From bugzilla at redhat.com Thu Dec 1 16:53:34 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 1 Dec 2011 16:53:34 +0000 Subject: [RHSA-2011:1506-01] Low: Red Hat Enterprise Linux 4 - 3-Month End Of Life Notice Message-ID: <201112011653.pB1GrZdm006976@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise Linux 4 - 3-Month End Of Life Notice Advisory ID: RHSA-2011:1506-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1506.html Issue date: 2011-12-01 ===================================================================== 1. Summary: This is the 3-month notification of the End Of Life plans for Red Hat Enterprise Linux 4. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: In accordance with the Red Hat Enterprise Linux Errata Support Policy, the regular 7 year life-cycle of Red Hat Enterprise Linux 4 will end on February 29, 2012. After this date, Red Hat will discontinue the regular subscription services for Red Hat Enterprise Linux 4. Therefore, new bug fix, enhancement, and security errata updates, as well as technical support services will no longer be available for the following products: * Red Hat Enterprise Linux AS 4 * Red Hat Enterprise Linux ES 4 * Red Hat Enterprise Linux WS 4 * Red Hat Enterprise Linux Extras 4 * Red Hat Desktop 4 * Red Hat Global File System 4 * Red Hat Cluster Suite 4 Customers still running production workloads on Red Hat Enterprise Linux 4 are advised to begin planning the upgrade to Red Hat Enterprise Linux 5 or 6. Active subscribers of Red Hat Enterprise Linux already have access to all currently maintained versions of Red Hat Enterprise Linux, as part of their subscription without additional fees. For customers who are unable to migrate off Red Hat Enterprise Linux 4 before its end-of-life date, Red Hat intends to offer a limited, optional extension program. For more information, contact your Red Hat sales representative or channel partner. Details of the Red Hat Enterprise Linux life-cycle can be found on the Red Hat website: https://access.redhat.com/support/policy/updates/errata/ 4. Solution: This advisory contains an updated redhat-release package, that provides a copy of this end of life notice in the "/usr/share/doc/" directory. 5. Bugs fixed (http://bugzilla.redhat.com/): 754175 - Send Out RHEL 4 3-Month EOL Notice 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/redhat-release-4AS-10.3.src.rpm i386: redhat-release-4AS-10.3.i386.rpm ia64: redhat-release-4AS-10.3.ia64.rpm ppc: redhat-release-4AS-10.3.ppc.rpm s390: redhat-release-4AS-10.3.s390.rpm s390x: redhat-release-4AS-10.3.s390x.rpm x86_64: redhat-release-4AS-10.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/redhat-release-4Desktop-10.3.src.rpm i386: redhat-release-4Desktop-10.3.i386.rpm x86_64: redhat-release-4Desktop-10.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/redhat-release-4ES-10.3.src.rpm i386: redhat-release-4ES-10.3.i386.rpm ia64: redhat-release-4ES-10.3.ia64.rpm x86_64: redhat-release-4ES-10.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/redhat-release-4WS-10.3.src.rpm i386: redhat-release-4WS-10.3.i386.rpm ia64: redhat-release-4WS-10.3.ia64.rpm x86_64: redhat-release-4WS-10.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/support/policy/updates/errata/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO17D1XlSAg2UNWIIRAggrAJ9zKSm+6FTQXAUcPDo2/jUbXqKhBQCfd80y BxXvMFXxQXynic6gFcrTkSY= =RkTI -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 1 16:54:13 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 1 Dec 2011 16:54:13 +0000 Subject: [RHSA-2011:1507-01] Moderate: libarchive security update Message-ID: <201112011654.pB1GsEv7009335@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libarchive security update Advisory ID: RHSA-2011:1507-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1507.html Issue date: 2011-12-01 CVE Names: CVE-2011-1777 CVE-2011-1778 ===================================================================== 1. Summary: Updated libarchive packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libarchive programming library can create and read several different streaming archive formats, including GNU tar and cpio. It can also read ISO 9660 CD-ROM images. Two heap-based buffer overflow flaws were discovered in libarchive. If a user were tricked into expanding a specially-crafted ISO 9660 CD-ROM image or tar archive with an application using libarchive, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1777, CVE-2011-1778) All libarchive users should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using libarchive must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 705849 - CVE-2010-4666 CVE-2011-1777 CVE-2011-1778 CVE-2011-1779 Libarchive multiple security issues 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm i386: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm x86_64: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-2.8.3-3.el6_1.x86_64.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm i386: libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm x86_64: libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm x86_64: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-2.8.3-3.el6_1.x86_64.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm i386: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm ppc64: libarchive-2.8.3-3.el6_1.ppc.rpm libarchive-2.8.3-3.el6_1.ppc64.rpm libarchive-debuginfo-2.8.3-3.el6_1.ppc.rpm libarchive-debuginfo-2.8.3-3.el6_1.ppc64.rpm s390x: libarchive-2.8.3-3.el6_1.s390.rpm libarchive-2.8.3-3.el6_1.s390x.rpm libarchive-debuginfo-2.8.3-3.el6_1.s390.rpm libarchive-debuginfo-2.8.3-3.el6_1.s390x.rpm x86_64: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-2.8.3-3.el6_1.x86_64.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm i386: libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm ppc64: libarchive-debuginfo-2.8.3-3.el6_1.ppc.rpm libarchive-debuginfo-2.8.3-3.el6_1.ppc64.rpm libarchive-devel-2.8.3-3.el6_1.ppc.rpm libarchive-devel-2.8.3-3.el6_1.ppc64.rpm s390x: libarchive-debuginfo-2.8.3-3.el6_1.s390.rpm libarchive-debuginfo-2.8.3-3.el6_1.s390x.rpm libarchive-devel-2.8.3-3.el6_1.s390.rpm libarchive-devel-2.8.3-3.el6_1.s390x.rpm x86_64: libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm i386: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm x86_64: libarchive-2.8.3-3.el6_1.i686.rpm libarchive-2.8.3-3.el6_1.x86_64.rpm libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm i386: libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm x86_64: libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm libarchive-devel-2.8.3-3.el6_1.i686.rpm libarchive-devel-2.8.3-3.el6_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1777.html https://www.redhat.com/security/data/cve/CVE-2011-1778.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO17EgXlSAg2UNWIIRAu+LAJ9rtKJWxIkRf/+aZDgwObTnWxFxpgCeOO0T tXP21ivUeYDFufMwnu34kto= =2Uad -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 1 16:55:04 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 1 Dec 2011 16:55:04 +0000 Subject: [RHSA-2011:1508-01] Moderate: cyrus-imapd security update Message-ID: <201112011655.pB1Gt4WZ007352@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: cyrus-imapd security update Advisory ID: RHSA-2011:1508-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1508.html Issue date: 2011-12-01 CVE Names: CVE-2011-3372 CVE-2011-3481 ===================================================================== 1. Summary: Updated cyrus-imapd packages that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support. An authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372) A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially-crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481) Red Hat would like to thank the Cyrus IMAP project for reporting the CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia Research as the original reporter of CVE-2011-3372. Users of cyrus-imapd are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, cyrus-imapd will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 738391 - CVE-2011-3481 cyrus-imapd: NULL pointer dereference via crafted References header in email 740822 - CVE-2011-3372 cyrus-imapd: nntpd authentication bypass 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cyrus-imapd-2.2.12-17.el4.src.rpm i386: cyrus-imapd-2.2.12-17.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.i386.rpm cyrus-imapd-devel-2.2.12-17.el4.i386.rpm cyrus-imapd-murder-2.2.12-17.el4.i386.rpm cyrus-imapd-nntp-2.2.12-17.el4.i386.rpm cyrus-imapd-utils-2.2.12-17.el4.i386.rpm perl-Cyrus-2.2.12-17.el4.i386.rpm ia64: cyrus-imapd-2.2.12-17.el4.ia64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.ia64.rpm cyrus-imapd-devel-2.2.12-17.el4.ia64.rpm cyrus-imapd-murder-2.2.12-17.el4.ia64.rpm cyrus-imapd-nntp-2.2.12-17.el4.ia64.rpm cyrus-imapd-utils-2.2.12-17.el4.ia64.rpm perl-Cyrus-2.2.12-17.el4.ia64.rpm ppc: cyrus-imapd-2.2.12-17.el4.ppc.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.ppc.rpm cyrus-imapd-devel-2.2.12-17.el4.ppc.rpm cyrus-imapd-murder-2.2.12-17.el4.ppc.rpm cyrus-imapd-nntp-2.2.12-17.el4.ppc.rpm cyrus-imapd-utils-2.2.12-17.el4.ppc.rpm perl-Cyrus-2.2.12-17.el4.ppc.rpm s390: cyrus-imapd-2.2.12-17.el4.s390.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.s390.rpm cyrus-imapd-devel-2.2.12-17.el4.s390.rpm cyrus-imapd-murder-2.2.12-17.el4.s390.rpm cyrus-imapd-nntp-2.2.12-17.el4.s390.rpm cyrus-imapd-utils-2.2.12-17.el4.s390.rpm perl-Cyrus-2.2.12-17.el4.s390.rpm s390x: cyrus-imapd-2.2.12-17.el4.s390x.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.s390x.rpm cyrus-imapd-devel-2.2.12-17.el4.s390x.rpm cyrus-imapd-murder-2.2.12-17.el4.s390x.rpm cyrus-imapd-nntp-2.2.12-17.el4.s390x.rpm cyrus-imapd-utils-2.2.12-17.el4.s390x.rpm perl-Cyrus-2.2.12-17.el4.s390x.rpm x86_64: cyrus-imapd-2.2.12-17.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-17.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-17.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-17.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-17.el4.x86_64.rpm perl-Cyrus-2.2.12-17.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cyrus-imapd-2.2.12-17.el4.src.rpm i386: cyrus-imapd-2.2.12-17.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.i386.rpm cyrus-imapd-devel-2.2.12-17.el4.i386.rpm cyrus-imapd-murder-2.2.12-17.el4.i386.rpm cyrus-imapd-nntp-2.2.12-17.el4.i386.rpm cyrus-imapd-utils-2.2.12-17.el4.i386.rpm perl-Cyrus-2.2.12-17.el4.i386.rpm x86_64: cyrus-imapd-2.2.12-17.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-17.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-17.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-17.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-17.el4.x86_64.rpm perl-Cyrus-2.2.12-17.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cyrus-imapd-2.2.12-17.el4.src.rpm i386: cyrus-imapd-2.2.12-17.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.i386.rpm cyrus-imapd-devel-2.2.12-17.el4.i386.rpm cyrus-imapd-murder-2.2.12-17.el4.i386.rpm cyrus-imapd-nntp-2.2.12-17.el4.i386.rpm cyrus-imapd-utils-2.2.12-17.el4.i386.rpm perl-Cyrus-2.2.12-17.el4.i386.rpm ia64: cyrus-imapd-2.2.12-17.el4.ia64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.ia64.rpm cyrus-imapd-devel-2.2.12-17.el4.ia64.rpm cyrus-imapd-murder-2.2.12-17.el4.ia64.rpm cyrus-imapd-nntp-2.2.12-17.el4.ia64.rpm cyrus-imapd-utils-2.2.12-17.el4.ia64.rpm perl-Cyrus-2.2.12-17.el4.ia64.rpm x86_64: cyrus-imapd-2.2.12-17.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-17.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-17.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-17.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-17.el4.x86_64.rpm perl-Cyrus-2.2.12-17.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cyrus-imapd-2.2.12-17.el4.src.rpm i386: cyrus-imapd-2.2.12-17.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.i386.rpm cyrus-imapd-devel-2.2.12-17.el4.i386.rpm cyrus-imapd-murder-2.2.12-17.el4.i386.rpm cyrus-imapd-nntp-2.2.12-17.el4.i386.rpm cyrus-imapd-utils-2.2.12-17.el4.i386.rpm perl-Cyrus-2.2.12-17.el4.i386.rpm ia64: cyrus-imapd-2.2.12-17.el4.ia64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.ia64.rpm cyrus-imapd-devel-2.2.12-17.el4.ia64.rpm cyrus-imapd-murder-2.2.12-17.el4.ia64.rpm cyrus-imapd-nntp-2.2.12-17.el4.ia64.rpm cyrus-imapd-utils-2.2.12-17.el4.ia64.rpm perl-Cyrus-2.2.12-17.el4.ia64.rpm x86_64: cyrus-imapd-2.2.12-17.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-17.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-17.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-17.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-17.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-17.el4.x86_64.rpm perl-Cyrus-2.2.12-17.el4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cyrus-imapd-2.3.7-12.el5_7.2.src.rpm i386: cyrus-imapd-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.i386.rpm x86_64: cyrus-imapd-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cyrus-imapd-2.3.7-12.el5_7.2.src.rpm i386: cyrus-imapd-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.i386.rpm ia64: cyrus-imapd-2.3.7-12.el5_7.2.ia64.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.ia64.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.ia64.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.ia64.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.ia64.rpm ppc: cyrus-imapd-2.3.7-12.el5_7.2.ppc.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.ppc.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.ppc64.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.ppc.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.ppc64.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.ppc.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.ppc.rpm s390x: cyrus-imapd-2.3.7-12.el5_7.2.s390x.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.s390.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.s390x.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.s390.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.s390x.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.s390x.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.s390x.rpm x86_64: cyrus-imapd-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-debuginfo-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.i386.rpm cyrus-imapd-devel-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-perl-2.3.7-12.el5_7.2.x86_64.rpm cyrus-imapd-utils-2.3.7-12.el5_7.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.4.src.rpm i386: cyrus-imapd-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-utils-2.3.16-6.el6_1.4.i686.rpm ppc64: cyrus-imapd-2.3.16-6.el6_1.4.ppc64.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.ppc64.rpm cyrus-imapd-utils-2.3.16-6.el6_1.4.ppc64.rpm s390x: cyrus-imapd-2.3.16-6.el6_1.4.s390x.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.s390x.rpm cyrus-imapd-utils-2.3.16-6.el6_1.4.s390x.rpm x86_64: cyrus-imapd-2.3.16-6.el6_1.4.x86_64.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.x86_64.rpm cyrus-imapd-utils-2.3.16-6.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.4.src.rpm i386: cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.i686.rpm ppc64: cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.ppc.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.ppc64.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.ppc.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.ppc64.rpm s390x: cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.s390.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.s390x.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.s390.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.s390x.rpm x86_64: cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.x86_64.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.4.src.rpm i386: cyrus-imapd-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-utils-2.3.16-6.el6_1.4.i686.rpm x86_64: cyrus-imapd-2.3.16-6.el6_1.4.x86_64.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.x86_64.rpm cyrus-imapd-utils-2.3.16-6.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.4.src.rpm i386: cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.i686.rpm x86_64: cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.4.x86_64.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-3372.html https://www.redhat.com/security/data/cve/CVE-2011-3481.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO17FSXlSAg2UNWIIRApz3AJwMSEkNXXAOg7edZHcpYvTMTnFmkgCguMTJ vONJOhBxHyp2lAN/jaIaRZs= =byve -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 5 17:49:48 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 5 Dec 2011 17:49:48 +0000 Subject: [RHSA-2011:1780-01] Moderate: tomcat6 security and bug fix update Message-ID: <201112051749.pB5Hnm3N007067@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tomcat6 security and bug fix update Advisory ID: RHSA-2011:1780-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1780.html Issue date: 2011-12-05 CVE Names: CVE-2011-1184 CVE-2011-2204 CVE-2011-2526 CVE-2011-3190 ===================================================================== 1. Summary: Updated tomcat6 packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. APR (Apache Portable Runtime) as mentioned in the CVE-2011-3190 and CVE-2011-2526 descriptions does not refer to APR provided by the apr packages. It refers to the implementation of APR provided by the Tomcat Native library, which provides support for using APR with Tomcat. This library is not shipped with Red Hat Enterprise Linux 6. This update includes fixes for users who have elected to use APR with Tomcat by taking the Tomcat Native library from a different product. Such a configuration is not supported by Red Hat, however. Multiple flaws were found in the way Tomcat handled HTTP DIGEST authentication. These flaws weakened the Tomcat HTTP DIGEST authentication implementation, subjecting it to some of the weaknesses of HTTP BASIC authentication, for example, allowing remote attackers to perform session replay attacks. (CVE-2011-1184) A flaw was found in the way the Coyote (org.apache.coyote.ajp.AjpProcessor) and APR (org.apache.coyote.ajp.AjpAprProcessor) Tomcat AJP (Apache JServ Protocol) connectors processed certain POST requests. An attacker could send a specially-crafted request that would cause the connector to treat the message body as a new request. This allows arbitrary AJP messages to be injected, possibly allowing an attacker to bypass a web application's authentication checks and gain access to information they would otherwise be unable to access. The JK (org.apache.jk.server.JkCoyoteHandler) connector is used by default when the APR libraries are not present. The JK connector is not affected by this flaw. (CVE-2011-3190) A flaw was found in the Tomcat MemoryUserDatabase. If a runtime exception occurred when creating a new user with a JMX client, that user's password was logged to Tomcat log files. Note: By default, only administrators have access to such log files. (CVE-2011-2204) A flaw was found in the way Tomcat handled sendfile request attributes when using the HTTP APR or NIO (Non-Blocking I/O) connector. A malicious web application running on a Tomcat instance could use this flaw to bypass security manager restrictions and gain access to files it would otherwise be unable to access, or possibly terminate the Java Virtual Machine (JVM). The HTTP blocking IO (BIO) connector, which is not vulnerable to this issue, is used by default in Red Hat Enterprise Linux 6. (CVE-2011-2526) Red Hat would like to thank the Apache Tomcat project for reporting the CVE-2011-2526 issue. This update also fixes the following bug: * Previously, in certain cases, if "LANG=fr_FR" or "LANG=fr_FR.UTF-8" was set as an environment variable or in "/etc/sysconfig/tomcat6" on 64-bit PowerPC systems, Tomcat may have failed to start correctly. With this update, Tomcat works as expected when LANG is set to "fr_FR" or "fr_FR.UTF-8". (BZ#748807) Users of Tomcat should upgrade to these updated packages, which contain backported patches to correct these issues. Tomcat must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 717013 - CVE-2011-2204 tomcat: password disclosure vulnerability 720948 - CVE-2011-2526 tomcat: security manager restrictions bypass 734868 - CVE-2011-3190 tomcat: authentication bypass and information disclosure 741401 - CVE-2011-1184 tomcat: Multiple weaknesses in HTTP DIGEST authentication 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/tomcat6-6.0.24-35.el6_1.src.rpm noarch: tomcat6-6.0.24-35.el6_1.noarch.rpm tomcat6-admin-webapps-6.0.24-35.el6_1.noarch.rpm tomcat6-docs-webapp-6.0.24-35.el6_1.noarch.rpm tomcat6-el-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-javadoc-6.0.24-35.el6_1.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-lib-6.0.24-35.el6_1.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-35.el6_1.noarch.rpm tomcat6-webapps-6.0.24-35.el6_1.noarch.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/tomcat6-6.0.24-35.el6_1.src.rpm noarch: tomcat6-6.0.24-35.el6_1.noarch.rpm tomcat6-admin-webapps-6.0.24-35.el6_1.noarch.rpm tomcat6-docs-webapp-6.0.24-35.el6_1.noarch.rpm tomcat6-el-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-javadoc-6.0.24-35.el6_1.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-lib-6.0.24-35.el6_1.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-35.el6_1.noarch.rpm tomcat6-webapps-6.0.24-35.el6_1.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/tomcat6-6.0.24-35.el6_1.src.rpm noarch: tomcat6-6.0.24-35.el6_1.noarch.rpm tomcat6-el-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-lib-6.0.24-35.el6_1.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-35.el6_1.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/tomcat6-6.0.24-35.el6_1.src.rpm noarch: tomcat6-admin-webapps-6.0.24-35.el6_1.noarch.rpm tomcat6-docs-webapp-6.0.24-35.el6_1.noarch.rpm tomcat6-javadoc-6.0.24-35.el6_1.noarch.rpm tomcat6-webapps-6.0.24-35.el6_1.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/tomcat6-6.0.24-35.el6_1.src.rpm noarch: tomcat6-6.0.24-35.el6_1.noarch.rpm tomcat6-el-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-35.el6_1.noarch.rpm tomcat6-lib-6.0.24-35.el6_1.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-35.el6_1.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/tomcat6-6.0.24-35.el6_1.src.rpm noarch: tomcat6-admin-webapps-6.0.24-35.el6_1.noarch.rpm tomcat6-docs-webapp-6.0.24-35.el6_1.noarch.rpm tomcat6-javadoc-6.0.24-35.el6_1.noarch.rpm tomcat6-webapps-6.0.24-35.el6_1.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1184.html https://www.redhat.com/security/data/cve/CVE-2011-2204.html https://www.redhat.com/security/data/cve/CVE-2011-2526.html https://www.redhat.com/security/data/cve/CVE-2011-3190.html https://access.redhat.com/security/updates/classification/#moderate http://tomcat.apache.org/security-6.html https://access.redhat.com/support/offerings/production/soc.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3QQoXlSAg2UNWIIRAnQhAJ4wyYAD0nJ3ivEIZzQ+HX0ckt540gCfWDhz xgWHktaYxcPh2H3Un0C7F0k= =ap/0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:22:05 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:22:05 +0000 Subject: [RHSA-2011:1526-03] Low: glibc security, bug fix, and enhancement update Message-ID: <201112061522.pB6FM5cH016839@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: glibc security, bug fix, and enhancement update Advisory ID: RHSA-2011:1526-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1526.html Issue date: 2011-12-06 CVE Names: CVE-2009-5064 CVE-2011-1089 ===================================================================== 1. Summary: Updated glibc packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contain the standard C and the standard math libraries. Without these two libraries, a Linux system cannot function properly. A flaw was found in the way the ldd utility identified dynamically linked libraries. If an attacker could trick a user into running ldd on a malicious binary, it could result in arbitrary code execution with the privileges of the user running ldd. (CVE-2009-5064) It was found that the glibc addmntent() function, used by various mount helper utilities, did not handle certain errors correctly when updating the mtab (mounted file systems table) file. If such utilities had the setuid bit set, a local attacker could use this flaw to corrupt the mtab file. (CVE-2011-1089) Red Hat would like to thank Dan Rosenberg for reporting the CVE-2011-1089 issue. This update also fixes several bugs and adds various enhancements. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. Users are advised to upgrade to these updated glibc packages, which contain backported patches to resolve these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 676467 - glibc-debuginfo.i686 and glibc-debuginfo.x86_64 conflict 688980 - CVE-2011-1089 glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE 692393 - CVE-2009-5064 glibc: ldd unexpected code execution issue 694386 - POWER4 strncmp crashes reading past zero byte 700507 - nscd start produce USER_AVC 706903 - getpwuid unreliable when using NIS, missing flag: -DUSE_BINDINGDIR=1 711987 - [RHEL-6] statvfs tries to stat unrelated mountpoints 712248 - getconf returns incorrect FILESIZEBITS for Lustre filesystem 713134 - CVE-2009-5064 glibc: ldd unexpected code execution issue [rhel-6.2] 714823 - getaddrinfo returns PTR name in ai_canonname when using DNS 729036 - Debuginfo package issues in glibc 730379 - libresolv is not compiled with the stack protector enabled 731042 - pthread_create dumps core when it fails to set real time policy 736346 - make initgroups (setgroups) thread aware 737778 - setlocale() fails if LC_CTYPE is set to Turkish locale 738665 - strange pthread/fork deadlock 738763 - need to add IP_MULTICAST_ALL option to glibc headers 739184 - Statically-linked binaries that call gethostbyname crash when executed. 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm i386: glibc-2.12-1.47.el6.i686.rpm glibc-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-headers-2.12-1.47.el6.i686.rpm glibc-utils-2.12-1.47.el6.i686.rpm nscd-2.12-1.47.el6.i686.rpm x86_64: glibc-2.12-1.47.el6.i686.rpm glibc-2.12-1.47.el6.x86_64.rpm glibc-common-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.x86_64.rpm glibc-headers-2.12-1.47.el6.x86_64.rpm glibc-utils-2.12-1.47.el6.x86_64.rpm nscd-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm i386: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.i686.rpm x86_64: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-static-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm x86_64: glibc-2.12-1.47.el6.i686.rpm glibc-2.12-1.47.el6.x86_64.rpm glibc-common-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.x86_64.rpm glibc-headers-2.12-1.47.el6.x86_64.rpm glibc-utils-2.12-1.47.el6.x86_64.rpm nscd-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm x86_64: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-static-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm i386: glibc-2.12-1.47.el6.i686.rpm glibc-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-headers-2.12-1.47.el6.i686.rpm glibc-utils-2.12-1.47.el6.i686.rpm nscd-2.12-1.47.el6.i686.rpm ppc64: glibc-2.12-1.47.el6.ppc.rpm glibc-2.12-1.47.el6.ppc64.rpm glibc-common-2.12-1.47.el6.ppc64.rpm glibc-debuginfo-2.12-1.47.el6.ppc.rpm glibc-debuginfo-2.12-1.47.el6.ppc64.rpm glibc-debuginfo-common-2.12-1.47.el6.ppc.rpm glibc-debuginfo-common-2.12-1.47.el6.ppc64.rpm glibc-devel-2.12-1.47.el6.ppc.rpm glibc-devel-2.12-1.47.el6.ppc64.rpm glibc-headers-2.12-1.47.el6.ppc64.rpm glibc-utils-2.12-1.47.el6.ppc64.rpm nscd-2.12-1.47.el6.ppc64.rpm s390x: glibc-2.12-1.47.el6.s390.rpm glibc-2.12-1.47.el6.s390x.rpm glibc-common-2.12-1.47.el6.s390x.rpm glibc-debuginfo-2.12-1.47.el6.s390.rpm glibc-debuginfo-2.12-1.47.el6.s390x.rpm glibc-debuginfo-common-2.12-1.47.el6.s390.rpm glibc-debuginfo-common-2.12-1.47.el6.s390x.rpm glibc-devel-2.12-1.47.el6.s390.rpm glibc-devel-2.12-1.47.el6.s390x.rpm glibc-headers-2.12-1.47.el6.s390x.rpm glibc-utils-2.12-1.47.el6.s390x.rpm nscd-2.12-1.47.el6.s390x.rpm x86_64: glibc-2.12-1.47.el6.i686.rpm glibc-2.12-1.47.el6.x86_64.rpm glibc-common-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.x86_64.rpm glibc-headers-2.12-1.47.el6.x86_64.rpm glibc-utils-2.12-1.47.el6.x86_64.rpm nscd-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm i386: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.i686.rpm ppc64: glibc-debuginfo-2.12-1.47.el6.ppc.rpm glibc-debuginfo-2.12-1.47.el6.ppc64.rpm glibc-debuginfo-common-2.12-1.47.el6.ppc.rpm glibc-debuginfo-common-2.12-1.47.el6.ppc64.rpm glibc-static-2.12-1.47.el6.ppc.rpm glibc-static-2.12-1.47.el6.ppc64.rpm s390x: glibc-debuginfo-2.12-1.47.el6.s390.rpm glibc-debuginfo-2.12-1.47.el6.s390x.rpm glibc-debuginfo-common-2.12-1.47.el6.s390.rpm glibc-debuginfo-common-2.12-1.47.el6.s390x.rpm glibc-static-2.12-1.47.el6.s390.rpm glibc-static-2.12-1.47.el6.s390x.rpm x86_64: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-static-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm i386: glibc-2.12-1.47.el6.i686.rpm glibc-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-headers-2.12-1.47.el6.i686.rpm glibc-utils-2.12-1.47.el6.i686.rpm nscd-2.12-1.47.el6.i686.rpm x86_64: glibc-2.12-1.47.el6.i686.rpm glibc-2.12-1.47.el6.x86_64.rpm glibc-common-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-devel-2.12-1.47.el6.i686.rpm glibc-devel-2.12-1.47.el6.x86_64.rpm glibc-headers-2.12-1.47.el6.x86_64.rpm glibc-utils-2.12-1.47.el6.x86_64.rpm nscd-2.12-1.47.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/glibc-2.12-1.47.el6.src.rpm i386: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.i686.rpm x86_64: glibc-debuginfo-2.12-1.47.el6.i686.rpm glibc-debuginfo-2.12-1.47.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6.i686.rpm glibc-debuginfo-common-2.12-1.47.el6.x86_64.rpm glibc-static-2.12-1.47.el6.i686.rpm glibc-static-2.12-1.47.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-5064.html https://www.redhat.com/security/data/cve/CVE-2011-1089.html https://access.redhat.com/security/updates/classification/#low https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/glibc.html#RHSA-2011-1526 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jLaXlSAg2UNWIIRAhJcAJ9+lERVfKF5uDcgmw1VP0K0aI4VFgCfXd2o Y/R8wzFTMAlQ80JF0eaA7Zw= =OhRU -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:24:13 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:24:13 +0000 Subject: [RHSA-2011:1530-03] Moderate: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update Message-ID: <201112061524.pB6FOEmC017591@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update Advisory ID: RHSA-2011:1530-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1530.html Issue date: 2011-12-06 CVE Names: CVE-2011-1020 CVE-2011-3347 CVE-2011-3638 CVE-2011-4110 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 6. This is the second regular update. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * The proc file system could allow a local, unprivileged user to obtain sensitive information or possibly cause integrity issues. (CVE-2011-1020, Moderate) * Non-member VLAN (virtual LAN) packet handling for interfaces in promiscuous mode and also using the be2net driver could allow an attacker on the local network to cause a denial of service. (CVE-2011-3347, Moderate) * A flaw was found in the Linux kernel in the way splitting two extents in ext4_ext_convert_to_initialized() worked. A local, unprivileged user with access to mount and unmount ext4 file systems could use this flaw to cause a denial of service. (CVE-2011-3638, Moderate) * A NULL pointer dereference flaw was found in the way the Linux kernel's key management facility handled user-defined key types. A local, unprivileged user could use the keyctl utility to cause a denial of service. (CVE-2011-4110, Moderate) Red Hat would like to thank Kees Cook for reporting CVE-2011-1020; Somnath Kotur for reporting CVE-2011-3347; and Zheng Liu for reporting CVE-2011-3638. This update also fixes several hundred bugs and adds enhancements. Refer to the Red Hat Enterprise Linux 6.2 Release Notes for information on the most significant of these changes, and the Technical Notes for further information, both linked to in the References. All Red Hat Enterprise Linux 6 users are advised to install these updated packages, which correct these issues, and fix the bugs and add the enhancements noted in the Red Hat Enterprise Linux 6.2 Release Notes and Technical Notes. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 523122 - [RHEL-6 Xen]: Cannot balloon a Xen domU guest above the initial starting memory 612608 - GFS2: kernel BUG at fs/gfs2/glock.c:173! running brawl w/flocks 635968 - Parallel port issue in RHEL 6.0 server 637520 - reboot(RB_AUTOBOOT) fails if kvm instance is running 645777 - [RHEL6][Kernel] BUG: MAX_STACK_TRACE_ENTRIES too low! 646224 - cifs: properly disable fscache support 652262 - Slow writes to ext4 partition - INFO: task flush-253:7:2137 blocked for more than 120 seconds. 654198 - CIFS needs to gracefully handle unresponsive server 656458 - inode used before security_d_instantiate 658291 - SELinux does context calculations even on mount labeled filesystems 662626 - cifs: update NTLMSSP authentication code 662666 - Cannot find the extended attribute of #11 inode after remount 667177 - cachefilesd fails to start with SELinux disabled on default config file 668775 - BKL (lock_kernel) in soft lockup during parallel IO discovery 668791 - disable CONFIG_CIFS_EXPERIMENTAL in RHEL6 669739 - bump domain memory limits 673629 - hugetlbfs fs interface should deal with minus value echoed to /proc/sys/vm/nr_hugepages gracefully 678102 - dlm: increase default hash table sizes 678794 - pktgen makes machine panic 679262 - [RFE] kernel: kptr_restrict for hiding kernel pointers from unprivileged users [rhel-6.2] 680358 - CVE-2011-1020 kernel: no access restrictions of /proc/pid/* after setuid program exec 681647 - Ext4 warnings are printed if a file size in indirect block map is extended to the maximum file size 682789 - Request to update existing thinkpad_acpi module to support newer thinkpads e.g. X100E 688410 - NUMA problems in transparent hugepages 688944 - Kernel Warnings when starting Mellanox 10Gb network 689223 - [RHEL-6] statvfs tries to stat unrelated mountpoints 690619 - pull in NETIF_F_RXHASH support 691267 - [RFE] kernel: add new syncfs syscall 691945 - Non-responsive scsi target leads to excessive scsi recovery and dm-mp failover time 692677 - RHEL6.1-20110316.1 dell-pe2800 NMI received for unknown reason 695377 - cio: prevent purging of CCW devices in the online state 696396 - UV: fscache taints kernel; NFS requires fscache; NFS taints kernel 696422 - [SGI 6.2 FEAT] UV: add smp_affinity_list 696998 - Check if PTE is already allocated during page fault 697403 - Patch file for RAID controller driver, arcmsr, at RHEL6 Update2 697659 - NFS4 problem using open() on exported urandom device 697868 - xenfv: 32-bit guest hangs on boot 698094 - NULL pointer dereference, IP: blkiocg_lookup_group+0x9/0x40 698506 - cont. Bonded interface doesn't issue IGMP report (join) on slave interface during failover 699151 - ext4_lookup: deleted inode referenced 700277 - [RHEL6] RFE : Enable SO_REUSEADDR support for rdma_cm 700343 - netjet - blacklist Digium TDM400P 700463 - qdio: reset error states immediately 700499 - [RHEL6] oom_kill.c : printk in __oom_kill_task no longer includes p->uid as it did in RHEL 5 700538 - MLS - cgconfigparser cannot search on /cgroup/ dirs 701373 - Bugfixes for the 2.6.37 NFS client 701825 - NFS4: Incorrect server behavior when using OPEN call with O_CREATE on a directory on which the process has no WRITE permissions. 701857 - hibernate cause kernel panic 701951 - System Hang when there is smart error on IBM platform 702183 - kernel panic when remove dccp_probe module 702508 - TCP traffic to IPv6 causes 32 bit Linux OS to reboot 702674 - powerpc: Only sleep in rtas_busy_delay if we have useful work to do 703055 - RHEL6.1 x86_64 HVM guest crashes on AMD host when guest memory size is larger than 8G 703474 - xen-kbdfront - advertise either absolute or relative coordinates 704128 - EDD module incorrectly checks validity of a BIOS provided data. 704511 - RHEL6.1 mm: hugepages can cause negative commitlimit 705082 - qemu-kvm takes lots of CPU resources due to _spin_lock_irqsave on a 64 cpu machine 705210 - [RFE] Provide support for Wacom cintiq (DTU-2231) 705441 - intel-iommu: missing flush prior to removing domains + avoid broken vm/si domain unlinking 706018 - miss xmit_hash_policy=layer2+3 in modinfo bonding output 706385 - pending THP improvements for RHEL6.2 707005 - dlm: fcntl F_SETLKW should be interruptible in GFS2 707142 - Can't change lacp_rate in bonding mode=802.3ad 707755 - blkio controller: Backport patches for per cgroup stats and lockless throttling for no rule group 707757 - cfq-iosched: Set group_isolation tunable 1 by default 707762 - blkio controller: Backport miscellaneous fixes and cleanups from upstream 708000 - cifs: asynchronous writepages support 708350 - nosegneg not used in 32-bit Xen guests 709856 - Kernel trace on m2.4xlarge or m2.2xlarge instances in EC2 710159 - ib_srp scan/rescan keep adding new scsi devices 710668 - using gdb to debug kernel causes crash 711317 - Mask dangerous features on xen hvm, even if the HV doesn't 711326 - xenpv: backport sched_clock change 711400 - panic in cifsd code after unexpected lookup error -88. 711600 - backport "sched: Next buddy hint on sleep and preempt path" 711636 - THP has a build error when !CONFIG_SMP 712000 - [bnx2x_extract_max_cfg:1079(ethxx)]Illegal configuration detected for Max BW - using 100 instead 712139 - GFS2: Update to rhel6.1 broke dovecot writing to a gfs2 filesystem 712252 - vmscan: correctly check if reclaimer should schedule during shrink_slab 712258 - mm: compaction: Ensure that the compaction free scanner does not move to the next zone 712260 - migrate: don't account swapcache as shmem 712653 - make guest mode entry to be rcu quiescent state 713337 - backport checksum optimization for virtio_net 713585 - RHEL 6.1 Xen paravirt guest is getting network outage during live migration 713620 - Bug for patches outside AGP/DRM required for AGP/DRM backport from 3.0-rc 713730 - enclosure fix 714183 - v4l app in Documentation fails to compile because it uses f15 kernel-headers 714325 - cxgb3i causing eeh on PPC64 714590 - Intel wireless broken on 11n for many users 714684 - RFE: command to clear scrollback buffer in linux terminal 714740 - pNFS Bakeathon Bug Fixes. 714883 - Solarflare network adapter not available during install 716263 - need to enable software bridge to do igmp snooping to receive/forward ipv6 router advertisements 716452 - Anaconda installer doesn't work with Xen virtual block devices. 716498 - bump domain memory limits 716520 - cfq-iosched: CFQ can get GPF at cfq_free_io_context() 717377 - Feature Request: Chelsio iw_cxgb4 driver updates for 6.2 718332 - ext4: WARNING: at fs/namei.c:1306 lookup_one_len during orphan inode recovery with quotas 719357 - dlm: increase hash table maximum allocatable size 719587 - Kernel: system hungs when remove bonding module with arp monitor 720712 - ls hangs for a specific directory (nfsv3) in kernels starting at -157 720918 - the block layer does't merge the requests sent from jbd/2. 721044 - jbd2: Improve scalability by not taking j_state_lock in jbd2_journal_stop() fix missing from RHEL6 kernel. 721205 - Expose RDWRGSFS new instructions to guest 722257 - NFS readdirs losing their cookies 722565 - using page_count(pfn_to_page(pfn)) on a random pfn is unsafe 723670 - Introduce "acpi_rsdp=" parameter for kdump 723849 - installation: kernel panic in EFI during restart of installer 724995 - xen mmu: fix a race window causing leave_mm BUG() 725007 - xen: off by one errors in multicalls.c 725041 - xen/hvc: only notify if we actually sent something 725234 - asix: fix setting mac address for AX88772 725370 - cifs: CIFSSMBQAllEAs parses xattr data wrongly 725435 - APEI: disable EINJ parameter support by default 725444 - (direct_io) __blockdev_direct_IO calls kzalloc for dio struct causes OLTP performance regression 725519 - revert of bug 716498 that causes x86_64 xen pv guest boot failure 725538 - RHEL 6 is missing upstream backport to remove prefetch instructions. 725580 - Improve sysfs performance when many block devices are created 725716 - need to fix previous ABI break in net_device struct 725812 - python-linux-perf: Create new package with the Linux perf subsystem python binding 725816 - AIM7 on redeye test bed loses up to 45% performance with barriers enabled 725855 - Avoid merging a VMA with another VMA which is cloned from the parent process. 726099 - __scsi_add_device+0xc8/0x170 has a problem when there is scsi enclosure 726437 - Disk write cache flushes are no longer logged in blktrace 728476 - machine panics with "DMAR hardware is malfunctioning" 729176 - ext4 regression: quota incorrect/orphan inodes on removal of (locked) files 729434 - nfs sillyrename can call d_move without holding the i_mutex 729437 - cifs: fix NTLMSSP based signing to samba 730077 - kdump: x86: Improve crashkernel=auto logic to take into account memory used by filtering utility 730144 - RHEL6.2: revert latest patchset from 587729 730503 - RHEL 6.1 xen guest crashes with kernel BUG at arch/x86/xen/mmu.c:1457! 730599 - qla4xxx: fix iscsi boot: export session iface name 730838 - radeon/kms regression in 6.2 731585 - ext3/ext4 mbcache causes high CPU load [RHEL6] 732986 - thp: fix tail page refcounting 733651 - netfront MTU drops to 1500 after domain migration 733672 - xen PV guest kernel 2.6.32 processes lock up in D state 734509 - APEI: set enable bit for OSC call 734732 - oom killer is killing more processes than is needed 735048 - USB3 device attached to a USB3 hub, fail to unregister when USB3 hub plug out. 735050 - USB3 device fail to register after a re-attach to USB3 hub 735124 - LVM --type raid1 create attempt panics system and leaves it unbootable 735263 - USB3 device can't be detected on USB2 hub 736425 - CVE-2011-3347 kernel: be2net: promiscuous mode and non-member VLAN packets DoS 738163 - [kdump] be2net 0000:04:00.0: mccq poll timed out 740312 - xfs: avoid synchronous transactions when deleting attr blocks 740465 - Host got crash when guest running netperf client with UDP_STREAM protocol with IPV6 742414 - serious SPECjbb regression in KVM guest due to cpu cgroups 743590 - x86_64 xen guest crash when booting with maxmem = 128Gb 744154 - khubd hungs 746254 - Kernel: dm-log-userspace not properly registering log devices 746861 - umount of RHEL 6.2 2.6.32-209.el6.x86_64 beta pNFS share can hang or cause Oops 747291 - booting latest kernel on radeon hd 6450 (CAICOS) results in corrupt screen/memory 747292 - booting latest kernel on llano system has wrong resolution and can cause memory corruption 747942 - CVE-2011-3638 kernel: ext4: ext4_ext_insert_extent() kernel oops 751297 - CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm i386: kernel-2.6.32-220.el6.i686.rpm kernel-debug-2.6.32-220.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm kernel-debug-devel-2.6.32-220.el6.i686.rpm kernel-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm kernel-devel-2.6.32-220.el6.i686.rpm kernel-headers-2.6.32-220.el6.i686.rpm perf-2.6.32-220.el6.i686.rpm perf-debuginfo-2.6.32-220.el6.i686.rpm noarch: kernel-doc-2.6.32-220.el6.noarch.rpm kernel-firmware-2.6.32-220.el6.noarch.rpm x86_64: kernel-2.6.32-220.el6.x86_64.rpm kernel-debug-2.6.32-220.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm kernel-devel-2.6.32-220.el6.x86_64.rpm kernel-headers-2.6.32-220.el6.x86_64.rpm perf-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm perf-debuginfo-2.6.32-220.el6.i686.rpm python-perf-2.6.32-220.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm python-perf-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm noarch: kernel-doc-2.6.32-220.el6.noarch.rpm kernel-firmware-2.6.32-220.el6.noarch.rpm x86_64: kernel-2.6.32-220.el6.x86_64.rpm kernel-debug-2.6.32-220.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm kernel-devel-2.6.32-220.el6.x86_64.rpm kernel-headers-2.6.32-220.el6.x86_64.rpm perf-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm python-perf-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm i386: kernel-2.6.32-220.el6.i686.rpm kernel-debug-2.6.32-220.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm kernel-debug-devel-2.6.32-220.el6.i686.rpm kernel-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm kernel-devel-2.6.32-220.el6.i686.rpm kernel-headers-2.6.32-220.el6.i686.rpm perf-2.6.32-220.el6.i686.rpm perf-debuginfo-2.6.32-220.el6.i686.rpm noarch: kernel-doc-2.6.32-220.el6.noarch.rpm kernel-firmware-2.6.32-220.el6.noarch.rpm ppc64: kernel-2.6.32-220.el6.ppc64.rpm kernel-bootwrapper-2.6.32-220.el6.ppc64.rpm kernel-debug-2.6.32-220.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-220.el6.ppc64.rpm kernel-debug-devel-2.6.32-220.el6.ppc64.rpm kernel-debuginfo-2.6.32-220.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-220.el6.ppc64.rpm kernel-devel-2.6.32-220.el6.ppc64.rpm kernel-headers-2.6.32-220.el6.ppc64.rpm perf-2.6.32-220.el6.ppc64.rpm perf-debuginfo-2.6.32-220.el6.ppc64.rpm s390x: kernel-2.6.32-220.el6.s390x.rpm kernel-debug-2.6.32-220.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-220.el6.s390x.rpm kernel-debug-devel-2.6.32-220.el6.s390x.rpm kernel-debuginfo-2.6.32-220.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-220.el6.s390x.rpm kernel-devel-2.6.32-220.el6.s390x.rpm kernel-headers-2.6.32-220.el6.s390x.rpm kernel-kdump-2.6.32-220.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-220.el6.s390x.rpm kernel-kdump-devel-2.6.32-220.el6.s390x.rpm perf-2.6.32-220.el6.s390x.rpm perf-debuginfo-2.6.32-220.el6.s390x.rpm x86_64: kernel-2.6.32-220.el6.x86_64.rpm kernel-debug-2.6.32-220.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm kernel-devel-2.6.32-220.el6.x86_64.rpm kernel-headers-2.6.32-220.el6.x86_64.rpm perf-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm perf-debuginfo-2.6.32-220.el6.i686.rpm python-perf-2.6.32-220.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-220.el6.ppc64.rpm kernel-debuginfo-2.6.32-220.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-220.el6.ppc64.rpm perf-debuginfo-2.6.32-220.el6.ppc64.rpm python-perf-2.6.32-220.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-220.el6.s390x.rpm kernel-debuginfo-2.6.32-220.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-220.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-220.el6.s390x.rpm perf-debuginfo-2.6.32-220.el6.s390x.rpm python-perf-2.6.32-220.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm python-perf-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm i386: kernel-2.6.32-220.el6.i686.rpm kernel-debug-2.6.32-220.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm kernel-debug-devel-2.6.32-220.el6.i686.rpm kernel-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm kernel-devel-2.6.32-220.el6.i686.rpm kernel-headers-2.6.32-220.el6.i686.rpm perf-2.6.32-220.el6.i686.rpm perf-debuginfo-2.6.32-220.el6.i686.rpm noarch: kernel-doc-2.6.32-220.el6.noarch.rpm kernel-firmware-2.6.32-220.el6.noarch.rpm x86_64: kernel-2.6.32-220.el6.x86_64.rpm kernel-debug-2.6.32-220.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm kernel-devel-2.6.32-220.el6.x86_64.rpm kernel-headers-2.6.32-220.el6.x86_64.rpm perf-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-220.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-2.6.32-220.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm perf-debuginfo-2.6.32-220.el6.i686.rpm python-perf-2.6.32-220.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm perf-debuginfo-2.6.32-220.el6.x86_64.rpm python-perf-2.6.32-220.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1020.html https://www.redhat.com/security/data/cve/CVE-2011-3347.html https://www.redhat.com/security/data/cve/CVE-2011-3638.html https://www.redhat.com/security/data/cve/CVE-2011-4110.html https://access.redhat.com/security/updates/classification/#moderate https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.2_Release_Notes/index.html https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/kernel.html#RHBA-2011-1530 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jNIXlSAg2UNWIIRAp4lAJ4+AALIWuE8C/s+A4SopOj0RHGQZwCfd/Zu 2P1+EHtdOxDZvYT+wfs9t2g= =hvA5 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:25:27 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:25:27 +0000 Subject: [RHSA-2011:1531-03] Moderate: qemu-kvm security, bug fix, and enhancement update Message-ID: <201112061525.pB6FPRBp001333@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm security, bug fix, and enhancement update Advisory ID: RHSA-2011:1531-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1531.html Issue date: 2011-12-06 CVE Names: CVE-2011-2527 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. It was found that qemu-kvm did not properly drop supplemental group privileges when the root user started guests from the command line ("/usr/libexec/qemu-kvm") with the "-runas" option. A qemu-kvm process started this way could use this flaw to gain access to files on the host that are accessible to the supplementary groups and not accessible to the primary group. (CVE-2011-2527) Note: This issue only affected qemu-kvm when it was started directly from the command line. It did not affect the Red Hat Enterprise Virtualization platform or applications that start qemu-kvm via libvirt, such as the Virtual Machine Manager (virt-manager). This update also fixes several bugs and adds various enhancements. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. All users of qemu-kvm are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 561414 - Writes to virtual usb-storage produce I/O errors 599306 - Some strange behaviors on key's appearance viewed by using vnc 609342 - rhel3u9 install can't find package after inserting second CD, but install can continue 621482 - [RFE] Be able to get progress from qemu-img 624983 - QEMU should support the newer set of MSRs for kvmclock 627585 - Improve error messages for bad options in -drive and -device 633370 - [6.1 FEAT] Enhance QED image format to support streaming from remote systems 633380 - [6.2 FEAT] Include QED image format for KVM guests 645351 - Add support for USB 2.0 (EHCI) to QEMU 655719 - no error pops when change cd to non-exist file 656779 - Core dumped when hot plug/un-plug virtio serial port to the same chardev 658467 - kvm clock breaks migration result stability - for unit test propose 669581 - Migration Never end while Use firewall reject migration tcp port 676982 - RFE: no qmp command for live snapshot 678729 - Hotplug VF/PF with invalid addr value leading to qemu-kvm process quit with core dump 678731 - Update qemu-kvm -device pci-assign,? properties 680378 - no error message when loading zero size internal snapshot 681736 - Guest->Host communication stops for other ports after one port is unplugged 682227 - qemu-kvm doesn't exit when binding to specified port fails 693645 - RFE: add spice option to enable/disable copy paste 694373 - ballooning value reset to original value after setting a negative number 694378 - Core dump occurs when ballooning memory to 0 698537 - ide: core dump when stop/cont guest 700134 - [qemu-kvm] - qxl runs i/o requests synchronously 705070 - QMP: screendump command does not allow specification of monitor to capture 707130 - ACPI description of serial and parallel ports incorrect with -chardev/-device 709397 - virtio-serial unthrottling needs to use a bottomhalf to avoid recursion 710046 - qemu-kvm prints warning "Using CPU model [...]" (with patch) 711354 - Fix and enable enough of SCSI to make usb-storage work 712046 - Qemu allocates an existed macaddress to hotpluged nic 714773 - qemu missing marker for qemu.kvm.qemu_vmalloc 715017 - Report disk latency (read and write) for each storage device 715141 - Wrong Ethertype for RARP 715582 - qemu-kvm doesn't report error when supplied negative spice port value 717958 - qemu-kvm start vnc even though -spice ... is supplied 718664 - Migration from host RHEL6.1+ to host RHEL6.0.z failed with floppy 720237 - usb migration compatibility 720773 - CVE-2011-2527 qemu: when started as root, extra groups are not dropped correctly 720979 - do not use next as a variable name in qemu-kvm systemtap tapset 722728 - Update qemu-img convert/re-base man page 723270 - Report cdrom tray status in a monitor command such as info block 723858 - usb: add companion controller support 723863 - usb: fixes various issues. 723864 - usb: compile out the crap 723870 - tag devices without migration support 725565 - migration subsections are still broken 725625 - Hot unplug one virtio balloon device cause another balloon device unavailable 725965 - spice client mouse doesn't work after migration 726014 - Fix memleak on exit in virtio-balloon 726015 - Fix memleak on exit in virtio-blk 726020 - Fix memleaks in all virtio devices 726023 - Migration after hot-unplug virtio-balloon will not succeed 728120 - print error on usb speed mismatch between device and bus/port 728464 - QEMU does not honour '-no-shutdown' flag after the first shutdown attempt 729104 - qemu-kvm: pci needs multifunction property 729572 - qcow2: Loading internal snapshot can corrupt image 729621 - ASSERT worker->running failed on source qemu during migration with Spice session 729869 - qxl: primary surface not saved on migration 729969 - Make screendump command available in QMP 731759 - SPICE: migration fails with warning: error while loading state section id 4 732949 - Guest screen becomes abnormal after migration with spice 733010 - core dump when issue fdisk -l in guest which has two usb-storage attached 733993 - migration target can crash (assert(d->ssd.running)) 734860 - qemu-kvm: segfault when missing host parameter for socket chardev 734995 - Core dump when hotplug three usb-hub into the same port under both uhci and ehci 735716 - QEMU should report the PID of the process that sent it signals for troubleshooting purposes 736975 - Qemu-kvm fails to unregister virtio-balloon-pci device when unplugging 737921 - Spice password on migration target expires before Spice client is connected 738487 - Fix termination by signal with -no-shutdown 738555 - Stop exposing -enable-nested 739480 - qemu-kvm core dumps when migration with reboot 740547 - qxl: migrating in vga mode causes a "panic: virtual address out of range" 741878 - USB tablet mouse does not work well when migrating between 6.2<->6.2 hosts and 6.1<->6.2 hosts 742401 - qemu-kvm disable live snapshot support 742458 - Tracker Bug:Big block layer backport 742469 - Drives can not be locked without media present 742476 - Make eject fail for non-removable drives even with -f 742480 - Don't let locked flag prevent medium load 742484 - should be also have snapshot on floppy 743269 - Hot unplug of snapshot device crashes 743342 - IDE CD-ROM tray state gets lost on migration 743391 - KVM guest limited to 40bit of physical address space 744518 - qemu-kvm core dumps when qxl-linux guest migrate with reboot 744780 - use-after-free in QEMU SCSI target code 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2527.html https://access.redhat.com/security/updates/classification/#moderate https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/qemu-kvm.html#RHSA-2011-1531 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jO/XlSAg2UNWIIRAu/0AJ9X1O7y3zwGkrMGVliXoTTQBU8VkwCffFhH KSEB7L6SBPgInunMylRe5yg= =eCa8 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:26:39 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:26:39 +0000 Subject: [RHSA-2011:1532-03] Moderate: kexec-tools security, bug fix, and enhancement update Message-ID: <201112061526.pB6FQdPg010270@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kexec-tools security, bug fix, and enhancement update Advisory ID: RHSA-2011:1532-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1532.html Issue date: 2011-12-06 CVE Names: CVE-2011-3588 CVE-2011-3589 CVE-2011-3590 ===================================================================== 1. Summary: An updated kexec-tools package that fixes three security issues, various bugs, and adds enhancements is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Kexec allows for booting a Linux kernel from the context of an already running kernel. Kdump used the SSH (Secure Shell) "StrictHostKeyChecking=no" option when dumping to SSH targets, causing the target kdump server's SSH host key not to be checked. This could make it easier for a man-in-the-middle attacker on the local network to impersonate the kdump SSH target server and possibly gain access to sensitive information in the vmcore dumps. (CVE-2011-3588) mkdumprd created initrd files with world-readable permissions. A local user could possibly use this flaw to gain access to sensitive information, such as the private SSH key used to authenticate to a remote server when kdump was configured to dump to an SSH target. (CVE-2011-3589) mkdumprd included unneeded sensitive files (such as all files from the "/root/.ssh/" directory and the host's private SSH keys) in the resulting initrd. This could lead to an information leak when initrd files were previously created with world-readable permissions. Note: With this update, only the SSH client configuration, known hosts files, and the SSH key configured via the newly introduced sshkey option in "/etc/kdump.conf" are included in the initrd. The default is the key generated when running the "service kdump propagate" command, "/root/.ssh/kdump_id_rsa". (CVE-2011-3590) Red Hat would like to thank Kevan Carstensen for reporting these issues. This update also fixes several bugs and adds various enhancements. Space precludes documenting all of these changes in this advisory. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. All kexec-tools users should upgrade to this updated package, which contains backported patches to resolve these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 681796 - Pass "noefi acpi_rsdp=X" to the second kernel 708503 - fails to build without downstream patches 716439 - CVE-2011-3588 CVE-2011-3589 CVE-2011-3590 kexec-tools: Multiple security flaws by management of kdump core files and ramdisk images 719105 - mkdumprd hang in depsolve_modlist when running kernel is not target kernel 725484 - kexec-tools: x86: Start using nr_cpus=1 instead of maxcpus=1 727892 - kexec-tools: Warn a user to use maxcpus=1 instead of nr_cpus=1 for older kernels 731394 - [kexec-tools] Remove warning when kdump service starts 734528 - kexec-tools: Add memory usage debugging capability in second kernel 739050 - non-fatal <unknown> scriptlet failure in rpm package fence-agents 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kexec-tools-2.0.0-209.el6.src.rpm i386: kexec-tools-2.0.0-209.el6.i686.rpm kexec-tools-debuginfo-2.0.0-209.el6.i686.rpm x86_64: kexec-tools-2.0.0-209.el6.x86_64.rpm kexec-tools-debuginfo-2.0.0-209.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kexec-tools-2.0.0-209.el6.src.rpm x86_64: kexec-tools-2.0.0-209.el6.x86_64.rpm kexec-tools-debuginfo-2.0.0-209.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kexec-tools-2.0.0-209.el6.src.rpm i386: kexec-tools-2.0.0-209.el6.i686.rpm kexec-tools-debuginfo-2.0.0-209.el6.i686.rpm ppc64: kexec-tools-2.0.0-209.el6.ppc64.rpm kexec-tools-debuginfo-2.0.0-209.el6.ppc64.rpm s390x: kexec-tools-2.0.0-209.el6.s390x.rpm kexec-tools-debuginfo-2.0.0-209.el6.s390x.rpm x86_64: kexec-tools-2.0.0-209.el6.x86_64.rpm kexec-tools-debuginfo-2.0.0-209.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kexec-tools-2.0.0-209.el6.src.rpm i386: kexec-tools-2.0.0-209.el6.i686.rpm kexec-tools-debuginfo-2.0.0-209.el6.i686.rpm x86_64: kexec-tools-2.0.0-209.el6.x86_64.rpm kexec-tools-debuginfo-2.0.0-209.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-3588.html https://www.redhat.com/security/data/cve/CVE-2011-3589.html https://www.redhat.com/security/data/cve/CVE-2011-3590.html https://access.redhat.com/security/updates/classification/#moderate https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/kexec-tools.html#RHSA-2011-1532 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jQMXlSAg2UNWIIRAjV9AJ9Z4ms5xCvGM7YRZQmkHS0vf7BUgACfYFmy zzV4tO+I3e9Gu9KKIfR9xJw= =G1sq -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:28:04 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:28:04 +0000 Subject: [RHSA-2011:1533-04] Moderate: ipa security and bug fix update Message-ID: <201112061528.pB6FS5EE030600@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ipa security and bug fix update Advisory ID: RHSA-2011:1533-04 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1533.html Issue date: 2011-12-06 CVE Names: CVE-2011-3636 ===================================================================== 1. Summary: Updated ipa packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Red Hat Identity Management is a centralized authentication, identity management and authorization solution for both traditional and cloud based enterprise environments. It integrates components of the Red Hat Directory Server, MIT Kerberos, Red Hat Certificate System, NTP and DNS. It provides web browser and command-line interfaces. Its administration tools allow an administrator to quickly install, set up, and administer a group of domain controllers to meet the authentication and identity management requirements of large scale Linux and UNIX deployments. A Cross-Site Request Forgery (CSRF) flaw was found in Red Hat Identity Management. If a remote attacker could trick a user, who was logged into the management web interface, into visiting a specially-crafted URL, the attacker could perform Red Hat Identity Management configuration changes with the privileges of the logged in user. (CVE-2011-3636) Due to the changes required to fix CVE-2011-3636, client tools will need to be updated for client systems to communicate with updated Red Hat Identity Management servers. New client systems will need to have the updated ipa-client package installed to be enrolled. Already enrolled client systems will need to have the updated certmonger package installed to be able to renew their system certificate. Note that system certificates are valid for two years by default. Updated ipa-client and certmonger packages for Red Hat Enterprise Linux 6 were released as part of Red Hat Enterprise Linux 6.2. Future updates will provide updated packages for Red Hat Enterprise Linux 5. This update includes several bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.2 Technical Notes for information on the most significant of these changes, linked to in the References section. Users of Red Hat Identity Management should upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 680504 - Can not delete reverse DNS record - interactive CLI mode 681978 - Uninstalling client if the server is installed should be prevented 681979 - Man page is not clear for ipa-client-install --on-master option usage 688925 - IPA Replica Install Hangs if DS port is unreachable by Master Server 689023 - Can't create password policy via UI 689810 - Inconsistent Error message attempting to add duplicate user 690185 - Uninstalling ipa-client doesn't restore some files, if reinstalled with -force option 690473 - Installing ipa-client indicates DNS is updated for this unknown hostname, but is not on server 692144 - Uninstalling ipa-client doesn't restore sssd.conf, if previously installed with --no-sssd option 692950 - Installing ipa server with --no-reverse option sets up reverse zone 693464 - Make explicit reference to ds-replication package 693483 - Duplicate GIDs 693766 - Mismatch in man page and --help for ipa-server-install 693771 - Preinstall check needed if zonemgr has special char 696193 - Client install fails on ipa-join when master is down, and replica is running. 696268 - IPA server install with DNS setup, and with --ip-address cannot resolve hostnames 696282 - Preinstall check needed if subject is not specified in required format 697009 - ipa-replica-manage: man page and help pages do not match 697878 - IPA server install should wait for Directory Server port to open after every restart of dirsrv 698219 - Uninstalling ipa-client fails, if it joined replica when being installed 698421 - IPA Replica Installing failing on during replication update 700586 - brand name error in ipa-dns-install cli, it still says "FreeIPA Server" 701325 - Unable to Download Certificate with Browser 703188 - TPS: Source rebuild Failures on x86_64 client and workstation 703869 - Managed Entry Configuration Not Setup when installing replica server 704012 - IPA Replica Installation Fails - reverse address doesn't match error 705794 - IPA Replica not started on reboot 705800 - Improve debug logging in ipa-client-install 707001 - Illegal CL input results in NULL csr when requesting external ca. 707009 - IPA server with external CA fails with cannot concatenate 'str' and 'NoneType' objects 707133 - Successful "ipa-nis-manage enable" command has exit status as 1. 707229 - ipa-server-install with --no-host-dns still checks DNS 707312 - Add support for loading new zones from LDAP 708294 - No output while deleting a sudorule. 709645 - Remaining external hosts not displayed while removing one from a sudorule. 709665 - Removed external host is displayed in the output when "--all" switch is used. 710240 - Added option to Sudo rule message is displayed even when the given option already exists. 710245 - Removed option from Sudo rule message is displayed even when the given option doesn't exist. 710253 - RunAs group is not displayed in output while adding as sudorule-add-runasuser with --groups swtich. 710494 - ipa-nis-manage crashes if the specified passwd file does not exist. 710530 - ipa-nis-manage does not quit when an empty password is entered. 710592 - ipa sudocmd-add accepts blank spaces as sudo commands. 710598 - ipa sudocmdgroup-add accepts blank spaces as sudocmdgroup name. 710601 - ipa sudorule-add accepts blank spaces as sudorule name. 711667 - Comma separated values for --runasexternaluser option in sudorule-mod are accepted as a single value. 711671 - Comma separated values for --runasexternalgroup option in sudorule-mod are accepted as a single value. 711761 - Internal error while removing sudorule option without "--sudooption". 711786 - sudorunasgroup automatically picks up incorrect value while adding a sudorunasuser. 712889 - Internal Error: ipa cert-remove-hold ; revocation reason 7 713069 - Comma separated values for --externaluser option in sudorule-mod are accepted as a single value. 713374 - Misleading purpose statement for "ipa help sudorule-remove-runasuser" 713380 - RunAs group is not displayed in output while removing as sudorule-add-runasuser with --groups swtich. 713385 - Missing label for "ipasudorunas_group". 713481 - Removed "RunAs External Group" is displayed in the output when "--all" switch is used. 713501 - Inconsistency in how "runas" is termed. 713531 - [ipa webui] error msg does not match with UI label 713549 - [ipa webui] Deleting more than 2 elements leaves the Delete prompt open 713603 - [ipa webui] inconsistent user member list 713798 - Set allow-recursion by default in IPA DNS 714238 - --sizelimit unhelpful error with *-find commands 714597 - ipa-client-install adds duplicate information to krb5.conf 714600 - ipa-client-install should configure sssd to store password if offline 714919 - ipa-client-install should configure hostname 714924 - ipa-client-install complains about non-existing nss_ldap 715112 - Managed Entries: mep_mod_post_op: Unable to update mapped attributes from origin entry 716287 - ipa host-mod --setattr should not allow enrolledBy to be changed 716432 - when directory server debugging enabled, ipactl should not display debugging 716462 - IPA with integrated DNS - reverse zone is now being added incorrectly 717020 - [ipa webui] When deactivating user, it updates the user, without having to click on "update" btn 717625 - [ipa webui] Unable to update config changes 717724 - [ipa webui] Config: Certificate Subject Base - Should not be Editable 717726 - [ipa webui] Config: Name on the configuration page is irrelevant and means nothing to an admin 717729 - [ipa webui] Config: Missing configurable options 717732 - [ipa webui] Config: Page Needs Better Organization 717965 - ipa config-show : should display new "Password Expiration Notification" 718062 - When admin resets a user's password with "ipa passwd" user's failed log in count is not reset 719656 - Disabling ipa-nis-manage removes netgroup compat suffix in DS. 720011 - [ipa webui] Add Host: dns zone filter replaces text already typed in hostname. 720013 - [ipa webui] Add Host: dns zone filter should not list reverse zones 720336 - WebUI not displaying admin options if the user is admin, but only via nested group 720711 - Users are not matched from sudo client. 722228 - [ipa webui] Force Add Host with IP address - Allows cancel but still adds host and dns record 722468 - [ipa webui] Host Edit Page lists Host Name twice 723027 - [ipa webui] Host Edit Page Missing Fields 723233 - HBAC rule :: invalid error message now that deny rule is deprecated and help needs update 723241 - Unexpected error message with krb Failure Count Interval on i386 723622 - Need an arch-specific Requires on cyrus-sasl-gssapi 723624 - Regression: Internal Error: Adding Host Groups 723778 - No output while deleting an automount location. 723781 - Missing message summary while adding an automount location. 723882 - [ipa webui] Host OTP from previously added host appears in new host's edit page 723969 - Regression: Incorrect Error message returned attempting to add user with uid 0 723990 - Can not create replication package with ipa-replica-prepare 724036 - Internal error revoking certificate - default revocation reason 725433 - automountmap gets added even though the return code is 1. 725763 - Incorrect message summary while adding an automountkey. 726028 - Automountkey value doesn't get renamed. 726123 - Unable to use "--continue" option with "ipa automountkey-del". 726454 - [ipa webui] After setting an OTP the Web UI does not indicate one was set 726526 - Reduce number of ports used by CS in IPA by default 726715 - Importing /etc/auto.master does not detect and import /etc/auto.direct. 726722 - Error message states 'automountlocationcn' while add/mod/del automountmap or automountkey with empty location. 726725 - Error message states 'automountmapautomountmapname' while add/mod/del automountkey with empty automountmap name. 726751 - [ipa webui] Hostgroups :: enroll :: Error 'cn' required when attempting to filter groups with hide already enrolled unchecked 726943 - IPA should enable configurable ports for its management web interface 727282 - [ipa webui] Can not get or view host certificate - Regression 727691 - [IPA WebUI] Identity->DNS : why there is "member" and "setting" under DNS operation 727921 - [ipa webui] Hostgroup :: No memberOf Net Groups Tab 728118 - Regression: Unknown attribute 'ipasudorunasgroup_group" displayed while adding sudo runasgroup. 728614 - el61 - ipa-replica-install does not check for dbus, fails on certmonger 728950 - IPA should start even if certs are expired 729089 - [ipa webui] Does not return appropriate error when deleting an external host but checking update dns 729166 - ipa-server-install creates wrong reverse zone record in LDAP 729245 - Regression: Missing message summary while adding sudooption. 729246 - Regression: Missing message summary while removing sudooption. 729377 - ipa-server-install fails on DNS errors when no DNS check is required 729665 - [ipa webui] Checking/Unchecking "Hide already enrolled" doesn't change list; 730436 - use slapi_rwlock instead of NSPR PR_RWLock directly 730713 - [ipa webui] Checkbox stays checked after deleting a list of objects 730751 - [ipa webui] inconsistency in enabling "delete" buttons 731784 - Add Requires on subscription-manager for entitlements 731804 - [IPA] When upgrading ipa from 2.0.0-23 to 2.1.0-1 uninstall is leaving leftovers and reinstall fails. 731805 - [ipa webui] in-consistency error msg 732084 - IPA 2.1 won't start if SELinux is disabled 732088 - IPA man page is unclear about allowed combinations of arguments 732468 - ipa-client-install should set LDAPSASL_NOCANON when calling ipa-getkeytab 732521 - ipa entitle-register : prompts for rhsm password twice like you are trying to set a new password 732803 - Rebase IPA to upstream 2.1.1 732996 - Access denied by HBAC rules while using the default ftp hbac service. 733009 - ipa-client-install says system configured after an unsuccessful run 733436 - IPA does not always properly detect its configuration status 734013 - ipa-client-install breaks network configuration 734706 - ipa hbactest does not evaluate users from groups in an hbacrule. 734725 - Incorrect service name in examples of ipa help hbactest. 735187 - [ipa webui] Sudo Rule has extra User group section in "As Whom" section 736276 - ipa hbactest fails if sourcehost is external. 736455 - [ipa webui] Sudo Rule includes indirect hosts and users members in its list to add 736617 - ipa-client-install mishandles ntp service configuration 736684 - ipa-client-install should sync time before kinit 736787 - ipa-client-install fails to join ipa server. 737048 - ipa-client-install calls authconfig with wrong parameters 737516 - ipa-server files with incorrect selinux context 737581 - ipa host-add Allowed to add host - hostname trailing space 737994 - File parameter fails if prompted for 737997 - should enforce some naming constraints on users and groups 738038 - [ipa webui] Remove Category info from HBAC and Sudo pages 738053 - ipa-ldap-updater : Not an end user utility and the man pages should reflect this 738339 - [ipa webui] Encode special chars in values when displaying 738693 - user is not prompted to enter current password when changing to a new password 739040 - Traceback message displayed while installing ipa client on IPv6 machine. 739060 - Disable entitlement plugin and CAL counting 739061 - Disable entitlement plugin in Web UI 739089 - Unable to add ipa user on IPv6 machine. 739195 - [ipa webui] Unprovisioning keytab does not have cancel option 739604 - ipa-server-install :: failing to configure CA :: restorecon returning 1 when changing context 739640 - [ipa webui] Allowed to add service without defining service name 739650 - [ipa webui] IPA Server Configuration :: Issue with Default Size Limit and Default User Group 740320 - [ipa webui] Posix checkbox for group-add has no effect 740830 - Intermittently see "search criteria was not specific enough." while adding a hbacrule 740838 - Missing additional info while adding a non-existing service to an hbacrule. 740844 - Missing additional info while removing a non-existing service from an hbacrule. 740850 - hbactest does not resolve canonical names during simulation. 740854 - Inconsistency in the error output while providing an invalid rule name. 740879 - [ipa webui] In adder_dialog, an object can be selected to be added multiple times. 740880 - [ipa webui] In adder_dialog, change order of >> and << 740885 - [ipa webui] In adder_dialog, no error indicated when choosing to enroll without selecting an object 740891 - [ipa webui] Deleting a host in HBAC Rule without selecting it, throws a browser error instead of an IPA error 741050 - Unable to configure IPA client against IPA server with anonymous bind disabled 741277 - [ipa webui] IN HBAC & Sudo, when a category is set to 'All', entries in that category are not deleted 741677 - ipa-client-install --password=$PASSWORD will cause /var/log/ipaclient-install.log to contain the password. 741808 - ipa migrate-ds does not migrate all groups that are expected to migrate 742024 - [ipa webui] Missing option in Config tab to set default shell 742327 - Default DNS Administration Role - Permissions missing 742616 - IPA man pages should be more clear about the meaning of --selfsign 742875 - named fails to start after installing ipa server when short hostname preceeds fqdn in /etc/hosts. 743253 - duplicate hostgroup and netgroup 743295 - [ipa webui] If adding non-posix group, unchecking posix box should disable GID field 743788 - Title is missing while configuring browser first time 743936 - [ipa webui] Unable to access Webui 743955 - Cert error when accessing host in webui or cli 744024 - ipa-client-install return code indicates a success, even though it failed 744074 - [ipa webui] global password policy should not be able to be deleted 744101 - Client install fails when anonymous bind is disabled 744234 - Internal Server Error adding invalid reverse DNS zone 744264 - [ipa webui] missing fields in password policy page 744306 - Unable to add Windows Synchronization Agreement 744410 - ipa hbactest does not evaluate indirect members from groups. 744422 - Leaks KDC password and master password via command line arguments 744798 - Traceback when upgrading from ipa-server-2.1.1-1 to ipa-server-2.1.2-2 745392 - ipa-client-install hangs if the discovered server is unresponsive 745575 - [ipa webui] Config - User search fields - if blank, throws error - an internal error has occurred 745698 - --forwarder option of ipa-dns-install allows invalid IP address. 745957 - [ipa webui] As a Host Administrator, user does not have access to the Host tab 746056 - [ipa webui] Unable to add external user for RunAs User for Sudo rules 746199 - typo in error message while adding invalid ptr record. 746227 - hbactest fails while you have svcgroup in hbacrule. 746229 - ipa-server-install fails with latest dev build 746276 - Error when using ipa-client-install with --no-sssd option 746298 - installation fails if sssd.conf exists and is already configured 746717 - Disable automember functionality 747028 - Fix minor problems in help system 747443 - Certmonger fail to issue host certificate when IPA client is outside of the IPA domain. 747710 - CVE-2011-3636 FreeIPA: CSRF vulnerability 748754 - "krb5kdc: line 1: 7: command not found" message displayed during ipactl restart on multi-cpu system. 749352 - users not in ypcat netgroup output 751179 - [ipa webui] Unable to change password, misleading error 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ipa-2.1.3-9.el6.src.rpm i386: ipa-client-2.1.3-9.el6.i686.rpm ipa-debuginfo-2.1.3-9.el6.i686.rpm ipa-python-2.1.3-9.el6.i686.rpm x86_64: ipa-client-2.1.3-9.el6.x86_64.rpm ipa-debuginfo-2.1.3-9.el6.x86_64.rpm ipa-python-2.1.3-9.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ipa-2.1.3-9.el6.src.rpm i386: ipa-admintools-2.1.3-9.el6.i686.rpm ipa-debuginfo-2.1.3-9.el6.i686.rpm ipa-server-2.1.3-9.el6.i686.rpm ipa-server-selinux-2.1.3-9.el6.i686.rpm x86_64: ipa-admintools-2.1.3-9.el6.x86_64.rpm ipa-debuginfo-2.1.3-9.el6.x86_64.rpm ipa-server-2.1.3-9.el6.x86_64.rpm ipa-server-selinux-2.1.3-9.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ipa-2.1.3-9.el6.src.rpm x86_64: ipa-client-2.1.3-9.el6.x86_64.rpm ipa-debuginfo-2.1.3-9.el6.x86_64.rpm ipa-python-2.1.3-9.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ipa-2.1.3-9.el6.src.rpm x86_64: ipa-admintools-2.1.3-9.el6.x86_64.rpm ipa-debuginfo-2.1.3-9.el6.x86_64.rpm ipa-server-2.1.3-9.el6.x86_64.rpm ipa-server-selinux-2.1.3-9.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ipa-2.1.3-9.el6.src.rpm i386: ipa-admintools-2.1.3-9.el6.i686.rpm ipa-client-2.1.3-9.el6.i686.rpm ipa-debuginfo-2.1.3-9.el6.i686.rpm ipa-python-2.1.3-9.el6.i686.rpm ipa-server-2.1.3-9.el6.i686.rpm ipa-server-selinux-2.1.3-9.el6.i686.rpm ppc64: ipa-admintools-2.1.3-9.el6.ppc64.rpm ipa-client-2.1.3-9.el6.ppc64.rpm ipa-debuginfo-2.1.3-9.el6.ppc64.rpm ipa-python-2.1.3-9.el6.ppc64.rpm s390x: ipa-admintools-2.1.3-9.el6.s390x.rpm ipa-client-2.1.3-9.el6.s390x.rpm ipa-debuginfo-2.1.3-9.el6.s390x.rpm ipa-python-2.1.3-9.el6.s390x.rpm x86_64: ipa-admintools-2.1.3-9.el6.x86_64.rpm ipa-client-2.1.3-9.el6.x86_64.rpm ipa-debuginfo-2.1.3-9.el6.x86_64.rpm ipa-python-2.1.3-9.el6.x86_64.rpm ipa-server-2.1.3-9.el6.x86_64.rpm ipa-server-selinux-2.1.3-9.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ipa-2.1.3-9.el6.src.rpm i386: ipa-admintools-2.1.3-9.el6.i686.rpm ipa-client-2.1.3-9.el6.i686.rpm ipa-debuginfo-2.1.3-9.el6.i686.rpm ipa-python-2.1.3-9.el6.i686.rpm ipa-server-2.1.3-9.el6.i686.rpm ipa-server-selinux-2.1.3-9.el6.i686.rpm x86_64: ipa-admintools-2.1.3-9.el6.x86_64.rpm ipa-client-2.1.3-9.el6.x86_64.rpm ipa-debuginfo-2.1.3-9.el6.x86_64.rpm ipa-python-2.1.3-9.el6.x86_64.rpm ipa-server-2.1.3-9.el6.x86_64.rpm ipa-server-selinux-2.1.3-9.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-3636.html https://access.redhat.com/security/updates/classification/#moderate https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/ipa.html#RHBA-2011-1533 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jRbXlSAg2UNWIIRAjqXAKCN5/08O/An67Ch8i/qPfMRIsPt4QCeI3Ua N5S8TXQ0nTnPJAM5XKZ/Bfo= =SQxq -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:29:24 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:29:24 +0000 Subject: [RHSA-2011:1534-03] Low: nfs-utils security, bug fix, and enhancement update Message-ID: <201112061529.pB6FTPic019928@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: nfs-utils security, bug fix, and enhancement update Advisory ID: RHSA-2011:1534-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1534.html Issue date: 2011-12-06 CVE Names: CVE-2011-1749 CVE-2011-2500 ===================================================================== 1. Summary: Updated nfs-utils packages that fix two security issues, various bugs, and add one enhancement are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server, and related tools such as the mount.nfs, umount.nfs, and showmount programs. A flaw was found in the way nfs-utils performed IP based authentication of mount requests. In configurations where a directory was exported to a group of systems using a DNS wildcard or NIS (Network Information Service) netgroup, an attacker could possibly gain access to other directories exported to a specific host or subnet, bypassing intended access restrictions. (CVE-2011-2500) It was found that the mount.nfs tool did not handle certain errors correctly when updating the mtab (mounted file systems table) file. A local attacker could use this flaw to corrupt the mtab file. (CVE-2011-1749) This update also fixes several bugs and adds an enhancement. Documentation for these bug fixes and the enhancement will be available shortly from the Technical Notes document, linked to in the References section. Users of nfs-utils are advised to upgrade to these updated packages, which contain backported patches to resolve these issues and add this enhancement. After installing this update, the nfs service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 692702 - rpc.idmapd sometimes fails to start due to sunrpc 697975 - CVE-2011-1749 nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE 702273 - Cannot umount NFS mount containing spaces 715078 - update exports(5) manpage with details about ipv6 configuration 716949 - CVE-2011-2500 nfs-utils: Improper authentication of an incoming request when an IP based authentication used 720479 - nfs-utils-1.2.3 breaks svcgssd - incorrectly orders libraries when built from source 723438 - rpc.mountd can segfault with showmount - REFERENCE TO PATCH THAT FIXES THIS 729001 - Debug file missing in debuginfo package for a binary 747400 - RHEL 6.2 beta rpcdebug has no flag for pNFS debug 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/nfs-utils-1.2.3-15.el6.src.rpm i386: nfs-utils-1.2.3-15.el6.i686.rpm nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm x86_64: nfs-utils-1.2.3-15.el6.x86_64.rpm nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/nfs-utils-1.2.3-15.el6.src.rpm x86_64: nfs-utils-1.2.3-15.el6.x86_64.rpm nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/nfs-utils-1.2.3-15.el6.src.rpm i386: nfs-utils-1.2.3-15.el6.i686.rpm nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm ppc64: nfs-utils-1.2.3-15.el6.ppc64.rpm nfs-utils-debuginfo-1.2.3-15.el6.ppc64.rpm s390x: nfs-utils-1.2.3-15.el6.s390x.rpm nfs-utils-debuginfo-1.2.3-15.el6.s390x.rpm x86_64: nfs-utils-1.2.3-15.el6.x86_64.rpm nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/nfs-utils-1.2.3-15.el6.src.rpm i386: nfs-utils-1.2.3-15.el6.i686.rpm nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm x86_64: nfs-utils-1.2.3-15.el6.x86_64.rpm nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1749.html https://www.redhat.com/security/data/cve/CVE-2011-2500.html https://access.redhat.com/security/updates/classification/#low https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/nfs-utils.html#RHSA-2011-1534 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jSoXlSAg2UNWIIRApFxAJ9tUhh8zz0/Utv0u8PXlxAOiTADxwCfUqA0 V8lWt2jxpgfmB//Xa/y0FEc= =GR1I -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:33:46 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:33:46 +0000 Subject: [RHSA-2011:1536-03] Low: sos security, bug fix, and enhancement update Message-ID: <201112061533.pB6FXkR8020417@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: sos security, bug fix, and enhancement update Advisory ID: RHSA-2011:1536-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1536.html Issue date: 2011-12-06 CVE Names: CVE-2011-4083 ===================================================================== 1. Summary: An updated sos package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - noarch Red Hat Enterprise Linux HPC Node (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch 3. Description: Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. (CVE-2011-4083) This updated sos package also includes numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. All users of sos are advised to upgrade to this updated package, which contains backported patches to correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 600813 - [RFE] capture complete list of yum repositories in sosreport 673244 - [RFE] include output of ibv_devinfo command (libibverbs-utils package) in sosreport 677124 - RFE: iSCSI Target plugin for sosreport. 682124 - sosreport does not capture nslcd.conf file. 683404 - autofs plugin does not collect chkconfig autofs status as intended 691477 - sosreport does not include lsusb output 709491 - grab vmmemctl 713449 - sosreport truncates leading and trailing whitespace from command outputs 726360 - Extend qpidd plugin 726427 - [RFE] sosreport should collect the result of ethtool -g, ethtool -c, and ethtool -a by default 736718 - path is wrong for hardware.py plugin 749383 - CVE-2011-4083 sos: sosreport is gathering certificate-based RHN entitlement private keys 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/sos-2.2-17.el6.src.rpm noarch: sos-2.2-17.el6.noarch.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/sos-2.2-17.el6.src.rpm noarch: sos-2.2-17.el6.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/sos-2.2-17.el6.src.rpm noarch: sos-2.2-17.el6.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/sos-2.2-17.el6.src.rpm noarch: sos-2.2-17.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4083.html https://access.redhat.com/security/updates/classification/#low https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/sos.html#RHSA-2011-1536 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jT8XlSAg2UNWIIRAu/7AJ9HaTkmfsKkzfofMwEAM/ww3sJQogCdFHDM zG45Ro5GFbZXIxcdy/gwANA= =4yNz -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:35:49 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:35:49 +0000 Subject: [RHSA-2011:1580-03] Low: resource-agents security, bug fix, and enhancement update Message-ID: <201112061535.pB6FZnRt002573@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: resource-agents security, bug fix, and enhancement update Advisory ID: RHSA-2011:1580-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1580.html Issue date: 2011-12-06 CVE Names: CVE-2010-3389 ===================================================================== 1. Summary: An updated resource-agents package that fixes one security issue, several bugs, and adds multiple enhancements is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux High Availability (v. 6) - i386, x86_64 Red Hat Enterprise Linux Resilient Storage (v. 6) - i386, x86_64 3. Description: The resource-agents package contains a set of scripts to interface with several services to operate in a High Availability environment for both Pacemaker and rgmanager service managers. It was discovered that certain resource agent scripts set the LD_LIBRARY_PATH environment variable to an insecure value containing empty path elements. A local user able to trick a user running those scripts to run them while working from an attacker-writable directory could use this flaw to escalate their privileges via a specially-crafted dynamic library. (CVE-2010-3389) Red Hat would like to thank Raphael Geissert for reporting this issue. This update also fixes the following bugs: * When using the Sybase database and the ASEHAagent resource in the cluster.conf file, it was not possible to run more than one ASEHAagent per Sybase installation. Consequently, a second ASEHA (Sybase Adaptive Server Enterprise (ASE) with the High Availability Option) agent could not be run. This bug has been fixed and it is now possible to use two ASEHA agents using the same Sybase installation. (BZ#711852) * The s/lang scripts, which implement internal functionality for the rgmanager package, while the central_processing option is in use, were included in the wrong package. Now, the rgmanager and resource-agents packages require each other for installation to prevent problems when they are used separately. (BZ#693518) * Previously, the oracledb.sh script was using the "shutdown abort" command as the first attempt to shut down a database. With this update, oracledb.sh first attempts a graceful shutdown via the "shutdown immediate" command before forcing the shutdown. (BZ#689801) * Previously, when setting up a service on a cluster with a shared IP resource and an Apache resource, the generated httpd.conf file contained a bug in the line describing the shared IP address (the "Listen" line). Now, the Apache resource agent generates the "Listen" line properly. (BZ#667217) * If a high-availability (HA) cluster service was defined with an Apache resource and was named with two words, such as "kickstart httpd", the service never started because it could not find a directory with the space character in its name escaped. Now, Apache resources work properly if a name contains a space as described above. (BZ#667222) * When inheritance was used in the cluster.conf file, a bug in the /usr/share/cluster/nfsclient.sh file prevented it from monitoring NFS exports properly. Consequently, monitoring of NFS exports to NFS clients resulted in an endless loop. This bug has been fixed and the monitoring now works as expected. (BZ#691814) * Previously, the postgres-8 resource agent did not detect when a PostgreSQL server failed to start. This bug has been fixed and postgres-8 now works as expected in the described scenario. (BZ#694816) * When using the Pacemaker resource manager, the fs.sh resource agent reported an error condition, if called with the "monitor" parameter and the referenced device did not exist. Consequently, the error condition prevented the resource from being started. Now, fs.sh returns the proper response code in the described scenario, thus fixing this bug. (BZ#709400) * Previously, numerous RGManager resource agents returned incorrect response codes when coupled with the Pacemaker resource manager. Now, the agents have been updated to work with Pacemaker properly. (BZ#727643) This update also adds the following enhancement: * With this update, when the network is removed from a node using the netfs.sh resource agent, it now recovers faster than previously. (BZ#678497) As well, this update upgrades the resource-agents package to upstream version 3.9.2, which provides a number of bug fixes and enhancements over the previous version. (BZ#707127) All users of resource-agents are advised to upgrade to this updated package, which corrects these issues and adds these enhancements. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 639044 - CVE-2010-3389 rgmanager: insecure library loading vulnerability 661888 - Support/testing of XFS filesystem as part of RHEL HA Add On 667217 - Listen line in generated httpd.conf incorrect 667222 - Apache resources with spaces in their names fail to start 678497 - netfs.sh patch, when network is lost it takes too long to unmount the NFS filesystems 691814 - nfsclient exports doens't work. 693518 - Move rgmanager S/Lang from resource-agents to rgmanager 694816 - postgres-8 resource agent does not detect a failed start of postgres server 707127 - resource-agents rebase 709400 - fs.sh resource agent monitor should not return an error if device does not exist. 711852 - second ASEHA agent wont start - Unique attribute collision 727643 - Modify major resource-agent agents to provide proper return codes to pacemaker 6. Package List: Red Hat Enterprise Linux High Availability (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/resource-agents-3.9.2-7.el6.src.rpm i386: resource-agents-3.9.2-7.el6.i686.rpm resource-agents-debuginfo-3.9.2-7.el6.i686.rpm x86_64: resource-agents-3.9.2-7.el6.x86_64.rpm resource-agents-debuginfo-3.9.2-7.el6.x86_64.rpm Red Hat Enterprise Linux Resilient Storage (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/resource-agents-3.9.2-7.el6.src.rpm i386: resource-agents-3.9.2-7.el6.i686.rpm resource-agents-debuginfo-3.9.2-7.el6.i686.rpm x86_64: resource-agents-3.9.2-7.el6.x86_64.rpm resource-agents-debuginfo-3.9.2-7.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-3389.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jYlXlSAg2UNWIIRAqFwAJsFVpGgKx/8nNL3N2pThKUQGqzfrwCghmUw xbkeY9CLhWgh7p9iodmrFlc= =m2Er -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:37:21 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:37:21 +0000 Subject: [RHSA-2011:1581-03] Low: ruby security, bug fix, and enhancement update Message-ID: <201112061537.pB6FbRV8003168@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: ruby security, bug fix, and enhancement update Advisory ID: RHSA-2011:1581-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1581.html Issue date: 2011-12-06 CVE Names: CVE-2011-2705 CVE-2011-3009 ===================================================================== 1. Summary: Updated ruby packages that fix two security issues, various bugs, and add one enhancement are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. It was found that Ruby did not reinitialize the PRNG (pseudorandom number generator) after forking a child process. This could eventually lead to the PRNG returning the same result twice. An attacker keeping track of the values returned by one child process could use this flaw to predict the values the PRNG would return in other child processes (as long as the parent process persisted). (CVE-2011-3009) A flaw was found in the Ruby SecureRandom module. When using the SecureRandom.random_bytes class, the PRNG state was not modified after forking a child process. This could eventually lead to SecureRandom.random_bytes returning the same string more than once. An attacker keeping track of the strings returned by one child process could use this flaw to predict the strings SecureRandom.random_bytes would return in other child processes (as long as the parent process persisted). (CVE-2011-2705) This update also fixes the following bugs: * The ruby package has been upgraded to upstream point release 1.8.7-p352, which provides a number of bug fixes over the previous version. (BZ#706332) * The MD5 message-digest algorithm is not a FIPS-approved algorithm. Consequently, when a Ruby script attempted to calculate an MD5 checksum in FIPS mode, the interpreter terminated unexpectedly. This bug has been fixed and an exception is now raised in the described scenario. (BZ#717709) * Due to inappropriately handled line continuations in the mkconfig.rb source file, an attempt to build the ruby package resulted in unexpected termination. An upstream patch has been applied to address this issue and the ruby package can now be built properly. (BZ#730287) * When the 32-bit ruby-libs library was installed on a 64-bit machine, the mkmf library failed to load various modules necessary for building Ruby-related packages. This bug has been fixed and mkmf now works properly in the described scenario. (BZ#674787) * Previously, the load paths for scripts and binary modules were duplicated on the i386 architecture. Consequently, an ActiveSupport test failed. With this update, the load paths are no longer stored in duplicates on the i386 architecture. (BZ#722887) This update also adds the following enhancement: * With this update, SystemTap probes have been added to the ruby package. (BZ#673162) All users of ruby are advised to upgrade to these updated packages, which resolve these issues and add this enhancement. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 673162 - RFE: add systemtap static probes to Ruby 674787 - multilib breaks mkmf.rb 706332 - Update Ruby to the latest point release 717709 - MD5 makes ruby interpreter crash in FIPS mode 722415 - CVE-2011-2686 CVE-2011-2705 CVE-2011-3009 ruby: Properly initialize the random number generator when forking new process 722887 - Load paths duplicated for i386 =>ActiveSupport build fails on i386 730287 - It's not possible to build ruby package 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm i386: ruby-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-irb-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm x86_64: ruby-1.8.7.352-3.el6.x86_64.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-irb-1.8.7.352-3.el6.x86_64.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm i386: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-docs-1.8.7.352-3.el6.i686.rpm ruby-rdoc-1.8.7.352-3.el6.i686.rpm ruby-ri-1.8.7.352-3.el6.i686.rpm ruby-static-1.8.7.352-3.el6.i686.rpm ruby-tcltk-1.8.7.352-3.el6.i686.rpm x86_64: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.x86_64.rpm ruby-docs-1.8.7.352-3.el6.x86_64.rpm ruby-rdoc-1.8.7.352-3.el6.x86_64.rpm ruby-ri-1.8.7.352-3.el6.x86_64.rpm ruby-static-1.8.7.352-3.el6.x86_64.rpm ruby-tcltk-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm x86_64: ruby-1.8.7.352-3.el6.x86_64.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-irb-1.8.7.352-3.el6.x86_64.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm x86_64: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.x86_64.rpm ruby-docs-1.8.7.352-3.el6.x86_64.rpm ruby-rdoc-1.8.7.352-3.el6.x86_64.rpm ruby-ri-1.8.7.352-3.el6.x86_64.rpm ruby-static-1.8.7.352-3.el6.x86_64.rpm ruby-tcltk-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm i386: ruby-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-irb-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm ppc64: ruby-1.8.7.352-3.el6.ppc64.rpm ruby-debuginfo-1.8.7.352-3.el6.ppc.rpm ruby-debuginfo-1.8.7.352-3.el6.ppc64.rpm ruby-irb-1.8.7.352-3.el6.ppc64.rpm ruby-libs-1.8.7.352-3.el6.ppc.rpm ruby-libs-1.8.7.352-3.el6.ppc64.rpm s390x: ruby-1.8.7.352-3.el6.s390x.rpm ruby-debuginfo-1.8.7.352-3.el6.s390.rpm ruby-debuginfo-1.8.7.352-3.el6.s390x.rpm ruby-irb-1.8.7.352-3.el6.s390x.rpm ruby-libs-1.8.7.352-3.el6.s390.rpm ruby-libs-1.8.7.352-3.el6.s390x.rpm x86_64: ruby-1.8.7.352-3.el6.x86_64.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-irb-1.8.7.352-3.el6.x86_64.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm i386: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-docs-1.8.7.352-3.el6.i686.rpm ruby-rdoc-1.8.7.352-3.el6.i686.rpm ruby-ri-1.8.7.352-3.el6.i686.rpm ruby-static-1.8.7.352-3.el6.i686.rpm ruby-tcltk-1.8.7.352-3.el6.i686.rpm ppc64: ruby-debuginfo-1.8.7.352-3.el6.ppc.rpm ruby-debuginfo-1.8.7.352-3.el6.ppc64.rpm ruby-devel-1.8.7.352-3.el6.ppc.rpm ruby-devel-1.8.7.352-3.el6.ppc64.rpm ruby-docs-1.8.7.352-3.el6.ppc64.rpm ruby-rdoc-1.8.7.352-3.el6.ppc64.rpm ruby-ri-1.8.7.352-3.el6.ppc64.rpm ruby-static-1.8.7.352-3.el6.ppc64.rpm ruby-tcltk-1.8.7.352-3.el6.ppc64.rpm s390x: ruby-debuginfo-1.8.7.352-3.el6.s390.rpm ruby-debuginfo-1.8.7.352-3.el6.s390x.rpm ruby-devel-1.8.7.352-3.el6.s390.rpm ruby-devel-1.8.7.352-3.el6.s390x.rpm ruby-docs-1.8.7.352-3.el6.s390x.rpm ruby-rdoc-1.8.7.352-3.el6.s390x.rpm ruby-ri-1.8.7.352-3.el6.s390x.rpm ruby-static-1.8.7.352-3.el6.s390x.rpm ruby-tcltk-1.8.7.352-3.el6.s390x.rpm x86_64: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.x86_64.rpm ruby-docs-1.8.7.352-3.el6.x86_64.rpm ruby-rdoc-1.8.7.352-3.el6.x86_64.rpm ruby-ri-1.8.7.352-3.el6.x86_64.rpm ruby-static-1.8.7.352-3.el6.x86_64.rpm ruby-tcltk-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm i386: ruby-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-irb-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm x86_64: ruby-1.8.7.352-3.el6.x86_64.rpm ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-irb-1.8.7.352-3.el6.x86_64.rpm ruby-libs-1.8.7.352-3.el6.i686.rpm ruby-libs-1.8.7.352-3.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.352-3.el6.src.rpm i386: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-docs-1.8.7.352-3.el6.i686.rpm ruby-rdoc-1.8.7.352-3.el6.i686.rpm ruby-ri-1.8.7.352-3.el6.i686.rpm ruby-static-1.8.7.352-3.el6.i686.rpm ruby-tcltk-1.8.7.352-3.el6.i686.rpm x86_64: ruby-debuginfo-1.8.7.352-3.el6.i686.rpm ruby-debuginfo-1.8.7.352-3.el6.x86_64.rpm ruby-devel-1.8.7.352-3.el6.i686.rpm ruby-devel-1.8.7.352-3.el6.x86_64.rpm ruby-docs-1.8.7.352-3.el6.x86_64.rpm ruby-rdoc-1.8.7.352-3.el6.x86_64.rpm ruby-ri-1.8.7.352-3.el6.x86_64.rpm ruby-static-1.8.7.352-3.el6.x86_64.rpm ruby-tcltk-1.8.7.352-3.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2705.html https://www.redhat.com/security/data/cve/CVE-2011-3009.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jZ/XlSAg2UNWIIRAsD3AJ9qOzGoO9mH9F8kkCKiSsNtLK4juwCgoOTU zsUwHaHbaRhm6tRKq0hAYow= =VTTO -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:38:53 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:38:53 +0000 Subject: [RHSA-2011:1615-03] Low: virt-v2v security and bug fix update Message-ID: <201112061538.pB6Fcrq0015670@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: virt-v2v security and bug fix update Advisory ID: RHSA-2011:1615-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1615.html Issue date: 2011-12-06 CVE Names: CVE-2011-1773 ===================================================================== 1. Summary: An updated virt-v2v package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 3. Description: virt-v2v is a tool for converting and importing virtual machines to libvirt-managed KVM (Kernel-based Virtual Machine), or Red Hat Enterprise Virtualization. Using virt-v2v to convert a guest that has a password-protected VNC console to a KVM guest removed that password protection from the converted guest: after conversion, a password was not required to access the converted guest's VNC console. Now, converted guests will require the same VNC console password as the original guest. Note that when converting a guest to run on Red Hat Enterprise Virtualization, virt-v2v will display a warning that VNC passwords are not supported. (CVE-2011-1773) Note: The Red Hat Enterprise Linux 6.2 perl-Sys-Virt update must also be installed to correct CVE-2011-1773. Bug fixes: * When converting a guest virtual machine (VM), whose name contained certain characters, virt-v2v would create a converted guest with a corrupted name. Now, virt-v2v will not corrupt guest names. (BZ#665883) * There were numerous usability issues when running virt-v2v as a non-root user. This update makes it simpler to run virt-v2v as a non-root user. (BZ#671094) * virt-v2v failed to convert a Microsoft Windows guest with Windows Recovery Console installed in a separate partition. Now, virt-v2v will successfully convert a guest with Windows Recovery Console installed in a separate partition by ignoring that partition. (BZ#673066) * virt-v2v failed to convert a Red Hat Enterprise Linux guest which did not have the symlink "/boot/grub/menu.lst". With this update, virt-v2v can select a grub configuration file from several places. (BZ#694364) * This update removes information about the usage of deprecated command line options in the virt-v2v man page. (BZ#694370) * virt-v2v would fail to correctly change the allocation policy, (sparse or preallocated) when converting a guest with QCOW2 image format. The error message "Cannot import VM, The selected disk configuration is not supported" was displayed. With this update, allocation policy changes to a guest with QCOW2 storage will work correctly. (BZ#696089) * The options "--network" and "--bridge" can not be used in conjunction when converting a guest, but no error message was displayed. With this update, virt-v2v will now display an error message if the mutually exclusive "--network" and "--bridge" command line options are both specified. (BZ#700759) * virt-v2v failed to convert a multi-boot guest, and did not clean up temporary storage and mount points after failure. With this update, virt-v2v will prompt for which operating system to convert from a multi-boot guest, and will correctly clean up if the process fails. (BZ#702007) * virt-v2v failed to correctly configure modprobe aliases when converting a VMware ESX guest with VMware Tools installed. With this update, modprobe aliases will be correctly configured. (BZ#707261) * When converting a guest with preallocated raw storage using the libvirtxml input method, virt-v2v failed with the erroneous error message "size(X) < usage(Y)". This update removes this erroneous error. (BZ#727489) * When converting a Red Hat Enterprise Linux guest, virt-v2v did not check that the Cirrus X driver was available before configuring it. With this update, virt-v2v will attempt to install the Cirrus X driver if it is required. (BZ#708961) * VirtIO systems do not support the Windows Recovery Console on 32-bit Windows XP. The virt-v2v man page has been updated to note this. On Windows XP Professional x64 Edition, however, if Windows Recovery Console is re-installed after conversion, it will work as expected. (BZ#732421) * Placing comments in the guest fstab file by means of the leading "#" symbol caused an "unknown filesystem" error after conversion of a guest. With this update comments can now be used and error messages will not be displayed. (BZ#677870) Users of virt-v2v should upgrade to this updated package, which fixes these issues and upgrades virt-v2v to version 0.8.3. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 665883 - virt-v2v: Special character in vm name from vmware ESX not showing correct 671094 - Cannot convert VM to libvirt with non-root user 672831 - virt-v2v should use core libguestfs inspection 673066 - virt-v2v does not work with guests that have the Windows Recovery Console installed 677870 - [RFE] virt-v2v show the warning info after convert rhel4u8 guest if comment a line of swap in the fstab 700759 - Suggest give warning message if specify both -n and -b for converting 702007 - v2v fails to remove the mounted export domain when the guest has multiboot OSes 702754 - CVE-2011-1773 virt-v2v: vnc password protection is missing after vm conversion 707261 - Vmware-tools will re-add the default network driver in /etc/modprobe.conf after conversion if ethX device entry missing 708961 - virt-v2v should check or auto install cirrus driver for guest which has not cirrus driver 725685 - xenpv linux guest can not start after conversion because qemu get 'aio' invalid format 727489 - libvirtxml fails if a volume's size is greater than the size reported by qemu-img 729877 - virt-v2v do not install virt-v2v.db file cause some issue 732421 - Guest will BSOD if boot from Windows Recovery Console after conversion 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/virt-v2v-0.8.3-5.el6.src.rpm x86_64: virt-v2v-0.8.3-5.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/virt-v2v-0.8.3-5.el6.src.rpm x86_64: virt-v2v-0.8.3-5.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/virt-v2v-0.8.3-5.el6.src.rpm x86_64: virt-v2v-0.8.3-5.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/virt-v2v-0.8.3-5.el6.src.rpm x86_64: virt-v2v-0.8.3-5.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1773.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jbeXlSAg2UNWIIRAjIxAJ9uFYpj9KpXKDq3gPR8boDlbxA6QwCfZdP7 5f5s0po86nOxI3KukYEnvFE= =pQEg -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:40:36 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:40:36 +0000 Subject: [RHSA-2011:1635-03] Low: cups security and bug fix update Message-ID: <201112061540.pB6FeamC016910@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: cups security and bug fix update Advisory ID: RHSA-2011:1635-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1635.html Issue date: 2011-12-06 CVE Names: CVE-2011-2896 ===================================================================== 1. Summary: Updated cups packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems. A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the CUPS GIF image format reader. An attacker could create a malicious GIF image file that, when printed, could possibly cause CUPS to crash or, potentially, execute arbitrary code with the privileges of the "lp" user. (CVE-2011-2896) These updated cups packages also provide fixes for the following bugs: * Previously CUPS was not correctly handling the language setting LANG=en_US.ASCII. As a consequence lpadmin, lpstat and lpinfo binaries were not displaying any output when the LANG=en_US.ASCII environment variable was used. As a result of this update the problem is fixed and the expected output is now displayed. (BZ#681836) * Previously the scheduler did not check for empty values of several configuration directives. As a consequence it was possible for the CUPS daemon (cupsd) to crash when a configuration file contained certain empty values. With this update the problem is fixed and cupsd no longer crashes when reading such a configuration file. (BZ#706673) * Previously when printing to a raw print queue, when using certain printer models, CUPS was incorrectly sending SNMP queries. As a consequence there was a noticeable 4-second delay between queueing the job and the start of printing. With this update the problem is fixed and CUPS no longer tries to collect SNMP supply and status information for raw print queues. (BZ#709896) * Previously when using the BrowsePoll directive it could happen that the CUPS printer polling daemon (cups-polld) began polling before the network interfaces were set up after a system boot. CUPS was then caching the failed hostname lookup. As a consequence no printers were found and the error, "Host name lookup failure", was logged. With this update the code that re-initializes the resolver after failure in cups-polld is fixed and as a result CUPS will obtain the correct network settings to use in printer discovery. (BZ#712430) * The MaxJobs directive controls the maximum number of print jobs that are kept in memory. Previously, once the number of jobs reached the limit, the CUPS system failed to automatically purge the data file associated with the oldest completed job from the system in order to make room for a new print job. This bug has been fixed, and the jobs beyond the set limit are now properly purged. (BZ#735505) * The cups init script (/etc/rc.d/init.d/cups) uses the daemon function (from /etc/rc.d/init.d/functions) to start the cups process, but previously it did not source a configuration file from the /etc/sysconfig/ directory. As a consequence, it was difficult to cleanly set the nice level or cgroup for the cups daemon by setting the NICELEVEL or CGROUP_DAEMON variables. With this update, the init script is fixed. (BZ#744791) All users of CUPS are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. After installing this update, the cupsd daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 681836 - lpstat bug with ASCII encoding, LANG=en_US.ASCII lpstat -h localhost -s 706673 - Cups config parsing segfault 712430 - printers are not found after system boot 727800 - CVE-2011-2896 David Koblas' GIF decoder LZW decoder buffer overflow 735505 - CUPS is not purging JobFiles when MaxJobs is reached in RHEL6.1 744791 - cups init script should source /etc/sysconfig/cups 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm i386: cups-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-lpd-1.4.2-44.el6.i686.rpm x86_64: cups-1.4.2-44.el6.x86_64.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.x86_64.rpm cups-lpd-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm i386: cups-debuginfo-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-php-1.4.2-44.el6.i686.rpm x86_64: cups-debuginfo-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.x86_64.rpm cups-php-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm x86_64: cups-1.4.2-44.el6.x86_64.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.x86_64.rpm cups-lpd-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm x86_64: cups-debuginfo-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.x86_64.rpm cups-php-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm i386: cups-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-lpd-1.4.2-44.el6.i686.rpm ppc64: cups-1.4.2-44.el6.ppc64.rpm cups-debuginfo-1.4.2-44.el6.ppc.rpm cups-debuginfo-1.4.2-44.el6.ppc64.rpm cups-devel-1.4.2-44.el6.ppc.rpm cups-devel-1.4.2-44.el6.ppc64.rpm cups-libs-1.4.2-44.el6.ppc.rpm cups-libs-1.4.2-44.el6.ppc64.rpm cups-lpd-1.4.2-44.el6.ppc64.rpm s390x: cups-1.4.2-44.el6.s390x.rpm cups-debuginfo-1.4.2-44.el6.s390.rpm cups-debuginfo-1.4.2-44.el6.s390x.rpm cups-devel-1.4.2-44.el6.s390.rpm cups-devel-1.4.2-44.el6.s390x.rpm cups-libs-1.4.2-44.el6.s390.rpm cups-libs-1.4.2-44.el6.s390x.rpm cups-lpd-1.4.2-44.el6.s390x.rpm x86_64: cups-1.4.2-44.el6.x86_64.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.x86_64.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.x86_64.rpm cups-lpd-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm i386: cups-debuginfo-1.4.2-44.el6.i686.rpm cups-php-1.4.2-44.el6.i686.rpm ppc64: cups-debuginfo-1.4.2-44.el6.ppc64.rpm cups-php-1.4.2-44.el6.ppc64.rpm s390x: cups-debuginfo-1.4.2-44.el6.s390x.rpm cups-php-1.4.2-44.el6.s390x.rpm x86_64: cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-php-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm i386: cups-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-lpd-1.4.2-44.el6.i686.rpm x86_64: cups-1.4.2-44.el6.x86_64.rpm cups-debuginfo-1.4.2-44.el6.i686.rpm cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-devel-1.4.2-44.el6.i686.rpm cups-devel-1.4.2-44.el6.x86_64.rpm cups-libs-1.4.2-44.el6.i686.rpm cups-libs-1.4.2-44.el6.x86_64.rpm cups-lpd-1.4.2-44.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm i386: cups-debuginfo-1.4.2-44.el6.i686.rpm cups-php-1.4.2-44.el6.i686.rpm x86_64: cups-debuginfo-1.4.2-44.el6.x86_64.rpm cups-php-1.4.2-44.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2896.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jdAXlSAg2UNWIIRAuf9AJ40wZu4zvl7/JluD0pOAIRHpsC9WACfQlq4 m4F9XjZwY5c1UV+v9+pq1hs= =YoxJ -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:42:16 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:42:16 +0000 Subject: [RHSA-2011:1691-03] Low: util-linux-ng security, bug fix, and enhancement update Message-ID: <201112061542.pB6FgGut005494@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: util-linux-ng security, bug fix, and enhancement update Advisory ID: RHSA-2011:1691-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1691.html Issue date: 2011-12-06 CVE Names: CVE-2011-1675 CVE-2011-1677 ===================================================================== 1. Summary: Updated util-linux-ng packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The util-linux-ng packages contain a large variety of low-level system utilities that are necessary for a Linux operating system to function. Multiple flaws were found in the way the mount and umount commands performed mtab (mounted file systems table) file updates. A local, unprivileged user allowed to mount or unmount file systems could use these flaws to corrupt the mtab file and create a stale lock file, preventing other users from mounting and unmounting file systems. (CVE-2011-1675, CVE-2011-1677) This update also fixes the following bugs: * Due to a hard coded limit of 128 devices, an attempt to run the "blkid -c" command on more than 128 devices caused blkid to terminate unexpectedly. This update increases the maximum number of devices to 8192 so that blkid no longer crashes in this scenario. (BZ#675999) * Previously, the "swapon -a" command did not detect device-mapper devices that were already in use. This update corrects the swapon utility to detect such devices as expected. (BZ#679741) * Prior to this update, the presence of an invalid line in the /etc/fstab file could cause the umount utility to terminate unexpectedly with a segmentation fault. This update applies a patch that corrects this error so that umount now correctly reports invalid lines and no longer crashes. (BZ#684203) * Previously, an attempt to use the wipefs utility on a partitioned device caused the utility to terminate unexpectedly with an error. This update adapts wipefs to only display a warning message in this situation. (BZ#696959) * When providing information on interprocess communication (IPC) facilities, the ipcs utility could previously display a process owner as a negative number if the user's UID was too large. This update adapts the underlying source code to make sure the UID values are now displayed correctly. (BZ#712158) * In the installation scriptlets, the uuidd package uses the chkconfig utility to enable and disable the uuidd service. Previously, this package did not depend on the chkconfig package, which could lead to errors during installation if chkconfig was not installed. This update adds chkconfig to the list of dependencies so that such errors no longer occur. (BZ#712808) * The previous version of the /etc/udev/rules.d/60-raw.rules file contained a statement that both this file and raw devices are deprecated. This is no longer true and the Red Hat Enterprise Linux kernel supports this functionality. With this update, the aforementioned file no longer contains this incorrect statement. (BZ#716995) * Previously, an attempt to use the cfdisk utility to read the default Red Hat Enterprise Linux 6 partition layout failed with an error. This update corrects this error and the cfdisk utility can now read the default partition layout as expected. (BZ#723352) * The previous version of the tailf(1) manual page incorrectly stated that users can use the "--lines=NUMBER" command line option to limit the number of displayed lines. However, the tailf utility does not allow the use of the equals sign (=) between the option and its argument. This update corrects this error. (BZ#679831) * The fstab(5) manual page has been updated to clarify that empty lines in the /etc/fstab configuration file are ignored. (BZ#694648) As well, this update adds the following enhancements: * A new fstrim utility has been added to the package. This utility allows the root user to discard unused blocks on a mounted file system. (BZ#692119) * The login utility has been updated to provide support for failed login attempts that are reported by PAM. (BZ#696731) * The lsblk utility has been updated to provide additional information about the topology and status of block devices. (BZ#723638) * The agetty utility has been updated to pass the hostname to the login utility. (BZ#726092) All users of util-linux-ng are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 675999 - blkid crashes on a server with more than 128 storage devices 679741 - canonicalize swap devices 679831 - --lines does not work: tailf: invalid option 684203 - umount fails on inconsistent fstab 692119 - Include fstrim tool to enable user-space using discard/UNMAP/WRITE_SAME for enterprise arrays 694648 - [RHEL6] Blank line at head of fstab 695916 - CVE-2011-1675 util-linux: mount fails to anticipate RLIMIT_FSIZE 695924 - CVE-2011-1677 util-linux: umount may fail to remove /etc/mtab~ lock file 696731 - display failed login attempts 696959 - wipefs(8) reject partitioned devices 712158 - uid/gid overflow in ipcs 712808 - uuidd should depend on chkconfig 716995 - Remove Deprecation Statement in /etc/udev/rules.d/60-raw.rules 723352 - cfdisk cannot read default installer partitioning 723546 - Defects revealed by Coverity scan 723638 - Backport upstream extensions for lsblk 726092 - Pass host name from agetty to login 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/util-linux-ng-2.17.2-12.4.el6.src.rpm i386: libblkid-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm uuidd-2.17.2-12.4.el6.i686.rpm x86_64: libblkid-2.17.2-12.4.el6.i686.rpm libblkid-2.17.2-12.4.el6.x86_64.rpm libuuid-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.x86_64.rpm uuidd-2.17.2-12.4.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/util-linux-ng-2.17.2-12.4.el6.src.rpm i386: libblkid-devel-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm x86_64: libblkid-devel-2.17.2-12.4.el6.i686.rpm libblkid-devel-2.17.2-12.4.el6.x86_64.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/util-linux-ng-2.17.2-12.4.el6.src.rpm x86_64: libblkid-2.17.2-12.4.el6.i686.rpm libblkid-2.17.2-12.4.el6.x86_64.rpm libuuid-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.x86_64.rpm uuidd-2.17.2-12.4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/util-linux-ng-2.17.2-12.4.el6.src.rpm x86_64: libblkid-devel-2.17.2-12.4.el6.i686.rpm libblkid-devel-2.17.2-12.4.el6.x86_64.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/util-linux-ng-2.17.2-12.4.el6.src.rpm i386: libblkid-2.17.2-12.4.el6.i686.rpm libblkid-devel-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm uuidd-2.17.2-12.4.el6.i686.rpm ppc64: libblkid-2.17.2-12.4.el6.ppc.rpm libblkid-2.17.2-12.4.el6.ppc64.rpm libblkid-devel-2.17.2-12.4.el6.ppc.rpm libblkid-devel-2.17.2-12.4.el6.ppc64.rpm libuuid-2.17.2-12.4.el6.ppc.rpm libuuid-2.17.2-12.4.el6.ppc64.rpm libuuid-devel-2.17.2-12.4.el6.ppc.rpm libuuid-devel-2.17.2-12.4.el6.ppc64.rpm util-linux-ng-2.17.2-12.4.el6.ppc.rpm util-linux-ng-2.17.2-12.4.el6.ppc64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.ppc.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.ppc64.rpm uuidd-2.17.2-12.4.el6.ppc64.rpm s390x: libblkid-2.17.2-12.4.el6.s390.rpm libblkid-2.17.2-12.4.el6.s390x.rpm libblkid-devel-2.17.2-12.4.el6.s390.rpm libblkid-devel-2.17.2-12.4.el6.s390x.rpm libuuid-2.17.2-12.4.el6.s390.rpm libuuid-2.17.2-12.4.el6.s390x.rpm libuuid-devel-2.17.2-12.4.el6.s390.rpm libuuid-devel-2.17.2-12.4.el6.s390x.rpm util-linux-ng-2.17.2-12.4.el6.s390.rpm util-linux-ng-2.17.2-12.4.el6.s390x.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.s390.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.s390x.rpm uuidd-2.17.2-12.4.el6.s390x.rpm x86_64: libblkid-2.17.2-12.4.el6.i686.rpm libblkid-2.17.2-12.4.el6.x86_64.rpm libblkid-devel-2.17.2-12.4.el6.i686.rpm libblkid-devel-2.17.2-12.4.el6.x86_64.rpm libuuid-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.x86_64.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.x86_64.rpm uuidd-2.17.2-12.4.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/util-linux-ng-2.17.2-12.4.el6.src.rpm i386: libblkid-2.17.2-12.4.el6.i686.rpm libblkid-devel-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm uuidd-2.17.2-12.4.el6.i686.rpm x86_64: libblkid-2.17.2-12.4.el6.i686.rpm libblkid-2.17.2-12.4.el6.x86_64.rpm libblkid-devel-2.17.2-12.4.el6.i686.rpm libblkid-devel-2.17.2-12.4.el6.x86_64.rpm libuuid-2.17.2-12.4.el6.i686.rpm libuuid-2.17.2-12.4.el6.x86_64.rpm libuuid-devel-2.17.2-12.4.el6.i686.rpm libuuid-devel-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-2.17.2-12.4.el6.i686.rpm util-linux-ng-2.17.2-12.4.el6.x86_64.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.i686.rpm util-linux-ng-debuginfo-2.17.2-12.4.el6.x86_64.rpm uuidd-2.17.2-12.4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1675.html https://www.redhat.com/security/data/cve/CVE-2011-1677.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jejXlSAg2UNWIIRAh39AJ9SmNlmbtuPuGGNSnKCaGirN4nAKwCfas8d QHdUnk9PFsZii5D9SJh1w8g= =yWd9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:43:34 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:43:34 +0000 Subject: [RHSA-2011:1694-03] Low: libcap security and bug fix update Message-ID: <201112061543.pB6FhYln010171@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: libcap security and bug fix update Advisory ID: RHSA-2011:1694-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1694.html Issue date: 2011-12-06 CVE Names: CVE-2011-4099 ===================================================================== 1. Summary: Updated libcap packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The libcap packages provide a library and tools for getting and setting POSIX capabilities. It was found that capsh did not change into the new root when using the "--chroot" option. An application started via the "capsh --chroot" command could use this flaw to escape the chroot restrictions. (CVE-2011-4099) This update also fixes the following bug: * Previously, the libcap packages did not contain the capsh(1) manual page. With this update, the capsh(1) manual page is included. (BZ#730957) All libcap users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 722694 - CVE-2011-4099 capsh: does not chdir after chroot 730957 - Add missing capsh man page in libcap 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libcap-2.16-5.5.el6.src.rpm i386: libcap-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm x86_64: libcap-2.16-5.5.el6.i686.rpm libcap-2.16-5.5.el6.x86_64.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libcap-2.16-5.5.el6.src.rpm i386: libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.i686.rpm x86_64: libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.x86_64.rpm libcap-devel-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libcap-2.16-5.5.el6.src.rpm x86_64: libcap-2.16-5.5.el6.i686.rpm libcap-2.16-5.5.el6.x86_64.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libcap-2.16-5.5.el6.src.rpm x86_64: libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.x86_64.rpm libcap-devel-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libcap-2.16-5.5.el6.src.rpm i386: libcap-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.i686.rpm ppc64: libcap-2.16-5.5.el6.ppc.rpm libcap-2.16-5.5.el6.ppc64.rpm libcap-debuginfo-2.16-5.5.el6.ppc.rpm libcap-debuginfo-2.16-5.5.el6.ppc64.rpm libcap-devel-2.16-5.5.el6.ppc.rpm libcap-devel-2.16-5.5.el6.ppc64.rpm s390x: libcap-2.16-5.5.el6.s390.rpm libcap-2.16-5.5.el6.s390x.rpm libcap-debuginfo-2.16-5.5.el6.s390.rpm libcap-debuginfo-2.16-5.5.el6.s390x.rpm libcap-devel-2.16-5.5.el6.s390.rpm libcap-devel-2.16-5.5.el6.s390x.rpm x86_64: libcap-2.16-5.5.el6.i686.rpm libcap-2.16-5.5.el6.x86_64.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.x86_64.rpm libcap-devel-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libcap-2.16-5.5.el6.src.rpm i386: libcap-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.i686.rpm x86_64: libcap-2.16-5.5.el6.i686.rpm libcap-2.16-5.5.el6.x86_64.rpm libcap-debuginfo-2.16-5.5.el6.i686.rpm libcap-debuginfo-2.16-5.5.el6.x86_64.rpm libcap-devel-2.16-5.5.el6.i686.rpm libcap-devel-2.16-5.5.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4099.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jgFXlSAg2UNWIIRAk9BAJ9DzrgZyzZAWtaYaFfvxy6RZXJ6OwCeINmv HGMNVoCTPUC04zkToIVq6y4= =X8w3 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:44:47 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:44:47 +0000 Subject: [RHSA-2011:1741-03] Low: php-pear security and bug fix update Message-ID: <201112061544.pB6FilVY026733@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: php-pear security and bug fix update Advisory ID: RHSA-2011:1741-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1741.html Issue date: 2011-12-06 CVE Names: CVE-2011-1072 ===================================================================== 1. Summary: An updated php-pear package that fixes one security issue and multiple bugs is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch 3. Description: The php-pear package contains the PHP Extension and Application Repository (PEAR), a framework and distribution system for reusable PHP components. It was found that the "pear" command created temporary files in an insecure way when installing packages. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files accessible to the victim running the "pear install" command. (CVE-2011-1072) This update also fixes the following bugs: * The php-pear package has been upgraded to version 1.9.4, which provides a number of bug fixes over the previous version. (BZ#651897) * Prior to this update, php-pear created a cache in the "/var/cache/php-pear/" directory when attempting to list all packages. As a consequence, php-pear failed to create or update the cache file as a regular user without sufficient file permissions and could not list all packages. With this update, php-pear no longer fails if writing to the cache directory is not permitted. Now, all packages are listed as expected. (BZ#747361) All users of php-pear are advised to upgrade to this updated package, which corrects these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 651897 - update php-pear to 1.9.4 681982 - CVE-2011-1072 php-pear: symlink vulnerability in PEAR installer 747361 - pear list-all fails for regular user 6. Package List: Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-pear-1.9.4-4.el6.src.rpm noarch: php-pear-1.9.4-4.el6.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-pear-1.9.4-4.el6.src.rpm noarch: php-pear-1.9.4-4.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1072.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jhJXlSAg2UNWIIRArW+AKCCTyThqpqmhOcnbV8orMnIag8uBwCfZgYk TpsOnqpC7oytz6MFHstgs2U= =Qx4m -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 15:46:39 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 15:46:39 +0000 Subject: [RHSA-2011:1749-03] Low: libxml2 security and bug fix update Message-ID: <201112061546.pB6Fkewf008438@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: libxml2 security and bug fix update Advisory ID: RHSA-2011:1749-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1749.html Issue date: 2011-12-06 CVE Names: CVE-2010-4008 CVE-2010-4494 CVE-2011-0216 CVE-2011-1944 CVE-2011-2821 CVE-2011-2834 ===================================================================== 1. Summary: Updated libxml2 packages that fix several security issues and various bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language (XPath), which is a language for addressing parts of an XML document. An off-by-one error, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XML files. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially-crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) Multiple flaws were found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially-crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Note: Red Hat does not ship any applications that use libxml2 in a way that would allow the CVE-2011-1944, CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, and CVE-2011-2834 flaws to be exploited; however, third-party applications may allow XPath expressions to be passed which could trigger these flaws. Red Hat would like to thank the Google Security Team for reporting the CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008. This update also fixes the following bugs: * A number of patches have been applied to harden the XPath processing code in libxml2, such as fixing memory leaks, rounding errors, XPath numbers evaluations, and a potential error in encoding conversion. (BZ#732335) All users of libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 645341 - CVE-2010-4008 libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis 665963 - CVE-2010-4494 libxml2: double-free in XPath processing code 709747 - CVE-2011-1944 libxml, libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets 724906 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding 732335 - Fix various problems and harden the XPath evaluation engine 735712 - CVE-2011-2821 libxml2: double free caused by malformed XPath expression in XSLT 735751 - CVE-2011-2834 libxml2: double-free caused by malformed XPath expression in XSLT 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm i386: libxml2-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-python-2.7.6-4.el6.i686.rpm x86_64: libxml2-2.7.6-4.el6.i686.rpm libxml2-2.7.6-4.el6.x86_64.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-python-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm i386: libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-static-2.7.6-4.el6.i686.rpm x86_64: libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.x86_64.rpm libxml2-static-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm x86_64: libxml2-2.7.6-4.el6.i686.rpm libxml2-2.7.6-4.el6.x86_64.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-python-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm x86_64: libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.x86_64.rpm libxml2-static-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm i386: libxml2-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-python-2.7.6-4.el6.i686.rpm ppc64: libxml2-2.7.6-4.el6.ppc.rpm libxml2-2.7.6-4.el6.ppc64.rpm libxml2-debuginfo-2.7.6-4.el6.ppc.rpm libxml2-debuginfo-2.7.6-4.el6.ppc64.rpm libxml2-devel-2.7.6-4.el6.ppc.rpm libxml2-devel-2.7.6-4.el6.ppc64.rpm libxml2-python-2.7.6-4.el6.ppc64.rpm s390x: libxml2-2.7.6-4.el6.s390.rpm libxml2-2.7.6-4.el6.s390x.rpm libxml2-debuginfo-2.7.6-4.el6.s390.rpm libxml2-debuginfo-2.7.6-4.el6.s390x.rpm libxml2-devel-2.7.6-4.el6.s390.rpm libxml2-devel-2.7.6-4.el6.s390x.rpm libxml2-python-2.7.6-4.el6.s390x.rpm x86_64: libxml2-2.7.6-4.el6.i686.rpm libxml2-2.7.6-4.el6.x86_64.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.x86_64.rpm libxml2-python-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm i386: libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-static-2.7.6-4.el6.i686.rpm ppc64: libxml2-debuginfo-2.7.6-4.el6.ppc64.rpm libxml2-static-2.7.6-4.el6.ppc64.rpm s390x: libxml2-debuginfo-2.7.6-4.el6.s390x.rpm libxml2-static-2.7.6-4.el6.s390x.rpm x86_64: libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-static-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm i386: libxml2-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-python-2.7.6-4.el6.i686.rpm x86_64: libxml2-2.7.6-4.el6.i686.rpm libxml2-2.7.6-4.el6.x86_64.rpm libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-devel-2.7.6-4.el6.i686.rpm libxml2-devel-2.7.6-4.el6.x86_64.rpm libxml2-python-2.7.6-4.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libxml2-2.7.6-4.el6.src.rpm i386: libxml2-debuginfo-2.7.6-4.el6.i686.rpm libxml2-static-2.7.6-4.el6.i686.rpm x86_64: libxml2-debuginfo-2.7.6-4.el6.x86_64.rpm libxml2-static-2.7.6-4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-4008.html https://www.redhat.com/security/data/cve/CVE-2010-4494.html https://www.redhat.com/security/data/cve/CVE-2011-0216.html https://www.redhat.com/security/data/cve/CVE-2011-1944.html https://www.redhat.com/security/data/cve/CVE-2011-2821.html https://www.redhat.com/security/data/cve/CVE-2011-2834.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3jihXlSAg2UNWIIRAij5AJ9pwIiLcpRzdp4Kiwz3qP8xWNCoJQCdG3YK IwJxCxcGs/EbkeMAWwbL/tg= =idwN -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 16:28:14 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 16:28:14 +0000 Subject: [RHSA-2011:1777-01] Important: qemu-kvm security update Message-ID: <201112061628.pB6GSFQC014926@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2011:1777-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1777.html Issue date: 2011-12-06 CVE Names: CVE-2011-4111 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. A flaw was found in the way qemu-kvm handled VSC_ATR messages when a guest was configured for a CCID (Chip/Smart Card Interface Devices) USB smart card reader in passthrough mode. An attacker able to connect to the port on the host being used for such a device could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host. (CVE-2011-4111) All users of qemu-kvm should upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 751310 - CVE-2011-4111 qemu: ccid: buffer overflow in handling of VSC_ATR message 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6_2.1.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6_2.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6_2.1.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6_2.1.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/qemu-kvm-0.12.1.2-2.209.el6_2.1.src.rpm x86_64: qemu-img-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.209.el6_2.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.209.el6_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4111.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3kJ6XlSAg2UNWIIRArGuAJ46Jwvo8J3xYgcQtKZMiKZSSozN4QCfbeWJ o+mqsSNI9QfEwHmz+UflXzo= =aGYW -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 21:28:47 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 21:28:47 +0000 Subject: [RHSA-2011:1790-01] Moderate: krb5 security update Message-ID: <201112062128.pB6LSlAZ005127@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: krb5 security update Advisory ID: RHSA-2011:1790-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1790.html Issue date: 2011-12-06 CVE Names: CVE-2011-1530 ===================================================================== 1. Summary: Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS (Ticket-granting Server) requests. A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request. (CVE-2011-1530) Red Hat would like to thank the MIT Kerberos project for reporting this issue. All krb5 users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the krb5kdc daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 753748 - CVE-2011-1530 krb5 (krb5kdc): NULL pointer dereference in the TGS handling (MITKRB5-SA-2011-007) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-1.9-22.el6_2.1.src.rpm i386: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.i686.rpm krb5-workstation-1.9-22.el6_2.1.i686.rpm x86_64: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-debuginfo-1.9-22.el6_2.1.x86_64.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.x86_64.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.x86_64.rpm krb5-workstation-1.9-22.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client-optional/en/os/SRPMS/krb5-1.9-22.el6_2.1.src.rpm i386: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-server-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm x86_64: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-debuginfo-1.9-22.el6_2.1.x86_64.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.x86_64.rpm krb5-server-1.9-22.el6_2.1.x86_64.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-1.9-22.el6_2.1.src.rpm x86_64: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-debuginfo-1.9-22.el6_2.1.x86_64.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.x86_64.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.x86_64.rpm krb5-workstation-1.9-22.el6_2.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode-optional/en/os/SRPMS/krb5-1.9-22.el6_2.1.src.rpm x86_64: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-debuginfo-1.9-22.el6_2.1.x86_64.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.x86_64.rpm krb5-server-1.9-22.el6_2.1.x86_64.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/krb5-1.9-22.el6_2.1.src.rpm i386: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.i686.rpm krb5-server-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm krb5-workstation-1.9-22.el6_2.1.i686.rpm ppc64: krb5-debuginfo-1.9-22.el6_2.1.ppc.rpm krb5-debuginfo-1.9-22.el6_2.1.ppc64.rpm krb5-devel-1.9-22.el6_2.1.ppc.rpm krb5-devel-1.9-22.el6_2.1.ppc64.rpm krb5-libs-1.9-22.el6_2.1.ppc.rpm krb5-libs-1.9-22.el6_2.1.ppc64.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.ppc64.rpm krb5-server-1.9-22.el6_2.1.ppc64.rpm krb5-server-ldap-1.9-22.el6_2.1.ppc.rpm krb5-server-ldap-1.9-22.el6_2.1.ppc64.rpm krb5-workstation-1.9-22.el6_2.1.ppc64.rpm s390x: krb5-debuginfo-1.9-22.el6_2.1.s390.rpm krb5-debuginfo-1.9-22.el6_2.1.s390x.rpm krb5-devel-1.9-22.el6_2.1.s390.rpm krb5-devel-1.9-22.el6_2.1.s390x.rpm krb5-libs-1.9-22.el6_2.1.s390.rpm krb5-libs-1.9-22.el6_2.1.s390x.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.s390x.rpm krb5-server-1.9-22.el6_2.1.s390x.rpm krb5-server-ldap-1.9-22.el6_2.1.s390.rpm krb5-server-ldap-1.9-22.el6_2.1.s390x.rpm krb5-workstation-1.9-22.el6_2.1.s390x.rpm x86_64: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-debuginfo-1.9-22.el6_2.1.x86_64.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.x86_64.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.x86_64.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.x86_64.rpm krb5-server-1.9-22.el6_2.1.x86_64.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.x86_64.rpm krb5-workstation-1.9-22.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/krb5-1.9-22.el6_2.1.src.rpm i386: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.i686.rpm krb5-server-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm krb5-workstation-1.9-22.el6_2.1.i686.rpm x86_64: krb5-debuginfo-1.9-22.el6_2.1.i686.rpm krb5-debuginfo-1.9-22.el6_2.1.x86_64.rpm krb5-devel-1.9-22.el6_2.1.i686.rpm krb5-devel-1.9-22.el6_2.1.x86_64.rpm krb5-libs-1.9-22.el6_2.1.i686.rpm krb5-libs-1.9-22.el6_2.1.x86_64.rpm krb5-pkinit-openssl-1.9-22.el6_2.1.x86_64.rpm krb5-server-1.9-22.el6_2.1.x86_64.rpm krb5-server-ldap-1.9-22.el6_2.1.i686.rpm krb5-server-ldap-1.9-22.el6_2.1.x86_64.rpm krb5-workstation-1.9-22.el6_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1530.html https://access.redhat.com/security/updates/classification/#moderate http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-007.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3okDXlSAg2UNWIIRAhg/AJ0ZfYQdjyxWXJyUfVZifjmanSA64wCdGoNa 46PF96iGp1nmL9YiustcWMU= =TyYd -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 6 21:29:32 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Dec 2011 21:29:32 +0000 Subject: [RHSA-2011:1791-01] Moderate: squid security update Message-ID: <201112062129.pB6LTWbE002988@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: squid security update Advisory ID: RHSA-2011:1791-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1791.html Issue date: 2011-12-06 CVE Names: CVE-2011-4096 ===================================================================== 1. Summary: An updated squid package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. An input validation flaw was found in the way Squid calculated the total number of resource records in the answer section of multiple name server responses. An attacker could use this flaw to cause Squid to crash. (CVE-2011-4096) Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 750316 - CVE-2011-4096 squid: Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record 6. Package List: Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/squid-3.1.10-1.el6_2.1.src.rpm i386: squid-3.1.10-1.el6_2.1.i686.rpm squid-debuginfo-3.1.10-1.el6_2.1.i686.rpm ppc64: squid-3.1.10-1.el6_2.1.ppc64.rpm squid-debuginfo-3.1.10-1.el6_2.1.ppc64.rpm s390x: squid-3.1.10-1.el6_2.1.s390x.rpm squid-debuginfo-3.1.10-1.el6_2.1.s390x.rpm x86_64: squid-3.1.10-1.el6_2.1.x86_64.rpm squid-debuginfo-3.1.10-1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/squid-3.1.10-1.el6_2.1.src.rpm i386: squid-3.1.10-1.el6_2.1.i686.rpm squid-debuginfo-3.1.10-1.el6_2.1.i686.rpm x86_64: squid-3.1.10-1.el6_2.1.x86_64.rpm squid-debuginfo-3.1.10-1.el6_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4096.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO3okaXlSAg2UNWIIRAugUAJ48SoKaJnBIdV3VuU2LnoNJduKCPQCgl16T 0qMU+uAlo+8SMzhx+aS6EuE= =tyE7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 8 21:22:36 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 8 Dec 2011 21:22:36 +0000 Subject: [RHSA-2011:1797-01] Moderate: perl security update Message-ID: <201112082122.pB8LMaaI027270@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: perl security update Advisory ID: RHSA-2011:1797-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1797.html Issue date: 2011-12-08 CVE Names: CVE-2010-2761 CVE-2010-4410 CVE-2011-3597 ===================================================================== 1. Summary: Updated perl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Perl is a high-level programming language commonly used for system administration utilities and web programming. It was found that the "new" constructor of the Digest module used its argument as part of the string expression passed to the eval() function. An attacker could possibly use this flaw to execute arbitrary Perl code with the privileges of a Perl program that uses untrusted input as an argument to the constructor. (CVE-2011-3597) It was found that the Perl CGI module used a hard-coded value for the MIME boundary string in multipart/x-mixed-replace content. A remote attacker could possibly use this flaw to conduct an HTTP response splitting attack via a specially-crafted HTTP request. (CVE-2010-2761) A CRLF injection flaw was found in the way the Perl CGI module processed a sequence of non-whitespace preceded by newline characters in the header. A remote attacker could use this flaw to conduct an HTTP response splitting attack via a specially-crafted sequence of characters provided to the CGI module. (CVE-2010-4410) All Perl users should upgrade to these updated packages, which contain backported patches to correct these issues. All running Perl programs must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 658976 - perl-CGI, perl-CGI-Simple: CVE-2010-2761 - hardcoded MIME boundary value for multipart content, CVE-2010-4410 - CRLF injection allowing HTTP response splitting 743010 - CVE-2011-3597 Perl Digest improper control of generation of code 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-57.el4.src.rpm i386: perl-5.8.5-57.el4.i386.rpm perl-debuginfo-5.8.5-57.el4.i386.rpm perl-suidperl-5.8.5-57.el4.i386.rpm ia64: perl-5.8.5-57.el4.ia64.rpm perl-debuginfo-5.8.5-57.el4.ia64.rpm perl-suidperl-5.8.5-57.el4.ia64.rpm ppc: perl-5.8.5-57.el4.ppc.rpm perl-debuginfo-5.8.5-57.el4.ppc.rpm perl-suidperl-5.8.5-57.el4.ppc.rpm s390: perl-5.8.5-57.el4.s390.rpm perl-debuginfo-5.8.5-57.el4.s390.rpm perl-suidperl-5.8.5-57.el4.s390.rpm s390x: perl-5.8.5-57.el4.s390x.rpm perl-debuginfo-5.8.5-57.el4.s390x.rpm perl-suidperl-5.8.5-57.el4.s390x.rpm x86_64: perl-5.8.5-57.el4.x86_64.rpm perl-debuginfo-5.8.5-57.el4.x86_64.rpm perl-suidperl-5.8.5-57.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-57.el4.src.rpm i386: perl-5.8.5-57.el4.i386.rpm perl-debuginfo-5.8.5-57.el4.i386.rpm perl-suidperl-5.8.5-57.el4.i386.rpm x86_64: perl-5.8.5-57.el4.x86_64.rpm perl-debuginfo-5.8.5-57.el4.x86_64.rpm perl-suidperl-5.8.5-57.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-57.el4.src.rpm i386: perl-5.8.5-57.el4.i386.rpm perl-debuginfo-5.8.5-57.el4.i386.rpm perl-suidperl-5.8.5-57.el4.i386.rpm ia64: perl-5.8.5-57.el4.ia64.rpm perl-debuginfo-5.8.5-57.el4.ia64.rpm perl-suidperl-5.8.5-57.el4.ia64.rpm x86_64: perl-5.8.5-57.el4.x86_64.rpm perl-debuginfo-5.8.5-57.el4.x86_64.rpm perl-suidperl-5.8.5-57.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-57.el4.src.rpm i386: perl-5.8.5-57.el4.i386.rpm perl-debuginfo-5.8.5-57.el4.i386.rpm perl-suidperl-5.8.5-57.el4.i386.rpm ia64: perl-5.8.5-57.el4.ia64.rpm perl-debuginfo-5.8.5-57.el4.ia64.rpm perl-suidperl-5.8.5-57.el4.ia64.rpm x86_64: perl-5.8.5-57.el4.x86_64.rpm perl-debuginfo-5.8.5-57.el4.x86_64.rpm perl-suidperl-5.8.5-57.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/perl-5.8.8-32.el5_7.6.src.rpm i386: perl-5.8.8-32.el5_7.6.i386.rpm perl-debuginfo-5.8.8-32.el5_7.6.i386.rpm perl-suidperl-5.8.8-32.el5_7.6.i386.rpm x86_64: perl-5.8.8-32.el5_7.6.i386.rpm perl-5.8.8-32.el5_7.6.x86_64.rpm perl-debuginfo-5.8.8-32.el5_7.6.i386.rpm perl-debuginfo-5.8.8-32.el5_7.6.x86_64.rpm perl-suidperl-5.8.8-32.el5_7.6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/perl-5.8.8-32.el5_7.6.src.rpm i386: perl-5.8.8-32.el5_7.6.i386.rpm perl-debuginfo-5.8.8-32.el5_7.6.i386.rpm perl-suidperl-5.8.8-32.el5_7.6.i386.rpm ia64: perl-5.8.8-32.el5_7.6.ia64.rpm perl-debuginfo-5.8.8-32.el5_7.6.ia64.rpm perl-suidperl-5.8.8-32.el5_7.6.ia64.rpm ppc: perl-5.8.8-32.el5_7.6.ppc.rpm perl-debuginfo-5.8.8-32.el5_7.6.ppc.rpm perl-suidperl-5.8.8-32.el5_7.6.ppc.rpm s390x: perl-5.8.8-32.el5_7.6.s390x.rpm perl-debuginfo-5.8.8-32.el5_7.6.s390x.rpm perl-suidperl-5.8.8-32.el5_7.6.s390x.rpm x86_64: perl-5.8.8-32.el5_7.6.x86_64.rpm perl-debuginfo-5.8.8-32.el5_7.6.x86_64.rpm perl-suidperl-5.8.8-32.el5_7.6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-2761.html https://www.redhat.com/security/data/cve/CVE-2010-4410.html https://www.redhat.com/security/data/cve/CVE-2011-3597.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO4SqRXlSAg2UNWIIRAsfxAJwJnAAoEfBgK6OpWfdTmfTcLksSDACgtF7E zNNp9PmQcQp4nJzVpS/4ZqA= =UwrA -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 8 21:28:09 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 8 Dec 2011 21:28:09 +0000 Subject: [RHSA-2011:1801-01] Important: qemu-kvm security update Message-ID: <201112082128.pB8LSAOl028724@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2011:1801-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1801.html Issue date: 2011-12-08 CVE Names: CVE-2011-4111 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server EUS (v. 6.1) - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. A flaw was found in the way qemu-kvm handled VSC_ATR messages when a guest was configured for a CCID (Chip/Smart Card Interface Devices) USB smart card reader in passthrough mode. An attacker able to connect to the port on the host being used for such a device could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host. (CVE-2011-4111) All users of qemu-kvm should upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 751310 - CVE-2011-4111 qemu: ccid: buffer overflow in handling of VSC_ATR message 6. Package List: Red Hat Enterprise Linux Server EUS (v. 6.1): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/qemu-kvm-0.12.1.2-2.160.el6_1.9.src.rpm x86_64: qemu-img-0.12.1.2-2.160.el6_1.9.x86_64.rpm qemu-kvm-0.12.1.2-2.160.el6_1.9.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.160.el6_1.9.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.160.el6_1.9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4111.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO4SumXlSAg2UNWIIRAtF7AJ9kOemjkjbIhv42VpT2vfEeFi5P3wCfbHxA wrYoUXzN2Z9ru4cayOZmtdM= =O4h9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Dec 9 05:37:20 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 9 Dec 2011 05:37:20 +0000 Subject: [RHSA-2011:1807-01] Important: jasper security update Message-ID: <201112090537.pB95bKuq019458@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jasper security update Advisory ID: RHSA-2011:1807-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1807.html Issue date: 2011-12-09 CVE Names: CVE-2011-4516 CVE-2011-4517 ===================================================================== 1. Summary: Updated jasper packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Two heap-based buffer overflow flaws were found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code. (CVE-2011-4516, CVE-2011-4517) Red Hat would like to thank Jonathan Foote of the CERT Coordination Center for reporting these issues. Users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. All applications using the JasPer libraries (such as Nautilus) must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 747726 - CVE-2011-4516 CVE-2011-4517 jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm i386: jasper-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm x86_64: jasper-1.900.1-15.el6_1.1.x86_64.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client-optional/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm i386: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-utils-1.900.1-15.el6_1.1.i686.rpm x86_64: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.x86_64.rpm jasper-utils-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm x86_64: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode-optional/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm x86_64: jasper-1.900.1-15.el6_1.1.x86_64.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.x86_64.rpm jasper-utils-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm i386: jasper-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm ppc64: jasper-1.900.1-15.el6_1.1.ppc64.rpm jasper-debuginfo-1.900.1-15.el6_1.1.ppc.rpm jasper-debuginfo-1.900.1-15.el6_1.1.ppc64.rpm jasper-libs-1.900.1-15.el6_1.1.ppc.rpm jasper-libs-1.900.1-15.el6_1.1.ppc64.rpm s390x: jasper-1.900.1-15.el6_1.1.s390x.rpm jasper-debuginfo-1.900.1-15.el6_1.1.s390.rpm jasper-debuginfo-1.900.1-15.el6_1.1.s390x.rpm jasper-libs-1.900.1-15.el6_1.1.s390.rpm jasper-libs-1.900.1-15.el6_1.1.s390x.rpm x86_64: jasper-1.900.1-15.el6_1.1.x86_64.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server-optional/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm i386: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-utils-1.900.1-15.el6_1.1.i686.rpm ppc64: jasper-debuginfo-1.900.1-15.el6_1.1.ppc.rpm jasper-debuginfo-1.900.1-15.el6_1.1.ppc64.rpm jasper-devel-1.900.1-15.el6_1.1.ppc.rpm jasper-devel-1.900.1-15.el6_1.1.ppc64.rpm jasper-utils-1.900.1-15.el6_1.1.ppc64.rpm s390x: jasper-debuginfo-1.900.1-15.el6_1.1.s390.rpm jasper-debuginfo-1.900.1-15.el6_1.1.s390x.rpm jasper-devel-1.900.1-15.el6_1.1.s390.rpm jasper-devel-1.900.1-15.el6_1.1.s390x.rpm jasper-utils-1.900.1-15.el6_1.1.s390x.rpm x86_64: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.x86_64.rpm jasper-utils-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm i386: jasper-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm x86_64: jasper-1.900.1-15.el6_1.1.x86_64.rpm jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-libs-1.900.1-15.el6_1.1.i686.rpm jasper-libs-1.900.1-15.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation-optional/en/os/SRPMS/jasper-1.900.1-15.el6_1.1.src.rpm i386: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-utils-1.900.1-15.el6_1.1.i686.rpm x86_64: jasper-debuginfo-1.900.1-15.el6_1.1.i686.rpm jasper-debuginfo-1.900.1-15.el6_1.1.x86_64.rpm jasper-devel-1.900.1-15.el6_1.1.i686.rpm jasper-devel-1.900.1-15.el6_1.1.x86_64.rpm jasper-utils-1.900.1-15.el6_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4516.html https://www.redhat.com/security/data/cve/CVE-2011-4517.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO4Z57XlSAg2UNWIIRAotWAKCxYMtdpA4Dh3SrCP79nB/W1DHchgCgs5gu HonWQN8s4ZZGEPcxV+D5Rrc= =yfrU -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 12 21:09:14 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Dec 2011 21:09:14 +0000 Subject: [RHSA-2011:1811-01] Important: netpbm security update Message-ID: <201112122109.pBCL9EeK011846@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: netpbm security update Advisory ID: RHSA-2011:1811-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1811.html Issue date: 2011-12-12 CVE Names: CVE-2009-4274 CVE-2011-4516 CVE-2011-4517 ===================================================================== 1. Summary: Updated netpbm packages that fix three security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The netpbm packages contain a library of functions which support programs for handling various graphics file formats, including .pbm (Portable Bit Map), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable Pixel Map), and others. Two heap-based buffer overflow flaws were found in the embedded JasPer library, which is used to provide support for Part 1 of the JPEG 2000 image compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker could create a malicious JPEG 2000 compressed image file that could cause jpeg2ktopam to crash or, potentially, execute arbitrary code with the privileges of the user running jpeg2ktopam. These flaws do not affect pamtojpeg2k. (CVE-2011-4516, CVE-2011-4517) A stack-based buffer overflow flaw was found in the way the xpmtoppm tool processed X PixMap (XPM) image files. An attacker could create a malicious XPM file that would cause xpmtoppm to crash or, potentially, execute arbitrary code with the privileges of the user running xpmtoppm. (CVE-2009-4274) Red Hat would like to thank Jonathan Foote of the CERT Coordination Center for reporting the CVE-2011-4516 and CVE-2011-4517 issues. All users of netpbm are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 546580 - CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap image header fields 747726 - CVE-2011-4516 CVE-2011-4517 jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/netpbm-10.35.58-8.el4.src.rpm i386: netpbm-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-devel-10.35.58-8.el4.i386.rpm netpbm-progs-10.35.58-8.el4.i386.rpm ia64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.ia64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.ia64.rpm netpbm-devel-10.35.58-8.el4.ia64.rpm netpbm-progs-10.35.58-8.el4.ia64.rpm ppc: netpbm-10.35.58-8.el4.ppc.rpm netpbm-10.35.58-8.el4.ppc64.rpm netpbm-debuginfo-10.35.58-8.el4.ppc.rpm netpbm-debuginfo-10.35.58-8.el4.ppc64.rpm netpbm-devel-10.35.58-8.el4.ppc.rpm netpbm-progs-10.35.58-8.el4.ppc.rpm s390: netpbm-10.35.58-8.el4.s390.rpm netpbm-debuginfo-10.35.58-8.el4.s390.rpm netpbm-devel-10.35.58-8.el4.s390.rpm netpbm-progs-10.35.58-8.el4.s390.rpm s390x: netpbm-10.35.58-8.el4.s390.rpm netpbm-10.35.58-8.el4.s390x.rpm netpbm-debuginfo-10.35.58-8.el4.s390.rpm netpbm-debuginfo-10.35.58-8.el4.s390x.rpm netpbm-devel-10.35.58-8.el4.s390x.rpm netpbm-progs-10.35.58-8.el4.s390x.rpm x86_64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.x86_64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.x86_64.rpm netpbm-devel-10.35.58-8.el4.x86_64.rpm netpbm-progs-10.35.58-8.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/netpbm-10.35.58-8.el4.src.rpm i386: netpbm-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-devel-10.35.58-8.el4.i386.rpm netpbm-progs-10.35.58-8.el4.i386.rpm x86_64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.x86_64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.x86_64.rpm netpbm-devel-10.35.58-8.el4.x86_64.rpm netpbm-progs-10.35.58-8.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/netpbm-10.35.58-8.el4.src.rpm i386: netpbm-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-devel-10.35.58-8.el4.i386.rpm netpbm-progs-10.35.58-8.el4.i386.rpm ia64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.ia64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.ia64.rpm netpbm-devel-10.35.58-8.el4.ia64.rpm netpbm-progs-10.35.58-8.el4.ia64.rpm x86_64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.x86_64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.x86_64.rpm netpbm-devel-10.35.58-8.el4.x86_64.rpm netpbm-progs-10.35.58-8.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/netpbm-10.35.58-8.el4.src.rpm i386: netpbm-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-devel-10.35.58-8.el4.i386.rpm netpbm-progs-10.35.58-8.el4.i386.rpm ia64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.ia64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.ia64.rpm netpbm-devel-10.35.58-8.el4.ia64.rpm netpbm-progs-10.35.58-8.el4.ia64.rpm x86_64: netpbm-10.35.58-8.el4.i386.rpm netpbm-10.35.58-8.el4.x86_64.rpm netpbm-debuginfo-10.35.58-8.el4.i386.rpm netpbm-debuginfo-10.35.58-8.el4.x86_64.rpm netpbm-devel-10.35.58-8.el4.x86_64.rpm netpbm-progs-10.35.58-8.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/netpbm-10.35.58-8.el5_7.3.src.rpm i386: netpbm-10.35.58-8.el5_7.3.i386.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.i386.rpm netpbm-progs-10.35.58-8.el5_7.3.i386.rpm x86_64: netpbm-10.35.58-8.el5_7.3.i386.rpm netpbm-10.35.58-8.el5_7.3.x86_64.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.i386.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.x86_64.rpm netpbm-progs-10.35.58-8.el5_7.3.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/netpbm-10.35.58-8.el5_7.3.src.rpm i386: netpbm-debuginfo-10.35.58-8.el5_7.3.i386.rpm netpbm-devel-10.35.58-8.el5_7.3.i386.rpm x86_64: netpbm-debuginfo-10.35.58-8.el5_7.3.i386.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.x86_64.rpm netpbm-devel-10.35.58-8.el5_7.3.i386.rpm netpbm-devel-10.35.58-8.el5_7.3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/netpbm-10.35.58-8.el5_7.3.src.rpm i386: netpbm-10.35.58-8.el5_7.3.i386.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.i386.rpm netpbm-devel-10.35.58-8.el5_7.3.i386.rpm netpbm-progs-10.35.58-8.el5_7.3.i386.rpm ia64: netpbm-10.35.58-8.el5_7.3.ia64.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.ia64.rpm netpbm-devel-10.35.58-8.el5_7.3.ia64.rpm netpbm-progs-10.35.58-8.el5_7.3.ia64.rpm ppc: netpbm-10.35.58-8.el5_7.3.ppc.rpm netpbm-10.35.58-8.el5_7.3.ppc64.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.ppc.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.ppc64.rpm netpbm-devel-10.35.58-8.el5_7.3.ppc.rpm netpbm-devel-10.35.58-8.el5_7.3.ppc64.rpm netpbm-progs-10.35.58-8.el5_7.3.ppc.rpm s390x: netpbm-10.35.58-8.el5_7.3.s390.rpm netpbm-10.35.58-8.el5_7.3.s390x.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.s390.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.s390x.rpm netpbm-devel-10.35.58-8.el5_7.3.s390.rpm netpbm-devel-10.35.58-8.el5_7.3.s390x.rpm netpbm-progs-10.35.58-8.el5_7.3.s390x.rpm x86_64: netpbm-10.35.58-8.el5_7.3.i386.rpm netpbm-10.35.58-8.el5_7.3.x86_64.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.i386.rpm netpbm-debuginfo-10.35.58-8.el5_7.3.x86_64.rpm netpbm-devel-10.35.58-8.el5_7.3.i386.rpm netpbm-devel-10.35.58-8.el5_7.3.x86_64.rpm netpbm-progs-10.35.58-8.el5_7.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-4274.html https://www.redhat.com/security/data/cve/CVE-2011-4516.html https://www.redhat.com/security/data/cve/CVE-2011-4517.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO5m1oXlSAg2UNWIIRAhT/AJwN4PCkN1Xt3W8TWxeZepgh+hRr1ACggAWh 8WI1NNpIAISQBTxT7cjrNRw= =aBZy -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 13 22:08:10 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Dec 2011 22:08:10 +0000 Subject: [RHSA-2011:1813-01] Important: kernel security and bug fix update Message-ID: <201112132208.pBDM8Bxp009125@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2011:1813-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1813.html Issue date: 2011-12-13 CVE Names: CVE-2011-2482 CVE-2011-2491 CVE-2011-2495 CVE-2011-2517 CVE-2011-2519 CVE-2011-2901 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and various bugs are now available for Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: These packages contain the Linux kernel. This update fixes the following security issues: * A flaw in the Stream Control Transmission Protocol (SCTP) implementation could allow a remote attacker to cause a denial of service by sending a specially-crafted SCTP packet to a target system. (CVE-2011-2482, Important) If you do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following to the end of the "/etc/modprobe.d/blacklist.conf" file: blacklist sctp This way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect. * A flaw in the client-side NFS Lock Manager (NLM) implementation could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2491, Important) * Flaws in the netlink-based wireless configuration interface could allow a local user, who has the CAP_NET_ADMIN capability, to cause a denial of service or escalate their privileges on systems that have an active wireless interface. (CVE-2011-2517, Important) * A flaw was found in the way the Linux kernel's Xen hypervisor implementation emulated the SAHF instruction. When using a fully-virtualized guest on a host that does not use hardware assisted paging (HAP), such as those running CPUs that do not have support for (or those that have it disabled) Intel Extended Page Tables (EPT) or AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged guest user could trigger this flaw to cause the hypervisor to crash. (CVE-2011-2519, Moderate) * A flaw in the __addr_ok() macro in the Linux kernel's Xen hypervisor implementation when running on 64-bit systems could allow a privileged guest user to crash the hypervisor. (CVE-2011-2901, Moderate) * /proc/[PID]/io is world-readable by default. Previously, these files could be read without any further restrictions. A local, unprivileged user could read these files, belonging to other, possibly privileged processes to gather confidential information, such as the length of a password used in a process. (CVE-2011-2495, Low) Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and Vasiliy Kulikov of Openwall for reporting CVE-2011-2495. This update also fixes the following bugs: * On Broadcom PCI cards that use the tg3 driver, the operational state of a network device, represented by the value in "/sys/class/net/ethX/operstate", was not initialized by default. Consequently, the state was reported as "unknown" when the tg3 network device was actually in the "up" state. This update modifies the tg3 driver to properly set the operstate value. (BZ#744699) * A KVM (Kernel-based Virtual Machine) guest can get preempted by the host, when a higher priority process needs to run. When a guest is not running for several timer interrupts in a row, ticks could be lost, resulting in the jiffies timer advancing slower than expected and timeouts taking longer than expected. To correct for the issue of lost ticks, do_timer_tsc_timekeeping() checks a reference clock source (kvm-clock when running as a KVM guest) to see if timer interrupts have been missed. If so, jiffies is incremented by the number of missed timer interrupts, ensuring that programs are woken up on time. (BZ#747874) * When a block device object was allocated, the bd_super field was not being explicitly initialized to NULL. Previously, users of the block device object could set bd_super to NULL when the object was released by calling the kill_block_super() function. Certain third-party file systems do not always use this function, and bd_super could therefore become uninitialized when the object was allocated again. This could cause a kernel panic in the blkdev_releasepage() function, when the uninitialized bd_super field was dereferenced. Now, bd_super is properly initialized in the bdget() function, and the kernel panic no longer occurs. (BZ#751137) 4. Solution: Users should upgrade to these updated packages, which contain backported patches to resolve these issues. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share 714867 - CVE-2011-2482 kernel: sctp dos 716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak 718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations 718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation 728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok() 6. Package List: Red Hat Enterprise Linux EUS (v. 5.6 server): Source: kernel-2.6.18-238.31.1.el5.src.rpm i386: kernel-2.6.18-238.31.1.el5.i686.rpm kernel-PAE-2.6.18-238.31.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.31.1.el5.i686.rpm kernel-debug-2.6.18-238.31.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.31.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.i686.rpm kernel-devel-2.6.18-238.31.1.el5.i686.rpm kernel-headers-2.6.18-238.31.1.el5.i386.rpm kernel-xen-2.6.18-238.31.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.31.1.el5.i686.rpm ia64: kernel-2.6.18-238.31.1.el5.ia64.rpm kernel-debug-2.6.18-238.31.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.ia64.rpm kernel-debug-devel-2.6.18-238.31.1.el5.ia64.rpm kernel-debuginfo-2.6.18-238.31.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.ia64.rpm kernel-devel-2.6.18-238.31.1.el5.ia64.rpm kernel-headers-2.6.18-238.31.1.el5.ia64.rpm kernel-xen-2.6.18-238.31.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-238.31.1.el5.ia64.rpm kernel-xen-devel-2.6.18-238.31.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-238.31.1.el5.noarch.rpm ppc: kernel-2.6.18-238.31.1.el5.ppc64.rpm kernel-debug-2.6.18-238.31.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-238.31.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.ppc64.rpm kernel-devel-2.6.18-238.31.1.el5.ppc64.rpm kernel-headers-2.6.18-238.31.1.el5.ppc.rpm kernel-headers-2.6.18-238.31.1.el5.ppc64.rpm kernel-kdump-2.6.18-238.31.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-238.31.1.el5.ppc64.rpm s390x: kernel-2.6.18-238.31.1.el5.s390x.rpm kernel-debug-2.6.18-238.31.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.s390x.rpm kernel-debug-devel-2.6.18-238.31.1.el5.s390x.rpm kernel-debuginfo-2.6.18-238.31.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.s390x.rpm kernel-devel-2.6.18-238.31.1.el5.s390x.rpm kernel-headers-2.6.18-238.31.1.el5.s390x.rpm kernel-kdump-2.6.18-238.31.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-238.31.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-238.31.1.el5.s390x.rpm x86_64: kernel-2.6.18-238.31.1.el5.x86_64.rpm kernel-debug-2.6.18-238.31.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.31.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.x86_64.rpm kernel-devel-2.6.18-238.31.1.el5.x86_64.rpm kernel-headers-2.6.18-238.31.1.el5.x86_64.rpm kernel-xen-2.6.18-238.31.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.31.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2482.html https://www.redhat.com/security/data/cve/CVE-2011-2491.html https://www.redhat.com/security/data/cve/CVE-2011-2495.html https://www.redhat.com/security/data/cve/CVE-2011-2517.html https://www.redhat.com/security/data/cve/CVE-2011-2519.html https://www.redhat.com/security/data/cve/CVE-2011-2901.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO58y+XlSAg2UNWIIRAvRlAKC0Qm0s8J9L86DbHpZvJxkh5tjOiwCeOHjb MFFoSfPI/5HPPNKuMt6pwRw= =eZIl -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 13 22:08:38 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Dec 2011 22:08:38 +0000 Subject: [RHSA-2011:1814-01] Moderate: ipmitool security update Message-ID: <201112132208.pBDM8ckO021279@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ipmitool security update Advisory ID: RHSA-2011:1814-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1814.html Issue date: 2011-12-13 CVE Names: CVE-2011-4339 ===================================================================== 1. Summary: An updated ipmitool package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The ipmitool package contains a command line utility for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification. IPMI is an open standard for machine health, inventory, and remote power control. It was discovered that the IPMI event daemon (ipmievd) created its process ID (PID) file with world-writable permissions. A local user could use this flaw to make the ipmievd init script kill an arbitrary process when the ipmievd daemon is stopped or restarted. (CVE-2011-4339) All users of ipmitool are advised to upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the IPMI event daemon (ipmievd) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 742837 - CVE-2011-4339 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client-optional/en/os/SRPMS/ipmitool-1.8.11-12.el6_2.1.src.rpm i386: ipmitool-1.8.11-12.el6_2.1.i686.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.i686.rpm x86_64: ipmitool-1.8.11-12.el6_2.1.x86_64.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ipmitool-1.8.11-12.el6_2.1.src.rpm x86_64: ipmitool-1.8.11-12.el6_2.1.x86_64.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ipmitool-1.8.11-12.el6_2.1.src.rpm i386: ipmitool-1.8.11-12.el6_2.1.i686.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.i686.rpm ppc64: ipmitool-1.8.11-12.el6_2.1.ppc64.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.ppc64.rpm s390x: ipmitool-1.8.11-12.el6_2.1.s390x.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.s390x.rpm x86_64: ipmitool-1.8.11-12.el6_2.1.x86_64.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ipmitool-1.8.11-12.el6_2.1.src.rpm i386: ipmitool-1.8.11-12.el6_2.1.i686.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.i686.rpm x86_64: ipmitool-1.8.11-12.el6_2.1.x86_64.rpm ipmitool-debuginfo-1.8.11-12.el6_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4339.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO58zaXlSAg2UNWIIRAoJUAJ0fCBA9I5gP/iHjHQB7xO2z1Dq6gQCdHo/j mpA4NNC7s9l6ArT7FEHSXFs= =xjqI -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 13 22:12:43 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Dec 2011 22:12:43 +0000 Subject: [RHSA-2011:1815-01] Moderate: icu security update Message-ID: <201112132212.pBDMChPr009835@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: icu security update Advisory ID: RHSA-2011:1815-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1815.html Issue date: 2011-12-13 CVE Names: CVE-2011-4599 ===================================================================== 1. Summary: Updated icu packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 3. Description: The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. A stack-based buffer overflow flaw was found in the way ICU performed variant canonicalization for some locale identifiers. If a specially-crafted locale representation was opened in an application linked against ICU, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-4599) All users of ICU should upgrade to these updated packages, which contain a backported patch to resolve this issue. All applications linked against ICU must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 765812 - CVE-2011-4599 icu: Stack-based buffer overflow by canonicalizing the given localeID 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/icu-3.6-5.16.1.src.rpm i386: icu-3.6-5.16.1.i386.rpm icu-debuginfo-3.6-5.16.1.i386.rpm libicu-3.6-5.16.1.i386.rpm libicu-doc-3.6-5.16.1.i386.rpm x86_64: icu-3.6-5.16.1.x86_64.rpm icu-debuginfo-3.6-5.16.1.i386.rpm icu-debuginfo-3.6-5.16.1.x86_64.rpm libicu-3.6-5.16.1.i386.rpm libicu-3.6-5.16.1.x86_64.rpm libicu-doc-3.6-5.16.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/icu-3.6-5.16.1.src.rpm i386: icu-debuginfo-3.6-5.16.1.i386.rpm libicu-devel-3.6-5.16.1.i386.rpm x86_64: icu-debuginfo-3.6-5.16.1.i386.rpm icu-debuginfo-3.6-5.16.1.x86_64.rpm libicu-devel-3.6-5.16.1.i386.rpm libicu-devel-3.6-5.16.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/icu-3.6-5.16.1.src.rpm i386: icu-3.6-5.16.1.i386.rpm icu-debuginfo-3.6-5.16.1.i386.rpm libicu-3.6-5.16.1.i386.rpm libicu-devel-3.6-5.16.1.i386.rpm libicu-doc-3.6-5.16.1.i386.rpm ia64: icu-3.6-5.16.1.ia64.rpm icu-debuginfo-3.6-5.16.1.ia64.rpm libicu-3.6-5.16.1.ia64.rpm libicu-devel-3.6-5.16.1.ia64.rpm libicu-doc-3.6-5.16.1.ia64.rpm ppc: icu-3.6-5.16.1.ppc.rpm icu-debuginfo-3.6-5.16.1.ppc.rpm icu-debuginfo-3.6-5.16.1.ppc64.rpm libicu-3.6-5.16.1.ppc.rpm libicu-3.6-5.16.1.ppc64.rpm libicu-devel-3.6-5.16.1.ppc.rpm libicu-devel-3.6-5.16.1.ppc64.rpm libicu-doc-3.6-5.16.1.ppc.rpm s390x: icu-3.6-5.16.1.s390x.rpm icu-debuginfo-3.6-5.16.1.s390.rpm icu-debuginfo-3.6-5.16.1.s390x.rpm libicu-3.6-5.16.1.s390.rpm libicu-3.6-5.16.1.s390x.rpm libicu-devel-3.6-5.16.1.s390.rpm libicu-devel-3.6-5.16.1.s390x.rpm libicu-doc-3.6-5.16.1.s390x.rpm x86_64: icu-3.6-5.16.1.x86_64.rpm icu-debuginfo-3.6-5.16.1.i386.rpm icu-debuginfo-3.6-5.16.1.x86_64.rpm libicu-3.6-5.16.1.i386.rpm libicu-3.6-5.16.1.x86_64.rpm libicu-devel-3.6-5.16.1.i386.rpm libicu-devel-3.6-5.16.1.x86_64.rpm libicu-doc-3.6-5.16.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm i386: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.i686.rpm x86_64: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm i386: icu-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm noarch: libicu-doc-4.2.1-9.1.el6_2.noarch.rpm x86_64: icu-4.2.1-9.1.el6_2.x86_64.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm x86_64: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm noarch: libicu-doc-4.2.1-9.1.el6_2.noarch.rpm x86_64: icu-4.2.1-9.1.el6_2.x86_64.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm i386: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.i686.rpm ppc64: icu-debuginfo-4.2.1-9.1.el6_2.ppc.rpm icu-debuginfo-4.2.1-9.1.el6_2.ppc64.rpm libicu-4.2.1-9.1.el6_2.ppc.rpm libicu-4.2.1-9.1.el6_2.ppc64.rpm s390x: icu-debuginfo-4.2.1-9.1.el6_2.s390.rpm icu-debuginfo-4.2.1-9.1.el6_2.s390x.rpm libicu-4.2.1-9.1.el6_2.s390.rpm libicu-4.2.1-9.1.el6_2.s390x.rpm x86_64: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm i386: icu-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm noarch: libicu-doc-4.2.1-9.1.el6_2.noarch.rpm ppc64: icu-4.2.1-9.1.el6_2.ppc64.rpm icu-debuginfo-4.2.1-9.1.el6_2.ppc.rpm icu-debuginfo-4.2.1-9.1.el6_2.ppc64.rpm libicu-devel-4.2.1-9.1.el6_2.ppc.rpm libicu-devel-4.2.1-9.1.el6_2.ppc64.rpm s390x: icu-4.2.1-9.1.el6_2.s390x.rpm icu-debuginfo-4.2.1-9.1.el6_2.s390.rpm icu-debuginfo-4.2.1-9.1.el6_2.s390x.rpm libicu-devel-4.2.1-9.1.el6_2.s390.rpm libicu-devel-4.2.1-9.1.el6_2.s390x.rpm x86_64: icu-4.2.1-9.1.el6_2.x86_64.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm i386: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.i686.rpm x86_64: icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-4.2.1-9.1.el6_2.i686.rpm libicu-4.2.1-9.1.el6_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/icu-4.2.1-9.1.el6_2.src.rpm i386: icu-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm noarch: libicu-doc-4.2.1-9.1.el6_2.noarch.rpm x86_64: icu-4.2.1-9.1.el6_2.x86_64.rpm icu-debuginfo-4.2.1-9.1.el6_2.i686.rpm icu-debuginfo-4.2.1-9.1.el6_2.x86_64.rpm libicu-devel-4.2.1-9.1.el6_2.i686.rpm libicu-devel-4.2.1-9.1.el6_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4599.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO583BXlSAg2UNWIIRAnoxAKC9wa6la8a8dKy2FQayRdxXkL5/rACguN41 9mNW9tapcEhNEHAxnfNnoFk= =FIHf -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 14 19:04:58 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 14 Dec 2011 19:04:58 +0000 Subject: [RHSA-2011:1819-01] Moderate: dhcp security update Message-ID: <201112141904.pBEJ4wiJ010707@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: dhcp security update Advisory ID: RHSA-2011:1819-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1819.html Issue date: 2011-12-14 CVE Names: CVE-2011-4539 ===================================================================== 1. Summary: Updated dhcp packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. A denial of service flaw was found in the way the dhcpd daemon handled DHCP request packets when regular expression matching was used in "/etc/dhcp/dhcpd.conf". A remote attacker could use this flaw to crash dhcpd. (CVE-2011-4539) Users of DHCP should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, all DHCP servers will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 761265 - CVE-2011-4539 dhcp: DoS due to processing certain regular expressions 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm i386: dhclient-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-common-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm x86_64: dhclient-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-common-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm i386: dhcp-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm x86_64: dhcp-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm x86_64: dhclient-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-common-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm x86_64: dhcp-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm i386: dhclient-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-common-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm ppc64: dhclient-4.1.1-25.P1.el6_2.1.ppc64.rpm dhcp-4.1.1-25.P1.el6_2.1.ppc64.rpm dhcp-common-4.1.1-25.P1.el6_2.1.ppc64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.ppc64.rpm s390x: dhclient-4.1.1-25.P1.el6_2.1.s390x.rpm dhcp-4.1.1-25.P1.el6_2.1.s390x.rpm dhcp-common-4.1.1-25.P1.el6_2.1.s390x.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.s390x.rpm x86_64: dhclient-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-common-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm i386: dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm ppc64: dhcp-debuginfo-4.1.1-25.P1.el6_2.1.ppc.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.ppc64.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.ppc.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.ppc64.rpm s390x: dhcp-debuginfo-4.1.1-25.P1.el6_2.1.s390.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.s390x.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.s390.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.s390x.rpm x86_64: dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm i386: dhclient-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-common-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm x86_64: dhclient-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-common-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dhcp-4.1.1-25.P1.el6_2.1.src.rpm i386: dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm x86_64: dhcp-debuginfo-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-debuginfo-4.1.1-25.P1.el6_2.1.x86_64.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.i686.rpm dhcp-devel-4.1.1-25.P1.el6_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4539.html https://access.redhat.com/security/updates/classification/#moderate http://www.isc.org/software/dhcp/advisories/cve-2011-4539 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO6PNMXlSAg2UNWIIRApbeAKC+qGwPXMyblUNv35s064NjHCmrkQCfRrS/ es3vgT1+FYmB9UVr4cgDpXs= =8mVI -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 14 19:05:40 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 14 Dec 2011 19:05:40 +0000 Subject: [RHSA-2011:1820-01] Moderate: pidgin security update Message-ID: <201112141905.pBEJ5fY8010503@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: pidgin security update Advisory ID: RHSA-2011:1820-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1820.html Issue date: 2011-12-14 CVE Names: CVE-2011-4601 CVE-2011-4602 CVE-2011-4603 ===================================================================== 1. Summary: Updated pidgin packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime (OSCAR) protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. (CVE-2011-4601) An input sanitization flaw was found in the way the Pidgin SILC (Secure Internet Live Conferencing) protocol plug-in escaped certain UTF-8 characters in channel messages. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message. (CVE-2011-4603) Multiple NULL pointer dereference flaws were found in the Jingle extension of the Extensible Messaging and Presence Protocol (XMPP) protocol plug-in in Pidgin. A remote attacker could use these flaws to crash Pidgin via a specially-crafted Jingle multimedia message. (CVE-2011-4602) Red Hat would like to thank the Pidgin project for reporting these issues. Upstream acknowledges Evgeny Boger as the original reporter of CVE-2011-4601; Diego Bauche Madero from IOActive as the original reporter of CVE-2011-4603; and Thijs Alkemade as the original reporter of CVE-2011-4602. All Pidgin users should upgrade to these updated packages, which contain backported patches to resolve these issues. Pidgin must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 761510 - CVE-2011-4602 pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in 761517 - CVE-2011-4601 pidgin (libpurple): Invalid UTF-8 string handling in OSCAR messages 766446 - CVE-2011-4603 pidgin: SILC remote crash on channel messages 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/pidgin-2.6.6-10.el4.src.rpm i386: finch-2.6.6-10.el4.i386.rpm finch-devel-2.6.6-10.el4.i386.rpm libpurple-2.6.6-10.el4.i386.rpm libpurple-devel-2.6.6-10.el4.i386.rpm libpurple-perl-2.6.6-10.el4.i386.rpm libpurple-tcl-2.6.6-10.el4.i386.rpm pidgin-2.6.6-10.el4.i386.rpm pidgin-debuginfo-2.6.6-10.el4.i386.rpm pidgin-devel-2.6.6-10.el4.i386.rpm pidgin-perl-2.6.6-10.el4.i386.rpm ia64: finch-2.6.6-10.el4.ia64.rpm finch-devel-2.6.6-10.el4.ia64.rpm libpurple-2.6.6-10.el4.ia64.rpm libpurple-devel-2.6.6-10.el4.ia64.rpm libpurple-perl-2.6.6-10.el4.ia64.rpm libpurple-tcl-2.6.6-10.el4.ia64.rpm pidgin-2.6.6-10.el4.ia64.rpm pidgin-debuginfo-2.6.6-10.el4.ia64.rpm pidgin-devel-2.6.6-10.el4.ia64.rpm pidgin-perl-2.6.6-10.el4.ia64.rpm ppc: finch-2.6.6-10.el4.ppc.rpm finch-devel-2.6.6-10.el4.ppc.rpm libpurple-2.6.6-10.el4.ppc.rpm libpurple-devel-2.6.6-10.el4.ppc.rpm libpurple-perl-2.6.6-10.el4.ppc.rpm libpurple-tcl-2.6.6-10.el4.ppc.rpm pidgin-2.6.6-10.el4.ppc.rpm pidgin-debuginfo-2.6.6-10.el4.ppc.rpm pidgin-devel-2.6.6-10.el4.ppc.rpm pidgin-perl-2.6.6-10.el4.ppc.rpm x86_64: finch-2.6.6-10.el4.x86_64.rpm finch-devel-2.6.6-10.el4.x86_64.rpm libpurple-2.6.6-10.el4.x86_64.rpm libpurple-devel-2.6.6-10.el4.x86_64.rpm libpurple-perl-2.6.6-10.el4.x86_64.rpm libpurple-tcl-2.6.6-10.el4.x86_64.rpm pidgin-2.6.6-10.el4.x86_64.rpm pidgin-debuginfo-2.6.6-10.el4.x86_64.rpm pidgin-devel-2.6.6-10.el4.x86_64.rpm pidgin-perl-2.6.6-10.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/pidgin-2.6.6-10.el4.src.rpm i386: finch-2.6.6-10.el4.i386.rpm finch-devel-2.6.6-10.el4.i386.rpm libpurple-2.6.6-10.el4.i386.rpm libpurple-devel-2.6.6-10.el4.i386.rpm libpurple-perl-2.6.6-10.el4.i386.rpm libpurple-tcl-2.6.6-10.el4.i386.rpm pidgin-2.6.6-10.el4.i386.rpm pidgin-debuginfo-2.6.6-10.el4.i386.rpm pidgin-devel-2.6.6-10.el4.i386.rpm pidgin-perl-2.6.6-10.el4.i386.rpm x86_64: finch-2.6.6-10.el4.x86_64.rpm finch-devel-2.6.6-10.el4.x86_64.rpm libpurple-2.6.6-10.el4.x86_64.rpm libpurple-devel-2.6.6-10.el4.x86_64.rpm libpurple-perl-2.6.6-10.el4.x86_64.rpm libpurple-tcl-2.6.6-10.el4.x86_64.rpm pidgin-2.6.6-10.el4.x86_64.rpm pidgin-debuginfo-2.6.6-10.el4.x86_64.rpm pidgin-devel-2.6.6-10.el4.x86_64.rpm pidgin-perl-2.6.6-10.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/pidgin-2.6.6-10.el4.src.rpm i386: finch-2.6.6-10.el4.i386.rpm finch-devel-2.6.6-10.el4.i386.rpm libpurple-2.6.6-10.el4.i386.rpm libpurple-devel-2.6.6-10.el4.i386.rpm libpurple-perl-2.6.6-10.el4.i386.rpm libpurple-tcl-2.6.6-10.el4.i386.rpm pidgin-2.6.6-10.el4.i386.rpm pidgin-debuginfo-2.6.6-10.el4.i386.rpm pidgin-devel-2.6.6-10.el4.i386.rpm pidgin-perl-2.6.6-10.el4.i386.rpm ia64: finch-2.6.6-10.el4.ia64.rpm finch-devel-2.6.6-10.el4.ia64.rpm libpurple-2.6.6-10.el4.ia64.rpm libpurple-devel-2.6.6-10.el4.ia64.rpm libpurple-perl-2.6.6-10.el4.ia64.rpm libpurple-tcl-2.6.6-10.el4.ia64.rpm pidgin-2.6.6-10.el4.ia64.rpm pidgin-debuginfo-2.6.6-10.el4.ia64.rpm pidgin-devel-2.6.6-10.el4.ia64.rpm pidgin-perl-2.6.6-10.el4.ia64.rpm x86_64: finch-2.6.6-10.el4.x86_64.rpm finch-devel-2.6.6-10.el4.x86_64.rpm libpurple-2.6.6-10.el4.x86_64.rpm libpurple-devel-2.6.6-10.el4.x86_64.rpm libpurple-perl-2.6.6-10.el4.x86_64.rpm libpurple-tcl-2.6.6-10.el4.x86_64.rpm pidgin-2.6.6-10.el4.x86_64.rpm pidgin-debuginfo-2.6.6-10.el4.x86_64.rpm pidgin-devel-2.6.6-10.el4.x86_64.rpm pidgin-perl-2.6.6-10.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/pidgin-2.6.6-10.el4.src.rpm i386: finch-2.6.6-10.el4.i386.rpm finch-devel-2.6.6-10.el4.i386.rpm libpurple-2.6.6-10.el4.i386.rpm libpurple-devel-2.6.6-10.el4.i386.rpm libpurple-perl-2.6.6-10.el4.i386.rpm libpurple-tcl-2.6.6-10.el4.i386.rpm pidgin-2.6.6-10.el4.i386.rpm pidgin-debuginfo-2.6.6-10.el4.i386.rpm pidgin-devel-2.6.6-10.el4.i386.rpm pidgin-perl-2.6.6-10.el4.i386.rpm ia64: finch-2.6.6-10.el4.ia64.rpm finch-devel-2.6.6-10.el4.ia64.rpm libpurple-2.6.6-10.el4.ia64.rpm libpurple-devel-2.6.6-10.el4.ia64.rpm libpurple-perl-2.6.6-10.el4.ia64.rpm libpurple-tcl-2.6.6-10.el4.ia64.rpm pidgin-2.6.6-10.el4.ia64.rpm pidgin-debuginfo-2.6.6-10.el4.ia64.rpm pidgin-devel-2.6.6-10.el4.ia64.rpm pidgin-perl-2.6.6-10.el4.ia64.rpm x86_64: finch-2.6.6-10.el4.x86_64.rpm finch-devel-2.6.6-10.el4.x86_64.rpm libpurple-2.6.6-10.el4.x86_64.rpm libpurple-devel-2.6.6-10.el4.x86_64.rpm libpurple-perl-2.6.6-10.el4.x86_64.rpm libpurple-tcl-2.6.6-10.el4.x86_64.rpm pidgin-2.6.6-10.el4.x86_64.rpm pidgin-debuginfo-2.6.6-10.el4.x86_64.rpm pidgin-devel-2.6.6-10.el4.x86_64.rpm pidgin-perl-2.6.6-10.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pidgin-2.6.6-5.el5_7.4.src.rpm i386: finch-2.6.6-5.el5_7.4.i386.rpm libpurple-2.6.6-5.el5_7.4.i386.rpm libpurple-perl-2.6.6-5.el5_7.4.i386.rpm libpurple-tcl-2.6.6-5.el5_7.4.i386.rpm pidgin-2.6.6-5.el5_7.4.i386.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.i386.rpm pidgin-perl-2.6.6-5.el5_7.4.i386.rpm x86_64: finch-2.6.6-5.el5_7.4.i386.rpm finch-2.6.6-5.el5_7.4.x86_64.rpm libpurple-2.6.6-5.el5_7.4.i386.rpm libpurple-2.6.6-5.el5_7.4.x86_64.rpm libpurple-perl-2.6.6-5.el5_7.4.x86_64.rpm libpurple-tcl-2.6.6-5.el5_7.4.x86_64.rpm pidgin-2.6.6-5.el5_7.4.i386.rpm pidgin-2.6.6-5.el5_7.4.x86_64.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.i386.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.x86_64.rpm pidgin-perl-2.6.6-5.el5_7.4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pidgin-2.6.6-5.el5_7.4.src.rpm i386: finch-devel-2.6.6-5.el5_7.4.i386.rpm libpurple-devel-2.6.6-5.el5_7.4.i386.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.i386.rpm pidgin-devel-2.6.6-5.el5_7.4.i386.rpm x86_64: finch-devel-2.6.6-5.el5_7.4.i386.rpm finch-devel-2.6.6-5.el5_7.4.x86_64.rpm libpurple-devel-2.6.6-5.el5_7.4.i386.rpm libpurple-devel-2.6.6-5.el5_7.4.x86_64.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.i386.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.x86_64.rpm pidgin-devel-2.6.6-5.el5_7.4.i386.rpm pidgin-devel-2.6.6-5.el5_7.4.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/pidgin-2.6.6-5.el5_7.4.src.rpm i386: finch-2.6.6-5.el5_7.4.i386.rpm finch-devel-2.6.6-5.el5_7.4.i386.rpm libpurple-2.6.6-5.el5_7.4.i386.rpm libpurple-devel-2.6.6-5.el5_7.4.i386.rpm libpurple-perl-2.6.6-5.el5_7.4.i386.rpm libpurple-tcl-2.6.6-5.el5_7.4.i386.rpm pidgin-2.6.6-5.el5_7.4.i386.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.i386.rpm pidgin-devel-2.6.6-5.el5_7.4.i386.rpm pidgin-perl-2.6.6-5.el5_7.4.i386.rpm x86_64: finch-2.6.6-5.el5_7.4.i386.rpm finch-2.6.6-5.el5_7.4.x86_64.rpm finch-devel-2.6.6-5.el5_7.4.i386.rpm finch-devel-2.6.6-5.el5_7.4.x86_64.rpm libpurple-2.6.6-5.el5_7.4.i386.rpm libpurple-2.6.6-5.el5_7.4.x86_64.rpm libpurple-devel-2.6.6-5.el5_7.4.i386.rpm libpurple-devel-2.6.6-5.el5_7.4.x86_64.rpm libpurple-perl-2.6.6-5.el5_7.4.x86_64.rpm libpurple-tcl-2.6.6-5.el5_7.4.x86_64.rpm pidgin-2.6.6-5.el5_7.4.i386.rpm pidgin-2.6.6-5.el5_7.4.x86_64.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.i386.rpm pidgin-debuginfo-2.6.6-5.el5_7.4.x86_64.rpm pidgin-devel-2.6.6-5.el5_7.4.i386.rpm pidgin-devel-2.6.6-5.el5_7.4.x86_64.rpm pidgin-perl-2.6.6-5.el5_7.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4601.html https://www.redhat.com/security/data/cve/CVE-2011-4602.html https://www.redhat.com/security/data/cve/CVE-2011-4603.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO6PNxXlSAg2UNWIIRAh8gAJ9Q3pv0C5czbMIPfWFmhJl06XVCaACgvHGg 50yu0rmpXmx+Wzxps4/NZBw= =AgZF -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 14 19:06:15 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 14 Dec 2011 19:06:15 +0000 Subject: [RHSA-2011:1821-01] Moderate: pidgin security update Message-ID: <201112141906.pBEJ6F8P030076@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: pidgin security update Advisory ID: RHSA-2011:1821-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1821.html Issue date: 2011-12-14 CVE Names: CVE-2011-4601 CVE-2011-4602 ===================================================================== 1. Summary: Updated pidgin packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime (OSCAR) protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. (CVE-2011-4601) Multiple NULL pointer dereference flaws were found in the Jingle extension of the Extensible Messaging and Presence Protocol (XMPP) protocol plug-in in Pidgin. A remote attacker could use these flaws to crash Pidgin via a specially-crafted Jingle multimedia message. (CVE-2011-4602) Red Hat would like to thank the Pidgin project for reporting these issues. Upstream acknowledges Evgeny Boger as the original reporter of CVE-2011-4601, and Thijs Alkemade as the original reporter of CVE-2011-4602. All Pidgin users should upgrade to these updated packages, which contain backported patches to resolve these issues. Pidgin must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 761510 - CVE-2011-4602 pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in 761517 - CVE-2011-4601 pidgin (libpurple): Invalid UTF-8 string handling in OSCAR messages 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/pidgin-2.7.9-3.el6.2.src.rpm i386: libpurple-2.7.9-3.el6.2.i686.rpm pidgin-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm x86_64: libpurple-2.7.9-3.el6.2.i686.rpm libpurple-2.7.9-3.el6.2.x86_64.rpm pidgin-2.7.9-3.el6.2.x86_64.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/pidgin-2.7.9-3.el6.2.src.rpm i386: finch-2.7.9-3.el6.2.i686.rpm finch-devel-2.7.9-3.el6.2.i686.rpm libpurple-devel-2.7.9-3.el6.2.i686.rpm libpurple-perl-2.7.9-3.el6.2.i686.rpm libpurple-tcl-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-devel-2.7.9-3.el6.2.i686.rpm pidgin-docs-2.7.9-3.el6.2.i686.rpm pidgin-perl-2.7.9-3.el6.2.i686.rpm x86_64: finch-2.7.9-3.el6.2.i686.rpm finch-2.7.9-3.el6.2.x86_64.rpm finch-devel-2.7.9-3.el6.2.i686.rpm finch-devel-2.7.9-3.el6.2.x86_64.rpm libpurple-devel-2.7.9-3.el6.2.i686.rpm libpurple-devel-2.7.9-3.el6.2.x86_64.rpm libpurple-perl-2.7.9-3.el6.2.x86_64.rpm libpurple-tcl-2.7.9-3.el6.2.x86_64.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.x86_64.rpm pidgin-devel-2.7.9-3.el6.2.i686.rpm pidgin-devel-2.7.9-3.el6.2.x86_64.rpm pidgin-docs-2.7.9-3.el6.2.x86_64.rpm pidgin-perl-2.7.9-3.el6.2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/pidgin-2.7.9-3.el6.2.src.rpm i386: finch-2.7.9-3.el6.2.i686.rpm finch-devel-2.7.9-3.el6.2.i686.rpm libpurple-2.7.9-3.el6.2.i686.rpm libpurple-devel-2.7.9-3.el6.2.i686.rpm libpurple-perl-2.7.9-3.el6.2.i686.rpm libpurple-tcl-2.7.9-3.el6.2.i686.rpm pidgin-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-devel-2.7.9-3.el6.2.i686.rpm pidgin-docs-2.7.9-3.el6.2.i686.rpm pidgin-perl-2.7.9-3.el6.2.i686.rpm ppc64: finch-2.7.9-3.el6.2.ppc.rpm finch-2.7.9-3.el6.2.ppc64.rpm finch-devel-2.7.9-3.el6.2.ppc.rpm finch-devel-2.7.9-3.el6.2.ppc64.rpm libpurple-2.7.9-3.el6.2.ppc.rpm libpurple-2.7.9-3.el6.2.ppc64.rpm libpurple-devel-2.7.9-3.el6.2.ppc.rpm libpurple-devel-2.7.9-3.el6.2.ppc64.rpm libpurple-perl-2.7.9-3.el6.2.ppc64.rpm libpurple-tcl-2.7.9-3.el6.2.ppc64.rpm pidgin-2.7.9-3.el6.2.ppc64.rpm pidgin-debuginfo-2.7.9-3.el6.2.ppc.rpm pidgin-debuginfo-2.7.9-3.el6.2.ppc64.rpm pidgin-devel-2.7.9-3.el6.2.ppc.rpm pidgin-devel-2.7.9-3.el6.2.ppc64.rpm pidgin-docs-2.7.9-3.el6.2.ppc64.rpm pidgin-perl-2.7.9-3.el6.2.ppc64.rpm x86_64: finch-2.7.9-3.el6.2.i686.rpm finch-2.7.9-3.el6.2.x86_64.rpm finch-devel-2.7.9-3.el6.2.i686.rpm finch-devel-2.7.9-3.el6.2.x86_64.rpm libpurple-2.7.9-3.el6.2.i686.rpm libpurple-2.7.9-3.el6.2.x86_64.rpm libpurple-devel-2.7.9-3.el6.2.i686.rpm libpurple-devel-2.7.9-3.el6.2.x86_64.rpm libpurple-perl-2.7.9-3.el6.2.x86_64.rpm libpurple-tcl-2.7.9-3.el6.2.x86_64.rpm pidgin-2.7.9-3.el6.2.x86_64.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.x86_64.rpm pidgin-devel-2.7.9-3.el6.2.i686.rpm pidgin-devel-2.7.9-3.el6.2.x86_64.rpm pidgin-docs-2.7.9-3.el6.2.x86_64.rpm pidgin-perl-2.7.9-3.el6.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/pidgin-2.7.9-3.el6.2.src.rpm i386: libpurple-2.7.9-3.el6.2.i686.rpm pidgin-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm x86_64: libpurple-2.7.9-3.el6.2.i686.rpm libpurple-2.7.9-3.el6.2.x86_64.rpm pidgin-2.7.9-3.el6.2.x86_64.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/pidgin-2.7.9-3.el6.2.src.rpm i386: finch-2.7.9-3.el6.2.i686.rpm finch-devel-2.7.9-3.el6.2.i686.rpm libpurple-devel-2.7.9-3.el6.2.i686.rpm libpurple-perl-2.7.9-3.el6.2.i686.rpm libpurple-tcl-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-devel-2.7.9-3.el6.2.i686.rpm pidgin-docs-2.7.9-3.el6.2.i686.rpm pidgin-perl-2.7.9-3.el6.2.i686.rpm x86_64: finch-2.7.9-3.el6.2.i686.rpm finch-2.7.9-3.el6.2.x86_64.rpm finch-devel-2.7.9-3.el6.2.i686.rpm finch-devel-2.7.9-3.el6.2.x86_64.rpm libpurple-devel-2.7.9-3.el6.2.i686.rpm libpurple-devel-2.7.9-3.el6.2.x86_64.rpm libpurple-perl-2.7.9-3.el6.2.x86_64.rpm libpurple-tcl-2.7.9-3.el6.2.x86_64.rpm pidgin-debuginfo-2.7.9-3.el6.2.i686.rpm pidgin-debuginfo-2.7.9-3.el6.2.x86_64.rpm pidgin-devel-2.7.9-3.el6.2.i686.rpm pidgin-devel-2.7.9-3.el6.2.x86_64.rpm pidgin-docs-2.7.9-3.el6.2.x86_64.rpm pidgin-perl-2.7.9-3.el6.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4601.html https://www.redhat.com/security/data/cve/CVE-2011-4602.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO6POSXlSAg2UNWIIRAii5AJ9xj9D9Zjdrohx2Q34Rhh3OIi70+QCgisZi IUmjulJDMXl1z0TGgEGf42Y= =8vbJ -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 19 17:53:49 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 19 Dec 2011 17:53:49 +0000 Subject: [RHSA-2011:1834-01] Important: libXfont security update Message-ID: <201112191753.pBJHrnFj018855@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libXfont security update Advisory ID: RHSA-2011:1834-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1834.html Issue date: 2011-12-19 CVE Names: CVE-2011-2895 ===================================================================== 1. Summary: Updated libXfont packages that fix one security issue are now available for Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The libXfont packages provide the X.Org libXfont runtime library. X.Org is an open source implementation of the X Window System. A buffer overflow flaw was found in the way the libXfont library, used by the X.Org server, handled malformed font files compressed using UNIX compress. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server. (CVE-2011-2895) Users of libXfont should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running X.Org server instances must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 725760 - CVE-2011-2895 libXfont: LZW decompression heap corruption / infinite loop 727624 - CVE-2011-2895 BSD compress LZW decoder buffer overflow 6. Package List: Red Hat Enterprise Linux EUS (v. 5.6 server): Source: libXfont-1.2.2-1.0.3.el5_6.src.rpm i386: libXfont-1.2.2-1.0.3.el5_6.i386.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.i386.rpm libXfont-devel-1.2.2-1.0.3.el5_6.i386.rpm ia64: libXfont-1.2.2-1.0.3.el5_6.ia64.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.ia64.rpm libXfont-devel-1.2.2-1.0.3.el5_6.ia64.rpm ppc: libXfont-1.2.2-1.0.3.el5_6.ppc.rpm libXfont-1.2.2-1.0.3.el5_6.ppc64.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.ppc.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.ppc64.rpm libXfont-devel-1.2.2-1.0.3.el5_6.ppc.rpm libXfont-devel-1.2.2-1.0.3.el5_6.ppc64.rpm s390x: libXfont-1.2.2-1.0.3.el5_6.s390.rpm libXfont-1.2.2-1.0.3.el5_6.s390x.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.s390.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.s390x.rpm libXfont-devel-1.2.2-1.0.3.el5_6.s390.rpm libXfont-devel-1.2.2-1.0.3.el5_6.s390x.rpm x86_64: libXfont-1.2.2-1.0.3.el5_6.i386.rpm libXfont-1.2.2-1.0.3.el5_6.x86_64.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.i386.rpm libXfont-debuginfo-1.2.2-1.0.3.el5_6.x86_64.rpm libXfont-devel-1.2.2-1.0.3.el5_6.i386.rpm libXfont-devel-1.2.2-1.0.3.el5_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2895.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO73oMXlSAg2UNWIIRAj4LAJ43n6u1Lyx6vwNXXIE73fZqhkxY+wCfczOB rytkNzMIXMGbtriCc9sjNQc= =qjpf -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 20 17:27:40 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 20 Dec 2011 17:27:40 +0000 Subject: [RHSA-2011:1845-01] Moderate: tomcat5 security update Message-ID: <201112201727.pBKHRe8L024208@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tomcat5 security update Advisory ID: RHSA-2011:1845-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1845.html Issue date: 2011-12-20 CVE Names: CVE-2010-3718 CVE-2011-0013 CVE-2011-1184 CVE-2011-2204 ===================================================================== 1. Summary: Updated tomcat5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. It was found that web applications could modify the location of the Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system. (CVE-2010-3718) A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages. (CVE-2011-0013) Multiple flaws were found in the way Tomcat handled HTTP DIGEST authentication. These flaws weakened the Tomcat HTTP DIGEST authentication implementation, subjecting it to some of the weaknesses of HTTP BASIC authentication, for example, allowing remote attackers to perform session replay attacks. (CVE-2011-1184) A flaw was found in the Tomcat MemoryUserDatabase. If a runtime exception occurred when creating a new user with a JMX client, that user's password was logged to Tomcat log files. Note: By default, only administrators have access to such log files. (CVE-2011-2204) Users of Tomcat should upgrade to these updated packages, which contain backported patches to correct these issues. Tomcat must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 675786 - CVE-2011-0013 tomcat: XSS vulnerability in HTML Manager interface 675792 - CVE-2010-3718 tomcat: file permission bypass flaw 717013 - CVE-2011-2204 tomcat: password disclosure vulnerability 741401 - CVE-2011-1184 tomcat: Multiple weaknesses in HTTP DIGEST authentication 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.22.el5_7.src.rpm i386: tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.i386.rpm x86_64: tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.22.el5_7.src.rpm i386: tomcat5-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.i386.rpm x86_64: tomcat5-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tomcat5-5.5.23-0jpp.22.el5_7.src.rpm i386: tomcat5-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.i386.rpm ia64: tomcat5-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.ia64.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.ia64.rpm ppc: tomcat5-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-5.5.23-0jpp.22.el5_7.ppc64.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.ppc64.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.ppc.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.ppc.rpm s390x: tomcat5-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.s390x.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.s390x.rpm x86_64: tomcat5-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-common-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jasper-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-server-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm tomcat5-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-3718.html https://www.redhat.com/security/data/cve/CVE-2011-0013.html https://www.redhat.com/security/data/cve/CVE-2011-1184.html https://www.redhat.com/security/data/cve/CVE-2011-2204.html https://access.redhat.com/security/updates/classification/#moderate http://tomcat.apache.org/security-5.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO8MV6XlSAg2UNWIIRAhZ5AKCYdhFMnQpdn5lpb5AyLrEYqfyeEgCgkB92 XMc1ByDfEAv0VRK5cX0XJmE= =sZTE -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 22 18:31:39 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 22 Dec 2011 18:31:39 +0000 Subject: [RHSA-2011:1849-01] Important: kernel security and bug fix update Message-ID: <201112221831.pBMIVdgA026374@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2011:1849-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1849.html Issue date: 2011-12-22 CVE Names: CVE-2011-4127 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue and various bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security fix: * Using the SG_IO IOCTL to issue SCSI requests to partitions or LVM volumes resulted in the requests being passed to the underlying block device. If a privileged user only had access to a single partition or LVM volume, they could use this flaw to bypass those restrictions and gain read and write access (and be able to issue other SCSI commands) to the entire block device. In KVM (Kernel-based Virtual Machine) environments using raw format virtio disks backed by a partition or LVM volume, a privileged guest user could bypass intended restrictions and issue read and write requests (and other SCSI commands) on the host, and possibly access the data of other guests that reside on the same underlying block device. Partition-based and LVM-based storage pools are not used by default. Refer to Red Hat Bugzilla bug 752375 for further details and a mitigation script for users who cannot apply this update immediately. (CVE-2011-4127, Important) Bug fixes: * Previously, idle load balancer kick requests from other CPUs could be serviced without first receiving an inter-processor interrupt (IPI). This could have led to a deadlock. (BZ#750459) * This update fixes a performance regression that may have caused processes (including KVM guests) to hang for a number of seconds. (BZ#751403) * When md_raid1_unplug_device() was called while holding a spinlock, under certain device failure conditions, it was possible for the lock to be requested again, deeper in the call chain, causing a deadlock. Now, md_raid1_unplug_device() is no longer called while holding a spinlock. (BZ#755545) * In hpet_next_event(), an interrupt could have occurred between the read and write of the HPET (High Performance Event Timer) and the value of HPET_COUNTER was then beyond that being written to the comparator (HPET_Tn_CMP). Consequently, the timers were overdue for up to several minutes. Now, a comparison is performed between the value of the counter and the comparator in the HPET code. If the counter is beyond the comparator, the "-ETIME" error code is returned. (BZ#756426) * Index allocation in the virtio-blk module was based on a monotonically increasing variable "index". Consequently, released indexes were not reused and after a period of time, no new were available. Now, virtio-blk uses the ida API to allocate indexes. (BZ#756427) * A bug related to Context Caching existed in the Intel IOMMU support module. On some newer Intel systems, the Context Cache mode has changed from previous hardware versions, potentially exposing a Context coherency race. The bug was exposed when performing a series of hot plug and unplug operations of a Virtual Function network device which was immediately configured into the network stack, i.e., successfully performed dynamic host configuration protocol (DHCP). When the coherency race occurred, the assigned device would not work properly in the guest virtual machine. With this update, the Context coherency is corrected and the race and potentially resulting device assignment failure no longer occurs. (BZ#757671) * The align_va_addr kernel parameter was ignored if secondary CPUs were initialized. This happened because the parameter settings were overridden during the initialization of secondary CPUs. Also, the align_va_addr parameter documentation contained incorrect parameter arguments. With this update, the underlying code has been modified to prevent the overriding and the documentation has been updated. This update also removes the unused code introduced by the patch for BZ#739456. (BZ#758028) * Dell systems based on a future Intel processor with graphics acceleration required the selection of the install system with basic video driver installation option. This update removes this requirement. (BZ#758513) 4. Solution: Users should upgrade to these updated packages, which contain backported patches to resolve these issues. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 752375 - CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm i386: kernel-2.6.32-220.2.1.el6.i686.rpm kernel-debug-2.6.32-220.2.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debug-devel-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.2.1.el6.i686.rpm kernel-devel-2.6.32-220.2.1.el6.i686.rpm kernel-headers-2.6.32-220.2.1.el6.i686.rpm perf-2.6.32-220.2.1.el6.i686.rpm perf-debuginfo-2.6.32-220.2.1.el6.i686.rpm noarch: kernel-doc-2.6.32-220.2.1.el6.noarch.rpm kernel-firmware-2.6.32-220.2.1.el6.noarch.rpm x86_64: kernel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm kernel-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-headers-2.6.32-220.2.1.el6.x86_64.rpm perf-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.2.1.el6.i686.rpm perf-debuginfo-2.6.32-220.2.1.el6.i686.rpm python-perf-2.6.32-220.2.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm python-perf-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm noarch: kernel-doc-2.6.32-220.2.1.el6.noarch.rpm kernel-firmware-2.6.32-220.2.1.el6.noarch.rpm x86_64: kernel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm kernel-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-headers-2.6.32-220.2.1.el6.x86_64.rpm perf-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm python-perf-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm i386: kernel-2.6.32-220.2.1.el6.i686.rpm kernel-debug-2.6.32-220.2.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debug-devel-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.2.1.el6.i686.rpm kernel-devel-2.6.32-220.2.1.el6.i686.rpm kernel-headers-2.6.32-220.2.1.el6.i686.rpm perf-2.6.32-220.2.1.el6.i686.rpm perf-debuginfo-2.6.32-220.2.1.el6.i686.rpm noarch: kernel-doc-2.6.32-220.2.1.el6.noarch.rpm kernel-firmware-2.6.32-220.2.1.el6.noarch.rpm ppc64: kernel-2.6.32-220.2.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-220.2.1.el6.ppc64.rpm kernel-debug-2.6.32-220.2.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-220.2.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-220.2.1.el6.ppc64.rpm kernel-devel-2.6.32-220.2.1.el6.ppc64.rpm kernel-headers-2.6.32-220.2.1.el6.ppc64.rpm perf-2.6.32-220.2.1.el6.ppc64.rpm perf-debuginfo-2.6.32-220.2.1.el6.ppc64.rpm s390x: kernel-2.6.32-220.2.1.el6.s390x.rpm kernel-debug-2.6.32-220.2.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.s390x.rpm kernel-debug-devel-2.6.32-220.2.1.el6.s390x.rpm kernel-debuginfo-2.6.32-220.2.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-220.2.1.el6.s390x.rpm kernel-devel-2.6.32-220.2.1.el6.s390x.rpm kernel-headers-2.6.32-220.2.1.el6.s390x.rpm kernel-kdump-2.6.32-220.2.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-220.2.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-220.2.1.el6.s390x.rpm perf-2.6.32-220.2.1.el6.s390x.rpm perf-debuginfo-2.6.32-220.2.1.el6.s390x.rpm x86_64: kernel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm kernel-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-headers-2.6.32-220.2.1.el6.x86_64.rpm perf-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.2.1.el6.i686.rpm perf-debuginfo-2.6.32-220.2.1.el6.i686.rpm python-perf-2.6.32-220.2.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-220.2.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-220.2.1.el6.ppc64.rpm perf-debuginfo-2.6.32-220.2.1.el6.ppc64.rpm python-perf-2.6.32-220.2.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-220.2.1.el6.s390x.rpm kernel-debuginfo-2.6.32-220.2.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-220.2.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-220.2.1.el6.s390x.rpm perf-debuginfo-2.6.32-220.2.1.el6.s390x.rpm python-perf-2.6.32-220.2.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm python-perf-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm i386: kernel-2.6.32-220.2.1.el6.i686.rpm kernel-debug-2.6.32-220.2.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debug-devel-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.2.1.el6.i686.rpm kernel-devel-2.6.32-220.2.1.el6.i686.rpm kernel-headers-2.6.32-220.2.1.el6.i686.rpm perf-2.6.32-220.2.1.el6.i686.rpm perf-debuginfo-2.6.32-220.2.1.el6.i686.rpm noarch: kernel-doc-2.6.32-220.2.1.el6.noarch.rpm kernel-firmware-2.6.32-220.2.1.el6.noarch.rpm x86_64: kernel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm kernel-devel-2.6.32-220.2.1.el6.x86_64.rpm kernel-headers-2.6.32-220.2.1.el6.x86_64.rpm perf-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-220.2.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.2.1.el6.i686.rpm perf-debuginfo-2.6.32-220.2.1.el6.i686.rpm python-perf-2.6.32-220.2.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.2.1.el6.x86_64.rpm python-perf-2.6.32-220.2.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4127.html https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=752375 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO83c5XlSAg2UNWIIRAuJtAJ98txuaLKDJJVKyqeQYJGV/y1QzlACeM36i agY8/kiZ0JVeCcy8lv3QU+g= =9Owq -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 27 16:48:58 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 27 Dec 2011 16:48:58 +0000 Subject: [RHSA-2011:1851-01] Critical: krb5 security update Message-ID: <201112271649.pBRGn0EM028032@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: krb5 security update Advisory ID: RHSA-2011:1851-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1851.html Issue date: 2011-12-27 CVE Names: CVE-2011-4862 ===================================================================== 1. Summary: Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third- party, the Key Distribution Center (KDC). A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd). A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root. (CVE-2011-4862) Note that the krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package. For users who have installed the krb5-workstation package, have enabled the telnet daemon, and have it accessible remotely, this update should be applied immediately. All krb5-workstation users should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: The krb5 telnet daemon is an xinetd service. You can determine if krb5 telnetd is enabled with the commands: /sbin/chkconfig --list krb5-telnet /sbin/chkconfig --list ekrb5-telnet The output of these commands will display "on" if krb5 telnet is enabled. krb5 telnet daemon can be immediately disabled with the commands: /sbin/chkconfig krb5-telnet off /sbin/chkconfig ekrb5-telnet off Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 770325 - CVE-2011-4862 krb5-appl: remote buffer overflow in kerberised telnet daemon 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/krb5-1.3.4-65.el4.src.rpm i386: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-devel-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-server-1.3.4-65.el4.i386.rpm krb5-workstation-1.3.4-65.el4.i386.rpm ia64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.ia64.rpm krb5-devel-1.3.4-65.el4.ia64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.ia64.rpm krb5-server-1.3.4-65.el4.ia64.rpm krb5-workstation-1.3.4-65.el4.ia64.rpm ppc: krb5-debuginfo-1.3.4-65.el4.ppc.rpm krb5-debuginfo-1.3.4-65.el4.ppc64.rpm krb5-devel-1.3.4-65.el4.ppc.rpm krb5-libs-1.3.4-65.el4.ppc.rpm krb5-libs-1.3.4-65.el4.ppc64.rpm krb5-server-1.3.4-65.el4.ppc.rpm krb5-workstation-1.3.4-65.el4.ppc.rpm s390: krb5-debuginfo-1.3.4-65.el4.s390.rpm krb5-devel-1.3.4-65.el4.s390.rpm krb5-libs-1.3.4-65.el4.s390.rpm krb5-server-1.3.4-65.el4.s390.rpm krb5-workstation-1.3.4-65.el4.s390.rpm s390x: krb5-debuginfo-1.3.4-65.el4.s390.rpm krb5-debuginfo-1.3.4-65.el4.s390x.rpm krb5-devel-1.3.4-65.el4.s390x.rpm krb5-libs-1.3.4-65.el4.s390.rpm krb5-libs-1.3.4-65.el4.s390x.rpm krb5-server-1.3.4-65.el4.s390x.rpm krb5-workstation-1.3.4-65.el4.s390x.rpm x86_64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.x86_64.rpm krb5-devel-1.3.4-65.el4.x86_64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.x86_64.rpm krb5-server-1.3.4-65.el4.x86_64.rpm krb5-workstation-1.3.4-65.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/krb5-1.3.4-65.el4.src.rpm i386: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-devel-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-server-1.3.4-65.el4.i386.rpm krb5-workstation-1.3.4-65.el4.i386.rpm x86_64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.x86_64.rpm krb5-devel-1.3.4-65.el4.x86_64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.x86_64.rpm krb5-server-1.3.4-65.el4.x86_64.rpm krb5-workstation-1.3.4-65.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/krb5-1.3.4-65.el4.src.rpm i386: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-devel-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-server-1.3.4-65.el4.i386.rpm krb5-workstation-1.3.4-65.el4.i386.rpm ia64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.ia64.rpm krb5-devel-1.3.4-65.el4.ia64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.ia64.rpm krb5-server-1.3.4-65.el4.ia64.rpm krb5-workstation-1.3.4-65.el4.ia64.rpm x86_64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.x86_64.rpm krb5-devel-1.3.4-65.el4.x86_64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.x86_64.rpm krb5-server-1.3.4-65.el4.x86_64.rpm krb5-workstation-1.3.4-65.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/krb5-1.3.4-65.el4.src.rpm i386: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-devel-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-server-1.3.4-65.el4.i386.rpm krb5-workstation-1.3.4-65.el4.i386.rpm ia64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.ia64.rpm krb5-devel-1.3.4-65.el4.ia64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.ia64.rpm krb5-server-1.3.4-65.el4.ia64.rpm krb5-workstation-1.3.4-65.el4.ia64.rpm x86_64: krb5-debuginfo-1.3.4-65.el4.i386.rpm krb5-debuginfo-1.3.4-65.el4.x86_64.rpm krb5-devel-1.3.4-65.el4.x86_64.rpm krb5-libs-1.3.4-65.el4.i386.rpm krb5-libs-1.3.4-65.el4.x86_64.rpm krb5-server-1.3.4-65.el4.x86_64.rpm krb5-workstation-1.3.4-65.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/krb5-1.6.1-63.el5_7.src.rpm i386: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-libs-1.6.1-63.el5_7.i386.rpm krb5-workstation-1.6.1-63.el5_7.i386.rpm x86_64: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-debuginfo-1.6.1-63.el5_7.x86_64.rpm krb5-libs-1.6.1-63.el5_7.i386.rpm krb5-libs-1.6.1-63.el5_7.x86_64.rpm krb5-workstation-1.6.1-63.el5_7.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/krb5-1.6.1-63.el5_7.src.rpm i386: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-devel-1.6.1-63.el5_7.i386.rpm krb5-server-1.6.1-63.el5_7.i386.rpm krb5-server-ldap-1.6.1-63.el5_7.i386.rpm x86_64: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-debuginfo-1.6.1-63.el5_7.x86_64.rpm krb5-devel-1.6.1-63.el5_7.i386.rpm krb5-devel-1.6.1-63.el5_7.x86_64.rpm krb5-server-1.6.1-63.el5_7.x86_64.rpm krb5-server-ldap-1.6.1-63.el5_7.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/krb5-1.6.1-63.el5_7.src.rpm i386: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-devel-1.6.1-63.el5_7.i386.rpm krb5-libs-1.6.1-63.el5_7.i386.rpm krb5-server-1.6.1-63.el5_7.i386.rpm krb5-server-ldap-1.6.1-63.el5_7.i386.rpm krb5-workstation-1.6.1-63.el5_7.i386.rpm ia64: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-debuginfo-1.6.1-63.el5_7.ia64.rpm krb5-devel-1.6.1-63.el5_7.ia64.rpm krb5-libs-1.6.1-63.el5_7.i386.rpm krb5-libs-1.6.1-63.el5_7.ia64.rpm krb5-server-1.6.1-63.el5_7.ia64.rpm krb5-server-ldap-1.6.1-63.el5_7.ia64.rpm krb5-workstation-1.6.1-63.el5_7.ia64.rpm ppc: krb5-debuginfo-1.6.1-63.el5_7.ppc.rpm krb5-debuginfo-1.6.1-63.el5_7.ppc64.rpm krb5-devel-1.6.1-63.el5_7.ppc.rpm krb5-devel-1.6.1-63.el5_7.ppc64.rpm krb5-libs-1.6.1-63.el5_7.ppc.rpm krb5-libs-1.6.1-63.el5_7.ppc64.rpm krb5-server-1.6.1-63.el5_7.ppc.rpm krb5-server-ldap-1.6.1-63.el5_7.ppc.rpm krb5-workstation-1.6.1-63.el5_7.ppc.rpm s390x: krb5-debuginfo-1.6.1-63.el5_7.s390.rpm krb5-debuginfo-1.6.1-63.el5_7.s390x.rpm krb5-devel-1.6.1-63.el5_7.s390.rpm krb5-devel-1.6.1-63.el5_7.s390x.rpm krb5-libs-1.6.1-63.el5_7.s390.rpm krb5-libs-1.6.1-63.el5_7.s390x.rpm krb5-server-1.6.1-63.el5_7.s390x.rpm krb5-server-ldap-1.6.1-63.el5_7.s390x.rpm krb5-workstation-1.6.1-63.el5_7.s390x.rpm x86_64: krb5-debuginfo-1.6.1-63.el5_7.i386.rpm krb5-debuginfo-1.6.1-63.el5_7.x86_64.rpm krb5-devel-1.6.1-63.el5_7.i386.rpm krb5-devel-1.6.1-63.el5_7.x86_64.rpm krb5-libs-1.6.1-63.el5_7.i386.rpm krb5-libs-1.6.1-63.el5_7.x86_64.rpm krb5-server-1.6.1-63.el5_7.x86_64.rpm krb5-server-ldap-1.6.1-63.el5_7.x86_64.rpm krb5-workstation-1.6.1-63.el5_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4862.html https://access.redhat.com/security/updates/classification/#critical http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD4DBQFO+fapXlSAg2UNWIIRAi7CAJYomuLRaT5P04UGiouXnHpshjESAJ98GWBp yWKe174l0rN8iegI5cK0QQ== =QPSE -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 27 16:50:37 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 27 Dec 2011 16:50:37 +0000 Subject: [RHSA-2011:1852-02] Critical: krb5-appl security update Message-ID: <201112271650.pBRGoemZ017157@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: krb5-appl security update Advisory ID: RHSA-2011:1852-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1852.html Issue date: 2011-12-27 CVE Names: CVE-2011-4862 ===================================================================== 1. Summary: Updated krb5-appl packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and rlogin clients and servers. Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd). A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root. (CVE-2011-4862) Note that the krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package. For users who have installed the krb5-appl-servers package, have enabled the krb5 telnet daemon, and have it accessible remotely, this update should be applied immediately. All krb5-appl-server users should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: The krb5 telnet daemon is an xinetd service. You can determine if krb5 telnetd is enabled with the commands: /sbin/chkconfig --list krb5-telnet /sbin/chkconfig --list ekrb5-telnet The output of these commands will display "on" if krb5 telnet is enabled. krb5 telnet daemon can be immediately disabled with the commands: /sbin/chkconfig krb5-telnet off /sbin/chkconfig ekrb5-telnet off Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 770325 - CVE-2011-4862 krb5-appl: remote buffer overflow in kerberised telnet daemon 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-appl-1.0.1-7.el6_2.src.rpm i386: krb5-appl-clients-1.0.1-7.el6_2.i686.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.i686.rpm krb5-appl-servers-1.0.1-7.el6_2.i686.rpm x86_64: krb5-appl-clients-1.0.1-7.el6_2.x86_64.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.x86_64.rpm krb5-appl-servers-1.0.1-7.el6_2.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-appl-1.0.1-7.el6_2.src.rpm x86_64: krb5-appl-clients-1.0.1-7.el6_2.x86_64.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.x86_64.rpm krb5-appl-servers-1.0.1-7.el6_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/krb5-appl-1.0.1-7.el6_2.src.rpm i386: krb5-appl-clients-1.0.1-7.el6_2.i686.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.i686.rpm krb5-appl-servers-1.0.1-7.el6_2.i686.rpm ppc64: krb5-appl-clients-1.0.1-7.el6_2.ppc64.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.ppc64.rpm krb5-appl-servers-1.0.1-7.el6_2.ppc64.rpm s390x: krb5-appl-clients-1.0.1-7.el6_2.s390x.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.s390x.rpm krb5-appl-servers-1.0.1-7.el6_2.s390x.rpm x86_64: krb5-appl-clients-1.0.1-7.el6_2.x86_64.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.x86_64.rpm krb5-appl-servers-1.0.1-7.el6_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/krb5-appl-1.0.1-7.el6_2.src.rpm i386: krb5-appl-clients-1.0.1-7.el6_2.i686.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.i686.rpm krb5-appl-servers-1.0.1-7.el6_2.i686.rpm x86_64: krb5-appl-clients-1.0.1-7.el6_2.x86_64.rpm krb5-appl-debuginfo-1.0.1-7.el6_2.x86_64.rpm krb5-appl-servers-1.0.1-7.el6_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4862.html https://access.redhat.com/security/updates/classification/#critical http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO+fdRXlSAg2UNWIIRAmIKAJ9VeEv7d9rI+wFLi5zpEFimV9t/eQCgieqF nyc0S0a+hdAZBUy/p5SD+bo= =ogna -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 28 19:36:39 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 28 Dec 2011 19:36:39 +0000 Subject: [RHSA-2011:1853-01] Critical: krb5 security update Message-ID: <201112281936.pBSJaegN016343@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: krb5 security update Advisory ID: RHSA-2011:1853-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1853.html Issue date: 2011-12-28 CVE Names: CVE-2011-4862 ===================================================================== 1. Summary: Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 3 Extended Life Cycle Support, 5.3 Long Life and 5.6 Extended Update Support The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (v. 3 ELS) - i386 Red Hat Enterprise Linux ES (v. 3 ELS) - i386 Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64 3. Description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd). A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root. (CVE-2011-4862) Note that the krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package. For users who have installed the krb5-workstation package, have enabled the telnet daemon, and have it accessible remotely, this update should be applied immediately. All krb5-workstation users should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: The krb5 telnet daemon is an xinetd service. You can determine if krb5 telnetd is enabled with the commands: /sbin/chkconfig --list krb5-telnet /sbin/chkconfig --list ekrb5-telnet The output of these commands will display "on" if krb5 telnet is enabled. krb5 telnet daemon can be immediately disabled with the commands: /sbin/chkconfig krb5-telnet off /sbin/chkconfig ekrb5-telnet off Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 770325 - CVE-2011-4862 krb5: remote buffer overflow in kerberized telnet daemon 6. Package List: Red Hat Enterprise Linux AS (v. 3 ELS): Source: krb5-1.2.7-73.src.rpm i386: krb5-debuginfo-1.2.7-73.i386.rpm krb5-devel-1.2.7-73.i386.rpm krb5-libs-1.2.7-73.i386.rpm krb5-server-1.2.7-73.i386.rpm krb5-workstation-1.2.7-73.i386.rpm Red Hat Enterprise Linux ES (v. 3 ELS): Source: krb5-1.2.7-73.src.rpm i386: krb5-debuginfo-1.2.7-73.i386.rpm krb5-devel-1.2.7-73.i386.rpm krb5-libs-1.2.7-73.i386.rpm krb5-server-1.2.7-73.i386.rpm krb5-workstation-1.2.7-73.i386.rpm Red Hat Enterprise Linux Long Life (v. 5.3 server): Source: krb5-1.6.1-31.el5_3.5.src.rpm i386: krb5-debuginfo-1.6.1-31.el5_3.5.i386.rpm krb5-devel-1.6.1-31.el5_3.5.i386.rpm krb5-libs-1.6.1-31.el5_3.5.i386.rpm krb5-server-1.6.1-31.el5_3.5.i386.rpm krb5-workstation-1.6.1-31.el5_3.5.i386.rpm ia64: krb5-debuginfo-1.6.1-31.el5_3.5.i386.rpm krb5-debuginfo-1.6.1-31.el5_3.5.ia64.rpm krb5-devel-1.6.1-31.el5_3.5.ia64.rpm krb5-libs-1.6.1-31.el5_3.5.i386.rpm krb5-libs-1.6.1-31.el5_3.5.ia64.rpm krb5-server-1.6.1-31.el5_3.5.ia64.rpm krb5-workstation-1.6.1-31.el5_3.5.ia64.rpm x86_64: krb5-debuginfo-1.6.1-31.el5_3.5.i386.rpm krb5-debuginfo-1.6.1-31.el5_3.5.x86_64.rpm krb5-devel-1.6.1-31.el5_3.5.i386.rpm krb5-devel-1.6.1-31.el5_3.5.x86_64.rpm krb5-libs-1.6.1-31.el5_3.5.i386.rpm krb5-libs-1.6.1-31.el5_3.5.x86_64.rpm krb5-server-1.6.1-31.el5_3.5.x86_64.rpm krb5-workstation-1.6.1-31.el5_3.5.x86_64.rpm Red Hat Enterprise Linux EUS (v. 5.6 server): Source: krb5-1.6.1-55.el5_6.3.src.rpm i386: krb5-debuginfo-1.6.1-55.el5_6.3.i386.rpm krb5-devel-1.6.1-55.el5_6.3.i386.rpm krb5-libs-1.6.1-55.el5_6.3.i386.rpm krb5-server-1.6.1-55.el5_6.3.i386.rpm krb5-server-ldap-1.6.1-55.el5_6.3.i386.rpm krb5-workstation-1.6.1-55.el5_6.3.i386.rpm ia64: krb5-debuginfo-1.6.1-55.el5_6.3.i386.rpm krb5-debuginfo-1.6.1-55.el5_6.3.ia64.rpm krb5-devel-1.6.1-55.el5_6.3.ia64.rpm krb5-libs-1.6.1-55.el5_6.3.i386.rpm krb5-libs-1.6.1-55.el5_6.3.ia64.rpm krb5-server-1.6.1-55.el5_6.3.ia64.rpm krb5-server-ldap-1.6.1-55.el5_6.3.ia64.rpm krb5-workstation-1.6.1-55.el5_6.3.ia64.rpm ppc: krb5-debuginfo-1.6.1-55.el5_6.3.ppc.rpm krb5-debuginfo-1.6.1-55.el5_6.3.ppc64.rpm krb5-devel-1.6.1-55.el5_6.3.ppc.rpm krb5-devel-1.6.1-55.el5_6.3.ppc64.rpm krb5-libs-1.6.1-55.el5_6.3.ppc.rpm krb5-libs-1.6.1-55.el5_6.3.ppc64.rpm krb5-server-1.6.1-55.el5_6.3.ppc.rpm krb5-server-ldap-1.6.1-55.el5_6.3.ppc.rpm krb5-workstation-1.6.1-55.el5_6.3.ppc.rpm s390x: krb5-debuginfo-1.6.1-55.el5_6.3.s390.rpm krb5-debuginfo-1.6.1-55.el5_6.3.s390x.rpm krb5-devel-1.6.1-55.el5_6.3.s390.rpm krb5-devel-1.6.1-55.el5_6.3.s390x.rpm krb5-libs-1.6.1-55.el5_6.3.s390.rpm krb5-libs-1.6.1-55.el5_6.3.s390x.rpm krb5-server-1.6.1-55.el5_6.3.s390x.rpm krb5-server-ldap-1.6.1-55.el5_6.3.s390x.rpm krb5-workstation-1.6.1-55.el5_6.3.s390x.rpm x86_64: krb5-debuginfo-1.6.1-55.el5_6.3.i386.rpm krb5-debuginfo-1.6.1-55.el5_6.3.x86_64.rpm krb5-devel-1.6.1-55.el5_6.3.i386.rpm krb5-devel-1.6.1-55.el5_6.3.x86_64.rpm krb5-libs-1.6.1-55.el5_6.3.i386.rpm krb5-libs-1.6.1-55.el5_6.3.x86_64.rpm krb5-server-1.6.1-55.el5_6.3.x86_64.rpm krb5-server-ldap-1.6.1-55.el5_6.3.x86_64.rpm krb5-workstation-1.6.1-55.el5_6.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4862.html https://access.redhat.com/security/updates/classification/#critical http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO+28cXlSAg2UNWIIRAp2qAKCs1Vdu43t+9MczKyyRZp0v/OxnbACgoC5m ayoBOPeIIvWXfbjm6PcJz8w= =MfeX -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 28 19:39:08 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 28 Dec 2011 19:39:08 +0000 Subject: [RHSA-2011:1854-01] Critical: krb5-appl security update Message-ID: <201112281939.pBSJd9lJ006026@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: krb5-appl security update Advisory ID: RHSA-2011:1854-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1854.html Issue date: 2011-12-28 CVE Names: CVE-2011-4862 ===================================================================== 1. Summary: Updated krb5-appl packages that fix one security issue are now available for Red Hat Enterprise Linux 6.0 and 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server EUS (v. 6.0) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.1) - i386, ppc64, s390x, x86_64 3. Description: The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and rlogin clients and servers. Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd). A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root. (CVE-2011-4862) Note that the krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package. For users who have installed the krb5-appl-servers package, have enabled the krb5 telnet daemon, and have it accessible remotely, this update should be applied immediately. All krb5-appl-server users should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: The krb5 telnet daemon is an xinetd service. You can determine if krb5 telnetd is enabled with the commands: /sbin/chkconfig --list krb5-telnet /sbin/chkconfig --list ekrb5-telnet The output of these command will display "on" if krb5 telnet is enabled. krb5 telnet daemon can be immediately disabled with the commands: /sbin/chkconfig krb5-telnet off /sbin/chkconfig ekrb5-telnet off Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 770325 - CVE-2011-4862 krb5: remote buffer overflow in kerberized telnet daemon 6. Package List: Red Hat Enterprise Linux Server EUS (v. 6.0): Source: krb5-appl-1.0.1-1.el6_0.1.src.rpm i386: krb5-appl-clients-1.0.1-1.el6_0.1.i686.rpm krb5-appl-debuginfo-1.0.1-1.el6_0.1.i686.rpm krb5-appl-servers-1.0.1-1.el6_0.1.i686.rpm ppc64: krb5-appl-clients-1.0.1-1.el6_0.1.ppc64.rpm krb5-appl-debuginfo-1.0.1-1.el6_0.1.ppc64.rpm krb5-appl-servers-1.0.1-1.el6_0.1.ppc64.rpm s390x: krb5-appl-clients-1.0.1-1.el6_0.1.s390x.rpm krb5-appl-debuginfo-1.0.1-1.el6_0.1.s390x.rpm krb5-appl-servers-1.0.1-1.el6_0.1.s390x.rpm x86_64: krb5-appl-clients-1.0.1-1.el6_0.1.x86_64.rpm krb5-appl-debuginfo-1.0.1-1.el6_0.1.x86_64.rpm krb5-appl-servers-1.0.1-1.el6_0.1.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.1): Source: krb5-appl-1.0.1-2.el6_1.3.src.rpm i386: krb5-appl-clients-1.0.1-2.el6_1.3.i686.rpm krb5-appl-debuginfo-1.0.1-2.el6_1.3.i686.rpm krb5-appl-servers-1.0.1-2.el6_1.3.i686.rpm ppc64: krb5-appl-clients-1.0.1-2.el6_1.3.ppc64.rpm krb5-appl-debuginfo-1.0.1-2.el6_1.3.ppc64.rpm krb5-appl-servers-1.0.1-2.el6_1.3.ppc64.rpm s390x: krb5-appl-clients-1.0.1-2.el6_1.3.s390x.rpm krb5-appl-debuginfo-1.0.1-2.el6_1.3.s390x.rpm krb5-appl-servers-1.0.1-2.el6_1.3.s390x.rpm x86_64: krb5-appl-clients-1.0.1-2.el6_1.3.x86_64.rpm krb5-appl-debuginfo-1.0.1-2.el6_1.3.x86_64.rpm krb5-appl-servers-1.0.1-2.el6_1.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-4862.html https://access.redhat.com/security/updates/classification/#critical http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFO+2/5XlSAg2UNWIIRAhAMAJ0U++stKldxEWj5FauuFgWeYIWAZgCfYAnq 8pY0RBdBzsAgUv5W2qm3Ji0= =nLBa -----END PGP SIGNATURE-----