From bugzilla at redhat.com Tue Apr 1 17:55:12 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 1 Apr 2014 17:55:12 +0000 Subject: [RHSA-2014:0348-01] Important: xalan-j2 security update Message-ID: <201404011755.s31HtCVM023390@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: xalan-j2 security update Advisory ID: RHSA-2014:0348-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0348.html Issue date: 2014-04-01 CVE Names: CVE-2014-0107 ===================================================================== 1. Summary: Updated xalan-j2 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations (XSLT) content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan-Java. (CVE-2014-0107) All xalan-j2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1080248 - CVE-2014-0107 Xalan-Java: insufficient constraints in secure processing feature 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xalan-j2-2.7.0-6jpp.2.src.rpm i386: xalan-j2-2.7.0-6jpp.2.i386.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.i386.rpm xalan-j2-manual-2.7.0-6jpp.2.i386.rpm xalan-j2-xsltc-2.7.0-6jpp.2.i386.rpm x86_64: xalan-j2-2.7.0-6jpp.2.x86_64.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-manual-2.7.0-6jpp.2.x86_64.rpm xalan-j2-xsltc-2.7.0-6jpp.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xalan-j2-2.7.0-6jpp.2.src.rpm i386: xalan-j2-debuginfo-2.7.0-6jpp.2.i386.rpm xalan-j2-demo-2.7.0-6jpp.2.i386.rpm xalan-j2-javadoc-2.7.0-6jpp.2.i386.rpm x86_64: xalan-j2-debuginfo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-demo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-javadoc-2.7.0-6jpp.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xalan-j2-2.7.0-6jpp.2.src.rpm i386: xalan-j2-2.7.0-6jpp.2.i386.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.i386.rpm xalan-j2-demo-2.7.0-6jpp.2.i386.rpm xalan-j2-javadoc-2.7.0-6jpp.2.i386.rpm xalan-j2-manual-2.7.0-6jpp.2.i386.rpm xalan-j2-xsltc-2.7.0-6jpp.2.i386.rpm ia64: xalan-j2-2.7.0-6jpp.2.ia64.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.ia64.rpm xalan-j2-demo-2.7.0-6jpp.2.ia64.rpm xalan-j2-javadoc-2.7.0-6jpp.2.ia64.rpm xalan-j2-manual-2.7.0-6jpp.2.ia64.rpm xalan-j2-xsltc-2.7.0-6jpp.2.ia64.rpm ppc: xalan-j2-2.7.0-6jpp.2.ppc.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.ppc.rpm xalan-j2-demo-2.7.0-6jpp.2.ppc.rpm xalan-j2-javadoc-2.7.0-6jpp.2.ppc.rpm xalan-j2-manual-2.7.0-6jpp.2.ppc.rpm xalan-j2-xsltc-2.7.0-6jpp.2.ppc.rpm s390x: xalan-j2-2.7.0-6jpp.2.s390x.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.s390x.rpm xalan-j2-demo-2.7.0-6jpp.2.s390x.rpm xalan-j2-javadoc-2.7.0-6jpp.2.s390x.rpm xalan-j2-manual-2.7.0-6jpp.2.s390x.rpm xalan-j2-xsltc-2.7.0-6jpp.2.s390x.rpm x86_64: xalan-j2-2.7.0-6jpp.2.x86_64.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-demo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-javadoc-2.7.0-6jpp.2.x86_64.rpm xalan-j2-manual-2.7.0-6jpp.2.x86_64.rpm xalan-j2-xsltc-2.7.0-6jpp.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0107.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTOv1vXlSAg2UNWIIRAi31AKCBwKSbomajwNPU6traXrM3gHaZAwCfcl99 oGB0uqKJAthGJmyGMoH7Lhw= =tYqh -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 1 17:55:37 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 1 Apr 2014 17:55:37 +0000 Subject: [RHSA-2014:0349-01] Low: Red Hat Enterprise Linux 5.3 Advanced Mission Critical Retirement Notice Message-ID: <201404011755.s31HtbT4004355@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise Linux 5.3 Advanced Mission Critical Retirement Notice Advisory ID: RHSA-2014:0349-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0349.html Issue date: 2014-04-01 ===================================================================== 1. Summary: This is the final notification for the retirement of Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC). This notification applies only to those customers with subscriptions for Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC). 2. Relevant releases/architectures: Red Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64 3. Description: In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical (AMC) for Red Hat Enterprise Linux 5.3 was retired as of March 31, 2014, and support is no longer provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 5.3 AMC after March 31, 2014. In addition, technical support through Red Hat's Global Support Services for Red Hat Enterprise Linux 5.3 AMC will no longer be provided after this date. We encourage customers to plan their migration from Red Hat Enterprise Linux 5.3 to a more recent release of Red Hat Enterprise Linux 5 or 6. As a benefit of the Red Hat subscription model, customers can use their active subscriptions to entitle any system on a currently supported Red Hat Enterprise Linux 5 release (AMC is available on 5.9) or Red Hat Enterprise Linux 6 release (AMC is available on 6.2 and 6.4, and planned for 6.6). Details of the Red Hat Enterprise Linux life cycle can be found here: https://access.redhat.com/site/support/policy/updates/errata/ 4. Solution: This erratum contains an updated redhat-release package, which provides a copy of this retirement notice in the "/usr/share/doc/" directory. 5. Package List: Red Hat Enterprise Linux Long Life (v. 5.3 server): Source: redhat-release-5Server-5.3.0.8.src.rpm i386: redhat-release-5Server-5.3.0.8.i386.rpm redhat-release-debuginfo-5Server-5.3.0.8.i386.rpm ia64: redhat-release-5Server-5.3.0.8.ia64.rpm redhat-release-debuginfo-5Server-5.3.0.8.ia64.rpm x86_64: redhat-release-5Server-5.3.0.8.x86_64.rpm redhat-release-debuginfo-5Server-5.3.0.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 6. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/site/support/policy/updates/errata/ 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTOv2HXlSAg2UNWIIRAqw5AJ46AalJKax/gPtONPqaoGr7bxJ94QCgg3Jx DOfLjL8FKPkMZDXoeTPEm28= =Y1+E -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 1 17:56:08 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 1 Apr 2014 17:56:08 +0000 Subject: [RHSA-2014:0350-01] Low: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 Retirement Notice Message-ID: <201404011756.s31Hu9ot024092@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 Retirement Notice Advisory ID: RHSA-2014:0350-01 Product: Red Hat Enterprise MRG for RHEL-5 Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0350.html Issue date: 2014-04-01 ===================================================================== 1. Summary: This is the final notification for the retirement of Red Hat Enterprise MRG Version 1 for Red Hat Enterprise Linux 5. This notification applies only to those customers with subscriptions for Red Hat Enterprise MRG Version 1 for Red Hat Enterprise Linux 5. 2. Relevant releases/architectures: MRG Grid Execute Node for RHEL 5 Server - noarch MRG Grid for RHEL 5 Server - noarch MRG Management for RHEL 5 Server - noarch MRG Realtime for RHEL 5 Server - noarch Red Hat MRG Messaging Base for RHEL 5 Server - noarch Red Hat MRG Messaging for RHEL 5 Server - noarch 3. Description: In accordance with the Red Hat Enterprise MRG Life Cycle policy, the Red Hat Enterprise MRG product, which includes MRG-Messaging, MRG-Realtime, and MRG-Grid, Version 1 offering for Red Hat Enterprise Linux 5 was retired as of March 31, 2014, and support is no longer provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for MRG-Messaging, MRG-Realtime, and MRG-Grid Version 1 on Red Hat Enterprise Linux 5 after March 31, 2014. In addition, technical support through Red Hat's Global Support Services will no longer be provided for Red Hat Enterprise MRG Version 1 on Red Hat Enterprise Linux 5 after this date. We encourage customers to plan their migration from Red Hat Enterprise MRG Version 1 for Red Hat Enterprise Linux 5 to a more recent release of Red Hat Enterprise MRG on Red Hat Enterprise Linux. As a benefit of the Red Hat subscription model, customers can use their active Red Hat Enterprise MRG subscriptions to entitle any system on a currently supported version of those products. Details of the Red Hat Enterprise MRG life cycle can be found here: https://access.redhat.com/site/support/policy/updates/mrg/ 4. Solution: This erratum contains an updated mrg-release package, which provides a copy of this retirement notice in the "/usr/share/doc/" directory. 5. Package List: MRG Grid for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-7.el5.src.rpm noarch: mrg-release-1.3.3-7.el5.noarch.rpm MRG Grid Execute Node for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-7.el5.src.rpm noarch: mrg-release-1.3.3-7.el5.noarch.rpm MRG Management for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-7.el5.src.rpm noarch: mrg-release-1.3.3-7.el5.noarch.rpm Red Hat MRG Messaging for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-7.el5.src.rpm noarch: mrg-release-1.3.3-7.el5.noarch.rpm Red Hat MRG Messaging Base for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-7.el5.src.rpm noarch: mrg-release-1.3.3-7.el5.noarch.rpm MRG Realtime for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-1.3.3-7.el5.src.rpm noarch: mrg-release-1.3.3-7.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 6. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/site/support/policy/updates/mrg/ 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTOv2nXlSAg2UNWIIRArVCAJ9j9B65R47mFuJuZHqHj8RIxl+ZMwCghcO2 4SHJ4WhgBb7zKN2C1Tc0hL0= =rzaQ -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 2 19:59:18 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 2 Apr 2014 19:59:18 +0000 Subject: [RHSA-2014:0353-01] Important: libyaml security update Message-ID: <201404021959.s32JxIuG026292@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libyaml security update Advisory ID: RHSA-2014:0353-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0353.html Issue date: 2014-04-02 CVE Names: CVE-2013-6393 CVE-2014-2525 ===================================================================== 1. Summary: Updated libyaml packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack 3 - x86_64 3. Description: YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-2525) An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6393) Red Hat would like to thank oCERT for reporting the CVE-2014-2525 issue. oCERT acknowledges Ivan Fratric of the Google Security Team as the original reporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the Red Hat Product Security Team. All libyaml users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against the libyaml library must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1033990 - CVE-2013-6393 libyaml: heap-based buffer overflow when parsing YAML tags 1078083 - CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs 6. Package List: OpenStack 3: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/libyaml-0.1.3-1.4.el6.src.rpm x86_64: libyaml-0.1.3-1.4.el6.x86_64.rpm libyaml-debuginfo-0.1.3-1.4.el6.x86_64.rpm libyaml-devel-0.1.3-1.4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6393.html https://www.redhat.com/security/data/cve/CVE-2014-2525.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPGvwXlSAg2UNWIIRAibRAJwP/W46PwoBU1ZdVMj4mrYheo9PZQCgmlAk c1Cpac3WQoT9neF87pdMGS0= =plEp -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 2 19:59:52 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 2 Apr 2014 19:59:52 +0000 Subject: [RHSA-2014:0354-01] Important: libyaml security update Message-ID: <201404021959.s32JxqiM014901@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libyaml security update Advisory ID: RHSA-2014:0354-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0354.html Issue date: 2014-04-02 CVE Names: CVE-2013-6393 CVE-2014-2525 ===================================================================== 1. Summary: Updated libyaml packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 4. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack 4 - x86_64 3. Description: YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-2525) An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6393) Red Hat would like to thank oCERT for reporting the CVE-2014-2525 issue. oCERT acknowledges Ivan Fratric of the Google Security Team as the original reporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the Red Hat Product Security Team. All libyaml users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against the libyaml library must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1033990 - CVE-2013-6393 libyaml: heap-based buffer overflow when parsing YAML tags 1078083 - CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs 6. Package List: OpenStack 4: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/libyaml-0.1.3-1.4.el6.src.rpm x86_64: libyaml-0.1.3-1.4.el6.x86_64.rpm libyaml-debuginfo-0.1.3-1.4.el6.x86_64.rpm libyaml-devel-0.1.3-1.4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6393.html https://www.redhat.com/security/data/cve/CVE-2014-2525.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPGweXlSAg2UNWIIRArhnAKCItIo8r2ARivCyjmO3cbYMXEBc5wCcDs7O LoJHwU85bdGZzpSRZta9cnE= =eMzT -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 2 20:01:34 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 2 Apr 2014 20:01:34 +0000 Subject: [RHSA-2014:0355-01] Important: ruby193-libyaml security update Message-ID: <201404022001.s32K1Y57025754@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: ruby193-libyaml security update Advisory ID: RHSA-2014:0355-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0355.html Issue date: 2014-04-02 CVE Names: CVE-2013-6393 CVE-2014-2525 ===================================================================== 1. Summary: Updated ruby193-libyaml packages that fix two security issues are now available for Red Hat Software Collections 1. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for RHEL 6 Server - x86_64 Red Hat Software Collections for RHEL 6 Workstation - x86_64 3. Description: YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-2525) An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6393) Red Hat would like to thank oCERT for reporting the CVE-2014-2525 issue. oCERT acknowledges Ivan Fratric of the Google Security Team as the original reporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the Red Hat Product Security Team. All ruby193-libyaml users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against the libyaml library must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1033990 - CVE-2013-6393 libyaml: heap-based buffer overflow when parsing YAML tags 1078083 - CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs 6. Package List: Red Hat Software Collections for RHEL 6 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHSCL/SRPMS/ruby193-libyaml-0.1.4-5.1.el6.src.rpm x86_64: ruby193-libyaml-0.1.4-5.1.el6.x86_64.rpm ruby193-libyaml-debuginfo-0.1.4-5.1.el6.x86_64.rpm ruby193-libyaml-devel-0.1.4-5.1.el6.x86_64.rpm Red Hat Software Collections for RHEL 6 Workstation: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/RHSCL/SRPMS/ruby193-libyaml-0.1.4-5.1.el6.src.rpm x86_64: ruby193-libyaml-0.1.4-5.1.el6.x86_64.rpm ruby193-libyaml-debuginfo-0.1.4-5.1.el6.x86_64.rpm ruby193-libyaml-devel-0.1.4-5.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6393.html https://www.redhat.com/security/data/cve/CVE-2014-2525.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPGxDXlSAg2UNWIIRAv2OAJ4ySomkP6C/zkr6a9WbAoT5oVa7VwCeLyWu JaKAYX98aaHVXNHEpYkhzTk= =9X7m -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:18:33 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:18:33 +0000 Subject: [RHSA-2014:0364-01] Important: ruby193-libyaml security update Message-ID: <201404032118.s33LIXm3012442@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: ruby193-libyaml security update Advisory ID: RHSA-2014:0364-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0364.html Issue date: 2014-04-03 CVE Names: CVE-2013-6393 CVE-2014-2525 ===================================================================== 1. Summary: Updated ruby193-libyaml packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack 3 - x86_64 3. Description: YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-2525) An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6393) Red Hat would like to thank oCERT for reporting the CVE-2014-2525 issue. oCERT acknowledges Ivan Fratric of the Google Security Team as the original reporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the Red Hat Product Security Team. All ruby193-libyaml users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against the libyaml library must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1033990 - CVE-2013-6393 libyaml: heap-based buffer overflow when parsing YAML tags 1078083 - CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs 6. Package List: OpenStack 3: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/ruby193-libyaml-0.1.4-5.1.el6.src.rpm x86_64: ruby193-libyaml-0.1.4-5.1.el6.x86_64.rpm ruby193-libyaml-debuginfo-0.1.4-5.1.el6.x86_64.rpm ruby193-libyaml-devel-0.1.4-5.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6393.html https://www.redhat.com/security/data/cve/CVE-2014-2525.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdAPXlSAg2UNWIIRAlIiAJ4s/G7UD87b9eo1nQSpSvtN3QGlcACeLViP 5QKKSd9j8ZtDpcIu5xged6o= =mQYu -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:19:02 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:19:02 +0000 Subject: [RHSA-2014:0365-01] Moderate: python-django-horizon security and bug fix update Message-ID: <201404032119.s33LJ2C3007048@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python-django-horizon security and bug fix update Advisory ID: RHSA-2014:0365-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0365.html Issue date: 2014-04-03 CVE Names: CVE-2013-6858 ===================================================================== 1. Summary: Updated python-django-horizon packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: OpenStack 3 - noarch 3. Description: OpenStack Dashboard (horizon) provides administrators and users a graphical interface to access, provision and automate cloud-based resources. The dashboard allows cloud administrators to get an overall view of the size and state of the cloud and it provides end-users a self-service portal to provision their own resources within the limits set by administrators. A flaw was found in the way OpenStack Dashboard sanitized the Instance Name string. By embedding HTML tags in an Instance Name, a remote attacker could use this flaw to execute a script within a victim's browser, resulting in a cross-site scripting (XSS) attack. Note that only setups using OpenStack Dashboard were affected. (CVE-2013-6858) The python-django-horizon packages have been upgraded to upstream version 2013.1.5, which provides a number of bug fixes over the previous version. (BZ#1080584) All python-django-horizon users are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1034153 - CVE-2013-6858 openstack: horizon multiple XSS vulnerabilities. 6. Package List: OpenStack 3: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/python-django-horizon-2013.1.5-1.el6ost.src.rpm noarch: openstack-dashboard-2013.1.5-1.el6ost.noarch.rpm python-django-horizon-2013.1.5-1.el6ost.noarch.rpm python-django-horizon-doc-2013.1.5-1.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6858.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdAyXlSAg2UNWIIRAshlAJ9Pz+wCdRV6isErlADDTWG9MdwcugCffScC Xcy5YSsX17OVGDGfxQbBJGE= =2J8U -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:19:44 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:19:44 +0000 Subject: [RHSA-2014:0366-01] Moderate: openstack-nova security and bug fix update Message-ID: <201404032119.s33LJi9S007214@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-nova security and bug fix update Advisory ID: RHSA-2014:0366-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0366.html Issue date: 2014-04-03 CVE Names: CVE-2013-4497 CVE-2013-7048 CVE-2013-7130 ===================================================================== 1. Summary: Updated openstack-nova packages that fix three security issues and one bug are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack 3 - noarch 3. Description: OpenStack Compute (nova) launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances, managing networks, and controlling access through users and projects. A flaw was found in the way the libvirt driver handled short-lived disk back-up files on Compute nodes. An authenticated attacker could use this flaw to create a large number of such files, exhausting all available space on Compute node disks, and potentially causing a denial of service. Note that only Compute setups using the libvirt driver were affected. (CVE-2013-7048) It was discovered that the libvirt driver did not properly handle live migration of virtual machines. An authenticated attacker could use this flaw to gain access to a snapshot of a migrated virtual machine. Note that only setups using KVM live block migration were affected. (CVE-2013-7130) It was found that OpenStack Compute did not properly reapply existing security groups after migrating or resizing a virtual machine. This could cause virtual machine instances to be unintentionally exposed on the network. Note that only setups using the XenAPI back end were affected. (CVE-2013-4497) Red Hat would like to thank the OpenStack Project for reporting CVE-2013-7130. Upstream acknowledges Loganathan Parthipan as the original reporter of CVE-2013-7130. This update also fixes the following bug: * Prior to this update, the cache mechanism did not consider existing network interfaces when building the nework list. After any change in the network interfaces, only the interface modified last was shown when listing or getting the details of an instance. With this update, the cache mechanism considers all existing instances when it is being refreshed. (BZ#1038239) All openstack-nova users are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1026171 - CVE-2013-4497 openstack-nova: XenAPI security groups not kept through migrate or resize 1038239 - nova interface-attach causes existing networks to be shown as replaced by new one when "nova show" is run 1040786 - CVE-2013-7048 Openstack Nova: insecure directory permissions in snapshots 1055400 - CVE-2013-7130 OpenStack nova: Live migration can leak root disk into ephemeral storage 6. Package List: OpenStack 3: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-nova-2013.1.5-2.el6ost.src.rpm noarch: openstack-nova-2013.1.5-2.el6ost.noarch.rpm openstack-nova-api-2013.1.5-2.el6ost.noarch.rpm openstack-nova-cells-2013.1.5-2.el6ost.noarch.rpm openstack-nova-cert-2013.1.5-2.el6ost.noarch.rpm openstack-nova-common-2013.1.5-2.el6ost.noarch.rpm openstack-nova-compute-2013.1.5-2.el6ost.noarch.rpm openstack-nova-conductor-2013.1.5-2.el6ost.noarch.rpm openstack-nova-console-2013.1.5-2.el6ost.noarch.rpm openstack-nova-doc-2013.1.5-2.el6ost.noarch.rpm openstack-nova-network-2013.1.5-2.el6ost.noarch.rpm openstack-nova-objectstore-2013.1.5-2.el6ost.noarch.rpm openstack-nova-scheduler-2013.1.5-2.el6ost.noarch.rpm python-nova-2013.1.5-2.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-4497.html https://www.redhat.com/security/data/cve/CVE-2013-7048.html https://www.redhat.com/security/data/cve/CVE-2013-7130.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdBUXlSAg2UNWIIRAnQKAKDDjFOWwALdf8QeJTYSRi7nTmCqEgCeLaP3 kpU0Z0j+dSTuznJmG3imtDM= =NtKY -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:20:32 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:20:32 +0000 Subject: [RHSA-2014:0367-01] Moderate: openstack-swift security update Message-ID: <201404032120.s33LKWK7011861@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-swift security update Advisory ID: RHSA-2014:0367-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0367.html Issue date: 2014-04-03 CVE Names: CVE-2014-0006 ===================================================================== 1. Summary: Updated openstack-swift packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: OpenStack 3 - noarch 3. Description: OpenStack Object Storage (swift) provides object storage in virtual containers, which allows users to store and retrieve files (arbitrary data). The service's distributed architecture supports horizontal scaling; redundancy as failure-proofing is provided through software-based data replication. Because Object Storage supports asynchronous eventual consistency replication, it is well suited to multiple data-center deployment. A timing attack flaw was found in the way the swift TempURL middleware responded to arbitrary TempURL requests. An attacker with knowledge of an object's name could use this flaw to obtain a secret URL to this object, which was intended to be publicly shared only with specific recipients, if the object had the TempURL key set. Note that only setups using the TempURL middleware were affected. (CVE-2014-0006) Red Hat would like to thank the OpenStack Project for reporting this issue. Upstream acknowledges Samuel Merritt of SwiftStack as the original reporter. All users of openstack-swift are advised to upgrade to these updated packages, which correct this issue. After installing this update, the OpenStack Object Storage services will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1051670 - CVE-2014-0006 Openstack Swift: TempURL timing attack 6. Package List: OpenStack 3: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-swift-1.8.0-8.el6ost.src.rpm noarch: openstack-swift-1.8.0-8.el6ost.noarch.rpm openstack-swift-account-1.8.0-8.el6ost.noarch.rpm openstack-swift-container-1.8.0-8.el6ost.noarch.rpm openstack-swift-doc-1.8.0-8.el6ost.noarch.rpm openstack-swift-object-1.8.0-8.el6ost.noarch.rpm openstack-swift-proxy-1.8.0-8.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0006.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdB6XlSAg2UNWIIRAjmIAJ9asnnQMVMq8arez+wjhsg+yPv+5QCfc5pD OUYTTMNO/XJJCAYRtYC+jOA= =KwDx -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:21:20 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:21:20 +0000 Subject: [RHSA-2014:0368-01] Moderate: openstack-keystone security update Message-ID: <201404032121.s33LLKbR023404@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-keystone security update Advisory ID: RHSA-2014:0368-01 Product: Red Hat OpenStack Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0368.html Issue date: 2014-04-03 CVE Names: CVE-2013-6391 CVE-2014-2237 ===================================================================== 1. Summary: Updated openstack-keystone packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: OpenStack 3 - noarch 3. Description: The OpenStack Identity service (keystone) authenticates and authorizes OpenStack users by keeping track of users and their permitted activities. The Identity service supports multiple forms of authentication including user name and password credentials, token-based systems, and AWS-style logins. It was found that the ec2token API in keystone, which is used to generate EC2-style (Amazon Elastic Compute Cloud) credentials, could generate a token not scoped to a particular trust when creating a token from a received trust-scoped token. A remote attacker could use this flaw to retrieve a token that elevated their privileges to all of the trustor's roles. Note that only OpenStack Identity setups that have EC2-style authentication enabled were affected. (CVE-2013-6391) It was found that the the memcache token back end of OpenStack Identity did not correctly invalidate a revoked trust token, allowing users with revoked tokens to retain access to services they should no longer be able to access. Note that only OpenStack Identity setups using the memcache back end for tokens were affected. (CVE-2014-2237) Red Hat would like to thank Jeremy Stanley of the OpenStack Project for reporting CVE-2013-6391. Upstream acknowledges Steven Hardy of Red Hat as the original reporter of CVE-2013-6391. All openstack-keystone users are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1039164 - CVE-2013-6391 OpenStack Keystone: trust circumvention through EC2-style tokens 1071434 - CVE-2014-2237 openstack-keystone: trustee token revocation does not work with memcache backend 6. Package List: OpenStack 3: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-keystone-2013.1.5-2.el6ost.src.rpm noarch: openstack-keystone-2013.1.5-2.el6ost.noarch.rpm openstack-keystone-doc-2013.1.5-2.el6ost.noarch.rpm python-keystone-2013.1.5-2.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6391.html https://www.redhat.com/security/data/cve/CVE-2014-2237.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdC4XlSAg2UNWIIRArlaAJ9QJlDuPVc3nf9v874hh/P2s42HdgCdGvuX Z3gRPxMSRKgmgOwDD77R8WU= =C52Y -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:21:54 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:21:54 +0000 Subject: [RHSA-2014:0369-01] Moderate: httpd security update Message-ID: <201404032121.s33LLsxl012285@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: httpd security update Advisory ID: RHSA-2014:0369-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0369.html Issue date: 2014-04-03 CVE Names: CVE-2013-6438 CVE-2014-0098 ===================================================================== 1. Summary: Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. It was found that the mod_dav module did not correctly strip leading white space from certain elements in a parsed XML. In certain httpd configurations that use the mod_dav module (for example when using the mod_dav_svn module), a remote attacker could send a specially crafted DAV request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2013-6438) A buffer over-read flaw was found in the httpd mod_log_config module. In configurations where cookie logging is enabled (on Red Hat Enterprise Linux it is disabled by default), a remote attacker could use this flaw to crash the httpd child process via an HTTP request with a malformed cookie header. (CVE-2014-0098) All httpd users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1077867 - CVE-2013-6438 httpd: mod_dav denial of service via crafted DAV WRITE request 1077871 - CVE-2014-0098 httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-85.el5_10.src.rpm i386: httpd-2.2.3-85.el5_10.i386.rpm httpd-debuginfo-2.2.3-85.el5_10.i386.rpm mod_ssl-2.2.3-85.el5_10.i386.rpm x86_64: httpd-2.2.3-85.el5_10.x86_64.rpm httpd-debuginfo-2.2.3-85.el5_10.x86_64.rpm mod_ssl-2.2.3-85.el5_10.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-85.el5_10.src.rpm i386: httpd-debuginfo-2.2.3-85.el5_10.i386.rpm httpd-devel-2.2.3-85.el5_10.i386.rpm httpd-manual-2.2.3-85.el5_10.i386.rpm x86_64: httpd-debuginfo-2.2.3-85.el5_10.i386.rpm httpd-debuginfo-2.2.3-85.el5_10.x86_64.rpm httpd-devel-2.2.3-85.el5_10.i386.rpm httpd-devel-2.2.3-85.el5_10.x86_64.rpm httpd-manual-2.2.3-85.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/httpd-2.2.3-85.el5_10.src.rpm i386: httpd-2.2.3-85.el5_10.i386.rpm httpd-debuginfo-2.2.3-85.el5_10.i386.rpm httpd-devel-2.2.3-85.el5_10.i386.rpm httpd-manual-2.2.3-85.el5_10.i386.rpm mod_ssl-2.2.3-85.el5_10.i386.rpm ia64: httpd-2.2.3-85.el5_10.ia64.rpm httpd-debuginfo-2.2.3-85.el5_10.ia64.rpm httpd-devel-2.2.3-85.el5_10.ia64.rpm httpd-manual-2.2.3-85.el5_10.ia64.rpm mod_ssl-2.2.3-85.el5_10.ia64.rpm ppc: httpd-2.2.3-85.el5_10.ppc.rpm httpd-debuginfo-2.2.3-85.el5_10.ppc.rpm httpd-debuginfo-2.2.3-85.el5_10.ppc64.rpm httpd-devel-2.2.3-85.el5_10.ppc.rpm httpd-devel-2.2.3-85.el5_10.ppc64.rpm httpd-manual-2.2.3-85.el5_10.ppc.rpm mod_ssl-2.2.3-85.el5_10.ppc.rpm s390x: httpd-2.2.3-85.el5_10.s390x.rpm httpd-debuginfo-2.2.3-85.el5_10.s390.rpm httpd-debuginfo-2.2.3-85.el5_10.s390x.rpm httpd-devel-2.2.3-85.el5_10.s390.rpm httpd-devel-2.2.3-85.el5_10.s390x.rpm httpd-manual-2.2.3-85.el5_10.s390x.rpm mod_ssl-2.2.3-85.el5_10.s390x.rpm x86_64: httpd-2.2.3-85.el5_10.x86_64.rpm httpd-debuginfo-2.2.3-85.el5_10.i386.rpm httpd-debuginfo-2.2.3-85.el5_10.x86_64.rpm httpd-devel-2.2.3-85.el5_10.i386.rpm httpd-devel-2.2.3-85.el5_10.x86_64.rpm httpd-manual-2.2.3-85.el5_10.x86_64.rpm mod_ssl-2.2.3-85.el5_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6438.html https://www.redhat.com/security/data/cve/CVE-2014-0098.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdDhXlSAg2UNWIIRAk6uAJ49l8zLp8nyEsV0jjabIqA0go75WQCfU+ue +BGb7fpIybUD2sch7S3YQdk= =B/Zb -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 3 21:22:38 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Apr 2014 21:22:38 +0000 Subject: [RHSA-2014:0370-01] Moderate: httpd security update Message-ID: <201404032122.s33LMcHV008816@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: httpd security update Advisory ID: RHSA-2014:0370-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0370.html Issue date: 2014-04-03 CVE Names: CVE-2013-6438 CVE-2014-0098 ===================================================================== 1. Summary: Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 3. Description: The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. It was found that the mod_dav module did not correctly strip leading white space from certain elements in a parsed XML. In certain httpd configurations that use the mod_dav module (for example when using the mod_dav_svn module), a remote attacker could send a specially crafted DAV request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2013-6438) A buffer over-read flaw was found in the httpd mod_log_config module. In configurations where cookie logging is enabled (on Red Hat Enterprise Linux it is disabled by default), a remote attacker could use this flaw to crash the httpd child process via an HTTP request with a malformed cookie header. (CVE-2014-0098) All httpd users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1077867 - CVE-2013-6438 httpd: mod_dav denial of service via crafted DAV WRITE request 1077871 - CVE-2014-0098 httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/httpd-2.2.15-30.el6_5.src.rpm i386: httpd-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-tools-2.2.15-30.el6_5.i686.rpm x86_64: httpd-2.2.15-30.el6_5.x86_64.rpm httpd-debuginfo-2.2.15-30.el6_5.x86_64.rpm httpd-tools-2.2.15-30.el6_5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/httpd-2.2.15-30.el6_5.src.rpm i386: httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm mod_ssl-2.2.15-30.el6_5.i686.rpm noarch: httpd-manual-2.2.15-30.el6_5.noarch.rpm x86_64: httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.x86_64.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.x86_64.rpm mod_ssl-2.2.15-30.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/httpd-2.2.15-30.el6_5.src.rpm x86_64: httpd-2.2.15-30.el6_5.x86_64.rpm httpd-debuginfo-2.2.15-30.el6_5.x86_64.rpm httpd-tools-2.2.15-30.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/httpd-2.2.15-30.el6_5.src.rpm noarch: httpd-manual-2.2.15-30.el6_5.noarch.rpm x86_64: httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.x86_64.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.x86_64.rpm mod_ssl-2.2.15-30.el6_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/httpd-2.2.15-30.el6_5.src.rpm i386: httpd-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm httpd-tools-2.2.15-30.el6_5.i686.rpm mod_ssl-2.2.15-30.el6_5.i686.rpm noarch: httpd-manual-2.2.15-30.el6_5.noarch.rpm ppc64: httpd-2.2.15-30.el6_5.ppc64.rpm httpd-debuginfo-2.2.15-30.el6_5.ppc.rpm httpd-debuginfo-2.2.15-30.el6_5.ppc64.rpm httpd-devel-2.2.15-30.el6_5.ppc.rpm httpd-devel-2.2.15-30.el6_5.ppc64.rpm httpd-tools-2.2.15-30.el6_5.ppc64.rpm mod_ssl-2.2.15-30.el6_5.ppc64.rpm s390x: httpd-2.2.15-30.el6_5.s390x.rpm httpd-debuginfo-2.2.15-30.el6_5.s390.rpm httpd-debuginfo-2.2.15-30.el6_5.s390x.rpm httpd-devel-2.2.15-30.el6_5.s390.rpm httpd-devel-2.2.15-30.el6_5.s390x.rpm httpd-tools-2.2.15-30.el6_5.s390x.rpm mod_ssl-2.2.15-30.el6_5.s390x.rpm x86_64: httpd-2.2.15-30.el6_5.x86_64.rpm httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.x86_64.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.x86_64.rpm httpd-tools-2.2.15-30.el6_5.x86_64.rpm mod_ssl-2.2.15-30.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/httpd-2.2.15-30.el6_5.src.rpm i386: httpd-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm httpd-tools-2.2.15-30.el6_5.i686.rpm mod_ssl-2.2.15-30.el6_5.i686.rpm noarch: httpd-manual-2.2.15-30.el6_5.noarch.rpm x86_64: httpd-2.2.15-30.el6_5.x86_64.rpm httpd-debuginfo-2.2.15-30.el6_5.i686.rpm httpd-debuginfo-2.2.15-30.el6_5.x86_64.rpm httpd-devel-2.2.15-30.el6_5.i686.rpm httpd-devel-2.2.15-30.el6_5.x86_64.rpm httpd-tools-2.2.15-30.el6_5.x86_64.rpm mod_ssl-2.2.15-30.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6438.html https://www.redhat.com/security/data/cve/CVE-2014-0098.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTPdEEXlSAg2UNWIIRAr+xAKCrtgPeTS4AR7hzds59ROkW6k6LuwCgo0Jq UlzKvGUQnyKZ6qggdQXsdXw= =iVhJ -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 8 03:21:04 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 8 Apr 2014 03:21:04 +0000 Subject: [RHSA-2014:0376-01] Important: openssl security update Message-ID: <201404080315.s383FIn0015341@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2014:0376-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0376.html Issue date: 2014-04-08 CVE Names: CVE-2014-0160 ===================================================================== 1. Summary: Updated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1084875 - CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm i386: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm x86_64: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm i386: openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm openssl-perl-1.0.1e-16.el6_5.7.i686.rpm openssl-static-1.0.1e-16.el6_5.7.i686.rpm x86_64: openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm x86_64: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm x86_64: openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm i386: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm ppc64: openssl-1.0.1e-16.el6_5.7.ppc.rpm openssl-1.0.1e-16.el6_5.7.ppc64.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.ppc.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.ppc64.rpm openssl-devel-1.0.1e-16.el6_5.7.ppc.rpm openssl-devel-1.0.1e-16.el6_5.7.ppc64.rpm s390x: openssl-1.0.1e-16.el6_5.7.s390.rpm openssl-1.0.1e-16.el6_5.7.s390x.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.s390.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.s390x.rpm openssl-devel-1.0.1e-16.el6_5.7.s390.rpm openssl-devel-1.0.1e-16.el6_5.7.s390x.rpm x86_64: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm i386: openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-perl-1.0.1e-16.el6_5.7.i686.rpm openssl-static-1.0.1e-16.el6_5.7.i686.rpm ppc64: openssl-debuginfo-1.0.1e-16.el6_5.7.ppc64.rpm openssl-perl-1.0.1e-16.el6_5.7.ppc64.rpm openssl-static-1.0.1e-16.el6_5.7.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-16.el6_5.7.s390x.rpm openssl-perl-1.0.1e-16.el6_5.7.s390x.rpm openssl-static-1.0.1e-16.el6_5.7.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm i386: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm x86_64: openssl-1.0.1e-16.el6_5.7.i686.rpm openssl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.7.i686.rpm openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.1e-16.el6_5.7.src.rpm i386: openssl-debuginfo-1.0.1e-16.el6_5.7.i686.rpm openssl-perl-1.0.1e-16.el6_5.7.i686.rpm openssl-static-1.0.1e-16.el6_5.7.i686.rpm x86_64: openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0160.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTQ2mcXlSAg2UNWIIRAvNWAJ9caqXvj0Buf9qcAG03+BZSW85rCwCgtrfb +Ibr0642hrwOVmGicBkJ3xs= =p42l -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 9 08:53:59 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Apr 2014 08:53:59 +0000 Subject: [RHSA-2014:0380-01] Critical: flash-plugin security update Message-ID: <201404090848.s398mBNT010976@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2014:0380-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0380.html Issue date: 2014-04-09 CVE Names: CVE-2014-0506 CVE-2014-0507 CVE-2014-0508 CVE-2014-0509 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-09, listed in the References section. Two flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2014-0506, CVE-2014-0507) A flaw in flash-plugin could allow an attacker to obtain sensitive information if a victim were tricked into visiting a specially crafted web page. (CVE-2014-0508) A flaw in flash-plugin could allow an attacker to conduct cross-site scripting (XSS) attacks if a victim were tricked into visiting a specially crafted web page. (CVE-2014-0509) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.350. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1085581 - CVE-2014-0506 CVE-2014-0507 flash-plugin: two flaws leading to code execution (APSB14-09) 1085585 - CVE-2014-0508 flash-plugin: information disclosure flaw (APSB14-09) 1085586 - CVE-2014-0509 flash-plugin: cross-site scripting flaw (APSB14-09) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.350-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.350-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.350-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.350-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.350-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.350-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.350-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.350-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.350-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.350-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0506.html https://www.redhat.com/security/data/cve/CVE-2014-0507.html https://www.redhat.com/security/data/cve/CVE-2014-0508.html https://www.redhat.com/security/data/cve/CVE-2014-0509.html https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb14-09.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTRQk9XlSAg2UNWIIRAksjAKCbnm4UGitMzrcZoEuifY3AS5L9hQCdH2Ou CgUxC7S1jhlSSEYdIzvdiL8= =tqNu -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 9 18:55:27 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Apr 2014 18:55:27 +0000 Subject: [RHSA-2014:0382-01] Important: python-keystoneclient security update Message-ID: <201404091855.s39ItRBh009782@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-keystoneclient security update Advisory ID: RHSA-2014:0382-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0382.html Issue date: 2014-04-09 CVE Names: CVE-2014-0105 ===================================================================== 1. Summary: Updated python-keystoneclient packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 4.0. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 4.0 - noarch 3. Description: Python-keystoneclient is a client library and a command line utility for interacting with the OpenStack Identity API. The OpenStack Identity auth_token middleware component handles the authentication of tokens with keystone. When using the auth_token middleware with the memcached token cache enabled, a token for a different identity could be returned. An authenticated user could use this flaw to escalate their privileges by making repeated requests that could eventually allow the user to acquire the administrator's identity. Note that only OpenStack Identity setups using auth_token with memcached were affected. (CVE-2014-0105) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Kieran Spear from the University of Melbourne as the original reporter. The python-keystoneclient package has been upgraded to version 0.7.1. Additionally, the python-six package has been upgraded to version 1.5.2, required by the updated python-keystoneclient package. All python-keystoneclient users are advised to upgrade to these updated packages, which correct this issue. After installing this update, all OpenStack services using auth_token must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1082165 - CVE-2014-0105 python-keystoneclient: Potential context confusion in Keystone middleware 6. Package List: Red Hat Enterprise Linux OpenStack Platform 4.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/python-keystoneclient-0.7.1-2.el6ost.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/python-six-1.5.2-1.el6.src.rpm noarch: python-keystoneclient-0.7.1-2.el6ost.noarch.rpm python-keystoneclient-doc-0.7.1-2.el6ost.noarch.rpm python-six-1.5.2-1.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0105.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTRZduXlSAg2UNWIIRAglSAJ0cJCU8defXrY3LbZcQ61o40z1CKACdG9wn TCMWdEj4ETm7eZWGYlOCVIA= =vO02 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 9 18:56:15 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Apr 2014 18:56:15 +0000 Subject: [RHSA-2014:0383-01] Moderate: samba4 security update Message-ID: <201404091856.s39IuGxp025516@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: samba4 security update Advisory ID: RHSA-2014:0383-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0383.html Issue date: 2014-04-09 CVE Names: CVE-2012-6150 CVE-2013-4496 CVE-2013-6442 ===================================================================== 1. Summary: Updated samba4 packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. It was found that certain Samba configurations did not enforce the password lockout mechanism. A remote attacker could use this flaw to perform password guessing attacks on Samba user accounts. Note: this flaw only affected Samba when deployed as a Primary Domain Controller. (CVE-2013-4496) A flaw was found in Samba's "smbcacls" command, which is used to set or get ACLs on SMB file shares. Certain command line options of this command would incorrectly remove an ACL previously applied on a file or a directory, leaving the file or directory without the intended ACL. (CVE-2013-6442) A flaw was found in the way the pam_winbind module handled configurations that specified a non-existent group as required. An authenticated user could possibly use this flaw to gain access to a service using pam_winbind in its PAM configuration when group restriction was intended for access to the service. (CVE-2012-6150) Red Hat would like to thank the Samba project for reporting CVE-2013-4496 and CVE-2013-6442, and Sam Richardson for reporting CVE-2012-6150. Upstream acknowledges Andrew Bartlett as the original reporter of CVE-2013-4496, and Noel Power as the original reporter of CVE-2013-6442. All users of Samba are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the smb service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1036897 - CVE-2012-6150 samba: pam_winbind fails open when non-existent group specified to require_membership_of 1044099 - CVE-2013-6442 samba: smbcacls will delete ACL lists in certain circumstances 1072792 - CVE-2013-4496 samba: Password lockout not enforced for SAMR password changes 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba4-4.0.0-61.el6_5.rc4.src.rpm i386: samba4-4.0.0-61.el6_5.rc4.i686.rpm samba4-client-4.0.0-61.el6_5.rc4.i686.rpm samba4-common-4.0.0-61.el6_5.rc4.i686.rpm samba4-dc-4.0.0-61.el6_5.rc4.i686.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.i686.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.i686.rpm samba4-devel-4.0.0-61.el6_5.rc4.i686.rpm samba4-libs-4.0.0-61.el6_5.rc4.i686.rpm samba4-pidl-4.0.0-61.el6_5.rc4.i686.rpm samba4-python-4.0.0-61.el6_5.rc4.i686.rpm samba4-swat-4.0.0-61.el6_5.rc4.i686.rpm samba4-test-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.i686.rpm x86_64: samba4-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-client-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-common-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-devel-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-pidl-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-python-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-swat-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-test-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba4-4.0.0-61.el6_5.rc4.src.rpm x86_64: samba4-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-client-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-common-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-devel-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-pidl-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-python-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-swat-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-test-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba4-4.0.0-61.el6_5.rc4.src.rpm i386: samba4-4.0.0-61.el6_5.rc4.i686.rpm samba4-client-4.0.0-61.el6_5.rc4.i686.rpm samba4-common-4.0.0-61.el6_5.rc4.i686.rpm samba4-dc-4.0.0-61.el6_5.rc4.i686.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.i686.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.i686.rpm samba4-devel-4.0.0-61.el6_5.rc4.i686.rpm samba4-libs-4.0.0-61.el6_5.rc4.i686.rpm samba4-pidl-4.0.0-61.el6_5.rc4.i686.rpm samba4-python-4.0.0-61.el6_5.rc4.i686.rpm samba4-swat-4.0.0-61.el6_5.rc4.i686.rpm samba4-test-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.i686.rpm ppc64: samba4-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-client-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-common-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-dc-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-devel-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-libs-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-pidl-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-python-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-swat-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-test-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-winbind-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.ppc64.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.ppc64.rpm s390x: samba4-4.0.0-61.el6_5.rc4.s390x.rpm samba4-client-4.0.0-61.el6_5.rc4.s390x.rpm samba4-common-4.0.0-61.el6_5.rc4.s390x.rpm samba4-dc-4.0.0-61.el6_5.rc4.s390x.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.s390x.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.s390x.rpm samba4-devel-4.0.0-61.el6_5.rc4.s390x.rpm samba4-libs-4.0.0-61.el6_5.rc4.s390x.rpm samba4-pidl-4.0.0-61.el6_5.rc4.s390x.rpm samba4-python-4.0.0-61.el6_5.rc4.s390x.rpm samba4-swat-4.0.0-61.el6_5.rc4.s390x.rpm samba4-test-4.0.0-61.el6_5.rc4.s390x.rpm samba4-winbind-4.0.0-61.el6_5.rc4.s390x.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.s390x.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.s390x.rpm x86_64: samba4-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-client-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-common-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-devel-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-pidl-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-python-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-swat-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-test-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba4-4.0.0-61.el6_5.rc4.src.rpm i386: samba4-4.0.0-61.el6_5.rc4.i686.rpm samba4-client-4.0.0-61.el6_5.rc4.i686.rpm samba4-common-4.0.0-61.el6_5.rc4.i686.rpm samba4-dc-4.0.0-61.el6_5.rc4.i686.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.i686.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.i686.rpm samba4-devel-4.0.0-61.el6_5.rc4.i686.rpm samba4-libs-4.0.0-61.el6_5.rc4.i686.rpm samba4-pidl-4.0.0-61.el6_5.rc4.i686.rpm samba4-python-4.0.0-61.el6_5.rc4.i686.rpm samba4-swat-4.0.0-61.el6_5.rc4.i686.rpm samba4-test-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.i686.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.i686.rpm x86_64: samba4-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-client-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-common-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-dc-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-debuginfo-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-devel-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-libs-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-pidl-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-python-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-swat-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-test-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-clients-4.0.0-61.el6_5.rc4.x86_64.rpm samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-6150.html https://www.redhat.com/security/data/cve/CVE-2013-4496.html https://www.redhat.com/security/data/cve/CVE-2013-6442.html https://access.redhat.com/security/updates/classification/#moderate https://www.samba.org/samba/security/CVE-2012-6150 https://www.samba.org/samba/security/CVE-2013-4496 https://www.samba.org/samba/security/CVE-2013-6442 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTRZezXlSAg2UNWIIRAmQLAJ9PPdg4jXQXKNN1e8TFqisaUosVbwCgstbN NdP/fM1RxXjWfwDD6vivUS4= =akGr -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 16 11:45:34 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Apr 2014 11:45:34 +0000 Subject: [RHSA-2014:0406-01] Critical: java-1.7.0-openjdk security update Message-ID: <201404161145.s3GBjNL3010534@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-openjdk security update Advisory ID: RHSA-2014:0406-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0406.html Issue date: 2014-04-16 CVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2402 CVE-2014-2403 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 ===================================================================== 1. Summary: Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0455, CVE-2014-0461) Multiple improper permission check issues were discovered in the AWT, JAX-WS, JAXB, Libraries, Security, Sound, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-2402, CVE-2014-0446, CVE-2014-2413, CVE-2014-0454, CVE-2014-2427, CVE-2014-0459) Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087424 - CVE-2014-0455 OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087438 - CVE-2014-2402 OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087440 - CVE-2014-0454 OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 1087444 - CVE-2014-0459 lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) 1087446 - CVE-2014-2413 OpenJDK: method handle call hierachy bypass (Libraries, 8032686) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm i386: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm i386: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm i386: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.i686.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.i686.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0454.html https://www.redhat.com/security/data/cve/CVE-2014-0455.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0459.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2402.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2413.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTTmzQXlSAg2UNWIIRAtKdAKCBGCXcmdsIke6rE6wALE8rmyh8PgCfVt/K i9yLmC1ovZP+Sr9z+PQskyk= =avQw -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 16 11:46:45 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Apr 2014 11:46:45 +0000 Subject: [RHSA-2014:0407-01] Important: java-1.7.0-openjdk security update Message-ID: <201404161146.s3GBkY1X018587@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.7.0-openjdk security update Advisory ID: RHSA-2014:0407-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0407.html Issue date: 2014-04-16 CVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2402 CVE-2014-2403 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 ===================================================================== 1. Summary: Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0455, CVE-2014-0461) Multiple improper permission check issues were discovered in the AWT, JAX-WS, JAXB, Libraries, Security, Sound, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-2402, CVE-2014-0446, CVE-2014-2413, CVE-2014-0454, CVE-2014-2427, CVE-2014-0459) Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087424 - CVE-2014-0455 OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087438 - CVE-2014-2402 OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087440 - CVE-2014-0454 OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 1087444 - CVE-2014-0459 lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) 1087446 - CVE-2014-2413 OpenJDK: method handle call hierachy bypass (Libraries, 8032686) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el5_10.src.rpm i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el5_10.i386.rpm x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el5_10.src.rpm i386: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el5_10.i386.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el5_10.i386.rpm x86_64: java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el5_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0454.html https://www.redhat.com/security/data/cve/CVE-2014-0455.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0459.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2402.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2413.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTTm1jXlSAg2UNWIIRAmxZAKCnITwIPiZazSgGXVkYKV5UNQe4OwCffOGM XIlZ/nJPYbaaJAcEnY7FwNk= =salw -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 16 11:49:35 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Apr 2014 11:49:35 +0000 Subject: [RHSA-2014:0408-01] Important: java-1.6.0-openjdk security and bug fix update Message-ID: <201404161149.s3GBnOfZ023645@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.6.0-openjdk security and bug fix update Advisory ID: RHSA-2014:0408-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0408.html Issue date: 2014-04-16 CVE Names: CVE-2014-0429 CVE-2014-0446 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2403 CVE-2014-2412 CVE-2014-2414 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 ===================================================================== 1. Summary: Updated java-1.6.0-openjdk packages that fix various security issues and one bug are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0461) Multiple improper permission check issues were discovered in the AWT, JAX-WS, JAXB, Libraries, and Sound components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-0446, CVE-2014-2427) Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) This update also fixes the following bug: * The OpenJDK update to IcedTea version 1.13 introduced a regression related to the handling of the jdk_version_info variable. This variable was not properly zeroed out before being passed to the Java Virtual Machine, resulting in a memory leak in the java.lang.ref.Finalizer class. This update fixes this issue, and memory leaks no longer occur. (BZ#1085373) All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1085373 - java.lang.ref.Finalizer leak when upgrading from 1.62 to 1.66 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.i386.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el5_10.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.i686.rpm x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTTm2zXlSAg2UNWIIRAkZ8AJ4tQFSY3KSdfOiDJA5KJWO9IJa1BACeMLJ6 PQHHIgiQ5K7Q4/GEJAHNU94= =9aj6 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 17 12:32:01 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 17 Apr 2014 12:32:01 +0000 Subject: [RHSA-2014:0412-01] Critical: java-1.7.0-oracle security update Message-ID: <201404171231.s3HCVo7W004574@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-oracle security update Advisory ID: RHSA-2014:0412-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0412.html Issue date: 2014-04-17 CVE Names: CVE-2013-6629 CVE-2013-6954 CVE-2014-0429 CVE-2014-0432 CVE-2014-0446 CVE-2014-0448 CVE-2014-0449 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2401 CVE-2014-2402 CVE-2014-2403 CVE-2014-2409 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2420 CVE-2014-2421 CVE-2014-2422 CVE-2014-2423 CVE-2014-2427 CVE-2014-2428 ===================================================================== 1. Summary: Updated java-1.7.0-oracle packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2013-6629, CVE-2013-6954, CVE-2014-0429, CVE-2014-0432, CVE-2014-0446, CVE-2014-0448, CVE-2014-0449, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2401, CVE-2014-2402, CVE-2014-2403, CVE-2014-2409, CVE-2014-2412, CVE-2014-2413, CVE-2014-2414, CVE-2014-2420, CVE-2014-2421, CVE-2014-2422, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428) All users of java-1.7.0-oracle are advised to upgrade to these updated packages, which provide Oracle Java 7 Update 55 and resolve these issues. All running instances of Oracle Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory) 1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087424 - CVE-2014-0455 OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087438 - CVE-2014-2402 OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087440 - CVE-2014-0454 OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 1087444 - CVE-2014-0459 lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) 1087446 - CVE-2014-2413 OpenJDK: method handle call hierachy bypass (Libraries, 8032686) 1088023 - CVE-2014-0432 Oracle JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Libraries) 1088024 - CVE-2014-0448 Oracle JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) 1088025 - CVE-2014-2428 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088026 - CVE-2014-2422 Oracle JDK: unspecified vulnerability fixed in 7u55 and 8u5 (JavaFX) 1088027 - CVE-2014-2409 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088028 - CVE-2014-0449 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088030 - CVE-2014-2401 Oracle JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) 1088031 - CVE-2014-2420 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.i386.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.i386.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.x86_64.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6629.html https://www.redhat.com/security/data/cve/CVE-2013-6954.html https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0432.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0448.html https://www.redhat.com/security/data/cve/CVE-2014-0449.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0454.html https://www.redhat.com/security/data/cve/CVE-2014-0455.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0459.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2401.html https://www.redhat.com/security/data/cve/CVE-2014-2402.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2409.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2413.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2420.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2422.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://www.redhat.com/security/data/cve/CVE-2014-2428.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTT8lUXlSAg2UNWIIRAtzSAJ9+Wn3P2rkixwMPR97r44ojJiKpPgCgoyBd T2JUCIUzoC1c1u5pK0Fc/nk= =nG5C -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 17 12:33:04 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 17 Apr 2014 12:33:04 +0000 Subject: [RHSA-2014:0413-02] Critical: java-1.7.0-oracle security update Message-ID: <201404171232.s3HCWsuT004778@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-oracle security update Advisory ID: RHSA-2014:0413-02 Product: Oracle Java for Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0413.html Issue date: 2014-04-17 CVE Names: CVE-2013-6629 CVE-2013-6954 CVE-2014-0429 CVE-2014-0432 CVE-2014-0446 CVE-2014-0448 CVE-2014-0449 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454 CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2397 CVE-2014-2398 CVE-2014-2401 CVE-2014-2402 CVE-2014-2403 CVE-2014-2409 CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2420 CVE-2014-2421 CVE-2014-2422 CVE-2014-2423 CVE-2014-2427 CVE-2014-2428 ===================================================================== 1. Summary: Updated java-1.7.0-oracle packages that fix several security issues are now available for Oracle Java for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Oracle Java for Red Hat Enterprise Linux Desktop 5 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Desktop 6 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux HPC Node 6 - x86_64 Oracle Java for Red Hat Enterprise Linux Server 5 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Server 6 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Workstation 6 - i386, x86_64 3. Description: Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory page, listed in the References section. (CVE-2013-6629, CVE-2013-6954, CVE-2014-0429, CVE-2014-0432, CVE-2014-0446, CVE-2014-0448, CVE-2014-0449, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2401, CVE-2014-2402, CVE-2014-2403, CVE-2014-2409, CVE-2014-2412, CVE-2014-2413, CVE-2014-2414, CVE-2014-2420, CVE-2014-2421, CVE-2014-2422, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428) All users of java-1.7.0-oracle are advised to upgrade to these updated packages, which provide Oracle Java 7 Update 55 and resolve these issues. All running instances of Oracle Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory) 1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087423 - CVE-2014-2397 OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) 1087424 - CVE-2014-0455 OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087438 - CVE-2014-2402 OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087440 - CVE-2014-0454 OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 1087444 - CVE-2014-0459 lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) 1087446 - CVE-2014-2413 OpenJDK: method handle call hierachy bypass (Libraries, 8032686) 1088023 - CVE-2014-0432 Oracle JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Libraries) 1088024 - CVE-2014-0448 Oracle JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) 1088025 - CVE-2014-2428 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088026 - CVE-2014-2422 Oracle JDK: unspecified vulnerability fixed in 7u55 and 8u5 (JavaFX) 1088027 - CVE-2014-2409 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088028 - CVE-2014-0449 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088030 - CVE-2014-2401 Oracle JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) 1088031 - CVE-2014-2420 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 6. Package List: Oracle Java for Red Hat Enterprise Linux Desktop 5: i386: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.i386.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Server 5: i386: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.i386.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.i386.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.2.el5_10.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.2.el5_10.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Desktop 6: i386: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm Oracle Java for Red Hat Enterprise Linux HPC Node 6: x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Server 6: i386: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Workstation 6: i386: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.i686.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.i686.rpm x86_64: java-1.7.0-oracle-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-devel-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-javafx-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-jdbc-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-plugin-1.7.0.55-1jpp.1.el6_5.x86_64.rpm java-1.7.0-oracle-src-1.7.0.55-1jpp.1.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6629.html https://www.redhat.com/security/data/cve/CVE-2013-6954.html https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0432.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0448.html https://www.redhat.com/security/data/cve/CVE-2014-0449.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0454.html https://www.redhat.com/security/data/cve/CVE-2014-0455.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0459.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2397.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2401.html https://www.redhat.com/security/data/cve/CVE-2014-2402.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2409.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2413.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2420.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2422.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://www.redhat.com/security/data/cve/CVE-2014-2428.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTT8nHXlSAg2UNWIIRAiFiAJ9/JXUWykCOvQAYnTpmfFlCDvMMRwCgsi/i qu2ha+eX/3/Q4McZV3i1294= =GlFv -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 17 12:34:32 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 17 Apr 2014 12:34:32 +0000 Subject: [RHSA-2014:0414-01] Important: java-1.6.0-sun security update Message-ID: <201404171234.s3HCYLj8005077@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.6.0-sun security update Advisory ID: RHSA-2014:0414-01 Product: Oracle Java for Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0414.html Issue date: 2014-04-17 CVE Names: CVE-2013-1500 CVE-2013-1571 CVE-2013-2407 CVE-2013-2412 CVE-2013-2437 CVE-2013-2442 CVE-2013-2443 CVE-2013-2444 CVE-2013-2445 CVE-2013-2446 CVE-2013-2447 CVE-2013-2448 CVE-2013-2450 CVE-2013-2451 CVE-2013-2452 CVE-2013-2453 CVE-2013-2454 CVE-2013-2455 CVE-2013-2456 CVE-2013-2457 CVE-2013-2459 CVE-2013-2461 CVE-2013-2463 CVE-2013-2464 CVE-2013-2465 CVE-2013-2466 CVE-2013-2468 CVE-2013-2469 CVE-2013-2470 CVE-2013-2471 CVE-2013-2472 CVE-2013-2473 CVE-2013-3743 CVE-2013-3829 CVE-2013-4002 CVE-2013-5772 CVE-2013-5774 CVE-2013-5776 CVE-2013-5778 CVE-2013-5780 CVE-2013-5782 CVE-2013-5783 CVE-2013-5784 CVE-2013-5787 CVE-2013-5789 CVE-2013-5790 CVE-2013-5797 CVE-2013-5801 CVE-2013-5802 CVE-2013-5803 CVE-2013-5804 CVE-2013-5809 CVE-2013-5812 CVE-2013-5814 CVE-2013-5817 CVE-2013-5818 CVE-2013-5819 CVE-2013-5820 CVE-2013-5823 CVE-2013-5824 CVE-2013-5825 CVE-2013-5829 CVE-2013-5830 CVE-2013-5831 CVE-2013-5832 CVE-2013-5840 CVE-2013-5842 CVE-2013-5843 CVE-2013-5848 CVE-2013-5849 CVE-2013-5850 CVE-2013-5852 CVE-2013-5878 CVE-2013-5884 CVE-2013-5887 CVE-2013-5888 CVE-2013-5889 CVE-2013-5896 CVE-2013-5898 CVE-2013-5899 CVE-2013-5902 CVE-2013-5905 CVE-2013-5906 CVE-2013-5907 CVE-2013-5910 CVE-2013-6629 CVE-2013-6954 CVE-2014-0368 CVE-2014-0373 CVE-2014-0375 CVE-2014-0376 CVE-2014-0387 CVE-2014-0403 CVE-2014-0410 CVE-2014-0411 CVE-2014-0415 CVE-2014-0416 CVE-2014-0417 CVE-2014-0418 CVE-2014-0422 CVE-2014-0423 CVE-2014-0424 CVE-2014-0428 CVE-2014-0429 CVE-2014-0446 CVE-2014-0449 CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876 CVE-2014-2398 CVE-2014-2401 CVE-2014-2403 CVE-2014-2409 CVE-2014-2412 CVE-2014-2414 CVE-2014-2420 CVE-2014-2421 CVE-2014-2423 CVE-2014-2427 CVE-2014-2428 ===================================================================== 1. Summary: Updated java-1.6.0-sun packages that fix several security issues are now available for Oracle Java for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Oracle Java for Red Hat Enterprise Linux Desktop 5 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Desktop 6 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux HPC Node 6 - x86_64 Oracle Java for Red Hat Enterprise Linux Server 5 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Server 6 - i386, x86_64 Oracle Java for Red Hat Enterprise Linux Workstation 6 - i386, x86_64 3. Description: Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update fixes several vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. Further information about these flaws can be found on the Oracle Java SE Critical Patch Update Advisory pages, listed in the References section. (CVE-2013-1500, CVE-2013-1571, CVE-2013-2407, CVE-2013-2412, CVE-2013-2437, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2459, CVE-2013-2461, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743, CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820, CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5831, CVE-2013-5832, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843, CVE-2013-5848, CVE-2013-5849, CVE-2013-5850, CVE-2013-5852, CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5902, CVE-2013-5905, CVE-2013-5906, CVE-2013-5907, CVE-2013-5910, CVE-2013-6629, CVE-2013-6954, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375, CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410, CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0418, CVE-2014-0422, CVE-2014-0423, CVE-2014-0424, CVE-2014-0428, CVE-2014-0429, CVE-2014-0446, CVE-2014-0449, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2398, CVE-2014-2401, CVE-2014-2403, CVE-2014-2409, CVE-2014-2412, CVE-2014-2414, CVE-2014-2420, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428) All users of java-1.6.0-sun are advised to upgrade to these updated packages, which provide Oracle Java 6 Update 75 and resolve these issues. All running instances of Oracle Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 973474 - CVE-2013-1571 OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) 975099 - CVE-2013-2470 OpenJDK: ImagingLib byte lookup processing (2D, 8011243) 975102 - CVE-2013-2471 OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) 975107 - CVE-2013-2472 OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) 975110 - CVE-2013-2473 OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) 975115 - CVE-2013-2463 OpenJDK: Incorrect image attribute verification (2D, 8012438) 975118 - CVE-2013-2465 OpenJDK: Incorrect image channel verification (2D, 8012597) 975120 - CVE-2013-2469 OpenJDK: Incorrect image layout verification (2D, 8012601) 975121 - CVE-2013-2459 OpenJDK: Various AWT integer overflow checks (AWT, 8009071) 975124 - CVE-2013-2445 OpenJDK: Better handling of memory allocation errors (Hotspot, 7158805) 975125 - CVE-2013-2448 OpenJDK: Better access restrictions (Sound, 8006328) 975126 - CVE-2013-2461 OpenJDK: Missing check for valid DOMCanonicalizationMethod canonicalization algorithm (Libraries, 8014281) 975127 - CVE-2013-2407 OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) 975129 - CVE-2013-2454 OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) 975131 - CVE-2013-2444 OpenJDK: Resource denial of service (AWT, 8001038) 975132 - CVE-2013-2446 OpenJDK: output stream access restrictions (CORBA, 8000642) 975133 - CVE-2013-2457 OpenJDK: Proper class checking (JMX, 8008120) 975134 - CVE-2013-2453 OpenJDK: MBeanServer Introspector package access (JMX, 8008124) 975137 - CVE-2013-2443 OpenJDK: AccessControlContext check order issue (Libraries, 8001330) 975138 - CVE-2013-2452 OpenJDK: Unique VMIDs (Libraries, 8001033) 975139 - CVE-2013-2455 OpenJDK: getEnclosing* checks (Libraries, 8007812) 975140 - CVE-2013-2447 OpenJDK: Prevent revealing the local address (Networking, 8001318) 975141 - CVE-2013-2450 OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) 975142 - CVE-2013-2456 OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) 975144 - CVE-2013-2412 OpenJDK: JConsole SSL support (Serviceability, 8003703) 975146 - CVE-2013-2451 OpenJDK: exclusive port binding (Networking, 7170730) 975148 - CVE-2013-1500 OpenJDK: Insecure shared memory permissions (2D, 8001034) 975757 - CVE-2013-2464 Oracle JDK: unspecified vulnerability fixed in 7u25 (2D) 975761 - CVE-2013-2468 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment) 975764 - CVE-2013-2466 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment) 975767 - CVE-2013-3743 Oracle JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) 975770 - CVE-2013-2442 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment) 975773 - CVE-2013-2437 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment) 1018713 - CVE-2013-5803 OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) 1018717 - CVE-2013-5772 OpenJDK: insufficient html escaping in jhat (jhat, 8011081) 1018720 - CVE-2013-5797 OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) 1018727 - CVE-2013-5784 OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) 1018736 - CVE-2013-5790 OpenJDK: insufficient security checks (Beans, 8012071) 1018750 - CVE-2013-5849 OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) 1018785 - CVE-2013-5780 OpenJDK: key data leak via toString() methods (Libraries, 8011071) 1018831 - CVE-2013-5840 OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) 1018972 - CVE-2013-5820 OpenJDK: insufficient security checks (JAXWS, 8017505) 1018984 - CVE-2013-5778 OpenJDK: image conversion out of bounds read (2D, 8014102) 1019108 - CVE-2013-5782 OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) 1019110 - CVE-2013-5830 OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) 1019113 - CVE-2013-5809 OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) 1019115 - CVE-2013-5829 OpenJDK: Java2d Disposer security bypass (2D, 8017287) 1019117 - CVE-2013-5814 OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) 1019118 - CVE-2013-5817 OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) 1019123 - CVE-2013-5842 OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) 1019127 - CVE-2013-5850 OpenJDK: Missing CORBA security checks (Libraries, 8017196) 1019130 - CVE-2013-5802 OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) 1019131 - CVE-2013-5804 OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) 1019133 - CVE-2013-3829 OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) 1019137 - CVE-2013-5783 OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) 1019139 - CVE-2013-5825 OpenJDK: XML parsing Denial of Service (JAXP, 8014530) 1019145 - CVE-2013-5823 OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) 1019147 - CVE-2013-5774 OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) 1019176 - CVE-2013-4002 OpenJDK: XML parsing Denial of Service (JAXP, 8017298) 1019691 - CVE-2013-5824 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019693 - CVE-2013-5787 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019697 - CVE-2013-5789 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019701 - CVE-2013-5843 Oracle JDK: unspecified vulnerability fixed in 7u45 (2D) 1019702 - CVE-2013-5832 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019705 - CVE-2013-5852 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019706 - CVE-2013-5812 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019710 - CVE-2013-5801 Oracle JDK: unspecified vulnerability fixed in 7u45 (2D) 1019712 - CVE-2013-5776 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019713 - CVE-2013-5818 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019715 - CVE-2013-5819 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019716 - CVE-2013-5831 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1019720 - CVE-2013-5848 Oracle JDK: unspecified vulnerability fixed in 7u45 (Deployment) 1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory) 1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette 1051519 - CVE-2014-0428 OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) 1051528 - CVE-2014-0422 OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) 1051699 - CVE-2014-0373 OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) 1051823 - CVE-2013-5878 OpenJDK: null xmlns handling issue (Security, 8025026) 1051911 - CVE-2013-5884 OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) 1051912 - CVE-2014-0416 OpenJDK: insecure subject principals set handling (JAAS, 8024306) 1051923 - CVE-2014-0376 OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) 1052915 - CVE-2013-5907 ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) 1052919 - CVE-2014-0368 OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) 1052942 - CVE-2013-5910 OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) 1053010 - CVE-2014-0411 OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) 1053066 - CVE-2014-0423 OpenJDK: XXE issue in decoder (Beans, 8023245) 1053266 - CVE-2013-5896 OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) 1053495 - CVE-2014-0410 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053496 - CVE-2014-0415 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053499 - CVE-2013-5889 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053501 - CVE-2014-0417 Oracle JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) 1053502 - CVE-2014-0387 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053504 - CVE-2014-0424 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053507 - CVE-2014-0403 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053508 - CVE-2014-0375 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053509 - CVE-2013-5905 Oracle JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (Install) 1053510 - CVE-2013-5906 Oracle JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (Install) 1053512 - CVE-2013-5902 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053513 - CVE-2014-0418 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053515 - CVE-2013-5887 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053516 - CVE-2013-5899 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053517 - CVE-2013-5888 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1053518 - CVE-2013-5898 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) 1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) 1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) 1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766) 1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) 1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) 1087413 - CVE-2014-0456 OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) 1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854) 1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) 1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010) 1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) 1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) 1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) 1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) 1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) 1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740) 1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) 1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) 1087443 - CVE-2014-2403 OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) 1088025 - CVE-2014-2428 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088027 - CVE-2014-2409 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088028 - CVE-2014-0449 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 1088030 - CVE-2014-2401 Oracle JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) 1088031 - CVE-2014-2420 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) 6. Package List: Oracle Java for Red Hat Enterprise Linux Desktop 5: i386: java-1.6.0-sun-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.3.el5_10.i586.rpm x86_64: java-1.6.0-sun-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.3.el5_10.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Server 5: i386: java-1.6.0-sun-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.3.el5_10.i586.rpm x86_64: java-1.6.0-sun-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.3.el5_10.x86_64.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.3.el5_10.i586.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.3.el5_10.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Desktop 6: i386: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.i686.rpm x86_64: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.x86_64.rpm Oracle Java for Red Hat Enterprise Linux HPC Node 6: x86_64: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Server 6: i386: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.i686.rpm x86_64: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.x86_64.rpm Oracle Java for Red Hat Enterprise Linux Workstation 6: i386: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.i686.rpm x86_64: java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-demo-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.i686.rpm java-1.6.0-sun-devel-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-jdbc-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-plugin-1.6.0.75-1jpp.1.el6_5.x86_64.rpm java-1.6.0-sun-src-1.6.0.75-1jpp.1.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-1500.html https://www.redhat.com/security/data/cve/CVE-2013-1571.html https://www.redhat.com/security/data/cve/CVE-2013-2407.html https://www.redhat.com/security/data/cve/CVE-2013-2412.html https://www.redhat.com/security/data/cve/CVE-2013-2437.html https://www.redhat.com/security/data/cve/CVE-2013-2442.html https://www.redhat.com/security/data/cve/CVE-2013-2443.html https://www.redhat.com/security/data/cve/CVE-2013-2444.html https://www.redhat.com/security/data/cve/CVE-2013-2445.html https://www.redhat.com/security/data/cve/CVE-2013-2446.html https://www.redhat.com/security/data/cve/CVE-2013-2447.html https://www.redhat.com/security/data/cve/CVE-2013-2448.html https://www.redhat.com/security/data/cve/CVE-2013-2450.html https://www.redhat.com/security/data/cve/CVE-2013-2451.html https://www.redhat.com/security/data/cve/CVE-2013-2452.html https://www.redhat.com/security/data/cve/CVE-2013-2453.html https://www.redhat.com/security/data/cve/CVE-2013-2454.html https://www.redhat.com/security/data/cve/CVE-2013-2455.html https://www.redhat.com/security/data/cve/CVE-2013-2456.html https://www.redhat.com/security/data/cve/CVE-2013-2457.html https://www.redhat.com/security/data/cve/CVE-2013-2459.html https://www.redhat.com/security/data/cve/CVE-2013-2461.html https://www.redhat.com/security/data/cve/CVE-2013-2463.html https://www.redhat.com/security/data/cve/CVE-2013-2464.html https://www.redhat.com/security/data/cve/CVE-2013-2465.html https://www.redhat.com/security/data/cve/CVE-2013-2466.html https://www.redhat.com/security/data/cve/CVE-2013-2468.html https://www.redhat.com/security/data/cve/CVE-2013-2469.html https://www.redhat.com/security/data/cve/CVE-2013-2470.html https://www.redhat.com/security/data/cve/CVE-2013-2471.html https://www.redhat.com/security/data/cve/CVE-2013-2472.html https://www.redhat.com/security/data/cve/CVE-2013-2473.html https://www.redhat.com/security/data/cve/CVE-2013-3743.html https://www.redhat.com/security/data/cve/CVE-2013-3829.html https://www.redhat.com/security/data/cve/CVE-2013-4002.html https://www.redhat.com/security/data/cve/CVE-2013-5772.html https://www.redhat.com/security/data/cve/CVE-2013-5774.html https://www.redhat.com/security/data/cve/CVE-2013-5776.html https://www.redhat.com/security/data/cve/CVE-2013-5778.html https://www.redhat.com/security/data/cve/CVE-2013-5780.html https://www.redhat.com/security/data/cve/CVE-2013-5782.html https://www.redhat.com/security/data/cve/CVE-2013-5783.html https://www.redhat.com/security/data/cve/CVE-2013-5784.html https://www.redhat.com/security/data/cve/CVE-2013-5787.html https://www.redhat.com/security/data/cve/CVE-2013-5789.html https://www.redhat.com/security/data/cve/CVE-2013-5790.html https://www.redhat.com/security/data/cve/CVE-2013-5797.html https://www.redhat.com/security/data/cve/CVE-2013-5801.html https://www.redhat.com/security/data/cve/CVE-2013-5802.html https://www.redhat.com/security/data/cve/CVE-2013-5803.html https://www.redhat.com/security/data/cve/CVE-2013-5804.html https://www.redhat.com/security/data/cve/CVE-2013-5809.html https://www.redhat.com/security/data/cve/CVE-2013-5812.html https://www.redhat.com/security/data/cve/CVE-2013-5814.html https://www.redhat.com/security/data/cve/CVE-2013-5817.html https://www.redhat.com/security/data/cve/CVE-2013-5818.html https://www.redhat.com/security/data/cve/CVE-2013-5819.html https://www.redhat.com/security/data/cve/CVE-2013-5820.html https://www.redhat.com/security/data/cve/CVE-2013-5823.html https://www.redhat.com/security/data/cve/CVE-2013-5824.html https://www.redhat.com/security/data/cve/CVE-2013-5825.html https://www.redhat.com/security/data/cve/CVE-2013-5829.html https://www.redhat.com/security/data/cve/CVE-2013-5830.html https://www.redhat.com/security/data/cve/CVE-2013-5831.html https://www.redhat.com/security/data/cve/CVE-2013-5832.html https://www.redhat.com/security/data/cve/CVE-2013-5840.html https://www.redhat.com/security/data/cve/CVE-2013-5842.html https://www.redhat.com/security/data/cve/CVE-2013-5843.html https://www.redhat.com/security/data/cve/CVE-2013-5848.html https://www.redhat.com/security/data/cve/CVE-2013-5849.html https://www.redhat.com/security/data/cve/CVE-2013-5850.html https://www.redhat.com/security/data/cve/CVE-2013-5852.html https://www.redhat.com/security/data/cve/CVE-2013-5878.html https://www.redhat.com/security/data/cve/CVE-2013-5884.html https://www.redhat.com/security/data/cve/CVE-2013-5887.html https://www.redhat.com/security/data/cve/CVE-2013-5888.html https://www.redhat.com/security/data/cve/CVE-2013-5889.html https://www.redhat.com/security/data/cve/CVE-2013-5896.html https://www.redhat.com/security/data/cve/CVE-2013-5898.html https://www.redhat.com/security/data/cve/CVE-2013-5899.html https://www.redhat.com/security/data/cve/CVE-2013-5902.html https://www.redhat.com/security/data/cve/CVE-2013-5905.html https://www.redhat.com/security/data/cve/CVE-2013-5906.html https://www.redhat.com/security/data/cve/CVE-2013-5907.html https://www.redhat.com/security/data/cve/CVE-2013-5910.html https://www.redhat.com/security/data/cve/CVE-2013-6629.html https://www.redhat.com/security/data/cve/CVE-2013-6954.html https://www.redhat.com/security/data/cve/CVE-2014-0368.html https://www.redhat.com/security/data/cve/CVE-2014-0373.html https://www.redhat.com/security/data/cve/CVE-2014-0375.html https://www.redhat.com/security/data/cve/CVE-2014-0376.html https://www.redhat.com/security/data/cve/CVE-2014-0387.html https://www.redhat.com/security/data/cve/CVE-2014-0403.html https://www.redhat.com/security/data/cve/CVE-2014-0410.html https://www.redhat.com/security/data/cve/CVE-2014-0411.html https://www.redhat.com/security/data/cve/CVE-2014-0415.html https://www.redhat.com/security/data/cve/CVE-2014-0416.html https://www.redhat.com/security/data/cve/CVE-2014-0417.html https://www.redhat.com/security/data/cve/CVE-2014-0418.html https://www.redhat.com/security/data/cve/CVE-2014-0422.html https://www.redhat.com/security/data/cve/CVE-2014-0423.html https://www.redhat.com/security/data/cve/CVE-2014-0424.html https://www.redhat.com/security/data/cve/CVE-2014-0428.html https://www.redhat.com/security/data/cve/CVE-2014-0429.html https://www.redhat.com/security/data/cve/CVE-2014-0446.html https://www.redhat.com/security/data/cve/CVE-2014-0449.html https://www.redhat.com/security/data/cve/CVE-2014-0451.html https://www.redhat.com/security/data/cve/CVE-2014-0452.html https://www.redhat.com/security/data/cve/CVE-2014-0453.html https://www.redhat.com/security/data/cve/CVE-2014-0456.html https://www.redhat.com/security/data/cve/CVE-2014-0457.html https://www.redhat.com/security/data/cve/CVE-2014-0458.html https://www.redhat.com/security/data/cve/CVE-2014-0460.html https://www.redhat.com/security/data/cve/CVE-2014-0461.html https://www.redhat.com/security/data/cve/CVE-2014-1876.html https://www.redhat.com/security/data/cve/CVE-2014-2398.html https://www.redhat.com/security/data/cve/CVE-2014-2401.html https://www.redhat.com/security/data/cve/CVE-2014-2403.html https://www.redhat.com/security/data/cve/CVE-2014-2409.html https://www.redhat.com/security/data/cve/CVE-2014-2412.html https://www.redhat.com/security/data/cve/CVE-2014-2414.html https://www.redhat.com/security/data/cve/CVE-2014-2420.html https://www.redhat.com/security/data/cve/CVE-2014-2421.html https://www.redhat.com/security/data/cve/CVE-2014-2423.html https://www.redhat.com/security/data/cve/CVE-2014-2427.html https://www.redhat.com/security/data/cve/CVE-2014-2428.html https://access.redhat.com/security/updates/classification/#important http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTT8oHXlSAg2UNWIIRAkrUAJ9s4zUc+ye3wXf00HGQGjr4Zd3mYgCfc9fY FuGQo6LS8E44ecL1bs/dSiY= =1qYl -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 17 12:35:50 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 17 Apr 2014 12:35:50 +0000 Subject: [RHSA-2014:0415-01] Important: libyaml security update Message-ID: <201404171235.s3HCZdsR031077@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libyaml security update Advisory ID: RHSA-2014:0415-01 Product: Red Hat Common Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0415.html Issue date: 2014-04-17 CVE Names: CVE-2013-6393 CVE-2014-2525 ===================================================================== 1. Summary: Updated libyaml packages that fix two security issues are now available for Red Hat Common for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Common for RHEL Server (v. 6) - i386, x86_64 3. Description: YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-2525) An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6393) Red Hat would like to thank oCERT for reporting the CVE-2014-2525 issue. oCERT acknowledges Ivan Fratric of the Google Security Team as the original reporter. The CVE-2013-6393 issue was discovered by Florian Weimer of the Red Hat Product Security Team. Note: In their default configuration, applications distributed via the Red Hat Common channel do not use the libyaml library for parsing YAML, and are therefore not vulnerable to these issues. All libyaml users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against the libyaml library must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1033990 - CVE-2013-6393 libyaml: heap-based buffer overflow when parsing YAML tags 1078083 - CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs 6. Package List: Red Hat Common for RHEL Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RH-COMMON/SRPMS/libyaml-0.1.3-1.4.el6.src.rpm i386: libyaml-0.1.3-1.4.el6.i686.rpm libyaml-debuginfo-0.1.3-1.4.el6.i686.rpm libyaml-devel-0.1.3-1.4.el6.i686.rpm x86_64: libyaml-0.1.3-1.4.el6.x86_64.rpm libyaml-debuginfo-0.1.3-1.4.el6.x86_64.rpm libyaml-devel-0.1.3-1.4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6393.html https://www.redhat.com/security/data/cve/CVE-2014-2525.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTT8pbXlSAg2UNWIIRAkrjAJwPLr2lxhdGCyABqHFXbIDKvQsToQCeLZ8X pJ6m5cusPwlWtLSs7tFvgFU= =7Rzj -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 22 17:51:06 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Apr 2014 17:51:06 +0000 Subject: [RHSA-2014:0419-01] Important: kernel security and bug fix update Message-ID: <201404221751.s3MHp6cU014424@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2014:0419-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0419.html Issue date: 2014-04-22 CVE Names: CVE-2014-0101 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6.3 Extended Update Support. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Compute Node EUS (v. 6.3) - noarch, x86_64 Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.3) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.3) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel processed an authenticated COOKIE_ECHO chunk during the initialization of an SCTP connection. A remote attacker could use this flaw to crash the system by initiating a specially crafted SCTP handshake in order to trigger a NULL pointer dereference on the system. (CVE-2014-0101, Important) Red Hat would like to thank Nokia Siemens Networks for reporting this issue. This update also fixes the following bug: * Due to an incorrect call of the weak-modules script in the kernel spec file, the weak-modules directory was removed from the system when removing or upgrading certain kernel packages related to weak-modules, such as kernel-debug. With this update, the weak-modules call in the kernel spec file has been corrected, and the script now preserves the weak-modules directory on the system in this scenario. (BZ#1076599) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (https://bugzilla.redhat.com/): 1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk 6. Package List: Red Hat Enterprise Linux Compute Node EUS (v. 6.3): Source: kernel-2.6.32-279.43.1.el6.src.rpm noarch: kernel-doc-2.6.32-279.43.1.el6.noarch.rpm kernel-firmware-2.6.32-279.43.1.el6.noarch.rpm x86_64: kernel-2.6.32-279.43.1.el6.x86_64.rpm kernel-debug-2.6.32-279.43.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm kernel-devel-2.6.32-279.43.1.el6.x86_64.rpm kernel-headers-2.6.32-279.43.1.el6.x86_64.rpm perf-2.6.32-279.43.1.el6.x86_64.rpm perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3): Source: kernel-2.6.32-279.43.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm python-perf-2.6.32-279.43.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.3): Source: kernel-2.6.32-279.43.1.el6.src.rpm i386: kernel-2.6.32-279.43.1.el6.i686.rpm kernel-debug-2.6.32-279.43.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-279.43.1.el6.i686.rpm kernel-debug-devel-2.6.32-279.43.1.el6.i686.rpm kernel-debuginfo-2.6.32-279.43.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-279.43.1.el6.i686.rpm kernel-devel-2.6.32-279.43.1.el6.i686.rpm kernel-headers-2.6.32-279.43.1.el6.i686.rpm perf-2.6.32-279.43.1.el6.i686.rpm perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm noarch: kernel-doc-2.6.32-279.43.1.el6.noarch.rpm kernel-firmware-2.6.32-279.43.1.el6.noarch.rpm ppc64: kernel-2.6.32-279.43.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-279.43.1.el6.ppc64.rpm kernel-debug-2.6.32-279.43.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-279.43.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-279.43.1.el6.ppc64.rpm kernel-devel-2.6.32-279.43.1.el6.ppc64.rpm kernel-headers-2.6.32-279.43.1.el6.ppc64.rpm perf-2.6.32-279.43.1.el6.ppc64.rpm perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm s390x: kernel-2.6.32-279.43.1.el6.s390x.rpm kernel-debug-2.6.32-279.43.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-279.43.1.el6.s390x.rpm kernel-debug-devel-2.6.32-279.43.1.el6.s390x.rpm kernel-debuginfo-2.6.32-279.43.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-279.43.1.el6.s390x.rpm kernel-devel-2.6.32-279.43.1.el6.s390x.rpm kernel-headers-2.6.32-279.43.1.el6.s390x.rpm kernel-kdump-2.6.32-279.43.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-279.43.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-279.43.1.el6.s390x.rpm perf-2.6.32-279.43.1.el6.s390x.rpm perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm x86_64: kernel-2.6.32-279.43.1.el6.x86_64.rpm kernel-debug-2.6.32-279.43.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm kernel-devel-2.6.32-279.43.1.el6.x86_64.rpm kernel-headers-2.6.32-279.43.1.el6.x86_64.rpm perf-2.6.32-279.43.1.el6.x86_64.rpm perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.3): Source: kernel-2.6.32-279.43.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-279.43.1.el6.i686.rpm kernel-debuginfo-2.6.32-279.43.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-279.43.1.el6.i686.rpm perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm python-perf-2.6.32-279.43.1.el6.i686.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-279.43.1.el6.ppc64.rpm perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm python-perf-2.6.32-279.43.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-279.43.1.el6.s390x.rpm kernel-debuginfo-2.6.32-279.43.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-279.43.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-279.43.1.el6.s390x.rpm perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm python-perf-2.6.32-279.43.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-279.43.1.el6.x86_64.rpm perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm python-perf-2.6.32-279.43.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-279.43.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0101.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTVqvnXlSAg2UNWIIRAskwAKDFhD3zS1sh/vhrk31MzjZjFuD8kwCfdeRV 1nSgXH01tADV2vYadphGfKs= =2Sa7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 22 17:52:15 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Apr 2014 17:52:15 +0000 Subject: [RHSA-2014:0420-01] Moderate: qemu-kvm security update Message-ID: <201404221752.s3MHqFbu014882@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm security update Advisory ID: RHSA-2014:0420-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0420.html Issue date: 2014-04-22 CVE Names: CVE-2014-0142 CVE-2014-0143 CVE-2014-0144 CVE-2014-0145 CVE-2014-0146 CVE-2014-0147 CVE-2014-0148 CVE-2014-0150 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0143, CVE-2014-0144, CVE-2014-0145, CVE-2014-0147) A buffer overflow flaw was found in the way the virtio_net_handle_mac() function of QEMU processed guest requests to update the table of MAC addresses. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0150) A divide-by-zero flaw was found in the seek_to_sector() function of the parallels block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0142) A NULL pointer dereference flaw was found in the QCOW2 block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0146) It was found that the block driver for Hyper-V VHDX images did not correctly calculate BAT (Block Allocation Table) entries due to a missing bounds check. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0148) The CVE-2014-0143 issues were discovered by Kevin Wolf and Stefan Hajnoczi of Red Hat, the CVE-2014-0144 issues were discovered by Fam Zheng, Jeff Cody, Kevin Wolf, and Stefan Hajnoczi of Red Hat, the CVE-2014-0145 issues were discovered by Stefan Hajnoczi of Red Hat, the CVE-2014-0150 issue was discovered by Michael S. Tsirkin of Red Hat, the CVE-2014-0142, CVE-2014-0146, and CVE-2014-0147 issues were discovered by Kevin Wolf of Red Hat, and the CVE-2014-0148 issue was discovered by Jeff Cody of Red Hat. All qemu-kvm users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1078201 - CVE-2014-0142 qemu: crash by possible division by zero 1078212 - CVE-2014-0148 Qemu: vhdx: bounds checking for block_size and logical_sector_size 1078232 - CVE-2014-0146 Qemu: qcow2: NULL dereference in qcow2_open() error path 1078846 - CVE-2014-0150 qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function 1078848 - CVE-2014-0147 Qemu: block: possible crash due signed types or logic error 1078885 - CVE-2014-0145 Qemu: prevent possible buffer overflows 1079140 - CVE-2014-0143 Qemu: block: multiple integer overflow flaws 1079240 - CVE-2014-0144 Qemu: block: missing input validation 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm i386: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-img-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-img-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm i386: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-img-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm i386: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-img-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0142.html https://www.redhat.com/security/data/cve/CVE-2014-0143.html https://www.redhat.com/security/data/cve/CVE-2014-0144.html https://www.redhat.com/security/data/cve/CVE-2014-0145.html https://www.redhat.com/security/data/cve/CVE-2014-0146.html https://www.redhat.com/security/data/cve/CVE-2014-0147.html https://www.redhat.com/security/data/cve/CVE-2014-0148.html https://www.redhat.com/security/data/cve/CVE-2014-0150.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTVqwZXlSAg2UNWIIRAn0KAKCwdHEJfaKaIA8QDxKRCbDbj2IKuQCfafQt 07cM07BcjDMYF0Mac08lAto= =I95P -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 23 06:49:15 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 23 Apr 2014 06:49:15 +0000 Subject: [RHSA-2014:0422-01] Critical: openshift-origin-broker security update Message-ID: <201404230649.s3N6nGqu011094@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: openshift-origin-broker security update Advisory ID: RHSA-2014:0422-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0422.html Issue date: 2014-04-23 CVE Names: CVE-2014-0188 ===================================================================== 1. Summary: Updated openshift-origin-broker and rubygem-openshift-origin-auth-remote-user packages that fix one security issue are now available for Red Hat OpenShift Enterprise 1.2.7. The Red Hat Security Response Team has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHOSE Infrastructure 1.2 - noarch 3. Description: The openshift-origin-broker package provides the OpenShift Broker service that manages all user logins, DNS name resolution, application states, and general orchestration of the applications. The rubygem-openshift-origin-auth-remote-user package provides the remote user authentication plug-in. A flaw was found in the way openshift-origin-broker handled authentication requests via the remote user authentication plug-in. A remote attacker able to submit a request to openshift-origin-broker could set the X-Remote-User header, and send the request to a passthrough trigger, resulting in a bypass of the authentication checks to gain access to any OpenShift user account on the system. (CVE-2014-0188) All users of Red Hat OpenShift Enterprise 1.2.7 are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, restart the httpd daemon for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1090120 - CVE-2014-0188 OpenShift: openshift-origin-broker plugin allows impersonation 6. Package List: RHOSE Infrastructure 1.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/openshift-origin-broker-1.5.9-1.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/rubygem-openshift-origin-auth-remote-user-1.8.4-1.el6op.src.rpm noarch: openshift-origin-broker-1.5.9-1.el6op.noarch.rpm rubygem-openshift-origin-auth-remote-user-1.8.4-1.el6op.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0188.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTV2IvXlSAg2UNWIIRArG7AJoDxddt8lqxNLTSMPEWP48vL9lrjgCfV/PB 0UB7yqX8uRT43D1RP1jowlc= =/f29 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 23 06:50:01 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 23 Apr 2014 06:50:01 +0000 Subject: [RHSA-2014:0423-01] Critical: openshift-origin-broker security update Message-ID: <201404230650.s3N6o2gJ020721@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: openshift-origin-broker security update Advisory ID: RHSA-2014:0423-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0423.html Issue date: 2014-04-23 CVE Names: CVE-2014-0188 ===================================================================== 1. Summary: Updated openshift-origin-broker and rubygem-openshift-origin-auth-remote-user packages that fix one security issue are now available for Red Hat OpenShift Enterprise 2.0.5. The Red Hat Security Response Team has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHOSE Infrastructure 2.0 - noarch 3. Description: The openshift-origin-broker package provides the OpenShift Broker service that manages all user logins, DNS name resolution, application states, and general orchestration of the applications. The rubygem-openshift-origin-auth-remote-user package provides the remote user authentication plug-in. A flaw was found in the way openshift-origin-broker handled authentication requests via the remote user authentication plug-in. A remote attacker able to submit a request to openshift-origin-broker could set the X-Remote-User header, and send the request to a passthrough trigger, resulting in a bypass of the authentication checks to gain access to any OpenShift user account on the system. (CVE-2014-0188) All users of Red Hat OpenShift Enterprise 2.0.5 are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, restart the httpd daemon for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1090120 - CVE-2014-0188 OpenShift: openshift-origin-broker plugin allows impersonation 6. Package List: RHOSE Infrastructure 2.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/openshift-origin-broker-1.15.3.5-1.el6op.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOSE/SRPMS/rubygem-openshift-origin-auth-remote-user-1.17.4-1.el6op.src.rpm noarch: openshift-origin-broker-1.15.3.5-1.el6op.noarch.rpm rubygem-openshift-origin-auth-remote-user-1.17.4-1.el6op.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0188.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTV2KIXlSAg2UNWIIRAi1ZAKDDA0gc1LrSNOLX5kDP86UVDxDRpwCglnXK zwN7TGkU4qCRCXEFfclaxG4= =kKJV -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 23 18:34:27 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 23 Apr 2014 18:34:27 +0000 Subject: [RHSA-2014:0429-01] Moderate: tomcat6 security update Message-ID: <201404231834.s3NIYXQf000866@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tomcat6 security update Advisory ID: RHSA-2014:0429-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0429.html Issue date: 2014-04-23 CVE Names: CVE-2013-4286 CVE-2013-4322 CVE-2014-0050 ===================================================================== 1. Summary: Updated tomcat6 packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. It was found that when Tomcat processed a series of HTTP requests in which at least one request contained either multiple content-length headers, or one content-length header with a chunked transfer-encoding header, Tomcat would incorrectly handle the request. A remote attacker could use this flaw to poison a web cache, perform cross-site scripting (XSS) attacks, or obtain sensitive information from other requests. (CVE-2013-4286) It was discovered that the fix for CVE-2012-3544 did not properly resolve a denial of service flaw in the way Tomcat processed chunk extensions and trailing headers in chunked requests. A remote attacker could use this flaw to send an excessively long request that, when processed by Tomcat, could consume network bandwidth, CPU, and memory on the Tomcat server. Note that chunked transfer encoding is enabled by default. (CVE-2013-4322) A denial of service flaw was found in the way Apache Commons FileUpload handled small-sized buffers used by MultipartStream. A remote attacker could use this flaw to create a malformed Content-Type header for a multipart request, causing JBoss Web to enter an infinite loop when processing such an incoming request. (CVE-2014-0050) All Tomcat users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Tomcat must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1062337 - CVE-2014-0050 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream 1069905 - CVE-2013-4322 tomcat: incomplete fix for CVE-2012-3544 1069921 - CVE-2013-4286 tomcat: multiple content-length header poisoning flaws 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/tomcat6-6.0.24-64.el6_5.src.rpm noarch: tomcat6-6.0.24-64.el6_5.noarch.rpm tomcat6-admin-webapps-6.0.24-64.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-64.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-javadoc-6.0.24-64.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-lib-6.0.24-64.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-64.el6_5.noarch.rpm tomcat6-webapps-6.0.24-64.el6_5.noarch.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/tomcat6-6.0.24-64.el6_5.src.rpm noarch: tomcat6-6.0.24-64.el6_5.noarch.rpm tomcat6-admin-webapps-6.0.24-64.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-64.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-javadoc-6.0.24-64.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-lib-6.0.24-64.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-64.el6_5.noarch.rpm tomcat6-webapps-6.0.24-64.el6_5.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/tomcat6-6.0.24-64.el6_5.src.rpm noarch: tomcat6-6.0.24-64.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-lib-6.0.24-64.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-64.el6_5.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/tomcat6-6.0.24-64.el6_5.src.rpm noarch: tomcat6-admin-webapps-6.0.24-64.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-64.el6_5.noarch.rpm tomcat6-javadoc-6.0.24-64.el6_5.noarch.rpm tomcat6-webapps-6.0.24-64.el6_5.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/tomcat6-6.0.24-64.el6_5.src.rpm noarch: tomcat6-6.0.24-64.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-64.el6_5.noarch.rpm tomcat6-lib-6.0.24-64.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-64.el6_5.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/tomcat6-6.0.24-64.el6_5.src.rpm noarch: tomcat6-admin-webapps-6.0.24-64.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-64.el6_5.noarch.rpm tomcat6-javadoc-6.0.24-64.el6_5.noarch.rpm tomcat6-webapps-6.0.24-64.el6_5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-4286.html https://www.redhat.com/security/data/cve/CVE-2013-4322.html https://www.redhat.com/security/data/cve/CVE-2014-0050.html https://access.redhat.com/security/updates/classification/#moderate https://tomcat.apache.org/security-6.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTWAehXlSAg2UNWIIRAk4FAJ0QHChPnJ7YGMKqQrpTiHHuI9qcTwCeNVwA RcJJsIakE7V9WaBDGRiqYO4= =cC51 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 24 17:47:46 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 24 Apr 2014 17:47:46 +0000 Subject: [RHSA-2014:0432-01] Important: kernel security and bug fix update Message-ID: <201404241747.s3OHlkva004860@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2014:0432-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0432.html Issue date: 2014-04-24 CVE Names: CVE-2014-0101 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.4) - noarch, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.4) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel processed an authenticated COOKIE_ECHO chunk during the initialization of an SCTP connection. A remote attacker could use this flaw to crash the system by initiating a specially crafted SCTP handshake in order to trigger a NULL pointer dereference on the system. (CVE-2014-0101, Important) Red Hat would like to thank Nokia Siemens Networks for reporting this issue. This update also fixes several bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (https://bugzilla.redhat.com/): 1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.4): Source: kernel-2.6.32-358.41.1.el6.src.rpm noarch: kernel-doc-2.6.32-358.41.1.el6.noarch.rpm kernel-firmware-2.6.32-358.41.1.el6.noarch.rpm x86_64: kernel-2.6.32-358.41.1.el6.x86_64.rpm kernel-debug-2.6.32-358.41.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.41.1.el6.x86_64.rpm kernel-devel-2.6.32-358.41.1.el6.x86_64.rpm kernel-headers-2.6.32-358.41.1.el6.x86_64.rpm perf-2.6.32-358.41.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4): Source: kernel-2.6.32-358.41.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.41.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm python-perf-2.6.32-358.41.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.4): Source: kernel-2.6.32-358.41.1.el6.src.rpm i386: kernel-2.6.32-358.41.1.el6.i686.rpm kernel-debug-2.6.32-358.41.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-358.41.1.el6.i686.rpm kernel-debug-devel-2.6.32-358.41.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.41.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.41.1.el6.i686.rpm kernel-devel-2.6.32-358.41.1.el6.i686.rpm kernel-headers-2.6.32-358.41.1.el6.i686.rpm perf-2.6.32-358.41.1.el6.i686.rpm perf-debuginfo-2.6.32-358.41.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.i686.rpm noarch: kernel-doc-2.6.32-358.41.1.el6.noarch.rpm kernel-firmware-2.6.32-358.41.1.el6.noarch.rpm ppc64: kernel-2.6.32-358.41.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-358.41.1.el6.ppc64.rpm kernel-debug-2.6.32-358.41.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-358.41.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-358.41.1.el6.ppc64.rpm kernel-devel-2.6.32-358.41.1.el6.ppc64.rpm kernel-headers-2.6.32-358.41.1.el6.ppc64.rpm perf-2.6.32-358.41.1.el6.ppc64.rpm perf-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm s390x: kernel-2.6.32-358.41.1.el6.s390x.rpm kernel-debug-2.6.32-358.41.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-358.41.1.el6.s390x.rpm kernel-debug-devel-2.6.32-358.41.1.el6.s390x.rpm kernel-debuginfo-2.6.32-358.41.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-358.41.1.el6.s390x.rpm kernel-devel-2.6.32-358.41.1.el6.s390x.rpm kernel-headers-2.6.32-358.41.1.el6.s390x.rpm kernel-kdump-2.6.32-358.41.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-358.41.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-358.41.1.el6.s390x.rpm perf-2.6.32-358.41.1.el6.s390x.rpm perf-debuginfo-2.6.32-358.41.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.s390x.rpm x86_64: kernel-2.6.32-358.41.1.el6.x86_64.rpm kernel-debug-2.6.32-358.41.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.41.1.el6.x86_64.rpm kernel-devel-2.6.32-358.41.1.el6.x86_64.rpm kernel-headers-2.6.32-358.41.1.el6.x86_64.rpm perf-2.6.32-358.41.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.4): Source: kernel-2.6.32-358.41.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-358.41.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.41.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.41.1.el6.i686.rpm perf-debuginfo-2.6.32-358.41.1.el6.i686.rpm python-perf-2.6.32-358.41.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-358.41.1.el6.ppc64.rpm perf-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm python-perf-2.6.32-358.41.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-358.41.1.el6.s390x.rpm kernel-debuginfo-2.6.32-358.41.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-358.41.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-358.41.1.el6.s390x.rpm perf-debuginfo-2.6.32-358.41.1.el6.s390x.rpm python-perf-2.6.32-358.41.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.41.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm python-perf-2.6.32-358.41.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.41.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0101.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/kernel.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTWU3+XlSAg2UNWIIRAnUOAJ9xqk+o0E1Tt9Hoq5yXIAM6twwiiwCguDoN Sl5ICvfMtyOIhgQW9FQg6Bk= =1FId -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 24 17:48:45 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 24 Apr 2014 17:48:45 +0000 Subject: [RHSA-2014:0433-01] Moderate: kernel security, bug fix, and enhancement update Message-ID: <201404241748.s3OHmjS1010811@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2014:0433-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0433.html Issue date: 2014-04-24 CVE Names: CVE-2012-6638 CVE-2013-2888 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues, three bugs, and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's TCP/IP protocol suite implementation handled TCP packets with both the SYN and FIN flags set. A remote attacker could use this flaw to consume an excessive amount of resources on the target system, potentially resulting in a denial of service. (CVE-2012-6638, Moderate) * A flaw was found in the way the Linux kernel handled HID (Human Interface Device) reports with an out-of-bounds Report ID. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2013-2888, Moderate) This update also fixes the following bugs: * A previous change to the sunrpc code introduced a race condition between the rpc_wake_up_task() and rpc_wake_up_status() functions. A race between threads operating on these functions could result in a deadlock situation, subsequently triggering a "soft lockup" event and rendering the system unresponsive. This problem has been fixed by re-ordering tasks in the RPC wait queue. (BZ#1073731) * Running a process in the background on a GFS2 file system could sometimes trigger a glock recursion error that resulted in a kernel panic. This happened when a readpage operation attempted to take a glock that had already been held by another function. To prevent this error, GFS2 now verifies whether the glock is already held when performing the readpage operation. (BZ#1073953) * A previous patch backport to the IUCV (Inter User Communication Vehicle) code was incomplete. Consequently, when establishing an IUCV connection, the kernel could, under certain circumstances, dereference a NULL pointer, resulting in a kernel panic. A patch has been applied to correct this problem by calling the proper function when removing IUCV paths. (BZ#1077045) In addition, this update adds the following enhancement: * The lpfc driver had a fixed timeout of 60 seconds for SCSI task management commands. With this update, the lpfc driver enables the user to set this timeout within the range from 5 to 180 seconds. The timeout can be changed by modifying the "lpfc_task_mgmt_tmo" parameter for the lpfc driver. (BZ#1073123) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (https://bugzilla.redhat.com/): 1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw 1066055 - CVE-2012-6638 Kernel: net: tcp: potential DoS via SYN+FIN messages 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-371.8.1.el5.src.rpm i386: kernel-2.6.18-371.8.1.el5.i686.rpm kernel-PAE-2.6.18-371.8.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm kernel-debug-2.6.18-371.8.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm kernel-devel-2.6.18-371.8.1.el5.i686.rpm kernel-headers-2.6.18-371.8.1.el5.i386.rpm kernel-xen-2.6.18-371.8.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm noarch: kernel-doc-2.6.18-371.8.1.el5.noarch.rpm x86_64: kernel-2.6.18-371.8.1.el5.x86_64.rpm kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-371.8.1.el5.src.rpm i386: kernel-2.6.18-371.8.1.el5.i686.rpm kernel-PAE-2.6.18-371.8.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm kernel-debug-2.6.18-371.8.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm kernel-devel-2.6.18-371.8.1.el5.i686.rpm kernel-headers-2.6.18-371.8.1.el5.i386.rpm kernel-xen-2.6.18-371.8.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm ia64: kernel-2.6.18-371.8.1.el5.ia64.rpm kernel-debug-2.6.18-371.8.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.ia64.rpm kernel-debug-devel-2.6.18-371.8.1.el5.ia64.rpm kernel-debuginfo-2.6.18-371.8.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.ia64.rpm kernel-devel-2.6.18-371.8.1.el5.ia64.rpm kernel-headers-2.6.18-371.8.1.el5.ia64.rpm kernel-xen-2.6.18-371.8.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-371.8.1.el5.ia64.rpm kernel-xen-devel-2.6.18-371.8.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-371.8.1.el5.noarch.rpm ppc: kernel-2.6.18-371.8.1.el5.ppc64.rpm kernel-debug-2.6.18-371.8.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-371.8.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.ppc64.rpm kernel-devel-2.6.18-371.8.1.el5.ppc64.rpm kernel-headers-2.6.18-371.8.1.el5.ppc.rpm kernel-headers-2.6.18-371.8.1.el5.ppc64.rpm kernel-kdump-2.6.18-371.8.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-371.8.1.el5.ppc64.rpm s390x: kernel-2.6.18-371.8.1.el5.s390x.rpm kernel-debug-2.6.18-371.8.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.s390x.rpm kernel-debug-devel-2.6.18-371.8.1.el5.s390x.rpm kernel-debuginfo-2.6.18-371.8.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.s390x.rpm kernel-devel-2.6.18-371.8.1.el5.s390x.rpm kernel-headers-2.6.18-371.8.1.el5.s390x.rpm kernel-kdump-2.6.18-371.8.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-371.8.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-371.8.1.el5.s390x.rpm x86_64: kernel-2.6.18-371.8.1.el5.x86_64.rpm kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-6638.html https://www.redhat.com/security/data/cve/CVE-2013-2888.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTWU5WXlSAg2UNWIIRAgl+AJ0VLds3e1/BCp49/I5PXVZb1y8vmwCdGU87 Tv0t0awEvdwHSEEpLVqNmrc= =nNGG -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 24 17:49:23 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 24 Apr 2014 17:49:23 +0000 Subject: [RHSA-2014:0434-01] Moderate: qemu-kvm-rhev security update Message-ID: <201404241749.s3OHnObm025635@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm-rhev security update Advisory ID: RHSA-2014:0434-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0434.html Issue date: 2014-04-24 CVE Names: CVE-2014-0142 CVE-2014-0143 CVE-2014-0144 CVE-2014-0145 CVE-2014-0146 CVE-2014-0147 CVE-2014-0148 CVE-2014-0150 ===================================================================== 1. Summary: Updated qemu-kvm-rhev packages that fix several security issues are now available for Red Hat Enterprise Linux OpenStack Platform 4.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 4.0 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Linux OpenStack Platform. Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0143, CVE-2014-0144, CVE-2014-0145, CVE-2014-0147) A buffer overflow flaw was found in the way the virtio_net_handle_mac() function of QEMU processed guest requests to update the table of MAC addresses. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0150) A divide-by-zero flaw was found in the seek_to_sector() function of the parallels block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0142) A NULL pointer dereference flaw was found in the QCOW2 block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0146) It was found that the block driver for Hyper-V VHDX images did not correctly calculate BAT (Block Allocation Table) entries due to a missing bounds check. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0148) The CVE-2014-0143 issues were discovered by Kevin Wolf and Stefan Hajnoczi of Red Hat, the CVE-2014-0144 issues were discovered by Fam Zheng, Jeff Cody, Kevin Wolf, and Stefan Hajnoczi of Red Hat, the CVE-2014-0145 issues were discovered by Stefan Hajnoczi of Red Hat, the CVE-2014-0150 issue was discovered by Michael S. Tsirkin of Red Hat, the CVE-2014-0142, CVE-2014-0146, and CVE-2014-0147 issues were discovered by Kevin Wolf of Red Hat, and the CVE-2014-0148 issue was discovered by Jeff Cody of Red Hat. All users of qemu-kvm-rhev are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1078201 - CVE-2014-0142 qemu: crash by possible division by zero 1078212 - CVE-2014-0148 Qemu: vhdx: bounds checking for block_size and logical_sector_size 1078232 - CVE-2014-0146 Qemu: qcow2: NULL dereference in qcow2_open() error path 1078846 - CVE-2014-0150 qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function 1078848 - CVE-2014-0147 Qemu: block: possible crash due signed types or logic error 1078885 - CVE-2014-0145 Qemu: prevent possible buffer overflows 1079140 - CVE-2014-0143 Qemu: block: multiple integer overflow flaws 1079240 - CVE-2014-0144 Qemu: block: missing input validation 6. Package List: Red Hat Enterprise Linux OpenStack Platform 4.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/qemu-kvm-rhev-0.12.1.2-2.415.el6_5.8.src.rpm x86_64: qemu-img-rhev-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-rhev-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-rhev-debuginfo-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-rhev-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0142.html https://www.redhat.com/security/data/cve/CVE-2014-0143.html https://www.redhat.com/security/data/cve/CVE-2014-0144.html https://www.redhat.com/security/data/cve/CVE-2014-0145.html https://www.redhat.com/security/data/cve/CVE-2014-0146.html https://www.redhat.com/security/data/cve/CVE-2014-0147.html https://www.redhat.com/security/data/cve/CVE-2014-0148.html https://www.redhat.com/security/data/cve/CVE-2014-0150.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTWU6HXlSAg2UNWIIRAqHzAJ0bufWTfyKJeCphJrHMzSTPadPiVgCeLfDO tyXTTZ9+aYUYDpI+45LduoI= =sGti -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Apr 24 17:50:35 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 24 Apr 2014 17:50:35 +0000 Subject: [RHSA-2014:0435-01] Moderate: qemu-kvm-rhev security update Message-ID: <201404241750.s3OHoZvZ019695@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm-rhev security update Advisory ID: RHSA-2014:0435-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0435.html Issue date: 2014-04-24 CVE Names: CVE-2014-0142 CVE-2014-0143 CVE-2014-0144 CVE-2014-0145 CVE-2014-0146 CVE-2014-0147 CVE-2014-0148 CVE-2014-0150 ===================================================================== 1. Summary: Updated qemu-kvm-rhev packages that fix several security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 3.0 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Linux OpenStack Platform. Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0143, CVE-2014-0144, CVE-2014-0145, CVE-2014-0147) A buffer overflow flaw was found in the way the virtio_net_handle_mac() function of QEMU processed guest requests to update the table of MAC addresses. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0150) A divide-by-zero flaw was found in the seek_to_sector() function of the parallels block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0142) A NULL pointer dereference flaw was found in the QCOW2 block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0146) It was found that the block driver for Hyper-V VHDX images did not correctly calculate BAT (Block Allocation Table) entries due to a missing bounds check. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0148) The CVE-2014-0143 issues were discovered by Kevin Wolf and Stefan Hajnoczi of Red Hat, the CVE-2014-0144 issues were discovered by Fam Zheng, Jeff Cody, Kevin Wolf, and Stefan Hajnoczi of Red Hat, the CVE-2014-0145 issues were discovered by Stefan Hajnoczi of Red Hat, the CVE-2014-0150 issue was discovered by Michael S. Tsirkin of Red Hat, the CVE-2014-0142, CVE-2014-0146, and CVE-2014-0147 issues were discovered by Kevin Wolf of Red Hat, and the CVE-2014-0148 issue was discovered by Jeff Cody of Red Hat. All users of qemu-kvm-rhev are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1078201 - CVE-2014-0142 qemu: crash by possible division by zero 1078212 - CVE-2014-0148 Qemu: vhdx: bounds checking for block_size and logical_sector_size 1078232 - CVE-2014-0146 Qemu: qcow2: NULL dereference in qcow2_open() error path 1078846 - CVE-2014-0150 qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function 1078848 - CVE-2014-0147 Qemu: block: possible crash due signed types or logic error 1078885 - CVE-2014-0145 Qemu: prevent possible buffer overflows 1079140 - CVE-2014-0143 Qemu: block: multiple integer overflow flaws 1079240 - CVE-2014-0144 Qemu: block: missing input validation 6. Package List: Red Hat Enterprise Linux OpenStack Platform 3.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/qemu-kvm-rhev-0.12.1.2-2.415.el6_5.8.src.rpm x86_64: qemu-img-rhev-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-rhev-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-rhev-debuginfo-0.12.1.2-2.415.el6_5.8.x86_64.rpm qemu-kvm-rhev-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0142.html https://www.redhat.com/security/data/cve/CVE-2014-0143.html https://www.redhat.com/security/data/cve/CVE-2014-0144.html https://www.redhat.com/security/data/cve/CVE-2014-0145.html https://www.redhat.com/security/data/cve/CVE-2014-0146.html https://www.redhat.com/security/data/cve/CVE-2014-0147.html https://www.redhat.com/security/data/cve/CVE-2014-0148.html https://www.redhat.com/security/data/cve/CVE-2014-0150.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTWU63XlSAg2UNWIIRAk6mAJ4jg05dHWBCFrMXrNFywhXu1BGrYwCgjRkj 9mFTXd4+4SqsgP05eiox7as= =1h5j -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 28 16:48:09 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 28 Apr 2014 16:48:09 +0000 Subject: [RHSA-2014:0439-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <201404281648.s3SGmAa9030253@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2014:0439-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0439.html Issue date: 2014-04-28 CVE Names: CVE-2013-7263 CVE-2013-7265 CVE-2014-0069 CVE-2014-1438 CVE-2014-1690 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 ===================================================================== 1. Summary: Updated kernel-rt packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise MRG 2.5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. * A denial of service flaw was found in the way the Linux kernel's IPv6 implementation processed IPv6 router advertisement (RA) packets. An attacker able to send a large number of RA packets to a target system could potentially use this flaw to crash the target system. (CVE-2014-2309, Important) * A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol (DCCP) packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-2523, Important) * A flaw was found in the way the Linux kernel's CIFS implementation handled uncached write operations with specially crafted iovec structures. An unprivileged local user with access to a CIFS share could use this flaw to crash the system, leak kernel memory, or, potentially, escalate their privileges on the system. (CVE-2014-0069, Moderate) * A flaw was found in the way the Linux kernel handled pending Floating Pointer Unit (FPU) exceptions during the switching of tasks. A local attacker could use this flaw to terminate arbitrary processes on the system, causing a denial of service, or, potentially, escalate their privileges on the system. Note that this flaw only affected systems using AMD CPUs on both 32-bit and 64-bit architectures. (CVE-2014-1438, Moderate) * It was found that certain protocol handlers in the Linux kernel's networking implementation could set the addr_len value without initializing the associated data structure. A local, unprivileged user could use this flaw to leak kernel stack memory to user space using the recvmsg, recvfrom, and recvmmsg system calls. (CVE-2013-7263, CVE-2013-7265, Low) * An information leak flaw was found in the Linux kernel's netfilter connection tracking IRC NAT helper implementation that could allow a remote attacker to disclose portions of kernel stack memory during IRC DCC (Direct Client-to-Client) communication over NAT. (CVE-2014-1690, Low) * A denial of service flaw was discovered in the way the Linux kernel's SELinux implementation handled files with an empty SELinux security context. A local user who has the CAP_MAC_ADMIN capability could use this flaw to crash the system. (CVE-2014-1874, Low) Red Hat would like to thank Al Viro for reporting CVE-2014-0069. The CVE-2014-1690 issue was discovered by Daniel Borkmann of Red Hat. This update also fixes several bugs and adds multiple enhancements. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. Users are advised to upgrade to these updated packages, which upgrade the kernel-rt kernel to version kernel-rt-3.10.33-rt32.33, correct these issues, and fix the bugs and add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (https://bugzilla.redhat.com/): 1016735 - Apply IB performance patches to 3.10 realtime kernel 1032245 - RFE: rebase to a 3.10 kernel 1035875 - CVE-2013-7263 CVE-2013-7265 Kernel: net: leakage of uninitialized memory to user-space via recv syscalls 1052914 - CVE-2014-1438 kernel: x86: exceptions are not cleared in AMD FXSAVE workaround 1058748 - CVE-2014-1690 Kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper 1058848 - Panic on unload of sit module unload and reading of /proc//net/dev 1062356 - CVE-2014-1874 Kernel: SELinux: local denial-of-service 1064253 - CVE-2014-0069 kernel: cifs: incorrect handling of bogus user pointers during uncached writes 1067880 - hpsa driver version regression in MRG 2.5 kernel 1074471 - CVE-2014-2309 Kernel: net: IPv6: crash due to router advertisement flooding 1077343 - CVE-2014-2523 kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/kernel-rt-3.10.33-rt32.33.el6rt.src.rpm noarch: kernel-rt-doc-3.10.33-rt32.33.el6rt.noarch.rpm kernel-rt-firmware-3.10.33-rt32.33.el6rt.noarch.rpm x86_64: kernel-rt-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-debug-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-devel-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-trace-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.33-rt32.33.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.33-rt32.33.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-7263.html https://www.redhat.com/security/data/cve/CVE-2013-7265.html https://www.redhat.com/security/data/cve/CVE-2014-0069.html https://www.redhat.com/security/data/cve/CVE-2014-1438.html https://www.redhat.com/security/data/cve/CVE-2014-1690.html https://www.redhat.com/security/data/cve/CVE-2014-1874.html https://www.redhat.com/security/data/cve/CVE-2014-2309.html https://www.redhat.com/security/data/cve/CVE-2014-2523.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTXoY4XlSAg2UNWIIRAv8wAJoCQLJndGV/cFztv5qJxzig1a0mmwCcCzy5 xdeB2TpeTbTTq8XcXQJFW4E= =JbKa -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 28 16:48:40 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 28 Apr 2014 16:48:40 +0000 Subject: [RHSA-2014:0440-01] Moderate: Red Hat Enterprise MRG Grid 2.5 security, bug fix, and enhancement update Message-ID: <201404281648.s3SGmec8004441@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Enterprise MRG Grid 2.5 security, bug fix, and enhancement update Advisory ID: RHSA-2014:0440-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0440.html Issue date: 2014-04-28 CVE Names: CVE-2012-6619 CVE-2013-6445 ===================================================================== 1. Summary: Updated Grid component packages that fix two security issues, multiple bugs, and provide several enhancements are now available for Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: MRG Grid Execute Node for RHEL 6 ComputeNode v.2 - noarch, x86_64 MRG Grid Execute Node for RHEL 6 Server v.2 - i386, noarch, x86_64 MRG Grid for RHEL 6 Server v.2 - i386, noarch, x86_64 MRG Management for RHEL 6 ComputeNode v.2 - noarch MRG Management for RHEL 6 Server v.2 - noarch MRG Realtime for RHEL 6 Server v.2 - noarch Red Hat MRG Messaging for RHEL 6 Server v.2 - noarch 3. Description: Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation IT infrastructure for enterprise computing. MRG offers increased performance, reliability, interoperability, and faster computing for enterprise customers. MRG Grid provides high-throughput computing and enables enterprises to achieve higher peak computing capacity as well as improved infrastructure utilization by leveraging their existing technology to build high performance grids. MRG Grid provides a job-queueing mechanism, scheduling policy, and a priority scheme, as well as resource monitoring and resource management. Users submit their jobs to MRG Grid, where they are placed into a queue. MRG Grid then chooses when and where to run the jobs based upon a policy, carefully monitors their progress, and ultimately informs the user upon completion. A buffer over-read flaw was found in the way MongoDB handled BSON data. A database user permitted to insert BSON data into a MongoDB server could use this flaw to read server memory, potentially disclosing sensitive data. (CVE-2012-6619) Note: This update addresses CVE-2012-6619 by enabling the "--objcheck" option in the /etc/mongodb.conf file. If you have edited this file, the updated version will be stored as /etc/mongodb.conf.rpmnew, and you will need to merge the changes into /etc/mongodb.conf manually. It was found that MRG Management Console (cumin) used the crypt(3) DES-based hash function to hash passwords. DES-based hashing has known weaknesses that allow an attacker to recover plain text passwords from hashes. An attacker able to compromise a cumin user database could potentially use this flaw to recover plain text passwords from the password hashes stored in that database. (CVE-2013-6445) Note: In deployments where user account information is stored in a database managed by cumin, it is recommended that users change their passwords after this update is applied. The CVE-2013-6445 issue was discovered by Tom?? Nov??ik of the Red Hat MRG Quality Engineering team. These updated packages for Red Hat Enterprise Linux 6 also provide numerous bug fixes and enhancements for the Grid component of Red Hat Enterprise MRG. Space precludes documenting all of these changes in this advisory. Refer to the Red Hat Enterprise MRG 2 Technical Notes document, available shortly from the link in the References section, for information on these changes. All users of the Grid capabilities of Red Hat Enterprise MRG are advised to upgrade to these updated packages, which correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 721137 - [RFE] Receive evaluated form of configuration as seen by a running daemon 903279 - plumage collector plugin crashes view server if it can't contact negotiator 911503 - Grid - Overview - summary page doesn't fit into 1024x768 959098 - Grid - Overview - performance page does not fit into 1024x768 1020191 - cumin - wrong sorting according to job id 1044315 - CVE-2013-6445 cumin: weak password hashing 1049748 - CVE-2012-6619 mongodb: memory over-read via incorrect BSON object length 1058871 - patch Cumin to record the traceback in case of internal error 1078777 - condor_triggerd segfault 1084016 - Impossibility to update condor on Windows 6. Package List: MRG Grid Execute Node for RHEL 6 ComputeNode v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/RHEMRG-RHEL6/SRPMS/condor-7.8.10-0.1.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm noarch: mrg-release-2.5.0-1.el6.noarch.rpm x86_64: condor-7.8.10-0.1.el6.x86_64.rpm condor-classads-7.8.10-0.1.el6.x86_64.rpm condor-debuginfo-7.8.10-0.1.el6.x86_64.rpm condor-kbdd-7.8.10-0.1.el6.x86_64.rpm condor-qmf-7.8.10-0.1.el6.x86_64.rpm condor-vm-gahp-7.8.10-0.1.el6.x86_64.rpm MRG Management for RHEL 6 ComputeNode v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm noarch: mrg-release-2.5.0-1.el6.noarch.rpm MRG Grid for RHEL 6 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/condor-7.8.10-0.1.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/cumin-0.1.5797-1.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/mongodb-1.6.4-7.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm i386: condor-7.8.10-0.1.el6.i686.rpm condor-aviary-7.8.10-0.1.el6.i686.rpm condor-classads-7.8.10-0.1.el6.i686.rpm condor-cluster-resource-agent-7.8.10-0.1.el6.i686.rpm condor-debuginfo-7.8.10-0.1.el6.i686.rpm condor-kbdd-7.8.10-0.1.el6.i686.rpm condor-plumage-7.8.10-0.1.el6.i686.rpm condor-qmf-7.8.10-0.1.el6.i686.rpm mongodb-1.6.4-7.el6.i686.rpm mongodb-debuginfo-1.6.4-7.el6.i686.rpm mongodb-server-1.6.4-7.el6.i686.rpm noarch: cumin-0.1.5797-1.el6.noarch.rpm mrg-release-2.5.0-1.el6.noarch.rpm x86_64: condor-7.8.10-0.1.el6.x86_64.rpm condor-aviary-7.8.10-0.1.el6.x86_64.rpm condor-classads-7.8.10-0.1.el6.x86_64.rpm condor-cluster-resource-agent-7.8.10-0.1.el6.x86_64.rpm condor-debuginfo-7.8.10-0.1.el6.x86_64.rpm condor-deltacloud-gahp-7.8.10-0.1.el6.x86_64.rpm condor-kbdd-7.8.10-0.1.el6.x86_64.rpm condor-plumage-7.8.10-0.1.el6.x86_64.rpm condor-qmf-7.8.10-0.1.el6.x86_64.rpm condor-vm-gahp-7.8.10-0.1.el6.x86_64.rpm mongodb-1.6.4-7.el6.x86_64.rpm mongodb-debuginfo-1.6.4-7.el6.x86_64.rpm mongodb-server-1.6.4-7.el6.x86_64.rpm MRG Grid Execute Node for RHEL 6 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/condor-7.8.10-0.1.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm i386: condor-7.8.10-0.1.el6.i686.rpm condor-classads-7.8.10-0.1.el6.i686.rpm condor-debuginfo-7.8.10-0.1.el6.i686.rpm condor-kbdd-7.8.10-0.1.el6.i686.rpm condor-qmf-7.8.10-0.1.el6.i686.rpm noarch: mrg-release-2.5.0-1.el6.noarch.rpm x86_64: condor-7.8.10-0.1.el6.x86_64.rpm condor-classads-7.8.10-0.1.el6.x86_64.rpm condor-debuginfo-7.8.10-0.1.el6.x86_64.rpm condor-kbdd-7.8.10-0.1.el6.x86_64.rpm condor-qmf-7.8.10-0.1.el6.x86_64.rpm condor-vm-gahp-7.8.10-0.1.el6.x86_64.rpm MRG Management for RHEL 6 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/cumin-0.1.5797-1.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm noarch: cumin-0.1.5797-1.el6.noarch.rpm mrg-release-2.5.0-1.el6.noarch.rpm Red Hat MRG Messaging for RHEL 6 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm noarch: mrg-release-2.5.0-1.el6.noarch.rpm MRG Realtime for RHEL 6 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/mrg-release-2.5.0-1.el6.src.rpm noarch: mrg-release-2.5.0-1.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-6619.html https://www.redhat.com/security/data/cve/CVE-2013-6445.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTXoZYXlSAg2UNWIIRAqDUAJ96pjR115gpDlb5DjXKwkcu5YwlRgCfR0d6 l7bQWpgJarODMmJLRBhu1gw= =TKc8 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 28 16:49:12 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 28 Apr 2014 16:49:12 +0000 Subject: [RHSA-2014:0441-01] Moderate: Red Hat Enterprise MRG Messaging 2.5 security, bug fix, and enhancement update Message-ID: <201404281649.s3SGnCWG030599@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Enterprise MRG Messaging 2.5 security, bug fix, and enhancement update Advisory ID: RHSA-2014:0441-01 Product: Red Hat Enterprise MRG for RHEL-5 Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0441.html Issue date: 2014-04-28 CVE Names: CVE-2013-6445 ===================================================================== 1. Summary: Updated Messaging component packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: MRG Grid Execute Node for RHEL 5 Server v.2 - noarch MRG Grid for RHEL 5 Server v.2 - noarch MRG Management for RHEL 5 Server v.2 - noarch Red Hat MRG Messaging for RHEL 5 Server v.2 - noarch 3. Description: Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation IT infrastructure for enterprise computing. MRG offers increased performance, reliability, interoperability, and faster computing for enterprise customers. MRG Messaging is a high-speed reliable messaging distribution for Linux based on AMQP (Advanced Message Queuing Protocol), an open protocol standard for enterprise messaging that is designed to make mission critical messaging widely available as a standard service, and to make enterprise messaging interoperable across platforms, programming languages, and vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10 client libraries for C++, Java JMS, and Python; as well as persistence libraries and management tools. It was found that MRG Management Console (cumin) used the crypt(3) DES-based hash function to hash passwords. DES-based hashing has known weaknesses that allow an attacker to more easily recover plain text passwords from hashes via brute-force guessing. An attacker able to compromise a cumin user database could potentially use this flaw to recover plain text passwords from the password hashes stored in that database. (CVE-2013-6445) Note: In deployments where user account information is stored in a database managed by cumin, it is recommended that users change their passwords after this update is applied. This issue was discovered by Tom?? Nov??ik of the Red Hat MRG Quality Engineering team. This update also fixes several bugs and adds enhancements. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. All users of the Messaging capabilities of Red Hat Enterprise MRG are advised to upgrade to these updated packages, which resolve these issues and add these enhancements. After installing the updated packages, stop the cluster by either running "service qpidd stop" on all nodes, or "qpid-cluster --all-stop" on any one of the cluster nodes. Once stopped, restart the cluster with "service qpidd start" on all nodes for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1044315 - CVE-2013-6445 cumin: weak password hashing 6. Package List: MRG Grid for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/cumin-0.1.5796-2.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.5.0-1.el5.src.rpm noarch: cumin-0.1.5796-2.el5_9.noarch.rpm mrg-release-2.5.0-1.el5.noarch.rpm MRG Grid Execute Node for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.5.0-1.el5.src.rpm noarch: mrg-release-2.5.0-1.el5.noarch.rpm MRG Management for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/cumin-0.1.5796-2.el5_9.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.5.0-1.el5.src.rpm noarch: cumin-0.1.5796-2.el5_9.noarch.rpm mrg-release-2.5.0-1.el5.noarch.rpm Red Hat MRG Messaging for RHEL 5 Server v.2: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/mrg-release-2.5.0-1.el5.src.rpm noarch: mrg-release-2.5.0-1.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-6445.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTXoZzXlSAg2UNWIIRAltaAKCe3ffv2vkLuowfKLQaDFNF8hLq0gCfTCKE 3sVJuz9Md4kkBS2+yUEWeSs= =fQ8e -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Apr 28 20:23:05 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 28 Apr 2014 20:23:05 +0000 Subject: [RHSA-2014:0442-01] Important: python-keystoneclient security update Message-ID: <201404282023.s3SKN0uo028083@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-keystoneclient security update Advisory ID: RHSA-2014:0442-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0442.html Issue date: 2014-04-28 CVE Names: CVE-2014-0105 ===================================================================== 1. Summary: Updated python-keystoneclient packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 3.0 - noarch 3. Description: Python-keystoneclient is a client library and a command line utility for interacting with the OpenStack Identity API. The OpenStack Identity auth_token middleware component handles the authentication of tokens with keystone. When using the auth_token middleware with the memcached token cache enabled, a token for a different identity could be returned. An authenticated user could use this flaw to escalate their privileges by making repeated requests that could eventually allow the user to acquire the administrator's identity. Note that only OpenStack Identity setups using auth_token with memcached were affected. (CVE-2014-0105) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Kieran Spear from the University of Melbourne as the original reporter. All python-keystoneclient users are advised to upgrade to these updated packages, which correct this issue. After installing this update, all OpenStack services using auth_token must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1082165 - CVE-2014-0105 python-keystoneclient: Potential context confusion in Keystone middleware 6. Package List: Red Hat Enterprise Linux OpenStack Platform 3.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/python-keystoneclient-0.2.3-8.el6ost.src.rpm noarch: python-keystoneclient-0.2.3-8.el6ost.noarch.rpm python-keystoneclient-doc-0.2.3-8.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0105.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTXriGXlSAg2UNWIIRAvJuAJ41HbHkDZK0LPA63Wh8xbRhwY6uFwCguX3x NiWI/Tc3C00OGDujqwROJ3g= =DFCH -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 29 22:47:14 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 29 Apr 2014 22:47:14 +0000 Subject: [RHSA-2014:0447-01] Critical: flash-plugin security update Message-ID: <201404292247.s3TMlFSf010885@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2014:0447-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0447.html Issue date: 2014-04-29 CVE Names: CVE-2014-0515 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes one vulnerability in Adobe Flash Player. This vulnerability is detailed in the Adobe Security Bulletin APSB14-13, listed in the References section. A flaw was found in the way flash-plugin displayed certain SWF content. An attacker could use this flaw to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2014-0515) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.356. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1092116 - CVE-2014-0515 flash-plugin: buffer overflow vulnerability leads to arbitrary code execution (APSB14-13) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.356-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.356-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.356-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.356-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.356-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.356-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.356-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.356-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.356-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.356-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0515.html https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb14-13.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTYCvjXlSAg2UNWIIRAo9cAJ9+xjq+IArfYWnElZ3eS4DDSMRNfgCfTUtG +MNXS/YC8jqbPt7rn6VE0cA= =5N+u -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 29 22:47:48 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 29 Apr 2014 22:47:48 +0000 Subject: [RHSA-2014:0448-01] Critical: firefox security update Message-ID: <201404292247.s3TMlnUN007887@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2014:0448-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0448.html Issue date: 2014-04-29 CVE Names: CVE-2014-1518 CVE-2014-1523 CVE-2014-1524 CVE-2014-1529 CVE-2014-1530 CVE-2014-1531 CVE-2014-1532 ===================================================================== 1. Summary: An updated firefox package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mozilla Firefox is an open source web browser. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1518, CVE-2014-1524, CVE-2014-1529, CVE-2014-1531) A use-after-free flaw was found in the way Firefox resolved hosts in certain circumstances. An attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1532) An out-of-bounds read flaw was found in the way Firefox decoded JPEG images. Loading a web page containing a specially crafted JPEG image could cause Firefox to crash. (CVE-2014-1523) A flaw was found in the way Firefox handled browser navigations through history. An attacker could possibly use this flaw to cause the address bar of the browser to display a web page name while loading content from an entirely different web page, which could allow for cross-site scripting (XSS) attacks. (CVE-2014-1530) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bobby Holley, Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij, Jesse Ruderman, Nathan Froyd, Christian Holler, Abhishek Arya, Mariusz Mlynski, moz_bug_r_a4, Nils, Tyson Smith, and Jesse Schwartzentrube as the original reporters of these issues. For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 24.5.0 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. All Firefox users should upgrade to this updated package, which contains Firefox version 24.5.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1054242 - RHEVM: Extremely high memory usage in Firefox 24 ESR on RHEL 6.5 1092657 - CVE-2014-1518 Mozilla: Miscellaneous memory safety hazards (rv:24.5) (MFSA 2014-34) 1092660 - CVE-2014-1523 Mozilla: Out of bounds read while decoding JPG images (MFSA-2014-37) 1092663 - CVE-2014-1524 Mozilla: Buffer overflow when using non-XBL object as XBL (MFSA 2014-38) 1092664 - CVE-2014-1529 Mozilla: Privilege escalation through Web Notification API (MFSA 2014-42) 1092666 - CVE-2014-1530 Mozilla: Cross-site scripting (XSS) using history navigations (MFSA 2014-43) 1092668 - CVE-2014-1531 Mozilla: Use-after-free in imgLoader while resizing images (MFSA 2014-44) 1092670 - CVE-2014-1532 Mozilla: Use-after-free in nsHostResolver (MFSA 2014-46) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-24.5.0-1.el5_10.src.rpm i386: firefox-24.5.0-1.el5_10.i386.rpm firefox-debuginfo-24.5.0-1.el5_10.i386.rpm x86_64: firefox-24.5.0-1.el5_10.i386.rpm firefox-24.5.0-1.el5_10.x86_64.rpm firefox-debuginfo-24.5.0-1.el5_10.i386.rpm firefox-debuginfo-24.5.0-1.el5_10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-24.5.0-1.el5_10.src.rpm i386: firefox-24.5.0-1.el5_10.i386.rpm firefox-debuginfo-24.5.0-1.el5_10.i386.rpm ia64: firefox-24.5.0-1.el5_10.ia64.rpm firefox-debuginfo-24.5.0-1.el5_10.ia64.rpm ppc: firefox-24.5.0-1.el5_10.ppc.rpm firefox-debuginfo-24.5.0-1.el5_10.ppc.rpm s390x: firefox-24.5.0-1.el5_10.s390.rpm firefox-24.5.0-1.el5_10.s390x.rpm firefox-debuginfo-24.5.0-1.el5_10.s390.rpm firefox-debuginfo-24.5.0-1.el5_10.s390x.rpm x86_64: firefox-24.5.0-1.el5_10.i386.rpm firefox-24.5.0-1.el5_10.x86_64.rpm firefox-debuginfo-24.5.0-1.el5_10.i386.rpm firefox-debuginfo-24.5.0-1.el5_10.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-24.5.0-1.el6_5.src.rpm i386: firefox-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm x86_64: firefox-24.5.0-1.el6_5.i686.rpm firefox-24.5.0-1.el6_5.x86_64.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-24.5.0-1.el6_5.src.rpm x86_64: firefox-24.5.0-1.el6_5.i686.rpm firefox-24.5.0-1.el6_5.x86_64.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-24.5.0-1.el6_5.src.rpm i386: firefox-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm ppc64: firefox-24.5.0-1.el6_5.ppc.rpm firefox-24.5.0-1.el6_5.ppc64.rpm firefox-debuginfo-24.5.0-1.el6_5.ppc.rpm firefox-debuginfo-24.5.0-1.el6_5.ppc64.rpm s390x: firefox-24.5.0-1.el6_5.s390.rpm firefox-24.5.0-1.el6_5.s390x.rpm firefox-debuginfo-24.5.0-1.el6_5.s390.rpm firefox-debuginfo-24.5.0-1.el6_5.s390x.rpm x86_64: firefox-24.5.0-1.el6_5.i686.rpm firefox-24.5.0-1.el6_5.x86_64.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-24.5.0-1.el6_5.src.rpm i386: firefox-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm x86_64: firefox-24.5.0-1.el6_5.i686.rpm firefox-24.5.0-1.el6_5.x86_64.rpm firefox-debuginfo-24.5.0-1.el6_5.i686.rpm firefox-debuginfo-24.5.0-1.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-1518.html https://www.redhat.com/security/data/cve/CVE-2014-1523.html https://www.redhat.com/security/data/cve/CVE-2014-1524.html https://www.redhat.com/security/data/cve/CVE-2014-1529.html https://www.redhat.com/security/data/cve/CVE-2014-1530.html https://www.redhat.com/security/data/cve/CVE-2014-1531.html https://www.redhat.com/security/data/cve/CVE-2014-1532.html https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox24.5 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTYCwFXlSAg2UNWIIRAk3iAJ9QK3HvhPzLuiIwgmp5rlZT2rdtHwCfSjhE uBJ2XDzArew5By/r3YQWagU= =ATaj -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 29 22:48:39 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 29 Apr 2014 22:48:39 +0000 Subject: [RHSA-2014:0449-01] Important: thunderbird security update Message-ID: <201404292248.s3TMme72026012@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: thunderbird security update Advisory ID: RHSA-2014:0449-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0449.html Issue date: 2014-04-29 CVE Names: CVE-2014-1518 CVE-2014-1523 CVE-2014-1524 CVE-2014-1529 CVE-2014-1530 CVE-2014-1531 CVE-2014-1532 ===================================================================== 1. Summary: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1518, CVE-2014-1524, CVE-2014-1529, CVE-2014-1531) A use-after-free flaw was found in the way Thunderbird resolved hosts in certain circumstances. An attacker could use this flaw to crash Thunderbird or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1532) An out-of-bounds read flaw was found in the way Thunderbird decoded JPEG images. Loading an email or a web page containing a specially crafted JPEG image could cause Thunderbird to crash. (CVE-2014-1523) A flaw was found in the way Thunderbird handled browser navigations through history. An attacker could possibly use this flaw to cause the address bar of the browser to display a web page name while loading content from an entirely different web page, which could allow for cross-site scripting (XSS) attacks. (CVE-2014-1530) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Bobby Holley, Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij, Jesse Ruderman, Nathan Froyd, Christian Holler, Abhishek Arya, Mariusz Mlynski, moz_bug_r_a4, Nils, Tyson Smith and Jesse Schwartzentrube as the original reporters of these issues. Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. For technical details regarding these flaws, refer to the Mozilla security advisories for Thunderbird 24.5.0. You can find a link to the Mozilla advisories in the References section of this erratum. All Thunderbird users should upgrade to this updated package, which contains Thunderbird version 24.5.0, which corrects these issues. After installing the update, Thunderbird must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1092657 - CVE-2014-1518 Mozilla: Miscellaneous memory safety hazards (rv:24.5) (MFSA 2014-34) 1092660 - CVE-2014-1523 Mozilla: Out of bounds read while decoding JPG images (MFSA-2014-37) 1092663 - CVE-2014-1524 Mozilla: Buffer overflow when using non-XBL object as XBL (MFSA 2014-38) 1092664 - CVE-2014-1529 Mozilla: Privilege escalation through Web Notification API (MFSA 2014-42) 1092666 - CVE-2014-1530 Mozilla: Cross-site scripting (XSS) using history navigations (MFSA 2014-43) 1092668 - CVE-2014-1531 Mozilla: Use-after-free in imgLoader while resizing images (MFSA 2014-44) 1092670 - CVE-2014-1532 Mozilla: Use-after-free in nsHostResolver (MFSA 2014-46) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-24.5.0-1.el5_10.src.rpm i386: thunderbird-24.5.0-1.el5_10.i386.rpm thunderbird-debuginfo-24.5.0-1.el5_10.i386.rpm x86_64: thunderbird-24.5.0-1.el5_10.x86_64.rpm thunderbird-debuginfo-24.5.0-1.el5_10.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-24.5.0-1.el5_10.src.rpm i386: thunderbird-24.5.0-1.el5_10.i386.rpm thunderbird-debuginfo-24.5.0-1.el5_10.i386.rpm x86_64: thunderbird-24.5.0-1.el5_10.x86_64.rpm thunderbird-debuginfo-24.5.0-1.el5_10.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-24.5.0-1.el6_5.src.rpm i386: thunderbird-24.5.0-1.el6_5.i686.rpm thunderbird-debuginfo-24.5.0-1.el6_5.i686.rpm x86_64: thunderbird-24.5.0-1.el6_5.x86_64.rpm thunderbird-debuginfo-24.5.0-1.el6_5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-24.5.0-1.el6_5.src.rpm i386: thunderbird-24.5.0-1.el6_5.i686.rpm thunderbird-debuginfo-24.5.0-1.el6_5.i686.rpm ppc64: thunderbird-24.5.0-1.el6_5.ppc64.rpm thunderbird-debuginfo-24.5.0-1.el6_5.ppc64.rpm s390x: thunderbird-24.5.0-1.el6_5.s390x.rpm thunderbird-debuginfo-24.5.0-1.el6_5.s390x.rpm x86_64: thunderbird-24.5.0-1.el6_5.x86_64.rpm thunderbird-debuginfo-24.5.0-1.el6_5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-24.5.0-1.el6_5.src.rpm i386: thunderbird-24.5.0-1.el6_5.i686.rpm thunderbird-debuginfo-24.5.0-1.el6_5.i686.rpm x86_64: thunderbird-24.5.0-1.el6_5.x86_64.rpm thunderbird-debuginfo-24.5.0-1.el6_5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-1518.html https://www.redhat.com/security/data/cve/CVE-2014-1523.html https://www.redhat.com/security/data/cve/CVE-2014-1524.html https://www.redhat.com/security/data/cve/CVE-2014-1529.html https://www.redhat.com/security/data/cve/CVE-2014-1530.html https://www.redhat.com/security/data/cve/CVE-2014-1531.html https://www.redhat.com/security/data/cve/CVE-2014-1532.html https://access.redhat.com/security/updates/classification/#important https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html#thunderbird24.5 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTYCwqXlSAg2UNWIIRAusHAJ45UXAhNYOqgmfYYTgdjhlcuGsn9wCfcqDA 4c0hdTaTUrqaIW0QKKqosBo= =GmRp -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 30 19:10:57 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 30 Apr 2014 19:10:57 +0000 Subject: [RHSA-2014:0455-01] Important: openstack-glance security update Message-ID: <201404301910.s3UJAwO7023607@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openstack-glance security update Advisory ID: RHSA-2014:0455-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0455.html Issue date: 2014-04-30 CVE Names: CVE-2014-0162 ===================================================================== 1. Summary: Updated openstack-glance packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 4.0. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 4.0 - noarch 3. Description: OpenStack Image service (glance) provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it away. Stored images can be used as a template to get new servers up and running quickly and more consistently than installing a server operating system and individually configuring additional services. It was found that Sheepdog, a distributed object storage system, did not properly validate Sheepdog image URIs. A remote attacker able to insert or modify glance image metadata could use this flaw to execute arbitrary commands with the privileges of the user running the glance service. Note that only OpenStack Image setups using the Sheepdog back end were affected. (CVE-2014-0162) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Paul McMillan (Nebula) as the original reporter. All users of openstack-glance are advised to upgrade to these updated packages, which correct this issue. After installing the updated packages, the running glance services will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1085163 - CVE-2014-0162 openstack-glance: remote code execution in Glance Sheepdog backend 6. Package List: Red Hat Enterprise Linux OpenStack Platform 4.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/openstack-glance-2013.2.2-3.el6ost.src.rpm noarch: openstack-glance-2013.2.2-3.el6ost.noarch.rpm openstack-glance-doc-2013.2.2-3.el6ost.noarch.rpm python-glance-2013.2.2-3.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0162.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTYUqgXlSAg2UNWIIRAp1iAJ9PTYU/dNIbb6QAnHM+P6D2F/XD7gCeMoRW w+5csmDdHv0NgCfqnUB9Uko= =Ry4I -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 30 19:11:22 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 30 Apr 2014 19:11:22 +0000 Subject: [RHSA-2014:0456-01] Moderate: Django security update Message-ID: <201404301911.s3UJBMWM013854@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Django security update Advisory ID: RHSA-2014:0456-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0456.html Issue date: 2014-04-30 CVE Names: CVE-2014-0472 CVE-2014-0473 CVE-2014-0474 ===================================================================== 1. Summary: Updated Django packages that fix three security issues are now available for Red Hat Enterprise Linux OpenStack Platform 4.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 4.0 - noarch 3. Description: The Django web framework is used by horizon, the OpenStack Dashboard, which is a web interface for managing OpenStack services. A flaw was found in the way Django's reverse() URL resolver function constructed certain URLs. A remote attacker able to request a specially crafted view from a Django application could use this flaw to import and execute arbitrary Python modules on the system under the privileges of the user running the application. (CVE-2014-0472) It was found that Django's caching framework reused Cross-Site Request Forgery (CSRF) nonces for all requests from unauthenticated clients. A remote attacker could use this flaw to acquire the CSRF token of a different user and bypass intended CSRF protections in a Django application. (CVE-2014-0473) It was discovered that certain Django model field classes did not properly perform type conversion on their arguments. A remote attacker could use this flaw to submit a specially crafted SQL query that, when processed by a Django application using a MySQL database, could have various application-specific impacts on the MySQL database. (CVE-2014-0474) Red Hat would like to thank the upstream Django project for reporting this issue. Upstream acknowledges Benjamin Bach as the original reporter of CVE-2014-0472, Paul McMillan as the original reporter of CVE-2014-0473, and the Ruby on Rails team, and specifically Michael Koziarski, as the original reporters of CVE-2014-0474. All users of OpenStack Dashboard are advised to upgrade to these updated packages, which resolve these issues. After installing the updated packages, the httpd daemon must be restarted ("service httpd restart") for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1090588 - CVE-2014-0472 python-django: unexpected code execution using reverse() 1090592 - CVE-2014-0473 python-django: caching of anonymous pages could reveal CSRF token 1090593 - CVE-2014-0474 python-django: MySQL typecasting 6. Package List: Red Hat Enterprise Linux OpenStack Platform 4.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/Django14-1.4.11-1.el6ost.src.rpm noarch: Django14-1.4.11-1.el6ost.noarch.rpm Django14-doc-1.4.11-1.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0472.html https://www.redhat.com/security/data/cve/CVE-2014-0473.html https://www.redhat.com/security/data/cve/CVE-2014-0474.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTYUrNXlSAg2UNWIIRApoZAJ4wBQXGSWcekQHpDw+KSZ3aGIZ++QCdF2ez Zh+WfqrYP5Am9GYnSR6tfyg= =n4Pf -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Apr 30 19:11:46 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 30 Apr 2014 19:11:46 +0000 Subject: [RHSA-2014:0457-01] Moderate: Django security update Message-ID: <201404301911.s3UJBkYs024146@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Django security update Advisory ID: RHSA-2014:0457-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0457.html Issue date: 2014-04-30 CVE Names: CVE-2014-0472 CVE-2014-0473 CVE-2014-0474 ===================================================================== 1. Summary: Updated Django packages that fix three security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 3.0 - noarch 3. Description: The Django web framework is used by horizon, the OpenStack Dashboard, which is a web interface for managing OpenStack services. A flaw was found in the way Django's reverse() URL resolver function constructed certain URLs. A remote attacker able to request a specially crafted view from a Django application could use this flaw to import and execute arbitrary Python modules on the system under the privileges of the user running the application. (CVE-2014-0472) It was found that Django's caching framework reused Cross-Site Request Forgery (CSRF) nonces for all requests from unauthenticated clients. A remote attacker could use this flaw to acquire the CSRF token of a different user and bypass intended CSRF protections in a Django application. (CVE-2014-0473) It was discovered that certain Django model field classes did not properly perform type conversion on their arguments. A remote attacker could use this flaw to submit a specially crafted SQL query that, when processed by a Django application using a MySQL database, could have various application-specific impacts on the MySQL database. (CVE-2014-0474) Red Hat would like to thank the upstream Django project for reporting this issue. Upstream acknowledges Benjamin Bach as the original reporter of CVE-2014-0472, Paul McMillan as the original reporter of CVE-2014-0473, and the Ruby on Rails team, and specifically Michael Koziarski, as the original reporters of CVE-2014-0474. All users of OpenStack Dashboard are advised to upgrade to these updated packages, which resolve these issues. After installing the updated packages, the httpd daemon must be restarted ("service httpd restart") for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1090588 - CVE-2014-0472 python-django: unexpected code execution using reverse() 1090592 - CVE-2014-0473 python-django: caching of anonymous pages could reveal CSRF token 1090593 - CVE-2014-0474 python-django: MySQL typecasting 6. Package List: Red Hat Enterprise Linux OpenStack Platform 3.0: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHOS/SRPMS/Django14-1.4.11-1.el6ost.src.rpm noarch: Django14-1.4.11-1.el6ost.noarch.rpm Django14-doc-1.4.11-1.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0472.html https://www.redhat.com/security/data/cve/CVE-2014-0473.html https://www.redhat.com/security/data/cve/CVE-2014-0474.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTYUriXlSAg2UNWIIRAiBbAKCzfNCxWKz7qUgoLxW500wxbknLMACfVCl1 0K4g9NY90xpK59DV0IKh/cE= =vRtE -----END PGP SIGNATURE-----