From bugzilla at redhat.com Wed Jun 1 20:04:40 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Jun 2011 20:04:40 +0000 Subject: [RHSA-2011:0836-01] Important: kernel security and bug fix update Message-ID: <201106012004.p51K4ed2028596@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2011:0836-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0836.html Issue date: 2011-06-01 CVE Names: CVE-2010-3858 CVE-2011-1598 CVE-2011-1748 CVE-2011-1770 CVE-2011-1771 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and various bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * An integer underflow flaw, leading to a buffer overflow, was found in the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation. This could allow a remote attacker to cause a denial of service. (CVE-2011-1770, Important) * Missing sanity checks were found in setup_arg_pages() in the Linux kernel. When making the size of the argument and environment area on the stack very large, it could trigger a BUG_ON(), resulting in a local denial of service. (CVE-2010-3858, Moderate) * A missing validation check was found in the bcm_release() and raw_release() functions in the Linux kernel's Controller Area Network (CAN) implementation. This could allow a local, unprivileged user to cause a denial of service. (CVE-2011-1598, CVE-2011-1748, Moderate) * The fix for Red Hat Bugzilla bug 656461, as provided in RHSA-2011:0542, introduced a regression in the cifs_close() function in the Linux kernel's Common Internet File System (CIFS) implementation. A local, unprivileged user with write access to a CIFS file system could use this flaw to cause a denial of service. (CVE-2011-1771, Moderate) Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1770; Brad Spengler for reporting CVE-2010-3858; and Oliver Hartkopp for reporting CVE-2011-1748. This update also fixes various bugs. Documentation for these bug fixes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to resolve these issues, and fix the bugs noted in the Technical Notes. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 645222 - CVE-2010-3858 kernel: setup_arg_pages: diagnose excessive argument size 698057 - CVE-2011-1598 CVE-2011-1748 kernel: missing check in can/bcm and can/raw socket releases 703011 - CVE-2011-1770 kernel: dccp: handle invalid feature options length 703016 - CVE-2011-1771 kernel: cifs oops when creating file with O_DIRECT set 704014 - [brocade 6.1 bug] bfa fc staying tech preview [rhel-6.1.z] 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-131.2.1.el6.src.rpm i386: kernel-2.6.32-131.2.1.el6.i686.rpm kernel-debug-2.6.32-131.2.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.i686.rpm kernel-debug-devel-2.6.32-131.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-131.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-131.2.1.el6.i686.rpm kernel-devel-2.6.32-131.2.1.el6.i686.rpm kernel-headers-2.6.32-131.2.1.el6.i686.rpm perf-2.6.32-131.2.1.el6.i686.rpm perf-debuginfo-2.6.32-131.2.1.el6.i686.rpm noarch: kernel-doc-2.6.32-131.2.1.el6.noarch.rpm kernel-firmware-2.6.32-131.2.1.el6.noarch.rpm x86_64: kernel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.2.1.el6.x86_64.rpm kernel-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-headers-2.6.32-131.2.1.el6.x86_64.rpm perf-2.6.32-131.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-131.2.1.el6.src.rpm noarch: kernel-doc-2.6.32-131.2.1.el6.noarch.rpm kernel-firmware-2.6.32-131.2.1.el6.noarch.rpm x86_64: kernel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.2.1.el6.x86_64.rpm kernel-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-headers-2.6.32-131.2.1.el6.x86_64.rpm perf-2.6.32-131.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-131.2.1.el6.src.rpm i386: kernel-2.6.32-131.2.1.el6.i686.rpm kernel-debug-2.6.32-131.2.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.i686.rpm kernel-debug-devel-2.6.32-131.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-131.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-131.2.1.el6.i686.rpm kernel-devel-2.6.32-131.2.1.el6.i686.rpm kernel-headers-2.6.32-131.2.1.el6.i686.rpm perf-2.6.32-131.2.1.el6.i686.rpm perf-debuginfo-2.6.32-131.2.1.el6.i686.rpm noarch: kernel-doc-2.6.32-131.2.1.el6.noarch.rpm kernel-firmware-2.6.32-131.2.1.el6.noarch.rpm ppc64: kernel-2.6.32-131.2.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-131.2.1.el6.ppc64.rpm kernel-debug-2.6.32-131.2.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-131.2.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-131.2.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-131.2.1.el6.ppc64.rpm kernel-devel-2.6.32-131.2.1.el6.ppc64.rpm kernel-headers-2.6.32-131.2.1.el6.ppc64.rpm perf-2.6.32-131.2.1.el6.ppc64.rpm perf-debuginfo-2.6.32-131.2.1.el6.ppc64.rpm s390x: kernel-2.6.32-131.2.1.el6.s390x.rpm kernel-debug-2.6.32-131.2.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.s390x.rpm kernel-debug-devel-2.6.32-131.2.1.el6.s390x.rpm kernel-debuginfo-2.6.32-131.2.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-131.2.1.el6.s390x.rpm kernel-devel-2.6.32-131.2.1.el6.s390x.rpm kernel-headers-2.6.32-131.2.1.el6.s390x.rpm kernel-kdump-2.6.32-131.2.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-131.2.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-131.2.1.el6.s390x.rpm perf-2.6.32-131.2.1.el6.s390x.rpm perf-debuginfo-2.6.32-131.2.1.el6.s390x.rpm x86_64: kernel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.2.1.el6.x86_64.rpm kernel-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-headers-2.6.32-131.2.1.el6.x86_64.rpm perf-2.6.32-131.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-131.2.1.el6.src.rpm i386: kernel-2.6.32-131.2.1.el6.i686.rpm kernel-debug-2.6.32-131.2.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.i686.rpm kernel-debug-devel-2.6.32-131.2.1.el6.i686.rpm kernel-debuginfo-2.6.32-131.2.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-131.2.1.el6.i686.rpm kernel-devel-2.6.32-131.2.1.el6.i686.rpm kernel-headers-2.6.32-131.2.1.el6.i686.rpm perf-2.6.32-131.2.1.el6.i686.rpm perf-debuginfo-2.6.32-131.2.1.el6.i686.rpm noarch: kernel-doc-2.6.32-131.2.1.el6.noarch.rpm kernel-firmware-2.6.32-131.2.1.el6.noarch.rpm x86_64: kernel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.2.1.el6.x86_64.rpm kernel-devel-2.6.32-131.2.1.el6.x86_64.rpm kernel-headers-2.6.32-131.2.1.el6.x86_64.rpm perf-2.6.32-131.2.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.2.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-3858.html https://www.redhat.com/security/data/cve/CVE-2011-1598.html https://www.redhat.com/security/data/cve/CVE-2011-1748.html https://www.redhat.com/security/data/cve/CVE-2011-1770.html https://www.redhat.com/security/data/cve/CVE-2011-1771.html https://access.redhat.com/security/updates/classification/#important https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-0836 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN5ptGXlSAg2UNWIIRAu1kAJ40qbd+V54qhfavnz2JKn5cshDhagCcCfd5 r+j0vTdw17qDZ12PAK061sY= =RjFO -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 6 14:57:32 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 6 Jun 2011 14:57:32 +0000 Subject: [RHSA-2011:0850-01] Important: flash-plugin security update Message-ID: <201106061457.p56EvWdB017719@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: flash-plugin security update Advisory ID: RHSA-2011:0850-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0850.html Issue date: 2011-06-06 CVE Names: CVE-2011-2107 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB11-13, listed in the References section. (CVE-2011-2107) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.181.22 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 710981 - CVE-2011-2107 flash-plugin: Cross-site scripting vulnerability (APSB11-13) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-10.3.181.22-1.el5.i386.rpm x86_64: flash-plugin-10.3.181.22-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-10.3.181.22-1.el5.i386.rpm x86_64: flash-plugin-10.3.181.22-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-10.3.181.22-1.el6.i686.rpm x86_64: flash-plugin-10.3.181.22-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-10.3.181.22-1.el6.i686.rpm x86_64: flash-plugin-10.3.181.22-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-10.3.181.22-1.el6.i686.rpm x86_64: flash-plugin-10.3.181.22-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2107.html https://access.redhat.com/security/updates/classification/#important http://www.adobe.com/support/security/bulletins/apsb11-13.html 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN7OqAXlSAg2UNWIIRApgjAKCldmXlUbDzD/uUwi8XnweoaBZ00gCeIzcZ 1XCuXnfYCW/M6oYmVu+sw+U= =AUfZ -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:34:06 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:34:06 +0000 Subject: [RHSA-2011:0856-01] Critical: java-1.6.0-openjdk security update Message-ID: <201106081534.p58FY6dR017277@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.6.0-openjdk security update Advisory ID: RHSA-2011:0856-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0856.html Issue date: 2011-06-08 CVE Names: CVE-2011-0862 CVE-2011-0864 CVE-2011-0865 CVE-2011-0867 CVE-2011-0868 CVE-2011-0869 CVE-2011-0871 ===================================================================== 1. Summary: Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Integer overflow flaws were found in the way Java2D parsed JPEG images and user-supplied fonts. An attacker could use these flaws to execute arbitrary code with the privileges of the user running an untrusted applet or application. (CVE-2011-0862) It was found that the MediaTracker implementation created Component instances with unnecessary access privileges. A remote attacker could use this flaw to elevate their privileges by utilizing an untrusted applet or application that uses Swing. (CVE-2011-0871) A flaw was found in the HotSpot component in OpenJDK. Certain bytecode instructions confused the memory management within the Java Virtual Machine (JVM), resulting in an applet or application crashing. (CVE-2011-0864) An information leak flaw was found in the NetworkInterface class. An untrusted applet or application could use this flaw to access information about available network interfaces that should only be available to privileged code. (CVE-2011-0867) An incorrect float-to-long conversion, leading to an overflow, was found in the way certain objects (such as images and text) were transformed in Java2D. A remote attacker could use this flaw to crash an untrusted applet or application that uses Java2D. (CVE-2011-0868) It was found that untrusted applets and applications could misuse a SOAP connection to incorrectly set global HTTP proxy settings instead of setting them in a local scope. This flaw could be used to intercept HTTP requests. (CVE-2011-0869) A flaw was found in the way signed objects were deserialized. If trusted and untrusted code were running in the same Java Virtual Machine (JVM), and both were deserializing the same signed object, the untrusted code could modify said object by using this flaw to bypass the validation checks on signed objects. (CVE-2011-0865) All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 706106 - CVE-2011-0865 OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) 706139 - CVE-2011-0862 OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) 706153 - CVE-2011-0867 OpenJDK: NetworkInterface information leak (Networking, 7013969) 706234 - CVE-2011-0869 OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) 706241 - CVE-2011-0868 OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) 706245 - CVE-2011-0864 OpenJDK: JVM memory corruption via certain bytecode (HotSpot, 7020373) 706248 - CVE-2011-0871 OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.39.1.9.8.el6_1.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.39.1.9.8.el6_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0862.html https://www.redhat.com/security/data/cve/CVE-2011-0864.html https://www.redhat.com/security/data/cve/CVE-2011-0865.html https://www.redhat.com/security/data/cve/CVE-2011-0867.html https://www.redhat.com/security/data/cve/CVE-2011-0868.html https://www.redhat.com/security/data/cve/CVE-2011-0869.html https://www.redhat.com/security/data/cve/CVE-2011-0871.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN75YqXlSAg2UNWIIRAlBKAKClCyX90oW4eltdVV/vajlMlYbQgwCdGN2d yrHvlWpvxN7otj1+DuhxohQ= =bLPt -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:36:31 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:36:31 +0000 Subject: [RHSA-2011:0857-01] Important: java-1.6.0-openjdk security update Message-ID: <201106081536.p58FaV7I027309@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.6.0-openjdk security update Advisory ID: RHSA-2011:0857-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0857.html Issue date: 2011-06-08 CVE Names: CVE-2011-0862 CVE-2011-0864 CVE-2011-0865 CVE-2011-0867 CVE-2011-0868 CVE-2011-0869 CVE-2011-0871 ===================================================================== 1. Summary: Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Integer overflow flaws were found in the way Java2D parsed JPEG images and user-supplied fonts. An attacker could use these flaws to execute arbitrary code with the privileges of the user running an untrusted applet or application. (CVE-2011-0862) It was found that the MediaTracker implementation created Component instances with unnecessary access privileges. A remote attacker could use this flaw to elevate their privileges by utilizing an untrusted applet or application that uses Swing. (CVE-2011-0871) A flaw was found in the HotSpot component in OpenJDK. Certain bytecode instructions confused the memory management within the Java Virtual Machine (JVM), resulting in an applet or application crashing. (CVE-2011-0864) An information leak flaw was found in the NetworkInterface class. An untrusted applet or application could use this flaw to access information about available network interfaces that should only be available to privileged code. (CVE-2011-0867) An incorrect float-to-long conversion, leading to an overflow, was found in the way certain objects (such as images and text) were transformed in Java2D. A remote attacker could use this flaw to crash an untrusted applet or application that uses Java2D. (CVE-2011-0868) It was found that untrusted applets and applications could misuse a SOAP connection to incorrectly set global HTTP proxy settings instead of setting them in a local scope. This flaw could be used to intercept HTTP requests. (CVE-2011-0869) A flaw was found in the way signed objects were deserialized. If trusted and untrusted code were running in the same Java Virtual Machine (JVM), and both were deserializing the same signed object, the untrusted code could modify said object by using this flaw to bypass the validation checks on signed objects. (CVE-2011-0865) Note: All of the above flaws can only be remotely triggered in OpenJDK by calling the "appletviewer" application. All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which provide OpenJDK 6 b20 / IcedTea 1.9.8 and resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 706106 - CVE-2011-0865 OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) 706139 - CVE-2011-0862 OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) 706153 - CVE-2011-0867 OpenJDK: NetworkInterface information leak (Networking, 7013969) 706234 - CVE-2011-0869 OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) 706241 - CVE-2011-0868 OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) 706245 - CVE-2011-0864 OpenJDK: JVM memory corruption via certain bytecode (HotSpot, 7020373) 706248 - CVE-2011-0871 OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.el5_6.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.el5_6.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.22.1.9.8.el5_6.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.22.1.9.8.el5_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0862.html https://www.redhat.com/security/data/cve/CVE-2011-0864.html https://www.redhat.com/security/data/cve/CVE-2011-0865.html https://www.redhat.com/security/data/cve/CVE-2011-0867.html https://www.redhat.com/security/data/cve/CVE-2011-0868.html https://www.redhat.com/security/data/cve/CVE-2011-0869.html https://www.redhat.com/security/data/cve/CVE-2011-0871.html https://access.redhat.com/security/updates/classification/#important http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD4DBQFN75bYXlSAg2UNWIIRAme0AJ4+XFg2MszHJ5Yln/WmTpYZUJ1bhACYse40 VXJYHPfgwdZZvyYtU0lj4g== =g6w8 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:38:30 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:38:30 +0000 Subject: [RHSA-2011:0858-01] Moderate: xerces-j2 security update Message-ID: <201106081538.p58FcUSj028238@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: xerces-j2 security update Advisory ID: RHSA-2011:0858-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0858.html Issue date: 2011-06-08 CVE Names: CVE-2009-2625 ===================================================================== 1. Summary: Updated xerces-j2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The xerces-j2 packages provide the Apache Xerces2 Java Parser, a high-performance XML parser. A Document Type Definition (DTD) defines the legal syntax (and also which elements can be used) for certain types of files, such as XML files. A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang due to excessive CPU use). (CVE-2009-2625) Users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the Apache Xerces2 Java Parser must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701) 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xerces-j2-2.7.1-12.6.el6_0.src.rpm i386: xerces-j2-2.7.1-12.6.el6_0.i686.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.i686.rpm xerces-j2-demo-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.i686.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.i686.rpm x86_64: xerces-j2-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-demo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xerces-j2-2.7.1-12.6.el6_0.src.rpm x86_64: xerces-j2-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-demo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xerces-j2-2.7.1-12.6.el6_0.src.rpm i386: xerces-j2-2.7.1-12.6.el6_0.i686.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.i686.rpm ppc64: xerces-j2-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.ppc64.rpm s390x: xerces-j2-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.s390x.rpm x86_64: xerces-j2-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xerces-j2-2.7.1-12.6.el6_0.src.rpm i386: xerces-j2-debuginfo-2.7.1-12.6.el6_0.i686.rpm xerces-j2-demo-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.i686.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.i686.rpm ppc64: xerces-j2-debuginfo-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-demo-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.ppc64.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.ppc64.rpm s390x: xerces-j2-debuginfo-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-demo-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.s390x.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.s390x.rpm x86_64: xerces-j2-debuginfo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-demo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xerces-j2-2.7.1-12.6.el6_0.src.rpm i386: xerces-j2-2.7.1-12.6.el6_0.i686.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.i686.rpm x86_64: xerces-j2-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-debuginfo-2.7.1-12.6.el6_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xerces-j2-2.7.1-12.6.el6_0.src.rpm i386: xerces-j2-debuginfo-2.7.1-12.6.el6_0.i686.rpm xerces-j2-demo-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.i686.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.i686.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.i686.rpm x86_64: xerces-j2-debuginfo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-demo-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-apis-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-impl-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-other-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-javadoc-xni-2.7.1-12.6.el6_0.x86_64.rpm xerces-j2-scripts-2.7.1-12.6.el6_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-2625.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN75dPXlSAg2UNWIIRAveJAKCn8u2JFb7Ff5zwNmEy5DsV7xnPfQCdGbIK 0NwzT22kFzpynwOOoRiqxJA= =MHWm -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:40:29 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:40:29 +0000 Subject: [RHSA-2011:0859-01] Moderate: cyrus-imapd security update Message-ID: <201106081540.p58FeTpD029346@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: cyrus-imapd security update Advisory ID: RHSA-2011:0859-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0859.html Issue date: 2011-06-08 CVE Names: CVE-2011-1926 ===================================================================== 1. Summary: Updated cyrus-imapd packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support. It was discovered that cyrus-imapd did not flush the received commands buffer after switching to TLS encryption for IMAP, LMTP, NNTP, and POP3 sessions. A man-in-the-middle attacker could use this flaw to inject protocol commands into a victim's TLS session initialization messages. This could lead to those commands being processed by cyrus-imapd, potentially allowing the attacker to steal the victim's mail or authentication credentials. (CVE-2011-1926) Users of cyrus-imapd are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, cyrus-imapd will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 705288 - CVE-2011-1926 cyrus-imapd: STARTTLS plaintext command injection 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cyrus-imapd-2.2.12-15.el4.src.rpm i386: cyrus-imapd-2.2.12-15.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.i386.rpm cyrus-imapd-devel-2.2.12-15.el4.i386.rpm cyrus-imapd-murder-2.2.12-15.el4.i386.rpm cyrus-imapd-nntp-2.2.12-15.el4.i386.rpm cyrus-imapd-utils-2.2.12-15.el4.i386.rpm perl-Cyrus-2.2.12-15.el4.i386.rpm ia64: cyrus-imapd-2.2.12-15.el4.ia64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.ia64.rpm cyrus-imapd-devel-2.2.12-15.el4.ia64.rpm cyrus-imapd-murder-2.2.12-15.el4.ia64.rpm cyrus-imapd-nntp-2.2.12-15.el4.ia64.rpm cyrus-imapd-utils-2.2.12-15.el4.ia64.rpm perl-Cyrus-2.2.12-15.el4.ia64.rpm ppc: cyrus-imapd-2.2.12-15.el4.ppc.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.ppc.rpm cyrus-imapd-devel-2.2.12-15.el4.ppc.rpm cyrus-imapd-murder-2.2.12-15.el4.ppc.rpm cyrus-imapd-nntp-2.2.12-15.el4.ppc.rpm cyrus-imapd-utils-2.2.12-15.el4.ppc.rpm perl-Cyrus-2.2.12-15.el4.ppc.rpm s390: cyrus-imapd-2.2.12-15.el4.s390.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.s390.rpm cyrus-imapd-devel-2.2.12-15.el4.s390.rpm cyrus-imapd-murder-2.2.12-15.el4.s390.rpm cyrus-imapd-nntp-2.2.12-15.el4.s390.rpm cyrus-imapd-utils-2.2.12-15.el4.s390.rpm perl-Cyrus-2.2.12-15.el4.s390.rpm s390x: cyrus-imapd-2.2.12-15.el4.s390x.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.s390x.rpm cyrus-imapd-devel-2.2.12-15.el4.s390x.rpm cyrus-imapd-murder-2.2.12-15.el4.s390x.rpm cyrus-imapd-nntp-2.2.12-15.el4.s390x.rpm cyrus-imapd-utils-2.2.12-15.el4.s390x.rpm perl-Cyrus-2.2.12-15.el4.s390x.rpm x86_64: cyrus-imapd-2.2.12-15.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-15.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-15.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-15.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-15.el4.x86_64.rpm perl-Cyrus-2.2.12-15.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cyrus-imapd-2.2.12-15.el4.src.rpm i386: cyrus-imapd-2.2.12-15.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.i386.rpm cyrus-imapd-devel-2.2.12-15.el4.i386.rpm cyrus-imapd-murder-2.2.12-15.el4.i386.rpm cyrus-imapd-nntp-2.2.12-15.el4.i386.rpm cyrus-imapd-utils-2.2.12-15.el4.i386.rpm perl-Cyrus-2.2.12-15.el4.i386.rpm x86_64: cyrus-imapd-2.2.12-15.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-15.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-15.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-15.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-15.el4.x86_64.rpm perl-Cyrus-2.2.12-15.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cyrus-imapd-2.2.12-15.el4.src.rpm i386: cyrus-imapd-2.2.12-15.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.i386.rpm cyrus-imapd-devel-2.2.12-15.el4.i386.rpm cyrus-imapd-murder-2.2.12-15.el4.i386.rpm cyrus-imapd-nntp-2.2.12-15.el4.i386.rpm cyrus-imapd-utils-2.2.12-15.el4.i386.rpm perl-Cyrus-2.2.12-15.el4.i386.rpm ia64: cyrus-imapd-2.2.12-15.el4.ia64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.ia64.rpm cyrus-imapd-devel-2.2.12-15.el4.ia64.rpm cyrus-imapd-murder-2.2.12-15.el4.ia64.rpm cyrus-imapd-nntp-2.2.12-15.el4.ia64.rpm cyrus-imapd-utils-2.2.12-15.el4.ia64.rpm perl-Cyrus-2.2.12-15.el4.ia64.rpm x86_64: cyrus-imapd-2.2.12-15.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-15.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-15.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-15.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-15.el4.x86_64.rpm perl-Cyrus-2.2.12-15.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cyrus-imapd-2.2.12-15.el4.src.rpm i386: cyrus-imapd-2.2.12-15.el4.i386.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.i386.rpm cyrus-imapd-devel-2.2.12-15.el4.i386.rpm cyrus-imapd-murder-2.2.12-15.el4.i386.rpm cyrus-imapd-nntp-2.2.12-15.el4.i386.rpm cyrus-imapd-utils-2.2.12-15.el4.i386.rpm perl-Cyrus-2.2.12-15.el4.i386.rpm ia64: cyrus-imapd-2.2.12-15.el4.ia64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.ia64.rpm cyrus-imapd-devel-2.2.12-15.el4.ia64.rpm cyrus-imapd-murder-2.2.12-15.el4.ia64.rpm cyrus-imapd-nntp-2.2.12-15.el4.ia64.rpm cyrus-imapd-utils-2.2.12-15.el4.ia64.rpm perl-Cyrus-2.2.12-15.el4.ia64.rpm x86_64: cyrus-imapd-2.2.12-15.el4.x86_64.rpm cyrus-imapd-debuginfo-2.2.12-15.el4.x86_64.rpm cyrus-imapd-devel-2.2.12-15.el4.x86_64.rpm cyrus-imapd-murder-2.2.12-15.el4.x86_64.rpm cyrus-imapd-nntp-2.2.12-15.el4.x86_64.rpm cyrus-imapd-utils-2.2.12-15.el4.x86_64.rpm perl-Cyrus-2.2.12-15.el4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cyrus-imapd-2.3.7-7.el5_6.4.src.rpm i386: cyrus-imapd-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.i386.rpm x86_64: cyrus-imapd-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cyrus-imapd-2.3.7-7.el5_6.4.src.rpm i386: cyrus-imapd-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.i386.rpm ia64: cyrus-imapd-2.3.7-7.el5_6.4.ia64.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.ia64.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.ia64.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.ia64.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.ia64.rpm ppc: cyrus-imapd-2.3.7-7.el5_6.4.ppc.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.ppc.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.ppc64.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.ppc.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.ppc64.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.ppc.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.ppc.rpm s390x: cyrus-imapd-2.3.7-7.el5_6.4.s390x.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.s390.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.s390x.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.s390.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.s390x.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.s390x.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.s390x.rpm x86_64: cyrus-imapd-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-debuginfo-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.i386.rpm cyrus-imapd-devel-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-perl-2.3.7-7.el5_6.4.x86_64.rpm cyrus-imapd-utils-2.3.7-7.el5_6.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server-6.1.z/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.2.src.rpm i386: cyrus-imapd-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-utils-2.3.16-6.el6_1.2.i686.rpm ppc64: cyrus-imapd-2.3.16-6.el6_1.2.ppc64.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.ppc64.rpm cyrus-imapd-utils-2.3.16-6.el6_1.2.ppc64.rpm s390x: cyrus-imapd-2.3.16-6.el6_1.2.s390x.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.s390x.rpm cyrus-imapd-utils-2.3.16-6.el6_1.2.s390x.rpm x86_64: cyrus-imapd-2.3.16-6.el6_1.2.x86_64.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.x86_64.rpm cyrus-imapd-utils-2.3.16-6.el6_1.2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server-6.1.z/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.2.src.rpm i386: cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.i686.rpm ppc64: cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.ppc.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.ppc64.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.ppc.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.ppc64.rpm s390x: cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.s390.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.s390x.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.s390.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.s390x.rpm x86_64: cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.x86_64.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation-6.1.z/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.2.src.rpm i386: cyrus-imapd-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-utils-2.3.16-6.el6_1.2.i686.rpm x86_64: cyrus-imapd-2.3.16-6.el6_1.2.x86_64.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.x86_64.rpm cyrus-imapd-utils-2.3.16-6.el6_1.2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation-6.1.z/en/os/SRPMS/cyrus-imapd-2.3.16-6.el6_1.2.src.rpm i386: cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.i686.rpm x86_64: cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-debuginfo-2.3.16-6.el6_1.2.x86_64.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.i686.rpm cyrus-imapd-devel-2.3.16-6.el6_1.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1926.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN75fMXlSAg2UNWIIRAk+FAJ48pq7+C/HeNSMSolvopR+g+0k+FwCglKdl IZK0F3IXRdWOzsZ3ERJ2n7M= =qFBe -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:43:01 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:43:01 +0000 Subject: [RHSA-2011:0860-01] Critical: java-1.6.0-sun security update Message-ID: <201106081543.p58Fh1Bl020911@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.6.0-sun security update Advisory ID: RHSA-2011:0860-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0860.html Issue date: 2011-06-08 CVE Names: CVE-2011-0802 CVE-2011-0814 CVE-2011-0862 CVE-2011-0863 CVE-2011-0864 CVE-2011-0865 CVE-2011-0867 CVE-2011-0868 CVE-2011-0869 CVE-2011-0871 CVE-2011-0873 ===================================================================== 1. Summary: Updated java-1.6.0-sun packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. Further information about these flaws can be found on the "Oracle Java SE Critical Patch Update Advisory" page, listed in the References section. (CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873) All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide JDK and JRE 6 Update 26 and resolve these issues. All running instances of Sun Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 706106 - CVE-2011-0865 OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) 706139 - CVE-2011-0862 OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) 706153 - CVE-2011-0867 OpenJDK: NetworkInterface information leak (Networking, 7013969) 706234 - CVE-2011-0869 OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) 706241 - CVE-2011-0868 OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) 706245 - CVE-2011-0864 OpenJDK: JVM memory corruption via certain bytecode (HotSpot, 7020373) 706248 - CVE-2011-0871 OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) 711675 - CVE-2011-0873 Oracle JDK: unspecified vulnerability fixed in 6u26 (2D) 711676 - CVE-2011-0863 Oracle JDK: unspecified vulnerability fixed in 6u26 (Deployment) 711677 - CVE-2011-0802 CVE-2011-0814 Oracle JDK: unspecified vulnerabilities fixed in 6u26 (Sound) 6. Package List: Red Hat Enterprise Linux AS version 4 Extras: i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.i586.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.x86_64.rpm Red Hat Desktop version 4 Extras: i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.i586.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4 Extras: i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.i586.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4 Extras: i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.i586.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el4.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el5.i586.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el5.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el5.i586.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el5.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el5.i586.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el5.x86_64.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.i686.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.i686.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.i686.rpm x86_64: java-1.6.0-sun-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.26-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.26-1jpp.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0802.html https://www.redhat.com/security/data/cve/CVE-2011-0814.html https://www.redhat.com/security/data/cve/CVE-2011-0862.html https://www.redhat.com/security/data/cve/CVE-2011-0863.html https://www.redhat.com/security/data/cve/CVE-2011-0864.html https://www.redhat.com/security/data/cve/CVE-2011-0865.html https://www.redhat.com/security/data/cve/CVE-2011-0867.html https://www.redhat.com/security/data/cve/CVE-2011-0868.html https://www.redhat.com/security/data/cve/CVE-2011-0869.html https://www.redhat.com/security/data/cve/CVE-2011-0871.html https://www.redhat.com/security/data/cve/CVE-2011-0873.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN75hZXlSAg2UNWIIRAk+VAKCkNkXBxoJkONj189Gi/rL1JhUzPgCfcwNr txYYEeTJnX7m4ZXT7Nsd+lY= =aePx -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:44:50 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:44:50 +0000 Subject: [RHSA-2011:0861-01] Moderate: subversion security update Message-ID: <201106081544.p58Fiof3020446@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subversion security update Advisory ID: RHSA-2011:0861-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0861.html Issue date: 2011-06-08 CVE Names: CVE-2011-1752 ===================================================================== 1. Summary: Updated subversion packages that fix one security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed requests submitted against the URL of a baselined resource. A malicious, remote user could use this flaw to cause the httpd process serving the request to crash. (CVE-2011-1752) Red Hat would like to thank the Apache Subversion project for reporting this issue. Upstream acknowledges Joe Schaefer of the Apache Software Foundation as the original reporter. All Subversion users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 709111 - CVE-2011-1752 subversion (mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/subversion-1.1.4-4.el4.src.rpm i386: mod_dav_svn-1.1.4-4.el4.i386.rpm subversion-1.1.4-4.el4.i386.rpm subversion-debuginfo-1.1.4-4.el4.i386.rpm subversion-devel-1.1.4-4.el4.i386.rpm subversion-perl-1.1.4-4.el4.i386.rpm ia64: mod_dav_svn-1.1.4-4.el4.ia64.rpm subversion-1.1.4-4.el4.ia64.rpm subversion-debuginfo-1.1.4-4.el4.ia64.rpm subversion-devel-1.1.4-4.el4.ia64.rpm subversion-perl-1.1.4-4.el4.ia64.rpm ppc: mod_dav_svn-1.1.4-4.el4.ppc.rpm subversion-1.1.4-4.el4.ppc.rpm subversion-debuginfo-1.1.4-4.el4.ppc.rpm subversion-devel-1.1.4-4.el4.ppc.rpm subversion-perl-1.1.4-4.el4.ppc.rpm s390: mod_dav_svn-1.1.4-4.el4.s390.rpm subversion-1.1.4-4.el4.s390.rpm subversion-debuginfo-1.1.4-4.el4.s390.rpm subversion-devel-1.1.4-4.el4.s390.rpm subversion-perl-1.1.4-4.el4.s390.rpm s390x: mod_dav_svn-1.1.4-4.el4.s390x.rpm subversion-1.1.4-4.el4.s390x.rpm subversion-debuginfo-1.1.4-4.el4.s390x.rpm subversion-devel-1.1.4-4.el4.s390x.rpm subversion-perl-1.1.4-4.el4.s390x.rpm x86_64: mod_dav_svn-1.1.4-4.el4.x86_64.rpm subversion-1.1.4-4.el4.x86_64.rpm subversion-debuginfo-1.1.4-4.el4.x86_64.rpm subversion-devel-1.1.4-4.el4.x86_64.rpm subversion-perl-1.1.4-4.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/subversion-1.1.4-4.el4.src.rpm i386: mod_dav_svn-1.1.4-4.el4.i386.rpm subversion-1.1.4-4.el4.i386.rpm subversion-debuginfo-1.1.4-4.el4.i386.rpm subversion-devel-1.1.4-4.el4.i386.rpm subversion-perl-1.1.4-4.el4.i386.rpm x86_64: mod_dav_svn-1.1.4-4.el4.x86_64.rpm subversion-1.1.4-4.el4.x86_64.rpm subversion-debuginfo-1.1.4-4.el4.x86_64.rpm subversion-devel-1.1.4-4.el4.x86_64.rpm subversion-perl-1.1.4-4.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/subversion-1.1.4-4.el4.src.rpm i386: mod_dav_svn-1.1.4-4.el4.i386.rpm subversion-1.1.4-4.el4.i386.rpm subversion-debuginfo-1.1.4-4.el4.i386.rpm subversion-devel-1.1.4-4.el4.i386.rpm subversion-perl-1.1.4-4.el4.i386.rpm ia64: mod_dav_svn-1.1.4-4.el4.ia64.rpm subversion-1.1.4-4.el4.ia64.rpm subversion-debuginfo-1.1.4-4.el4.ia64.rpm subversion-devel-1.1.4-4.el4.ia64.rpm subversion-perl-1.1.4-4.el4.ia64.rpm x86_64: mod_dav_svn-1.1.4-4.el4.x86_64.rpm subversion-1.1.4-4.el4.x86_64.rpm subversion-debuginfo-1.1.4-4.el4.x86_64.rpm subversion-devel-1.1.4-4.el4.x86_64.rpm subversion-perl-1.1.4-4.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/subversion-1.1.4-4.el4.src.rpm i386: mod_dav_svn-1.1.4-4.el4.i386.rpm subversion-1.1.4-4.el4.i386.rpm subversion-debuginfo-1.1.4-4.el4.i386.rpm subversion-devel-1.1.4-4.el4.i386.rpm subversion-perl-1.1.4-4.el4.i386.rpm ia64: mod_dav_svn-1.1.4-4.el4.ia64.rpm subversion-1.1.4-4.el4.ia64.rpm subversion-debuginfo-1.1.4-4.el4.ia64.rpm subversion-devel-1.1.4-4.el4.ia64.rpm subversion-perl-1.1.4-4.el4.ia64.rpm x86_64: mod_dav_svn-1.1.4-4.el4.x86_64.rpm subversion-1.1.4-4.el4.x86_64.rpm subversion-debuginfo-1.1.4-4.el4.x86_64.rpm subversion-devel-1.1.4-4.el4.x86_64.rpm subversion-perl-1.1.4-4.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1752.html https://access.redhat.com/security/updates/classification/#moderate http://subversion.apache.org/security/CVE-2011-1752-advisory.txt 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN75jRXlSAg2UNWIIRAhdTAJ4iqHSh8afL2Y7yKRZasLsuAYDjfQCfbweY dnCzZU0//sUiD+8AnvBYaO4= =Ep0O -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 15:57:12 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2011 15:57:12 +0000 Subject: [RHSA-2011:0862-01] Moderate: subversion security update Message-ID: <201106081557.p58FvCV9031724@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subversion security update Advisory ID: RHSA-2011:0862-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0862.html Issue date: 2011-06-08 CVE Names: CVE-2011-1752 CVE-2011-1783 CVE-2011-1921 ===================================================================== 1. Summary: Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An infinite loop flaw was found in the way the mod_dav_svn module processed certain data sets. If the SVNPathAuthz directive was set to "short_circuit", and path-based access control for files and directories was enabled, a malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2011-1783) A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed requests submitted against the URL of a baselined resource. A malicious, remote user could use this flaw to cause the httpd process serving the request to crash. (CVE-2011-1752) An information disclosure flaw was found in the way the mod_dav_svn module processed certain URLs when path-based access control for files and directories was enabled. A malicious, remote user could possibly use this flaw to access certain files in a repository that would otherwise not be accessible to them. Note: This vulnerability cannot be triggered if the SVNPathAuthz directive is set to "short_circuit". (CVE-2011-1921) Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Joe Schaefer of the Apache Software Foundation as the original reporter of CVE-2011-1752; Ivan Zhakov of VisualSVN as the original reporter of CVE-2011-1783; and Kamesh Jayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921. All Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 709111 - CVE-2011-1752 subversion (mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources 709112 - CVE-2011-1783 subversion (mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control 709114 - CVE-2011-1921 subversion (mod_dav_svn): File contents disclosure of files configured to be unreadable by those users 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/subversion-1.6.11-7.el5_6.4.src.rpm i386: mod_dav_svn-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-javahl-1.6.11-7.el5_6.4.i386.rpm subversion-perl-1.6.11-7.el5_6.4.i386.rpm subversion-ruby-1.6.11-7.el5_6.4.i386.rpm x86_64: mod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.x86_64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.x86_64.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.x86_64.rpm subversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm subversion-perl-1.6.11-7.el5_6.4.x86_64.rpm subversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/subversion-1.6.11-7.el5_6.4.src.rpm i386: mod_dav_svn-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-javahl-1.6.11-7.el5_6.4.i386.rpm subversion-perl-1.6.11-7.el5_6.4.i386.rpm subversion-ruby-1.6.11-7.el5_6.4.i386.rpm ia64: mod_dav_svn-1.6.11-7.el5_6.4.ia64.rpm subversion-1.6.11-7.el5_6.4.ia64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.ia64.rpm subversion-devel-1.6.11-7.el5_6.4.ia64.rpm subversion-javahl-1.6.11-7.el5_6.4.ia64.rpm subversion-perl-1.6.11-7.el5_6.4.ia64.rpm subversion-ruby-1.6.11-7.el5_6.4.ia64.rpm ppc: mod_dav_svn-1.6.11-7.el5_6.4.ppc.rpm subversion-1.6.11-7.el5_6.4.ppc.rpm subversion-1.6.11-7.el5_6.4.ppc64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.ppc.rpm subversion-debuginfo-1.6.11-7.el5_6.4.ppc64.rpm subversion-devel-1.6.11-7.el5_6.4.ppc.rpm subversion-devel-1.6.11-7.el5_6.4.ppc64.rpm subversion-javahl-1.6.11-7.el5_6.4.ppc.rpm subversion-perl-1.6.11-7.el5_6.4.ppc.rpm subversion-ruby-1.6.11-7.el5_6.4.ppc.rpm s390x: mod_dav_svn-1.6.11-7.el5_6.4.s390x.rpm subversion-1.6.11-7.el5_6.4.s390.rpm subversion-1.6.11-7.el5_6.4.s390x.rpm subversion-debuginfo-1.6.11-7.el5_6.4.s390.rpm subversion-debuginfo-1.6.11-7.el5_6.4.s390x.rpm subversion-devel-1.6.11-7.el5_6.4.s390.rpm subversion-devel-1.6.11-7.el5_6.4.s390x.rpm subversion-javahl-1.6.11-7.el5_6.4.s390x.rpm subversion-perl-1.6.11-7.el5_6.4.s390x.rpm subversion-ruby-1.6.11-7.el5_6.4.s390x.rpm x86_64: mod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.x86_64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.x86_64.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.x86_64.rpm subversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm subversion-perl-1.6.11-7.el5_6.4.x86_64.rpm subversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm i386: mod_dav_svn-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm i386: mod_dav_svn-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm ppc64: mod_dav_svn-1.6.11-2.el6_1.4.ppc64.rpm subversion-1.6.11-2.el6_1.4.ppc.rpm subversion-1.6.11-2.el6_1.4.ppc64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.ppc.rpm subversion-debuginfo-1.6.11-2.el6_1.4.ppc64.rpm s390x: mod_dav_svn-1.6.11-2.el6_1.4.s390x.rpm subversion-1.6.11-2.el6_1.4.s390.rpm subversion-1.6.11-2.el6_1.4.s390x.rpm subversion-debuginfo-1.6.11-2.el6_1.4.s390.rpm subversion-debuginfo-1.6.11-2.el6_1.4.s390x.rpm x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm i386: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm ppc64: subversion-debuginfo-1.6.11-2.el6_1.4.ppc.rpm subversion-debuginfo-1.6.11-2.el6_1.4.ppc64.rpm subversion-devel-1.6.11-2.el6_1.4.ppc.rpm subversion-devel-1.6.11-2.el6_1.4.ppc64.rpm subversion-gnome-1.6.11-2.el6_1.4.ppc.rpm subversion-gnome-1.6.11-2.el6_1.4.ppc64.rpm subversion-javahl-1.6.11-2.el6_1.4.ppc.rpm subversion-javahl-1.6.11-2.el6_1.4.ppc64.rpm subversion-kde-1.6.11-2.el6_1.4.ppc.rpm subversion-kde-1.6.11-2.el6_1.4.ppc64.rpm subversion-perl-1.6.11-2.el6_1.4.ppc.rpm subversion-perl-1.6.11-2.el6_1.4.ppc64.rpm subversion-ruby-1.6.11-2.el6_1.4.ppc.rpm subversion-ruby-1.6.11-2.el6_1.4.ppc64.rpm s390x: subversion-debuginfo-1.6.11-2.el6_1.4.s390.rpm subversion-debuginfo-1.6.11-2.el6_1.4.s390x.rpm subversion-devel-1.6.11-2.el6_1.4.s390.rpm subversion-devel-1.6.11-2.el6_1.4.s390x.rpm subversion-gnome-1.6.11-2.el6_1.4.s390.rpm subversion-gnome-1.6.11-2.el6_1.4.s390x.rpm subversion-javahl-1.6.11-2.el6_1.4.s390.rpm subversion-javahl-1.6.11-2.el6_1.4.s390x.rpm subversion-kde-1.6.11-2.el6_1.4.s390.rpm subversion-kde-1.6.11-2.el6_1.4.s390x.rpm subversion-perl-1.6.11-2.el6_1.4.s390.rpm subversion-perl-1.6.11-2.el6_1.4.s390x.rpm subversion-ruby-1.6.11-2.el6_1.4.s390.rpm subversion-ruby-1.6.11-2.el6_1.4.s390x.rpm x86_64: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm i386: mod_dav_svn-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm i386: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm x86_64: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1752.html https://www.redhat.com/security/data/cve/CVE-2011-1783.html https://www.redhat.com/security/data/cve/CVE-2011-1921.html https://access.redhat.com/security/updates/classification/#moderate http://subversion.apache.org/security/CVE-2011-1783-advisory.txt http://subversion.apache.org/security/CVE-2011-1752-advisory.txt http://subversion.apache.org/security/CVE-2011-1921-advisory.txt 8. Contact: The Red Hat security contact is <secalert at redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN75utXlSAg2UNWIIRAuXgAJ9fhhY1xxC7jRZbLGZA6ENr3dnTBQCgkdf0 J9nA8MJRlM/XVtyj3mbVErg= =jujC -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 15 10:14:39 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Jun 2011 10:14:39 +0000 Subject: [RHSA-2011:0869-01] Critical: flash-plugin security update Message-ID: <201106151014.p5FAEdWV014099@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2011:0869-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0869.html Issue date: 2011-06-15 CVE Names: CVE-2011-2110 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed on the Adobe security page APSB11-18, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code. (CVE-2011-2110) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.181.26. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 713308 - CVE-2011-2110 flash-plugin: memory corruption can lead to arbitrary code execution (APSB11-18) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-10.3.181.26-1.el5.i386.rpm x86_64: flash-plugin-10.3.181.26-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-10.3.181.26-1.el5.i386.rpm x86_64: flash-plugin-10.3.181.26-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-10.3.181.26-1.el6.i686.rpm x86_64: flash-plugin-10.3.181.26-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-10.3.181.26-1.el6.i686.rpm x86_64: flash-plugin-10.3.181.26-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-10.3.181.26-1.el6.i686.rpm x86_64: flash-plugin-10.3.181.26-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2110.html https://access.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb11-18.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN+IXXXlSAg2UNWIIRAhnFAJ9IrNSil3fkgedUgNXd76jRxZeG0gCfXsgV a4/PC/6CrtYaJxO3Q+5sSrg= =vYEq -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 15 10:23:14 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Jun 2011 10:23:14 +0000 Subject: [RHSA-2011:0871-01] Moderate: tigervnc security update Message-ID: <201106151023.p5FANFJF032454@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tigervnc security update Advisory ID: RHSA-2011:0871-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0871.html Issue date: 2011-06-15 CVE Names: CVE-2011-1775 ===================================================================== 1. Summary: Updated tigervnc packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 3. Description: Virtual Network Computing (VNC) is a remote display system which allows you to view a computer's desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. It was discovered that vncviewer could prompt for and send authentication credentials to a remote server without first properly validating the server's X.509 certificate. As vncviewer did not indicate that the certificate was bad or missing, a man-in-the-middle attacker could use this flaw to trick a vncviewer client into connecting to a spoofed VNC server, allowing the attacker to obtain the client's credentials. (CVE-2011-1775) All tigervnc users should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 702470 - CVE-2011-1775 tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm i386: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm x86_64: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm i386: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm noarch: tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6_1.1.noarch.rpm x86_64: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm noarch: tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6_1.1.noarch.rpm x86_64: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm i386: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm ppc64: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.ppc64.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.ppc64.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.ppc64.rpm s390x: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.s390x.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.s390x.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.s390x.rpm x86_64: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm i386: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm noarch: tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6_1.1.noarch.rpm ppc64: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.ppc64.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.ppc64.rpm x86_64: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm i386: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm x86_64: tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/tigervnc-1.0.90-0.15.20110314svn4359.el6_1.1.src.rpm i386: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.i686.rpm noarch: tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6_1.1.noarch.rpm x86_64: tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1775.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFN+IflXlSAg2UNWIIRAodoAJ4mMeoeQQnvbNZAjwZyieO+rFHX2QCcDVEY rXbgMCI8B4Ew5ihr0pU5dRs= =vk14 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:25:09 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2011 23:25:09 +0000 Subject: [RHSA-2011:0885-01] Critical: firefox security and bug fix update Message-ID: <201106212325.p5LNP9gi028659@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security and bug fix update Advisory ID: RHSA-2011:0885-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0885.html Issue date: 2011-06-21 CVE Names: CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 CVE-2011-2364 CVE-2011-2365 CVE-2011-2371 CVE-2011-2373 CVE-2011-2374 CVE-2011-2375 CVE-2011-2376 CVE-2011-2377 ===================================================================== 1. Summary: Updated firefox packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A flaw was found in the way Firefox handled malformed JPEG images. A website containing a malicious JPEG image could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-2377) Multiple dangling pointer flaws were found in Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376) An integer overflow flaw was found in the way Firefox handled JavaScript Array objects. A website containing malicious JavaScript could cause Firefox to execute that JavaScript with the privileges of the user running Firefox. (CVE-2011-2371) A use-after-free flaw was found in the way Firefox handled malformed JavaScript. A website containing malicious JavaScript could cause Firefox to execute that JavaScript with the privileges of the user running Firefox. (CVE-2011-2373) It was found that Firefox could treat two separate cookies as interchangeable if both were for the same domain name but one of those domain names had a trailing "." character. This violates the same-origin policy and could possibly lead to data being leaked to the wrong domain. (CVE-2011-2362) For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.6.18. You can find a link to the Mozilla advisories in the References section of this erratum. This update also fixes the following bug: * With previous versions of Firefox on Red Hat Enterprise Linux 5, the "background-repeat" CSS (Cascading Style Sheets) property did not work (such images were not displayed and repeated as expected). (BZ#698313) All Firefox users should upgrade to these updated packages, which contain Firefox version 3.6.18, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 698313 - "background-repeat" css property isn't rendered well in Firefox 3.6.x 714576 - CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376 Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) 714577 - CVE-2011-2373 Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20) 714580 - CVE-2011-2371 Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22) 714581 - CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) 714583 - CVE-2011-2362 Mozilla Cookie isolation error (MFSA 2011-24) 714929 - CVE-2011-2377 Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-3.6.18-2.el4.src.rpm i386: firefox-3.6.18-2.el4.i386.rpm firefox-debuginfo-3.6.18-2.el4.i386.rpm ia64: firefox-3.6.18-2.el4.ia64.rpm firefox-debuginfo-3.6.18-2.el4.ia64.rpm ppc: firefox-3.6.18-2.el4.ppc.rpm firefox-debuginfo-3.6.18-2.el4.ppc.rpm s390: firefox-3.6.18-2.el4.s390.rpm firefox-debuginfo-3.6.18-2.el4.s390.rpm s390x: firefox-3.6.18-2.el4.s390x.rpm firefox-debuginfo-3.6.18-2.el4.s390x.rpm x86_64: firefox-3.6.18-2.el4.x86_64.rpm firefox-debuginfo-3.6.18-2.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-3.6.18-2.el4.src.rpm i386: firefox-3.6.18-2.el4.i386.rpm firefox-debuginfo-3.6.18-2.el4.i386.rpm x86_64: firefox-3.6.18-2.el4.x86_64.rpm firefox-debuginfo-3.6.18-2.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-3.6.18-2.el4.src.rpm i386: firefox-3.6.18-2.el4.i386.rpm firefox-debuginfo-3.6.18-2.el4.i386.rpm ia64: firefox-3.6.18-2.el4.ia64.rpm firefox-debuginfo-3.6.18-2.el4.ia64.rpm x86_64: firefox-3.6.18-2.el4.x86_64.rpm firefox-debuginfo-3.6.18-2.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-3.6.18-2.el4.src.rpm i386: firefox-3.6.18-2.el4.i386.rpm firefox-debuginfo-3.6.18-2.el4.i386.rpm ia64: firefox-3.6.18-2.el4.ia64.rpm firefox-debuginfo-3.6.18-2.el4.ia64.rpm x86_64: firefox-3.6.18-2.el4.x86_64.rpm firefox-debuginfo-3.6.18-2.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-3.6.18-1.el5_6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.2.18-2.el5_6.src.rpm i386: firefox-3.6.18-1.el5_6.i386.rpm firefox-debuginfo-3.6.18-1.el5_6.i386.rpm xulrunner-1.9.2.18-2.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.i386.rpm x86_64: firefox-3.6.18-1.el5_6.i386.rpm firefox-3.6.18-1.el5_6.x86_64.rpm firefox-debuginfo-3.6.18-1.el5_6.i386.rpm firefox-debuginfo-3.6.18-1.el5_6.x86_64.rpm xulrunner-1.9.2.18-2.el5_6.i386.rpm xulrunner-1.9.2.18-2.el5_6.x86_64.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.2.18-2.el5_6.src.rpm i386: xulrunner-debuginfo-1.9.2.18-2.el5_6.i386.rpm xulrunner-devel-1.9.2.18-2.el5_6.i386.rpm x86_64: xulrunner-debuginfo-1.9.2.18-2.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.x86_64.rpm xulrunner-devel-1.9.2.18-2.el5_6.i386.rpm xulrunner-devel-1.9.2.18-2.el5_6.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-3.6.18-1.el5_6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-1.9.2.18-2.el5_6.src.rpm i386: firefox-3.6.18-1.el5_6.i386.rpm firefox-debuginfo-3.6.18-1.el5_6.i386.rpm xulrunner-1.9.2.18-2.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.i386.rpm xulrunner-devel-1.9.2.18-2.el5_6.i386.rpm ia64: firefox-3.6.18-1.el5_6.ia64.rpm firefox-debuginfo-3.6.18-1.el5_6.ia64.rpm xulrunner-1.9.2.18-2.el5_6.ia64.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.ia64.rpm xulrunner-devel-1.9.2.18-2.el5_6.ia64.rpm ppc: firefox-3.6.18-1.el5_6.ppc.rpm firefox-debuginfo-3.6.18-1.el5_6.ppc.rpm xulrunner-1.9.2.18-2.el5_6.ppc.rpm xulrunner-1.9.2.18-2.el5_6.ppc64.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.ppc.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.ppc64.rpm xulrunner-devel-1.9.2.18-2.el5_6.ppc.rpm xulrunner-devel-1.9.2.18-2.el5_6.ppc64.rpm s390x: firefox-3.6.18-1.el5_6.s390.rpm firefox-3.6.18-1.el5_6.s390x.rpm firefox-debuginfo-3.6.18-1.el5_6.s390.rpm firefox-debuginfo-3.6.18-1.el5_6.s390x.rpm xulrunner-1.9.2.18-2.el5_6.s390.rpm xulrunner-1.9.2.18-2.el5_6.s390x.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.s390.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.s390x.rpm xulrunner-devel-1.9.2.18-2.el5_6.s390.rpm xulrunner-devel-1.9.2.18-2.el5_6.s390x.rpm x86_64: firefox-3.6.18-1.el5_6.i386.rpm firefox-3.6.18-1.el5_6.x86_64.rpm firefox-debuginfo-3.6.18-1.el5_6.i386.rpm firefox-debuginfo-3.6.18-1.el5_6.x86_64.rpm xulrunner-1.9.2.18-2.el5_6.i386.rpm xulrunner-1.9.2.18-2.el5_6.x86_64.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.i386.rpm xulrunner-debuginfo-1.9.2.18-2.el5_6.x86_64.rpm xulrunner-devel-1.9.2.18-2.el5_6.i386.rpm xulrunner-devel-1.9.2.18-2.el5_6.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-3.6.18-1.el6_1.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm i386: firefox-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm x86_64: firefox-3.6.18-1.el6_1.i686.rpm firefox-3.6.18-1.el6_1.x86_64.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.x86_64.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm i386: xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm x86_64: xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-3.6.18-1.el6_1.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm x86_64: firefox-3.6.18-1.el6_1.i686.rpm firefox-3.6.18-1.el6_1.x86_64.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.x86_64.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-3.6.18-1.el6_1.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm i386: firefox-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm ppc64: firefox-3.6.18-1.el6_1.ppc.rpm firefox-3.6.18-1.el6_1.ppc64.rpm firefox-debuginfo-3.6.18-1.el6_1.ppc.rpm firefox-debuginfo-3.6.18-1.el6_1.ppc64.rpm xulrunner-1.9.2.18-2.el6_1.ppc.rpm xulrunner-1.9.2.18-2.el6_1.ppc64.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.ppc.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.ppc64.rpm s390x: firefox-3.6.18-1.el6_1.s390.rpm firefox-3.6.18-1.el6_1.s390x.rpm firefox-debuginfo-3.6.18-1.el6_1.s390.rpm firefox-debuginfo-3.6.18-1.el6_1.s390x.rpm xulrunner-1.9.2.18-2.el6_1.s390.rpm xulrunner-1.9.2.18-2.el6_1.s390x.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.s390.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.s390x.rpm x86_64: firefox-3.6.18-1.el6_1.i686.rpm firefox-3.6.18-1.el6_1.x86_64.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.x86_64.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm i386: xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm ppc64: xulrunner-debuginfo-1.9.2.18-2.el6_1.ppc.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.ppc64.rpm xulrunner-devel-1.9.2.18-2.el6_1.ppc.rpm xulrunner-devel-1.9.2.18-2.el6_1.ppc64.rpm s390x: xulrunner-debuginfo-1.9.2.18-2.el6_1.s390.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.s390x.rpm xulrunner-devel-1.9.2.18-2.el6_1.s390.rpm xulrunner-devel-1.9.2.18-2.el6_1.s390x.rpm x86_64: xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-3.6.18-1.el6_1.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm i386: firefox-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm x86_64: firefox-3.6.18-1.el6_1.i686.rpm firefox-3.6.18-1.el6_1.x86_64.rpm firefox-debuginfo-3.6.18-1.el6_1.i686.rpm firefox-debuginfo-3.6.18-1.el6_1.x86_64.rpm xulrunner-1.9.2.18-2.el6_1.i686.rpm xulrunner-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-1.9.2.18-2.el6_1.src.rpm i386: xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm x86_64: xulrunner-debuginfo-1.9.2.18-2.el6_1.i686.rpm xulrunner-debuginfo-1.9.2.18-2.el6_1.x86_64.rpm xulrunner-devel-1.9.2.18-2.el6_1.i686.rpm xulrunner-devel-1.9.2.18-2.el6_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0083.html https://www.redhat.com/security/data/cve/CVE-2011-0085.html https://www.redhat.com/security/data/cve/CVE-2011-2362.html https://www.redhat.com/security/data/cve/CVE-2011-2363.html https://www.redhat.com/security/data/cve/CVE-2011-2364.html https://www.redhat.com/security/data/cve/CVE-2011-2365.html https://www.redhat.com/security/data/cve/CVE-2011-2371.html https://www.redhat.com/security/data/cve/CVE-2011-2373.html https://www.redhat.com/security/data/cve/CVE-2011-2374.html https://www.redhat.com/security/data/cve/CVE-2011-2375.html https://www.redhat.com/security/data/cve/CVE-2011-2376.html https://www.redhat.com/security/data/cve/CVE-2011-2377.html https://access.redhat.com/security/updates/classification/#critical http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.18 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOAShFXlSAg2UNWIIRAvF0AJ4hTnl54R+8gFVADG7REL0jwixKJQCgjJ45 tgLsJItbC7fFzVa/RqSk2X4= =sptY -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:25:35 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2011 23:25:35 +0000 Subject: [RHSA-2011:0886-01] Critical: thunderbird security update Message-ID: <201106212325.p5LNPZwW007690@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2011:0886-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0886.html Issue date: 2011-06-21 CVE Names: CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 CVE-2011-2364 CVE-2011-2365 CVE-2011-2374 CVE-2011-2375 CVE-2011-2376 CVE-2011-2377 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. A flaw was found in the way Thunderbird handled malformed JPEG images. An HTML mail message containing a malicious JPEG image could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-2377) Multiple dangling pointer flaws were found in Thunderbird. Malicious HTML content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363) Several flaws were found in the processing of malformed HTML content. Malicious HTML content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376) It was found that Thunderbird could treat two separate cookies (for web content) as interchangeable if both were for the same domain name but one of those domain names had a trailing "." character. This violates the same-origin policy and could possibly lead to data being leaked to the wrong domain. (CVE-2011-2362) All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 714576 - CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376 Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) 714581 - CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) 714583 - CVE-2011-2362 Mozilla Cookie isolation error (MFSA 2011-24) 714929 - CVE-2011-2377 Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-3.1.11-2.el6_1.src.rpm i386: thunderbird-3.1.11-2.el6_1.i686.rpm thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm x86_64: thunderbird-3.1.11-2.el6_1.x86_64.rpm thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-3.1.11-2.el6_1.src.rpm i386: thunderbird-3.1.11-2.el6_1.i686.rpm thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm ppc64: thunderbird-3.1.11-2.el6_1.ppc64.rpm thunderbird-debuginfo-3.1.11-2.el6_1.ppc64.rpm s390x: thunderbird-3.1.11-2.el6_1.s390x.rpm thunderbird-debuginfo-3.1.11-2.el6_1.s390x.rpm x86_64: thunderbird-3.1.11-2.el6_1.x86_64.rpm thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-3.1.11-2.el6_1.src.rpm i386: thunderbird-3.1.11-2.el6_1.i686.rpm thunderbird-debuginfo-3.1.11-2.el6_1.i686.rpm x86_64: thunderbird-3.1.11-2.el6_1.x86_64.rpm thunderbird-debuginfo-3.1.11-2.el6_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0083.html https://www.redhat.com/security/data/cve/CVE-2011-0085.html https://www.redhat.com/security/data/cve/CVE-2011-2362.html https://www.redhat.com/security/data/cve/CVE-2011-2363.html https://www.redhat.com/security/data/cve/CVE-2011-2364.html https://www.redhat.com/security/data/cve/CVE-2011-2365.html https://www.redhat.com/security/data/cve/CVE-2011-2374.html https://www.redhat.com/security/data/cve/CVE-2011-2375.html https://www.redhat.com/security/data/cve/CVE-2011-2376.html https://www.redhat.com/security/data/cve/CVE-2011-2377.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOAShgXlSAg2UNWIIRAqrWAJ9QUfQDwAYWpt7cXQpmAjALanc6XQCgmbWo Wj3US3Jt6nEUp/r6kFPTTwY= =fcyp -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:26:16 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2011 23:26:16 +0000 Subject: [RHSA-2011:0887-01] Critical: thunderbird security update Message-ID: <201106212326.p5LNQGB1029098@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2011:0887-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0887.html Issue date: 2011-06-21 CVE Names: CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 CVE-2011-2364 CVE-2011-2365 CVE-2011-2371 CVE-2011-2373 CVE-2011-2374 CVE-2011-2375 CVE-2011-2376 CVE-2011-2377 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. A flaw was found in the way Thunderbird handled malformed JPEG images. An HTML mail message containing a malicious JPEG image could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-2377) Multiple dangling pointer flaws were found in Thunderbird. Malicious HTML content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363) Several flaws were found in the processing of malformed HTML content. Malicious HTML content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376) An integer overflow flaw was found in the way Thunderbird handled JavaScript Array objects. Malicious content could cause Thunderbird to execute JavaScript with the privileges of the user running Thunderbird. (CVE-2011-2371) A use-after-free flaw was found in the way Thunderbird handled malformed JavaScript. Malicious content could cause Thunderbird to execute JavaScript with the privileges of the user running Thunderbird. (CVE-2011-2373) It was found that Thunderbird could treat two separate cookies (for web content) as interchangeable if both were for the same domain name but one of those domain names had a trailing "." character. This violates the same-origin policy and could possibly lead to data being leaked to the wrong domain. (CVE-2011-2362) All Thunderbird users should upgrade to this updated package, which resolves these issues. All running instances of Thunderbird must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 714576 - CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376 Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) 714577 - CVE-2011-2373 Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20) 714580 - CVE-2011-2371 Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22) 714581 - CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) 714583 - CVE-2011-2362 Mozilla Cookie isolation error (MFSA 2011-24) 714929 - CVE-2011-2377 Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.12-39.el4.src.rpm i386: thunderbird-1.5.0.12-39.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-39.el4.i386.rpm ia64: thunderbird-1.5.0.12-39.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.ia64.rpm ppc: thunderbird-1.5.0.12-39.el4.ppc.rpm thunderbird-debuginfo-1.5.0.12-39.el4.ppc.rpm s390: thunderbird-1.5.0.12-39.el4.s390.rpm thunderbird-debuginfo-1.5.0.12-39.el4.s390.rpm s390x: thunderbird-1.5.0.12-39.el4.s390x.rpm thunderbird-debuginfo-1.5.0.12-39.el4.s390x.rpm x86_64: thunderbird-1.5.0.12-39.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.12-39.el4.src.rpm i386: thunderbird-1.5.0.12-39.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-39.el4.i386.rpm x86_64: thunderbird-1.5.0.12-39.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.12-39.el4.src.rpm i386: thunderbird-1.5.0.12-39.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-39.el4.i386.rpm ia64: thunderbird-1.5.0.12-39.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-39.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.12-39.el4.src.rpm i386: thunderbird-1.5.0.12-39.el4.i386.rpm thunderbird-debuginfo-1.5.0.12-39.el4.i386.rpm ia64: thunderbird-1.5.0.12-39.el4.ia64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.ia64.rpm x86_64: thunderbird-1.5.0.12-39.el4.x86_64.rpm thunderbird-debuginfo-1.5.0.12-39.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-2.0.0.24-18.el5_6.src.rpm i386: thunderbird-2.0.0.24-18.el5_6.i386.rpm thunderbird-debuginfo-2.0.0.24-18.el5_6.i386.rpm x86_64: thunderbird-2.0.0.24-18.el5_6.x86_64.rpm thunderbird-debuginfo-2.0.0.24-18.el5_6.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-2.0.0.24-18.el5_6.src.rpm i386: thunderbird-2.0.0.24-18.el5_6.i386.rpm thunderbird-debuginfo-2.0.0.24-18.el5_6.i386.rpm x86_64: thunderbird-2.0.0.24-18.el5_6.x86_64.rpm thunderbird-debuginfo-2.0.0.24-18.el5_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0083.html https://www.redhat.com/security/data/cve/CVE-2011-0085.html https://www.redhat.com/security/data/cve/CVE-2011-2362.html https://www.redhat.com/security/data/cve/CVE-2011-2363.html https://www.redhat.com/security/data/cve/CVE-2011-2364.html https://www.redhat.com/security/data/cve/CVE-2011-2365.html https://www.redhat.com/security/data/cve/CVE-2011-2371.html https://www.redhat.com/security/data/cve/CVE-2011-2373.html https://www.redhat.com/security/data/cve/CVE-2011-2374.html https://www.redhat.com/security/data/cve/CVE-2011-2375.html https://www.redhat.com/security/data/cve/CVE-2011-2376.html https://www.redhat.com/security/data/cve/CVE-2011-2377.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOASiIXlSAg2UNWIIRAtZYAJ9ZBRu60zLLdoBrUyCrIZy0/phyMgCgky71 r+NwqFOqCUeak8TCpitMBnk= =QSbg -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:26:45 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2011 23:26:45 +0000 Subject: [RHSA-2011:0888-01] Critical: seamonkey security update Message-ID: <201106212326.p5LNQjxq029974@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2011:0888-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0888.html Issue date: 2011-06-21 CVE Names: CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 CVE-2011-2364 CVE-2011-2365 CVE-2011-2371 CVE-2011-2373 CVE-2011-2374 CVE-2011-2375 CVE-2011-2376 CVE-2011-2377 ===================================================================== 1. Summary: Updated seamonkey packages that fix several security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: SeaMonkey is an open source web browser, email and newsgroup client, IRC chat client, and HTML editor. A flaw was found in the way SeaMonkey handled malformed JPEG images. A website containing a malicious JPEG image could cause SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-2377) Multiple dangling pointer flaws were found in SeaMonkey. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code with the privileges of the user running SeaMonkey. (CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376) An integer overflow flaw was found in the way SeaMonkey handled JavaScript Array objects. A website containing malicious JavaScript could cause SeaMonkey to execute that JavaScript with the privileges of the user running SeaMonkey. (CVE-2011-2371) A use-after-free flaw was found in the way SeaMonkey handled malformed JavaScript. A website containing malicious JavaScript could cause SeaMonkey to execute that JavaScript with the privileges of the user running SeaMonkey. (CVE-2011-2373) It was found that SeaMonkey could treat two separate cookies as interchangeable if both were for the same domain name but one of those domain names had a trailing "." character. This violates the same-origin policy and could possibly lead to data being leaked to the wrong domain. (CVE-2011-2362) All SeaMonkey users should upgrade to these updated packages, which correct these issues. After installing the update, SeaMonkey must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 714576 - CVE-2011-2364, CVE-2011-2365, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376 Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) 714577 - CVE-2011-2373 Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20) 714580 - CVE-2011-2371 Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22) 714581 - CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) 714583 - CVE-2011-2362 Mozilla Cookie isolation error (MFSA 2011-24) 714929 - CVE-2011-2377 Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.9-71.el4.src.rpm i386: seamonkey-1.0.9-71.el4.i386.rpm seamonkey-chat-1.0.9-71.el4.i386.rpm seamonkey-debuginfo-1.0.9-71.el4.i386.rpm seamonkey-devel-1.0.9-71.el4.i386.rpm seamonkey-dom-inspector-1.0.9-71.el4.i386.rpm seamonkey-js-debugger-1.0.9-71.el4.i386.rpm seamonkey-mail-1.0.9-71.el4.i386.rpm ia64: seamonkey-1.0.9-71.el4.ia64.rpm seamonkey-chat-1.0.9-71.el4.ia64.rpm seamonkey-debuginfo-1.0.9-71.el4.ia64.rpm seamonkey-devel-1.0.9-71.el4.ia64.rpm seamonkey-dom-inspector-1.0.9-71.el4.ia64.rpm seamonkey-js-debugger-1.0.9-71.el4.ia64.rpm seamonkey-mail-1.0.9-71.el4.ia64.rpm ppc: seamonkey-1.0.9-71.el4.ppc.rpm seamonkey-chat-1.0.9-71.el4.ppc.rpm seamonkey-debuginfo-1.0.9-71.el4.ppc.rpm seamonkey-devel-1.0.9-71.el4.ppc.rpm seamonkey-dom-inspector-1.0.9-71.el4.ppc.rpm seamonkey-js-debugger-1.0.9-71.el4.ppc.rpm seamonkey-mail-1.0.9-71.el4.ppc.rpm s390: seamonkey-1.0.9-71.el4.s390.rpm seamonkey-chat-1.0.9-71.el4.s390.rpm seamonkey-debuginfo-1.0.9-71.el4.s390.rpm seamonkey-devel-1.0.9-71.el4.s390.rpm seamonkey-dom-inspector-1.0.9-71.el4.s390.rpm seamonkey-js-debugger-1.0.9-71.el4.s390.rpm seamonkey-mail-1.0.9-71.el4.s390.rpm s390x: seamonkey-1.0.9-71.el4.s390x.rpm seamonkey-chat-1.0.9-71.el4.s390x.rpm seamonkey-debuginfo-1.0.9-71.el4.s390x.rpm seamonkey-devel-1.0.9-71.el4.s390x.rpm seamonkey-dom-inspector-1.0.9-71.el4.s390x.rpm seamonkey-js-debugger-1.0.9-71.el4.s390x.rpm seamonkey-mail-1.0.9-71.el4.s390x.rpm x86_64: seamonkey-1.0.9-71.el4.x86_64.rpm seamonkey-chat-1.0.9-71.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-71.el4.x86_64.rpm seamonkey-devel-1.0.9-71.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-71.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-71.el4.x86_64.rpm seamonkey-mail-1.0.9-71.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.9-71.el4.src.rpm i386: seamonkey-1.0.9-71.el4.i386.rpm seamonkey-chat-1.0.9-71.el4.i386.rpm seamonkey-debuginfo-1.0.9-71.el4.i386.rpm seamonkey-devel-1.0.9-71.el4.i386.rpm seamonkey-dom-inspector-1.0.9-71.el4.i386.rpm seamonkey-js-debugger-1.0.9-71.el4.i386.rpm seamonkey-mail-1.0.9-71.el4.i386.rpm x86_64: seamonkey-1.0.9-71.el4.x86_64.rpm seamonkey-chat-1.0.9-71.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-71.el4.x86_64.rpm seamonkey-devel-1.0.9-71.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-71.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-71.el4.x86_64.rpm seamonkey-mail-1.0.9-71.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.9-71.el4.src.rpm i386: seamonkey-1.0.9-71.el4.i386.rpm seamonkey-chat-1.0.9-71.el4.i386.rpm seamonkey-debuginfo-1.0.9-71.el4.i386.rpm seamonkey-devel-1.0.9-71.el4.i386.rpm seamonkey-dom-inspector-1.0.9-71.el4.i386.rpm seamonkey-js-debugger-1.0.9-71.el4.i386.rpm seamonkey-mail-1.0.9-71.el4.i386.rpm ia64: seamonkey-1.0.9-71.el4.ia64.rpm seamonkey-chat-1.0.9-71.el4.ia64.rpm seamonkey-debuginfo-1.0.9-71.el4.ia64.rpm seamonkey-devel-1.0.9-71.el4.ia64.rpm seamonkey-dom-inspector-1.0.9-71.el4.ia64.rpm seamonkey-js-debugger-1.0.9-71.el4.ia64.rpm seamonkey-mail-1.0.9-71.el4.ia64.rpm x86_64: seamonkey-1.0.9-71.el4.x86_64.rpm seamonkey-chat-1.0.9-71.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-71.el4.x86_64.rpm seamonkey-devel-1.0.9-71.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-71.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-71.el4.x86_64.rpm seamonkey-mail-1.0.9-71.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.9-71.el4.src.rpm i386: seamonkey-1.0.9-71.el4.i386.rpm seamonkey-chat-1.0.9-71.el4.i386.rpm seamonkey-debuginfo-1.0.9-71.el4.i386.rpm seamonkey-devel-1.0.9-71.el4.i386.rpm seamonkey-dom-inspector-1.0.9-71.el4.i386.rpm seamonkey-js-debugger-1.0.9-71.el4.i386.rpm seamonkey-mail-1.0.9-71.el4.i386.rpm ia64: seamonkey-1.0.9-71.el4.ia64.rpm seamonkey-chat-1.0.9-71.el4.ia64.rpm seamonkey-debuginfo-1.0.9-71.el4.ia64.rpm seamonkey-devel-1.0.9-71.el4.ia64.rpm seamonkey-dom-inspector-1.0.9-71.el4.ia64.rpm seamonkey-js-debugger-1.0.9-71.el4.ia64.rpm seamonkey-mail-1.0.9-71.el4.ia64.rpm x86_64: seamonkey-1.0.9-71.el4.x86_64.rpm seamonkey-chat-1.0.9-71.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-71.el4.x86_64.rpm seamonkey-devel-1.0.9-71.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-71.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-71.el4.x86_64.rpm seamonkey-mail-1.0.9-71.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0083.html https://www.redhat.com/security/data/cve/CVE-2011-0085.html https://www.redhat.com/security/data/cve/CVE-2011-2362.html https://www.redhat.com/security/data/cve/CVE-2011-2363.html https://www.redhat.com/security/data/cve/CVE-2011-2364.html https://www.redhat.com/security/data/cve/CVE-2011-2365.html https://www.redhat.com/security/data/cve/CVE-2011-2371.html https://www.redhat.com/security/data/cve/CVE-2011-2373.html https://www.redhat.com/security/data/cve/CVE-2011-2374.html https://www.redhat.com/security/data/cve/CVE-2011-2375.html https://www.redhat.com/security/data/cve/CVE-2011-2376.html https://www.redhat.com/security/data/cve/CVE-2011-2377.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOASioXlSAg2UNWIIRAp8rAJ0S1ZInjYMZ6LJVMWEcQHk3CmUM6QCeIjKb u3vKwXCTw3dsB9u/QlfgOco= =j+1p -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 22 00:01:53 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 22 Jun 2011 00:01:53 +0000 Subject: [RHSA-2011:0883-01] Important: kernel security and bug fix update Message-ID: <201106220001.p5M01w1S005855@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2011:0883-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0883.html Issue date: 2011-06-21 CVE Names: CVE-2010-3881 CVE-2010-4251 CVE-2010-4805 CVE-2011-0999 CVE-2011-1010 CVE-2011-1082 CVE-2011-1090 CVE-2011-1163 CVE-2011-1170 CVE-2011-1171 CVE-2011-1172 CVE-2011-1182 CVE-2011-1494 CVE-2011-1495 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and three bugs are now available for Red Hat Enterprise Linux 6.0 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6.0.z) - i386, noarch, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update includes backported fixes for security issues. These issues, except for CVE-2011-1182, only affected users of Red Hat Enterprise Linux 6.0 Extended Update Support as they have already been addressed for users of Red Hat Enterprise Linux 6 in the 6.1 update, RHSA-2011:0542. Security fixes: * Buffer overflow flaws were found in the Linux kernel's Management Module Support for Message Passing Technology (MPT) based controllers. A local, unprivileged user could use these flaws to cause a denial of service, an information leak, or escalate their privileges. (CVE-2011-1494, CVE-2011-1495, Important) * A flaw was found in the Linux kernel's networking subsystem. If the number of packets received exceeded the receiver's buffer limit, they were queued in a backlog, consuming memory, instead of being discarded. A remote attacker could abuse this flaw to cause a denial of service (out-of-memory condition). (CVE-2010-4251, CVE-2010-4805, Moderate) * A flaw was found in the Linux kernel's Transparent Huge Pages (THP) implementation. A local, unprivileged user could abuse this flaw to allow the user stack (when it is using huge pages) to grow and cause a denial of service. (CVE-2011-0999, Moderate) * A flaw in the Linux kernel's Event Poll (epoll) implementation could allow a local, unprivileged user to cause a denial of service. (CVE-2011-1082, Moderate) * An inconsistency was found in the interaction between the Linux kernel's method for allocating NFSv4 (Network File System version 4) ACL data and the method by which it was freed. This inconsistency led to a kernel panic which could be triggered by a local, unprivileged user with files owned by said user on an NFSv4 share. (CVE-2011-1090, Moderate) * It was found that some structure padding and reserved fields in certain data structures in KVM (Kernel-based Virtual Machine) were not initialized properly before being copied to user-space. A privileged host user with access to "/dev/kvm" could use this flaw to leak kernel stack memory to user-space. (CVE-2010-3881, Low) * A missing validation check was found in the Linux kernel's mac_partition() implementation, used for supporting file systems created on Mac OS operating systems. A local attacker could use this flaw to cause a denial of service by mounting a disk that contains specially-crafted partitions. (CVE-2011-1010, Low) * A buffer overflow flaw in the DEC Alpha OSF partition implementation in the Linux kernel could allow a local attacker to cause an information leak by mounting a disk that contains specially-crafted partition tables. (CVE-2011-1163, Low) * Missing validations of null-terminated string data structure elements in the do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(), and do_arpt_get_ctl() functions could allow a local user who has the CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, Low) * A missing validation check was found in the Linux kernel's signals implementation. A local, unprivileged user could use this flaw to send signals via the sigqueueinfo system call, with the si_code set to SI_TKILL and with spoofed process and user IDs, to other processes. Note: This flaw does not allow existing permission checks to be bypassed; signals can only be sent if your privileges allow you to already do so. (CVE-2011-1182, Low) Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and CVE-2011-1495; Nelson Elhage for reporting CVE-2011-1082; Vasiliy Kulikov for reporting CVE-2010-3881, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Timo Warns for reporting CVE-2011-1010 and CVE-2011-1163; and Julien Tinnes of the Google Security Team for reporting CVE-2011-1182. This update also fixes three bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. 4. Solution: Users should upgrade to these updated packages, which contain backported patches to resolve these issues, and fix the bugs noted in the Technical Notes. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 649920 - CVE-2010-3881 kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory 657303 - CVE-2010-4251 CVE-2010-4805 kernel: unlimited socket backlog DoS 678209 - CVE-2011-0999 kernel: thp: prevent hugepages during args/env copying into the user stack 679282 - CVE-2011-1010 kernel: fs/partitions: Validate map_count in Mac partition tables 681575 - CVE-2011-1082 kernel: potential kernel deadlock when creating circular epoll file structures 682641 - CVE-2011-1090 kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab 688021 - CVE-2011-1163 kernel: fs/partitions: Corrupted OSF partition table infoleak 689321 - CVE-2011-1170 kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace 689327 - CVE-2011-1171 kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace 689345 - CVE-2011-1172 kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace 690028 - CVE-2011-1182 kernel signal spoofing issue 694021 - CVE-2011-1494 CVE-2011-1495 kernel: drivers/scsi/mpt2sas: prevent heap overflows 6. Package List: Red Hat Enterprise Linux Server (v. 6.0.z): Source: kernel-2.6.32-71.31.1.el6.src.rpm i386: kernel-2.6.32-71.31.1.el6.i686.rpm kernel-debug-2.6.32-71.31.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-71.31.1.el6.i686.rpm kernel-debug-devel-2.6.32-71.31.1.el6.i686.rpm kernel-debuginfo-2.6.32-71.31.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-71.31.1.el6.i686.rpm kernel-devel-2.6.32-71.31.1.el6.i686.rpm kernel-headers-2.6.32-71.31.1.el6.i686.rpm noarch: kernel-doc-2.6.32-71.31.1.el6.noarch.rpm kernel-firmware-2.6.32-71.31.1.el6.noarch.rpm perf-2.6.32-71.31.1.el6.noarch.rpm ppc64: kernel-2.6.32-71.31.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-71.31.1.el6.ppc64.rpm kernel-debug-2.6.32-71.31.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-71.31.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-71.31.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-71.31.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-71.31.1.el6.ppc64.rpm kernel-devel-2.6.32-71.31.1.el6.ppc64.rpm kernel-headers-2.6.32-71.31.1.el6.ppc64.rpm s390x: kernel-2.6.32-71.31.1.el6.s390x.rpm kernel-debug-2.6.32-71.31.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-71.31.1.el6.s390x.rpm kernel-debug-devel-2.6.32-71.31.1.el6.s390x.rpm kernel-debuginfo-2.6.32-71.31.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-71.31.1.el6.s390x.rpm kernel-devel-2.6.32-71.31.1.el6.s390x.rpm kernel-headers-2.6.32-71.31.1.el6.s390x.rpm kernel-kdump-2.6.32-71.31.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-71.31.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-71.31.1.el6.s390x.rpm x86_64: kernel-2.6.32-71.31.1.el6.x86_64.rpm kernel-debug-2.6.32-71.31.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-71.31.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-71.31.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-71.31.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-71.31.1.el6.x86_64.rpm kernel-devel-2.6.32-71.31.1.el6.x86_64.rpm kernel-headers-2.6.32-71.31.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-3881.html https://www.redhat.com/security/data/cve/CVE-2010-4251.html https://www.redhat.com/security/data/cve/CVE-2010-4805.html https://www.redhat.com/security/data/cve/CVE-2011-0999.html https://www.redhat.com/security/data/cve/CVE-2011-1010.html https://www.redhat.com/security/data/cve/CVE-2011-1082.html https://www.redhat.com/security/data/cve/CVE-2011-1090.html https://www.redhat.com/security/data/cve/CVE-2011-1163.html https://www.redhat.com/security/data/cve/CVE-2011-1170.html https://www.redhat.com/security/data/cve/CVE-2011-1171.html https://www.redhat.com/security/data/cve/CVE-2011-1172.html https://www.redhat.com/security/data/cve/CVE-2011-1182.html https://www.redhat.com/security/data/cve/CVE-2011-1494.html https://www.redhat.com/security/data/cve/CVE-2011-1495.html https://access.redhat.com/security/updates/classification/#important https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0883 https://rhn.redhat.com/errata/RHSA-2011-0542.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOATDdXlSAg2UNWIIRAsfLAJ0c4Yavu6EcvuxP7NpRjS9EvqwwfwCgwER7 4TFfZaweoMfot9qMfstjoso= =sTNU -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 28 17:36:39 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 28 Jun 2011 17:36:39 +0000 Subject: [RHSA-2011:0908-01] Moderate: ruby security update Message-ID: <201106281736.p5SHaefj030317@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ruby security update Advisory ID: RHSA-2011:0908-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0908.html Issue date: 2011-06-28 CVE Names: CVE-2009-4492 CVE-2010-0541 CVE-2011-0188 CVE-2011-1005 ===================================================================== 1. Summary: Updated ruby packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. A flaw was found in the way large amounts of memory were allocated on 64-bit systems when using the BigDecimal class. A context-dependent attacker could use this flaw to cause memory corruption, causing a Ruby application that uses the BigDecimal class to crash or, possibly, execute arbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188) It was found that WEBrick (the Ruby HTTP server toolkit) did not filter terminal escape sequences from its log files. A remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the WEBrick log files. If a victim viewed the log files with a terminal emulator, it could result in control characters being executed with the privileges of that user. (CVE-2009-4492) A cross-site scripting (XSS) flaw was found in the way WEBrick displayed error pages. A remote attacker could use this flaw to perform a cross-site scripting attack against victims by tricking them into visiting a specially-crafted URL. (CVE-2010-0541) A flaw was found in the method for translating an exception message into a string in the Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted) code to modify arbitrary, trusted (untainted) strings, which safe level 4 restrictions would otherwise prevent. (CVE-2011-1005) Red Hat would like to thank Drew Yao of Apple Product Security for reporting the CVE-2011-0188 and CVE-2010-0541 issues. All Ruby users should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 554485 - CVE-2009-4492 ruby WEBrick log escape sequence 587731 - CVE-2010-0541 Ruby WEBrick javascript injection flaw 678920 - CVE-2011-1005 Ruby: Untrusted codes able to modify arbitrary strings 682332 - CVE-2011-0188 ruby: memory corruption in BigDecimal on 64bit platforms 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ruby-1.8.1-16.el4.src.rpm i386: irb-1.8.1-16.el4.i386.rpm ruby-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-devel-1.8.1-16.el4.i386.rpm ruby-docs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-mode-1.8.1-16.el4.i386.rpm ruby-tcltk-1.8.1-16.el4.i386.rpm ia64: irb-1.8.1-16.el4.ia64.rpm ruby-1.8.1-16.el4.ia64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.ia64.rpm ruby-devel-1.8.1-16.el4.ia64.rpm ruby-docs-1.8.1-16.el4.ia64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.ia64.rpm ruby-mode-1.8.1-16.el4.ia64.rpm ruby-tcltk-1.8.1-16.el4.ia64.rpm ppc: irb-1.8.1-16.el4.ppc.rpm ruby-1.8.1-16.el4.ppc.rpm ruby-debuginfo-1.8.1-16.el4.ppc.rpm ruby-debuginfo-1.8.1-16.el4.ppc64.rpm ruby-devel-1.8.1-16.el4.ppc.rpm ruby-docs-1.8.1-16.el4.ppc.rpm ruby-libs-1.8.1-16.el4.ppc.rpm ruby-libs-1.8.1-16.el4.ppc64.rpm ruby-mode-1.8.1-16.el4.ppc.rpm ruby-tcltk-1.8.1-16.el4.ppc.rpm s390: irb-1.8.1-16.el4.s390.rpm ruby-1.8.1-16.el4.s390.rpm ruby-debuginfo-1.8.1-16.el4.s390.rpm ruby-devel-1.8.1-16.el4.s390.rpm ruby-docs-1.8.1-16.el4.s390.rpm ruby-libs-1.8.1-16.el4.s390.rpm ruby-mode-1.8.1-16.el4.s390.rpm ruby-tcltk-1.8.1-16.el4.s390.rpm s390x: irb-1.8.1-16.el4.s390x.rpm ruby-1.8.1-16.el4.s390x.rpm ruby-debuginfo-1.8.1-16.el4.s390.rpm ruby-debuginfo-1.8.1-16.el4.s390x.rpm ruby-devel-1.8.1-16.el4.s390x.rpm ruby-docs-1.8.1-16.el4.s390x.rpm ruby-libs-1.8.1-16.el4.s390.rpm ruby-libs-1.8.1-16.el4.s390x.rpm ruby-mode-1.8.1-16.el4.s390x.rpm ruby-tcltk-1.8.1-16.el4.s390x.rpm x86_64: irb-1.8.1-16.el4.x86_64.rpm ruby-1.8.1-16.el4.x86_64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.x86_64.rpm ruby-devel-1.8.1-16.el4.x86_64.rpm ruby-docs-1.8.1-16.el4.x86_64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.x86_64.rpm ruby-mode-1.8.1-16.el4.x86_64.rpm ruby-tcltk-1.8.1-16.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ruby-1.8.1-16.el4.src.rpm i386: irb-1.8.1-16.el4.i386.rpm ruby-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-devel-1.8.1-16.el4.i386.rpm ruby-docs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-mode-1.8.1-16.el4.i386.rpm ruby-tcltk-1.8.1-16.el4.i386.rpm x86_64: irb-1.8.1-16.el4.x86_64.rpm ruby-1.8.1-16.el4.x86_64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.x86_64.rpm ruby-devel-1.8.1-16.el4.x86_64.rpm ruby-docs-1.8.1-16.el4.x86_64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.x86_64.rpm ruby-mode-1.8.1-16.el4.x86_64.rpm ruby-tcltk-1.8.1-16.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ruby-1.8.1-16.el4.src.rpm i386: irb-1.8.1-16.el4.i386.rpm ruby-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-devel-1.8.1-16.el4.i386.rpm ruby-docs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-mode-1.8.1-16.el4.i386.rpm ruby-tcltk-1.8.1-16.el4.i386.rpm ia64: irb-1.8.1-16.el4.ia64.rpm ruby-1.8.1-16.el4.ia64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.ia64.rpm ruby-devel-1.8.1-16.el4.ia64.rpm ruby-docs-1.8.1-16.el4.ia64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.ia64.rpm ruby-mode-1.8.1-16.el4.ia64.rpm ruby-tcltk-1.8.1-16.el4.ia64.rpm x86_64: irb-1.8.1-16.el4.x86_64.rpm ruby-1.8.1-16.el4.x86_64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.x86_64.rpm ruby-devel-1.8.1-16.el4.x86_64.rpm ruby-docs-1.8.1-16.el4.x86_64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.x86_64.rpm ruby-mode-1.8.1-16.el4.x86_64.rpm ruby-tcltk-1.8.1-16.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ruby-1.8.1-16.el4.src.rpm i386: irb-1.8.1-16.el4.i386.rpm ruby-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-devel-1.8.1-16.el4.i386.rpm ruby-docs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-mode-1.8.1-16.el4.i386.rpm ruby-tcltk-1.8.1-16.el4.i386.rpm ia64: irb-1.8.1-16.el4.ia64.rpm ruby-1.8.1-16.el4.ia64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.ia64.rpm ruby-devel-1.8.1-16.el4.ia64.rpm ruby-docs-1.8.1-16.el4.ia64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.ia64.rpm ruby-mode-1.8.1-16.el4.ia64.rpm ruby-tcltk-1.8.1-16.el4.ia64.rpm x86_64: irb-1.8.1-16.el4.x86_64.rpm ruby-1.8.1-16.el4.x86_64.rpm ruby-debuginfo-1.8.1-16.el4.i386.rpm ruby-debuginfo-1.8.1-16.el4.x86_64.rpm ruby-devel-1.8.1-16.el4.x86_64.rpm ruby-docs-1.8.1-16.el4.x86_64.rpm ruby-libs-1.8.1-16.el4.i386.rpm ruby-libs-1.8.1-16.el4.x86_64.rpm ruby-mode-1.8.1-16.el4.x86_64.rpm ruby-tcltk-1.8.1-16.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-4492.html https://www.redhat.com/security/data/cve/CVE-2010-0541.html https://www.redhat.com/security/data/cve/CVE-2011-0188.html https://www.redhat.com/security/data/cve/CVE-2011-1005.html https://access.redhat.com/security/updates/classification/#moderate http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/ http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/ http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOChEdXlSAg2UNWIIRAjrhAJ4pXCRg2eKZoflvi6ux8uyIlPt2vQCeLRIP bavPpNudjKGLkmRjeI92JkM= =LMvN -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 28 17:37:29 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 28 Jun 2011 17:37:29 +0000 Subject: [RHSA-2011:0909-01] Moderate: ruby security update Message-ID: <201106281737.p5SHbTLJ030497@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ruby security update Advisory ID: RHSA-2011:0909-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0909.html Issue date: 2011-06-28 CVE Names: CVE-2009-4492 CVE-2010-0541 CVE-2011-0188 CVE-2011-1004 CVE-2011-1005 ===================================================================== 1. Summary: Updated ruby packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. A flaw was found in the way large amounts of memory were allocated on 64-bit systems when using the BigDecimal class. A context-dependent attacker could use this flaw to cause memory corruption, causing a Ruby application that uses the BigDecimal class to crash or, possibly, execute arbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188) A race condition flaw was found in the remove system entries method in the FileUtils module. If a local user ran a Ruby script that uses this method, a local attacker could use this flaw to delete arbitrary files and directories accessible to that user via a symbolic link attack. (CVE-2011-1004) It was found that WEBrick (the Ruby HTTP server toolkit) did not filter terminal escape sequences from its log files. A remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the WEBrick log files. If a victim viewed the log files with a terminal emulator, it could result in control characters being executed with the privileges of that user. (CVE-2009-4492) A cross-site scripting (XSS) flaw was found in the way WEBrick displayed error pages. A remote attacker could use this flaw to perform a cross-site scripting attack against victims by tricking them into visiting a specially-crafted URL. (CVE-2010-0541) A flaw was found in the method for translating an exception message into a string in the Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted) code to modify arbitrary, trusted (untainted) strings, which safe level 4 restrictions would otherwise prevent. (CVE-2011-1005) Red Hat would like to thank Drew Yao of Apple Product Security for reporting the CVE-2011-0188 and CVE-2010-0541 issues. All Ruby users should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 554485 - CVE-2009-4492 ruby WEBrick log escape sequence 587731 - CVE-2010-0541 Ruby WEBrick javascript injection flaw 678913 - CVE-2011-1004 Ruby: Symlink race condition by removing directory trees in fileutils module 678920 - CVE-2011-1005 Ruby: Untrusted codes able to modify arbitrary strings 682332 - CVE-2011-0188 ruby: memory corruption in BigDecimal on 64bit platforms 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/ruby-1.8.5-19.el5_6.1.src.rpm i386: ruby-1.8.5-19.el5_6.1.i386.rpm ruby-debuginfo-1.8.5-19.el5_6.1.i386.rpm ruby-docs-1.8.5-19.el5_6.1.i386.rpm ruby-irb-1.8.5-19.el5_6.1.i386.rpm ruby-libs-1.8.5-19.el5_6.1.i386.rpm ruby-rdoc-1.8.5-19.el5_6.1.i386.rpm ruby-ri-1.8.5-19.el5_6.1.i386.rpm ruby-tcltk-1.8.5-19.el5_6.1.i386.rpm x86_64: ruby-1.8.5-19.el5_6.1.x86_64.rpm ruby-debuginfo-1.8.5-19.el5_6.1.i386.rpm ruby-debuginfo-1.8.5-19.el5_6.1.x86_64.rpm ruby-docs-1.8.5-19.el5_6.1.x86_64.rpm ruby-irb-1.8.5-19.el5_6.1.x86_64.rpm ruby-libs-1.8.5-19.el5_6.1.i386.rpm ruby-libs-1.8.5-19.el5_6.1.x86_64.rpm ruby-rdoc-1.8.5-19.el5_6.1.x86_64.rpm ruby-ri-1.8.5-19.el5_6.1.x86_64.rpm ruby-tcltk-1.8.5-19.el5_6.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/ruby-1.8.5-19.el5_6.1.src.rpm i386: ruby-debuginfo-1.8.5-19.el5_6.1.i386.rpm ruby-devel-1.8.5-19.el5_6.1.i386.rpm ruby-mode-1.8.5-19.el5_6.1.i386.rpm x86_64: ruby-debuginfo-1.8.5-19.el5_6.1.i386.rpm ruby-debuginfo-1.8.5-19.el5_6.1.x86_64.rpm ruby-devel-1.8.5-19.el5_6.1.i386.rpm ruby-devel-1.8.5-19.el5_6.1.x86_64.rpm ruby-mode-1.8.5-19.el5_6.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/ruby-1.8.5-19.el5_6.1.src.rpm i386: ruby-1.8.5-19.el5_6.1.i386.rpm ruby-debuginfo-1.8.5-19.el5_6.1.i386.rpm ruby-devel-1.8.5-19.el5_6.1.i386.rpm ruby-docs-1.8.5-19.el5_6.1.i386.rpm ruby-irb-1.8.5-19.el5_6.1.i386.rpm ruby-libs-1.8.5-19.el5_6.1.i386.rpm ruby-mode-1.8.5-19.el5_6.1.i386.rpm ruby-rdoc-1.8.5-19.el5_6.1.i386.rpm ruby-ri-1.8.5-19.el5_6.1.i386.rpm ruby-tcltk-1.8.5-19.el5_6.1.i386.rpm ia64: ruby-1.8.5-19.el5_6.1.ia64.rpm ruby-debuginfo-1.8.5-19.el5_6.1.ia64.rpm ruby-devel-1.8.5-19.el5_6.1.ia64.rpm ruby-docs-1.8.5-19.el5_6.1.ia64.rpm ruby-irb-1.8.5-19.el5_6.1.ia64.rpm ruby-libs-1.8.5-19.el5_6.1.ia64.rpm ruby-mode-1.8.5-19.el5_6.1.ia64.rpm ruby-rdoc-1.8.5-19.el5_6.1.ia64.rpm ruby-ri-1.8.5-19.el5_6.1.ia64.rpm ruby-tcltk-1.8.5-19.el5_6.1.ia64.rpm ppc: ruby-1.8.5-19.el5_6.1.ppc.rpm ruby-debuginfo-1.8.5-19.el5_6.1.ppc.rpm ruby-debuginfo-1.8.5-19.el5_6.1.ppc64.rpm ruby-devel-1.8.5-19.el5_6.1.ppc.rpm ruby-devel-1.8.5-19.el5_6.1.ppc64.rpm ruby-docs-1.8.5-19.el5_6.1.ppc.rpm ruby-irb-1.8.5-19.el5_6.1.ppc.rpm ruby-libs-1.8.5-19.el5_6.1.ppc.rpm ruby-libs-1.8.5-19.el5_6.1.ppc64.rpm ruby-mode-1.8.5-19.el5_6.1.ppc.rpm ruby-rdoc-1.8.5-19.el5_6.1.ppc.rpm ruby-ri-1.8.5-19.el5_6.1.ppc.rpm ruby-tcltk-1.8.5-19.el5_6.1.ppc.rpm s390x: ruby-1.8.5-19.el5_6.1.s390x.rpm ruby-debuginfo-1.8.5-19.el5_6.1.s390.rpm ruby-debuginfo-1.8.5-19.el5_6.1.s390x.rpm ruby-devel-1.8.5-19.el5_6.1.s390.rpm ruby-devel-1.8.5-19.el5_6.1.s390x.rpm ruby-docs-1.8.5-19.el5_6.1.s390x.rpm ruby-irb-1.8.5-19.el5_6.1.s390x.rpm ruby-libs-1.8.5-19.el5_6.1.s390.rpm ruby-libs-1.8.5-19.el5_6.1.s390x.rpm ruby-mode-1.8.5-19.el5_6.1.s390x.rpm ruby-rdoc-1.8.5-19.el5_6.1.s390x.rpm ruby-ri-1.8.5-19.el5_6.1.s390x.rpm ruby-tcltk-1.8.5-19.el5_6.1.s390x.rpm x86_64: ruby-1.8.5-19.el5_6.1.x86_64.rpm ruby-debuginfo-1.8.5-19.el5_6.1.i386.rpm ruby-debuginfo-1.8.5-19.el5_6.1.x86_64.rpm ruby-devel-1.8.5-19.el5_6.1.i386.rpm ruby-devel-1.8.5-19.el5_6.1.x86_64.rpm ruby-docs-1.8.5-19.el5_6.1.x86_64.rpm ruby-irb-1.8.5-19.el5_6.1.x86_64.rpm ruby-libs-1.8.5-19.el5_6.1.i386.rpm ruby-libs-1.8.5-19.el5_6.1.x86_64.rpm ruby-mode-1.8.5-19.el5_6.1.x86_64.rpm ruby-rdoc-1.8.5-19.el5_6.1.x86_64.rpm ruby-ri-1.8.5-19.el5_6.1.x86_64.rpm ruby-tcltk-1.8.5-19.el5_6.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-4492.html https://www.redhat.com/security/data/cve/CVE-2010-0541.html https://www.redhat.com/security/data/cve/CVE-2011-0188.html https://www.redhat.com/security/data/cve/CVE-2011-1004.html https://www.redhat.com/security/data/cve/CVE-2011-1005.html https://access.redhat.com/security/updates/classification/#moderate http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/ http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/ http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/ http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOChE2XlSAg2UNWIIRApbvAJ9jyCr3ab4eoWGmH/Lr1D9fbqlPbQCfSmOh k7GfQmHQju444Nztk6ar944= =VbL1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 28 17:38:03 2011 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 28 Jun 2011 17:38:03 +0000 Subject: [RHSA-2011:0910-01] Moderate: ruby security update Message-ID: <201106281738.p5SHc3U2013591@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ruby security update Advisory ID: RHSA-2011:0910-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0910.html Issue date: 2011-06-28 CVE Names: CVE-2011-0188 CVE-2011-1004 CVE-2011-1005 ===================================================================== 1. Summary: Updated ruby packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. A flaw was found in the way large amounts of memory were allocated on 64-bit systems when using the BigDecimal class. A context-dependent attacker could use this flaw to cause memory corruption, causing a Ruby application that uses the BigDecimal class to crash or, possibly, execute arbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188) A race condition flaw was found in the remove system entries method in the FileUtils module. If a local user ran a Ruby script that uses this method, a local attacker could use this flaw to delete arbitrary files and directories accessible to that user via a symbolic link attack. (CVE-2011-1004) A flaw was found in the method for translating an exception message into a string in the Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted) code to modify arbitrary, trusted (untainted) strings, which safe level 4 restrictions would otherwise prevent. (CVE-2011-1005) Red Hat would like to thank Drew Yao of Apple Product Security for reporting the CVE-2011-0188 issue. All Ruby users should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 678913 - CVE-2011-1004 Ruby: Symlink race condition by removing directory trees in fileutils module 678920 - CVE-2011-1005 Ruby: Untrusted codes able to modify arbitrary strings 682332 - CVE-2011-0188 ruby: memory corruption in BigDecimal on 64bit platforms 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm i386: ruby-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-irb-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm i386: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-docs-1.8.7.299-7.el6_1.1.i686.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm ruby-ri-1.8.7.299-7.el6_1.1.i686.rpm ruby-static-1.8.7.299-7.el6_1.1.i686.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm x86_64: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm i386: ruby-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-irb-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ppc64: ruby-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-irb-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-libs-1.8.7.299-7.el6_1.1.ppc.rpm ruby-libs-1.8.7.299-7.el6_1.1.ppc64.rpm s390x: ruby-1.8.7.299-7.el6_1.1.s390x.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.s390.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.s390x.rpm ruby-irb-1.8.7.299-7.el6_1.1.s390x.rpm ruby-libs-1.8.7.299-7.el6_1.1.s390.rpm ruby-libs-1.8.7.299-7.el6_1.1.s390x.rpm x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm i386: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-docs-1.8.7.299-7.el6_1.1.i686.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm ruby-ri-1.8.7.299-7.el6_1.1.i686.rpm ruby-static-1.8.7.299-7.el6_1.1.i686.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm ppc64: ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-devel-1.8.7.299-7.el6_1.1.ppc.rpm ruby-devel-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-docs-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-ri-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-static-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.ppc64.rpm s390x: ruby-debuginfo-1.8.7.299-7.el6_1.1.s390.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.s390x.rpm ruby-devel-1.8.7.299-7.el6_1.1.s390.rpm ruby-devel-1.8.7.299-7.el6_1.1.s390x.rpm ruby-docs-1.8.7.299-7.el6_1.1.s390x.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.s390x.rpm ruby-ri-1.8.7.299-7.el6_1.1.s390x.rpm ruby-static-1.8.7.299-7.el6_1.1.s390x.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.s390x.rpm x86_64: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm i386: ruby-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-irb-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm i386: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-docs-1.8.7.299-7.el6_1.1.i686.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm ruby-ri-1.8.7.299-7.el6_1.1.i686.rpm ruby-static-1.8.7.299-7.el6_1.1.i686.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm x86_64: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-0188.html https://www.redhat.com/security/data/cve/CVE-2011-1004.html https://www.redhat.com/security/data/cve/CVE-2011-1005.html https://access.redhat.com/security/updates/classification/#moderate http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/ http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOChFrXlSAg2UNWIIRAqVDAKC4AQkDB5prIP2m6NnD6qfX0sYGkACeOH7K 8UV4ULTNCtKEbwxTKay8Ilk= =Nsw7 -----END PGP SIGNATURE-----