From bugzilla at redhat.com Tue Apr 2 20:10:59 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:10:59 +0000 Subject: [RHSA-2013:0695-01] Important: kernel security update Message-ID: <201304022011.r32KAx3h000331@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2013:0695-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0695.html Issue date: 2013-04-02 CVE Names: CVE-2013-0871 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue are now available for Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: * A race condition was found in the way the Linux kernel's ptrace implementation handled PTRACE_SETREGS requests when the debuggee was woken due to a SIGKILL signal instead of being stopped. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2013-0871, Important) Users should upgrade to these updated packages, which contain a backported patch to correct this issue. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 911937 - CVE-2013-0871 kernel: race condition with PTRACE_SETREGS 6. Package List: Red Hat Enterprise Linux EUS (v. 5.6 server): Source: kernel-2.6.18-238.49.1.el5.src.rpm i386: kernel-2.6.18-238.49.1.el5.i686.rpm kernel-PAE-2.6.18-238.49.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.49.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.49.1.el5.i686.rpm kernel-debug-2.6.18-238.49.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.49.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.49.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.49.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.49.1.el5.i686.rpm kernel-devel-2.6.18-238.49.1.el5.i686.rpm kernel-headers-2.6.18-238.49.1.el5.i386.rpm kernel-xen-2.6.18-238.49.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.49.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.49.1.el5.i686.rpm ia64: kernel-2.6.18-238.49.1.el5.ia64.rpm kernel-debug-2.6.18-238.49.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-238.49.1.el5.ia64.rpm kernel-debug-devel-2.6.18-238.49.1.el5.ia64.rpm kernel-debuginfo-2.6.18-238.49.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-238.49.1.el5.ia64.rpm kernel-devel-2.6.18-238.49.1.el5.ia64.rpm kernel-headers-2.6.18-238.49.1.el5.ia64.rpm kernel-xen-2.6.18-238.49.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-238.49.1.el5.ia64.rpm kernel-xen-devel-2.6.18-238.49.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-238.49.1.el5.noarch.rpm ppc: kernel-2.6.18-238.49.1.el5.ppc64.rpm kernel-debug-2.6.18-238.49.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-238.49.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-238.49.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-238.49.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-238.49.1.el5.ppc64.rpm kernel-devel-2.6.18-238.49.1.el5.ppc64.rpm kernel-headers-2.6.18-238.49.1.el5.ppc.rpm kernel-headers-2.6.18-238.49.1.el5.ppc64.rpm kernel-kdump-2.6.18-238.49.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-238.49.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-238.49.1.el5.ppc64.rpm s390x: kernel-2.6.18-238.49.1.el5.s390x.rpm kernel-debug-2.6.18-238.49.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-238.49.1.el5.s390x.rpm kernel-debug-devel-2.6.18-238.49.1.el5.s390x.rpm kernel-debuginfo-2.6.18-238.49.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-238.49.1.el5.s390x.rpm kernel-devel-2.6.18-238.49.1.el5.s390x.rpm kernel-headers-2.6.18-238.49.1.el5.s390x.rpm kernel-kdump-2.6.18-238.49.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-238.49.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-238.49.1.el5.s390x.rpm x86_64: kernel-2.6.18-238.49.1.el5.x86_64.rpm kernel-debug-2.6.18-238.49.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.49.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.49.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.49.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.49.1.el5.x86_64.rpm kernel-devel-2.6.18-238.49.1.el5.x86_64.rpm kernel-headers-2.6.18-238.49.1.el5.x86_64.rpm kernel-xen-2.6.18-238.49.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.49.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.49.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0871.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWztJXlSAg2UNWIIRAh2ZAJ47LByBmiPqXHueDTpZOxiqa2WI6QCfXrmL EB/XUSHUaKIQ7+2p0RtRG8E= =YyZP -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 2 20:11:57 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:11:57 +0000 Subject: [RHSA-2013:0696-01] Critical: firefox security update Message-ID: <201304022011.r32KBwhV012539@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2013:0696-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0696.html Issue date: 2013-04-02 CVE Names: CVE-2013-0788 CVE-2013-0793 CVE-2013-0795 CVE-2013-0796 CVE-2013-0800 ===================================================================== 1. Summary: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2013-0788) A flaw was found in the way Same Origin Wrappers were implemented in Firefox. A malicious site could use this flaw to bypass the same-origin policy and execute arbitrary code with the privileges of the user running Firefox. (CVE-2013-0795) A flaw was found in the embedded WebGL library in Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. Note: This issue only affected systems using the Intel Mesa graphics drivers. (CVE-2013-0796) An out-of-bounds write flaw was found in the embedded Cairo library in Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2013-0800) A flaw was found in the way Firefox handled the JavaScript history functions. A malicious site could cause a web page to be displayed that has a baseURI pointing to a different site, allowing cross-site scripting (XSS) and phishing attacks. (CVE-2013-0793) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, Joe Drew, Cody Crews, miaubiz, Abhishek Arya, and Mariusz Mlynski as the original reporters of these issues. For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 17.0.5 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. All Firefox users should upgrade to these updated packages, which contain Firefox version 17.0.5 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 946927 - CVE-2013-0788 Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30) 946929 - CVE-2013-0800 Mozilla: Out-of-bounds write in Cairo library (MFSA 2013-31) 946931 - CVE-2013-0796 Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35) 946932 - CVE-2013-0795 Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36) 946935 - CVE-2013-0793 Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-17.0.5-1.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-17.0.5-1.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-17.0.5-1.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-17.0.5-1.el5_9.src.rpm i386: firefox-17.0.5-1.el5_9.i386.rpm firefox-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-17.0.5-1.el5_9.i386.rpm xulrunner-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm x86_64: firefox-17.0.5-1.el5_9.i386.rpm firefox-17.0.5-1.el5_9.i386.rpm firefox-17.0.5-1.el5_9.x86_64.rpm firefox-17.0.5-1.el5_9.x86_64.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.x86_64.rpm firefox-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-17.0.5-1.el5_9.i386.rpm xulrunner-17.0.5-1.el5_9.i386.rpm xulrunner-17.0.5-1.el5_9.x86_64.rpm xulrunner-17.0.5-1.el5_9.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-17.0.5-1.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-17.0.5-1.el5_9.src.rpm i386: xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm x86_64: xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.x86_64.rpm xulrunner-devel-17.0.5-1.el5_9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-17.0.5-1.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-17.0.5-1.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-17.0.5-1.el5_9.src.rpm i386: firefox-17.0.5-1.el5_9.i386.rpm firefox-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm ia64: firefox-17.0.5-1.el5_9.ia64.rpm firefox-17.0.5-1.el5_9.ia64.rpm firefox-debuginfo-17.0.5-1.el5_9.ia64.rpm firefox-debuginfo-17.0.5-1.el5_9.ia64.rpm xulrunner-17.0.5-1.el5_9.ia64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.ia64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.ia64.rpm xulrunner-devel-17.0.5-1.el5_9.ia64.rpm xulrunner-devel-17.0.5-1.el5_9.ia64.rpm ppc: firefox-17.0.5-1.el5_9.ppc.rpm firefox-17.0.5-1.el5_9.ppc.rpm firefox-debuginfo-17.0.5-1.el5_9.ppc.rpm firefox-debuginfo-17.0.5-1.el5_9.ppc.rpm xulrunner-17.0.5-1.el5_9.ppc.rpm xulrunner-17.0.5-1.el5_9.ppc64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.ppc.rpm xulrunner-debuginfo-17.0.5-1.el5_9.ppc.rpm xulrunner-debuginfo-17.0.5-1.el5_9.ppc64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.ppc64.rpm xulrunner-devel-17.0.5-1.el5_9.ppc.rpm xulrunner-devel-17.0.5-1.el5_9.ppc64.rpm s390x: firefox-17.0.5-1.el5_9.s390.rpm firefox-17.0.5-1.el5_9.s390.rpm firefox-17.0.5-1.el5_9.s390x.rpm firefox-17.0.5-1.el5_9.s390x.rpm firefox-debuginfo-17.0.5-1.el5_9.s390.rpm firefox-debuginfo-17.0.5-1.el5_9.s390.rpm firefox-debuginfo-17.0.5-1.el5_9.s390x.rpm firefox-debuginfo-17.0.5-1.el5_9.s390x.rpm xulrunner-17.0.5-1.el5_9.s390.rpm xulrunner-17.0.5-1.el5_9.s390x.rpm xulrunner-debuginfo-17.0.5-1.el5_9.s390.rpm xulrunner-debuginfo-17.0.5-1.el5_9.s390.rpm xulrunner-debuginfo-17.0.5-1.el5_9.s390x.rpm xulrunner-debuginfo-17.0.5-1.el5_9.s390x.rpm xulrunner-devel-17.0.5-1.el5_9.s390.rpm xulrunner-devel-17.0.5-1.el5_9.s390x.rpm x86_64: firefox-17.0.5-1.el5_9.i386.rpm firefox-17.0.5-1.el5_9.i386.rpm firefox-17.0.5-1.el5_9.x86_64.rpm firefox-17.0.5-1.el5_9.x86_64.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.i386.rpm firefox-debuginfo-17.0.5-1.el5_9.x86_64.rpm firefox-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-17.0.5-1.el5_9.i386.rpm xulrunner-17.0.5-1.el5_9.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.i386.rpm xulrunner-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el5_9.x86_64.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.i386.rpm xulrunner-devel-17.0.5-1.el5_9.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm i386: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm x86_64: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm i386: xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm x86_64: xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm x86_64: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm i386: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm ppc64: firefox-17.0.5-1.el6_4.ppc.rpm firefox-17.0.5-1.el6_4.ppc.rpm firefox-17.0.5-1.el6_4.ppc64.rpm firefox-17.0.5-1.el6_4.ppc64.rpm firefox-debuginfo-17.0.5-1.el6_4.ppc.rpm firefox-debuginfo-17.0.5-1.el6_4.ppc.rpm firefox-debuginfo-17.0.5-1.el6_4.ppc64.rpm firefox-debuginfo-17.0.5-1.el6_4.ppc64.rpm xulrunner-17.0.5-1.el6_4.ppc.rpm xulrunner-17.0.5-1.el6_4.ppc.rpm xulrunner-17.0.5-1.el6_4.ppc64.rpm xulrunner-17.0.5-1.el6_4.ppc64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc64.rpm s390x: firefox-17.0.5-1.el6_4.s390.rpm firefox-17.0.5-1.el6_4.s390.rpm firefox-17.0.5-1.el6_4.s390x.rpm firefox-17.0.5-1.el6_4.s390x.rpm firefox-debuginfo-17.0.5-1.el6_4.s390.rpm firefox-debuginfo-17.0.5-1.el6_4.s390.rpm firefox-debuginfo-17.0.5-1.el6_4.s390x.rpm firefox-debuginfo-17.0.5-1.el6_4.s390x.rpm xulrunner-17.0.5-1.el6_4.s390.rpm xulrunner-17.0.5-1.el6_4.s390.rpm xulrunner-17.0.5-1.el6_4.s390x.rpm xulrunner-17.0.5-1.el6_4.s390x.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390x.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390x.rpm x86_64: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm i386: xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm ppc64: xulrunner-debuginfo-17.0.5-1.el6_4.ppc.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.ppc64.rpm xulrunner-devel-17.0.5-1.el6_4.ppc.rpm xulrunner-devel-17.0.5-1.el6_4.ppc.rpm xulrunner-devel-17.0.5-1.el6_4.ppc64.rpm xulrunner-devel-17.0.5-1.el6_4.ppc64.rpm s390x: xulrunner-debuginfo-17.0.5-1.el6_4.s390.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390x.rpm xulrunner-debuginfo-17.0.5-1.el6_4.s390x.rpm xulrunner-devel-17.0.5-1.el6_4.s390.rpm xulrunner-devel-17.0.5-1.el6_4.s390.rpm xulrunner-devel-17.0.5-1.el6_4.s390x.rpm xulrunner-devel-17.0.5-1.el6_4.s390x.rpm x86_64: xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm i386: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm x86_64: firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.i686.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.i686.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm firefox-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.i686.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-17.0.5-1.el6_4.src.rpm i386: xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm x86_64: xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.i686.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-debuginfo-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.i686.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm xulrunner-devel-17.0.5-1.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0788.html https://www.redhat.com/security/data/cve/CVE-2013-0793.html https://www.redhat.com/security/data/cve/CVE-2013-0795.html https://www.redhat.com/security/data/cve/CVE-2013-0796.html https://www.redhat.com/security/data/cve/CVE-2013-0800.html https://access.redhat.com/security/updates/classification/#critical http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWzt5XlSAg2UNWIIRAobXAJ9/uirvEeOiGpegRbi/Fdtv9BRXUACeMYpK taMjOQZpo7Ea1JPyhBWhy7M= =2sCd -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 2 20:12:30 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:12:30 +0000 Subject: [RHSA-2013:0697-01] Important: thunderbird security update Message-ID: <201304022012.r32KCV2p001061@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: thunderbird security update Advisory ID: RHSA-2013:0697-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0697.html Issue date: 2013-04-02 CVE Names: CVE-2013-0788 CVE-2013-0793 CVE-2013-0795 CVE-2013-0796 CVE-2013-0800 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2013-0788) A flaw was found in the way Same Origin Wrappers were implemented in Thunderbird. Malicious content could use this flaw to bypass the same-origin policy and execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2013-0795) A flaw was found in the embedded WebGL library in Thunderbird. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. Note: This issue only affected systems using the Intel Mesa graphics drivers. (CVE-2013-0796) An out-of-bounds write flaw was found in the embedded Cairo library in Thunderbird. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2013-0800) A flaw was found in the way Thunderbird handled the JavaScript history functions. Malicious content could cause a page to be displayed that has a baseURI pointing to a different site, allowing cross-site scripting (XSS) and phishing attacks. (CVE-2013-0793) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, Joe Drew, Cody Crews, miaubiz, Abhishek Arya, and Mariusz Mlynski as the original reporters of these issues. Note: All issues except CVE-2013-0800 cannot be exploited by a specially-crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. All Thunderbird users should upgrade to this updated package, which contains Thunderbird version 17.0.5 ESR, which corrects these issues. After installing the update, Thunderbird must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 946927 - CVE-2013-0788 Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30) 946929 - CVE-2013-0800 Mozilla: Out-of-bounds write in Cairo library (MFSA 2013-31) 946931 - CVE-2013-0796 Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35) 946932 - CVE-2013-0795 Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36) 946935 - CVE-2013-0793 Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-17.0.5-1.el5_9.src.rpm i386: thunderbird-17.0.5-1.el5_9.i386.rpm thunderbird-debuginfo-17.0.5-1.el5_9.i386.rpm x86_64: thunderbird-17.0.5-1.el5_9.x86_64.rpm thunderbird-debuginfo-17.0.5-1.el5_9.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server) : Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-17.0.5-1.el5_9.src.rpm i386: thunderbird-17.0.5-1.el5_9.i386.rpm thunderbird-debuginfo-17.0.5-1.el5_9.i386.rpm x86_64: thunderbird-17.0.5-1.el5_9.x86_64.rpm thunderbird-debuginfo-17.0.5-1.el5_9.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-17.0.5-1.el6_4.src.rpm i386: thunderbird-17.0.5-1.el6_4.i686.rpm thunderbird-debuginfo-17.0.5-1.el6_4.i686.rpm x86_64: thunderbird-17.0.5-1.el6_4.x86_64.rpm thunderbird-debuginfo-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-17.0.5-1.el6_4.src.rpm i386: thunderbird-17.0.5-1.el6_4.i686.rpm thunderbird-debuginfo-17.0.5-1.el6_4.i686.rpm ppc64: thunderbird-17.0.5-1.el6_4.ppc64.rpm thunderbird-debuginfo-17.0.5-1.el6_4.ppc64.rpm s390x: thunderbird-17.0.5-1.el6_4.s390x.rpm thunderbird-debuginfo-17.0.5-1.el6_4.s390x.rpm x86_64: thunderbird-17.0.5-1.el6_4.x86_64.rpm thunderbird-debuginfo-17.0.5-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-17.0.5-1.el6_4.src.rpm i386: thunderbird-17.0.5-1.el6_4.i686.rpm thunderbird-debuginfo-17.0.5-1.el6_4.i686.rpm x86_64: thunderbird-17.0.5-1.el6_4.x86_64.rpm thunderbird-debuginfo-17.0.5-1.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0788.html https://www.redhat.com/security/data/cve/CVE-2013-0793.html https://www.redhat.com/security/data/cve/CVE-2013-0795.html https://www.redhat.com/security/data/cve/CVE-2013-0796.html https://www.redhat.com/security/data/cve/CVE-2013-0800.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWzugXlSAg2UNWIIRAnCnAJoDruA5cPyS86KWAlLLzWn5Ey5GhgCghjLv HoC1MilQismXf0G+m2J5hN0= =LtV1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 2 20:13:11 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:13:11 +0000 Subject: [RHSA-2013:0698-01] Moderate: rubygem-actionpack and ruby193-rubygem-actionpack security update Message-ID: <201304022013.r32KDB8h027018@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rubygem-actionpack and ruby193-rubygem-actionpack security update Advisory ID: RHSA-2013:0698-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0698.html Issue date: 2013-04-02 CVE Names: CVE-2013-1855 CVE-2013-1857 ===================================================================== 1. Summary: Updated rubygem-actionpack and ruby193-rubygem-actionpack packages that fix two security issues are now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Infrastructure - noarch Red Hat OpenShift Enterprise Node - noarch 3. Description: Ruby on Rails is a model?view?controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Two cross-site scripting (XSS) flaws were found in rubygem-actionpack and ruby193-rubygem-actionpack. A remote attacker could use these flaws to conduct XSS attacks against users of an application using rubygem-actionpack or ruby193-rubygem-actionpack. (CVE-2013-1855, CVE-2013-1857) Red Hat would like to thank Ruby on Rails upstream for reporting these issues. Upstream acknowledges Charlie Somerville as the original reporter of CVE-2013-1855, and Alan Jenkins as the original reporter of CVE-2013-1857. Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 921331 - CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css 921335 - CVE-2013-1857 rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails 6. Package List: Red Hat OpenShift Enterprise Infrastructure: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-actionpack-3.2.8-5.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/rubygem-actionpack-3.0.13-8.el6op.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-5.el6.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-5.el6.noarch.rpm rubygem-actionpack-3.0.13-8.el6op.noarch.rpm Red Hat OpenShift Enterprise Node: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-actionpack-3.2.8-5.el6.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-5.el6.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-5.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1855.html https://www.redhat.com/security/data/cve/CVE-2013-1857.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWzu4XlSAg2UNWIIRAoyMAJ4x5JP6kspo2S397NzcvHyuURpbAgCfdq/f mO63Lovs7yGOPs6y6tDtwbA= =+UTo -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 2 20:13:34 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:13:34 +0000 Subject: [RHSA-2013:0699-01] Moderate: ruby193-rubygem-activerecord security update Message-ID: <201304022013.r32KDZRr010106@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ruby193-rubygem-activerecord security update Advisory ID: RHSA-2013:0699-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0699.html Issue date: 2013-04-02 CVE Names: CVE-2013-1854 ===================================================================== 1. Summary: Updated ruby193-rubygem-activerecord packages that fix one security issue are now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Infrastructure - noarch Red Hat OpenShift Enterprise Node - noarch 3. Description: Ruby on Rails is a model?view?controller (MVC) framework for web application development. Active Record implements object-relational mapping for accessing database entries using objects. A flaw was found in the way hashes were handled in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially-crafted queries that would result in the creation of Ruby symbols, which were never garbage collected. (CVE-2013-1854) Red Hat would like to thank Ruby on Rails upstream for reporting this issue. Upstream acknowledges Ben Murphy as the original reporter. Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 921329 - CVE-2013-1854 rubygem-activerecord: attribute_dos Symbol DoS vulnerability 6. Package List: Red Hat OpenShift Enterprise Infrastructure: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-activerecord-3.2.8-6.el6.src.rpm noarch: ruby193-rubygem-activerecord-3.2.8-6.el6.noarch.rpm ruby193-rubygem-activerecord-doc-3.2.8-6.el6.noarch.rpm Red Hat OpenShift Enterprise Node: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-activerecord-3.2.8-6.el6.src.rpm noarch: ruby193-rubygem-activerecord-3.2.8-6.el6.noarch.rpm ruby193-rubygem-activerecord-doc-3.2.8-6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1854.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWzvgXlSAg2UNWIIRAiwEAJ9Mb0asrJXhRkAqFWxCYjOgkgGaMACfcY2q kI8o9Q2DEaoiE7+8Pz3uKoY= =IGh4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 2 20:13:58 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:13:58 +0000 Subject: [RHSA-2013:0700-01] Moderate: jenkins security update Message-ID: <201304022013.r32KDwxx001371@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: jenkins security update Advisory ID: RHSA-2013:0700-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0700.html Issue date: 2013-04-02 CVE Names: CVE-2013-0253 ===================================================================== 1. Summary: An updated jenkins package that fixes one security issue is now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Node - noarch 3. Description: Jenkins is a continuous integration server. It was found that all SSL certificate checking was disabled by default in the Apache Maven Wagon plug-in of Jenkins. This would make it easy for an attacker to perform man-in-the-middle attacks. (CVE-2013-0253) Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to this updated package, which corrects this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 917084 - CVE-2013-0253 maven-wagon: all SSL certificate checking is disabled by default 6. Package List: Red Hat OpenShift Enterprise Node: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/jenkins-1.506-1.el6op.src.rpm noarch: jenkins-1.506-1.el6op.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0253.html https://access.redhat.com/security/updates/classification/#moderate https://maven.apache.org/security.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWzv3XlSAg2UNWIIRAqkaAJwIqo891I5fW6DXUQAiy9YZpnVi9wCfS3yu /amDmen9ElsK3CcdpZUqMcM= =X46W -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 2 20:14:23 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Apr 2013 20:14:23 +0000 Subject: [RHSA-2013:0701-01] Moderate: ruby193-ruby, rubygem-json and rubygem-rdoc security update Message-ID: <201304022014.r32KENwd010301@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ruby193-ruby, rubygem-json and rubygem-rdoc security update Advisory ID: RHSA-2013:0701-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0701.html Issue date: 2013-04-02 CVE Names: CVE-2013-0256 CVE-2013-0269 ===================================================================== 1. Summary: Updated ruby193-ruby, rubygem-json and rubygem-rdoc packages that fix two security issues are now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Infrastructure - noarch, x86_64 Red Hat OpenShift Enterprise Node - noarch, x86_64 3. Description: Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. A flaw in rubygem-json and ruby193-rubygem-json allowed remote attacks by creating different types of malicious objects. For example, it could initiate a denial of service attack through resource consumption by using a JSON document to create arbitrary Ruby symbols, which were never garbage collected. It could also be exploited to create internal objects which could allow a SQL injection attack. (CVE-2013-0269) It was found that documentation created by rubygem-rdoc and ruby193-rubygem-rdoc was vulnerable to a cross-site scripting (XSS) attack. If such documentation was accessible over a network, and a remote attacker could trick a user into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's session. As rubygem-rdoc and ruby193-rubygem-rdoc are used for creating documentation for Ruby source files (such as classes, modules, and so on), it is not a common scenario to make such documentation accessible over the network. (CVE-2013-0256) Red Hat would like to thank Ruby on Rails upstream for reporting CVE-2013-0269, and Eric Hodel of RDoc upstream for reporting CVE-2013-0256. Upstream acknowledges Thomas Hollstegge of Zweitag and Ben Murphy as the original reporters of CVE-2013-0269, and Evgeny Ermakov as the original reporter of CVE-2013-0256. Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 907820 - CVE-2013-0256 rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template 909029 - CVE-2013-0269 rubygem-json: Denial of Service and SQL Injection 6. Package List: Red Hat OpenShift Enterprise Infrastructure: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-ruby-1.9.3.327-28.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/rubygem-json-1.7.3-2.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/rubygem-rdoc-3.8-9.el6op.src.rpm noarch: ruby193-ruby-irb-1.9.3.327-28.el6.noarch.rpm ruby193-rubygem-minitest-2.5.1-28.el6.noarch.rpm ruby193-rubygem-rake-0.9.2.2-28.el6.noarch.rpm ruby193-rubygems-1.8.23-28.el6.noarch.rpm ruby193-rubygems-devel-1.8.23-28.el6.noarch.rpm rubygem-json-doc-1.7.3-2.el6op.noarch.rpm rubygem-rdoc-3.8-9.el6op.noarch.rpm rubygem-rdoc-doc-3.8-9.el6op.noarch.rpm x86_64: ruby193-ruby-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-debuginfo-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-devel-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-doc-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-libs-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-tcltk-1.9.3.327-28.el6.x86_64.rpm ruby193-rubygem-bigdecimal-1.1.0-28.el6.x86_64.rpm ruby193-rubygem-io-console-0.3-28.el6.x86_64.rpm ruby193-rubygem-json-1.5.4-28.el6.x86_64.rpm ruby193-rubygem-rdoc-3.9.4-28.el6.x86_64.rpm rubygem-json-1.7.3-2.el6op.x86_64.rpm rubygem-json-debuginfo-1.7.3-2.el6op.x86_64.rpm Red Hat OpenShift Enterprise Node: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-ruby-1.9.3.327-28.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/rubygem-json-1.7.3-2.el6op.src.rpm noarch: ruby193-ruby-irb-1.9.3.327-28.el6.noarch.rpm ruby193-rubygem-minitest-2.5.1-28.el6.noarch.rpm ruby193-rubygem-rake-0.9.2.2-28.el6.noarch.rpm ruby193-rubygems-1.8.23-28.el6.noarch.rpm ruby193-rubygems-devel-1.8.23-28.el6.noarch.rpm rubygem-json-doc-1.7.3-2.el6op.noarch.rpm x86_64: ruby193-ruby-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-debuginfo-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-devel-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-doc-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-libs-1.9.3.327-28.el6.x86_64.rpm ruby193-ruby-tcltk-1.9.3.327-28.el6.x86_64.rpm ruby193-rubygem-bigdecimal-1.1.0-28.el6.x86_64.rpm ruby193-rubygem-io-console-0.3-28.el6.x86_64.rpm ruby193-rubygem-json-1.5.4-28.el6.x86_64.rpm ruby193-rubygem-rdoc-3.9.4-28.el6.x86_64.rpm rubygem-json-1.7.3-2.el6op.x86_64.rpm rubygem-json-debuginfo-1.7.3-2.el6op.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0256.html https://www.redhat.com/security/data/cve/CVE-2013-0269.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRWzwOXlSAg2UNWIIRAsgGAKC/+V/ZJ73DaSX2B8zpkjpkHaXE3QCgnTK9 /uENmjMVU90nJajOPJHBIcM= =2G61 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 4 20:21:20 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Apr 2013 20:21:20 +0000 Subject: [RHSA-2013:0707-01] Moderate: openstack-glance security and bug fix update Message-ID: <201304042021.r34KLKCN011168@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-glance security and bug fix update Advisory ID: RHSA-2013:0707-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0707.html Issue date: 2013-04-04 CVE Names: CVE-2013-1840 ===================================================================== 1. Summary: Updated openstack-glance packages that fix one security issue and various bugs are now available for Red Hat OpenStack Folsom. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: OpenStack Folsom - noarch 3. Description: These packages provide a service (code name Glance) that acts as a registry for virtual machine images. An information leak flaw was found in the way Glance handled certain image requests. If caching were enabled, an authenticated user could use this flaw to obtain Glance's OpenStack Swift or Amazon Simple Storage Service (Amazon S3) credentials. (CVE-2013-1840) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Stuart McLaren (HP) as the original reporter. This update also fixes various bugs in the openstack-glance packages. All users of openstack-glance are advised to upgrade to these updated packages, which correct these issues. After installing the updated packages, the running Glance services must be manually restarted (using "service [service name] restart") for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 888077 - Glance logs should not include DEBUG by default 915445 - jsonschema version 1.0 breaks glance 917059 - member-delete incorrect status codes on delete already deleted or invalid entry 920393 - CVE-2013-1840 OpenStack Glance: Backend credentials leak in Glance v1 API 923395 - member-delete incorrect status codes on delete already deleted entry 6. Package List: OpenStack Folsom: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-glance-2012.2.3-8.el6ost.src.rpm noarch: openstack-glance-2012.2.3-8.el6ost.noarch.rpm openstack-glance-doc-2012.2.3-8.el6ost.noarch.rpm python-glance-2012.2.3-8.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1840.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRXeCeXlSAg2UNWIIRAk2qAKDAB6SKVO9rp9TmDCnlM1QQ/L3ZVACfW+Jj lHLYd3G9TdmG2LtaxDBfkyM= =X+lu -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 4 20:21:54 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Apr 2013 20:21:54 +0000 Subject: [RHSA-2013:0708-01] Moderate: openstack-keystone security and bug fix update Message-ID: <201304042021.r34KLts2000550@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-keystone security and bug fix update Advisory ID: RHSA-2013:0708-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0708.html Issue date: 2013-04-04 CVE Names: CVE-2013-0270 CVE-2013-1865 ===================================================================== 1. Summary: Updated openstack-keystone packages that fix two security issues and various bugs are now available for Red Hat OpenStack Folsom. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack Folsom - noarch 3. Description: The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. It was found that Keystone did not correctly handle revoked PKI tokens, allowing users with revoked tokens to retain access to resources they should no longer be able to access. (CVE-2013-1865) A flaw was found in the way Keystone handled tenant names in token requests. A request containing an excessively long tenant name could cause Keystone to consume a large amount of CPU and memory. With this update, the maximum HTTP request size is limited to 112k. This can be changed via the "max_request_body_size" option in "/etc/keystone/keystone.conf". (CVE-2013-0270) Red Hat would like to thank the OpenStack project for reporting the CVE-2013-1865 issue. Upstream acknowledges Guang Yee (HP) as the original reporter of CVE-2013-1865. The CVE-2013-0270 issue was discovered by Dan Prince of Red Hat. This update also fixes various bugs in the openstack-keystone packages. All users of openstack-keystone are advised to upgrade to these updated packages, which correct these issues. After installing the updated packages, the Keystone service (openstack-keystone) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 887815 - a comprehensive keystone.conf file should be included in the RPMS(s) 888575 - Keystone's v2.0 API (the only API) is reported as in beta status 909012 - CVE-2013-0270 OpenStack Keystone: Large HTTP request DoS 917208 - PKI tokens are broken after 24 hours 918159 - PKI tokens too long for memcached keys 922230 - CVE-2013-1865 OpenStack keystone: online validation of Keystone PKI tokens bypasses revocation check 6. Package List: OpenStack Folsom: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-keystone-2012.2.3-7.el6ost.src.rpm noarch: openstack-keystone-2012.2.3-7.el6ost.noarch.rpm openstack-keystone-doc-2012.2.3-7.el6ost.noarch.rpm python-keystone-2012.2.3-7.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0270.html https://www.redhat.com/security/data/cve/CVE-2013-1865.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRXeDKXlSAg2UNWIIRAujmAKCgCfPdjT+HdpPSbH5iwUjUS6ABUgCgrmbJ +Lm/R1la6CPbTZggOLcUl4o= =2x3C -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 4 20:22:35 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Apr 2013 20:22:35 +0000 Subject: [RHSA-2013:0709-01] Moderate: openstack-nova security and bug fix update Message-ID: <201304042022.r34KMZuf011964@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-nova security and bug fix update Advisory ID: RHSA-2013:0709-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0709.html Issue date: 2013-04-04 CVE Names: CVE-2013-0335 CVE-2013-1838 ===================================================================== 1. Summary: Updated openstack-nova packages that fix two security issues and various bugs are now available for Red Hat OpenStack Folsom. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack Folsom - noarch 3. Description: The openstack-nova packages provide OpenStack Compute (code name Nova), which provides services for provisioning, managing, and using virtual machine instances. A flaw was found in the way the Nova VNC proxy handled console tokens. In some cases, a console token that was valid for one virtual machine could be used to connect to the console of a different user's virtual machine. Note that this flaw did not bypass the normal user name and password authentication on the virtual machine. The attacker would need to know valid credentials to log into the virtual machine. (CVE-2013-0335) There was no limit on the number of fixed IP addresses a virtual machine could be assigned with. This could lead to a denial of service if an attacker assigned all available IP addresses to their virtual machine. With this update, a default limit of 10 IP addresses per virtual machine is enforced. The "quota_fixed_ips" option in "/etc/nova/nova.conf" can be used to set a higher or lower limit. (CVE-2013-1838) Red Hat would like to thank the OpenStack project for reporting these issues. Upstream acknowledges Loganathan Parthipan (HP) and Rohit Karajgi (NTT Data) as the original, independent reporters of CVE-2013-0335, and Vish Ishaya (Nebula) as the original reporter of CVE-2013-1838. This update also fixes various bugs in the openstack-nova packages. All users of openstack-nova are advised to upgrade to these updated packages, which correct these issues. After installing the updated packages, the running Nova services will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 887968 - RFE: Configurable hardware models for disk/nic based manual user input 891349 - Multi-process launching issue 910727 - Cannot spawn new machines. The scheduler.log says TypeError: can't compare datetime.datetime to NoneType 912284 - with resume_guests_state_on_host_boot=True rebooting host leaves VM's in Error state 915274 - Attempting to 'nova live-migrate' to a non-existing host, it fails, & the instance remains in a perpetual state of MIGRATING 915586 - CVE-2013-0335 OpenStack nova: VNC proxy can connect to the wrong VM 916174 - wrong quota_usages updated when admin deletes instance of common use 916176 - Add a namespace prefix to glance hardware properties used by libvirt 916615 - "preallocate_images" config directive should be added to nova.conf 917534 - Nova: SELinux AVC Errors for "iptables-save" / "iptables-restor". 919648 - CVE-2013-1838 Openstack Nova: DoS by allocating all Fixed IPs 6. Package List: OpenStack Folsom: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-nova-2012.2.3-7.el6ost.src.rpm noarch: openstack-nova-2012.2.3-7.el6ost.noarch.rpm openstack-nova-api-2012.2.3-7.el6ost.noarch.rpm openstack-nova-cert-2012.2.3-7.el6ost.noarch.rpm openstack-nova-common-2012.2.3-7.el6ost.noarch.rpm openstack-nova-compute-2012.2.3-7.el6ost.noarch.rpm openstack-nova-console-2012.2.3-7.el6ost.noarch.rpm openstack-nova-doc-2012.2.3-7.el6ost.noarch.rpm openstack-nova-network-2012.2.3-7.el6ost.noarch.rpm openstack-nova-objectstore-2012.2.3-7.el6ost.noarch.rpm openstack-nova-scheduler-2012.2.3-7.el6ost.noarch.rpm openstack-nova-volume-2012.2.3-7.el6ost.noarch.rpm python-nova-2012.2.3-7.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0335.html https://www.redhat.com/security/data/cve/CVE-2013-1838.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRXeDyXlSAg2UNWIIRAvcUAJ9JlaA7GZDk7OOZ9KAb957eQtmR+ACdGvht 8E64JRvOGBQmkruYn2oui+I= =3C2m -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 4 20:23:03 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Apr 2013 20:23:03 +0000 Subject: [RHSA-2013:0710-01] Important: puppet security update Message-ID: <201304042023.r34KN4Bq003288@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: puppet security update Advisory ID: RHSA-2013:0710-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0710.html Issue date: 2013-04-04 CVE Names: CVE-2012-6120 CVE-2013-1640 CVE-2013-1652 CVE-2013-1654 CVE-2013-2274 CVE-2013-2275 ===================================================================== 1. Summary: Updated puppet packages that fix several security issues are now available for Red Hat OpenStack Folsom. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack Folsom - noarch 3. Description: Puppet allows provisioning, patching, and configuration of clients to be managed and automated. A flaw was found in how Puppet handled certain HTTP PUT requests. An attacker with valid authentication credentials, and authorized to save to the authenticated client's own report, could construct a malicious request that could possibly cause the Puppet master to execute arbitrary code. (CVE-2013-2274) A flaw was found in how Puppet handled the "template" and "inline_template" functions during catalog compilation. If an authenticated attacker were to requests its catalog from the Puppet master, it could possibly result in arbitrary code execution when the catalog is compiled. (CVE-2013-1640) A flaw was found in how Puppet handled certain HTTP GET requests. An attacker with valid authentication credentials could construct a request to retrieve catalogs from the Puppet master that they are not authorized to access. (CVE-2013-1652) It was found that the default /etc/puppet/auth.conf configuration file allowed an authenticated node to submit a report for any other node, which could breach compliance requirements. (CVE-2013-2275) It was found that the /var/log/puppet directory was created world-readable. This could allow local users to obtain sensitive information from the Puppet log files. (CVE-2012-6120) It was found that Puppet allowed the use of the SSLv2 protocol. A Puppet agent could use this to negotiate the use of the weak SSLv2 protocol for its connection to a Puppet master. (CVE-2013-1654) Red Hat would like to thank Puppet Labs for reporting CVE-2013-1640, CVE-2013-1652, CVE-2013-1654, CVE-2013-2274, and CVE-2013-2275. Note: In most default configurations these issues are not directly exploitable unless the attacker has access to the underlying OpenStack infrastructure (e.g. shell access to a Nova compute node). Users of Red Hat OpenStack Folsom are advised to upgrade to these updated packages, which upgrade Puppet to version 2.6.18 and correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 908629 - CVE-2012-6120 Puppet: Directory /var/log/puppet is world readable 919770 - CVE-2013-1654 Puppet: SSL protocol downgrade 919773 - CVE-2013-2274 Puppet: HTTP PUT report saving code execution vulnerability 919783 - CVE-2013-1640 Puppet: catalog request code execution 919784 - CVE-2013-1652 Puppet: HTTP GET request catalog retrieval 919785 - CVE-2013-2275 Puppet: default auth.conf allows authenticated node to submit a report for any other node 6. Package List: OpenStack Folsom: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/puppet-2.6.18-1.el6ost.src.rpm noarch: puppet-2.6.18-1.el6ost.noarch.rpm puppet-server-2.6.18-1.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-6120.html https://www.redhat.com/security/data/cve/CVE-2013-1640.html https://www.redhat.com/security/data/cve/CVE-2013-1652.html https://www.redhat.com/security/data/cve/CVE-2013-1654.html https://www.redhat.com/security/data/cve/CVE-2013-2274.html https://www.redhat.com/security/data/cve/CVE-2013-2275.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRXeEWXlSAg2UNWIIRAg5BAJsE5+PAglk11qGp7T6oSne0HRWNFACcCEUg 0Obt7H7Owwa3ukyrJWsPvns= =ago7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 8 17:51:47 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 8 Apr 2013 17:51:47 +0000 Subject: [RHSA-2013:0714-01] Moderate: stunnel security update Message-ID: <201304081751.r38Hpm3L032483@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: stunnel security update Advisory ID: RHSA-2013:0714-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0714.html Issue date: 2013-04-08 CVE Names: CVE-2013-1762 ===================================================================== 1. Summary: An updated stunnel package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: stunnel is a socket wrapper which can provide SSL (Secure Sockets Layer) support to ordinary applications. For example, it can be used in conjunction with imapd to create an SSL-secure IMAP server. An integer conversion issue was found in stunnel when using Microsoft NT LAN Manager (NTLM) authentication with the HTTP CONNECT tunneling method. With this configuration, and using stunnel in SSL client mode on a 64-bit system, an attacker could possibly execute arbitrary code with the privileges of the stunnel process via a man-in-the-middle attack or by tricking a user into using a malicious proxy. (CVE-2013-1762) All stunnel users should upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 917839 - CVE-2013-1762 Stunnel: buffer overflow vulnerability due to incorrect integer conversion in the NTLM authentication of the CONNECT protocol negotiation 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/stunnel-4.29-3.el6_4.src.rpm i386: stunnel-4.29-3.el6_4.i686.rpm stunnel-debuginfo-4.29-3.el6_4.i686.rpm x86_64: stunnel-4.29-3.el6_4.x86_64.rpm stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/stunnel-4.29-3.el6_4.src.rpm x86_64: stunnel-4.29-3.el6_4.x86_64.rpm stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/stunnel-4.29-3.el6_4.src.rpm i386: stunnel-4.29-3.el6_4.i686.rpm stunnel-debuginfo-4.29-3.el6_4.i686.rpm ppc64: stunnel-4.29-3.el6_4.ppc64.rpm stunnel-debuginfo-4.29-3.el6_4.ppc64.rpm s390x: stunnel-4.29-3.el6_4.s390x.rpm stunnel-debuginfo-4.29-3.el6_4.s390x.rpm x86_64: stunnel-4.29-3.el6_4.x86_64.rpm stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/stunnel-4.29-3.el6_4.src.rpm i386: stunnel-4.29-3.el6_4.i686.rpm stunnel-debuginfo-4.29-3.el6_4.i686.rpm x86_64: stunnel-4.29-3.el6_4.x86_64.rpm stunnel-debuginfo-4.29-3.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1762.html https://access.redhat.com/security/updates/classification/#moderate https://www.stunnel.org/CVE-2013-1762.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRYwOcXlSAg2UNWIIRAljyAJ0cN7MlW6RDjyc6QOIVUar0diE9WgCgpIvF 7jls+yQ867GtlMPYsnYEhhk= =xxui -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 9 18:18:06 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Apr 2013 18:18:06 +0000 Subject: [RHSA-2013:0727-01] Important: kvm security update Message-ID: <201304091818.r39II7CM023297@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kvm security update Advisory ID: RHSA-2013:0727-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0727.html Issue date: 2013-04-09 CVE Names: CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 ===================================================================== 1. Summary: Updated kvm packages that fix three security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Multi OS (v. 5 client) - x86_64 RHEL Virtualization (v. 5 server) - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel. A flaw was found in the way KVM handled guest time updates when the buffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) crossed a page boundary. A privileged guest user could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the host kernel level. (CVE-2013-1796) A potential use-after-free flaw was found in the way KVM handled guest time updates when the GPA (guest physical address) the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into a movable or removable memory region of the hosting user-space process (by default, QEMU-KVM) on the host. If that memory region is deregistered from KVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory reused, a privileged guest user could potentially use this flaw to escalate their privileges on the host. (CVE-2013-1797) A flaw was found in the way KVM emulated IOAPIC (I/O Advanced Programmable Interrupt Controller). A missing validation check in the ioapic_read_indirect() function could allow a privileged guest user to crash the host, or read a substantial portion of host kernel memory. (CVE-2013-1798) Red Hat would like to thank Andrew Honig of Google for reporting all of these issues. All users of kvm are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Note that the procedure in the Solution section must be performed before this update will take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 The following procedure must be performed before this update will take effect: 1) Stop all KVM guest virtual machines. 2) Either reboot the hypervisor machine or, as the root user, remove (using "modprobe -r [module]") and reload (using "modprobe [module]") all of the following modules which are currently running (determined using "lsmod"): kvm, ksm, kvm-intel or kvm-amd. 3) Restart the KVM guest virtual machines. 5. Bugs fixed (http://bugzilla.redhat.com/): 917012 - CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME 917013 - CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME 917017 - CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads 6. Package List: RHEL Desktop Multi OS (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kvm-83-262.el5_9.3.src.rpm x86_64: kmod-kvm-83-262.el5_9.3.x86_64.rpm kmod-kvm-debug-83-262.el5_9.3.x86_64.rpm kvm-83-262.el5_9.3.x86_64.rpm kvm-debuginfo-83-262.el5_9.3.x86_64.rpm kvm-qemu-img-83-262.el5_9.3.x86_64.rpm kvm-tools-83-262.el5_9.3.x86_64.rpm RHEL Virtualization (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kvm-83-262.el5_9.3.src.rpm x86_64: kmod-kvm-83-262.el5_9.3.x86_64.rpm kmod-kvm-debug-83-262.el5_9.3.x86_64.rpm kvm-83-262.el5_9.3.x86_64.rpm kvm-debuginfo-83-262.el5_9.3.x86_64.rpm kvm-qemu-img-83-262.el5_9.3.x86_64.rpm kvm-tools-83-262.el5_9.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1796.html https://www.redhat.com/security/data/cve/CVE-2013-1797.html https://www.redhat.com/security/data/cve/CVE-2013-1798.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRZFs9XlSAg2UNWIIRAgXrAKCJNuXie+en5fIBJwNvLrtiVDgI4wCdF+f3 H9YtbsKYBtDBNNpNE7XIrRE= =veGI -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 9 18:18:45 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Apr 2013 18:18:45 +0000 Subject: [RHSA-2013:0728-01] Moderate: rubygem packages security update Message-ID: <201304091818.r39IIjJ3023496@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rubygem packages security update Advisory ID: RHSA-2013:0728-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0728.html Issue date: 2013-04-09 CVE Names: CVE-2013-0256 ===================================================================== 1. Summary: This update fixes one security issue in multiple rubygem packages for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Infrastructure - noarch, x86_64 Red Hat OpenShift Enterprise Node - noarch, x86_64 3. Description: Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks. It was found that documentation created by RDoc was vulnerable to a cross-site scripting (XSS) attack. If such documentation was accessible over a network, and a remote attacker could trick a user into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's session. As RDoc is used for creating documentation for Ruby source files (such as classes, modules, and so on), it is not a common scenario to make such documentation accessible over the network. (CVE-2013-0256) This update provides a number of updated rubygem packages that have had their documentation regenerated with a corrected version of RDoc. Red Hat would like to thank Eric Hodel of RDoc upstream for reporting this issue. Upstream acknowledges Evgeny Ermakov as the original reporter. Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 907820 - CVE-2013-0256 rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template 6. Package List: Red Hat OpenShift Enterprise Infrastructure: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-activesupport-3.2.8-4.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-bcrypt-ruby-3.0.1-7.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-bson-1.5.2-6.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-chunky_png-1.2.6-3.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-ci_reporter-1.7.2-4.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-compass-0.12.2-4.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-fastthread-1.0.7-7.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-haml-3.1.7-3.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-http_connection-1.4.1-7.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-rack-1.4.1-5.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-rack-test-0.6.1-3.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-rspec-2.11.0-2.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-treetop-1.4.10-6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-xml-simple-1.0.12-10.el6op.src.rpm noarch: ruby193-rubygem-activesupport-3.2.8-4.el6.noarch.rpm ruby193-rubygem-bson-1.5.2-6.el6op.noarch.rpm ruby193-rubygem-chunky_png-1.2.6-3.el6op.noarch.rpm ruby193-rubygem-ci_reporter-1.7.2-4.el6op.noarch.rpm ruby193-rubygem-compass-0.12.2-4.el6op.noarch.rpm ruby193-rubygem-haml-3.1.7-3.el6op.noarch.rpm ruby193-rubygem-http_connection-1.4.1-7.el6.noarch.rpm ruby193-rubygem-rack-1.4.1-5.el6.noarch.rpm ruby193-rubygem-rack-test-0.6.1-3.el6.noarch.rpm ruby193-rubygem-rspec-2.11.0-2.el6.noarch.rpm ruby193-rubygem-treetop-1.4.10-6.el6.noarch.rpm ruby193-rubygem-xml-simple-1.0.12-10.el6op.noarch.rpm x86_64: ruby193-rubygem-bcrypt-ruby-3.0.1-7.el6.x86_64.rpm ruby193-rubygem-bcrypt-ruby-debuginfo-3.0.1-7.el6.x86_64.rpm ruby193-rubygem-fastthread-1.0.7-7.el6op.x86_64.rpm ruby193-rubygem-fastthread-debuginfo-1.0.7-7.el6op.x86_64.rpm Red Hat OpenShift Enterprise Node: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-activesupport-3.2.8-4.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-bcrypt-ruby-3.0.1-7.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-bson-1.5.2-6.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-fastthread-1.0.7-7.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-http_connection-1.4.1-7.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-rack-1.4.1-5.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-rack-test-0.6.1-3.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-rspec-2.11.0-2.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-treetop-1.4.10-6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/ruby193-rubygem-xml-simple-1.0.12-10.el6op.src.rpm noarch: ruby193-rubygem-activesupport-3.2.8-4.el6.noarch.rpm ruby193-rubygem-bson-1.5.2-6.el6op.noarch.rpm ruby193-rubygem-http_connection-1.4.1-7.el6.noarch.rpm ruby193-rubygem-rack-1.4.1-5.el6.noarch.rpm ruby193-rubygem-rack-test-0.6.1-3.el6.noarch.rpm ruby193-rubygem-rspec-2.11.0-2.el6.noarch.rpm ruby193-rubygem-treetop-1.4.10-6.el6.noarch.rpm ruby193-rubygem-xml-simple-1.0.12-10.el6op.noarch.rpm x86_64: ruby193-rubygem-bcrypt-ruby-3.0.1-7.el6.x86_64.rpm ruby193-rubygem-bcrypt-ruby-debuginfo-3.0.1-7.el6.x86_64.rpm ruby193-rubygem-fastthread-1.0.7-7.el6op.x86_64.rpm ruby193-rubygem-fastthread-debuginfo-1.0.7-7.el6op.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0256.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRZFtqXlSAg2UNWIIRAshbAKCxPGkyBGcLmyRdyOXvGwHza2q58wCeKdd5 5/hjT/2p6vKqA9NC3/k9NPI= =FX3j -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 9 18:19:46 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Apr 2013 18:19:46 +0000 Subject: [RHSA-2013:0729-01] Moderate: haproxy security update Message-ID: <201304091819.r39IJkrI018846@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: haproxy security update Advisory ID: RHSA-2013:0729-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0729.html Issue date: 2013-04-09 CVE Names: CVE-2013-1912 ===================================================================== 1. Summary: An updated haproxy package that fixes one security issue is now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Node - x86_64 3. Description: HAProxy provides high availability, load balancing, and proxying for TCP and HTTP-based applications. A buffer overflow flaw was found in the way HAProxy handled pipelined HTTP requests. A remote attacker could send pipelined HTTP requests that would cause HAProxy to crash or, potentially, execute arbitrary code with the privileges of the user running HAProxy. This issue only affected systems using all of the following combined configuration options: HTTP keep alive enabled, HTTP keywords in TCP inspection rules, and request appending rules. (CVE-2013-1912) In Red Hat OpenShift Enterprise, the HAProxy cartridge is added to your application when you select to have your application scaled. Due to the way this cartridge is currently used in Red Hat OpenShift Enterprise, the CVE-2013-1912 issue is not exploitable. Red Hat would like to thank Willy Tarreau of HAProxy upstream for reporting this issue. Upstream acknowledges Yves Lafon from the W3C as the original reporter. Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 947581 - CVE-2013-1912 haproxy: rewrite rules flaw can lead to arbitrary code execution 6. Package List: Red Hat OpenShift Enterprise Node: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/haproxy-1.4.22-5.el6op.src.rpm x86_64: haproxy-1.4.22-5.el6op.x86_64.rpm haproxy-debuginfo-1.4.22-5.el6op.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1912.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRZFuRXlSAg2UNWIIRAgRZAJ9vwACCCMK5RUF86E6xbLpnBifDUgCgwIAu becHbVmR7TjeATsqX9gUV/8= =/glT -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 10 09:09:35 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 10 Apr 2013 09:09:35 +0000 Subject: [RHSA-2013:0730-01] Critical: flash-plugin security update Message-ID: <201304100910.r3A9AWCg009082@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2013:0730-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0730.html Issue date: 2013-04-10 CVE Names: CVE-2013-1378 CVE-2013-1379 CVE-2013-1380 CVE-2013-2555 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB13-11, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. (CVE-2013-1378, CVE-2013-1379, CVE-2013-1380, CVE-2013-2555) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.280. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 920186 - CVE-2013-2555 flash-plugin: Remote attackers able to execute arbitrary code via vectors that leverage an 'overflow' (CanSecWest 2013) 950180 - CVE-2013-1378 CVE-2013-1379 CVE-2013-1380 flash-plugin: multiple code execution flaws (APSB13-11) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.280-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.280-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.280-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.280-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.280-2.el6.i686.rpm x86_64: flash-plugin-11.2.202.280-2.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.280-2.el6.i686.rpm x86_64: flash-plugin-11.2.202.280-2.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.280-2.el6.i686.rpm x86_64: flash-plugin-11.2.202.280-2.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1378.html https://www.redhat.com/security/data/cve/CVE-2013-1379.html https://www.redhat.com/security/data/cve/CVE-2013-1380.html https://www.redhat.com/security/data/cve/CVE-2013-2555.html https://access.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb13-11.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRZSx1XlSAg2UNWIIRAr6FAJ4qywRlQEwJ2ZFS1nM2f18anrHFMgCfVl1B IGrWdeCGaTj3hV9QmXS9xkY= =09w+ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 11 17:55:23 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 11 Apr 2013 17:55:23 +0000 Subject: [RHSA-2013:0737-01] Moderate: subversion security update Message-ID: <201304111755.r3BHtNSU030286@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subversion security update Advisory ID: RHSA-2013:0737-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0737.html Issue date: 2013-04-11 CVE Names: CVE-2013-1845 CVE-2013-1846 CVE-2013-1847 CVE-2013-1849 ===================================================================== 1. Summary: Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the "svn propset" command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 929082 - CVE-2013-1845 Subversion (mod_dav_svn): DoS (excessive memory use) when large number of properties are set or deleted 929087 - CVE-2013-1846 Subversion (mod_dav_svn): DoS (crash) via LOCK requests against an activity URL 929090 - CVE-2013-1847 Subversion (mod_dav_svn): DoS (crash) via LOCK requests against a non-existent URL 929093 - CVE-2013-1849 Subversion (mod_dav_svn): DoS (crash) via PROPFIND request made against activity URLs 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/subversion-1.6.11-11.el5_9.src.rpm i386: mod_dav_svn-1.6.11-11.el5_9.i386.rpm subversion-1.6.11-11.el5_9.i386.rpm subversion-debuginfo-1.6.11-11.el5_9.i386.rpm subversion-devel-1.6.11-11.el5_9.i386.rpm subversion-javahl-1.6.11-11.el5_9.i386.rpm subversion-perl-1.6.11-11.el5_9.i386.rpm subversion-ruby-1.6.11-11.el5_9.i386.rpm x86_64: mod_dav_svn-1.6.11-11.el5_9.x86_64.rpm subversion-1.6.11-11.el5_9.i386.rpm subversion-1.6.11-11.el5_9.x86_64.rpm subversion-debuginfo-1.6.11-11.el5_9.i386.rpm subversion-debuginfo-1.6.11-11.el5_9.x86_64.rpm subversion-devel-1.6.11-11.el5_9.i386.rpm subversion-devel-1.6.11-11.el5_9.x86_64.rpm subversion-javahl-1.6.11-11.el5_9.x86_64.rpm subversion-perl-1.6.11-11.el5_9.x86_64.rpm subversion-ruby-1.6.11-11.el5_9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/subversion-1.6.11-11.el5_9.src.rpm i386: mod_dav_svn-1.6.11-11.el5_9.i386.rpm subversion-1.6.11-11.el5_9.i386.rpm subversion-debuginfo-1.6.11-11.el5_9.i386.rpm subversion-devel-1.6.11-11.el5_9.i386.rpm subversion-javahl-1.6.11-11.el5_9.i386.rpm subversion-perl-1.6.11-11.el5_9.i386.rpm subversion-ruby-1.6.11-11.el5_9.i386.rpm ia64: mod_dav_svn-1.6.11-11.el5_9.ia64.rpm subversion-1.6.11-11.el5_9.ia64.rpm subversion-debuginfo-1.6.11-11.el5_9.ia64.rpm subversion-devel-1.6.11-11.el5_9.ia64.rpm subversion-javahl-1.6.11-11.el5_9.ia64.rpm subversion-perl-1.6.11-11.el5_9.ia64.rpm subversion-ruby-1.6.11-11.el5_9.ia64.rpm ppc: mod_dav_svn-1.6.11-11.el5_9.ppc.rpm subversion-1.6.11-11.el5_9.ppc.rpm subversion-1.6.11-11.el5_9.ppc64.rpm subversion-debuginfo-1.6.11-11.el5_9.ppc.rpm subversion-debuginfo-1.6.11-11.el5_9.ppc64.rpm subversion-devel-1.6.11-11.el5_9.ppc.rpm subversion-devel-1.6.11-11.el5_9.ppc64.rpm subversion-javahl-1.6.11-11.el5_9.ppc.rpm subversion-perl-1.6.11-11.el5_9.ppc.rpm subversion-ruby-1.6.11-11.el5_9.ppc.rpm s390x: mod_dav_svn-1.6.11-11.el5_9.s390x.rpm subversion-1.6.11-11.el5_9.s390.rpm subversion-1.6.11-11.el5_9.s390x.rpm subversion-debuginfo-1.6.11-11.el5_9.s390.rpm subversion-debuginfo-1.6.11-11.el5_9.s390x.rpm subversion-devel-1.6.11-11.el5_9.s390.rpm subversion-devel-1.6.11-11.el5_9.s390x.rpm subversion-javahl-1.6.11-11.el5_9.s390x.rpm subversion-perl-1.6.11-11.el5_9.s390x.rpm subversion-ruby-1.6.11-11.el5_9.s390x.rpm x86_64: mod_dav_svn-1.6.11-11.el5_9.x86_64.rpm subversion-1.6.11-11.el5_9.i386.rpm subversion-1.6.11-11.el5_9.x86_64.rpm subversion-debuginfo-1.6.11-11.el5_9.i386.rpm subversion-debuginfo-1.6.11-11.el5_9.x86_64.rpm subversion-devel-1.6.11-11.el5_9.i386.rpm subversion-devel-1.6.11-11.el5_9.x86_64.rpm subversion-javahl-1.6.11-11.el5_9.x86_64.rpm subversion-perl-1.6.11-11.el5_9.x86_64.rpm subversion-ruby-1.6.11-11.el5_9.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/subversion-1.6.11-9.el6_4.src.rpm i386: mod_dav_svn-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm noarch: subversion-svn2cl-1.6.11-9.el6_4.noarch.rpm x86_64: mod_dav_svn-1.6.11-9.el6_4.x86_64.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.x86_64.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.x86_64.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.x86_64.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.x86_64.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.x86_64.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.x86_64.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/subversion-1.6.11-9.el6_4.src.rpm noarch: subversion-svn2cl-1.6.11-9.el6_4.noarch.rpm x86_64: mod_dav_svn-1.6.11-9.el6_4.x86_64.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.x86_64.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.x86_64.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.x86_64.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.x86_64.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.x86_64.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.x86_64.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-9.el6_4.src.rpm i386: mod_dav_svn-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm ppc64: mod_dav_svn-1.6.11-9.el6_4.ppc64.rpm subversion-1.6.11-9.el6_4.ppc.rpm subversion-1.6.11-9.el6_4.ppc64.rpm subversion-debuginfo-1.6.11-9.el6_4.ppc.rpm subversion-debuginfo-1.6.11-9.el6_4.ppc64.rpm s390x: mod_dav_svn-1.6.11-9.el6_4.s390x.rpm subversion-1.6.11-9.el6_4.s390.rpm subversion-1.6.11-9.el6_4.s390x.rpm subversion-debuginfo-1.6.11-9.el6_4.s390.rpm subversion-debuginfo-1.6.11-9.el6_4.s390x.rpm x86_64: mod_dav_svn-1.6.11-9.el6_4.x86_64.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.x86_64.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-9.el6_4.src.rpm i386: subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm noarch: subversion-svn2cl-1.6.11-9.el6_4.noarch.rpm ppc64: subversion-debuginfo-1.6.11-9.el6_4.ppc.rpm subversion-debuginfo-1.6.11-9.el6_4.ppc64.rpm subversion-devel-1.6.11-9.el6_4.ppc.rpm subversion-devel-1.6.11-9.el6_4.ppc64.rpm subversion-gnome-1.6.11-9.el6_4.ppc.rpm subversion-gnome-1.6.11-9.el6_4.ppc64.rpm subversion-javahl-1.6.11-9.el6_4.ppc.rpm subversion-javahl-1.6.11-9.el6_4.ppc64.rpm subversion-kde-1.6.11-9.el6_4.ppc.rpm subversion-kde-1.6.11-9.el6_4.ppc64.rpm subversion-perl-1.6.11-9.el6_4.ppc.rpm subversion-perl-1.6.11-9.el6_4.ppc64.rpm subversion-ruby-1.6.11-9.el6_4.ppc.rpm subversion-ruby-1.6.11-9.el6_4.ppc64.rpm s390x: subversion-debuginfo-1.6.11-9.el6_4.s390.rpm subversion-debuginfo-1.6.11-9.el6_4.s390x.rpm subversion-devel-1.6.11-9.el6_4.s390.rpm subversion-devel-1.6.11-9.el6_4.s390x.rpm subversion-gnome-1.6.11-9.el6_4.s390.rpm subversion-gnome-1.6.11-9.el6_4.s390x.rpm subversion-javahl-1.6.11-9.el6_4.s390.rpm subversion-javahl-1.6.11-9.el6_4.s390x.rpm subversion-kde-1.6.11-9.el6_4.s390.rpm subversion-kde-1.6.11-9.el6_4.s390x.rpm subversion-perl-1.6.11-9.el6_4.s390.rpm subversion-perl-1.6.11-9.el6_4.s390x.rpm subversion-ruby-1.6.11-9.el6_4.s390.rpm subversion-ruby-1.6.11-9.el6_4.s390x.rpm x86_64: subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.x86_64.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.x86_64.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.x86_64.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.x86_64.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-9.el6_4.src.rpm i386: mod_dav_svn-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm x86_64: mod_dav_svn-1.6.11-9.el6_4.x86_64.rpm subversion-1.6.11-9.el6_4.i686.rpm subversion-1.6.11-9.el6_4.x86_64.rpm subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm subversion-javahl-1.6.11-9.el6_4.i686.rpm subversion-javahl-1.6.11-9.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-9.el6_4.src.rpm i386: subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm noarch: subversion-svn2cl-1.6.11-9.el6_4.noarch.rpm x86_64: subversion-debuginfo-1.6.11-9.el6_4.i686.rpm subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm subversion-devel-1.6.11-9.el6_4.i686.rpm subversion-devel-1.6.11-9.el6_4.x86_64.rpm subversion-gnome-1.6.11-9.el6_4.i686.rpm subversion-gnome-1.6.11-9.el6_4.x86_64.rpm subversion-kde-1.6.11-9.el6_4.i686.rpm subversion-kde-1.6.11-9.el6_4.x86_64.rpm subversion-perl-1.6.11-9.el6_4.i686.rpm subversion-perl-1.6.11-9.el6_4.x86_64.rpm subversion-ruby-1.6.11-9.el6_4.i686.rpm subversion-ruby-1.6.11-9.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1845.html https://www.redhat.com/security/data/cve/CVE-2013-1846.html https://www.redhat.com/security/data/cve/CVE-2013-1847.html https://www.redhat.com/security/data/cve/CVE-2013-1849.html https://access.redhat.com/security/updates/classification/#moderate http://subversion.apache.org/security/CVE-2013-1849-advisory.txt http://subversion.apache.org/security/CVE-2013-1845-advisory.txt http://subversion.apache.org/security/CVE-2013-1846-advisory.txt http://subversion.apache.org/security/CVE-2013-1847-advisory.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRZvjgXlSAg2UNWIIRAlJRAJ0XpPuqXLUagfYKve2M4JaQeS2hDQCfSE7V UBZRpRBvOey4KRgVi88F4C8= =LnOt -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 15 18:28:19 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 15 Apr 2013 18:28:19 +0000 Subject: [RHSA-2013:0742-01] Low: 389-ds-base security and bug fix update Message-ID: <201304151828.r3FISJXO008304@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: 389-ds-base security and bug fix update Advisory ID: RHSA-2013:0742-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0742.html Issue date: 2013-04-15 CVE Names: CVE-2013-1897 ===================================================================== 1. Summary: Updated 389-ds-base packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The 389 Directory Server is an LDAPv3 compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. It was found that the 389 Directory Server did not properly restrict access to entries when the "nsslapd-allow-anonymous-access" configuration setting was set to "rootdse". An anonymous user could connect to the LDAP database and, if the search scope is set to BASE, obtain access to information outside of the rootDSE. (CVE-2013-1897) This issue was discovered by Martin Kosek of Red Hat. This update also fixes the following bugs: * Previously, the schema-reload plug-in was not thread-safe. Consequently, executing the schema-reload.pl script under heavy load could have caused the ns-slapd process to terminate unexpectedly with a segmentation fault. Currently, the schema-reload plug-in is re-designed so that it is thread-safe, and the schema-reload.pl script can be executed along with other LDAP operations. (BZ#929107) * An out of scope problem for a local variable, in some cases, caused the modrdn operation to terminate unexpectedly with a segmentation fault. This update declares the local variable at the proper place of the function so it does not go out of scope, and the modrdn operation no longer crashes. (BZ#929111) * A task manually constructed an exact value to be removed from the configuration if the "replica-force-cleaning" option was used. Consequently, the task configuration was not cleaned up, and every time the server was restarted, the task behaved in the described manner. This update searches the configuration for the exact value to delete, instead of manually building the value, and the task does not restart when the server is restarted. (BZ#929114) * Previously, a NULL pointer dereference could have occurred when attempting to get effective rights on an entry that did not exist, leading to an unexpected termination due to a segmentation fault. This update checks for NULL entry pointers and returns the appropriate error. Now, attempts to get effective rights on an entry that does not exist no longer causes crashes, and the server returns the appropriate error message. (BZ#929115) * A problem in the lock timing in the DNA plug-in caused a deadlock if the DNA operation was executed with other plug-ins. This update moves the release timing of the problematic lock, and the DNA plug-in does not cause the deadlock. (BZ#929196) All 389-ds-base users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the 389 server service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 928105 - CVE-2013-1897 389-ds: unintended information exposure when rootdse is enabled 929111 - Crash in MODRDN 929114 - cleanAllRUV task fails to cleanup config upon completion 929115 - crash in aci evaluation 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/389-ds-base-1.2.11.15-14.el6_4.src.rpm i386: 389-ds-base-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm x86_64: 389-ds-base-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/389-ds-base-1.2.11.15-14.el6_4.src.rpm x86_64: 389-ds-base-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/389-ds-base-1.2.11.15-14.el6_4.src.rpm i386: 389-ds-base-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm x86_64: 389-ds-base-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/389-ds-base-1.2.11.15-14.el6_4.src.rpm i386: 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm x86_64: 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/389-ds-base-1.2.11.15-14.el6_4.src.rpm i386: 389-ds-base-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm x86_64: 389-ds-base-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-libs-1.2.11.15-14.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/389-ds-base-1.2.11.15-14.el6_4.src.rpm i386: 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm x86_64: 389-ds-base-debuginfo-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-debuginfo-1.2.11.15-14.el6_4.x86_64.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.i686.rpm 389-ds-base-devel-1.2.11.15-14.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1897.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbEaoXlSAg2UNWIIRAljxAKC0E74UmFHZIXB3kS4NxUnY48OmaACfby4U 4hUo4hx7NbxT/BONVzH3fIQ= =RCm0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 16 19:10:23 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Apr 2013 19:10:23 +0000 Subject: [RHSA-2013:0741-01] Important: kernel security and bug fix update Message-ID: <201304161910.r3GJANPQ022173@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2013:0741-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0741.html Issue date: 2013-04-16 CVE Names: CVE-2012-2133 CVE-2013-0871 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6.2 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server EUS (v. 6.2) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.2) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A race condition was found in the way the Linux kernel's ptrace implementation handled PTRACE_SETREGS requests when the debuggee was woken due to a SIGKILL signal instead of being stopped. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2013-0871, Important) * A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2012-2133, Moderate) Red Hat would like to thank Shachar Raindel for reporting CVE-2012-2133. This update also fixes several bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 817430 - CVE-2012-2133 kernel: use after free bug in "quota" handling 911937 - CVE-2013-0871 kernel: race condition with PTRACE_SETREGS 6. Package List: Red Hat Enterprise Linux Server EUS (v. 6.2): Source: kernel-2.6.32-220.34.1.el6.src.rpm i386: kernel-2.6.32-220.34.1.el6.i686.rpm kernel-debug-2.6.32-220.34.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-220.34.1.el6.i686.rpm kernel-debug-devel-2.6.32-220.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.34.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.34.1.el6.i686.rpm kernel-devel-2.6.32-220.34.1.el6.i686.rpm kernel-headers-2.6.32-220.34.1.el6.i686.rpm perf-2.6.32-220.34.1.el6.i686.rpm perf-debuginfo-2.6.32-220.34.1.el6.i686.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.i686.rpm noarch: kernel-doc-2.6.32-220.34.1.el6.noarch.rpm kernel-firmware-2.6.32-220.34.1.el6.noarch.rpm ppc64: kernel-2.6.32-220.34.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-220.34.1.el6.ppc64.rpm kernel-debug-2.6.32-220.34.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-220.34.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-220.34.1.el6.ppc64.rpm kernel-devel-2.6.32-220.34.1.el6.ppc64.rpm kernel-headers-2.6.32-220.34.1.el6.ppc64.rpm perf-2.6.32-220.34.1.el6.ppc64.rpm perf-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm s390x: kernel-2.6.32-220.34.1.el6.s390x.rpm kernel-debug-2.6.32-220.34.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-220.34.1.el6.s390x.rpm kernel-debug-devel-2.6.32-220.34.1.el6.s390x.rpm kernel-debuginfo-2.6.32-220.34.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-220.34.1.el6.s390x.rpm kernel-devel-2.6.32-220.34.1.el6.s390x.rpm kernel-headers-2.6.32-220.34.1.el6.s390x.rpm kernel-kdump-2.6.32-220.34.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-220.34.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-220.34.1.el6.s390x.rpm perf-2.6.32-220.34.1.el6.s390x.rpm perf-debuginfo-2.6.32-220.34.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.s390x.rpm x86_64: kernel-2.6.32-220.34.1.el6.x86_64.rpm kernel-debug-2.6.32-220.34.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.34.1.el6.x86_64.rpm kernel-devel-2.6.32-220.34.1.el6.x86_64.rpm kernel-headers-2.6.32-220.34.1.el6.x86_64.rpm perf-2.6.32-220.34.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.2): Source: kernel-2.6.32-220.34.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-220.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-220.34.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-220.34.1.el6.i686.rpm perf-debuginfo-2.6.32-220.34.1.el6.i686.rpm python-perf-2.6.32-220.34.1.el6.i686.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-220.34.1.el6.ppc64.rpm perf-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm python-perf-2.6.32-220.34.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-220.34.1.el6.s390x.rpm kernel-debuginfo-2.6.32-220.34.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-220.34.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-220.34.1.el6.s390x.rpm perf-debuginfo-2.6.32-220.34.1.el6.s390x.rpm python-perf-2.6.32-220.34.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.34.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm python-perf-2.6.32-220.34.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-220.34.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-2133.html https://www.redhat.com/security/data/cve/CVE-2013-0871.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/kernel.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbaHyXlSAg2UNWIIRAmMtAKCP1PM0K7CKQjctQHK7OFJDqIWpGACZAXTG msryudp/lGg764K2lPtLxUc= =NH4C -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 16 19:11:12 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Apr 2013 19:11:12 +0000 Subject: [RHSA-2013:0747-01] Moderate: kernel security and bug fix update Message-ID: <201304161911.r3GJBChf016205@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security and bug fix update Advisory ID: RHSA-2013:0747-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0747.html Issue date: 2013-04-16 CVE Names: CVE-2012-6537 CVE-2012-6542 CVE-2012-6546 CVE-2012-6547 CVE-2013-0216 CVE-2013-0231 CVE-2013-1826 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues and three bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A flaw was found in the Xen netback driver implementation in the Linux kernel. A privileged guest user with access to a para-virtualized network device could use this flaw to cause a long loop in netback, leading to a denial of service that could potentially affect the entire system. (CVE-2013-0216, Moderate) * A flaw was found in the Xen PCI device back-end driver implementation in the Linux kernel. A privileged guest user in a guest that has a PCI passthrough device could use this flaw to cause a denial of service that could potentially affect the entire system. (CVE-2013-0231, Moderate) * A NULL pointer dereference flaw was found in the IP packet transformation framework (XFRM) implementation in the Linux kernel. A local user who has the CAP_NET_ADMIN capability could use this flaw to cause a denial of service. (CVE-2013-1826, Moderate) * Information leak flaws were found in the XFRM implementation in the Linux kernel. A local user who has the CAP_NET_ADMIN capability could use these flaws to leak kernel stack memory to user-space. (CVE-2012-6537, Low) * An information leak flaw was found in the logical link control (LLC) implementation in the Linux kernel. A local, unprivileged user could use this flaw to leak kernel stack memory to user-space. (CVE-2012-6542, Low) * Two information leak flaws were found in the Linux kernel's Asynchronous Transfer Mode (ATM) subsystem. A local, unprivileged user could use these flaws to leak kernel stack memory to user-space. (CVE-2012-6546, Low) * An information leak flaw was found in the TUN/TAP device driver in the Linux kernel's networking implementation. A local user with access to a TUN/TAP virtual interface could use this flaw to leak kernel stack memory to user-space. (CVE-2012-6547, Low) Red Hat would like to thank the Xen project for reporting the CVE-2013-0216 and CVE-2013-0231 issues. This update also fixes the following bugs: * The IPv4 code did not correctly update the Maximum Transfer Unit (MTU) of the designed interface when receiving ICMP Fragmentation Needed packets. Consequently, a remote host did not respond correctly to ping attempts. With this update, the IPv4 code has been modified so the MTU of the designed interface is adjusted as expected in this situation. The ping command now provides the expected output. (BZ#923353) * Previously, the be2net code expected the last word of an MCC completion message from the firmware to be transferred by direct memory access (DMA) at once. However, this is not always true, and could therefore cause the BUG_ON() macro to be triggered in the be_mcc_compl_is_new() function, consequently leading to a kernel panic. The BUG_ON() macro has been removed from be_mcc_compl_is_new(), and the kernel panic no longer occurs in this scenario. (BZ#923910) * Previously, the NFSv3 server incorrectly converted 64-bit cookies to 32-bit. Consequently, the cookies became invalid, which affected all file system operations depending on these cookies, such as the READDIR operation that is used to read entries from a directory. This led to various problems, such as exported directories being empty or displayed incorrectly, or an endless loop of the READDIRPLUS procedure which could potentially cause a buffer overflow. This update modifies knfsd code so that 64-bit cookies are now handled correctly and all file system operations work as expected. (BZ#924087) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 910874 - CVE-2013-0231 kernel: xen: pciback DoS via not rate limited log messages 910883 - CVE-2013-0216 CVE-2013-0217 kernel: xen: Linux netback DoS via malicious guest ring. 919384 - CVE-2013-1826 Kernel: xfrm_user: return error pointer instead of NULL 922322 - CVE-2012-6542 Kernel: llc: information leak via getsockname 922344 - CVE-2012-6547 Kernel: net/tun: ioctl() based information leaks 922383 - CVE-2012-6546 Kernel: atm: information leak in getsockopt & getsockname 922424 - CVE-2012-6537 Kernel: xfrm_user information leaks copy_to_user_ 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-348.4.1.el5.src.rpm i386: kernel-2.6.18-348.4.1.el5.i686.rpm kernel-PAE-2.6.18-348.4.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm kernel-debug-2.6.18-348.4.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm kernel-devel-2.6.18-348.4.1.el5.i686.rpm kernel-headers-2.6.18-348.4.1.el5.i386.rpm kernel-xen-2.6.18-348.4.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm noarch: kernel-doc-2.6.18-348.4.1.el5.noarch.rpm x86_64: kernel-2.6.18-348.4.1.el5.x86_64.rpm kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-348.4.1.el5.src.rpm i386: kernel-2.6.18-348.4.1.el5.i686.rpm kernel-PAE-2.6.18-348.4.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm kernel-debug-2.6.18-348.4.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm kernel-devel-2.6.18-348.4.1.el5.i686.rpm kernel-headers-2.6.18-348.4.1.el5.i386.rpm kernel-xen-2.6.18-348.4.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm ia64: kernel-2.6.18-348.4.1.el5.ia64.rpm kernel-debug-2.6.18-348.4.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm kernel-devel-2.6.18-348.4.1.el5.ia64.rpm kernel-headers-2.6.18-348.4.1.el5.ia64.rpm kernel-xen-2.6.18-348.4.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-348.4.1.el5.noarch.rpm ppc: kernel-2.6.18-348.4.1.el5.ppc64.rpm kernel-debug-2.6.18-348.4.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-348.4.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.ppc64.rpm kernel-devel-2.6.18-348.4.1.el5.ppc64.rpm kernel-headers-2.6.18-348.4.1.el5.ppc.rpm kernel-headers-2.6.18-348.4.1.el5.ppc64.rpm kernel-kdump-2.6.18-348.4.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-348.4.1.el5.ppc64.rpm s390x: kernel-2.6.18-348.4.1.el5.s390x.rpm kernel-debug-2.6.18-348.4.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.s390x.rpm kernel-debug-devel-2.6.18-348.4.1.el5.s390x.rpm kernel-debuginfo-2.6.18-348.4.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.s390x.rpm kernel-devel-2.6.18-348.4.1.el5.s390x.rpm kernel-headers-2.6.18-348.4.1.el5.s390x.rpm kernel-kdump-2.6.18-348.4.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-348.4.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-348.4.1.el5.s390x.rpm x86_64: kernel-2.6.18-348.4.1.el5.x86_64.rpm kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-6537.html https://www.redhat.com/security/data/cve/CVE-2012-6542.html https://www.redhat.com/security/data/cve/CVE-2012-6546.html https://www.redhat.com/security/data/cve/CVE-2012-6547.html https://www.redhat.com/security/data/cve/CVE-2013-0216.html https://www.redhat.com/security/data/cve/CVE-2013-0231.html https://www.redhat.com/security/data/cve/CVE-2013-1826.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbaI1XlSAg2UNWIIRAvRrAKCYLG7uGZXUFXlHXKDqp3ZS2X3EoQCgoboH 6mWKbOyBjKpSDZM3GcHjIgY= =pja2 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 16 19:11:52 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Apr 2013 19:11:52 +0000 Subject: [RHSA-2013:0748-01] Moderate: krb5 security update Message-ID: <201304161911.r3GJBqWf028175@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: krb5 security update Advisory ID: RHSA-2013:0748-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0748.html Issue date: 2013-04-16 CVE Names: CVE-2013-1416 ===================================================================== 1. Summary: Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS (Ticket-granting Server) requests. A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request. (CVE-2013-1416) All krb5 users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the krb5kdc daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 949984 - CVE-2013-1416 krb5: NULL pointer dereference (DoS, KDC crash) by processing certain TGS requests 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-1.10.3-10.el6_4.2.src.rpm i386: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.i686.rpm krb5-workstation-1.10.3-10.el6_4.2.i686.rpm x86_64: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-debuginfo-1.10.3-10.el6_4.2.x86_64.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.x86_64.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.x86_64.rpm krb5-workstation-1.10.3-10.el6_4.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-1.10.3-10.el6_4.2.src.rpm i386: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-server-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm x86_64: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-debuginfo-1.10.3-10.el6_4.2.x86_64.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-1.10.3-10.el6_4.2.src.rpm x86_64: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-debuginfo-1.10.3-10.el6_4.2.x86_64.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.x86_64.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.x86_64.rpm krb5-workstation-1.10.3-10.el6_4.2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-1.10.3-10.el6_4.2.src.rpm x86_64: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-debuginfo-1.10.3-10.el6_4.2.x86_64.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/krb5-1.10.3-10.el6_4.2.src.rpm i386: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.i686.rpm krb5-server-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm krb5-workstation-1.10.3-10.el6_4.2.i686.rpm ppc64: krb5-debuginfo-1.10.3-10.el6_4.2.ppc.rpm krb5-debuginfo-1.10.3-10.el6_4.2.ppc64.rpm krb5-devel-1.10.3-10.el6_4.2.ppc.rpm krb5-devel-1.10.3-10.el6_4.2.ppc64.rpm krb5-libs-1.10.3-10.el6_4.2.ppc.rpm krb5-libs-1.10.3-10.el6_4.2.ppc64.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.ppc64.rpm krb5-server-1.10.3-10.el6_4.2.ppc64.rpm krb5-server-ldap-1.10.3-10.el6_4.2.ppc.rpm krb5-server-ldap-1.10.3-10.el6_4.2.ppc64.rpm krb5-workstation-1.10.3-10.el6_4.2.ppc64.rpm s390x: krb5-debuginfo-1.10.3-10.el6_4.2.s390.rpm krb5-debuginfo-1.10.3-10.el6_4.2.s390x.rpm krb5-devel-1.10.3-10.el6_4.2.s390.rpm krb5-devel-1.10.3-10.el6_4.2.s390x.rpm krb5-libs-1.10.3-10.el6_4.2.s390.rpm krb5-libs-1.10.3-10.el6_4.2.s390x.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.s390x.rpm krb5-server-1.10.3-10.el6_4.2.s390x.rpm krb5-server-ldap-1.10.3-10.el6_4.2.s390.rpm krb5-server-ldap-1.10.3-10.el6_4.2.s390x.rpm krb5-workstation-1.10.3-10.el6_4.2.s390x.rpm x86_64: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-debuginfo-1.10.3-10.el6_4.2.x86_64.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.x86_64.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.x86_64.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.x86_64.rpm krb5-workstation-1.10.3-10.el6_4.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/krb5-1.10.3-10.el6_4.2.src.rpm i386: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.i686.rpm krb5-server-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm krb5-workstation-1.10.3-10.el6_4.2.i686.rpm x86_64: krb5-debuginfo-1.10.3-10.el6_4.2.i686.rpm krb5-debuginfo-1.10.3-10.el6_4.2.x86_64.rpm krb5-devel-1.10.3-10.el6_4.2.i686.rpm krb5-devel-1.10.3-10.el6_4.2.x86_64.rpm krb5-libs-1.10.3-10.el6_4.2.i686.rpm krb5-libs-1.10.3-10.el6_4.2.x86_64.rpm krb5-pkinit-openssl-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-1.10.3-10.el6_4.2.x86_64.rpm krb5-server-ldap-1.10.3-10.el6_4.2.i686.rpm krb5-server-ldap-1.10.3-10.el6_4.2.x86_64.rpm krb5-workstation-1.10.3-10.el6_4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1416.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbaJrXlSAg2UNWIIRAkNoAKC/0D+MwyJ/xFDMZC/mPC9pVUP2hQCgoh6K 0imRWotrZK/uwFPUO6bAUZg= =lab2 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 17 19:04:26 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 17 Apr 2013 19:04:26 +0000 Subject: [RHSA-2013:0751-01] Critical: java-1.7.0-openjdk security update Message-ID: <201304171904.r3HJ4Qfb002125@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-openjdk security update Advisory ID: RHSA-2013:0751-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0751.html Issue date: 2013-04-17 CVE Names: CVE-2013-0401 CVE-2013-1488 CVE-2013-1518 CVE-2013-1537 CVE-2013-1557 CVE-2013-1558 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2415 CVE-2013-2417 CVE-2013-2419 CVE-2013-2420 CVE-2013-2421 CVE-2013-2422 CVE-2013-2423 CVE-2013-2424 CVE-2013-2426 CVE-2013-2429 CVE-2013-2430 CVE-2013-2431 CVE-2013-2436 ===================================================================== 1. Summary: Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 3. Description: These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit. Multiple flaws were discovered in the font layout engine in the 2D component. An untrusted Java application or applet could possibly use these flaws to trigger Java Virtual Machine memory corruption. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384) Multiple improper permission check issues were discovered in the Beans, Libraries, JAXP, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-1558, CVE-2013-2422, CVE-2013-2436, CVE-2013-1518, CVE-2013-1557) The previous default value of the java.rmi.server.useCodebaseOnly property permitted the RMI implementation to automatically load classes from remotely specified locations. An attacker able to connect to an application using RMI could use this flaw to make the application execute arbitrary code. (CVE-2013-1537) Note: The fix for CVE-2013-1537 changes the default value of the property to true, restricting class loading to the local CLASSPATH and locations specified in the java.rmi.server.codebase property. Refer to Red Hat Bugzilla bug 952387 for additional details. The 2D component did not properly process certain images. An untrusted Java application or applet could possibly use this flaw to trigger Java Virtual Machine memory corruption. (CVE-2013-2420) It was discovered that the Hotspot component did not properly handle certain intrinsic frames, and did not correctly perform access checks and MethodHandle lookups. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-2431, CVE-2013-2421, CVE-2013-2423) It was discovered that JPEGImageReader and JPEGImageWriter in the ImageIO component did not protect against modification of their state while performing certain native code operations. An untrusted Java application or applet could possibly use these flaws to trigger Java Virtual Machine memory corruption. (CVE-2013-2429, CVE-2013-2430) The JDBC driver manager could incorrectly call the toString() method in JDBC drivers, and the ConcurrentHashMap class could incorrectly call the defaultReadObject() method. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. (CVE-2013-1488, CVE-2013-2426) The sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2013-0401) Flaws were discovered in the Network component's InetAddress serialization, and the 2D component's font handling. An untrusted Java application or applet could possibly use these flaws to crash the Java Virtual Machine. (CVE-2013-2417, CVE-2013-2419) The MBeanInstantiator class implementation in the OpenJDK JMX component did not properly check class access before creating new instances. An untrusted Java application or applet could use this flaw to create instances of non-public classes. (CVE-2013-2424) It was discovered that JAX-WS could possibly create temporary files with insecure permissions. A local attacker could use this flaw to access temporary files created by an application using JAX-WS. (CVE-2013-2415) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. This erratum also upgrades the OpenJDK package to IcedTea7 2.3.9. Refer to the NEWS file, linked to in the References, for further information. All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 920245 - CVE-2013-0401 OpenJDK: unspecified sandbox bypass (CanSecWest 2013, AWT) 920247 - CVE-2013-1488 OpenJDK: unspecified sanbox bypass (CanSecWest 2013, Libraries) 952387 - CVE-2013-1537 OpenJDK: remote code loading enabled by default (RMI, 8001040) 952389 - CVE-2013-2415 OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) 952398 - CVE-2013-2423 OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) 952509 - CVE-2013-2424 OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) 952521 - CVE-2013-2429 OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) 952524 - CVE-2013-2430 OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) 952550 - CVE-2013-2436 OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) 952638 - CVE-2013-2420 OpenJDK: image processing vulnerability (2D, 8007617) 952640 - CVE-2013-1558 OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) 952642 - CVE-2013-2422 OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) 952645 - CVE-2013-2431 OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) 952646 - CVE-2013-1518 OpenJDK: JAXP missing security restrictions (JAXP, 6657673) 952648 - CVE-2013-1557 OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) 952649 - CVE-2013-2421 OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) 952653 - CVE-2013-2426 OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) 952656 - CVE-2013-2419 OpenJDK: font processing errors (2D, 8001031) 952657 - CVE-2013-2417 OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) 952708 - CVE-2013-2383 OpenJDK: font layout and glyph table errors (2D, 8004986) 952709 - CVE-2013-2384 OpenJDK: font layout and glyph table errors (2D, 8004987) 952711 - CVE-2013-1569 OpenJDK: font layout and glyph table errors (2D, 8004994) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm i386: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm i386: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el6_4.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm x86_64: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el6_4.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm i386: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm i386: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el6_4.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm i386: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el6_4.src.rpm i386: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.i686.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el6_4.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0401.html https://www.redhat.com/security/data/cve/CVE-2013-1488.html https://www.redhat.com/security/data/cve/CVE-2013-1518.html https://www.redhat.com/security/data/cve/CVE-2013-1537.html https://www.redhat.com/security/data/cve/CVE-2013-1557.html https://www.redhat.com/security/data/cve/CVE-2013-1558.html https://www.redhat.com/security/data/cve/CVE-2013-1569.html https://www.redhat.com/security/data/cve/CVE-2013-2383.html https://www.redhat.com/security/data/cve/CVE-2013-2384.html https://www.redhat.com/security/data/cve/CVE-2013-2415.html https://www.redhat.com/security/data/cve/CVE-2013-2417.html https://www.redhat.com/security/data/cve/CVE-2013-2419.html https://www.redhat.com/security/data/cve/CVE-2013-2420.html https://www.redhat.com/security/data/cve/CVE-2013-2421.html https://www.redhat.com/security/data/cve/CVE-2013-2422.html https://www.redhat.com/security/data/cve/CVE-2013-2423.html https://www.redhat.com/security/data/cve/CVE-2013-2424.html https://www.redhat.com/security/data/cve/CVE-2013-2426.html https://www.redhat.com/security/data/cve/CVE-2013-2429.html https://www.redhat.com/security/data/cve/CVE-2013-2430.html https://www.redhat.com/security/data/cve/CVE-2013-2431.html https://www.redhat.com/security/data/cve/CVE-2013-2436.html https://access.redhat.com/security/updates/classification/#critical http://icedtea.classpath.org/hg/release/icedtea7-2.3/file/icedtea-2.3.9/NEWS 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbvIqXlSAg2UNWIIRAlJMAKCVluLVfsLBqDgkr0bQ5726zrS77gCfSYDg pRdwVdpsYUlytlzUe+jFDfI= =1mI7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 17 19:05:02 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 17 Apr 2013 19:05:02 +0000 Subject: [RHSA-2013:0752-01] Important: java-1.7.0-openjdk security update Message-ID: <201304171905.r3HJ53w3001327@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.7.0-openjdk security update Advisory ID: RHSA-2013:0752-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0752.html Issue date: 2013-04-17 CVE Names: CVE-2013-0401 CVE-2013-1488 CVE-2013-1518 CVE-2013-1537 CVE-2013-1557 CVE-2013-1558 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2415 CVE-2013-2417 CVE-2013-2419 CVE-2013-2420 CVE-2013-2421 CVE-2013-2422 CVE-2013-2423 CVE-2013-2424 CVE-2013-2426 CVE-2013-2429 CVE-2013-2430 CVE-2013-2431 CVE-2013-2436 ===================================================================== 1. Summary: Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit. Multiple flaws were discovered in the font layout engine in the 2D component. An untrusted Java application or applet could possibly use these flaws to trigger Java Virtual Machine memory corruption. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384) Multiple improper permission check issues were discovered in the Beans, Libraries, JAXP, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-1558, CVE-2013-2422, CVE-2013-2436, CVE-2013-1518, CVE-2013-1557) The previous default value of the java.rmi.server.useCodebaseOnly property permitted the RMI implementation to automatically load classes from remotely specified locations. An attacker able to connect to an application using RMI could use this flaw to make the application execute arbitrary code. (CVE-2013-1537) Note: The fix for CVE-2013-1537 changes the default value of the property to true, restricting class loading to the local CLASSPATH and locations specified in the java.rmi.server.codebase property. Refer to Red Hat Bugzilla bug 952387 for additional details. The 2D component did not properly process certain images. An untrusted Java application or applet could possibly use this flaw to trigger Java Virtual Machine memory corruption. (CVE-2013-2420) It was discovered that the Hotspot component did not properly handle certain intrinsic frames, and did not correctly perform access checks and MethodHandle lookups. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-2431, CVE-2013-2421, CVE-2013-2423) It was discovered that JPEGImageReader and JPEGImageWriter in the ImageIO component did not protect against modification of their state while performing certain native code operations. An untrusted Java application or applet could possibly use these flaws to trigger Java Virtual Machine memory corruption. (CVE-2013-2429, CVE-2013-2430) The JDBC driver manager could incorrectly call the toString() method in JDBC drivers, and the ConcurrentHashMap class could incorrectly call the defaultReadObject() method. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. (CVE-2013-1488, CVE-2013-2426) The sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2013-0401) Flaws were discovered in the Network component's InetAddress serialization, and the 2D component's font handling. An untrusted Java application or applet could possibly use these flaws to crash the Java Virtual Machine. (CVE-2013-2417, CVE-2013-2419) The MBeanInstantiator class implementation in the OpenJDK JMX component did not properly check class access before creating new instances. An untrusted Java application or applet could use this flaw to create instances of non-public classes. (CVE-2013-2424) It was discovered that JAX-WS could possibly create temporary files with insecure permissions. A local attacker could use this flaw to access temporary files created by an application using JAX-WS. (CVE-2013-2415) This erratum also upgrades the OpenJDK package to IcedTea7 2.3.9. Refer to the NEWS file, linked to in the References, for further information. All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 920245 - CVE-2013-0401 OpenJDK: unspecified sandbox bypass (CanSecWest 2013, AWT) 920247 - CVE-2013-1488 OpenJDK: unspecified sanbox bypass (CanSecWest 2013, Libraries) 952387 - CVE-2013-1537 OpenJDK: remote code loading enabled by default (RMI, 8001040) 952389 - CVE-2013-2415 OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) 952398 - CVE-2013-2423 OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) 952509 - CVE-2013-2424 OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) 952521 - CVE-2013-2429 OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) 952524 - CVE-2013-2430 OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) 952550 - CVE-2013-2436 OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) 952638 - CVE-2013-2420 OpenJDK: image processing vulnerability (2D, 8007617) 952640 - CVE-2013-1558 OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) 952642 - CVE-2013-2422 OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) 952645 - CVE-2013-2431 OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) 952646 - CVE-2013-1518 OpenJDK: JAXP missing security restrictions (JAXP, 6657673) 952648 - CVE-2013-1557 OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) 952649 - CVE-2013-2421 OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) 952653 - CVE-2013-2426 OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) 952656 - CVE-2013-2419 OpenJDK: font processing errors (2D, 8001031) 952657 - CVE-2013-2417 OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) 952708 - CVE-2013-2383 OpenJDK: font layout and glyph table errors (2D, 8004986) 952709 - CVE-2013-2384 OpenJDK: font layout and glyph table errors (2D, 8004987) 952711 - CVE-2013-1569 OpenJDK: font layout and glyph table errors (2D, 8004994) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el5_9.src.rpm i386: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el5_9.i386.rpm x86_64: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el5_9.src.rpm i386: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el5_9.i386.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el5_9.i386.rpm x86_64: java-1.7.0-openjdk-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.el5_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0401.html https://www.redhat.com/security/data/cve/CVE-2013-1488.html https://www.redhat.com/security/data/cve/CVE-2013-1518.html https://www.redhat.com/security/data/cve/CVE-2013-1537.html https://www.redhat.com/security/data/cve/CVE-2013-1557.html https://www.redhat.com/security/data/cve/CVE-2013-1558.html https://www.redhat.com/security/data/cve/CVE-2013-1569.html https://www.redhat.com/security/data/cve/CVE-2013-2383.html https://www.redhat.com/security/data/cve/CVE-2013-2384.html https://www.redhat.com/security/data/cve/CVE-2013-2415.html https://www.redhat.com/security/data/cve/CVE-2013-2417.html https://www.redhat.com/security/data/cve/CVE-2013-2419.html https://www.redhat.com/security/data/cve/CVE-2013-2420.html https://www.redhat.com/security/data/cve/CVE-2013-2421.html https://www.redhat.com/security/data/cve/CVE-2013-2422.html https://www.redhat.com/security/data/cve/CVE-2013-2423.html https://www.redhat.com/security/data/cve/CVE-2013-2424.html https://www.redhat.com/security/data/cve/CVE-2013-2426.html https://www.redhat.com/security/data/cve/CVE-2013-2429.html https://www.redhat.com/security/data/cve/CVE-2013-2430.html https://www.redhat.com/security/data/cve/CVE-2013-2431.html https://www.redhat.com/security/data/cve/CVE-2013-2436.html https://access.redhat.com/security/updates/classification/#important http://icedtea.classpath.org/hg/release/icedtea7-2.3/file/icedtea-2.3.9/NEWS 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbvJKXlSAg2UNWIIRAqUrAJ9Z/4p4Hfhem2IW/HyrENsM6alnkACeJrNj u7V5CaCh5MYZ84AllqEIm+E= =pvGZ -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 17 19:05:41 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 17 Apr 2013 19:05:41 +0000 Subject: [RHSA-2013:0753-01] Moderate: icedtea-web security update Message-ID: <201304171905.r3HJ5f3v031746@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: icedtea-web security update Advisory ID: RHSA-2013:0753-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0753.html Issue date: 2013-04-17 CVE Names: CVE-2013-1926 CVE-2013-1927 ===================================================================== 1. Summary: Updated icedtea-web packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The IcedTea-Web project provides a Java web browser plug-in and an implementation of Java Web Start, which is based on the Netx project. It also contains a configuration tool for managing deployment settings for the plug-in and Web Start implementations. It was discovered that the IcedTea-Web plug-in incorrectly used the same class loader instance for applets with the same value of the codebase attribute, even when they originated from different domains. A malicious applet could use this flaw to gain information about and possibly manipulate applets from different domains currently running in the browser. (CVE-2013-1926) The IcedTea-Web plug-in did not properly check the format of the downloaded Java Archive (JAR) files. This could cause the plug-in to execute code hidden in a file in a different format, possibly allowing attackers to execute code in the context of web sites that allow uploads of specific file types, known as a GIFAR attack. (CVE-2013-1927) The CVE-2013-1926 issue was discovered by Jiri Vanek of the Red Hat OpenJDK Team, and CVE-2013-1927 was discovered by the Red Hat Security Response Team. This erratum also upgrades IcedTea-Web to version 1.2.3. Refer to the NEWS file, linked to in the References, for further information. All IcedTea-Web users should upgrade to these updated packages, which resolve these issues. Web browsers using the IcedTea-Web browser plug-in must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 884705 - CVE-2013-1927 icedtea-web: GIFAR issue 916774 - CVE-2013-1926 icedtea-web: class loader sharing for applets with same codebase paths 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm i386: icedtea-web-1.2.3-2.el6_4.i686.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.i686.rpm x86_64: icedtea-web-1.2.3-2.el6_4.x86_64.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm i386: icedtea-web-debuginfo-1.2.3-2.el6_4.i686.rpm icedtea-web-javadoc-1.2.3-2.el6_4.i686.rpm x86_64: icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm icedtea-web-javadoc-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm x86_64: icedtea-web-1.2.3-2.el6_4.x86_64.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm x86_64: icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm icedtea-web-javadoc-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm i386: icedtea-web-1.2.3-2.el6_4.i686.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.i686.rpm x86_64: icedtea-web-1.2.3-2.el6_4.x86_64.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm i386: icedtea-web-debuginfo-1.2.3-2.el6_4.i686.rpm icedtea-web-javadoc-1.2.3-2.el6_4.i686.rpm x86_64: icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm icedtea-web-javadoc-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm i386: icedtea-web-1.2.3-2.el6_4.i686.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.i686.rpm x86_64: icedtea-web-1.2.3-2.el6_4.x86_64.rpm icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/icedtea-web-1.2.3-2.el6_4.src.rpm i386: icedtea-web-debuginfo-1.2.3-2.el6_4.i686.rpm icedtea-web-javadoc-1.2.3-2.el6_4.i686.rpm x86_64: icedtea-web-debuginfo-1.2.3-2.el6_4.x86_64.rpm icedtea-web-javadoc-1.2.3-2.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1926.html https://www.redhat.com/security/data/cve/CVE-2013-1927.html https://access.redhat.com/security/updates/classification/#moderate http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRbvJ1XlSAg2UNWIIRAu0FAKCfGQYRQD4w2u/dctxxsOXiaBt2bACdFApC JgWTc6m09iCk+5zn6wMkinE= =40M4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 18 18:28:23 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 18 Apr 2013 18:28:23 +0000 Subject: [RHSA-2013:0757-01] Critical: java-1.7.0-oracle security update Message-ID: <201304181828.r3IISO8c006728@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-oracle security update Advisory ID: RHSA-2013:0757-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0757.html Issue date: 2013-04-18 CVE Names: CVE-2013-0401 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2394 CVE-2013-2414 CVE-2013-2415 CVE-2013-2416 CVE-2013-2417 CVE-2013-2418 CVE-2013-2419 CVE-2013-2420 CVE-2013-2421 CVE-2013-2422 CVE-2013-2423 CVE-2013-2424 CVE-2013-2425 CVE-2013-2426 CVE-2013-2427 CVE-2013-2428 CVE-2013-2429 CVE-2013-2430 CVE-2013-2431 CVE-2013-2432 CVE-2013-2433 CVE-2013-2434 CVE-2013-2435 CVE-2013-2436 CVE-2013-2438 CVE-2013-2439 CVE-2013-2440 ===================================================================== 1. Summary: Updated java-1.7.0-oracle packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2013-0401, CVE-2013-0402, CVE-2013-1488, CVE-2013-1491, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2436, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440) All users of java-1.7.0-oracle are advised to upgrade to these updated packages, which provide Oracle Java 7 Update 21 and resolve these issues. All running instances of Oracle Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 920245 - CVE-2013-0401 OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, 8009305, AWT) 920246 - CVE-2013-0402 Oracle JDK: unspecified JavaFX buffer overflow leading to JVM compromise (CanSecWest 2013, JavaFX) 920247 - CVE-2013-1488 OpenJDK: unspecified sanbox bypass (CanSecWest 2013, Libraries) 920248 - CVE-2013-1491 Oracle JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) 952387 - CVE-2013-1537 OpenJDK: remote code loading enabled by default (RMI, 8001040) 952389 - CVE-2013-2415 OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) 952398 - CVE-2013-2423 OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) 952509 - CVE-2013-2424 OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) 952521 - CVE-2013-2429 OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) 952524 - CVE-2013-2430 OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) 952550 - CVE-2013-2436 OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) 952638 - CVE-2013-2420 OpenJDK: image processing vulnerability (2D, 8007617) 952640 - CVE-2013-1558 OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) 952642 - CVE-2013-2422 OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) 952645 - CVE-2013-2431 OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) 952646 - CVE-2013-1518 OpenJDK: JAXP missing security restrictions (JAXP, 6657673) 952648 - CVE-2013-1557 OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) 952649 - CVE-2013-2421 OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) 952653 - CVE-2013-2426 OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) 952656 - CVE-2013-2419 OpenJDK: font processing errors (2D, 8001031) 952657 - CVE-2013-2417 OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) 952708 - CVE-2013-2383 OpenJDK: font layout and glyph table errors (2D, 8004986) 952709 - CVE-2013-2384 OpenJDK: font layout and glyph table errors (2D, 8004987) 952711 - CVE-2013-1569 OpenJDK: font layout and glyph table errors (2D, 8004994) 953135 - Oracle JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) 953166 - CVE-2013-1540 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953172 - CVE-2013-1563 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) 953265 - CVE-2013-2394 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) 953266 - CVE-2013-2416 Oracle JDK: unspecified vulnerability fixed in 7u21 (Deployment) 953267 - CVE-2013-2418 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953268 - CVE-2013-2425 Oracle JDK: unspecified vulnerability fixed in 7u21 (Install) 953269 - CVE-2013-2432 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) 953270 - CVE-2013-2433 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953272 - CVE-2013-2434 Oracle JDK: unspecified vulnerability fixed in 7u21 (2D) 953273 - CVE-2013-2435 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953274 - CVE-2013-2439 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) 953275 - CVE-2013-2440 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: java-1.7.0-oracle-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el5.i386.rpm x86_64: java-1.7.0-oracle-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el5.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: java-1.7.0-oracle-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el5.i386.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el5.i386.rpm x86_64: java-1.7.0-oracle-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el5.x86_64.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el6.i686.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.21-1jpp.1.el6.x86_64.rpm java-1.7.0-oracle-src-1.7.0.21-1jpp.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0401.html https://www.redhat.com/security/data/cve/CVE-2013-0402.html https://www.redhat.com/security/data/cve/CVE-2013-1488.html https://www.redhat.com/security/data/cve/CVE-2013-1491.html https://www.redhat.com/security/data/cve/CVE-2013-1518.html https://www.redhat.com/security/data/cve/CVE-2013-1537.html https://www.redhat.com/security/data/cve/CVE-2013-1540.html https://www.redhat.com/security/data/cve/CVE-2013-1557.html https://www.redhat.com/security/data/cve/CVE-2013-1558.html https://www.redhat.com/security/data/cve/CVE-2013-1561.html https://www.redhat.com/security/data/cve/CVE-2013-1563.html https://www.redhat.com/security/data/cve/CVE-2013-1564.html https://www.redhat.com/security/data/cve/CVE-2013-1569.html https://www.redhat.com/security/data/cve/CVE-2013-2383.html https://www.redhat.com/security/data/cve/CVE-2013-2384.html https://www.redhat.com/security/data/cve/CVE-2013-2394.html https://www.redhat.com/security/data/cve/CVE-2013-2414.html https://www.redhat.com/security/data/cve/CVE-2013-2415.html https://www.redhat.com/security/data/cve/CVE-2013-2416.html https://www.redhat.com/security/data/cve/CVE-2013-2417.html https://www.redhat.com/security/data/cve/CVE-2013-2418.html https://www.redhat.com/security/data/cve/CVE-2013-2419.html https://www.redhat.com/security/data/cve/CVE-2013-2420.html https://www.redhat.com/security/data/cve/CVE-2013-2421.html https://www.redhat.com/security/data/cve/CVE-2013-2422.html https://www.redhat.com/security/data/cve/CVE-2013-2423.html https://www.redhat.com/security/data/cve/CVE-2013-2424.html https://www.redhat.com/security/data/cve/CVE-2013-2425.html https://www.redhat.com/security/data/cve/CVE-2013-2426.html https://www.redhat.com/security/data/cve/CVE-2013-2427.html https://www.redhat.com/security/data/cve/CVE-2013-2428.html https://www.redhat.com/security/data/cve/CVE-2013-2429.html https://www.redhat.com/security/data/cve/CVE-2013-2430.html https://www.redhat.com/security/data/cve/CVE-2013-2431.html https://www.redhat.com/security/data/cve/CVE-2013-2432.html https://www.redhat.com/security/data/cve/CVE-2013-2433.html https://www.redhat.com/security/data/cve/CVE-2013-2434.html https://www.redhat.com/security/data/cve/CVE-2013-2435.html https://www.redhat.com/security/data/cve/CVE-2013-2436.html https://www.redhat.com/security/data/cve/CVE-2013-2438.html https://www.redhat.com/security/data/cve/CVE-2013-2439.html https://www.redhat.com/security/data/cve/CVE-2013-2440.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRcDsoXlSAg2UNWIIRAnQRAJkBOGnz8TW8LPB1Ur1msZYNqpYTowCfaOUs Up+dHVsSUEZZ+ySDcLQZIyU= =yeWV -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 18 18:29:00 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 18 Apr 2013 18:29:00 +0000 Subject: [RHSA-2013:0758-01] Critical: java-1.6.0-sun security update Message-ID: <201304181829.r3IIT0tt007124@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.6.0-sun security update Advisory ID: RHSA-2013:0758-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0758.html Issue date: 2013-04-18 CVE Names: CVE-2013-0401 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1563 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2394 CVE-2013-2417 CVE-2013-2418 CVE-2013-2419 CVE-2013-2420 CVE-2013-2422 CVE-2013-2424 CVE-2013-2429 CVE-2013-2430 CVE-2013-2432 CVE-2013-2433 CVE-2013-2435 CVE-2013-2439 CVE-2013-2440 ===================================================================== 1. Summary: Updated java-1.6.0-sun packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2013-0401, CVE-2013-1491, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1563, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435, CVE-2013-2439, CVE-2013-2440) All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide Oracle Java 6 Update 45. All running instances of Oracle Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 920245 - CVE-2013-0401 OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, 8009305, AWT) 920248 - CVE-2013-1491 Oracle JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) 952387 - CVE-2013-1537 OpenJDK: remote code loading enabled by default (RMI, 8001040) 952509 - CVE-2013-2424 OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) 952521 - CVE-2013-2429 OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) 952524 - CVE-2013-2430 OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) 952638 - CVE-2013-2420 OpenJDK: image processing vulnerability (2D, 8007617) 952640 - CVE-2013-1558 OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) 952642 - CVE-2013-2422 OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) 952646 - CVE-2013-1518 OpenJDK: JAXP missing security restrictions (JAXP, 6657673) 952648 - CVE-2013-1557 OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) 952656 - CVE-2013-2419 OpenJDK: font processing errors (2D, 8001031) 952657 - CVE-2013-2417 OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) 952708 - CVE-2013-2383 OpenJDK: font layout and glyph table errors (2D, 8004986) 952709 - CVE-2013-2384 OpenJDK: font layout and glyph table errors (2D, 8004987) 952711 - CVE-2013-1569 OpenJDK: font layout and glyph table errors (2D, 8004994) 953166 - CVE-2013-1540 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953172 - CVE-2013-1563 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) 953265 - CVE-2013-2394 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) 953267 - CVE-2013-2418 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953269 - CVE-2013-2432 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) 953270 - CVE-2013-2433 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953273 - CVE-2013-2435 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 953274 - CVE-2013-2439 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) 953275 - CVE-2013-2440 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm x86_64: java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm x86_64: java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.x86_64.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.x86_64.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm x86_64: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm x86_64: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm x86_64: java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0401.html https://www.redhat.com/security/data/cve/CVE-2013-1491.html https://www.redhat.com/security/data/cve/CVE-2013-1518.html https://www.redhat.com/security/data/cve/CVE-2013-1537.html https://www.redhat.com/security/data/cve/CVE-2013-1540.html https://www.redhat.com/security/data/cve/CVE-2013-1557.html https://www.redhat.com/security/data/cve/CVE-2013-1558.html https://www.redhat.com/security/data/cve/CVE-2013-1563.html https://www.redhat.com/security/data/cve/CVE-2013-1569.html https://www.redhat.com/security/data/cve/CVE-2013-2383.html https://www.redhat.com/security/data/cve/CVE-2013-2384.html https://www.redhat.com/security/data/cve/CVE-2013-2394.html https://www.redhat.com/security/data/cve/CVE-2013-2417.html https://www.redhat.com/security/data/cve/CVE-2013-2418.html https://www.redhat.com/security/data/cve/CVE-2013-2419.html https://www.redhat.com/security/data/cve/CVE-2013-2420.html https://www.redhat.com/security/data/cve/CVE-2013-2422.html https://www.redhat.com/security/data/cve/CVE-2013-2424.html https://www.redhat.com/security/data/cve/CVE-2013-2429.html https://www.redhat.com/security/data/cve/CVE-2013-2430.html https://www.redhat.com/security/data/cve/CVE-2013-2432.html https://www.redhat.com/security/data/cve/CVE-2013-2433.html https://www.redhat.com/security/data/cve/CVE-2013-2435.html https://www.redhat.com/security/data/cve/CVE-2013-2439.html https://www.redhat.com/security/data/cve/CVE-2013-2440.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRcDtYXlSAg2UNWIIRAi6SAKCE8fK+5ki0I8TyQ9lgQ7FZVO7EqACfekSb IU1EEBegCPo3G1aTi2Aprl4= =rLik -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 22 15:58:33 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 22 Apr 2013 15:58:33 +0000 Subject: [RHSA-2013:0762-01] Low: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice Message-ID: <201304221558.r3MFwXAH001856@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice Advisory ID: RHSA-2013:0762-01 Product: Red Hat Enterprise MRG for RHEL-5 Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0762.html Issue date: 2013-04-22 ===================================================================== 1. Summary: This is the 1-Year notification for the retirement of Red Hat Enterprise MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5. 2. Relevant releases/architectures: MRG Grid Execute Node for RHEL 5 Server - noarch MRG Grid Execute Node for RHEL 5 Server v.2 - noarch MRG Grid for RHEL 5 Server - noarch MRG Grid for RHEL 5 Server v.2 - noarch MRG Management for RHEL 5 Server - noarch MRG Management for RHEL 5 Server v.2 - noarch MRG Realtime for RHEL 5 Server - noarch Red Hat MRG Messaging Base for RHEL 5 Server - noarch Red Hat MRG Messaging for RHEL 5 Server - noarch Red Hat MRG Messaging for RHEL 5 Server v.2 - noarch 3. Description: In accordance with the Red Hat Enterprise MRG Life Cycle policy, the Red Hat Enterprise MRG products, which include the MRG-Messaging, MRG-Realtime, and MRG-Grid, Version 1 and Version 2 offerings for Red Hat Enterprise Linux 5, will be retired on March 31, 2014, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including critical impact security patches or urgent priority bug fixes, for MRG-Messaging, MRG-Realtime, and MRG-Grid on Red Hat Enterprise Linux 5 after that date. In addition, after March 31, 2014, technical support through Red Hat's Global Support Services will no longer be provided for these products on Red Hat Enterprise Linux 5. Note: This notification applies only to those customers with subscriptions for Red Hat Enterprise MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5. We encourage customers to plan their migration from Red Hat Enterprise MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5 to Red Hat Enterprise MRG Version 2 on Red Hat Enterprise Linux 6. As a benefit of the Red Hat subscription model, customers can use their active Red Hat Enterprise MRG subscriptions to entitle any system on a currently supported version of that product. Details of the Red Hat Enterprise MRG life cycle can be found here: https://access.redhat.com/support/policy/updates/mrg/ 4. Solution: This erratum contains an updated mrg-release package, which provides a copy of this notice in the "/usr/share/doc/" directory. 5. Package List: MRG Grid for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-2.el5.src.rpm noarch: mrg-release-1.3.3-2.el5.noarch.rpm MRG Grid for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.3.0-2.el5.src.rpm noarch: mrg-release-2.3.0-2.el5.noarch.rpm MRG Grid Execute Node for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-2.el5.src.rpm noarch: mrg-release-1.3.3-2.el5.noarch.rpm MRG Grid Execute Node for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.3.0-2.el5.src.rpm noarch: mrg-release-2.3.0-2.el5.noarch.rpm MRG Management for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-2.el5.src.rpm noarch: mrg-release-1.3.3-2.el5.noarch.rpm MRG Management for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.3.0-2.el5.src.rpm noarch: mrg-release-2.3.0-2.el5.noarch.rpm Red Hat MRG Messaging for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-2.el5.src.rpm noarch: mrg-release-1.3.3-2.el5.noarch.rpm Red Hat MRG Messaging for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.3.0-2.el5.src.rpm noarch: mrg-release-2.3.0-2.el5.noarch.rpm Red Hat MRG Messaging Base for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-2.el5.src.rpm noarch: mrg-release-1.3.3-2.el5.noarch.rpm MRG Realtime for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-2.el5.src.rpm noarch: mrg-release-1.3.3-2.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 6. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/support/policy/updates/mrg/ 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRdV4GXlSAg2UNWIIRAgkfAKCW4f7WzhjCADajZCbTIuFX1v+yGwCdFP4g /d2TSWCKoqKczZjnW2cIyKA= =o4KK -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 23 19:03:10 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Apr 2013 19:03:10 +0000 Subject: [RHSA-2013:0744-01] Important: kernel security and bug fix update Message-ID: <201304231903.r3NJ3A7K001947@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2013:0744-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0744.html Issue date: 2013-04-23 CVE Names: CVE-2012-6537 CVE-2012-6546 CVE-2012-6547 CVE-2013-0349 CVE-2013-0913 CVE-2013-1767 CVE-2013-1773 CVE-2013-1774 CVE-2013-1792 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1826 CVE-2013-1827 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Security: * An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the Intel i915 driver in the Linux kernel handled the allocation of the buffer used for relocation copies. A local user with console access could use this flaw to cause a denial of service or escalate their privileges. (CVE-2013-0913, Important) * A buffer overflow flaw was found in the way UTF-8 characters were converted to UTF-16 in the utf8s_to_utf16s() function of the Linux kernel's FAT file system implementation. A local user able to mount a FAT file system with the "utf8=1" option could use this flaw to crash the system or, potentially, to escalate their privileges. (CVE-2013-1773, Important) * A flaw was found in the way KVM handled guest time updates when the buffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) crossed a page boundary. A privileged guest user could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the host kernel level. (CVE-2013-1796, Important) * A potential use-after-free flaw was found in the way KVM handled guest time updates when the GPA (guest physical address) the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into a movable or removable memory region of the hosting user-space process (by default, QEMU-KVM) on the host. If that memory region is deregistered from KVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory reused, a privileged guest user could potentially use this flaw to escalate their privileges on the host. (CVE-2013-1797, Important) * A flaw was found in the way KVM emulated IOAPIC (I/O Advanced Programmable Interrupt Controller). A missing validation check in the ioapic_read_indirect() function could allow a privileged guest user to crash the host, or read a substantial portion of host kernel memory. (CVE-2013-1798, Important) * A race condition in install_user_keyrings(), leading to a NULL pointer dereference, was found in the key management facility. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2013-1792, Moderate) * A NULL pointer dereference in the XFRM implementation could allow a local user who has the CAP_NET_ADMIN capability to cause a denial of service. (CVE-2013-1826, Moderate) * A NULL pointer dereference in the Datagram Congestion Control Protocol (DCCP) implementation could allow a local user to cause a denial of service. (CVE-2013-1827, Moderate) * Information leak flaws in the XFRM implementation could allow a local user who has the CAP_NET_ADMIN capability to leak kernel stack memory to user-space. (CVE-2012-6537, Low) * Two information leak flaws in the Asynchronous Transfer Mode (ATM) subsystem could allow a local, unprivileged user to leak kernel stack memory to user-space. (CVE-2012-6546, Low) * An information leak was found in the TUN/TAP device driver in the networking implementation. A local user with access to a TUN/TAP virtual interface could use this flaw to leak kernel stack memory to user-space. (CVE-2012-6547, Low) * An information leak in the Bluetooth implementation could allow a local user who has the CAP_NET_ADMIN capability to leak kernel stack memory to user-space. (CVE-2013-0349, Low) * A use-after-free flaw was found in the tmpfs implementation. A local user able to mount and unmount a tmpfs file system could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1767, Low) * A NULL pointer dereference was found in the Linux kernel's USB Inside Out Edgeport Serial Driver implementation. An attacker with physical access to a system could use this flaw to cause a denial of service. (CVE-2013-1774, Low) Red Hat would like to thank Andrew Honig of Google for reporting CVE-2013-1796, CVE-2013-1797, and CVE-2013-1798. CVE-2013-1792 was discovered by Mateusz Guzik of Red Hat EMEA GSS SEG Team. 4. Solution: This update also fixes several bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 914298 - CVE-2013-0349 kernel: bluetooth HIDP implementation information disclosure 915592 - CVE-2013-1767 Kernel: tmpfs: fix use-after-free of mempolicy object 916115 - CVE-2013-1773 kernel: VFAT slab-based buffer overflow 916191 - CVE-2013-1774 Kernel: USB io_ti driver NULL pointer dereference in routine chase_port 916646 - CVE-2013-1792 Kernel: keys: race condition in install_user_keyrings() 917012 - CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME 917013 - CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME 917017 - CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads 919164 - CVE-2013-1827 Kernel: dccp: check ccid before NULL poiter dereference 919384 - CVE-2013-1826 Kernel: xfrm_user: return error pointer instead of NULL 920471 - CVE-2013-0913 Kernel: drm/i915: heap writing overflow 922344 - CVE-2012-6547 Kernel: net/tun: ioctl() based information leaks 922383 - CVE-2012-6546 Kernel: atm: information leak in getsockopt & getsockname 922424 - CVE-2012-6537 Kernel: xfrm_user information leaks copy_to_user_ 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm i386: kernel-2.6.32-358.6.1.el6.i686.rpm kernel-debug-2.6.32-358.6.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm kernel-devel-2.6.32-358.6.1.el6.i686.rpm kernel-headers-2.6.32-358.6.1.el6.i686.rpm perf-2.6.32-358.6.1.el6.i686.rpm perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm noarch: kernel-doc-2.6.32-358.6.1.el6.noarch.rpm kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm x86_64: kernel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-headers-2.6.32-358.6.1.el6.x86_64.rpm perf-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm python-perf-2.6.32-358.6.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm noarch: kernel-doc-2.6.32-358.6.1.el6.noarch.rpm kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm x86_64: kernel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-headers-2.6.32-358.6.1.el6.x86_64.rpm perf-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm i386: kernel-2.6.32-358.6.1.el6.i686.rpm kernel-debug-2.6.32-358.6.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm kernel-devel-2.6.32-358.6.1.el6.i686.rpm kernel-headers-2.6.32-358.6.1.el6.i686.rpm perf-2.6.32-358.6.1.el6.i686.rpm perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm noarch: kernel-doc-2.6.32-358.6.1.el6.noarch.rpm kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm ppc64: kernel-2.6.32-358.6.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-358.6.1.el6.ppc64.rpm kernel-debug-2.6.32-358.6.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-358.6.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-358.6.1.el6.ppc64.rpm kernel-devel-2.6.32-358.6.1.el6.ppc64.rpm kernel-headers-2.6.32-358.6.1.el6.ppc64.rpm perf-2.6.32-358.6.1.el6.ppc64.rpm perf-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm s390x: kernel-2.6.32-358.6.1.el6.s390x.rpm kernel-debug-2.6.32-358.6.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.s390x.rpm kernel-debug-devel-2.6.32-358.6.1.el6.s390x.rpm kernel-debuginfo-2.6.32-358.6.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-358.6.1.el6.s390x.rpm kernel-devel-2.6.32-358.6.1.el6.s390x.rpm kernel-headers-2.6.32-358.6.1.el6.s390x.rpm kernel-kdump-2.6.32-358.6.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-358.6.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-358.6.1.el6.s390x.rpm perf-2.6.32-358.6.1.el6.s390x.rpm perf-debuginfo-2.6.32-358.6.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.s390x.rpm x86_64: kernel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-headers-2.6.32-358.6.1.el6.x86_64.rpm perf-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm python-perf-2.6.32-358.6.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-358.6.1.el6.ppc64.rpm perf-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm python-perf-2.6.32-358.6.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-358.6.1.el6.s390x.rpm kernel-debuginfo-2.6.32-358.6.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-358.6.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-358.6.1.el6.s390x.rpm perf-debuginfo-2.6.32-358.6.1.el6.s390x.rpm python-perf-2.6.32-358.6.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm i386: kernel-2.6.32-358.6.1.el6.i686.rpm kernel-debug-2.6.32-358.6.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm kernel-devel-2.6.32-358.6.1.el6.i686.rpm kernel-headers-2.6.32-358.6.1.el6.i686.rpm perf-2.6.32-358.6.1.el6.i686.rpm perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm noarch: kernel-doc-2.6.32-358.6.1.el6.noarch.rpm kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm x86_64: kernel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm kernel-headers-2.6.32-358.6.1.el6.x86_64.rpm perf-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-358.6.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm python-perf-2.6.32-358.6.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm python-perf-2.6.32-358.6.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-6537.html https://www.redhat.com/security/data/cve/CVE-2012-6546.html https://www.redhat.com/security/data/cve/CVE-2012-6547.html https://www.redhat.com/security/data/cve/CVE-2013-0349.html https://www.redhat.com/security/data/cve/CVE-2013-0913.html https://www.redhat.com/security/data/cve/CVE-2013-1767.html https://www.redhat.com/security/data/cve/CVE-2013-1773.html https://www.redhat.com/security/data/cve/CVE-2013-1774.html https://www.redhat.com/security/data/cve/CVE-2013-1792.html https://www.redhat.com/security/data/cve/CVE-2013-1796.html https://www.redhat.com/security/data/cve/CVE-2013-1797.html https://www.redhat.com/security/data/cve/CVE-2013-1798.html https://www.redhat.com/security/data/cve/CVE-2013-1826.html https://www.redhat.com/security/data/cve/CVE-2013-1827.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/kernel.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRdtrAXlSAg2UNWIIRAkHqAJ9vflWSrgOl/UDTeb3uZ7nMa+r91ACcCJNP fZEsYNDnzVmfv4656slIu5I= =btfX -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 24 18:01:33 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 24 Apr 2013 18:01:33 +0000 Subject: [RHSA-2013:0769-01] Low: glibc security and bug fix update Message-ID: <201304241801.r3OI1Y3N006466@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: glibc security and bug fix update Advisory ID: RHSA-2013:0769-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0769.html Issue date: 2013-04-24 CVE Names: CVE-2013-0242 CVE-2013-1914 ===================================================================== 1. Summary: Updated glibc packages that fix two security issues and two bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. (CVE-2013-1914) A flaw was found in the regular expression matching routines that process multibyte character input. If an application utilized the glibc regular expression matching mechanism, an attacker could provide specially-crafted input that, when processed, would cause the application to crash. (CVE-2013-0242) This update also fixes the following bugs: * The improvements RHSA-2012:1207 made to the accuracy of floating point functions in the math library caused performance regressions for those functions. The performance regressions were analyzed and a fix was applied that retains the current accuracy but reduces the performance penalty to acceptable levels. Refer to Red Hat Knowledge solution 229993, linked to in the References, for further information. (BZ#950535) * It was possible that a memory location freed by the localization code could be accessed immediately after, resulting in a crash. The fix ensures that the application does not crash by avoiding the invalid memory access. (BZ#951493) Users of glibc are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 905874 - CVE-2013-0242 glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters 947882 - CVE-2013-1914 glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/glibc-2.5-107.el5_9.4.src.rpm i386: glibc-2.5-107.el5_9.4.i386.rpm glibc-2.5-107.el5_9.4.i686.rpm glibc-common-2.5-107.el5_9.4.i386.rpm glibc-debuginfo-2.5-107.el5_9.4.i386.rpm glibc-debuginfo-2.5-107.el5_9.4.i686.rpm glibc-debuginfo-common-2.5-107.el5_9.4.i386.rpm glibc-devel-2.5-107.el5_9.4.i386.rpm glibc-headers-2.5-107.el5_9.4.i386.rpm glibc-utils-2.5-107.el5_9.4.i386.rpm nscd-2.5-107.el5_9.4.i386.rpm x86_64: glibc-2.5-107.el5_9.4.i686.rpm glibc-2.5-107.el5_9.4.x86_64.rpm glibc-common-2.5-107.el5_9.4.x86_64.rpm glibc-debuginfo-2.5-107.el5_9.4.i386.rpm glibc-debuginfo-2.5-107.el5_9.4.i686.rpm glibc-debuginfo-2.5-107.el5_9.4.x86_64.rpm glibc-debuginfo-common-2.5-107.el5_9.4.i386.rpm glibc-devel-2.5-107.el5_9.4.i386.rpm glibc-devel-2.5-107.el5_9.4.x86_64.rpm glibc-headers-2.5-107.el5_9.4.x86_64.rpm glibc-utils-2.5-107.el5_9.4.x86_64.rpm nscd-2.5-107.el5_9.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/glibc-2.5-107.el5_9.4.src.rpm i386: glibc-2.5-107.el5_9.4.i386.rpm glibc-2.5-107.el5_9.4.i686.rpm glibc-common-2.5-107.el5_9.4.i386.rpm glibc-debuginfo-2.5-107.el5_9.4.i386.rpm glibc-debuginfo-2.5-107.el5_9.4.i686.rpm glibc-debuginfo-common-2.5-107.el5_9.4.i386.rpm glibc-devel-2.5-107.el5_9.4.i386.rpm glibc-headers-2.5-107.el5_9.4.i386.rpm glibc-utils-2.5-107.el5_9.4.i386.rpm nscd-2.5-107.el5_9.4.i386.rpm ia64: glibc-2.5-107.el5_9.4.i686.rpm glibc-2.5-107.el5_9.4.ia64.rpm glibc-common-2.5-107.el5_9.4.ia64.rpm glibc-debuginfo-2.5-107.el5_9.4.i686.rpm glibc-debuginfo-2.5-107.el5_9.4.ia64.rpm glibc-devel-2.5-107.el5_9.4.ia64.rpm glibc-headers-2.5-107.el5_9.4.ia64.rpm glibc-utils-2.5-107.el5_9.4.ia64.rpm nscd-2.5-107.el5_9.4.ia64.rpm ppc: glibc-2.5-107.el5_9.4.ppc.rpm glibc-2.5-107.el5_9.4.ppc64.rpm glibc-common-2.5-107.el5_9.4.ppc.rpm glibc-debuginfo-2.5-107.el5_9.4.ppc.rpm glibc-debuginfo-2.5-107.el5_9.4.ppc64.rpm glibc-devel-2.5-107.el5_9.4.ppc.rpm glibc-devel-2.5-107.el5_9.4.ppc64.rpm glibc-headers-2.5-107.el5_9.4.ppc.rpm glibc-utils-2.5-107.el5_9.4.ppc.rpm nscd-2.5-107.el5_9.4.ppc.rpm s390x: glibc-2.5-107.el5_9.4.s390.rpm glibc-2.5-107.el5_9.4.s390x.rpm glibc-common-2.5-107.el5_9.4.s390x.rpm glibc-debuginfo-2.5-107.el5_9.4.s390.rpm glibc-debuginfo-2.5-107.el5_9.4.s390x.rpm glibc-devel-2.5-107.el5_9.4.s390.rpm glibc-devel-2.5-107.el5_9.4.s390x.rpm glibc-headers-2.5-107.el5_9.4.s390x.rpm glibc-utils-2.5-107.el5_9.4.s390x.rpm nscd-2.5-107.el5_9.4.s390x.rpm x86_64: glibc-2.5-107.el5_9.4.i686.rpm glibc-2.5-107.el5_9.4.x86_64.rpm glibc-common-2.5-107.el5_9.4.x86_64.rpm glibc-debuginfo-2.5-107.el5_9.4.i386.rpm glibc-debuginfo-2.5-107.el5_9.4.i686.rpm glibc-debuginfo-2.5-107.el5_9.4.x86_64.rpm glibc-debuginfo-common-2.5-107.el5_9.4.i386.rpm glibc-devel-2.5-107.el5_9.4.i386.rpm glibc-devel-2.5-107.el5_9.4.x86_64.rpm glibc-headers-2.5-107.el5_9.4.x86_64.rpm glibc-utils-2.5-107.el5_9.4.x86_64.rpm nscd-2.5-107.el5_9.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0242.html https://www.redhat.com/security/data/cve/CVE-2013-1914.html https://access.redhat.com/security/updates/classification/#low https://rhn.redhat.com/errata/RHSA-2012-1207.html https://access.redhat.com/site/solutions/229993 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFReB3RXlSAg2UNWIIRAozdAKC3eJpjSPmb7XwK9WN7xPAq7FHFIgCfVbCd NfQDoIkDFsK56XVzHbj328k= =6KUp -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 24 18:02:27 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 24 Apr 2013 18:02:27 +0000 Subject: [RHSA-2013:0770-01] Important: java-1.6.0-openjdk security update Message-ID: <201304241802.r3OI2RlG030387@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.6.0-openjdk security update Advisory ID: RHSA-2013:0770-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0770.html Issue date: 2013-04-24 CVE Names: CVE-2013-0401 CVE-2013-1488 CVE-2013-1518 CVE-2013-1537 CVE-2013-1557 CVE-2013-1558 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2415 CVE-2013-2417 CVE-2013-2419 CVE-2013-2420 CVE-2013-2421 CVE-2013-2422 CVE-2013-2424 CVE-2013-2426 CVE-2013-2429 CVE-2013-2430 CVE-2013-2431 ===================================================================== 1. Summary: Updated java-1.6.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Multiple flaws were discovered in the font layout engine in the 2D component. An untrusted Java application or applet could possibly use these flaws to trigger Java Virtual Machine memory corruption. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384) Multiple improper permission check issues were discovered in the Beans, Libraries, JAXP, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-1558, CVE-2013-2422, CVE-2013-1518, CVE-2013-1557) The previous default value of the java.rmi.server.useCodebaseOnly property permitted the RMI implementation to automatically load classes from remotely specified locations. An attacker able to connect to an application using RMI could use this flaw to make the application execute arbitrary code. (CVE-2013-1537) Note: The fix for CVE-2013-1537 changes the default value of the property to true, restricting class loading to the local CLASSPATH and locations specified in the java.rmi.server.codebase property. Refer to Red Hat Bugzilla bug 952387 for additional details. The 2D component did not properly process certain images. An untrusted Java application or applet could possibly use this flaw to trigger Java Virtual Machine memory corruption. (CVE-2013-2420) It was discovered that the Hotspot component did not properly handle certain intrinsic frames, and did not correctly perform MethodHandle lookups. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2013-2431, CVE-2013-2421) It was discovered that JPEGImageReader and JPEGImageWriter in the ImageIO component did not protect against modification of their state while performing certain native code operations. An untrusted Java application or applet could possibly use these flaws to trigger Java Virtual Machine memory corruption. (CVE-2013-2429, CVE-2013-2430) The JDBC driver manager could incorrectly call the toString() method in JDBC drivers, and the ConcurrentHashMap class could incorrectly call the defaultReadObject() method. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. (CVE-2013-1488, CVE-2013-2426) The sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2013-0401) Flaws were discovered in the Network component's InetAddress serialization, and the 2D component's font handling. An untrusted Java application or applet could possibly use these flaws to crash the Java Virtual Machine. (CVE-2013-2417, CVE-2013-2419) The MBeanInstantiator class implementation in the OpenJDK JMX component did not properly check class access before creating new instances. An untrusted Java application or applet could use this flaw to create instances of non-public classes. (CVE-2013-2424) It was discovered that JAX-WS could possibly create temporary files with insecure permissions. A local attacker could use this flaw to access temporary files created by an application using JAX-WS. (CVE-2013-2415) This erratum also upgrades the OpenJDK package to IcedTea6 1.11.10. Refer to the NEWS file, linked to in the References, for further information. All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 920245 - CVE-2013-0401 OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) 920247 - CVE-2013-1488 OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) 952387 - CVE-2013-1537 OpenJDK: remote code loading enabled by default (RMI, 8001040) 952389 - CVE-2013-2415 OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) 952509 - CVE-2013-2424 OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) 952521 - CVE-2013-2429 OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) 952524 - CVE-2013-2430 OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) 952638 - CVE-2013-2420 OpenJDK: image processing vulnerability (2D, 8007617) 952640 - CVE-2013-1558 OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) 952642 - CVE-2013-2422 OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) 952645 - CVE-2013-2431 OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) 952646 - CVE-2013-1518 OpenJDK: JAXP missing security restrictions (JAXP, 6657673) 952648 - CVE-2013-1557 OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) 952649 - CVE-2013-2421 OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) 952653 - CVE-2013-2426 OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) 952656 - CVE-2013-2419 OpenJDK: font processing errors (2D, 8001031) 952657 - CVE-2013-2417 OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) 952708 - CVE-2013-2383 OpenJDK: font layout and glyph table errors (2D, 8004986) 952709 - CVE-2013-2384 OpenJDK: font layout and glyph table errors (2D, 8004987) 952711 - CVE-2013-1569 OpenJDK: font layout and glyph table errors (2D, 8004994) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.el5_9.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.el5_9.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.11.11.el5_9.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.11.11.el5_9.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-0401.html https://www.redhat.com/security/data/cve/CVE-2013-1488.html https://www.redhat.com/security/data/cve/CVE-2013-1518.html https://www.redhat.com/security/data/cve/CVE-2013-1537.html https://www.redhat.com/security/data/cve/CVE-2013-1557.html https://www.redhat.com/security/data/cve/CVE-2013-1558.html https://www.redhat.com/security/data/cve/CVE-2013-1569.html https://www.redhat.com/security/data/cve/CVE-2013-2383.html https://www.redhat.com/security/data/cve/CVE-2013-2384.html https://www.redhat.com/security/data/cve/CVE-2013-2415.html https://www.redhat.com/security/data/cve/CVE-2013-2417.html https://www.redhat.com/security/data/cve/CVE-2013-2419.html https://www.redhat.com/security/data/cve/CVE-2013-2420.html https://www.redhat.com/security/data/cve/CVE-2013-2421.html https://www.redhat.com/security/data/cve/CVE-2013-2422.html https://www.redhat.com/security/data/cve/CVE-2013-2424.html https://www.redhat.com/security/data/cve/CVE-2013-2426.html https://www.redhat.com/security/data/cve/CVE-2013-2429.html https://www.redhat.com/security/data/cve/CVE-2013-2430.html https://www.redhat.com/security/data/cve/CVE-2013-2431.html https://access.redhat.com/security/updates/classification/#important http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.10/NEWS 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFReB4YXlSAg2UNWIIRApIkAJ9/Kk9e0UPaBMyunYAZ5ZL0yGNPZQCdFwLB R1NB2qcpqvapX4RyyM2OH0E= =rAdI -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 24 18:03:15 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 24 Apr 2013 18:03:15 +0000 Subject: [RHSA-2013:0771-01] Moderate: curl security update Message-ID: <201304241803.r3OI3FFp024067@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: curl security update Advisory ID: RHSA-2013:0771-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0771.html Issue date: 2013-04-24 CVE Names: CVE-2013-1944 ===================================================================== 1. Summary: Updated curl packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: cURL provides the libcurl library and a command line tool for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. A flaw was found in the way libcurl matched domains associated with cookies. This could lead to cURL or an application linked against libcurl sending the wrong cookie if only part of the domain name matched the domain associated with the cookie, disclosing the cookie to unrelated hosts. (CVE-2013-1944) Red Hat would like to thank the cURL project for reporting this issue. Upstream acknowledges YAMADA Yasuharu as the original reporter. Users of curl should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libcurl must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 950577 - CVE-2013-1944 curl: Cookie domain suffix match vulnerability 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-16.el5_9.src.rpm i386: curl-7.15.5-16.el5_9.i386.rpm curl-debuginfo-7.15.5-16.el5_9.i386.rpm x86_64: curl-7.15.5-16.el5_9.i386.rpm curl-7.15.5-16.el5_9.x86_64.rpm curl-debuginfo-7.15.5-16.el5_9.i386.rpm curl-debuginfo-7.15.5-16.el5_9.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-16.el5_9.src.rpm i386: curl-debuginfo-7.15.5-16.el5_9.i386.rpm curl-devel-7.15.5-16.el5_9.i386.rpm x86_64: curl-debuginfo-7.15.5-16.el5_9.i386.rpm curl-debuginfo-7.15.5-16.el5_9.x86_64.rpm curl-devel-7.15.5-16.el5_9.i386.rpm curl-devel-7.15.5-16.el5_9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/curl-7.15.5-16.el5_9.src.rpm i386: curl-7.15.5-16.el5_9.i386.rpm curl-debuginfo-7.15.5-16.el5_9.i386.rpm curl-devel-7.15.5-16.el5_9.i386.rpm ia64: curl-7.15.5-16.el5_9.ia64.rpm curl-debuginfo-7.15.5-16.el5_9.ia64.rpm curl-devel-7.15.5-16.el5_9.ia64.rpm ppc: curl-7.15.5-16.el5_9.ppc.rpm curl-7.15.5-16.el5_9.ppc64.rpm curl-debuginfo-7.15.5-16.el5_9.ppc.rpm curl-debuginfo-7.15.5-16.el5_9.ppc64.rpm curl-devel-7.15.5-16.el5_9.ppc.rpm curl-devel-7.15.5-16.el5_9.ppc64.rpm s390x: curl-7.15.5-16.el5_9.s390.rpm curl-7.15.5-16.el5_9.s390x.rpm curl-debuginfo-7.15.5-16.el5_9.s390.rpm curl-debuginfo-7.15.5-16.el5_9.s390x.rpm curl-devel-7.15.5-16.el5_9.s390.rpm curl-devel-7.15.5-16.el5_9.s390x.rpm x86_64: curl-7.15.5-16.el5_9.i386.rpm curl-7.15.5-16.el5_9.x86_64.rpm curl-debuginfo-7.15.5-16.el5_9.i386.rpm curl-debuginfo-7.15.5-16.el5_9.x86_64.rpm curl-devel-7.15.5-16.el5_9.i386.rpm curl-devel-7.15.5-16.el5_9.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-36.el6_4.src.rpm i386: curl-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.i686.rpm x86_64: curl-7.19.7-36.el6_4.x86_64.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.x86_64.rpm libcurl-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-36.el6_4.src.rpm i386: curl-debuginfo-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm x86_64: curl-debuginfo-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.x86_64.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-36.el6_4.src.rpm x86_64: curl-7.19.7-36.el6_4.x86_64.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.x86_64.rpm libcurl-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-36.el6_4.src.rpm x86_64: curl-debuginfo-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.x86_64.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/curl-7.19.7-36.el6_4.src.rpm i386: curl-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm ppc64: curl-7.19.7-36.el6_4.ppc64.rpm curl-debuginfo-7.19.7-36.el6_4.ppc.rpm curl-debuginfo-7.19.7-36.el6_4.ppc64.rpm libcurl-7.19.7-36.el6_4.ppc.rpm libcurl-7.19.7-36.el6_4.ppc64.rpm libcurl-devel-7.19.7-36.el6_4.ppc.rpm libcurl-devel-7.19.7-36.el6_4.ppc64.rpm s390x: curl-7.19.7-36.el6_4.s390x.rpm curl-debuginfo-7.19.7-36.el6_4.s390.rpm curl-debuginfo-7.19.7-36.el6_4.s390x.rpm libcurl-7.19.7-36.el6_4.s390.rpm libcurl-7.19.7-36.el6_4.s390x.rpm libcurl-devel-7.19.7-36.el6_4.s390.rpm libcurl-devel-7.19.7-36.el6_4.s390x.rpm x86_64: curl-7.19.7-36.el6_4.x86_64.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.x86_64.rpm libcurl-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.x86_64.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/curl-7.19.7-36.el6_4.src.rpm i386: curl-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm x86_64: curl-7.19.7-36.el6_4.x86_64.rpm curl-debuginfo-7.19.7-36.el6_4.i686.rpm curl-debuginfo-7.19.7-36.el6_4.x86_64.rpm libcurl-7.19.7-36.el6_4.i686.rpm libcurl-7.19.7-36.el6_4.x86_64.rpm libcurl-devel-7.19.7-36.el6_4.i686.rpm libcurl-devel-7.19.7-36.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1944.html https://access.redhat.com/security/updates/classification/#moderate http://curl.haxx.se/docs/adv_20130412.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFReB5SXlSAg2UNWIIRAsdkAJ4r0eBEf3zXgZqD1pxzrf3m1nGYYgCfUER1 vy4xp7WyDEP2xa5IeA0qZOE= =yUR6 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 25 17:39:39 2013 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Apr 2013 17:39:39 +0000 Subject: [RHSA-2013:0772-01] Important: mysql security update Message-ID: <201304251739.r3PHdeCu023220@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mysql security update Advisory ID: RHSA-2013:0772-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0772.html Issue date: 2013-04-25 CVE Names: CVE-2012-5614 CVE-2013-1506 CVE-2013-1521 CVE-2013-1531 CVE-2013-1532 CVE-2013-1544 CVE-2013-1548 CVE-2013-1552 CVE-2013-1555 CVE-2013-2375 CVE-2013-2378 CVE-2013-2389 CVE-2013-2391 CVE-2013-2392 ===================================================================== 1. Summary: Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2012-5614, CVE-2013-1506, CVE-2013-1521, CVE-2013-1531, CVE-2013-1532, CVE-2013-1544, CVE-2013-1548, CVE-2013-1552, CVE-2013-1555, CVE-2013-2375, CVE-2013-2378, CVE-2013-2389, CVE-2013-2391, CVE-2013-2392) These updated packages upgrade MySQL to version 5.1.69. Refer to the MySQL release notes listed in the References section for a full list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 882607 - CVE-2012-5614 mysql: COM_BINLOG_DUMP crash on invalid data 952861 - CVE-2013-1521 mysql: unspecified vulnerability related to Server Locking (CPU April 2013) 952862 - CVE-2013-2378 mysql: unspecified vulnerability related to Information Schema (CPU April 2013) 952863 - CVE-2013-1552 mysql: unspecified vulnerability related to Server (CPU April 2013) 952864 - CVE-2013-1531 mysql: unspecified vulnerability related to Server Privileges (CPU April 2013) 952866 - CVE-2013-2375 mysql: unspecified vulnerability related to Server Privileges (CPU April 2013) 952869 - CVE-2013-1544 mysql: unspecified DoS related to Data Manipulation Language (CPU April 2013) 952871 - CVE-2013-1532 mysql: unspecified DoS related to Information Schema (CPU April 2013) 952874 - CVE-2013-2389 mysql: unspecified DoS related to InnoDB (CPU April 2013) 952875 - CVE-2013-2392 mysql: unspecified DoS related to Server Optimizer (CPU April 2013) 952876 - CVE-2013-1555 mysql: unspecified DoS related to Server Partition (CPU April 2013) 952893 - CVE-2013-1548 mysql: unspecified DoS related to Server Types (CPU April 2013) 952895 - CVE-2013-2391 mysql: unspecified vulnerability related to Server Install (CPU April 2013) 952899 - CVE-2013-1506 mysql: unspecified DoS related to Server Locking (CPU April 2013) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm i386: mysql-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-server-5.1.69-1.el6_4.i686.rpm x86_64: mysql-5.1.69-1.el6_4.x86_64.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.x86_64.rpm mysql-server-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm i386: mysql-bench-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm mysql-test-5.1.69-1.el6_4.i686.rpm x86_64: mysql-bench-5.1.69-1.el6_4.x86_64.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.x86_64.rpm mysql-test-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm x86_64: mysql-5.1.69-1.el6_4.x86_64.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm x86_64: mysql-bench-5.1.69-1.el6_4.x86_64.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.x86_64.rpm mysql-server-5.1.69-1.el6_4.x86_64.rpm mysql-test-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm i386: mysql-5.1.69-1.el6_4.i686.rpm mysql-bench-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-server-5.1.69-1.el6_4.i686.rpm mysql-test-5.1.69-1.el6_4.i686.rpm ppc64: mysql-5.1.69-1.el6_4.ppc64.rpm mysql-bench-5.1.69-1.el6_4.ppc64.rpm mysql-debuginfo-5.1.69-1.el6_4.ppc.rpm mysql-debuginfo-5.1.69-1.el6_4.ppc64.rpm mysql-devel-5.1.69-1.el6_4.ppc.rpm mysql-devel-5.1.69-1.el6_4.ppc64.rpm mysql-libs-5.1.69-1.el6_4.ppc.rpm mysql-libs-5.1.69-1.el6_4.ppc64.rpm mysql-server-5.1.69-1.el6_4.ppc64.rpm mysql-test-5.1.69-1.el6_4.ppc64.rpm s390x: mysql-5.1.69-1.el6_4.s390x.rpm mysql-bench-5.1.69-1.el6_4.s390x.rpm mysql-debuginfo-5.1.69-1.el6_4.s390.rpm mysql-debuginfo-5.1.69-1.el6_4.s390x.rpm mysql-devel-5.1.69-1.el6_4.s390.rpm mysql-devel-5.1.69-1.el6_4.s390x.rpm mysql-libs-5.1.69-1.el6_4.s390.rpm mysql-libs-5.1.69-1.el6_4.s390x.rpm mysql-server-5.1.69-1.el6_4.s390x.rpm mysql-test-5.1.69-1.el6_4.s390x.rpm x86_64: mysql-5.1.69-1.el6_4.x86_64.rpm mysql-bench-5.1.69-1.el6_4.x86_64.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.x86_64.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.x86_64.rpm mysql-server-5.1.69-1.el6_4.x86_64.rpm mysql-test-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm i386: mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm ppc64: mysql-debuginfo-5.1.69-1.el6_4.ppc.rpm mysql-debuginfo-5.1.69-1.el6_4.ppc64.rpm mysql-embedded-5.1.69-1.el6_4.ppc.rpm mysql-embedded-5.1.69-1.el6_4.ppc64.rpm mysql-embedded-devel-5.1.69-1.el6_4.ppc.rpm mysql-embedded-devel-5.1.69-1.el6_4.ppc64.rpm s390x: mysql-debuginfo-5.1.69-1.el6_4.s390.rpm mysql-debuginfo-5.1.69-1.el6_4.s390x.rpm mysql-embedded-5.1.69-1.el6_4.s390.rpm mysql-embedded-5.1.69-1.el6_4.s390x.rpm mysql-embedded-devel-5.1.69-1.el6_4.s390.rpm mysql-embedded-devel-5.1.69-1.el6_4.s390x.rpm x86_64: mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm i386: mysql-5.1.69-1.el6_4.i686.rpm mysql-bench-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-server-5.1.69-1.el6_4.i686.rpm mysql-test-5.1.69-1.el6_4.i686.rpm x86_64: mysql-5.1.69-1.el6_4.x86_64.rpm mysql-bench-5.1.69-1.el6_4.x86_64.rpm mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-devel-5.1.69-1.el6_4.i686.rpm mysql-devel-5.1.69-1.el6_4.x86_64.rpm mysql-libs-5.1.69-1.el6_4.i686.rpm mysql-libs-5.1.69-1.el6_4.x86_64.rpm mysql-server-5.1.69-1.el6_4.x86_64.rpm mysql-test-5.1.69-1.el6_4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/mysql-5.1.69-1.el6_4.src.rpm i386: mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm x86_64: mysql-debuginfo-5.1.69-1.el6_4.i686.rpm mysql-debuginfo-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-5.1.69-1.el6_4.i686.rpm mysql-embedded-5.1.69-1.el6_4.x86_64.rpm mysql-embedded-devel-5.1.69-1.el6_4.i686.rpm mysql-embedded-devel-5.1.69-1.el6_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-5614.html https://www.redhat.com/security/data/cve/CVE-2013-1506.html https://www.redhat.com/security/data/cve/CVE-2013-1521.html https://www.redhat.com/security/data/cve/CVE-2013-1531.html https://www.redhat.com/security/data/cve/CVE-2013-1532.html https://www.redhat.com/security/data/cve/CVE-2013-1544.html https://www.redhat.com/security/data/cve/CVE-2013-1548.html https://www.redhat.com/security/data/cve/CVE-2013-1552.html https://www.redhat.com/security/data/cve/CVE-2013-1555.html https://www.redhat.com/security/data/cve/CVE-2013-2375.html https://www.redhat.com/security/data/cve/CVE-2013-2378.html https://www.redhat.com/security/data/cve/CVE-2013-2389.html https://www.redhat.com/security/data/cve/CVE-2013-2391.html https://www.redhat.com/security/data/cve/CVE-2013-2392.html https://access.redhat.com/security/updates/classification/#important http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html#AppendixMSQL http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-69.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFReWo8XlSAg2UNWIIRAmuIAJ4jP1zQz4/IreYBUOHkquq9V+71qQCgpDfA 585DgLwXPclUGR1SzFAaT2M= =bIVs -----END PGP SIGNATURE-----