in frameset spec (MFSA 2011-12) 700615 - CVE-2011-0075 Mozilla crash from bad iframe source (MFSA 2011-12) 700617 - CVE-2011-0074 Mozilla crash from several marquee elements (MFSA 2011-12) 700619 - CVE-2011-0073 Mozilla dangling pointer flaw (MFSA 2011-13) 700677 - CVE-2011-0080 Mozilla memory safety issue (MFSA 2011-12) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.12-38.el4.src.rpm i386: thunderbird-1.5.0.12-38.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-38.el4.i386.rpm ia64: thunderbird-1.5.0.12-38.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.ia64.rpm ppc: thunderbird-1.5.0.12-38.el4.ppc.rpm thunderbird-debuginfo-1.5.0.12-38.el4.ppc.rpm s390: thunderbird-1.5.0.12-38.el4.s390.rpm thunderbird-debuginfo-1.5.0.12-38.el4.s390.rpm s390x: thunderbird-1.5.0.12-38.el4.s390x.rpm thunderbird-debuginfo-1.5.0.12-38.el4.s390x.rpm x86_64: thunderbird-1.5.0.12-38.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.12-38.el4.src.rpm i386: thunderbird-1.5.0.12-38.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-38.el4.i386.rpm x86_64: thunderbird-1.5.0.12-38.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.12-38.el4.src.rpm i386: thunderbird-1.5.0.12-38.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-38.el4.i386.rpm ia64: thunderbird-1.5.0.12-38.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-38.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.12-38.el4.src.rpm i386: thunderbird-1.5.0.12-38.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-38.el4.i386.rpm ia64: thunderbird-1.5.0.12-38.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-38.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-38.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-2.0.0.24-17.el5_6.src.rpm i386: thunderbird-2.0.0.24-17.el5_6.i386.rpm thunderbird-debuginfo-2.0.0.24-17.el5_6.i386.rpm x86_64: thunderbird-2.0.0.24-17.el5_6.x86_64.rpm thunderbird-debuginfo-2.0.0.24-17.el5_6.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-2.0.0.24-17.el5_6.src.rpm i386: thunderbird-2.0.0.24-17.el5_6.i386.rpm thunderbird-debuginfo-2.0.0.24-17.el5_6.i386.rpm x86_64: thunderbird-2.0.0.24-17.el5_6.x86_64.rpm thunderbird-debuginfo-2.0.0.24-17.el5_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0073.html https://www.redhat.com/security/data/cve/CVE-2011-0074.html https://www.redhat.com/security/data/cve/CVE-2011-0075.html https://www.redhat.com/security/data/cve/CVE-2011-0077.html https://www.redhat.com/security/data/cve/CVE-2011-0078.html https://www.redhat.com/security/data/cve/CVE-2011-0080.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNui8pXlSAg2UNWIIRAi9DAKCPCMFX0EM/xIk4WA2GnT5eaABTsACgwO3g eg61ARvf9SaLkpjOpLrxqHA= =QSpp -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Apr 29 03:24:35 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 28 Apr 2011 23:24:35 -0400 Subject: [RHSA-2011:0475-01] Critical: thunderbird security update Message-ID: <201104290324.p3T3Obco007516@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2011:0475-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0475.html Issue date: 2011-04-28 CVE Names: CVE-2011-0070 CVE-2011-0071 CVE-2011-0073 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed HTML content. An HTML mail message containing malicious content could possibly lead to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0080, CVE-2011-0081) An arbitrary memory write flaw was found in the way Thunderbird handled out-of-memory conditions. If all memory was consumed when a user viewed a malicious HTML mail message, it could possibly lead to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0078) An integer overflow flaw was found in the way Thunderbird handled the HTML frameset tag. An HTML mail message with a frameset tag containing large values for the "rows" and "cols" attributes could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0077) A flaw was found in the way Thunderbird handled the HTML iframe tag. An HTML mail message with an iframe tag containing a specially-crafted source address could trigger this flaw, possibly leading to arbitrary code execution with the privileges of the user running Thunderbird. (CVE-2011-0075) A flaw was found in the way Thunderbird displayed multiple marquee elements. A malformed HTML mail message could cause Thunderbird to execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0074) A flaw was found in the way Thunderbird handled the nsTreeSelection element. Malformed content could cause Thunderbird to execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0073) A directory traversal flaw was found in the Thunderbird resource:// protocol handler. Malicious content could cause Thunderbird to access arbitrary files accessible to the user running Thunderbird. (CVE-2011-0071) A double free flaw was found in the way Thunderbird handled "application/http-index-format" documents. A malformed HTTP response could cause Thunderbird to execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0070) All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 700603 - CVE-2011-0078 Mozilla OOM condition arbitrary memory write (MFSA 2011-12) 700613 - CVE-2011-0077 Mozilla integer overflow in frameset spec (MFSA 2011-12) 700615 - CVE-2011-0075 Mozilla crash from bad iframe source (MFSA 2011-12) 700617 - CVE-2011-0074 Mozilla crash from several marquee elements (MFSA 2011-12) 700619 - CVE-2011-0073 Mozilla dangling pointer flaw (MFSA 2011-13) 700635 - CVE-2011-0071 Mozilla directory traversal via resource protocol (MFSA 2011-16) 700640 - CVE-2011-0070 Mozilla double free flaw (MFSA 2011-12) 700676 - CVE-2011-0081 Mozilla memory safety issue (MFSA 2011-12) 700677 - CVE-2011-0080 Mozilla memory safety issue (MFSA 2011-12) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-3.1.10-1.el6_0.src.rpm i386: thunderbird-3.1.10-1.el6_0.i686.rpm thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm x86_64: thunderbird-3.1.10-1.el6_0.x86_64.rpm thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-3.1.10-1.el6_0.src.rpm i386: thunderbird-3.1.10-1.el6_0.i686.rpm thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm ppc64: thunderbird-3.1.10-1.el6_0.ppc64.rpm thunderbird-debuginfo-3.1.10-1.el6_0.ppc64.rpm s390x: thunderbird-3.1.10-1.el6_0.s390x.rpm thunderbird-debuginfo-3.1.10-1.el6_0.s390x.rpm x86_64: thunderbird-3.1.10-1.el6_0.x86_64.rpm thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-3.1.10-1.el6_0.src.rpm i386: thunderbird-3.1.10-1.el6_0.i686.rpm thunderbird-debuginfo-3.1.10-1.el6_0.i686.rpm x86_64: thunderbird-3.1.10-1.el6_0.x86_64.rpm thunderbird-debuginfo-3.1.10-1.el6_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0070.html https://www.redhat.com/security/data/cve/CVE-2011-0071.html https://www.redhat.com/security/data/cve/CVE-2011-0073.html https://www.redhat.com/security/data/cve/CVE-2011-0074.html https://www.redhat.com/security/data/cve/CVE-2011-0075.html https://www.redhat.com/security/data/cve/CVE-2011-0077.html https://www.redhat.com/security/data/cve/CVE-2011-0078.html https://www.redhat.com/security/data/cve/CVE-2011-0080.html https://www.redhat.com/security/data/cve/CVE-2011-0081.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFNui9DXlSAg2UNWIIRAoeoAJ4ya/1EwQejBTS3GIHxJ28XZPaaAACfdqWO 6zGD+t7ZjDNi3ZpVMJxHcVY= =0F4L -----END PGP SIGNATURE-----