From bugzilla at redhat.com Tue Dec 1 13:25:10 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 1 Dec 2015 08:25:10 -0500 Subject: [RHSA-2015:2525-01] Low: Red Hat Enterprise Linux 6.5 Extended Update Support Retirement Notice Message-ID: <201512011325.tB1DPA8W031239@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise Linux 6.5 Extended Update Support Retirement Notice Advisory ID: RHSA-2015:2525-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2525.html Issue date: 2015-12-01 ===================================================================== 1. Summary: This is the final notification for the retirement of Red Hat Enterprise Linux 6.5 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.5. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server EUS (v. 6.5) - i386, ppc64, s390x, x86_64 3. Description: In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Update Support for Red Hat Enterprise Linux 6.5 was retired on November 30, 2015, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 6.5 EUS after November 30, 2015. In addition, technical support through Red Hat's Global Support Services will be limited as described under "non-current minor releases" in the Knowledge Base article located at https://access.redhat.com/articles/64664 after this date. We encourage customers to migrate from Red Hat Enterprise Linux 6.5 to a more recent version of Red Hat Enterprise Linux. As a benefit of the Red Hat subscription model, customers can use their active subscriptions to entitle any system on any currently supported Red Hat Enterprise Linux release. Details of the Red Hat Enterprise Linux life cycle can be found here: https://access.redhat.com/support/policy/updates/errata/ 4. Solution: This erratum contains an updated redhat-release-server package that provides a copy of this retirement notice in the "/usr/share/doc/" directory. 5. Package List: Red Hat Enterprise Linux Server EUS (v. 6.5): Source: redhat-release-server-6Server-6.5.0.3.el6_5.2.src.rpm i386: redhat-release-server-6Server-6.5.0.3.el6_5.2.i686.rpm ppc64: redhat-release-server-6Server-6.5.0.3.el6_5.2.ppc64.rpm s390x: redhat-release-server-6Server-6.5.0.3.el6_5.2.s390x.rpm x86_64: redhat-release-server-6Server-6.5.0.3.el6_5.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 6. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/articles/64664 https://access.redhat.com/support/policy/updates/errata/ 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWXZ+zXlSAg2UNWIIRAhj4AJ9rb4K5yCOp+klVU4B07ONNsmNkNQCgnNFd qCa17abfboX7Ujd12f06Y/w= =i9QN -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 3 19:22:48 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Dec 2015 19:22:48 +0000 Subject: [RHSA-2015:2544-01] Moderate: openshift security update Message-ID: <201512031922.tB3JMmQU018246@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openshift security update Advisory ID: RHSA-2015:2544-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2015:2544 Issue date: 2015-12-03 CVE Names: CVE-2015-7528 ===================================================================== 1. Summary: Updated openshift packages that fix one security issue are now available for Red Hat OpenShift Enterprise 3.0 and 3.1. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHOSE 3.0 - x86_64 RHOSE 3.1 - x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. It was found that OpenShift's API back end did not verify requests for pod log locations, allowing a pod on a Node to request logs for any other pod on that Node. A remote attacker could use this flaw to view sensitive information via pod logs that they would normally not have access to. (CVE-2015-7528) This issue was discovered by Jordan Liggitt of Red Hat Atomic OpenShift. All OpenShift Enterprise 3.0 and 3.1 users are advised to upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1286745 - CVE-2015-7528 OpenShift: pod log location must validate container if provided 6. Package List: RHOSE 3.0: Source: openshift-3.0.2.0-0.git.38.7576bc5.el7ose.src.rpm x86_64: openshift-3.0.2.0-0.git.38.7576bc5.el7ose.x86_64.rpm openshift-clients-3.0.2.0-0.git.38.7576bc5.el7ose.x86_64.rpm openshift-master-3.0.2.0-0.git.38.7576bc5.el7ose.x86_64.rpm openshift-node-3.0.2.0-0.git.38.7576bc5.el7ose.x86_64.rpm openshift-sdn-ovs-3.0.2.0-0.git.38.7576bc5.el7ose.x86_64.rpm tuned-profiles-openshift-node-3.0.2.0-0.git.38.7576bc5.el7ose.x86_64.rpm RHOSE 3.1: Source: atomic-openshift-3.1.0.4-1.git.15.5e061c3.el7aos.src.rpm x86_64: atomic-openshift-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-clients-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-clients-redistributable-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-dockerregistry-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-master-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-node-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-pod-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-recycle-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm atomic-openshift-sdn-ovs-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm tuned-profiles-atomic-openshift-node-3.1.0.4-1.git.15.5e061c3.el7aos.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7528 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWYJaBXlSAg2UNWIIRAtHaAKCfIqKUWks4nzr1zs98BcL8MqAQzQCePLRC lhLKHHhD29Tp6Z7EwSxhcuw= =e+Qq -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 3 19:45:31 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Dec 2015 14:45:31 -0500 Subject: [RHSA-2015:2545-01] Critical: chromium-browser security update Message-ID: <201512031945.tB3JjVC0019725@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: chromium-browser security update Advisory ID: RHSA-2015:2545-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2545.html Issue date: 2015-12-03 CVE Names: CVE-2015-6764 CVE-2015-6765 CVE-2015-6766 CVE-2015-6767 CVE-2015-6768 CVE-2015-6769 CVE-2015-6770 CVE-2015-6771 CVE-2015-6772 CVE-2015-6773 CVE-2015-6774 CVE-2015-6775 CVE-2015-6776 CVE-2015-6777 CVE-2015-6778 CVE-2015-6779 CVE-2015-6780 CVE-2015-6781 CVE-2015-6782 CVE-2015-6784 CVE-2015-6785 CVE-2015-6786 CVE-2015-6787 ===================================================================== 1. Summary: Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2015-6764, CVE-2015-6765, CVE-2015-6766, CVE-2015-6767, CVE-2015-6768, CVE-2015-6769, CVE-2015-6770, CVE-2015-6771, CVE-2015-6772, CVE-2015-6773, CVE-2015-6774, CVE-2015-6775, CVE-2015-6776, CVE-2015-6777, CVE-2015-6778, CVE-2015-6779, CVE-2015-6780, CVE-2015-6781, CVE-2015-6782, CVE-2015-6784, CVE-2015-6785, CVE-2015-6786, CVE-2015-6787) All Chromium users should upgrade to these updated packages, which contain Chromium version 47.0.2526.73, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1285774 - CVE-2015-6764 v8: unspecified out-of-bounds access vulnerability 1287441 - CVE-2015-6765 chromium-browser: Use-after-free in AppCache 1287481 - CVE-2015-6766 chromium-browser: Use-after-free in AppCache 1287482 - CVE-2015-6767 chromium-browser: Use-after-free in AppCache 1287483 - CVE-2015-6768 chromium-browser: Cross-origin bypass in DOM 1287484 - CVE-2015-6769 chromium-browser: Cross-origin bypass in core 1287485 - CVE-2015-6770 chromium-browser: Cross-origin bypass in DOM 1287486 - CVE-2015-6771 chromium-browser: Out of bounds access in v8 1287487 - CVE-2015-6772 chromium-browser: Cross-origin bypass in DOM 1287488 - CVE-2015-6773 chromium-browser: Out of bounds access in Skia 1287489 - CVE-2015-6774 chromium-browser: Use-after-free in Extensions 1287490 - CVE-2015-6775 chromium-browser: Type confusion in PDFium 1287491 - CVE-2015-6776 chromium-browser: Out of bounds access in PDFium 1287492 - CVE-2015-6777 chromium-browser: Use-after-free in DOM 1287493 - CVE-2015-6778 chromium-browser: Out of bounds access in PDFium 1287494 - CVE-2015-6779 chromium-browser: Scheme bypass in PDFium 1287495 - CVE-2015-6780 chromium-browser: Use-after-free in Infobars 1287496 - CVE-2015-6781 chromium-browser: Integer overflow in Sfntly 1287497 - CVE-2015-6782 chromium-browser: Content spoofing in Omnibox 1287499 - CVE-2015-6784 chromium-browser: Escaping issue in saved pages 1287500 - CVE-2015-6785 chromium-browser: Wildcard matching issue in CSP 1287501 - CVE-2015-6786 chromium-browser: Scheme bypass in CSP 1287502 - CVE-2015-6787 chromium-browser: Various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-47.0.2526.73-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.73-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.73-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.73-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-47.0.2526.73-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.73-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.73-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.73-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-47.0.2526.73-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.73-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.73-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.73-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-6764 https://access.redhat.com/security/cve/CVE-2015-6765 https://access.redhat.com/security/cve/CVE-2015-6766 https://access.redhat.com/security/cve/CVE-2015-6767 https://access.redhat.com/security/cve/CVE-2015-6768 https://access.redhat.com/security/cve/CVE-2015-6769 https://access.redhat.com/security/cve/CVE-2015-6770 https://access.redhat.com/security/cve/CVE-2015-6771 https://access.redhat.com/security/cve/CVE-2015-6772 https://access.redhat.com/security/cve/CVE-2015-6773 https://access.redhat.com/security/cve/CVE-2015-6774 https://access.redhat.com/security/cve/CVE-2015-6775 https://access.redhat.com/security/cve/CVE-2015-6776 https://access.redhat.com/security/cve/CVE-2015-6777 https://access.redhat.com/security/cve/CVE-2015-6778 https://access.redhat.com/security/cve/CVE-2015-6779 https://access.redhat.com/security/cve/CVE-2015-6780 https://access.redhat.com/security/cve/CVE-2015-6781 https://access.redhat.com/security/cve/CVE-2015-6782 https://access.redhat.com/security/cve/CVE-2015-6784 https://access.redhat.com/security/cve/CVE-2015-6785 https://access.redhat.com/security/cve/CVE-2015-6786 https://access.redhat.com/security/cve/CVE-2015-6787 https://access.redhat.com/security/updates/classification/#critical http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWYJvYXlSAg2UNWIIRAvIFAJ96KpLiwxQfrlHgejNX7ex1MT8KZACgqtj/ 7JdrKPBwRzb16TJ3o0hIjJI= =aZgi -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 7 10:34:07 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 7 Dec 2015 10:34:07 +0000 Subject: [RHSA-2015:2549-01] Moderate: libxml2 security update Message-ID: <201512071034.tB7AY8M7026238@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libxml2 security update Advisory ID: RHSA-2015:2549-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2549.html Issue date: 2015-12-07 CVE Names: CVE-2015-5312 CVE-2015-7497 CVE-2015-7498 CVE-2015-7499 CVE-2015-7500 CVE-2015-7941 CVE-2015-7942 CVE-2015-8241 CVE-2015-8242 CVE-2015-8317 ===================================================================== 1. Summary: Updated libxml2 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) Red Hat would like to thank the GNOME project for reporting CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-8241, CVE-2015-8242, and CVE-2015-8317. Upstream acknowledges Kostya Serebryany of Google as the original reporter of CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, and CVE-2015-7500; Hugh Davenport as the original reporter of CVE-2015-8241 and CVE-2015-8242; and Hanno Boeck as the original reporter of CVE-2015-8317. All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1213957 - libxml2: out-of-bounds memory access when parsing an unclosed HTML comment 1274222 - CVE-2015-7941 libxml2: Out-of-bounds memory access 1276297 - CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections() 1276693 - CVE-2015-5312 libxml2: CPU exhaustion when processing specially crafted XML input 1281862 - CVE-2015-7497 libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey 1281879 - CVE-2015-7498 libxml2: Heap-based buffer overflow in xmlParseXmlDecl 1281925 - CVE-2015-7499 libxml2: Heap-based buffer overflow in xmlGROW 1281930 - CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration 1281936 - CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar 1281943 - CVE-2015-7500 libxml2: Heap buffer overflow in xmlParseMisc 1281950 - CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode 1281955 - libxml2: Multiple out-of-bounds reads in xmlDictComputeFastKey.isra.2 and xmlDictAddString.isra.O 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libxml2-2.7.6-20.el6_7.1.src.rpm i386: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-python-2.7.6-20.el6_7.1.i686.rpm x86_64: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-2.7.6-20.el6_7.1.x86_64.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-python-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-static-2.7.6-20.el6_7.1.i686.rpm x86_64: libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.x86_64.rpm libxml2-static-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: libxml2-2.7.6-20.el6_7.1.src.rpm x86_64: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-2.7.6-20.el6_7.1.x86_64.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-python-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.x86_64.rpm libxml2-static-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libxml2-2.7.6-20.el6_7.1.src.rpm i386: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-python-2.7.6-20.el6_7.1.i686.rpm ppc64: libxml2-2.7.6-20.el6_7.1.ppc.rpm libxml2-2.7.6-20.el6_7.1.ppc64.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.ppc.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.ppc64.rpm libxml2-devel-2.7.6-20.el6_7.1.ppc.rpm libxml2-devel-2.7.6-20.el6_7.1.ppc64.rpm libxml2-python-2.7.6-20.el6_7.1.ppc64.rpm s390x: libxml2-2.7.6-20.el6_7.1.s390.rpm libxml2-2.7.6-20.el6_7.1.s390x.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.s390.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.s390x.rpm libxml2-devel-2.7.6-20.el6_7.1.s390.rpm libxml2-devel-2.7.6-20.el6_7.1.s390x.rpm libxml2-python-2.7.6-20.el6_7.1.s390x.rpm x86_64: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-2.7.6-20.el6_7.1.x86_64.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.x86_64.rpm libxml2-python-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-static-2.7.6-20.el6_7.1.i686.rpm ppc64: libxml2-debuginfo-2.7.6-20.el6_7.1.ppc64.rpm libxml2-static-2.7.6-20.el6_7.1.ppc64.rpm s390x: libxml2-debuginfo-2.7.6-20.el6_7.1.s390x.rpm libxml2-static-2.7.6-20.el6_7.1.s390x.rpm x86_64: libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-static-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libxml2-2.7.6-20.el6_7.1.src.rpm i386: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-python-2.7.6-20.el6_7.1.i686.rpm x86_64: libxml2-2.7.6-20.el6_7.1.i686.rpm libxml2-2.7.6-20.el6_7.1.x86_64.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-devel-2.7.6-20.el6_7.1.i686.rpm libxml2-devel-2.7.6-20.el6_7.1.x86_64.rpm libxml2-python-2.7.6-20.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libxml2-debuginfo-2.7.6-20.el6_7.1.i686.rpm libxml2-static-2.7.6-20.el6_7.1.i686.rpm x86_64: libxml2-debuginfo-2.7.6-20.el6_7.1.x86_64.rpm libxml2-static-2.7.6-20.el6_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5312 https://access.redhat.com/security/cve/CVE-2015-7497 https://access.redhat.com/security/cve/CVE-2015-7498 https://access.redhat.com/security/cve/CVE-2015-7499 https://access.redhat.com/security/cve/CVE-2015-7500 https://access.redhat.com/security/cve/CVE-2015-7941 https://access.redhat.com/security/cve/CVE-2015-7942 https://access.redhat.com/security/cve/CVE-2015-8241 https://access.redhat.com/security/cve/CVE-2015-8242 https://access.redhat.com/security/cve/CVE-2015-8317 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWZWCJXlSAg2UNWIIRAolaAJ9ZG2087Dxbs4QgaixZuck7QoZHugCeMTPl +NnKYuZa9r7CJt9Llu3kJmw= =rLoh -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 7 14:07:56 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 7 Dec 2015 09:07:56 -0500 Subject: [RHSA-2015:2550-01] Moderate: libxml2 security update Message-ID: <201512071407.tB7E7u2g016962@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libxml2 security update Advisory ID: RHSA-2015:2550-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2550.html Issue date: 2015-12-07 CVE Names: CVE-2015-1819 CVE-2015-5312 CVE-2015-7497 CVE-2015-7498 CVE-2015-7499 CVE-2015-7500 CVE-2015-7941 CVE-2015-7942 CVE-2015-8241 CVE-2015-8242 CVE-2015-8317 ===================================================================== 1. Summary: Updated libxml2 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-1819, CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) Red Hat would like to thank the GNOME project for reporting CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-8241, CVE-2015-8242, and CVE-2015-8317. Upstream acknowledges Kostya Serebryany of Google as the original reporter of CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, and CVE-2015-7500; Hugh Davenport as the original reporter of CVE-2015-8241 and CVE-2015-8242; and Hanno Boeck as the original reporter of CVE-2015-8317. The CVE-2015-1819 issue was discovered by Florian Weimer of Red Hat Product Security. All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1211278 - CVE-2015-1819 libxml2: denial of service processing a crafted XML document 1213957 - libxml2: out-of-bounds memory access when parsing an unclosed HTML comment 1274222 - CVE-2015-7941 libxml2: Out-of-bounds memory access 1276297 - CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections() 1276693 - CVE-2015-5312 libxml2: CPU exhaustion when processing specially crafted XML input 1281862 - CVE-2015-7497 libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey 1281879 - CVE-2015-7498 libxml2: Heap-based buffer overflow in xmlParseXmlDecl 1281925 - CVE-2015-7499 libxml2: Heap-based buffer overflow in xmlGROW 1281930 - CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration 1281936 - CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar 1281943 - CVE-2015-7500 libxml2: Heap buffer overflow in xmlParseMisc 1281950 - CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode 1281955 - libxml2: Multiple out-of-bounds reads in xmlDictComputeFastKey.isra.2 and xmlDictAddString.isra.O 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libxml2-2.9.1-6.el7_2.2.src.rpm x86_64: libxml2-2.9.1-6.el7_2.2.i686.rpm libxml2-2.9.1-6.el7_2.2.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-python-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.2.i686.rpm libxml2-devel-2.9.1-6.el7_2.2.x86_64.rpm libxml2-static-2.9.1-6.el7_2.2.i686.rpm libxml2-static-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libxml2-2.9.1-6.el7_2.2.src.rpm x86_64: libxml2-2.9.1-6.el7_2.2.i686.rpm libxml2-2.9.1-6.el7_2.2.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-python-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.2.i686.rpm libxml2-devel-2.9.1-6.el7_2.2.x86_64.rpm libxml2-static-2.9.1-6.el7_2.2.i686.rpm libxml2-static-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libxml2-2.9.1-6.el7_2.2.src.rpm aarch64: libxml2-2.9.1-6.el7_2.2.aarch64.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.aarch64.rpm libxml2-devel-2.9.1-6.el7_2.2.aarch64.rpm libxml2-python-2.9.1-6.el7_2.2.aarch64.rpm ppc64: libxml2-2.9.1-6.el7_2.2.ppc.rpm libxml2-2.9.1-6.el7_2.2.ppc64.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.ppc.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.ppc64.rpm libxml2-devel-2.9.1-6.el7_2.2.ppc.rpm libxml2-devel-2.9.1-6.el7_2.2.ppc64.rpm libxml2-python-2.9.1-6.el7_2.2.ppc64.rpm ppc64le: libxml2-2.9.1-6.el7_2.2.ppc64le.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.ppc64le.rpm libxml2-devel-2.9.1-6.el7_2.2.ppc64le.rpm libxml2-python-2.9.1-6.el7_2.2.ppc64le.rpm s390x: libxml2-2.9.1-6.el7_2.2.s390.rpm libxml2-2.9.1-6.el7_2.2.s390x.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.s390.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.s390x.rpm libxml2-devel-2.9.1-6.el7_2.2.s390.rpm libxml2-devel-2.9.1-6.el7_2.2.s390x.rpm libxml2-python-2.9.1-6.el7_2.2.s390x.rpm x86_64: libxml2-2.9.1-6.el7_2.2.i686.rpm libxml2-2.9.1-6.el7_2.2.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.2.i686.rpm libxml2-devel-2.9.1-6.el7_2.2.x86_64.rpm libxml2-python-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: libxml2-debuginfo-2.9.1-6.el7_2.2.aarch64.rpm libxml2-static-2.9.1-6.el7_2.2.aarch64.rpm ppc64: libxml2-debuginfo-2.9.1-6.el7_2.2.ppc.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.ppc64.rpm libxml2-static-2.9.1-6.el7_2.2.ppc.rpm libxml2-static-2.9.1-6.el7_2.2.ppc64.rpm ppc64le: libxml2-debuginfo-2.9.1-6.el7_2.2.ppc64le.rpm libxml2-static-2.9.1-6.el7_2.2.ppc64le.rpm s390x: libxml2-debuginfo-2.9.1-6.el7_2.2.s390.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.s390x.rpm libxml2-static-2.9.1-6.el7_2.2.s390.rpm libxml2-static-2.9.1-6.el7_2.2.s390x.rpm x86_64: libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-static-2.9.1-6.el7_2.2.i686.rpm libxml2-static-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libxml2-2.9.1-6.el7_2.2.src.rpm x86_64: libxml2-2.9.1-6.el7_2.2.i686.rpm libxml2-2.9.1-6.el7_2.2.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.2.i686.rpm libxml2-devel-2.9.1-6.el7_2.2.x86_64.rpm libxml2-python-2.9.1-6.el7_2.2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7_2.2.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.2.x86_64.rpm libxml2-static-2.9.1-6.el7_2.2.i686.rpm libxml2-static-2.9.1-6.el7_2.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1819 https://access.redhat.com/security/cve/CVE-2015-5312 https://access.redhat.com/security/cve/CVE-2015-7497 https://access.redhat.com/security/cve/CVE-2015-7498 https://access.redhat.com/security/cve/CVE-2015-7499 https://access.redhat.com/security/cve/CVE-2015-7500 https://access.redhat.com/security/cve/CVE-2015-7941 https://access.redhat.com/security/cve/CVE-2015-7942 https://access.redhat.com/security/cve/CVE-2015-8241 https://access.redhat.com/security/cve/CVE-2015-8242 https://access.redhat.com/security/cve/CVE-2015-8317 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWZZK6XlSAg2UNWIIRAlx5AKCfIxP9TLM+V/vmQq6MVeUpjiGltgCgnOgZ IOmptwborGrgz5fLqra3STg= =bVgd -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 8 14:20:13 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 8 Dec 2015 14:20:13 +0000 Subject: [RHSA-2015:2552-01] Important: kernel security and bug fix update Message-ID: <201512081420.tB8EKEkK017422@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:2552-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2552.html Issue date: 2015-12-08 CVE Names: CVE-2015-5307 CVE-2015-8104 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the CVE-2015-5307 issue. This update also fixes the following bugs: * On Intel Xeon v5 platforms, the processor frequency was always tied to the highest possible frequency. Switching p-states on these client platforms failed. This update sets the idle frequency, busy frequency, and processor frequency values by determining the range and adjusting the minimal and maximal percent limit values. Now, switching p-states on the aforementioned client platforms proceeds successfully. (BZ#1273926) * Due to a validation error of in-kernel memory-mapped I/O (MMIO) tracing, a VM became previously unresponsive when connected to Red Hat Enterprise Virtualization Hypervisor. The provided patch fixes this bug by dropping the check in MMIO handler, and a VM continues running as expected. (BZ#1275150) * Due to retry-able command errors, the NVMe driver previously leaked I/O descriptors and DMA mappings. As a consequence, the kernel could become unresponsive during the hot-unplug operation if a driver was removed. This update fixes the driver memory leak bug on command retries, and the kernel no longer hangs in this situation. (BZ#1279792) * The hybrid_dma_data() function was not initialized before use, which caused an invalid memory access when hot-plugging a PCI card. As a consequence, a kernel oops occurred. The provided patch makes sure hybrid_dma_data() is initialized before use, and the kernel oops no longer occurs in this situation. (BZ#1279793) * When running PowerPC (PPC) KVM guests and the host was experiencing a lot of page faults, for example because it was running low on memory, the host sometimes triggered an incorrect kind of interrupt in the guest: a data storage exception instead of a data segment exception. This caused a kernel panic of the PPC KVM guest. With this update, the host kernel synthesizes a segment fault if the corresponding Segment Lookaside Buffer (SLB) lookup fails, which prevents the kernel panic from occurring. (BZ#1281423) * The kernel accessed an incorrect area of the khugepaged process causing Logical Partitioning (LPAR) to become unresponsive, and an oops occurred in medlp5. The backported upstream patch prevents an LPAR hang, and the oops no longer occurs. (BZ#1281424) * When the sctp module was loaded and a route to an association endpoint was removed after receiving an Out-of-The-Blue (OOTB) chunk but before incrementing the "dropped because of missing route" SNMP statistic, a Null Pointer Dereference kernel panic previously occurred. This update fixes the race condition between OOTB response and route removal. (BZ#1281426) * The cpuscaling test of the certification test suite previously failed due to a rounding bug in the intel-pstate driver. This bug has been fixed and the cpuscaling test now passes. (BZ#1281491) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception 1278496 - CVE-2015-8104 virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-327.3.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm kernel-doc-3.10.0-327.3.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm perf-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-327.3.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm kernel-doc-3.10.0-327.3.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm perf-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-327.3.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm kernel-doc-3.10.0-327.3.1.el7.noarch.rpm ppc64: kernel-3.10.0-327.3.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.3.1.el7.ppc64.rpm kernel-debug-3.10.0-327.3.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.3.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.3.1.el7.ppc64.rpm kernel-devel-3.10.0-327.3.1.el7.ppc64.rpm kernel-headers-3.10.0-327.3.1.el7.ppc64.rpm kernel-tools-3.10.0-327.3.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.3.1.el7.ppc64.rpm perf-3.10.0-327.3.1.el7.ppc64.rpm perf-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm python-perf-3.10.0-327.3.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.3.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debug-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.3.1.el7.ppc64le.rpm kernel-devel-3.10.0-327.3.1.el7.ppc64le.rpm kernel-headers-3.10.0-327.3.1.el7.ppc64le.rpm kernel-tools-3.10.0-327.3.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.3.1.el7.ppc64le.rpm perf-3.10.0-327.3.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm python-perf-3.10.0-327.3.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm s390x: kernel-3.10.0-327.3.1.el7.s390x.rpm kernel-debug-3.10.0-327.3.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.s390x.rpm kernel-debug-devel-3.10.0-327.3.1.el7.s390x.rpm kernel-debuginfo-3.10.0-327.3.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.3.1.el7.s390x.rpm kernel-devel-3.10.0-327.3.1.el7.s390x.rpm kernel-headers-3.10.0-327.3.1.el7.s390x.rpm kernel-kdump-3.10.0-327.3.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.3.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.3.1.el7.s390x.rpm perf-3.10.0-327.3.1.el7.s390x.rpm perf-debuginfo-3.10.0-327.3.1.el7.s390x.rpm python-perf-3.10.0-327.3.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.s390x.rpm x86_64: kernel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm perf-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.3.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.3.1.el7.ppc64.rpm perf-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.3.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.3.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-327.3.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm kernel-doc-3.10.0-327.3.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-devel-3.10.0-327.3.1.el7.x86_64.rpm kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm perf-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.3.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.3.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5307 https://access.redhat.com/security/cve/CVE-2015-8104 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWZubYXlSAg2UNWIIRAsvDAJ46kkXWcTnnN5EtbqyO0fc2+uZZawCeNnnr 2T4VNHyutcGOZycd46ObXOk= =v6PE -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 8 14:22:39 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 8 Dec 2015 14:22:39 +0000 Subject: [RHSA-2015:2561-01] Moderate: git security update Message-ID: <201512081422.tB8EMdrc019355@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: git security update Advisory ID: RHSA-2015:2561-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2561.html Issue date: 2015-12-08 ===================================================================== 1. Summary: Updated git packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. A flaw was found in the way the git-remote-ext helper processed certain URLs. If a user had Git configured to automatically clone submodules from untrusted repositories, an attacker could inject commands into the URL of a submodule, allowing them to execute arbitrary code on the user's system. (BZ#1269794) All git users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1269794 - git: arbitrary code execution via crafted URLs 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: git-1.8.3.1-6.el7.src.rpm noarch: emacs-git-1.8.3.1-6.el7.noarch.rpm emacs-git-el-1.8.3.1-6.el7.noarch.rpm git-all-1.8.3.1-6.el7.noarch.rpm git-bzr-1.8.3.1-6.el7.noarch.rpm git-cvs-1.8.3.1-6.el7.noarch.rpm git-email-1.8.3.1-6.el7.noarch.rpm git-gui-1.8.3.1-6.el7.noarch.rpm git-hg-1.8.3.1-6.el7.noarch.rpm git-p4-1.8.3.1-6.el7.noarch.rpm gitk-1.8.3.1-6.el7.noarch.rpm gitweb-1.8.3.1-6.el7.noarch.rpm perl-Git-1.8.3.1-6.el7.noarch.rpm perl-Git-SVN-1.8.3.1-6.el7.noarch.rpm x86_64: git-1.8.3.1-6.el7.x86_64.rpm git-daemon-1.8.3.1-6.el7.x86_64.rpm git-debuginfo-1.8.3.1-6.el7.x86_64.rpm git-svn-1.8.3.1-6.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: git-1.8.3.1-6.el7.src.rpm noarch: emacs-git-1.8.3.1-6.el7.noarch.rpm emacs-git-el-1.8.3.1-6.el7.noarch.rpm git-all-1.8.3.1-6.el7.noarch.rpm git-bzr-1.8.3.1-6.el7.noarch.rpm git-cvs-1.8.3.1-6.el7.noarch.rpm git-email-1.8.3.1-6.el7.noarch.rpm git-gui-1.8.3.1-6.el7.noarch.rpm git-hg-1.8.3.1-6.el7.noarch.rpm git-p4-1.8.3.1-6.el7.noarch.rpm gitk-1.8.3.1-6.el7.noarch.rpm gitweb-1.8.3.1-6.el7.noarch.rpm perl-Git-1.8.3.1-6.el7.noarch.rpm perl-Git-SVN-1.8.3.1-6.el7.noarch.rpm x86_64: git-1.8.3.1-6.el7.x86_64.rpm git-daemon-1.8.3.1-6.el7.x86_64.rpm git-debuginfo-1.8.3.1-6.el7.x86_64.rpm git-svn-1.8.3.1-6.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: git-1.8.3.1-6.el7.src.rpm aarch64: git-1.8.3.1-6.el7.aarch64.rpm git-debuginfo-1.8.3.1-6.el7.aarch64.rpm noarch: perl-Git-1.8.3.1-6.el7.noarch.rpm ppc64: git-1.8.3.1-6.el7.ppc64.rpm git-debuginfo-1.8.3.1-6.el7.ppc64.rpm ppc64le: git-1.8.3.1-6.el7.ppc64le.rpm git-debuginfo-1.8.3.1-6.el7.ppc64le.rpm s390x: git-1.8.3.1-6.el7.s390x.rpm git-debuginfo-1.8.3.1-6.el7.s390x.rpm x86_64: git-1.8.3.1-6.el7.x86_64.rpm git-debuginfo-1.8.3.1-6.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: git-daemon-1.8.3.1-6.el7.aarch64.rpm git-debuginfo-1.8.3.1-6.el7.aarch64.rpm git-svn-1.8.3.1-6.el7.aarch64.rpm noarch: emacs-git-1.8.3.1-6.el7.noarch.rpm emacs-git-el-1.8.3.1-6.el7.noarch.rpm git-all-1.8.3.1-6.el7.noarch.rpm git-bzr-1.8.3.1-6.el7.noarch.rpm git-cvs-1.8.3.1-6.el7.noarch.rpm git-email-1.8.3.1-6.el7.noarch.rpm git-gui-1.8.3.1-6.el7.noarch.rpm git-hg-1.8.3.1-6.el7.noarch.rpm git-p4-1.8.3.1-6.el7.noarch.rpm gitk-1.8.3.1-6.el7.noarch.rpm gitweb-1.8.3.1-6.el7.noarch.rpm perl-Git-SVN-1.8.3.1-6.el7.noarch.rpm ppc64: git-daemon-1.8.3.1-6.el7.ppc64.rpm git-debuginfo-1.8.3.1-6.el7.ppc64.rpm git-svn-1.8.3.1-6.el7.ppc64.rpm ppc64le: git-daemon-1.8.3.1-6.el7.ppc64le.rpm git-debuginfo-1.8.3.1-6.el7.ppc64le.rpm git-svn-1.8.3.1-6.el7.ppc64le.rpm s390x: git-daemon-1.8.3.1-6.el7.s390x.rpm git-debuginfo-1.8.3.1-6.el7.s390x.rpm git-svn-1.8.3.1-6.el7.s390x.rpm x86_64: git-daemon-1.8.3.1-6.el7.x86_64.rpm git-debuginfo-1.8.3.1-6.el7.x86_64.rpm git-svn-1.8.3.1-6.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: git-1.8.3.1-6.el7.src.rpm noarch: perl-Git-1.8.3.1-6.el7.noarch.rpm x86_64: git-1.8.3.1-6.el7.x86_64.rpm git-debuginfo-1.8.3.1-6.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: emacs-git-1.8.3.1-6.el7.noarch.rpm emacs-git-el-1.8.3.1-6.el7.noarch.rpm git-all-1.8.3.1-6.el7.noarch.rpm git-bzr-1.8.3.1-6.el7.noarch.rpm git-cvs-1.8.3.1-6.el7.noarch.rpm git-email-1.8.3.1-6.el7.noarch.rpm git-gui-1.8.3.1-6.el7.noarch.rpm git-hg-1.8.3.1-6.el7.noarch.rpm git-p4-1.8.3.1-6.el7.noarch.rpm gitk-1.8.3.1-6.el7.noarch.rpm gitweb-1.8.3.1-6.el7.noarch.rpm perl-Git-SVN-1.8.3.1-6.el7.noarch.rpm x86_64: git-daemon-1.8.3.1-6.el7.x86_64.rpm git-debuginfo-1.8.3.1-6.el7.x86_64.rpm git-svn-1.8.3.1-6.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWZueWXlSAg2UNWIIRAulyAJ9lX99986SNY1m5Pl21+l7A1kXAZQCgiP1Q 39q2g36A82edLNRBtR+x0Qg= =os7J -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 9 10:55:40 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2015 10:55:40 +0000 Subject: [RHSA-2015:2587-01] Important: kernel security, bug fix, and enhancement update Message-ID: <201512091055.tB9AteMC006940@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2015:2587-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2587.html Issue date: 2015-12-09 CVE Names: CVE-2015-2925 CVE-2015-5307 CVE-2015-7613 ===================================================================== 1. Summary: Updated kernel packages that fix three security issues, several bugs, and one enhancement are now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.1) - ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. (CVE-2015-2925, Important) * It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) is handled. A privileged user inside a guest could use this flaw to create denial of service conditions on the host kernel. (CVE-2015-5307, Important) * A race condition flaw was found in the way the Linux kernel's IPC subsystem initialized certain fields in an IPC object structure that were later used for permission checking before inserting the object into a globally visible list. A local, unprivileged user could potentially use this flaw to elevate their privileges on the system. (CVE-2015-7613, Important) Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the CVE-2015-5307 issue. This update also fixes the following bugs and adds one enhancement: * When setting up an ESP IPsec connection, the aes_ctr algorithm did not work for ESP on a Power little endian VM host. As a consequence, a kernel error was previously returned and the connection failed to be established. A set of patches has been provided to fix this bug, and aes_ctr works for ESP in the described situation as expected. (BZ#1247127) * The redistribute3() function distributed entries across 3 nodes. However, some entries were moved an incorrect way, breaking the ordering. As a result, BUG() in the dm-btree-remove.c:shift() function occurred when entries were removed from the btree. A patch has been provided to fix this bug, and redistribute3() now works as expected. (BZ#1263945) * When booting an mpt2sas adapter in a huge DDW enabled slot on Power, the kernel previously generated a warning followed by a call trace. The provided patch set enhances the Power kernel to be able to support IOMMU as a fallback for the cases where the coherent mask of the device is not suitable for direct DMA. As a result, neither the warning nor the call trace occur in this scenario. (BZ#1267133) * If the client mounted /exports and tried to execute the "chown -R" command across the entire mountpoint, a warning about a circular directory structure was previously returned because mount points all had the same inode number. A set of patches has been provided to fix this bug, and mount points are now assigned with unique inode numbers as expected. (BZ#1273239) * Due to a validation error of in-kernel MMIO tracing, a VM became previously unresponsive when connected to Red Hat Enterprise Virtualization Hypervisor. The provided patch fixes this bug by dropping the check in MMIO handler, and a VM continues running as expected. (BZ#1275149) * The NFS client could previously fail to send a CLOSE operation if the file was opened with O_WRONLY and the server restarted after the OPEN. Consequently, the server appeared in a state that could block other NFS operations from completing. The client's state flags have been modified to catch this condition and correctly CLOSE the file. (BZ#1275298) * This update sets multicast filters for multicast packets when the interface is not in promiscuous mode. This change has an impact on the RAR usage such that SR-IOV has some RARs reserved for its own usage as well. (BZ#1265091) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1209367 - CVE-2015-2925 Kernel: vfs: Do not allow escaping from bind mounts 1268270 - CVE-2015-7613 kernel: Unauthorized access to IPC objects with SysV shm 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1): Source: kernel-3.10.0-229.24.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm kernel-doc-3.10.0-229.24.2.el7.noarch.rpm x86_64: kernel-3.10.0-229.24.2.el7.x86_64.rpm kernel-debug-3.10.0-229.24.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm kernel-devel-3.10.0-229.24.2.el7.x86_64.rpm kernel-headers-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.24.2.el7.x86_64.rpm perf-3.10.0-229.24.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1): x86_64: kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.24.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm python-perf-3.10.0-229.24.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: kernel-3.10.0-229.24.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm kernel-doc-3.10.0-229.24.2.el7.noarch.rpm ppc64: kernel-3.10.0-229.24.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-229.24.2.el7.ppc64.rpm kernel-debug-3.10.0-229.24.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-229.24.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.24.2.el7.ppc64.rpm kernel-devel-3.10.0-229.24.2.el7.ppc64.rpm kernel-headers-3.10.0-229.24.2.el7.ppc64.rpm kernel-tools-3.10.0-229.24.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-229.24.2.el7.ppc64.rpm perf-3.10.0-229.24.2.el7.ppc64.rpm perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm s390x: kernel-3.10.0-229.24.2.el7.s390x.rpm kernel-debug-3.10.0-229.24.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-229.24.2.el7.s390x.rpm kernel-debug-devel-3.10.0-229.24.2.el7.s390x.rpm kernel-debuginfo-3.10.0-229.24.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.24.2.el7.s390x.rpm kernel-devel-3.10.0-229.24.2.el7.s390x.rpm kernel-headers-3.10.0-229.24.2.el7.s390x.rpm kernel-kdump-3.10.0-229.24.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.24.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-229.24.2.el7.s390x.rpm perf-3.10.0-229.24.2.el7.s390x.rpm perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm x86_64: kernel-3.10.0-229.24.2.el7.x86_64.rpm kernel-debug-3.10.0-229.24.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm kernel-devel-3.10.0-229.24.2.el7.x86_64.rpm kernel-headers-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.24.2.el7.x86_64.rpm perf-3.10.0-229.24.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64: kernel-debug-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.24.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-229.24.2.el7.ppc64.rpm perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm python-perf-3.10.0-229.24.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm s390x: kernel-debug-debuginfo-3.10.0-229.24.2.el7.s390x.rpm kernel-debuginfo-3.10.0-229.24.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.24.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.24.2.el7.s390x.rpm perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm python-perf-3.10.0-229.24.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm x86_64: kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.24.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm python-perf-3.10.0-229.24.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2925 https://access.redhat.com/security/cve/CVE-2015-5307 https://access.redhat.com/security/cve/CVE-2015-7613 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWaAiYXlSAg2UNWIIRAjb5AJ0THm670EXOpN5VXBXR0ZoN8xBr7ACePLVK BJGtx2g8OK60Hii9aeZCS3w= =GEL4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 9 10:56:17 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2015 10:56:17 +0000 Subject: [RHSA-2015:2589-01] Important: glibc security update Message-ID: <201512091056.tB9AuI6D007628@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: glibc security update Advisory ID: RHSA-2015:2589-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2589.html Issue date: 2015-12-09 CVE Names: CVE-2013-7423 CVE-2015-1472 CVE-2015-1473 CVE-2015-1781 CVE-2015-5277 ===================================================================== 1. Summary: Updated glibc packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.1) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.1) - ppc64, ppc64le, s390x, x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents). A local attacker could potentially use this flaw to execute arbitrary code on the system. (CVE-2015-5277) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) The CVE-2015-5277 issue was discovered by Sumit Bose and Luk?? Slebodn?k of Red Hat, and the CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1187109 - CVE-2013-7423 glibc: getaddrinfo() writes DNS queries to random file descriptors under high load 1188235 - CVE-2015-1472 glibc: heap buffer overflow in glibc swscanf 1199525 - CVE-2015-1781 glibc: buffer overflow in gethostbyname_r() and related functions with misaligned buffer 1209105 - CVE-2015-1473 glibc: Stack-overflow in glibc swscanf 1262914 - CVE-2015-5277 glibc: data corruption while reading the NSS files database 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1): Source: glibc-2.17-79.el7_1.src.rpm x86_64: glibc-2.17-79.el7_1.i686.rpm glibc-2.17-79.el7_1.x86_64.rpm glibc-common-2.17-79.el7_1.x86_64.rpm glibc-debuginfo-2.17-79.el7_1.i686.rpm glibc-debuginfo-2.17-79.el7_1.x86_64.rpm glibc-debuginfo-common-2.17-79.el7_1.i686.rpm glibc-debuginfo-common-2.17-79.el7_1.x86_64.rpm glibc-devel-2.17-79.el7_1.i686.rpm glibc-devel-2.17-79.el7_1.x86_64.rpm glibc-headers-2.17-79.el7_1.x86_64.rpm glibc-utils-2.17-79.el7_1.x86_64.rpm nscd-2.17-79.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1): x86_64: glibc-debuginfo-2.17-79.el7_1.i686.rpm glibc-debuginfo-2.17-79.el7_1.x86_64.rpm glibc-debuginfo-common-2.17-79.el7_1.i686.rpm glibc-debuginfo-common-2.17-79.el7_1.x86_64.rpm glibc-static-2.17-79.el7_1.i686.rpm glibc-static-2.17-79.el7_1.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: glibc-2.17-79.el7_1.src.rpm ppc64: glibc-2.17-79.el7_1.ppc.rpm glibc-2.17-79.el7_1.ppc64.rpm glibc-common-2.17-79.el7_1.ppc64.rpm glibc-debuginfo-2.17-79.el7_1.ppc.rpm glibc-debuginfo-2.17-79.el7_1.ppc64.rpm glibc-debuginfo-common-2.17-79.el7_1.ppc.rpm glibc-debuginfo-common-2.17-79.el7_1.ppc64.rpm glibc-devel-2.17-79.el7_1.ppc.rpm glibc-devel-2.17-79.el7_1.ppc64.rpm glibc-headers-2.17-79.el7_1.ppc64.rpm glibc-utils-2.17-79.el7_1.ppc64.rpm nscd-2.17-79.el7_1.ppc64.rpm s390x: glibc-2.17-79.el7_1.s390.rpm glibc-2.17-79.el7_1.s390x.rpm glibc-common-2.17-79.el7_1.s390x.rpm glibc-debuginfo-2.17-79.el7_1.s390.rpm glibc-debuginfo-2.17-79.el7_1.s390x.rpm glibc-debuginfo-common-2.17-79.el7_1.s390.rpm glibc-debuginfo-common-2.17-79.el7_1.s390x.rpm glibc-devel-2.17-79.el7_1.s390.rpm glibc-devel-2.17-79.el7_1.s390x.rpm glibc-headers-2.17-79.el7_1.s390x.rpm glibc-utils-2.17-79.el7_1.s390x.rpm nscd-2.17-79.el7_1.s390x.rpm x86_64: glibc-2.17-79.el7_1.i686.rpm glibc-2.17-79.el7_1.x86_64.rpm glibc-common-2.17-79.el7_1.x86_64.rpm glibc-debuginfo-2.17-79.el7_1.i686.rpm glibc-debuginfo-2.17-79.el7_1.x86_64.rpm glibc-debuginfo-common-2.17-79.el7_1.i686.rpm glibc-debuginfo-common-2.17-79.el7_1.x86_64.rpm glibc-devel-2.17-79.el7_1.i686.rpm glibc-devel-2.17-79.el7_1.x86_64.rpm glibc-headers-2.17-79.el7_1.x86_64.rpm glibc-utils-2.17-79.el7_1.x86_64.rpm nscd-2.17-79.el7_1.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: glibc-2.17-79.ael7b_1.src.rpm ppc64le: glibc-2.17-79.ael7b_1.ppc64le.rpm glibc-common-2.17-79.ael7b_1.ppc64le.rpm glibc-debuginfo-2.17-79.ael7b_1.ppc64le.rpm glibc-debuginfo-common-2.17-79.ael7b_1.ppc64le.rpm glibc-devel-2.17-79.ael7b_1.ppc64le.rpm glibc-headers-2.17-79.ael7b_1.ppc64le.rpm glibc-utils-2.17-79.ael7b_1.ppc64le.rpm nscd-2.17-79.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64: glibc-debuginfo-2.17-79.el7_1.ppc.rpm glibc-debuginfo-2.17-79.el7_1.ppc64.rpm glibc-debuginfo-common-2.17-79.el7_1.ppc.rpm glibc-debuginfo-common-2.17-79.el7_1.ppc64.rpm glibc-static-2.17-79.el7_1.ppc.rpm glibc-static-2.17-79.el7_1.ppc64.rpm s390x: glibc-debuginfo-2.17-79.el7_1.s390.rpm glibc-debuginfo-2.17-79.el7_1.s390x.rpm glibc-debuginfo-common-2.17-79.el7_1.s390.rpm glibc-debuginfo-common-2.17-79.el7_1.s390x.rpm glibc-static-2.17-79.el7_1.s390.rpm glibc-static-2.17-79.el7_1.s390x.rpm x86_64: glibc-debuginfo-2.17-79.el7_1.i686.rpm glibc-debuginfo-2.17-79.el7_1.x86_64.rpm glibc-debuginfo-common-2.17-79.el7_1.i686.rpm glibc-debuginfo-common-2.17-79.el7_1.x86_64.rpm glibc-static-2.17-79.el7_1.i686.rpm glibc-static-2.17-79.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64le: glibc-debuginfo-2.17-79.ael7b_1.ppc64le.rpm glibc-debuginfo-common-2.17-79.ael7b_1.ppc64le.rpm glibc-static-2.17-79.ael7b_1.ppc64le.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2013-7423 https://access.redhat.com/security/cve/CVE-2015-1472 https://access.redhat.com/security/cve/CVE-2015-1473 https://access.redhat.com/security/cve/CVE-2015-1781 https://access.redhat.com/security/cve/CVE-2015-5277 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWaAjFXlSAg2UNWIIRAqokAKC0aLqDf57HbtwD3FAwRH36DkG2bwCgpiHu dnRSyot5nK1GdxiUPgMF99E= =aoOW -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 9 15:05:48 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2015 10:05:48 -0500 Subject: [RHSA-2015:2593-01] Critical: flash-plugin security update Message-ID: <201512091505.tB9F5m16012511@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:2593-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2593.html Issue date: 2015-12-09 CVE Names: CVE-2015-8045 CVE-2015-8047 CVE-2015-8048 CVE-2015-8049 CVE-2015-8050 CVE-2015-8055 CVE-2015-8056 CVE-2015-8057 CVE-2015-8058 CVE-2015-8059 CVE-2015-8060 CVE-2015-8061 CVE-2015-8062 CVE-2015-8063 CVE-2015-8064 CVE-2015-8065 CVE-2015-8066 CVE-2015-8067 CVE-2015-8068 CVE-2015-8069 CVE-2015-8070 CVE-2015-8071 CVE-2015-8401 CVE-2015-8402 CVE-2015-8403 CVE-2015-8404 CVE-2015-8405 CVE-2015-8406 CVE-2015-8407 CVE-2015-8408 CVE-2015-8409 CVE-2015-8410 CVE-2015-8411 CVE-2015-8412 CVE-2015-8413 CVE-2015-8414 CVE-2015-8415 CVE-2015-8416 CVE-2015-8417 CVE-2015-8418 CVE-2015-8419 CVE-2015-8420 CVE-2015-8421 CVE-2015-8422 CVE-2015-8423 CVE-2015-8424 CVE-2015-8425 CVE-2015-8426 CVE-2015-8427 CVE-2015-8428 CVE-2015-8429 CVE-2015-8430 CVE-2015-8431 CVE-2015-8432 CVE-2015-8433 CVE-2015-8434 CVE-2015-8435 CVE-2015-8436 CVE-2015-8437 CVE-2015-8438 CVE-2015-8439 CVE-2015-8440 CVE-2015-8441 CVE-2015-8442 CVE-2015-8443 CVE-2015-8444 CVE-2015-8445 CVE-2015-8446 CVE-2015-8447 CVE-2015-8448 CVE-2015-8449 CVE-2015-8450 CVE-2015-8451 CVE-2015-8452 CVE-2015-8453 CVE-2015-8454 CVE-2015-8455 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-32 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, CVE-2015-8452, CVE-2015-8453, CVE-2015-8454, CVE-2015-8455) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.554. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1289771 - flash-plugin: multiple code execution issues fixed in APSB15-32 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.554-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.554-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.554-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.554-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.554-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.554-1.el6_7.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.554-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.554-1.el6_7.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.554-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.554-1.el6_7.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8045 https://access.redhat.com/security/cve/CVE-2015-8047 https://access.redhat.com/security/cve/CVE-2015-8048 https://access.redhat.com/security/cve/CVE-2015-8049 https://access.redhat.com/security/cve/CVE-2015-8050 https://access.redhat.com/security/cve/CVE-2015-8055 https://access.redhat.com/security/cve/CVE-2015-8056 https://access.redhat.com/security/cve/CVE-2015-8057 https://access.redhat.com/security/cve/CVE-2015-8058 https://access.redhat.com/security/cve/CVE-2015-8059 https://access.redhat.com/security/cve/CVE-2015-8060 https://access.redhat.com/security/cve/CVE-2015-8061 https://access.redhat.com/security/cve/CVE-2015-8062 https://access.redhat.com/security/cve/CVE-2015-8063 https://access.redhat.com/security/cve/CVE-2015-8064 https://access.redhat.com/security/cve/CVE-2015-8065 https://access.redhat.com/security/cve/CVE-2015-8066 https://access.redhat.com/security/cve/CVE-2015-8067 https://access.redhat.com/security/cve/CVE-2015-8068 https://access.redhat.com/security/cve/CVE-2015-8069 https://access.redhat.com/security/cve/CVE-2015-8070 https://access.redhat.com/security/cve/CVE-2015-8071 https://access.redhat.com/security/cve/CVE-2015-8401 https://access.redhat.com/security/cve/CVE-2015-8402 https://access.redhat.com/security/cve/CVE-2015-8403 https://access.redhat.com/security/cve/CVE-2015-8404 https://access.redhat.com/security/cve/CVE-2015-8405 https://access.redhat.com/security/cve/CVE-2015-8406 https://access.redhat.com/security/cve/CVE-2015-8407 https://access.redhat.com/security/cve/CVE-2015-8408 https://access.redhat.com/security/cve/CVE-2015-8409 https://access.redhat.com/security/cve/CVE-2015-8410 https://access.redhat.com/security/cve/CVE-2015-8411 https://access.redhat.com/security/cve/CVE-2015-8412 https://access.redhat.com/security/cve/CVE-2015-8413 https://access.redhat.com/security/cve/CVE-2015-8414 https://access.redhat.com/security/cve/CVE-2015-8415 https://access.redhat.com/security/cve/CVE-2015-8416 https://access.redhat.com/security/cve/CVE-2015-8417 https://access.redhat.com/security/cve/CVE-2015-8418 https://access.redhat.com/security/cve/CVE-2015-8419 https://access.redhat.com/security/cve/CVE-2015-8420 https://access.redhat.com/security/cve/CVE-2015-8421 https://access.redhat.com/security/cve/CVE-2015-8422 https://access.redhat.com/security/cve/CVE-2015-8423 https://access.redhat.com/security/cve/CVE-2015-8424 https://access.redhat.com/security/cve/CVE-2015-8425 https://access.redhat.com/security/cve/CVE-2015-8426 https://access.redhat.com/security/cve/CVE-2015-8427 https://access.redhat.com/security/cve/CVE-2015-8428 https://access.redhat.com/security/cve/CVE-2015-8429 https://access.redhat.com/security/cve/CVE-2015-8430 https://access.redhat.com/security/cve/CVE-2015-8431 https://access.redhat.com/security/cve/CVE-2015-8432 https://access.redhat.com/security/cve/CVE-2015-8433 https://access.redhat.com/security/cve/CVE-2015-8434 https://access.redhat.com/security/cve/CVE-2015-8435 https://access.redhat.com/security/cve/CVE-2015-8436 https://access.redhat.com/security/cve/CVE-2015-8437 https://access.redhat.com/security/cve/CVE-2015-8438 https://access.redhat.com/security/cve/CVE-2015-8439 https://access.redhat.com/security/cve/CVE-2015-8440 https://access.redhat.com/security/cve/CVE-2015-8441 https://access.redhat.com/security/cve/CVE-2015-8442 https://access.redhat.com/security/cve/CVE-2015-8443 https://access.redhat.com/security/cve/CVE-2015-8444 https://access.redhat.com/security/cve/CVE-2015-8445 https://access.redhat.com/security/cve/CVE-2015-8446 https://access.redhat.com/security/cve/CVE-2015-8447 https://access.redhat.com/security/cve/CVE-2015-8448 https://access.redhat.com/security/cve/CVE-2015-8449 https://access.redhat.com/security/cve/CVE-2015-8450 https://access.redhat.com/security/cve/CVE-2015-8451 https://access.redhat.com/security/cve/CVE-2015-8452 https://access.redhat.com/security/cve/CVE-2015-8453 https://access.redhat.com/security/cve/CVE-2015-8454 https://access.redhat.com/security/cve/CVE-2015-8455 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-32.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWaENJXlSAg2UNWIIRAtkVAJ9TAB/2ASL2cAlYuNBSDdOpZX3MSQCgmAp9 gPFtp7mQPYNi39FJVnh0tCk= =TBaH -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 9 15:06:22 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2015 10:06:22 -0500 Subject: [RHSA-2015:2594-01] Moderate: libpng security update Message-ID: <201512091506.tB9F6MWb030412@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libpng security update Advisory ID: RHSA-2015:2594-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2594.html Issue date: 2015-12-09 CVE Names: CVE-2015-7981 CVE-2015-8126 CVE-2015-8472 ===================================================================== 1. Summary: Updated libpng packages that fix three security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472) An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-7981) All libpng users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123 1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libpng-1.2.49-2.el6_7.src.rpm i386: libpng-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm x86_64: libpng-1.2.49-2.el6_7.i686.rpm libpng-1.2.49-2.el6_7.x86_64.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm libpng-static-1.2.49-2.el6_7.i686.rpm x86_64: libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.x86_64.rpm libpng-static-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: libpng-1.2.49-2.el6_7.src.rpm x86_64: libpng-1.2.49-2.el6_7.i686.rpm libpng-1.2.49-2.el6_7.x86_64.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.x86_64.rpm libpng-static-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libpng-1.2.49-2.el6_7.src.rpm i386: libpng-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm ppc64: libpng-1.2.49-2.el6_7.ppc.rpm libpng-1.2.49-2.el6_7.ppc64.rpm libpng-debuginfo-1.2.49-2.el6_7.ppc.rpm libpng-debuginfo-1.2.49-2.el6_7.ppc64.rpm libpng-devel-1.2.49-2.el6_7.ppc.rpm libpng-devel-1.2.49-2.el6_7.ppc64.rpm s390x: libpng-1.2.49-2.el6_7.s390.rpm libpng-1.2.49-2.el6_7.s390x.rpm libpng-debuginfo-1.2.49-2.el6_7.s390.rpm libpng-debuginfo-1.2.49-2.el6_7.s390x.rpm libpng-devel-1.2.49-2.el6_7.s390.rpm libpng-devel-1.2.49-2.el6_7.s390x.rpm x86_64: libpng-1.2.49-2.el6_7.i686.rpm libpng-1.2.49-2.el6_7.x86_64.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-static-1.2.49-2.el6_7.i686.rpm ppc64: libpng-debuginfo-1.2.49-2.el6_7.ppc64.rpm libpng-static-1.2.49-2.el6_7.ppc64.rpm s390x: libpng-debuginfo-1.2.49-2.el6_7.s390x.rpm libpng-static-1.2.49-2.el6_7.s390x.rpm x86_64: libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm libpng-static-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libpng-1.2.49-2.el6_7.src.rpm i386: libpng-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm x86_64: libpng-1.2.49-2.el6_7.i686.rpm libpng-1.2.49-2.el6_7.x86_64.rpm libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm libpng-devel-1.2.49-2.el6_7.i686.rpm libpng-devel-1.2.49-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libpng-debuginfo-1.2.49-2.el6_7.i686.rpm libpng-static-1.2.49-2.el6_7.i686.rpm x86_64: libpng-debuginfo-1.2.49-2.el6_7.x86_64.rpm libpng-static-1.2.49-2.el6_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7981 https://access.redhat.com/security/cve/CVE-2015-8126 https://access.redhat.com/security/cve/CVE-2015-8472 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWaENsXlSAg2UNWIIRAoUpAJ9Nlo47EQRO6dLZCmTorScK3JsMfACdF3ZW 1H8Hq0Bx4u9dJmTNDBAMHS8= =fXjS -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 9 15:07:04 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2015 10:07:04 -0500 Subject: [RHSA-2015:2595-01] Moderate: libpng12 security update Message-ID: <201512091507.tB9F74hm028519@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libpng12 security update Advisory ID: RHSA-2015:2595-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2595.html Issue date: 2015-12-09 CVE Names: CVE-2015-7981 CVE-2015-8126 CVE-2015-8472 ===================================================================== 1. Summary: Updated libpng12 packages that fix three security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libpng12 packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472) An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-7981) All libpng12 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123 1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libpng12-1.2.50-7.el7_2.src.rpm x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libpng12-1.2.50-7.el7_2.src.rpm x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libpng12-1.2.50-7.el7_2.src.rpm aarch64: libpng12-1.2.50-7.el7_2.aarch64.rpm libpng12-debuginfo-1.2.50-7.el7_2.aarch64.rpm ppc64: libpng12-1.2.50-7.el7_2.ppc.rpm libpng12-1.2.50-7.el7_2.ppc64.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc64.rpm ppc64le: libpng12-1.2.50-7.el7_2.ppc64le.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc64le.rpm s390x: libpng12-1.2.50-7.el7_2.s390.rpm libpng12-1.2.50-7.el7_2.s390x.rpm libpng12-debuginfo-1.2.50-7.el7_2.s390.rpm libpng12-debuginfo-1.2.50-7.el7_2.s390x.rpm x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: libpng12-debuginfo-1.2.50-7.el7_2.aarch64.rpm libpng12-devel-1.2.50-7.el7_2.aarch64.rpm ppc64: libpng12-debuginfo-1.2.50-7.el7_2.ppc.rpm libpng12-debuginfo-1.2.50-7.el7_2.ppc64.rpm libpng12-devel-1.2.50-7.el7_2.ppc.rpm libpng12-devel-1.2.50-7.el7_2.ppc64.rpm ppc64le: libpng12-debuginfo-1.2.50-7.el7_2.ppc64le.rpm libpng12-devel-1.2.50-7.el7_2.ppc64le.rpm s390x: libpng12-debuginfo-1.2.50-7.el7_2.s390.rpm libpng12-debuginfo-1.2.50-7.el7_2.s390x.rpm libpng12-devel-1.2.50-7.el7_2.s390.rpm libpng12-devel-1.2.50-7.el7_2.s390x.rpm x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libpng12-1.2.50-7.el7_2.src.rpm x86_64: libpng12-1.2.50-7.el7_2.i686.rpm libpng12-1.2.50-7.el7_2.x86_64.rpm libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libpng12-debuginfo-1.2.50-7.el7_2.i686.rpm libpng12-debuginfo-1.2.50-7.el7_2.x86_64.rpm libpng12-devel-1.2.50-7.el7_2.i686.rpm libpng12-devel-1.2.50-7.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7981 https://access.redhat.com/security/cve/CVE-2015-8126 https://access.redhat.com/security/cve/CVE-2015-8472 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD4DBQFWaEOWXlSAg2UNWIIRArqQAJiXHpRTjePlByUwb2yeLtnA6ZHDAJ483rVP N/LWwsGEwId3XWZYVPOUSQ== =s2GT -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 9 15:07:45 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2015 10:07:45 -0500 Subject: [RHSA-2015:2596-01] Moderate: libpng security update Message-ID: <201512091507.tB9F7jHo006866@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libpng security update Advisory ID: RHSA-2015:2596-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2596.html Issue date: 2015-12-09 CVE Names: CVE-2015-8126 CVE-2015-8472 ===================================================================== 1. Summary: Updated libpng packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472) All libpng users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libpng-1.5.13-7.el7_2.src.rpm x86_64: libpng-1.5.13-7.el7_2.i686.rpm libpng-1.5.13-7.el7_2.x86_64.rpm libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm libpng-devel-1.5.13-7.el7_2.i686.rpm libpng-devel-1.5.13-7.el7_2.x86_64.rpm libpng-static-1.5.13-7.el7_2.i686.rpm libpng-static-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libpng-1.5.13-7.el7_2.src.rpm x86_64: libpng-1.5.13-7.el7_2.i686.rpm libpng-1.5.13-7.el7_2.x86_64.rpm libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm libpng-devel-1.5.13-7.el7_2.i686.rpm libpng-devel-1.5.13-7.el7_2.x86_64.rpm libpng-static-1.5.13-7.el7_2.i686.rpm libpng-static-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libpng-1.5.13-7.el7_2.src.rpm aarch64: libpng-1.5.13-7.el7_2.aarch64.rpm libpng-debuginfo-1.5.13-7.el7_2.aarch64.rpm libpng-devel-1.5.13-7.el7_2.aarch64.rpm ppc64: libpng-1.5.13-7.el7_2.ppc.rpm libpng-1.5.13-7.el7_2.ppc64.rpm libpng-debuginfo-1.5.13-7.el7_2.ppc.rpm libpng-debuginfo-1.5.13-7.el7_2.ppc64.rpm libpng-devel-1.5.13-7.el7_2.ppc.rpm libpng-devel-1.5.13-7.el7_2.ppc64.rpm ppc64le: libpng-1.5.13-7.el7_2.ppc64le.rpm libpng-debuginfo-1.5.13-7.el7_2.ppc64le.rpm libpng-devel-1.5.13-7.el7_2.ppc64le.rpm s390x: libpng-1.5.13-7.el7_2.s390.rpm libpng-1.5.13-7.el7_2.s390x.rpm libpng-debuginfo-1.5.13-7.el7_2.s390.rpm libpng-debuginfo-1.5.13-7.el7_2.s390x.rpm libpng-devel-1.5.13-7.el7_2.s390.rpm libpng-devel-1.5.13-7.el7_2.s390x.rpm x86_64: libpng-1.5.13-7.el7_2.i686.rpm libpng-1.5.13-7.el7_2.x86_64.rpm libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm libpng-devel-1.5.13-7.el7_2.i686.rpm libpng-devel-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: libpng-debuginfo-1.5.13-7.el7_2.aarch64.rpm libpng-static-1.5.13-7.el7_2.aarch64.rpm ppc64: libpng-debuginfo-1.5.13-7.el7_2.ppc.rpm libpng-debuginfo-1.5.13-7.el7_2.ppc64.rpm libpng-static-1.5.13-7.el7_2.ppc.rpm libpng-static-1.5.13-7.el7_2.ppc64.rpm ppc64le: libpng-debuginfo-1.5.13-7.el7_2.ppc64le.rpm libpng-static-1.5.13-7.el7_2.ppc64le.rpm s390x: libpng-debuginfo-1.5.13-7.el7_2.s390.rpm libpng-debuginfo-1.5.13-7.el7_2.s390x.rpm libpng-static-1.5.13-7.el7_2.s390.rpm libpng-static-1.5.13-7.el7_2.s390x.rpm x86_64: libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm libpng-static-1.5.13-7.el7_2.i686.rpm libpng-static-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libpng-1.5.13-7.el7_2.src.rpm x86_64: libpng-1.5.13-7.el7_2.i686.rpm libpng-1.5.13-7.el7_2.x86_64.rpm libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm libpng-devel-1.5.13-7.el7_2.i686.rpm libpng-devel-1.5.13-7.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libpng-debuginfo-1.5.13-7.el7_2.i686.rpm libpng-debuginfo-1.5.13-7.el7_2.x86_64.rpm libpng-static-1.5.13-7.el7_2.i686.rpm libpng-static-1.5.13-7.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8126 https://access.redhat.com/security/cve/CVE-2015-8472 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWaEO+XlSAg2UNWIIRAiT3AJ9UqVAqlU3tjN2lrGLhYTykTrADpgCePUPw 9m4P/DuBS5LXho4OHaQPYhg= =nfXV -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 10 20:33:37 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 10 Dec 2015 20:33:37 +0000 Subject: [RHSA-2015:2615-01] Moderate: openshift security update Message-ID: <201512102033.tBAKXbPB022030@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openshift security update Advisory ID: RHSA-2015:2615-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2615.html Issue date: 2015-12-10 CVE Names: CVE-2015-7528 ===================================================================== 1. Summary: Updated openshift images that fix one security issue are now available for Red Hat OpenShift Enterprise 3.0 and 3.1. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. It was found that OpenShift's API back end did not verify requests for pod log locations, allowing a pod on a Node to request logs for any other pod on that Node. A remote attacker could use this flaw to view sensitive information via pod logs that they would normally not have access to. (CVE-2015-7528) This issue was discovered by Jordan Liggitt of Red Hat Atomic OpenShift. To use the latest 'openshift3/ose:v3.1.0.4' image with the ID "d4caa301790e" simply run the following command: docker pull registry.access.redhat.com/openshift3/ose:v3.1.0.4 and then restart any containers based on this image. All OpenShift Enterprise 3.0 and 3.1 users are advised to upgrade to these updated images, which correct this issue. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 1286745 - CVE-2015-7528 OpenShift: pod log location must validate container if provided 5. References: https://access.redhat.com/security/cve/CVE-2015-7528 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWaeEbXlSAg2UNWIIRAurKAJ9J+Xgb+G0wfwATRYo+o7gP6oqcwACfY+Fd Uuex8gkcpQSID/2IhxVPDJ8= =8/s8 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 14 05:55:35 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 14 Dec 2015 05:55:35 +0000 Subject: [RHSA-2015:2616-01] Moderate: openssl security update Message-ID: <201512140555.tBE5taYA023462@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:2616-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2616.html Issue date: 2015-12-14 CVE Names: CVE-2015-3195 ===================================================================== 1. Summary: Updated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) All openssl users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: openssl-0.9.8e-37.el5_11.src.rpm i386: openssl-0.9.8e-37.el5_11.i386.rpm openssl-0.9.8e-37.el5_11.i686.rpm openssl-debuginfo-0.9.8e-37.el5_11.i386.rpm openssl-debuginfo-0.9.8e-37.el5_11.i686.rpm openssl-perl-0.9.8e-37.el5_11.i386.rpm x86_64: openssl-0.9.8e-37.el5_11.i686.rpm openssl-0.9.8e-37.el5_11.x86_64.rpm openssl-debuginfo-0.9.8e-37.el5_11.i686.rpm openssl-debuginfo-0.9.8e-37.el5_11.x86_64.rpm openssl-perl-0.9.8e-37.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: openssl-0.9.8e-37.el5_11.src.rpm i386: openssl-debuginfo-0.9.8e-37.el5_11.i386.rpm openssl-devel-0.9.8e-37.el5_11.i386.rpm x86_64: openssl-debuginfo-0.9.8e-37.el5_11.i386.rpm openssl-debuginfo-0.9.8e-37.el5_11.x86_64.rpm openssl-devel-0.9.8e-37.el5_11.i386.rpm openssl-devel-0.9.8e-37.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: openssl-0.9.8e-37.el5_11.src.rpm i386: openssl-0.9.8e-37.el5_11.i386.rpm openssl-0.9.8e-37.el5_11.i686.rpm openssl-debuginfo-0.9.8e-37.el5_11.i386.rpm openssl-debuginfo-0.9.8e-37.el5_11.i686.rpm openssl-devel-0.9.8e-37.el5_11.i386.rpm openssl-perl-0.9.8e-37.el5_11.i386.rpm ia64: openssl-0.9.8e-37.el5_11.i686.rpm openssl-0.9.8e-37.el5_11.ia64.rpm openssl-debuginfo-0.9.8e-37.el5_11.i686.rpm openssl-debuginfo-0.9.8e-37.el5_11.ia64.rpm openssl-devel-0.9.8e-37.el5_11.ia64.rpm openssl-perl-0.9.8e-37.el5_11.ia64.rpm ppc: openssl-0.9.8e-37.el5_11.ppc.rpm openssl-0.9.8e-37.el5_11.ppc64.rpm openssl-debuginfo-0.9.8e-37.el5_11.ppc.rpm openssl-debuginfo-0.9.8e-37.el5_11.ppc64.rpm openssl-devel-0.9.8e-37.el5_11.ppc.rpm openssl-devel-0.9.8e-37.el5_11.ppc64.rpm openssl-perl-0.9.8e-37.el5_11.ppc.rpm s390x: openssl-0.9.8e-37.el5_11.s390.rpm openssl-0.9.8e-37.el5_11.s390x.rpm openssl-debuginfo-0.9.8e-37.el5_11.s390.rpm openssl-debuginfo-0.9.8e-37.el5_11.s390x.rpm openssl-devel-0.9.8e-37.el5_11.s390.rpm openssl-devel-0.9.8e-37.el5_11.s390x.rpm openssl-perl-0.9.8e-37.el5_11.s390x.rpm x86_64: openssl-0.9.8e-37.el5_11.i686.rpm openssl-0.9.8e-37.el5_11.x86_64.rpm openssl-debuginfo-0.9.8e-37.el5_11.i386.rpm openssl-debuginfo-0.9.8e-37.el5_11.i686.rpm openssl-debuginfo-0.9.8e-37.el5_11.x86_64.rpm openssl-devel-0.9.8e-37.el5_11.i386.rpm openssl-devel-0.9.8e-37.el5_11.x86_64.rpm openssl-perl-0.9.8e-37.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3195 https://access.redhat.com/security/updates/classification/#moderate https://openssl.org/news/secadv/20151203.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWblnTXlSAg2UNWIIRAi/hAKCw+f7z3qLmWP016hz49paDRMzwlQCguU6s 5saH2Ao0lyKFFFuT/YWRyLw= =n/6M -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 14 05:57:00 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 14 Dec 2015 05:57:00 +0000 Subject: [RHSA-2015:2617-01] Moderate: openssl security update Message-ID: <201512140557.tBE5v0MR029100@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:2617-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2617.html Issue date: 2015-12-14 CVE Names: CVE-2015-3194 CVE-2015-3195 CVE-2015-3196 ===================================================================== 1. Summary: Updated openssl packages that fix three security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. (CVE-2015-3194) A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. (CVE-2015-3196) All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1288320 - CVE-2015-3194 OpenSSL: Certificate verify crash with missing PSS parameter 1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak 1288326 - CVE-2015-3196 OpenSSL: Race condition handling PSK identify hint 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-42.el6_7.1.src.rpm i386: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm x86_64: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm openssl-perl-1.0.1e-42.el6_7.1.i686.rpm openssl-static-1.0.1e-42.el6_7.1.i686.rpm x86_64: openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-static-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-42.el6_7.1.src.rpm x86_64: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-static-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-42.el6_7.1.src.rpm i386: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm ppc64: openssl-1.0.1e-42.el6_7.1.ppc.rpm openssl-1.0.1e-42.el6_7.1.ppc64.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.ppc.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.ppc64.rpm openssl-devel-1.0.1e-42.el6_7.1.ppc.rpm openssl-devel-1.0.1e-42.el6_7.1.ppc64.rpm s390x: openssl-1.0.1e-42.el6_7.1.s390.rpm openssl-1.0.1e-42.el6_7.1.s390x.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.s390.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.s390x.rpm openssl-devel-1.0.1e-42.el6_7.1.s390.rpm openssl-devel-1.0.1e-42.el6_7.1.s390x.rpm x86_64: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-perl-1.0.1e-42.el6_7.1.i686.rpm openssl-static-1.0.1e-42.el6_7.1.i686.rpm ppc64: openssl-debuginfo-1.0.1e-42.el6_7.1.ppc64.rpm openssl-perl-1.0.1e-42.el6_7.1.ppc64.rpm openssl-static-1.0.1e-42.el6_7.1.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-42.el6_7.1.s390x.rpm openssl-perl-1.0.1e-42.el6_7.1.s390x.rpm openssl-static-1.0.1e-42.el6_7.1.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-static-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-42.el6_7.1.src.rpm i386: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm x86_64: openssl-1.0.1e-42.el6_7.1.i686.rpm openssl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.1.i686.rpm openssl-devel-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-42.el6_7.1.i686.rpm openssl-perl-1.0.1e-42.el6_7.1.i686.rpm openssl-static-1.0.1e-42.el6_7.1.i686.rpm x86_64: openssl-debuginfo-1.0.1e-42.el6_7.1.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.1.x86_64.rpm openssl-static-1.0.1e-42.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.1e-51.el7_2.1.src.rpm x86_64: openssl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.1.i686.rpm openssl-libs-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.1.i686.rpm openssl-devel-1.0.1e-51.el7_2.1.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-static-1.0.1e-51.el7_2.1.i686.rpm openssl-static-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.1e-51.el7_2.1.src.rpm x86_64: openssl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.1.i686.rpm openssl-libs-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.1.i686.rpm openssl-devel-1.0.1e-51.el7_2.1.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-static-1.0.1e-51.el7_2.1.i686.rpm openssl-static-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-51.el7_2.1.src.rpm aarch64: openssl-1.0.1e-51.el7_2.1.aarch64.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.aarch64.rpm openssl-devel-1.0.1e-51.el7_2.1.aarch64.rpm openssl-libs-1.0.1e-51.el7_2.1.aarch64.rpm ppc64: openssl-1.0.1e-51.el7_2.1.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.1.ppc.rpm openssl-devel-1.0.1e-51.el7_2.1.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.1.ppc.rpm openssl-libs-1.0.1e-51.el7_2.1.ppc64.rpm ppc64le: openssl-1.0.1e-51.el7_2.1.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.1.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.1.ppc64le.rpm s390x: openssl-1.0.1e-51.el7_2.1.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.s390x.rpm openssl-devel-1.0.1e-51.el7_2.1.s390.rpm openssl-devel-1.0.1e-51.el7_2.1.s390x.rpm openssl-libs-1.0.1e-51.el7_2.1.s390.rpm openssl-libs-1.0.1e-51.el7_2.1.s390x.rpm x86_64: openssl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.1.i686.rpm openssl-devel-1.0.1e-51.el7_2.1.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.1.i686.rpm openssl-libs-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: openssl-debuginfo-1.0.1e-51.el7_2.1.aarch64.rpm openssl-perl-1.0.1e-51.el7_2.1.aarch64.rpm openssl-static-1.0.1e-51.el7_2.1.aarch64.rpm ppc64: openssl-debuginfo-1.0.1e-51.el7_2.1.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.1.ppc64.rpm openssl-static-1.0.1e-51.el7_2.1.ppc.rpm openssl-static-1.0.1e-51.el7_2.1.ppc64.rpm ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.1.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.1.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.1.ppc64le.rpm s390x: openssl-debuginfo-1.0.1e-51.el7_2.1.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.s390x.rpm openssl-perl-1.0.1e-51.el7_2.1.s390x.rpm openssl-static-1.0.1e-51.el7_2.1.s390.rpm openssl-static-1.0.1e-51.el7_2.1.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-static-1.0.1e-51.el7_2.1.i686.rpm openssl-static-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.1e-51.el7_2.1.src.rpm x86_64: openssl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.1.i686.rpm openssl-devel-1.0.1e-51.el7_2.1.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.1.i686.rpm openssl-libs-1.0.1e-51.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.1.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.1.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.1.x86_64.rpm openssl-static-1.0.1e-51.el7_2.1.i686.rpm openssl-static-1.0.1e-51.el7_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3194 https://access.redhat.com/security/cve/CVE-2015-3195 https://access.redhat.com/security/cve/CVE-2015-3196 https://access.redhat.com/security/updates/classification/#moderate https://openssl.org/news/secadv/20151203.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWblodXlSAg2UNWIIRAt6yAKCw1yHbcUPDEPeokS22dMKyo6YFsQCgmPe4 dpIS/iR9oiOKMXJY5t447ME= =qvLr -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 14 06:01:41 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 14 Dec 2015 06:01:41 +0000 Subject: [RHSA-2015:2618-01] Important: chromium-browser security update Message-ID: <201512140601.tBE61fRJ026504@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2015:2618-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2618.html Issue date: 2015-12-14 CVE Names: CVE-2015-6788 CVE-2015-6789 CVE-2015-6790 CVE-2015-6791 ===================================================================== 1. Summary: Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2015-6788, CVE-2015-6789, CVE-2015-6790, CVE-2015-6791) All Chromium users should upgrade to these updated packages, which contain Chromium version 47.0.2526.80, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1289870 - CVE-2015-6788 chromium-browser: Type confusion in extensions 1289874 - CVE-2015-6789 chromium-browser: Use-after free in Blink 1289875 - CVE-2015-6790 chromium-browser: Escaping issue in saved pages 1289876 - CVE-2015-6791 chromium-browser: Various fixes from internal audits, fuzzing and other initiatives 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-47.0.2526.80-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.80-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.80-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.80-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-47.0.2526.80-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.80-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.80-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.80-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-47.0.2526.80-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.80-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.80-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.80-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-6788 https://access.redhat.com/security/cve/CVE-2015-6789 https://access.redhat.com/security/cve/CVE-2015-6790 https://access.redhat.com/security/cve/CVE-2015-6791 https://access.redhat.com/security/updates/classification/#important http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWblpFXlSAg2UNWIIRAuG/AJ9y8EMkJV6MUtPEtVCd/90y+0uFawCgttyO sa8paIgKMxr1XiCWKzXUORg= =41lQ -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 14 06:03:49 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 14 Dec 2015 06:03:49 +0000 Subject: [RHSA-2015:2619-01] Moderate: libreoffice security update Message-ID: <201512140603.tBE63nFi032184@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libreoffice security update Advisory ID: RHSA-2015:2619-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2619.html Issue date: 2015-12-14 CVE Names: CVE-2015-4551 CVE-2015-5212 CVE-2015-5213 CVE-2015-5214 ===================================================================== 1. Summary: Updated libreoffice packages that fixes multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. It was discovered that LibreOffice did not properly restrict automatic link updates. By tricking a victim into opening specially crafted documents, an attacker could possibly use this flaw to disclose contents of files accessible by the victim. (CVE-2015-4551) An integer underflow flaw leading to a heap-based buffer overflow when parsing PrinterSetup data was discovered. By tricking a user into opening a specially crafted document, an attacker could possibly exploit this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5212) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way LibreOffice processed certain Microsoft Word .doc files. By tricking a user into opening a specially crafted Microsoft Word .doc document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5213) It was discovered that LibreOffice did not properly sanity check bookmark indexes. By tricking a user into opening a specially crafted document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5214) All libreoffice users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1278812 - CVE-2015-4551 libreoffice: Arbitrary file disclosure in Calc and Writer 1278820 - CVE-2015-5212 libreoffice: Integer underflow in PrinterSetup length 1278824 - CVE-2015-5213 libreoffice: Integer overflow in DOC files 1278827 - CVE-2015-5214 libreoffice: Bookmarks in DOC documents are insufficiently checked causing memory corruption 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libreoffice-4.2.8.2-11.el6_7.1.src.rpm i386: libreoffice-base-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-core-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-math-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.i686.rpm noarch: autocorr-af-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-bg-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ca-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-cs-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-da-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-de-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-en-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-es-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fa-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fi-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ga-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-hr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-hu-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-it-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ja-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ko-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-lb-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-lt-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-mn-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-nl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-pl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-pt-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ro-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ru-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sk-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sv-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-tr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-vi-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-zh-4.2.8.2-11.el6_7.1.noarch.rpm libreoffice-opensymbol-fonts-4.2.8.2-11.el6_7.1.noarch.rpm x86_64: libreoffice-base-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-core-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-math-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libreoffice-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.i686.rpm noarch: autocorr-is-4.2.8.2-11.el6_7.1.noarch.rpm x86_64: libreoffice-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: libreoffice-4.2.8.2-11.el6_7.1.src.rpm i386: libreoffice-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-base-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-core-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-math-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.i686.rpm noarch: autocorr-af-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-bg-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ca-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-cs-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-da-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-de-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-en-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-es-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fa-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fi-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ga-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-hr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-hu-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-is-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-it-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ja-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ko-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-lb-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-lt-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-mn-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-nl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-pl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-pt-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ro-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ru-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sk-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sv-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-tr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-vi-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-zh-4.2.8.2-11.el6_7.1.noarch.rpm libreoffice-opensymbol-fonts-4.2.8.2-11.el6_7.1.noarch.rpm ppc64: libreoffice-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-base-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-core-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.ppc.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.ppc.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-math-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.ppc64.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.ppc64.rpm s390x: libreoffice-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-base-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-core-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.s390.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.s390.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-math-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.s390x.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.s390x.rpm x86_64: libreoffice-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-base-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-core-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-math-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libreoffice-4.2.8.2-11.el6_7.1.src.rpm i386: libreoffice-base-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-core-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-math-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.i686.rpm noarch: autocorr-af-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-bg-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ca-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-cs-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-da-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-de-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-en-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-es-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fa-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fi-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-fr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ga-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-hr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-hu-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-it-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ja-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ko-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-lb-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-lt-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-mn-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-nl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-pl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-pt-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ro-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-ru-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sk-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sl-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-sv-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-tr-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-vi-4.2.8.2-11.el6_7.1.noarch.rpm autocorr-zh-4.2.8.2-11.el6_7.1.noarch.rpm libreoffice-opensymbol-fonts-4.2.8.2-11.el6_7.1.noarch.rpm x86_64: libreoffice-base-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-calc-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-core-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-draw-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-emailmerge-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-headless-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-impress-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-af-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-as-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-da-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-de-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-el-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-en-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-es-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-et-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-he-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-it-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-or-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-st-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-te-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-th-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-math-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-ogltrans-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-pdfimport-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-pyuno-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-ure-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-writer-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libreoffice-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.i686.rpm noarch: autocorr-is-4.2.8.2-11.el6_7.1.noarch.rpm x86_64: libreoffice-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-bsh-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-debuginfo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-filters-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-glade-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-librelogo-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-rhino-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-sdk-4.2.8.2-11.el6_7.1.x86_64.rpm libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: libreoffice-4.3.7.2-5.el7_2.1.src.rpm noarch: autocorr-af-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-bg-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ca-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-cs-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-da-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-de-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-en-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-es-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fa-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fi-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ga-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-hr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-hu-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-is-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-it-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ja-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ko-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-lb-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-lt-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-mn-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-nl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-pl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-pt-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ro-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ru-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sk-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sv-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-tr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-vi-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-zh-4.3.7.2-5.el7_2.1.noarch.rpm libreoffice-opensymbol-fonts-4.3.7.2-5.el7_2.1.noarch.rpm x86_64: libreoffice-base-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-calc-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-core-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-draw-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-emailmerge-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-impress-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-af-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-as-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-bn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-br-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-cs-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-cy-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-da-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-de-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-el-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-en-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-es-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-et-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fi-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-gl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-he-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-it-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ja-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-kn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-or-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-si-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-st-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sv-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ta-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-te-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-th-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-math-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-ogltrans-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-pdfimport-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-pyuno-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-ure-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-writer-4.3.7.2-5.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libreoffice-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-bsh-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-filters-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-glade-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-headless-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-librelogo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-officebean-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-postgresql-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-rhino-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-sdk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: libreoffice-4.3.7.2-5.el7_2.1.src.rpm aarch64: libreoffice-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-base-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-bsh-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-calc-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-core-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-draw-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-emailmerge-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-filters-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-glade-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-headless-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-impress-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-af-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-as-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-bn-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-br-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-cs-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-cy-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-da-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-de-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-el-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-en-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-es-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-et-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-fi-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-fr-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-gl-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-he-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-hr-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-hu-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-it-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ja-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-kn-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-nl-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-nn-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-nr-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-or-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-si-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-sk-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-sl-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-sr-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-st-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-sv-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ta-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-te-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-th-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-librelogo-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-math-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-officebean-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-ogltrans-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-pdfimport-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-postgresql-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-pyuno-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-rhino-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-sdk-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-ure-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-writer-4.3.7.2-5.el7_2.1.aarch64.rpm libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.aarch64.rpm noarch: autocorr-af-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-bg-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ca-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-cs-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-da-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-de-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-en-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-es-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fa-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fi-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ga-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-hr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-hu-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-is-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-it-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ja-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ko-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-lb-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-lt-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-mn-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-nl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-pl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-pt-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ro-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ru-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sk-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sv-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-tr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-vi-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-zh-4.3.7.2-5.el7_2.1.noarch.rpm libreoffice-opensymbol-fonts-4.3.7.2-5.el7_2.1.noarch.rpm ppc64le: libreoffice-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-base-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-bsh-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-calc-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-core-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-draw-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-emailmerge-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-filters-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-glade-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-headless-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-impress-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-af-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-as-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-bn-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-br-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-cs-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-cy-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-da-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-de-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-el-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-en-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-es-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-et-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-fi-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-fr-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-gl-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-he-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-hr-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-hu-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-it-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ja-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-kn-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-nl-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-nn-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-nr-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-or-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-si-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-sk-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-sl-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-sr-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-st-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-sv-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ta-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-te-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-th-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-librelogo-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-math-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-officebean-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-ogltrans-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-pdfimport-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-postgresql-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-pyuno-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-rhino-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-sdk-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-ure-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-writer-4.3.7.2-5.el7_2.1.ppc64le.rpm libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.ppc64le.rpm x86_64: libreoffice-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-base-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-bsh-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-calc-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-core-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-draw-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-emailmerge-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-filters-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-glade-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-headless-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-impress-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-af-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-as-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-bn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-br-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-cs-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-cy-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-da-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-de-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-el-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-en-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-es-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-et-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fi-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-gl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-he-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-it-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ja-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-kn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-or-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-si-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-st-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sv-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ta-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-te-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-th-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-librelogo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-math-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-officebean-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-ogltrans-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-pdfimport-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-postgresql-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-pyuno-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-rhino-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-sdk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-ure-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-writer-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libreoffice-4.3.7.2-5.el7_2.1.src.rpm noarch: autocorr-af-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-bg-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ca-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-cs-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-da-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-de-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-en-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-es-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fa-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fi-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-fr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ga-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-hr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-hu-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-is-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-it-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ja-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ko-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-lb-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-lt-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-mn-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-nl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-pl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-pt-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ro-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-ru-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sk-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sl-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-sv-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-tr-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-vi-4.3.7.2-5.el7_2.1.noarch.rpm autocorr-zh-4.3.7.2-5.el7_2.1.noarch.rpm libreoffice-opensymbol-fonts-4.3.7.2-5.el7_2.1.noarch.rpm x86_64: libreoffice-base-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-calc-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-core-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-draw-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-emailmerge-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-impress-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-af-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-as-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-bn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-br-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-cs-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-cy-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-da-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-de-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-el-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-en-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-es-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-et-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fi-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-fr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-gl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-he-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-hu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-it-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ja-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-kn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-or-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-si-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sl-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-st-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-sv-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ta-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-te-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-th-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-math-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-ogltrans-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-pdfimport-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-pyuno-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-ure-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-writer-4.3.7.2-5.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libreoffice-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-bsh-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-debuginfo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-filters-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-glade-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-headless-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-librelogo-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-officebean-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-postgresql-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-rhino-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-sdk-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.x86_64.rpm libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4551 https://access.redhat.com/security/cve/CVE-2015-5212 https://access.redhat.com/security/cve/CVE-2015-5213 https://access.redhat.com/security/cve/CVE-2015-5214 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWblu6XlSAg2UNWIIRAofwAKCELq8G6K+HrTM3l6zutpcvWtCQqQCffBug a8Ehe9iBJMDOeFH7n+UniDY= =qC8Q -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 15 10:39:14 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Dec 2015 05:39:14 -0500 Subject: [RHSA-2015:2623-01] Moderate: grub2 security and bug fix update Message-ID: <201512151039.tBFAdEi5027336@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: grub2 security and bug fix update Advisory ID: RHSA-2015:2623-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2623.html Issue date: 2015-12-15 CVE Names: CVE-2015-8370 ===================================================================== 1. Summary: Updated grub2 packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The grub2 packages provide version 2 of the Grand Unified Bootloader (GRUB), a highly configurable and customizable bootloader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system. (CVE-2015-8370) This update also fixes the following bug: * When upgrading from Red Hat Enterprise Linux 7.1 and earlier, a configured boot password was not correctly migrated to the newly introduced user.cfg configuration files. This could possibly prevent system administrators from changing grub2 configuration during system boot even if they provided the correct password. This update corrects the password migration script and the incorrectly generated user.cfg file. (BZ#1290089) All grub2 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1286966 - CVE-2015-8370 grub2: buffer overflow when checking password entered during bootup 1290089 - Grub password broken by update from RHEL7.1 to RHEL7.2 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: grub2-2.02-0.33.el7_2.src.rpm x86_64: grub2-2.02-0.33.el7_2.x86_64.rpm grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-2.02-0.33.el7_2.x86_64.rpm grub2-tools-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-modules-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: grub2-2.02-0.33.el7_2.src.rpm x86_64: grub2-2.02-0.33.el7_2.x86_64.rpm grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-2.02-0.33.el7_2.x86_64.rpm grub2-tools-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-modules-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: grub2-2.02-0.33.el7_2.src.rpm aarch64: grub2-debuginfo-2.02-0.33.el7_2.aarch64.rpm grub2-efi-2.02-0.33.el7_2.aarch64.rpm grub2-tools-2.02-0.33.el7_2.aarch64.rpm ppc64: grub2-2.02-0.33.el7_2.ppc64.rpm grub2-debuginfo-2.02-0.33.el7_2.ppc64.rpm grub2-tools-2.02-0.33.el7_2.ppc64.rpm ppc64le: grub2-2.02-0.33.el7_2.ppc64le.rpm grub2-debuginfo-2.02-0.33.el7_2.ppc64le.rpm grub2-tools-2.02-0.33.el7_2.ppc64le.rpm x86_64: grub2-2.02-0.33.el7_2.x86_64.rpm grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-2.02-0.33.el7_2.x86_64.rpm grub2-tools-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: grub2-debuginfo-2.02-0.33.el7_2.aarch64.rpm grub2-efi-modules-2.02-0.33.el7_2.aarch64.rpm x86_64: grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-modules-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: grub2-2.02-0.33.el7_2.src.rpm x86_64: grub2-2.02-0.33.el7_2.x86_64.rpm grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-2.02-0.33.el7_2.x86_64.rpm grub2-tools-2.02-0.33.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: grub2-debuginfo-2.02-0.33.el7_2.x86_64.rpm grub2-efi-modules-2.02-0.33.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8370 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWb+3QXlSAg2UNWIIRArT8AJ0YmmVTVBR2q943FqGhNfwXM7PE7ACgvVS2 4g7c1tWUj/z0d5BWzr9aW3k= =iI+4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 15 15:05:26 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Dec 2015 15:05:26 +0000 Subject: [RHSA-2015:2636-01] Important: kernel security and bug fix update Message-ID: <201512151505.tBFF5QuX023069@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:2636-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2636.html Issue date: 2015-12-15 CVE Names: CVE-2015-2925 CVE-2015-5307 CVE-2015-7613 CVE-2015-7872 CVE-2015-8104 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. (CVE-2015-2925, Important) * It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) * A race condition flaw was found in the way the Linux kernel's IPC subsystem initialized certain fields in an IPC object structure that were later used for permission checking before inserting the object into a globally visible list. A local, unprivileged user could potentially use this flaw to elevate their privileges on the system. (CVE-2015-7613, Important) * It was found that the Linux kernel's keys subsystem did not correctly garbage collect uninstantiated keyrings. A local attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-7872, Important) Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the CVE-2015-5307 issue. This update also fixes the following bugs: * Previously, Human Interface Device (HID) ran a report on an unaligned buffer, which could cause a page fault interrupt and an oops when the end of the report was read. This update fixes this bug by padding the end of the report with extra bytes, so the reading of the report never crosses a page boundary. As a result, a page fault and subsequent oops no longer occur. (BZ#1268203) * The NFS client was previously failing to detect a directory loop for some NFS server directory structures. This failure could cause NFS inodes to remain referenced after attempting to unmount the file system, leading to a kernel crash. Loop checks have been added to VFS, which effectively prevents this problem from occurring. (BZ#1272858) * Due to a race whereby the nfs_wb_pages_cancel() and nfs_commit_release_pages() calls both removed a request from the nfs_inode struct type, the kernel panicked with negative nfs_inode.npages count. The provided upstream patch performs the required serialization by holding the inode i_lock over the check of PagePrivate and locking the request, thus preventing the race and kernel panic from occurring. (BZ#1273721) * Due to incorrect URB_ISO_ASAP semantics, playing an audio file using a USB sound card could previously fail for some hardware configurations. This update fixes the bug, and playing audio from a USB sound card now works as expected. (BZ#1273916) * Inside hugetlb, region data structures were protected by a combination of a memory map semaphore and a single hugetlb instance mutex. However, a page-fault scalability improvement backported to the kernel on previous releases removed the single hugetlb instance mutex and introduced a new mutex table, making the locking combination insufficient, leading to possible race windows that could cause corruption and undefined behavior. This update fixes the problem by introducing a required spinlock to the region tracking functions for proper serialization. The problem only affects software using huge pages through hugetlb interface. (BZ#1274599) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1209367 - CVE-2015-2925 Kernel: vfs: Do not allow escaping from bind mounts 1268270 - CVE-2015-7613 kernel: Unauthorized access to IPC objects with SysV shm 1272371 - CVE-2015-7872 kernel: Keyrings crash triggerable by unprivileged user 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception 1278496 - CVE-2015-8104 virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-573.12.1.el6.src.rpm i386: kernel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-devel-2.6.32-573.12.1.el6.i686.rpm kernel-headers-2.6.32-573.12.1.el6.i686.rpm perf-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm kernel-doc-2.6.32-573.12.1.el6.noarch.rpm kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm x86_64: kernel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm perf-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-573.12.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm kernel-doc-2.6.32-573.12.1.el6.noarch.rpm kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm x86_64: kernel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm perf-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-573.12.1.el6.src.rpm i386: kernel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-devel-2.6.32-573.12.1.el6.i686.rpm kernel-headers-2.6.32-573.12.1.el6.i686.rpm perf-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm kernel-doc-2.6.32-573.12.1.el6.noarch.rpm kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm ppc64: kernel-2.6.32-573.12.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-573.12.1.el6.ppc64.rpm kernel-debug-2.6.32-573.12.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-573.12.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.12.1.el6.ppc64.rpm kernel-devel-2.6.32-573.12.1.el6.ppc64.rpm kernel-headers-2.6.32-573.12.1.el6.ppc64.rpm perf-2.6.32-573.12.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm s390x: kernel-2.6.32-573.12.1.el6.s390x.rpm kernel-debug-2.6.32-573.12.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.s390x.rpm kernel-debug-devel-2.6.32-573.12.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.12.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.12.1.el6.s390x.rpm kernel-devel-2.6.32-573.12.1.el6.s390x.rpm kernel-headers-2.6.32-573.12.1.el6.s390x.rpm kernel-kdump-2.6.32-573.12.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.12.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-573.12.1.el6.s390x.rpm perf-2.6.32-573.12.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.12.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.s390x.rpm x86_64: kernel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm perf-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.12.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm python-perf-2.6.32-573.12.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-573.12.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.12.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.12.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.12.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.12.1.el6.s390x.rpm python-perf-2.6.32-573.12.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-573.12.1.el6.src.rpm i386: kernel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-devel-2.6.32-573.12.1.el6.i686.rpm kernel-headers-2.6.32-573.12.1.el6.i686.rpm perf-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm kernel-doc-2.6.32-573.12.1.el6.noarch.rpm kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm x86_64: kernel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm perf-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.12.1.el6.i686.rpm perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm python-perf-2.6.32-573.12.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm python-perf-2.6.32-573.12.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.12.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2925 https://access.redhat.com/security/cve/CVE-2015-5307 https://access.redhat.com/security/cve/CVE-2015-7613 https://access.redhat.com/security/cve/CVE-2015-7872 https://access.redhat.com/security/cve/CVE-2015-8104 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcCufXlSAg2UNWIIRApkiAJ9XBPnSeORe1eAT52pJsfNVDlUeZQCgh8J+ IfVNFw9sWvERIlqjgH4uc6I= =Grj7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 15 15:07:33 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Dec 2015 15:07:33 +0000 Subject: [RHSA-2015:2645-01] Important: kernel security and bug fix update Message-ID: <201512151507.tBFF7YZV027980@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:2645-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2645.html Issue date: 2015-12-15 CVE Names: CVE-2015-5307 CVE-2015-8104 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues and two bugs are now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the CVE-2015-5307 issue. This update also fixes the following bugs: * With an IPv6 address on a bond and a slave failover, Unsolicited Neighbor Advertisement (UNA) was previously sent using the link global IPv6 address as source address. The underlying source code has been patched, and, after the failover in bonding, UNA is sent using both the corresponding link IPv6 address and global IPv6 address of bond0 and bond0.vlan. (BZ#1258479) * Previously, Human Interface Device (HID) would run a report on an unaligned buffer, which could cause a page fault interrupt and an oops when the end of the report was read. This update fixes this bug by padding the end of the report with extra bytes, so the reading of the report never crosses a page boundary. As a result, a page fault and subsequent oops no longer occur. (BZ#1268201) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception 1278496 - CVE-2015-8104 virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.68.1.el6.src.rpm i386: kernel-2.6.32-431.68.1.el6.i686.rpm kernel-debug-2.6.32-431.68.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-431.68.1.el6.i686.rpm kernel-debug-devel-2.6.32-431.68.1.el6.i686.rpm kernel-debuginfo-2.6.32-431.68.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.68.1.el6.i686.rpm kernel-devel-2.6.32-431.68.1.el6.i686.rpm kernel-headers-2.6.32-431.68.1.el6.i686.rpm perf-2.6.32-431.68.1.el6.i686.rpm perf-debuginfo-2.6.32-431.68.1.el6.i686.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-431.68.1.el6.noarch.rpm kernel-doc-2.6.32-431.68.1.el6.noarch.rpm kernel-firmware-2.6.32-431.68.1.el6.noarch.rpm ppc64: kernel-2.6.32-431.68.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-431.68.1.el6.ppc64.rpm kernel-debug-2.6.32-431.68.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-431.68.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-431.68.1.el6.ppc64.rpm kernel-devel-2.6.32-431.68.1.el6.ppc64.rpm kernel-headers-2.6.32-431.68.1.el6.ppc64.rpm perf-2.6.32-431.68.1.el6.ppc64.rpm perf-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm s390x: kernel-2.6.32-431.68.1.el6.s390x.rpm kernel-debug-2.6.32-431.68.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-431.68.1.el6.s390x.rpm kernel-debug-devel-2.6.32-431.68.1.el6.s390x.rpm kernel-debuginfo-2.6.32-431.68.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-431.68.1.el6.s390x.rpm kernel-devel-2.6.32-431.68.1.el6.s390x.rpm kernel-headers-2.6.32-431.68.1.el6.s390x.rpm kernel-kdump-2.6.32-431.68.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-431.68.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-431.68.1.el6.s390x.rpm perf-2.6.32-431.68.1.el6.s390x.rpm perf-debuginfo-2.6.32-431.68.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.s390x.rpm x86_64: kernel-2.6.32-431.68.1.el6.x86_64.rpm kernel-debug-2.6.32-431.68.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.68.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.68.1.el6.x86_64.rpm kernel-devel-2.6.32-431.68.1.el6.x86_64.rpm kernel-headers-2.6.32-431.68.1.el6.x86_64.rpm perf-2.6.32-431.68.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.68.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-431.68.1.el6.i686.rpm kernel-debuginfo-2.6.32-431.68.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.68.1.el6.i686.rpm perf-debuginfo-2.6.32-431.68.1.el6.i686.rpm python-perf-2.6.32-431.68.1.el6.i686.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-431.68.1.el6.ppc64.rpm perf-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm python-perf-2.6.32-431.68.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-431.68.1.el6.s390x.rpm kernel-debuginfo-2.6.32-431.68.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-431.68.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-431.68.1.el6.s390x.rpm perf-debuginfo-2.6.32-431.68.1.el6.s390x.rpm python-perf-2.6.32-431.68.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.68.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm python-perf-2.6.32-431.68.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.68.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5307 https://access.redhat.com/security/cve/CVE-2015-8104 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcCyJXlSAg2UNWIIRAmIdAJ9quuPognODrZJec1XUfcL51k2iNACfSymc j9R25iIkd57WRGmU8zdVM1o= =9bG9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 16 18:22:49 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Dec 2015 13:22:49 -0500 Subject: [RHSA-2015:2655-01] Important: bind security update Message-ID: <201512161822.tBGIMnAT004322@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2015:2655-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2655.html Issue date: 2015-12-16 CVE Names: CVE-2015-8000 ===================================================================== 1. Summary: Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1291176 - CVE-2015-8000 bind: responses with a malformed class attribute can trigger an assertion failure in db.c 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.5.src.rpm i386: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.i686.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.i686.rpm x86_64: bind-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.5.src.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.5.src.rpm i386: bind-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.i686.rpm ppc64: bind-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.ppc.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.ppc.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm s390x: bind-9.8.2-0.37.rc1.el6_7.5.s390x.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.s390x.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.s390.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.s390x.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.s390.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.s390x.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.s390x.rpm x86_64: bind-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.i686.rpm ppc64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.ppc.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.ppc.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.s390.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.s390x.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.s390.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.s390x.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.5.src.rpm i386: bind-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.i686.rpm x86_64: bind-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.i686.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: bind-9.9.4-29.el7_2.1.src.rpm noarch: bind-license-9.9.4-29.el7_2.1.noarch.rpm x86_64: bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-9.9.4-29.el7_2.1.i686.rpm bind-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.1.i686.rpm bind-libs-lite-9.9.4-29.el7_2.1.x86_64.rpm bind-utils-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bind-9.9.4-29.el7_2.1.x86_64.rpm bind-chroot-9.9.4-29.el7_2.1.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-devel-9.9.4-29.el7_2.1.i686.rpm bind-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.1.i686.rpm bind-lite-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: bind-9.9.4-29.el7_2.1.src.rpm noarch: bind-license-9.9.4-29.el7_2.1.noarch.rpm x86_64: bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-9.9.4-29.el7_2.1.i686.rpm bind-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.1.i686.rpm bind-libs-lite-9.9.4-29.el7_2.1.x86_64.rpm bind-utils-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bind-9.9.4-29.el7_2.1.x86_64.rpm bind-chroot-9.9.4-29.el7_2.1.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-devel-9.9.4-29.el7_2.1.i686.rpm bind-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.1.i686.rpm bind-lite-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: bind-9.9.4-29.el7_2.1.src.rpm aarch64: bind-9.9.4-29.el7_2.1.aarch64.rpm bind-chroot-9.9.4-29.el7_2.1.aarch64.rpm bind-debuginfo-9.9.4-29.el7_2.1.aarch64.rpm bind-libs-9.9.4-29.el7_2.1.aarch64.rpm bind-libs-lite-9.9.4-29.el7_2.1.aarch64.rpm bind-pkcs11-9.9.4-29.el7_2.1.aarch64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.aarch64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.aarch64.rpm bind-utils-9.9.4-29.el7_2.1.aarch64.rpm noarch: bind-license-9.9.4-29.el7_2.1.noarch.rpm ppc64: bind-9.9.4-29.el7_2.1.ppc64.rpm bind-chroot-9.9.4-29.el7_2.1.ppc64.rpm bind-debuginfo-9.9.4-29.el7_2.1.ppc.rpm bind-debuginfo-9.9.4-29.el7_2.1.ppc64.rpm bind-libs-9.9.4-29.el7_2.1.ppc.rpm bind-libs-9.9.4-29.el7_2.1.ppc64.rpm bind-libs-lite-9.9.4-29.el7_2.1.ppc.rpm bind-libs-lite-9.9.4-29.el7_2.1.ppc64.rpm bind-utils-9.9.4-29.el7_2.1.ppc64.rpm ppc64le: bind-9.9.4-29.el7_2.1.ppc64le.rpm bind-chroot-9.9.4-29.el7_2.1.ppc64le.rpm bind-debuginfo-9.9.4-29.el7_2.1.ppc64le.rpm bind-libs-9.9.4-29.el7_2.1.ppc64le.rpm bind-libs-lite-9.9.4-29.el7_2.1.ppc64le.rpm bind-pkcs11-9.9.4-29.el7_2.1.ppc64le.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.ppc64le.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.ppc64le.rpm bind-utils-9.9.4-29.el7_2.1.ppc64le.rpm s390x: bind-9.9.4-29.el7_2.1.s390x.rpm bind-chroot-9.9.4-29.el7_2.1.s390x.rpm bind-debuginfo-9.9.4-29.el7_2.1.s390.rpm bind-debuginfo-9.9.4-29.el7_2.1.s390x.rpm bind-libs-9.9.4-29.el7_2.1.s390.rpm bind-libs-9.9.4-29.el7_2.1.s390x.rpm bind-libs-lite-9.9.4-29.el7_2.1.s390.rpm bind-libs-lite-9.9.4-29.el7_2.1.s390x.rpm bind-utils-9.9.4-29.el7_2.1.s390x.rpm x86_64: bind-9.9.4-29.el7_2.1.x86_64.rpm bind-chroot-9.9.4-29.el7_2.1.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-9.9.4-29.el7_2.1.i686.rpm bind-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.1.i686.rpm bind-libs-lite-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.x86_64.rpm bind-utils-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: bind-debuginfo-9.9.4-29.el7_2.1.aarch64.rpm bind-devel-9.9.4-29.el7_2.1.aarch64.rpm bind-lite-devel-9.9.4-29.el7_2.1.aarch64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.aarch64.rpm bind-sdb-9.9.4-29.el7_2.1.aarch64.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.aarch64.rpm ppc64: bind-debuginfo-9.9.4-29.el7_2.1.ppc.rpm bind-debuginfo-9.9.4-29.el7_2.1.ppc64.rpm bind-devel-9.9.4-29.el7_2.1.ppc.rpm bind-devel-9.9.4-29.el7_2.1.ppc64.rpm bind-lite-devel-9.9.4-29.el7_2.1.ppc.rpm bind-lite-devel-9.9.4-29.el7_2.1.ppc64.rpm bind-pkcs11-9.9.4-29.el7_2.1.ppc64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.ppc.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.ppc64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.ppc.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.ppc64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.ppc64.rpm bind-sdb-9.9.4-29.el7_2.1.ppc64.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.ppc64.rpm ppc64le: bind-debuginfo-9.9.4-29.el7_2.1.ppc64le.rpm bind-devel-9.9.4-29.el7_2.1.ppc64le.rpm bind-lite-devel-9.9.4-29.el7_2.1.ppc64le.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.ppc64le.rpm bind-sdb-9.9.4-29.el7_2.1.ppc64le.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.ppc64le.rpm s390x: bind-debuginfo-9.9.4-29.el7_2.1.s390.rpm bind-debuginfo-9.9.4-29.el7_2.1.s390x.rpm bind-devel-9.9.4-29.el7_2.1.s390.rpm bind-devel-9.9.4-29.el7_2.1.s390x.rpm bind-lite-devel-9.9.4-29.el7_2.1.s390.rpm bind-lite-devel-9.9.4-29.el7_2.1.s390x.rpm bind-pkcs11-9.9.4-29.el7_2.1.s390x.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.s390.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.s390x.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.s390.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.s390x.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.s390x.rpm bind-sdb-9.9.4-29.el7_2.1.s390x.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.s390x.rpm x86_64: bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-devel-9.9.4-29.el7_2.1.i686.rpm bind-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.1.i686.rpm bind-lite-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: bind-9.9.4-29.el7_2.1.src.rpm noarch: bind-license-9.9.4-29.el7_2.1.noarch.rpm x86_64: bind-9.9.4-29.el7_2.1.x86_64.rpm bind-chroot-9.9.4-29.el7_2.1.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-9.9.4-29.el7_2.1.i686.rpm bind-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.1.i686.rpm bind-libs-lite-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.1.x86_64.rpm bind-utils-9.9.4-29.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bind-debuginfo-9.9.4-29.el7_2.1.i686.rpm bind-debuginfo-9.9.4-29.el7_2.1.x86_64.rpm bind-devel-9.9.4-29.el7_2.1.i686.rpm bind-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.1.i686.rpm bind-lite-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-9.9.4-29.el7_2.1.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8000 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01317 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcav3XlSAg2UNWIIRAppbAKC+Iu/uOSNaWTW37Wlfn9k4V30lUQCfRsOc zSE9H5vV+lEnZH7grkD3phw= =rtRq -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 16 18:23:02 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Dec 2015 13:23:02 -0500 Subject: [RHSA-2015:2656-01] Important: bind security update Message-ID: <201512161823.tBGIN2Ok004444@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2015:2656-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2656.html Issue date: 2015-12-16 CVE Names: CVE-2015-8000 ===================================================================== 1. Summary: Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1291176 - CVE-2015-8000 bind: responses with a malformed class attribute can trigger an assertion failure in db.c 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.5.src.rpm i386: bind-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-libs-9.3.6-25.P1.el5_11.5.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.5.i386.rpm bind-utils-9.3.6-25.P1.el5_11.5.i386.rpm x86_64: bind-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.5.i386.rpm bind-libs-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.5.x86_64.rpm Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.5.src.rpm i386: bind-chroot-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.i386.rpm x86_64: bind-chroot-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-devel-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind-9.3.6-25.P1.el5_11.5.src.rpm i386: bind-9.3.6-25.P1.el5_11.5.i386.rpm bind-chroot-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-libs-9.3.6-25.P1.el5_11.5.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.5.i386.rpm bind-utils-9.3.6-25.P1.el5_11.5.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.i386.rpm ia64: bind-9.3.6-25.P1.el5_11.5.ia64.rpm bind-chroot-9.3.6-25.P1.el5_11.5.ia64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.ia64.rpm bind-devel-9.3.6-25.P1.el5_11.5.ia64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.ia64.rpm bind-libs-9.3.6-25.P1.el5_11.5.i386.rpm bind-libs-9.3.6-25.P1.el5_11.5.ia64.rpm bind-sdb-9.3.6-25.P1.el5_11.5.ia64.rpm bind-utils-9.3.6-25.P1.el5_11.5.ia64.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.ia64.rpm ppc: bind-9.3.6-25.P1.el5_11.5.ppc.rpm bind-chroot-9.3.6-25.P1.el5_11.5.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.ppc64.rpm bind-devel-9.3.6-25.P1.el5_11.5.ppc.rpm bind-devel-9.3.6-25.P1.el5_11.5.ppc64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.ppc.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.ppc64.rpm bind-libs-9.3.6-25.P1.el5_11.5.ppc.rpm bind-libs-9.3.6-25.P1.el5_11.5.ppc64.rpm bind-sdb-9.3.6-25.P1.el5_11.5.ppc.rpm bind-utils-9.3.6-25.P1.el5_11.5.ppc.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.ppc.rpm s390x: bind-9.3.6-25.P1.el5_11.5.s390x.rpm bind-chroot-9.3.6-25.P1.el5_11.5.s390x.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.s390.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.s390x.rpm bind-devel-9.3.6-25.P1.el5_11.5.s390.rpm bind-devel-9.3.6-25.P1.el5_11.5.s390x.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.s390.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.s390x.rpm bind-libs-9.3.6-25.P1.el5_11.5.s390.rpm bind-libs-9.3.6-25.P1.el5_11.5.s390x.rpm bind-sdb-9.3.6-25.P1.el5_11.5.s390x.rpm bind-utils-9.3.6-25.P1.el5_11.5.s390x.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.s390x.rpm x86_64: bind-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-chroot-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-devel-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.5.i386.rpm bind-libs-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.5.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.5.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8000 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01317 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcawEXlSAg2UNWIIRAqruAKCotRgtDe7abMtO5XYq6CAbfDw+RACfYAo4 0p5KqoxswEFVdnZtZkTn3eY= =/Qfu -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 16 18:23:23 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Dec 2015 13:23:23 -0500 Subject: [RHSA-2015:2657-01] Critical: firefox security update Message-ID: <201512161823.tBGINNEA004614@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2015:2657-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2657.html Issue date: 2015-12-16 CVE Names: CVE-2015-7201 CVE-2015-7205 CVE-2015-7210 CVE-2015-7212 CVE-2015-7213 CVE-2015-7214 CVE-2015-7222 ===================================================================== 1. Summary: Updated firefox packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7210, CVE-2015-7212, CVE-2015-7213, CVE-2015-7222) A flaw was found in the way Firefox handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same-origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Andrei Vaida, Jesse Ruderman, Bob Clary, Looben Yang, Abhishek Arya, Ronald Crane, Gerald Squelart, and Tsubasa Iinuma as the original reporters of these issues. All Firefox users should upgrade to these updated packages, which contain Firefox version 38.5.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1291571 - CVE-2015-7201 Mozilla: Miscellaneous memory safety hazards (rv:38.5) (MFSA 2015-134) 1291585 - CVE-2015-7210 Mozilla: Use-after-free in WebRTC when datachannel is used after being destroyed (MFSA 2015-138) 1291587 - CVE-2015-7212 Mozilla: Integer overflow allocating extremely large textures (MFSA 2015-139) 1291595 - CVE-2015-7205 Mozilla: Underflow through code inspection (MFSA 2015-145) 1291596 - CVE-2015-7213 Mozilla: Integer overflow in MP4 playback in 64-bit versions (MFSA 2015-146) 1291597 - CVE-2015-7222 Mozilla: Integer underflow and buffer overflow processing MP4 metadata in libstagefright (MFSA 2015-147) 1291600 - CVE-2015-7214 Mozilla: Cross-site reading attack through data: and view-source: URIs (MFSA 2015-149) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-38.5.0-2.el5_11.src.rpm i386: firefox-38.5.0-2.el5_11.i386.rpm firefox-debuginfo-38.5.0-2.el5_11.i386.rpm x86_64: firefox-38.5.0-2.el5_11.i386.rpm firefox-38.5.0-2.el5_11.x86_64.rpm firefox-debuginfo-38.5.0-2.el5_11.i386.rpm firefox-debuginfo-38.5.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-38.5.0-2.el5_11.src.rpm i386: firefox-38.5.0-2.el5_11.i386.rpm firefox-debuginfo-38.5.0-2.el5_11.i386.rpm ppc: firefox-38.5.0-2.el5_11.ppc64.rpm firefox-debuginfo-38.5.0-2.el5_11.ppc64.rpm s390x: firefox-38.5.0-2.el5_11.s390.rpm firefox-38.5.0-2.el5_11.s390x.rpm firefox-debuginfo-38.5.0-2.el5_11.s390.rpm firefox-debuginfo-38.5.0-2.el5_11.s390x.rpm x86_64: firefox-38.5.0-2.el5_11.i386.rpm firefox-38.5.0-2.el5_11.x86_64.rpm firefox-debuginfo-38.5.0-2.el5_11.i386.rpm firefox-debuginfo-38.5.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-38.5.0-2.el6_7.src.rpm i386: firefox-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm x86_64: firefox-38.5.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.5.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-38.5.0-2.el6_7.src.rpm x86_64: firefox-38.5.0-2.el6_7.i686.rpm firefox-38.5.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-38.5.0-2.el6_7.src.rpm i386: firefox-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm ppc64: firefox-38.5.0-2.el6_7.ppc64.rpm firefox-debuginfo-38.5.0-2.el6_7.ppc64.rpm s390x: firefox-38.5.0-2.el6_7.s390x.rpm firefox-debuginfo-38.5.0-2.el6_7.s390x.rpm x86_64: firefox-38.5.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.5.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-38.5.0-2.el6_7.ppc.rpm firefox-debuginfo-38.5.0-2.el6_7.ppc.rpm s390x: firefox-38.5.0-2.el6_7.s390.rpm firefox-debuginfo-38.5.0-2.el6_7.s390.rpm x86_64: firefox-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-38.5.0-2.el6_7.src.rpm i386: firefox-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm x86_64: firefox-38.5.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.5.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-38.5.0-2.el6_7.i686.rpm firefox-debuginfo-38.5.0-2.el6_7.i686.rpm Red Hat Enterprise Linux Client (v. 7): Source: firefox-38.5.0-3.el7_2.src.rpm x86_64: firefox-38.5.0-3.el7_2.x86_64.rpm firefox-debuginfo-38.5.0-3.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-38.5.0-3.el7_2.i686.rpm firefox-debuginfo-38.5.0-3.el7_2.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-38.5.0-3.el7_2.src.rpm aarch64: firefox-38.5.0-3.el7_2.aarch64.rpm firefox-debuginfo-38.5.0-3.el7_2.aarch64.rpm ppc64: firefox-38.5.0-3.el7_2.ppc64.rpm firefox-debuginfo-38.5.0-3.el7_2.ppc64.rpm ppc64le: firefox-38.5.0-3.el7_2.ppc64le.rpm firefox-debuginfo-38.5.0-3.el7_2.ppc64le.rpm s390x: firefox-38.5.0-3.el7_2.s390x.rpm firefox-debuginfo-38.5.0-3.el7_2.s390x.rpm x86_64: firefox-38.5.0-3.el7_2.x86_64.rpm firefox-debuginfo-38.5.0-3.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-38.5.0-3.el7_2.ppc.rpm firefox-debuginfo-38.5.0-3.el7_2.ppc.rpm s390x: firefox-38.5.0-3.el7_2.s390.rpm firefox-debuginfo-38.5.0-3.el7_2.s390.rpm x86_64: firefox-38.5.0-3.el7_2.i686.rpm firefox-debuginfo-38.5.0-3.el7_2.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-38.5.0-3.el7_2.src.rpm x86_64: firefox-38.5.0-3.el7_2.x86_64.rpm firefox-debuginfo-38.5.0-3.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-38.5.0-3.el7_2.i686.rpm firefox-debuginfo-38.5.0-3.el7_2.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7201 https://access.redhat.com/security/cve/CVE-2015-7205 https://access.redhat.com/security/cve/CVE-2015-7210 https://access.redhat.com/security/cve/CVE-2015-7212 https://access.redhat.com/security/cve/CVE-2015-7213 https://access.redhat.com/security/cve/CVE-2015-7214 https://access.redhat.com/security/cve/CVE-2015-7222 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr38.5 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcawaXlSAg2UNWIIRAkDRAKCTYY3DHUy5TDaTmsExaTqcYZLTDACgqXfI xCKLuUcWHPfaOqn6xfBHNW8= =PCI6 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Dec 16 18:23:34 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Dec 2015 13:23:34 -0500 Subject: [RHSA-2015:2658-01] Important: bind97 security update Message-ID: <201512161823.tBGINYuh021304@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind97 security update Advisory ID: RHSA-2015:2658-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2658.html Issue date: 2015-12-16 CVE Names: CVE-2015-8000 ===================================================================== 1. Summary: Updated bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind97 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1291176 - CVE-2015-8000 bind: responses with a malformed class attribute can trigger an assertion failure in db.c 6. Package List: Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind97-9.7.0-21.P2.el5_11.4.src.rpm i386: bind97-9.7.0-21.P2.el5_11.4.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.4.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.4.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.4.i386.rpm x86_64: bind97-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.4.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.4.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind97-9.7.0-21.P2.el5_11.4.src.rpm i386: bind97-9.7.0-21.P2.el5_11.4.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.4.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.4.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.4.i386.rpm ia64: bind97-9.7.0-21.P2.el5_11.4.ia64.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.ia64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.ia64.rpm bind97-devel-9.7.0-21.P2.el5_11.4.ia64.rpm bind97-libs-9.7.0-21.P2.el5_11.4.ia64.rpm bind97-utils-9.7.0-21.P2.el5_11.4.ia64.rpm ppc: bind97-9.7.0-21.P2.el5_11.4.ppc.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.ppc64.rpm bind97-devel-9.7.0-21.P2.el5_11.4.ppc.rpm bind97-devel-9.7.0-21.P2.el5_11.4.ppc64.rpm bind97-libs-9.7.0-21.P2.el5_11.4.ppc.rpm bind97-libs-9.7.0-21.P2.el5_11.4.ppc64.rpm bind97-utils-9.7.0-21.P2.el5_11.4.ppc.rpm s390x: bind97-9.7.0-21.P2.el5_11.4.s390x.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.s390x.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.s390.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.s390x.rpm bind97-devel-9.7.0-21.P2.el5_11.4.s390.rpm bind97-devel-9.7.0-21.P2.el5_11.4.s390x.rpm bind97-libs-9.7.0-21.P2.el5_11.4.s390.rpm bind97-libs-9.7.0-21.P2.el5_11.4.s390x.rpm bind97-utils-9.7.0-21.P2.el5_11.4.s390x.rpm x86_64: bind97-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.4.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.4.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.4.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8000 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01317 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcawlXlSAg2UNWIIRArDhAJ9WRBFTbeUsX6jOtf1IJyD+WWIEQQCfXGMp 16nKXqBPJ3UOtKMFOjK2Wd8= =64CW -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 17 16:22:43 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 17 Dec 2015 16:22:43 +0000 Subject: [RHSA-2015:2665-01] Important: chromium-browser security update Message-ID: <201512171622.tBHGMiXJ025462@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2015:2665-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2665.html Issue date: 2015-12-17 CVE Names: CVE-2015-6792 ===================================================================== 1. Summary: Updated chromium-browser packages that fix two security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2015-6792) All Chromium users should upgrade to these updated packages, which contain Chromium version 47.0.2526.106, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1291989 - CVE-2015-6792 chromium-browser: Fixes from internal audits and fuzzing 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-47.0.2526.106-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.106-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.106-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.106-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-47.0.2526.106-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.106-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.106-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.106-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-47.0.2526.106-1.el6.i686.rpm chromium-browser-debuginfo-47.0.2526.106-1.el6.i686.rpm x86_64: chromium-browser-47.0.2526.106-1.el6.x86_64.rpm chromium-browser-debuginfo-47.0.2526.106-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-6792 https://access.redhat.com/security/updates/classification/#important http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_15.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcuD6XlSAg2UNWIIRAuxHAJ91+CGbyjtRuG+FwLLDfPyJRV8hxwCfWJzf 0WUN4E9Wi4O1VC9/78xqUFE= =//SK -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 17 17:12:14 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 17 Dec 2015 17:12:14 +0000 Subject: [RHSA-2015:2666-01] Important: Red Hat OpenShift Enterprise 2.2.8 security, bug fix, and enhancement update Message-ID: <201512171712.tBHHCEBL013702@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Enterprise 2.2.8 security, bug fix, and enhancement update Advisory ID: RHSA-2015:2666-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2666.html Issue date: 2015-12-17 CVE Names: CVE-2015-3281 ===================================================================== 1. Summary: Red Hat OpenShift Enterprise release 2.2.8, which fixes one security issue, several bugs, and introduces feature enhancements, is now available. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHOSE Client 2.2 - noarch RHOSE Infrastructure 2.2 - noarch RHOSE JBoss EAP add-on 2.2 - noarch RHOSE Node 2.2 - noarch, x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. The following security issue is addressed with this release: An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could use this flaw to leak certain memory buffer contents from a past request or session. (CVE-2015-3281) Space precludes documenting all of the bug fixes in this advisory. See the OpenShift Enterprise Technical Notes, which will be updated shortly for release 2.2.8, for details about these changes: https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-s ingle/Technical_Notes/index.html All OpenShift Enterprise 2 users are advised to upgrade to these updated packages. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. See the OpenShift Enterprise 2.2 Release Notes, which will be updated shortly for release 2.2.8, for important instructions on how to fully apply this asynchronous errata update: https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-s ingle/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1045226 - oo-auto-idler man page incorrect 1054441 - oo-accept-node should test that BROKER_HOST is consistent 1064039 - RFE oo-diagnostics should report when node auth is failing (401 Unauthorized) 1101973 - oo-diagnostics tools is checking a non-existing dir after update ose-2.0 GA to ose-2.0.z puddle + RHSCL-1.1 1110415 - `oo-admin-broker-cache --clear --console` does not warn that --console flag does nothing 1111501 - REPORT_BUILD_ANALYTICS should be set to false by default 1111598 - oo-admin-chk gives bad advice to users when gears do not exist on the node. 1139608 - rhc snapshot save different app with the same name in the same dir didn't prompt conflict information 1140766 - oo-admin-ctl-district doesn't suggest FQDN for -i in -h output 1155003 - Should prompt correct and important parameter information when use none or error parameter in "rhc server add" command 1177753 - Enable a configuration in rhc to use a different ssh executable 1211526 - HAProxy does not restart when pid is not found 1218872 - rhc setup fail during upload sshkey 1238305 - [RFE] gear-placement plugin domain_id as input data 1239072 - CVE-2015-3281 haproxy: information leak in buffer_slow_realign() 1241675 - [RFE] Check for missing openshift_application_aliases components f5-icontrol-rest.rb 1248439 - Routing SPI for Nginx doesn't preserve host in http request's headers 1255426 - API Call to disable HA does not remove 2nd haproxy head gear 1264722 - oo-register-dns shows erros with any option 1265609 - pandas not getting installed 1268080 - ChangeMembersDomainOp are not cleared by oo-admin-clear-pending-ops 1270660 - Haproxy health check should be in sync with rolling updates in EWS 1271338 - oo-restorecon -v -a does not add selinux MCS labels to files under hidden directory 1272195 - oo-admin-ctl-app -c remove-gear , ignores min scale setting 1277695 - hostname regex fails in update-cluster in some locales 1280438 - haproxy_ctld error on a close-to-quota gear 1282520 - Routing-daemon does not create the openshift_application_aliases policy 1282940 - Exception log output when using rhc app ssh "--ssh option" with exist directory 6. Package List: RHOSE Client 2.2: Source: rhc-1.38.4.5-1.el6op.src.rpm noarch: rhc-1.38.4.5-1.el6op.noarch.rpm RHOSE Infrastructure 2.2: Source: openshift-enterprise-upgrade-2.2.8-1.el6op.src.rpm openshift-origin-broker-util-1.37.4.2-1.el6op.src.rpm rubygem-openshift-origin-common-1.29.4.1-1.el6op.src.rpm rubygem-openshift-origin-controller-1.38.4.2-1.el6op.src.rpm rubygem-openshift-origin-routing-daemon-0.26.4.4-1.el6op.src.rpm noarch: openshift-enterprise-release-2.2.8-1.el6op.noarch.rpm openshift-enterprise-upgrade-broker-2.2.8-1.el6op.noarch.rpm openshift-enterprise-yum-validator-2.2.8-1.el6op.noarch.rpm openshift-origin-broker-util-1.37.4.2-1.el6op.noarch.rpm rubygem-openshift-origin-common-1.29.4.1-1.el6op.noarch.rpm rubygem-openshift-origin-controller-1.38.4.2-1.el6op.noarch.rpm rubygem-openshift-origin-routing-daemon-0.26.4.4-1.el6op.noarch.rpm RHOSE JBoss EAP add-on 2.2: Source: openshift-origin-cartridge-jbosseap-2.27.3.1-1.el6op.src.rpm noarch: openshift-origin-cartridge-jbosseap-2.27.3.1-1.el6op.noarch.rpm RHOSE Node 2.2: Source: haproxy15side-1.5.4-2.el6op.src.rpm openshift-enterprise-upgrade-2.2.8-1.el6op.src.rpm openshift-origin-cartridge-haproxy-1.31.4.1-1.el6op.src.rpm openshift-origin-cartridge-jbossews-1.35.3.2-1.el6op.src.rpm openshift-origin-cartridge-python-1.34.1.1-1.el6op.src.rpm openshift-origin-node-util-1.38.5.1-1.el6op.src.rpm rubygem-openshift-origin-common-1.29.4.1-1.el6op.src.rpm rubygem-openshift-origin-node-1.38.4.1-1.el6op.src.rpm noarch: openshift-enterprise-release-2.2.8-1.el6op.noarch.rpm openshift-enterprise-upgrade-node-2.2.8-1.el6op.noarch.rpm openshift-enterprise-yum-validator-2.2.8-1.el6op.noarch.rpm openshift-origin-cartridge-haproxy-1.31.4.1-1.el6op.noarch.rpm openshift-origin-cartridge-jbossews-1.35.3.2-1.el6op.noarch.rpm openshift-origin-cartridge-python-1.34.1.1-1.el6op.noarch.rpm openshift-origin-node-util-1.38.5.1-1.el6op.noarch.rpm rubygem-openshift-origin-common-1.29.4.1-1.el6op.noarch.rpm rubygem-openshift-origin-node-1.38.4.1-1.el6op.noarch.rpm x86_64: haproxy15side-1.5.4-2.el6op.x86_64.rpm haproxy15side-debuginfo-1.5.4-2.el6op.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3281 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWcuyDXlSAg2UNWIIRAs9iAKCg610Xq8HXhYNhIrml02r8Lesk+ACfYIA2 gXKNT+SfO8+09NHVvoedmUA= =Vm9R -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 21 06:13:45 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 21 Dec 2015 06:13:45 +0000 Subject: [RHSA-2015:2671-01] Important: jakarta-commons-collections security update Message-ID: <201512210613.tBL6DjoI023685@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jakarta-commons-collections security update Advisory ID: RHSA-2015:2671-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2671.html Issue date: 2015-12-21 CVE Names: CVE-2015-7501 ===================================================================== 1. Summary: Updated jakarta-commons-collections packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: The Jakarta/Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library. (CVE-2015-7501) With this update, deserialization of certain classes in the commons-collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization. Further information about this security flaw may be found at: https://access.redhat.com/solutions/2045023 All users of jakarta-commons-collections are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using the commons-collections library must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1279330 - CVE-2015-7501 apache-commons-collections: InvokerTransformer code execution during deserialisation 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: jakarta-commons-collections-3.2-2jpp.4.src.rpm i386: jakarta-commons-collections-debuginfo-3.2-2jpp.4.i386.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.i386.rpm x86_64: jakarta-commons-collections-debuginfo-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.x86_64.rpm Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: jakarta-commons-collections-3.2-2jpp.4.src.rpm i386: jakarta-commons-collections-3.2-2jpp.4.i386.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.i386.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.i386.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.i386.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.i386.rpm x86_64: jakarta-commons-collections-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: jakarta-commons-collections-3.2-2jpp.4.src.rpm i386: jakarta-commons-collections-3.2-2jpp.4.i386.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.i386.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.i386.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.i386.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.i386.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.i386.rpm ia64: jakarta-commons-collections-3.2-2jpp.4.ia64.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.ia64.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.ia64.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.ia64.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.ia64.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.ia64.rpm ppc: jakarta-commons-collections-3.2-2jpp.4.ppc.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.ppc.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.ppc.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.ppc.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.ppc.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.ppc.rpm s390x: jakarta-commons-collections-3.2-2jpp.4.s390x.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.s390x.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.s390x.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.s390x.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.s390x.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.s390x.rpm x86_64: jakarta-commons-collections-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-debuginfo-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-javadoc-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-testframework-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.x86_64.rpm jakarta-commons-collections-tomcat5-3.2-2jpp.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7501 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/solutions/2045023 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWd5hqXlSAg2UNWIIRAgPYAJ9ljUSajmspzsEW/w6a6Gu6MgN63wCgjIwY LCxz4Z/iZLjY6IAEXBYNULE= =OrKl -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 21 19:40:30 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 21 Dec 2015 19:40:30 +0000 Subject: [RHSA-2015:2650-01] Moderate: Red Hat Enterprise Linux OpenStack Platform 7 director update Message-ID: <201512211940.tBLJeVEl013626@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Enterprise Linux OpenStack Platform 7 director update Advisory ID: RHSA-2015:2650-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2015:2650 Issue date: 2015-12-21 CVE Names: CVE-2015-5303 CVE-2015-5329 ===================================================================== 1. Summary: Updated packages that fix two security issues and multiple bugs are now available for Red Hat Enterprise Linux OpenStack Platform 7.0 director for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: OpenStack 7.0 Director for RHEL 7 - noarch 3. Description: Red Hat Enterprise Linux OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud based on Red Hat Enterprise Linux OpenStack Platform. It was discovered that the director's NeutronMetadataProxySharedSecret parameter remained specified at the default value of 'unset'. This value is used by OpenStack Networking to sign instance headers; if unchanged, an attacker knowing the shared secret could use this flaw to spoof OpenStack Networking metadata requests. (CVE-2015-5303) A flaw was found in the director (openstack-tripleo-heat-templates) where the RabbitMQ credentials defaulted to guest/guest and supplied values in the configuration were not used. As a result, all deployed overclouds used the same credentials (guest/guest). A remote, non-authenticated attacker could use this flaw to access RabbitMQ services in the deployed cloud. (CVE-2015-5329) The CVE-2015-5303 issue was discovered by Steven Hardy of Red Hat. Red Hat would like to thank Kota Akatsuka of NEC for reporting the CVE-2015-5329 issue. Additional bug fixes include: * Previously, hard-coded parameters were passed directly to Orchestration (heat). As a result, the parameters could not be overridden properly. With this update, a custom environment file from the parameters collected is generated and pass as 'parameter_defaults', allowing parameters to be overridden.(BZ#1245737) * Previously, when scaling out Compute nodes in the Overcloud after an update was performed, the default UpdateIdentifier parameter in the Orchestration stack caused the new node to attempt an update as soon as it was coming up. Because the yum repositories were not configured on the new nodes yet, this caused the update to fail, which in turn caused the scale out to fail. With this update, the client, python-rdomanager-oscplugin, does not clear the UpdateIdentifier parameter on subsequent stack-update attempts (including the scale out) until after the initial update has been completed. As a result, scale-out attempts after the update now succeed.(BZ#1290796) * Previously, the 'debug' parameter was enabled and hard-coded in the overcloud deployment code, and the user could not disable debugging. With this update, the 'debug' parameter has been removed from default hard-coded parameters in the overcloud deployment code. As a result, the user can now control the debugging level in the environment file used to deploy the overcloud.(BZ#1259084) * Previously, deployment validation checked all OpenStack Bare Metal (ironic) nodes, including ones in maintenance mode (even though these cannot be deployed), which resulted in false errors and warnings. With this update, nodes in maintenance mode are skipped by the validation step and false errors are no longer produced.(BZ#1261863) * Previously, the 'tempest-deployer-input.conf' file contained an incorrect stack_owner_role value, which meant that using this file for post-install validation caused Tempest test failures. With this update, the stack_owner_role value generated during deployment has been changed. As a result, fewer Tempest tests will fail during post-install validation. (BZ#1265714) * Previously, breakpoints were not removed when an update operation failed. If a user ran the "openstack overcloud update" command and it failed, the subsequent stack-update command (for example, "openstack overcloud deploy") could be stuck in the 'IN_PROGRESS' state waiting for the removal of breakpoints. With this update, all existing CLI commands explicitly remove any existing breakpoints when running a stack-update operation, and stack-update operations do not get stuck in the 'IN_PROGRESS' state.(BZ#1267558) All Red Hat Enterprise Linux OpenStack Platform 7.0 director users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1231885 - Nodes reconnection to the broker not working properly. Compute nodes are not registered again 1241434 - Add removal policies params for resource groups 1245737 - hard-coded parameters can't be overridden 1252083 - Secure rabbitmq installation for overcloud 1259084 - Unable to override value of Debug to deployment 1260776 - Error is displayed in the beginning of the deploy: "nodes with no profile that will not be used" 1261863 - The deployment configuration validation functions should skip nodes that are in maintenance mode 1262425 - memcached needs the interleave=true pacemaker attribute 1265714 - Tempest has a wrong stack_owner_role value when deploying with osp-d 1266910 - All l3 agents go to standby ha_state after restarting haproxy resource 1267558 - Breakpoints are not deleted after stack-update operation 1267855 - unable to update overcloud configuration from underclound node. 1268415 - rhel-osp-director: unable to configure overcloud after creation using the OS::TripleO::NodeExtraConfigPost resource. 1271692 - python-rdomanager-oscplugin should not install unit tests 1272297 - CVE-2015-5303 python-rdomanager-oscplugin: NeutronMetadataProxySharedSecret parameter uses default value 1272347 - director stack update 7.0 to 7.1 KeystoneAdminApiNetwork change causes unwanted services restart 1272357 - director stack update 7.0 to 7.1 VIP change 1275324 - neutron-openvswitch-agent fails to restart under pacemaker 1275812 - overcloud deployment fails on not finding puppet resource 1281460 - ospd HA w/ templates deployment only brings up one controller instead of 3 1281777 - CVE-2015-5329 openstack-tripleo-heat-templates: Using hardcoded rabbitmq credentials regardless of supplied values 1284914 - Updating from 7.1 to 7.2 might fail with "ERROR: openstack 'NEUTRON_METADATA_PROXY_SHARED_SECRET'" 1285079 - orphaned keepalived processes remain in old neutron netns 1285363 - Deployment failure "httpd never started after 200 seconds" 1285485 - issue replacing the pacemaker cib during an update from a running 7.1 overcloud to 7.2/latest 1287624 - HA | External LB | Can't deploy HA with external LB because we don't have any haproxy resource to restart when deploying with external lb 1290582 - puppet / pacemaker race stopping and starting neutron-server on Step6 of puppet apply 1290796 - Set UpdateIdentifier after yum update causes subsequent scale out attempt to fail 6. Package List: OpenStack 7.0 Director for RHEL 7: Source: openstack-tripleo-heat-templates-0.8.6-94.el7ost.src.rpm python-rdomanager-oscplugin-0.0.10-22.el7ost.src.rpm noarch: openstack-tripleo-heat-templates-0.8.6-94.el7ost.noarch.rpm python-rdomanager-oscplugin-0.0.10-22.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5303 https://access.redhat.com/security/cve/CVE-2015-5329 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en/red-hat-enterprise-linux-openstack-platform/version-7/release-notes 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWeFWdXlSAg2UNWIIRAtVuAJ4+TzjtoWbTKKLitYkxNc0lN9tClwCgt8IX x4NBxgR6B4hlTmKPnF4pKW4= =1V3B -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 21 19:40:59 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 21 Dec 2015 19:40:59 +0000 Subject: [RHSA-2015:2673-01] Moderate: openstack-nova security and bug fix advisory Message-ID: <201512211941.tBLJexjV027464@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-nova security and bug fix advisory Advisory ID: RHSA-2015:2673-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2015:2673 Issue date: 2015-12-21 CVE Names: CVE-2015-7713 ===================================================================== 1. Summary: Updated OpenStack Compute packages that resolve various issues are now available for Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7. 2. Relevant releases/architectures: OpenStack 7.0 Tools for RHEL 7 - noarch Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7 - noarch 3. Description: OpenStack Compute (nova) launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A vulnerability was discovered in the way OpenStack Compute (nova) networking handled security group updates; changes were not applied to already running VM instances. A remote attacker could use this flaw to access running VM instances. (CVE-2015-7713) Additional updates include: * The openstack-nova packages have been upgraded to upstream version 2015.1.2. See https://launchpad.net/nova/kilo/2015.1.2 for a complete list of bug fixes and enhancements. (BZ#1274875) * When using huge pages, the back-end memory for a guest was configured as private. This disallowed an external process connected to a vhostuser VIF type to access the QEMU guest's memory, which is required by the QEMU network driver functionality. The memory mappings are now marked as shared, and the external process to provide QEMU network is able to access the guest's memory. (BZ#1215790) * The termination of a WSGI application or an RPC server immediately stopped the service and interrupted requests that were in progress. This update adds a graceful handler for the SIGTERM signal sent to the parent WSGI process, so the termination is performed gracefully, which allows ongoing processes to continue. (BZ#1250269) * Previously, novaclient records requested time even when timing was set to False. As a consequence, system memory kept increasing. With this update, when timing is set to True, the time of each request is recorded and the timings are reset to clear the memory, which no longer increases. (BZ#1260868) * An earlier update changed the return value when no host devices were found when connecting to an iSCSI or iSER volume. Consequently, when no host devices were found, an exception was thrown and the connect volume attempt failed. This update adds an additional check to ensure os.path.exists(None) is never called. As a result, an exception is no longer thrown and the connect logic correctly retries finding present host devices. (BZ#1268051) * Compute's rootwrap filters restricted an `ln` command used by the volume encryption providers to a specific iSCSI related target path. Consequently, iSER, NFS, and FC volumes encountered failures because the `ln` command was rejected by Compute's rootwrap filters. This update makes Nova's rootwrap filters more generic when calling `ln` allowing the volume encryption providers to succeed. (BZ#1273466) * FCoE devices have different sysfs paths to standard FC devices. Consequently, Nova failed when attempting to attach an FCoE based volume to an instance as it assumed these paths were the same. This update ensures that the required PCI information is parsed from both FC and FCoE sysfs device paths. As a result, Nova now succeeds in attaching FCoE based volumes to instances. (BZ#1274054) * Nova failed to parse the output from the `multipath -l ${device}` command when errors were present. Consequently, the attaching and detaching of volumes could fail. This update corrects the find_multipath_device method to ensure that any errors present in the output from the aforementioned command are ignored. As a result, both the attaching and detaching of volumes will now succeed even if errors occur. (BZ#1275937) * Volumes were not correctly detached if an error was encountered during the attach process, and could be left attached to an instance, resulting in data loss. This update ensures that the volume is both detached and the connection to the volume closed in the event of a failure during the attach process. (BZ#1276011) * The ability of the libvirt driver to set the admin password has been added. To use this feature, run the following command: nova root-password [server] (BZ#1261100) 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. Red Hat Enterprise Linux OpenStack Platform 7 runs on Red Hat Enterprise Linux 7.2. The Red Hat Enterprise Linux OpenStack Platform 7 Release Notes contain the following: * An explanation of the way in which the provided components interact to form a working cloud computing environment. * Technology Previews, Recommended Practices, and Known Issues. * The channels required for Red Hat Enterprise Linux OpenStack Platform 7, including which channels need to be enabled and disabled. The Release Notes are available at: https://access.redhat.com/documentation/en/red-hat-enterprise-linux-opensta ck-platform/version-7/release-notes/ This update is available through 'yum update' on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see: https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Manageme nt/1/html/RHSM/index.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1249751 - centralized logging - fluentd is blocked from accessing Nova compute logs 1261100 - nova: Make set_admin_password work with the libvirt driver (via QEMU guest agent) 1268051 - volume attach failed with iser 1269119 - CVE-2015-7713 openstack-nova: network security group changes are not applied to running instances 1273466 - Nova volume encryptors attach volume fails for NFS and FC (rootwrap) 1274054 - When using a FCoE adapter instead of a FC adapter, volumes will fail to attach to the VM 1274875 - Rebase openstack-nova to 2015.1.2 1275937 - nova searches for wrong device unexpectedly when multipath device has faulty lun 6. Package List: OpenStack 7.0 Tools for RHEL 7: Source: python-novaclient-2.23.0-2.el7ost.src.rpm noarch: python-novaclient-2.23.0-2.el7ost.noarch.rpm python-novaclient-doc-2.23.0-2.el7ost.noarch.rpm Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7: Source: openstack-nova-2015.1.2-7.el7ost.src.rpm python-novaclient-2.23.0-2.el7ost.src.rpm noarch: openstack-nova-2015.1.2-7.el7ost.noarch.rpm openstack-nova-api-2015.1.2-7.el7ost.noarch.rpm openstack-nova-cells-2015.1.2-7.el7ost.noarch.rpm openstack-nova-cert-2015.1.2-7.el7ost.noarch.rpm openstack-nova-common-2015.1.2-7.el7ost.noarch.rpm openstack-nova-compute-2015.1.2-7.el7ost.noarch.rpm openstack-nova-conductor-2015.1.2-7.el7ost.noarch.rpm openstack-nova-console-2015.1.2-7.el7ost.noarch.rpm openstack-nova-doc-2015.1.2-7.el7ost.noarch.rpm openstack-nova-network-2015.1.2-7.el7ost.noarch.rpm openstack-nova-novncproxy-2015.1.2-7.el7ost.noarch.rpm openstack-nova-objectstore-2015.1.2-7.el7ost.noarch.rpm openstack-nova-scheduler-2015.1.2-7.el7ost.noarch.rpm openstack-nova-serialproxy-2015.1.2-7.el7ost.noarch.rpm openstack-nova-spicehtml5proxy-2015.1.2-7.el7ost.noarch.rpm python-nova-2015.1.2-7.el7ost.noarch.rpm python-novaclient-2.23.0-2.el7ost.noarch.rpm python-novaclient-doc-2.23.0-2.el7ost.noarch.rpm OpenStack 7.0 Tools for RHEL 7: Source: python-novaclient-2.23.0-2.el7ost.src.rpm noarch: python-novaclient-2.23.0-2.el7ost.noarch.rpm python-novaclient-doc-2.23.0-2.el7ost.noarch.rpm OpenStack 7.0 Tools for RHEL 7: Source: python-novaclient-2.23.0-2.el7ost.src.rpm noarch: python-novaclient-2.23.0-2.el7ost.noarch.rpm python-novaclient-doc-2.23.0-2.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7713 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWeFXDXlSAg2UNWIIRAhyuAKCfboFIk9a0+gpO048GD0jsrzXqiwCfcFjr nnqbFNlnkdJxFO/UNf3Fs8Q= =0Vid -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 21 19:42:08 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 21 Dec 2015 19:42:08 +0000 Subject: [RHSA-2015:2684-01] Moderate: openstack-nova secuity and bug fix advisory Message-ID: <201512211942.tBLJg8kx021665@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-nova secuity and bug fix advisory Advisory ID: RHSA-2015:2684-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2684.html Issue date: 2015-12-21 CVE Names: CVE-2015-7713 ===================================================================== 1. Summary: Updated OpenStack Compute packages that resolve one security issue and a bug are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7 - noarch 3. Description: OpenStack Compute (nova) launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A vulnerability was discovered in the way OpenStack Compute (nova) networking handled security group updates; changes were not applied to already running VM instances. A remote attacker could use this flaw to access running VM instances. (CVE-2015-7713) Additional bug fixes include: * In some cases, Compute did not start instances when RHEL was installed with a locale other than en_US. The update ensures that logging an exception no longer causes Unicode issues. (BZ#1190837) All openstack-nova users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. Red Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 7.2. The Red Hat Enterprise Linux OpenStack Platform 5 Release Notes contain the following: * An explanation of the way in which the provided components interact to form a working cloud computing environment. * Technology Previews, Recommended Practices, and Known Issues. * The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled. The Release Notes are available at: https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux _OpenStack_Platform/5/html/Release_Notes/index.html This update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1190837 - Nova may not start instances when OS is installed with locale not en_US 1269119 - CVE-2015-7713 openstack-nova: network security group changes are not applied to running instances 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7: Source: openstack-nova-2014.1.5-9.el7ost.src.rpm noarch: openstack-nova-2014.1.5-9.el7ost.noarch.rpm openstack-nova-api-2014.1.5-9.el7ost.noarch.rpm openstack-nova-cells-2014.1.5-9.el7ost.noarch.rpm openstack-nova-cert-2014.1.5-9.el7ost.noarch.rpm openstack-nova-common-2014.1.5-9.el7ost.noarch.rpm openstack-nova-compute-2014.1.5-9.el7ost.noarch.rpm openstack-nova-conductor-2014.1.5-9.el7ost.noarch.rpm openstack-nova-console-2014.1.5-9.el7ost.noarch.rpm openstack-nova-doc-2014.1.5-9.el7ost.noarch.rpm openstack-nova-network-2014.1.5-9.el7ost.noarch.rpm openstack-nova-novncproxy-2014.1.5-9.el7ost.noarch.rpm openstack-nova-objectstore-2014.1.5-9.el7ost.noarch.rpm openstack-nova-scheduler-2014.1.5-9.el7ost.noarch.rpm openstack-nova-serialproxy-2014.1.5-9.el7ost.noarch.rpm python-nova-2014.1.5-9.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7713 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWeFYJXlSAg2UNWIIRAvBfAJ4ks/IB46fOZLfc9HiUR4IwMecHHACeLSgF g+RJajxoWk7RyV74xgsTlOk= =GJJK -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Dec 21 19:42:32 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 21 Dec 2015 19:42:32 +0000 Subject: [RHSA-2015:2685-01] Important: openstack-ironic-discoverd security update Message-ID: <201512211942.tBLJgWtk025172@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openstack-ironic-discoverd security update Advisory ID: RHSA-2015:2685-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2685.html Issue date: 2015-12-21 CVE Names: CVE-2015-5306 ===================================================================== 1. Summary: Updated openstack-ironic-discoverd packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 6.0. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 6.0 for RHEL 7 - noarch 3. Description: OpenStack Bare Metal (ironic) is a tool used to provision bare metal (as opposed to virtual) machines. It leverages common technologies such as PXE boot and IPMI to cover a wide range of hardware. It also supports pluggable drivers to allow added, vendor-specific functionality. It was discovered that enabling debug mode in openstack-ironic-discoverd also enabled debug mode in the underlying Flask framework. If errors were encountered while Flask was in debug mode, a user experiencing an error might be able to access the debug console (effectively, a command shell). (CVE-2015-5306) Please note that this package is a Technology Preview and should not be used in production. All openstack-ironic-discoverd users are advised to upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1273698 - CVE-2015-5306 openstack-ironic-discoverd: potential remote code execution with debug mode enabled 6. Package List: Red Hat Enterprise Linux OpenStack Platform 6.0 for RHEL 7: Source: openstack-ironic-discoverd-0.2.5-2.el7ost.src.rpm noarch: openstack-ironic-discoverd-0.2.5-2.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5306 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWeFYdXlSAg2UNWIIRAvwUAJ91P5APQMfFyQU26VHg6yV/VoItEwCfeNPf UpcWtj/OopvAKC2J2cxqR/c= =olK5 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 22 15:27:37 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Dec 2015 10:27:37 -0500 Subject: [RHSA-2015:2694-01] Important: qemu-kvm security update Message-ID: <201512221527.tBMFRbqN017878@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2015:2694-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2694.html Issue date: 2015-12-22 CVE Names: CVE-2015-7504 CVE-2015-7512 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix two security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU's AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user (with the CAP_SYS_RAWIO capability) inside a guest could use this flaw to crash the host QEMU process (resulting in denial of service) or, potentially, execute arbitrary code with privileges of the host QEMU process. (CVE-2015-7504) A buffer overflow flaw was found in the way QEMU's AMD PC-Net II emulation validated certain received packets from a remote host in non-loopback mode. A remote, unprivileged attacker could potentially use this flaw to execute arbitrary code on the host with the privileges of the QEMU process. Note that to exploit this flaw, the guest network interface must have a large MTU limit. (CVE-2015-7512) Red Hat would like to thank Qinghao Tang of QIHU 360 Marvel Team and Ling Liu of Qihoo 360 Inc. for reporting the CVE-2015-7504 issue, and Ling Liu of Qihoo 360 Inc. for reporting the CVE-2015-7512 issue. The CVE-2015-7512 issue was independently discovered by Jason Wang of Red Hat. All qemu-kvm users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1261461 - CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive 1285061 - CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm i386: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm i386: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.i686.rpm ppc64: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.ppc64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.ppc64.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm i386: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7504 https://access.redhat.com/security/cve/CVE-2015-7512 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWeWvnXlSAg2UNWIIRAnt+AKC2Jt5kBYpaeyAE4l82FKTFzuzPZQCeJV8Y spEstQ1UDGzb1w7O7iv/gVM= =k+SB -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 22 15:27:44 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Dec 2015 10:27:44 -0500 Subject: [RHSA-2015:2695-01] Important: qemu-kvm-rhev security update Message-ID: <201512221527.tBMFRiEq014088@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm-rhev security update Advisory ID: RHSA-2015:2695-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2695.html Issue date: 2015-12-22 CVE Names: CVE-2015-7504 CVE-2015-7512 ===================================================================== 1. Summary: Updated qemu-kvm-rhev packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU's AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user (with the CAP_SYS_RAWIO capability) inside a guest could use this flaw to crash the host QEMU process (resulting in denial of service) or, potentially, execute arbitrary code with privileges of the host QEMU process. (CVE-2015-7504) A buffer overflow flaw was found in the way QEMU's AMD PC-Net II emulation validated certain received packets from a remote host in non-loopback mode. A remote, unprivileged attacker could potentially use this flaw to execute arbitrary code on the host with the privileges of the QEMU process. Note that to exploit this flaw, the guest network interface must have a large MTU limit. (CVE-2015-7512) Red Hat would like to thank Qinghao Tang of QIHU 360 Marvel Team and Ling Liu of Qihoo 360 Inc. for reporting the CVE-2015-7504 issue, and Ling Liu of Qihoo 360 Inc. for reporting the CVE-2015-7512 issue. The CVE-2015-7512 issue was independently discovered by Jason Wang of Red Hat. All qemu-kvm-rhev users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1261461 - CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive 1285061 - CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mode 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6: Source: qemu-kvm-rhev-0.12.1.2-2.479.el6_7.3.src.rpm x86_64: qemu-img-rhev-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-rhev-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-rhev-debuginfo-0.12.1.2-2.479.el6_7.3.x86_64.rpm qemu-kvm-rhev-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-7504 https://access.redhat.com/security/cve/CVE-2015-7512 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWeWvvXlSAg2UNWIIRAnRkAJ46Z3L+bfu1MNgK/NSYnry5W/8ClwCgnu7f SweeM0zU02q+R+woLzyTX9Y= =nUUG -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Dec 29 11:55:38 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 29 Dec 2015 11:55:38 +0000 Subject: [RHSA-2015:2697-01] Critical: flash-plugin security update Message-ID: <201512291155.tBTBthYp026577@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:2697-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html Issue date: 2015-12-29 CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634 CVE-2015-8635 CVE-2015-8636 CVE-2015-8638 CVE-2015-8639 CVE-2015-8640 CVE-2015-8641 CVE-2015-8642 CVE-2015-8643 CVE-2015-8644 CVE-2015-8645 CVE-2015-8646 CVE-2015-8647 CVE-2015-8648 CVE-2015-8649 CVE-2015-8650 CVE-2015-8651 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.559. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.559-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.559-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.559-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.559-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.559-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.559-1.el6_7.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.559-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.559-1.el6_7.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.559-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.559-1.el6_7.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8459 https://access.redhat.com/security/cve/CVE-2015-8460 https://access.redhat.com/security/cve/CVE-2015-8634 https://access.redhat.com/security/cve/CVE-2015-8635 https://access.redhat.com/security/cve/CVE-2015-8636 https://access.redhat.com/security/cve/CVE-2015-8638 https://access.redhat.com/security/cve/CVE-2015-8639 https://access.redhat.com/security/cve/CVE-2015-8640 https://access.redhat.com/security/cve/CVE-2015-8641 https://access.redhat.com/security/cve/CVE-2015-8642 https://access.redhat.com/security/cve/CVE-2015-8643 https://access.redhat.com/security/cve/CVE-2015-8644 https://access.redhat.com/security/cve/CVE-2015-8645 https://access.redhat.com/security/cve/CVE-2015-8646 https://access.redhat.com/security/cve/CVE-2015-8647 https://access.redhat.com/security/cve/CVE-2015-8648 https://access.redhat.com/security/cve/CVE-2015-8649 https://access.redhat.com/security/cve/CVE-2015-8650 https://access.redhat.com/security/cve/CVE-2015-8651 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb16-01.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU xm8a97tVCxdqrTr2yuTCblQ= =AUkv -----END PGP SIGNATURE-----