From bugzilla at redhat.com Tue Jun 2 15:55:58 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 2 Jun 2015 11:55:58 -0400 Subject: [RHSA-2015:1042-01] Important: kernel security and bug fix update Message-ID: <201506021555.t52Ftw9B013402@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:1042-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1042.html Issue date: 2015-06-02 CVE Names: CVE-2015-1805 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) The security impact of this issue was discovered by Red Hat. This update fixes the following bugs: * Due to a bug in the lpfc_device_reset_handler() function, a scsi command timeout could lead to a system crash. With this update, lpfc_device_reset_handler recovers storage without crashing. (BZ#1070964) * Due to the code decrementing the reclaim_in_progress counter without having incremented it first, severe spinlock contention occurred in the shrink_zone() function even though the vm.max_reclaims_in_progress feature was set to 1. This update provides a patch fixing the underlying source code, and spinlock contention no longer occurs in this scenario. (BZ#1164105) * A TCP socket using SACK that had a retransmission but recovered from it, failed to reset the retransmission timestamp. As a consequence, on certain connections, if a packet had to be re-transmitted, the retrans_stamp variable was only cleared when the next acked packet was received. This could lead to an early abortion of the TCP connection if this next packet also got lost. With this update, the socket clears retrans_stamp when the recovery is completed, thus fixing the bug. (BZ#1205521) * Previously, the signal delivery paths did not clear the TS_USEDFPU flag, which could cause problems in the switch_to() function and lead to floating-point unit (FPU) corruption. With this update, TS_USEDFPU is cleared as expected, and FPU is no longer under threat of corruption. (BZ#1193505) * A race condition in the exit_sem() function previously caused the semaphore undo list corruption. As a consequence, a kernel crash could occur. The corruption in the semaphore undo list has been fixed, and the kernel no longer crashes in this situation. (BZ#1124574) * Previously, when running the "virsh blockresize [Device] [Newsize]" command to resize the disk, the new size was not reflected in a Red Hat Enterprise Linux 5 Virtual Machine (VM). With this update, the new size is now reflected online immediately in a Red Hat Enterprise Linux 5 VM so it is no longer necessary to reboot the VM to see the new disk size. (BZ#1200855) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: kernel-2.6.18-406.el5.src.rpm i386: kernel-2.6.18-406.el5.i686.rpm kernel-PAE-2.6.18-406.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm kernel-PAE-devel-2.6.18-406.el5.i686.rpm kernel-debug-2.6.18-406.el5.i686.rpm kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm kernel-debug-devel-2.6.18-406.el5.i686.rpm kernel-debuginfo-2.6.18-406.el5.i686.rpm kernel-debuginfo-common-2.6.18-406.el5.i686.rpm kernel-devel-2.6.18-406.el5.i686.rpm kernel-headers-2.6.18-406.el5.i386.rpm kernel-xen-2.6.18-406.el5.i686.rpm kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm kernel-xen-devel-2.6.18-406.el5.i686.rpm noarch: kernel-doc-2.6.18-406.el5.noarch.rpm x86_64: kernel-2.6.18-406.el5.x86_64.rpm kernel-debug-2.6.18-406.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm kernel-debug-devel-2.6.18-406.el5.x86_64.rpm kernel-debuginfo-2.6.18-406.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm kernel-devel-2.6.18-406.el5.x86_64.rpm kernel-headers-2.6.18-406.el5.x86_64.rpm kernel-xen-2.6.18-406.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm kernel-xen-devel-2.6.18-406.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: kernel-2.6.18-406.el5.src.rpm i386: kernel-2.6.18-406.el5.i686.rpm kernel-PAE-2.6.18-406.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm kernel-PAE-devel-2.6.18-406.el5.i686.rpm kernel-debug-2.6.18-406.el5.i686.rpm kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm kernel-debug-devel-2.6.18-406.el5.i686.rpm kernel-debuginfo-2.6.18-406.el5.i686.rpm kernel-debuginfo-common-2.6.18-406.el5.i686.rpm kernel-devel-2.6.18-406.el5.i686.rpm kernel-headers-2.6.18-406.el5.i386.rpm kernel-xen-2.6.18-406.el5.i686.rpm kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm kernel-xen-devel-2.6.18-406.el5.i686.rpm ia64: kernel-2.6.18-406.el5.ia64.rpm kernel-debug-2.6.18-406.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-406.el5.ia64.rpm kernel-debug-devel-2.6.18-406.el5.ia64.rpm kernel-debuginfo-2.6.18-406.el5.ia64.rpm kernel-debuginfo-common-2.6.18-406.el5.ia64.rpm kernel-devel-2.6.18-406.el5.ia64.rpm kernel-headers-2.6.18-406.el5.ia64.rpm kernel-xen-2.6.18-406.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-406.el5.ia64.rpm kernel-xen-devel-2.6.18-406.el5.ia64.rpm noarch: kernel-doc-2.6.18-406.el5.noarch.rpm ppc: kernel-2.6.18-406.el5.ppc64.rpm kernel-debug-2.6.18-406.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-406.el5.ppc64.rpm kernel-debug-devel-2.6.18-406.el5.ppc64.rpm kernel-debuginfo-2.6.18-406.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-406.el5.ppc64.rpm kernel-devel-2.6.18-406.el5.ppc64.rpm kernel-headers-2.6.18-406.el5.ppc.rpm kernel-headers-2.6.18-406.el5.ppc64.rpm kernel-kdump-2.6.18-406.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-406.el5.ppc64.rpm kernel-kdump-devel-2.6.18-406.el5.ppc64.rpm s390x: kernel-2.6.18-406.el5.s390x.rpm kernel-debug-2.6.18-406.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-406.el5.s390x.rpm kernel-debug-devel-2.6.18-406.el5.s390x.rpm kernel-debuginfo-2.6.18-406.el5.s390x.rpm kernel-debuginfo-common-2.6.18-406.el5.s390x.rpm kernel-devel-2.6.18-406.el5.s390x.rpm kernel-headers-2.6.18-406.el5.s390x.rpm kernel-kdump-2.6.18-406.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-406.el5.s390x.rpm kernel-kdump-devel-2.6.18-406.el5.s390x.rpm x86_64: kernel-2.6.18-406.el5.x86_64.rpm kernel-debug-2.6.18-406.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm kernel-debug-devel-2.6.18-406.el5.x86_64.rpm kernel-debuginfo-2.6.18-406.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm kernel-devel-2.6.18-406.el5.x86_64.rpm kernel-headers-2.6.18-406.el5.x86_64.rpm kernel-xen-2.6.18-406.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm kernel-xen-devel-2.6.18-406.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVbdIMXlSAg2UNWIIRAni7AKCg47vkZ8kW/uaUYcnpepcnruLtJgCeKQm7 4DZ6Dhtsga7eLy9MlVGQt48= =tt4s -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 3 10:42:14 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 3 Jun 2015 10:42:14 +0000 Subject: [RHSA-2015:1043-01] Important: virtio-win security and bug fix update Message-ID: <201506031042.t53AgEKS032101@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: virtio-win security and bug fix update Advisory ID: RHSA-2015:1043-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1043.html Issue date: 2015-06-03 CVE Names: CVE-2015-3215 ===================================================================== 1. Summary: An updated virtio-win package that fixes one security issue and two bugs is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - noarch Red Hat Enterprise Linux Server Supplementary (v. 6) - noarch Red Hat Enterprise Linux Workstation Supplementary (v. 6) - noarch 3. Description: The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. It was found that the Windows Virtio NIC driver did not sufficiently sanitize the length of the incoming IP packets, as demonstrated by a packet with IP options present but the overall packet length not being adjusted to reflect the length of those options. A remote attacker able to send a specially crafted IP packet to the guest could use this flaw to crash that guest. (CVE-2015-3215) Red Hat would like to thank Google Project Zero for reporting this issue. This update also fixes the following bugs: * When creating a Windows guest using virtio drivers and direct Logical Unit Number (LUN) access with more than 4 SCSI disks under one virtio-scsi-pci controller, the guest terminated unexpectedly with a stop error, also known as the blue screen of death. This update increases the maximum amount of LUNs per a single virtio-scsi-pci controller has been increased to 254, which prevents the described crash from occurring. (BZ#1210196) * The license.txt file in the virtio-win build has been updated to include the correct year number in the copyright information section. (BZ#1210195) All virtio-win users are advised to upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1227634 - CVE-2015-3215 virtio-win: netkvm: malformed packet can cause BSOD 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): noarch: virtio-win-1.7.4-1.el6_6.noarch.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): noarch: virtio-win-1.7.4-1.el6_6.noarch.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): noarch: virtio-win-1.7.4-1.el6_6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3215 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVbtnyXlSAg2UNWIIRAktHAJ9G4wCxjVy19ykFvCA96CKZyX/cxwCeL9WG aC0UiYGeb9CdnBWwWCoMjPo= =C3CV -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 3 10:42:52 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 3 Jun 2015 10:42:52 +0000 Subject: [RHSA-2015:1044-01] Important: virtio-win security and bug fix update Message-ID: <201506031042.t53Agrb0027849@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: virtio-win security and bug fix update Advisory ID: RHSA-2015:1044-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1044.html Issue date: 2015-06-03 CVE Names: CVE-2015-3215 ===================================================================== 1. Summary: An updated virtio-win package that fixes one security issue and two bugs is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - noarch Red Hat Enterprise Linux Server Supplementary (v. 7) - noarch Red Hat Enterprise Linux Workstation Supplementary (v. 7) - noarch 3. Description: The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. It was found that the Windows Virtio NIC driver did not sufficiently sanitize the length of the incoming IP packets, as demonstrated by a packet with IP options present but the overall packet length not being adjusted to reflect the length of those options. A remote attacker able to send a specially crafted IP packet to the guest could use this flaw to crash that guest. (CVE-2015-3215) Red Hat would like to thank Google Project Zero for reporting this issue. This update also fixes the following bugs: * When creating a Windows guest using virtio drivers and direct Logical Unit Number (LUN) access with more than 4 SCSI disks under one virtio-scsi-pci controller, the guest terminated unexpectedly with a stop error, also known as the blue screen of death. This update increases the maximum amount of LUNs per a single virtio-scsi-pci controller has been increased to 254, which prevents the described crash from occurring. (BZ#1207546) * The license.txt file in the virtio-win build has been updated to include the correct year number in the copyright information section. (BZ#1183427) All virtio-win users are advised to upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1227634 - CVE-2015-3215 virtio-win: netkvm: malformed packet can cause BSOD 6. Package List: Red Hat Enterprise Linux Client Supplementary (v. 7): noarch: virtio-win-1.7.4-1.el7.noarch.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): noarch: virtio-win-1.7.4-1.el7.noarch.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): noarch: virtio-win-1.7.4-1.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3215 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVbtoXXlSAg2UNWIIRArA7AJ4l7daRTnOQv8OzvvGpy66GMJq8bACfTxn8 tqp5rZec2PENNhFPVO8zls8= =2niV -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 4 09:07:24 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Jun 2015 09:07:24 +0000 Subject: [RHSA-2015:1052-01] Moderate: thermostat1 security, bug fix, and enhancement update Message-ID: <201506040907.t5497PIu009490@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: thermostat1 security, bug fix, and enhancement update Advisory ID: RHSA-2015:1052-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1052.html Issue date: 2015-06-04 CVE Names: CVE-2015-3201 ===================================================================== 1. Summary: Updated thermostat1 collection packages that fix one security issue, several bugs, and add various enhancements are now available as part of Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Thermostat is a monitoring and instrumentation tool for the OpenJDK HotSpot Java Virtual Machine (JVM) with support for monitoring multiple JVM instances. Thermostat supports monitoring and gathering performance data from JVMs running on the same machine, a remote machine, or across a network. The tool consists of three components: an agent, which collects data, a client, which allows users to visualize collected data, and a storage layer, over which the agent and the client communicate. A pluggable agent and GUI framework allow users to collect and visualize performance data beyond what is included out of the box. The thermostat1 packages have been upgraded to upstream version 1.2.0, which provides a number of bug fixes and enhancements over the previous version. Among others: * A new instrumenting profiler plug-in has been added. * The setup of secured Thermostat using web storage has been simplified; the default setup has been changed to use HTTP-based storage. * Various improvements have been introduced, for example, in the Swing client GUI and in a number of charts. (BZ#1166688) The following security issue was fixed in the thermostat1-thermostat component: It was discovered that the Thermostat web application stored database authentication credentials in a world-readable configuration file. A local user on a system running the Thermostat web application could use this flaw to access and modify monitored JVM data, or perform actions on connected JVMs. (CVE-2015-3201) This issue was discovered by the Red Hat Thermostat Team. Users of thermostat1 are advised to upgrade to these updated packages, which fix these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221989 - CVE-2015-3201 thermostat: world-readable configuration file containing credentials 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: thermostat1-2.0-60.9.el6.src.rpm thermostat1-apache-commons-fileupload-1.3-60.7.el6.src.rpm thermostat1-jcommon-1.0.18-60.5.el6.src.rpm thermostat1-jfreechart-1.0.14-60.5.el6.src.rpm thermostat1-jline2-2.10-60.6.el6.src.rpm thermostat1-netty-3.6.3-60.4.el6.src.rpm thermostat1-thermostat-1.2.0-60.10.el6.src.rpm noarch: thermostat1-apache-commons-fileupload-1.3-60.7.el6.noarch.rpm thermostat1-apache-commons-fileupload-javadoc-1.3-60.7.el6.noarch.rpm thermostat1-jcommon-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-javadoc-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-xml-1.0.18-60.5.el6.noarch.rpm thermostat1-jfreechart-1.0.14-60.5.el6.noarch.rpm thermostat1-jfreechart-javadoc-1.0.14-60.5.el6.noarch.rpm thermostat1-jline2-2.10-60.6.el6.noarch.rpm thermostat1-jline2-javadoc-2.10-60.6.el6.noarch.rpm thermostat1-netty-3.6.3-60.4.el6.noarch.rpm thermostat1-netty-javadoc-3.6.3-60.4.el6.noarch.rpm thermostat1-thermostat-javadoc-1.2.0-60.10.el6.noarch.rpm thermostat1-thermostat-webapp-1.2.0-60.10.el6.noarch.rpm x86_64: thermostat1-2.0-60.9.el6.x86_64.rpm thermostat1-runtime-2.0-60.9.el6.x86_64.rpm thermostat1-scldevel-2.0-60.9.el6.x86_64.rpm thermostat1-thermostat-1.2.0-60.10.el6.x86_64.rpm thermostat1-thermostat-debuginfo-1.2.0-60.10.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: thermostat1-2.0-60.9.el6.src.rpm thermostat1-apache-commons-fileupload-1.3-60.7.el6.src.rpm thermostat1-jcommon-1.0.18-60.5.el6.src.rpm thermostat1-jfreechart-1.0.14-60.5.el6.src.rpm thermostat1-jline2-2.10-60.6.el6.src.rpm thermostat1-netty-3.6.3-60.4.el6.src.rpm thermostat1-thermostat-1.2.0-60.10.el6.src.rpm noarch: thermostat1-apache-commons-fileupload-1.3-60.7.el6.noarch.rpm thermostat1-apache-commons-fileupload-javadoc-1.3-60.7.el6.noarch.rpm thermostat1-jcommon-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-javadoc-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-xml-1.0.18-60.5.el6.noarch.rpm thermostat1-jfreechart-1.0.14-60.5.el6.noarch.rpm thermostat1-jfreechart-javadoc-1.0.14-60.5.el6.noarch.rpm thermostat1-jline2-2.10-60.6.el6.noarch.rpm thermostat1-jline2-javadoc-2.10-60.6.el6.noarch.rpm thermostat1-netty-3.6.3-60.4.el6.noarch.rpm thermostat1-netty-javadoc-3.6.3-60.4.el6.noarch.rpm thermostat1-thermostat-javadoc-1.2.0-60.10.el6.noarch.rpm thermostat1-thermostat-webapp-1.2.0-60.10.el6.noarch.rpm x86_64: thermostat1-2.0-60.9.el6.x86_64.rpm thermostat1-runtime-2.0-60.9.el6.x86_64.rpm thermostat1-scldevel-2.0-60.9.el6.x86_64.rpm thermostat1-thermostat-1.2.0-60.10.el6.x86_64.rpm thermostat1-thermostat-debuginfo-1.2.0-60.10.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: thermostat1-2.0-60.9.el6.src.rpm thermostat1-apache-commons-fileupload-1.3-60.7.el6.src.rpm thermostat1-jcommon-1.0.18-60.5.el6.src.rpm thermostat1-jfreechart-1.0.14-60.5.el6.src.rpm thermostat1-jline2-2.10-60.6.el6.src.rpm thermostat1-netty-3.6.3-60.4.el6.src.rpm thermostat1-thermostat-1.2.0-60.10.el6.src.rpm noarch: thermostat1-apache-commons-fileupload-1.3-60.7.el6.noarch.rpm thermostat1-apache-commons-fileupload-javadoc-1.3-60.7.el6.noarch.rpm thermostat1-jcommon-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-javadoc-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-xml-1.0.18-60.5.el6.noarch.rpm thermostat1-jfreechart-1.0.14-60.5.el6.noarch.rpm thermostat1-jfreechart-javadoc-1.0.14-60.5.el6.noarch.rpm thermostat1-jline2-2.10-60.6.el6.noarch.rpm thermostat1-jline2-javadoc-2.10-60.6.el6.noarch.rpm thermostat1-netty-3.6.3-60.4.el6.noarch.rpm thermostat1-netty-javadoc-3.6.3-60.4.el6.noarch.rpm thermostat1-thermostat-javadoc-1.2.0-60.10.el6.noarch.rpm thermostat1-thermostat-webapp-1.2.0-60.10.el6.noarch.rpm x86_64: thermostat1-2.0-60.9.el6.x86_64.rpm thermostat1-runtime-2.0-60.9.el6.x86_64.rpm thermostat1-scldevel-2.0-60.9.el6.x86_64.rpm thermostat1-thermostat-1.2.0-60.10.el6.x86_64.rpm thermostat1-thermostat-debuginfo-1.2.0-60.10.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: thermostat1-2.0-60.9.el6.src.rpm thermostat1-apache-commons-fileupload-1.3-60.7.el6.src.rpm thermostat1-jcommon-1.0.18-60.5.el6.src.rpm thermostat1-jfreechart-1.0.14-60.5.el6.src.rpm thermostat1-jline2-2.10-60.6.el6.src.rpm thermostat1-netty-3.6.3-60.4.el6.src.rpm thermostat1-thermostat-1.2.0-60.10.el6.src.rpm noarch: thermostat1-apache-commons-fileupload-1.3-60.7.el6.noarch.rpm thermostat1-apache-commons-fileupload-javadoc-1.3-60.7.el6.noarch.rpm thermostat1-jcommon-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-javadoc-1.0.18-60.5.el6.noarch.rpm thermostat1-jcommon-xml-1.0.18-60.5.el6.noarch.rpm thermostat1-jfreechart-1.0.14-60.5.el6.noarch.rpm thermostat1-jfreechart-javadoc-1.0.14-60.5.el6.noarch.rpm thermostat1-jline2-2.10-60.6.el6.noarch.rpm thermostat1-jline2-javadoc-2.10-60.6.el6.noarch.rpm thermostat1-netty-3.6.3-60.4.el6.noarch.rpm thermostat1-netty-javadoc-3.6.3-60.4.el6.noarch.rpm thermostat1-thermostat-javadoc-1.2.0-60.10.el6.noarch.rpm thermostat1-thermostat-webapp-1.2.0-60.10.el6.noarch.rpm x86_64: thermostat1-2.0-60.9.el6.x86_64.rpm thermostat1-runtime-2.0-60.9.el6.x86_64.rpm thermostat1-scldevel-2.0-60.9.el6.x86_64.rpm thermostat1-thermostat-1.2.0-60.10.el6.x86_64.rpm thermostat1-thermostat-debuginfo-1.2.0-60.10.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: thermostat1-2.0-70.9.el7.src.rpm thermostat1-apache-commons-fileupload-1.3-70.3.el7.src.rpm thermostat1-jcommon-1.0.18-70.5.el7.src.rpm thermostat1-jfreechart-1.0.14-70.4.el7.src.rpm thermostat1-jline2-2.10-70.3.el7.src.rpm thermostat1-netty-3.6.3-70.4.el7.src.rpm thermostat1-thermostat-1.2.0-70.12.el7.src.rpm noarch: thermostat1-apache-commons-fileupload-1.3-70.3.el7.noarch.rpm thermostat1-apache-commons-fileupload-javadoc-1.3-70.3.el7.noarch.rpm thermostat1-jcommon-1.0.18-70.5.el7.noarch.rpm thermostat1-jcommon-javadoc-1.0.18-70.5.el7.noarch.rpm thermostat1-jcommon-xml-1.0.18-70.5.el7.noarch.rpm thermostat1-jfreechart-1.0.14-70.4.el7.noarch.rpm thermostat1-jfreechart-javadoc-1.0.14-70.4.el7.noarch.rpm thermostat1-jline2-2.10-70.3.el7.noarch.rpm thermostat1-jline2-javadoc-2.10-70.3.el7.noarch.rpm thermostat1-netty-3.6.3-70.4.el7.noarch.rpm thermostat1-netty-javadoc-3.6.3-70.4.el7.noarch.rpm thermostat1-thermostat-javadoc-1.2.0-70.12.el7.noarch.rpm thermostat1-thermostat-webapp-1.2.0-70.12.el7.noarch.rpm x86_64: thermostat1-2.0-70.9.el7.x86_64.rpm thermostat1-runtime-2.0-70.9.el7.x86_64.rpm thermostat1-scldevel-2.0-70.9.el7.x86_64.rpm thermostat1-thermostat-1.2.0-70.12.el7.x86_64.rpm thermostat1-thermostat-debuginfo-1.2.0-70.12.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: thermostat1-2.0-70.9.el7.src.rpm thermostat1-apache-commons-fileupload-1.3-70.3.el7.src.rpm thermostat1-jcommon-1.0.18-70.5.el7.src.rpm thermostat1-jfreechart-1.0.14-70.4.el7.src.rpm thermostat1-jline2-2.10-70.3.el7.src.rpm thermostat1-netty-3.6.3-70.4.el7.src.rpm thermostat1-thermostat-1.2.0-70.12.el7.src.rpm noarch: thermostat1-apache-commons-fileupload-1.3-70.3.el7.noarch.rpm thermostat1-apache-commons-fileupload-javadoc-1.3-70.3.el7.noarch.rpm thermostat1-jcommon-1.0.18-70.5.el7.noarch.rpm thermostat1-jcommon-javadoc-1.0.18-70.5.el7.noarch.rpm thermostat1-jcommon-xml-1.0.18-70.5.el7.noarch.rpm thermostat1-jfreechart-1.0.14-70.4.el7.noarch.rpm thermostat1-jfreechart-javadoc-1.0.14-70.4.el7.noarch.rpm thermostat1-jline2-2.10-70.3.el7.noarch.rpm thermostat1-jline2-javadoc-2.10-70.3.el7.noarch.rpm thermostat1-netty-3.6.3-70.4.el7.noarch.rpm thermostat1-netty-javadoc-3.6.3-70.4.el7.noarch.rpm thermostat1-thermostat-javadoc-1.2.0-70.12.el7.noarch.rpm thermostat1-thermostat-webapp-1.2.0-70.12.el7.noarch.rpm x86_64: thermostat1-2.0-70.9.el7.x86_64.rpm thermostat1-runtime-2.0-70.9.el7.x86_64.rpm thermostat1-scldevel-2.0-70.9.el7.x86_64.rpm thermostat1-thermostat-1.2.0-70.12.el7.x86_64.rpm thermostat1-thermostat-debuginfo-1.2.0-70.12.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3201 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVcBUmXlSAg2UNWIIRAlt4AJ0XXELXtksCryBu0WkxpGRYyVm3GACfUSSI G/RP59cfZXq7zhKbPS2HJCQ= =Nu7W -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 4 09:09:48 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Jun 2015 09:09:48 +0000 Subject: [RHSA-2015:1053-01] Moderate: php55 security and bug fix update Message-ID: <201506040909.t5499mhd010992@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: php55 security and bug fix update Advisory ID: RHSA-2015:1053-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1053.html Issue date: 2015-06-04 CVE Names: CVE-2014-8142 CVE-2014-9427 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0273 CVE-2015-1351 CVE-2015-1352 CVE-2015-2301 CVE-2015-2305 CVE-2015-2348 CVE-2015-2787 CVE-2015-4147 CVE-2015-4148 ===================================================================== 1. Summary: Updated php55 collection packages that fix multiple security issues and several bugs are now available as part of Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The php55 packages provide a recent stable release of PHP with the PEAR 1.9.4, memcache 3.0.8, and mongo 1.4.5 PECL extensions, and a number of additional utilities. The php55 packages have been upgraded to upstream version 5.5.21, which provides multiple bug fixes over the version shipped in Red Hat Software Collections 1. (BZ#1057089) The following security issues were fixed in the php55-php component: An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-0232) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2014-8142, CVE-2015-0231, CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148) A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) A heap buffer overflow flaw was found in PHP's regular expression extension. An attacker able to make PHP process a specially crafted regular expression pattern could cause it to crash and possibly execute arbitrary code. (CVE-2015-2305) A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) A use-after-free flaw was found in PHP's OPcache extension. This flaw could possibly lead to a disclosure of a portion of the server memory. (CVE-2015-1351) A use-after-free flaw was found in PHP's phar (PHP Archive) extension. An attacker able to trigger certain error condition in phar archive processing could possibly use this flaw to disclose certain portions of server memory. (CVE-2015-2301) An ouf-of-bounds read flaw was found in the way the File Information (fileinfo) extension processed certain Pascal strings. A remote attacker could cause a PHP application to crash if it used fileinfo to identify the type of the attacker-supplied file. (CVE-2014-9652) It was found that PHP move_uploaded_file() function did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-2348) A NULL pointer dereference flaw was found in PHP's pgsql extension. A specially crafted table name passed to a function such as pg_insert() or pg_select() could cause a PHP application to crash. (CVE-2015-1352) A flaw was found in the way PHP handled malformed source files when running in CGI mode. A specially crafted PHP file could cause PHP CGI to crash. (CVE-2014-9427) All php55 users are advised to upgrade to these updated packages, which correct these issues. After installing the updated packages, the httpd24-httpd service must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1132446 - php55-php-fpm misinterpreting error_log=syslog 1175718 - CVE-2014-8142 php: use after free vulnerability in unserialize() 1178736 - CVE-2014-9427 php: out of bounds read when parsing a crafted .php file 1185397 - CVE-2015-0231 php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) 1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c 1185900 - CVE-2015-1351 php: use after free in opcache extension 1185904 - CVE-2015-1352 php: NULL pointer dereference in pgsql extension 1188599 - CVE-2014-9652 file: out of bounds read in mconvert() 1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c 1191049 - CVE-2015-2305 regex: heap overflow in regcomp() on 32-bit architectures 1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone 1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict() 1194747 - CVE-2015-2301 php: use after free in phar_object.c 1204868 - CVE-2015-4147 php: SoapClient's __call() type confusion through unserialize() 1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re 1207682 - CVE-2015-2348 php: move_uploaded_file() NUL byte injection in file name 1226916 - CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize() 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: php55-2.0-1.el6.src.rpm php55-php-5.5.21-2.el6.src.rpm x86_64: php55-2.0-1.el6.x86_64.rpm php55-php-5.5.21-2.el6.x86_64.rpm php55-php-bcmath-5.5.21-2.el6.x86_64.rpm php55-php-cli-5.5.21-2.el6.x86_64.rpm php55-php-common-5.5.21-2.el6.x86_64.rpm php55-php-dba-5.5.21-2.el6.x86_64.rpm php55-php-debuginfo-5.5.21-2.el6.x86_64.rpm php55-php-devel-5.5.21-2.el6.x86_64.rpm php55-php-enchant-5.5.21-2.el6.x86_64.rpm php55-php-fpm-5.5.21-2.el6.x86_64.rpm php55-php-gd-5.5.21-2.el6.x86_64.rpm php55-php-gmp-5.5.21-2.el6.x86_64.rpm php55-php-imap-5.5.21-2.el6.x86_64.rpm php55-php-intl-5.5.21-2.el6.x86_64.rpm php55-php-ldap-5.5.21-2.el6.x86_64.rpm php55-php-mbstring-5.5.21-2.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-2.el6.x86_64.rpm php55-php-odbc-5.5.21-2.el6.x86_64.rpm php55-php-opcache-5.5.21-2.el6.x86_64.rpm php55-php-pdo-5.5.21-2.el6.x86_64.rpm php55-php-pgsql-5.5.21-2.el6.x86_64.rpm php55-php-process-5.5.21-2.el6.x86_64.rpm php55-php-pspell-5.5.21-2.el6.x86_64.rpm php55-php-recode-5.5.21-2.el6.x86_64.rpm php55-php-snmp-5.5.21-2.el6.x86_64.rpm php55-php-soap-5.5.21-2.el6.x86_64.rpm php55-php-tidy-5.5.21-2.el6.x86_64.rpm php55-php-xml-5.5.21-2.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-2.el6.x86_64.rpm php55-runtime-2.0-1.el6.x86_64.rpm php55-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: php55-2.0-1.el6.src.rpm php55-php-5.5.21-2.el6.src.rpm x86_64: php55-2.0-1.el6.x86_64.rpm php55-php-5.5.21-2.el6.x86_64.rpm php55-php-bcmath-5.5.21-2.el6.x86_64.rpm php55-php-cli-5.5.21-2.el6.x86_64.rpm php55-php-common-5.5.21-2.el6.x86_64.rpm php55-php-dba-5.5.21-2.el6.x86_64.rpm php55-php-debuginfo-5.5.21-2.el6.x86_64.rpm php55-php-devel-5.5.21-2.el6.x86_64.rpm php55-php-enchant-5.5.21-2.el6.x86_64.rpm php55-php-fpm-5.5.21-2.el6.x86_64.rpm php55-php-gd-5.5.21-2.el6.x86_64.rpm php55-php-gmp-5.5.21-2.el6.x86_64.rpm php55-php-imap-5.5.21-2.el6.x86_64.rpm php55-php-intl-5.5.21-2.el6.x86_64.rpm php55-php-ldap-5.5.21-2.el6.x86_64.rpm php55-php-mbstring-5.5.21-2.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-2.el6.x86_64.rpm php55-php-odbc-5.5.21-2.el6.x86_64.rpm php55-php-opcache-5.5.21-2.el6.x86_64.rpm php55-php-pdo-5.5.21-2.el6.x86_64.rpm php55-php-pgsql-5.5.21-2.el6.x86_64.rpm php55-php-process-5.5.21-2.el6.x86_64.rpm php55-php-pspell-5.5.21-2.el6.x86_64.rpm php55-php-recode-5.5.21-2.el6.x86_64.rpm php55-php-snmp-5.5.21-2.el6.x86_64.rpm php55-php-soap-5.5.21-2.el6.x86_64.rpm php55-php-tidy-5.5.21-2.el6.x86_64.rpm php55-php-xml-5.5.21-2.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-2.el6.x86_64.rpm php55-runtime-2.0-1.el6.x86_64.rpm php55-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: php55-2.0-1.el6.src.rpm php55-php-5.5.21-2.el6.src.rpm x86_64: php55-2.0-1.el6.x86_64.rpm php55-php-5.5.21-2.el6.x86_64.rpm php55-php-bcmath-5.5.21-2.el6.x86_64.rpm php55-php-cli-5.5.21-2.el6.x86_64.rpm php55-php-common-5.5.21-2.el6.x86_64.rpm php55-php-dba-5.5.21-2.el6.x86_64.rpm php55-php-debuginfo-5.5.21-2.el6.x86_64.rpm php55-php-devel-5.5.21-2.el6.x86_64.rpm php55-php-enchant-5.5.21-2.el6.x86_64.rpm php55-php-fpm-5.5.21-2.el6.x86_64.rpm php55-php-gd-5.5.21-2.el6.x86_64.rpm php55-php-gmp-5.5.21-2.el6.x86_64.rpm php55-php-imap-5.5.21-2.el6.x86_64.rpm php55-php-intl-5.5.21-2.el6.x86_64.rpm php55-php-ldap-5.5.21-2.el6.x86_64.rpm php55-php-mbstring-5.5.21-2.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-2.el6.x86_64.rpm php55-php-odbc-5.5.21-2.el6.x86_64.rpm php55-php-opcache-5.5.21-2.el6.x86_64.rpm php55-php-pdo-5.5.21-2.el6.x86_64.rpm php55-php-pgsql-5.5.21-2.el6.x86_64.rpm php55-php-process-5.5.21-2.el6.x86_64.rpm php55-php-pspell-5.5.21-2.el6.x86_64.rpm php55-php-recode-5.5.21-2.el6.x86_64.rpm php55-php-snmp-5.5.21-2.el6.x86_64.rpm php55-php-soap-5.5.21-2.el6.x86_64.rpm php55-php-tidy-5.5.21-2.el6.x86_64.rpm php55-php-xml-5.5.21-2.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-2.el6.x86_64.rpm php55-runtime-2.0-1.el6.x86_64.rpm php55-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: php55-2.0-1.el6.src.rpm php55-php-5.5.21-2.el6.src.rpm x86_64: php55-2.0-1.el6.x86_64.rpm php55-php-5.5.21-2.el6.x86_64.rpm php55-php-bcmath-5.5.21-2.el6.x86_64.rpm php55-php-cli-5.5.21-2.el6.x86_64.rpm php55-php-common-5.5.21-2.el6.x86_64.rpm php55-php-dba-5.5.21-2.el6.x86_64.rpm php55-php-debuginfo-5.5.21-2.el6.x86_64.rpm php55-php-devel-5.5.21-2.el6.x86_64.rpm php55-php-enchant-5.5.21-2.el6.x86_64.rpm php55-php-fpm-5.5.21-2.el6.x86_64.rpm php55-php-gd-5.5.21-2.el6.x86_64.rpm php55-php-gmp-5.5.21-2.el6.x86_64.rpm php55-php-imap-5.5.21-2.el6.x86_64.rpm php55-php-intl-5.5.21-2.el6.x86_64.rpm php55-php-ldap-5.5.21-2.el6.x86_64.rpm php55-php-mbstring-5.5.21-2.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-2.el6.x86_64.rpm php55-php-odbc-5.5.21-2.el6.x86_64.rpm php55-php-opcache-5.5.21-2.el6.x86_64.rpm php55-php-pdo-5.5.21-2.el6.x86_64.rpm php55-php-pgsql-5.5.21-2.el6.x86_64.rpm php55-php-process-5.5.21-2.el6.x86_64.rpm php55-php-pspell-5.5.21-2.el6.x86_64.rpm php55-php-recode-5.5.21-2.el6.x86_64.rpm php55-php-snmp-5.5.21-2.el6.x86_64.rpm php55-php-soap-5.5.21-2.el6.x86_64.rpm php55-php-tidy-5.5.21-2.el6.x86_64.rpm php55-php-xml-5.5.21-2.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-2.el6.x86_64.rpm php55-runtime-2.0-1.el6.x86_64.rpm php55-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: php55-2.0-1.el7.src.rpm php55-php-5.5.21-2.el7.src.rpm x86_64: php55-2.0-1.el7.x86_64.rpm php55-php-5.5.21-2.el7.x86_64.rpm php55-php-bcmath-5.5.21-2.el7.x86_64.rpm php55-php-cli-5.5.21-2.el7.x86_64.rpm php55-php-common-5.5.21-2.el7.x86_64.rpm php55-php-dba-5.5.21-2.el7.x86_64.rpm php55-php-debuginfo-5.5.21-2.el7.x86_64.rpm php55-php-devel-5.5.21-2.el7.x86_64.rpm php55-php-enchant-5.5.21-2.el7.x86_64.rpm php55-php-fpm-5.5.21-2.el7.x86_64.rpm php55-php-gd-5.5.21-2.el7.x86_64.rpm php55-php-gmp-5.5.21-2.el7.x86_64.rpm php55-php-intl-5.5.21-2.el7.x86_64.rpm php55-php-ldap-5.5.21-2.el7.x86_64.rpm php55-php-mbstring-5.5.21-2.el7.x86_64.rpm php55-php-mysqlnd-5.5.21-2.el7.x86_64.rpm php55-php-odbc-5.5.21-2.el7.x86_64.rpm php55-php-opcache-5.5.21-2.el7.x86_64.rpm php55-php-pdo-5.5.21-2.el7.x86_64.rpm php55-php-pgsql-5.5.21-2.el7.x86_64.rpm php55-php-process-5.5.21-2.el7.x86_64.rpm php55-php-pspell-5.5.21-2.el7.x86_64.rpm php55-php-recode-5.5.21-2.el7.x86_64.rpm php55-php-snmp-5.5.21-2.el7.x86_64.rpm php55-php-soap-5.5.21-2.el7.x86_64.rpm php55-php-xml-5.5.21-2.el7.x86_64.rpm php55-php-xmlrpc-5.5.21-2.el7.x86_64.rpm php55-runtime-2.0-1.el7.x86_64.rpm php55-scldevel-2.0-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: php55-2.0-1.el7.src.rpm php55-php-5.5.21-2.el7.src.rpm x86_64: php55-2.0-1.el7.x86_64.rpm php55-php-5.5.21-2.el7.x86_64.rpm php55-php-bcmath-5.5.21-2.el7.x86_64.rpm php55-php-cli-5.5.21-2.el7.x86_64.rpm php55-php-common-5.5.21-2.el7.x86_64.rpm php55-php-dba-5.5.21-2.el7.x86_64.rpm php55-php-debuginfo-5.5.21-2.el7.x86_64.rpm php55-php-devel-5.5.21-2.el7.x86_64.rpm php55-php-enchant-5.5.21-2.el7.x86_64.rpm php55-php-fpm-5.5.21-2.el7.x86_64.rpm php55-php-gd-5.5.21-2.el7.x86_64.rpm php55-php-gmp-5.5.21-2.el7.x86_64.rpm php55-php-intl-5.5.21-2.el7.x86_64.rpm php55-php-ldap-5.5.21-2.el7.x86_64.rpm php55-php-mbstring-5.5.21-2.el7.x86_64.rpm php55-php-mysqlnd-5.5.21-2.el7.x86_64.rpm php55-php-odbc-5.5.21-2.el7.x86_64.rpm php55-php-opcache-5.5.21-2.el7.x86_64.rpm php55-php-pdo-5.5.21-2.el7.x86_64.rpm php55-php-pgsql-5.5.21-2.el7.x86_64.rpm php55-php-process-5.5.21-2.el7.x86_64.rpm php55-php-pspell-5.5.21-2.el7.x86_64.rpm php55-php-recode-5.5.21-2.el7.x86_64.rpm php55-php-snmp-5.5.21-2.el7.x86_64.rpm php55-php-soap-5.5.21-2.el7.x86_64.rpm php55-php-xml-5.5.21-2.el7.x86_64.rpm php55-php-xmlrpc-5.5.21-2.el7.x86_64.rpm php55-runtime-2.0-1.el7.x86_64.rpm php55-scldevel-2.0-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8142 https://access.redhat.com/security/cve/CVE-2014-9427 https://access.redhat.com/security/cve/CVE-2014-9652 https://access.redhat.com/security/cve/CVE-2014-9705 https://access.redhat.com/security/cve/CVE-2014-9709 https://access.redhat.com/security/cve/CVE-2015-0231 https://access.redhat.com/security/cve/CVE-2015-0232 https://access.redhat.com/security/cve/CVE-2015-0273 https://access.redhat.com/security/cve/CVE-2015-1351 https://access.redhat.com/security/cve/CVE-2015-1352 https://access.redhat.com/security/cve/CVE-2015-2301 https://access.redhat.com/security/cve/CVE-2015-2305 https://access.redhat.com/security/cve/CVE-2015-2348 https://access.redhat.com/security/cve/CVE-2015-2787 https://access.redhat.com/security/cve/CVE-2015-4147 https://access.redhat.com/security/cve/CVE-2015-4148 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVcBWDXlSAg2UNWIIRAnzoAJ9qn4wDNXMD8JU1N7k7nEzKlPpGDwCgi0Si MD3ZncY/P8Pl6+DgQxJQCjo= =MxfY -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 4 09:11:40 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Jun 2015 09:11:40 +0000 Subject: [RHSA-2015:1066-01] Moderate: php54 security and bug fix update Message-ID: <201506040911.t549BfT6021284@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: php54 security and bug fix update Advisory ID: RHSA-2015:1066-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1066.html Issue date: 2015-06-04 CVE Names: CVE-2014-8142 CVE-2014-9427 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0273 CVE-2015-1351 CVE-2015-2301 CVE-2015-2305 CVE-2015-2348 CVE-2015-2787 CVE-2015-4147 CVE-2015-4148 ===================================================================== 1. Summary: Updated php54 collection packages that fix multiple security issues and several bugs are now available as part of Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The php54 packages provide a recent stable release of PHP with the PEAR 1.9.4, APC 3.1.15, and memcache 3.0.8 PECL extensions, and a number of additional utilities. The php54 packages have been upgraded to upstream version 5.4.40, which provides a number of bug fixes over the version shipped in Red Hat Software Collections 1. (BZ#1168193) The following security issues were fixed in the php54-php component: An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-0232) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2014-8142, CVE-2015-0231, CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148) A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) A heap buffer overflow flaw was found in PHP's regular expression extension. An attacker able to make PHP process a specially crafted regular expression pattern could cause it to crash and possibly execute arbitrary code. (CVE-2015-2305) A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) A use-after-free flaw was found in PHP's phar (PHP Archive) extension. An attacker able to trigger certain error condition in phar archive processing could possibly use this flaw to disclose certain portions of server memory. (CVE-2015-2301) An ouf-of-bounds read flaw was found in the way the File Information (fileinfo) extension processed certain Pascal strings. A remote attacker could cause a PHP application to crash if it used fileinfo to identify the type of the attacker-supplied file. (CVE-2014-9652) It was found that PHP move_uploaded_file() function did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-2348) A flaw was found in the way PHP handled malformed source files when running in CGI mode. A specially crafted PHP file could cause PHP CGI to crash. (CVE-2014-9427) The following security issue was fixed in the php54-php-pecl-zendopcache component: A use-after-free flaw was found in PHP's OPcache extension. This flaw could possibly lead to a disclosure of a portion of the server memory. (CVE-2015-1351) All php54 users are advised to upgrade to these updated packages, which correct these issues. After installing the updated packages, the httpd service must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1055927 - REBASE to pecl/zendopcache version 7.0.4 1175718 - CVE-2014-8142 php: use after free vulnerability in unserialize() 1178736 - CVE-2014-9427 php: out of bounds read when parsing a crafted .php file 1185397 - CVE-2015-0231 php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) 1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c 1185900 - CVE-2015-1351 php: use after free in opcache extension 1188599 - CVE-2014-9652 file: out of bounds read in mconvert() 1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c 1191049 - CVE-2015-2305 regex: heap overflow in regcomp() on 32-bit architectures 1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone 1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict() 1194747 - CVE-2015-2301 php: use after free in phar_object.c 1204868 - CVE-2015-4147 php: SoapClient's __call() type confusion through unserialize() 1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re 1207682 - CVE-2015-2348 php: move_uploaded_file() NUL byte injection in file name 1226916 - CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize() 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: php54-2.0-1.el6.src.rpm php54-php-5.4.40-1.el6.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.src.rpm x86_64: php54-2.0-1.el6.x86_64.rpm php54-php-5.4.40-1.el6.x86_64.rpm php54-php-bcmath-5.4.40-1.el6.x86_64.rpm php54-php-cli-5.4.40-1.el6.x86_64.rpm php54-php-common-5.4.40-1.el6.x86_64.rpm php54-php-dba-5.4.40-1.el6.x86_64.rpm php54-php-debuginfo-5.4.40-1.el6.x86_64.rpm php54-php-devel-5.4.40-1.el6.x86_64.rpm php54-php-enchant-5.4.40-1.el6.x86_64.rpm php54-php-fpm-5.4.40-1.el6.x86_64.rpm php54-php-gd-5.4.40-1.el6.x86_64.rpm php54-php-imap-5.4.40-1.el6.x86_64.rpm php54-php-intl-5.4.40-1.el6.x86_64.rpm php54-php-ldap-5.4.40-1.el6.x86_64.rpm php54-php-mbstring-5.4.40-1.el6.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el6.x86_64.rpm php54-php-odbc-5.4.40-1.el6.x86_64.rpm php54-php-pdo-5.4.40-1.el6.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el6.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el6.x86_64.rpm php54-php-pgsql-5.4.40-1.el6.x86_64.rpm php54-php-process-5.4.40-1.el6.x86_64.rpm php54-php-pspell-5.4.40-1.el6.x86_64.rpm php54-php-recode-5.4.40-1.el6.x86_64.rpm php54-php-snmp-5.4.40-1.el6.x86_64.rpm php54-php-soap-5.4.40-1.el6.x86_64.rpm php54-php-tidy-5.4.40-1.el6.x86_64.rpm php54-php-xml-5.4.40-1.el6.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el6.x86_64.rpm php54-runtime-2.0-1.el6.x86_64.rpm php54-scldevel-2.0-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: php54-2.0-1.el7.src.rpm php54-php-5.4.40-1.el7.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.src.rpm x86_64: php54-2.0-1.el7.x86_64.rpm php54-php-5.4.40-1.el7.x86_64.rpm php54-php-bcmath-5.4.40-1.el7.x86_64.rpm php54-php-cli-5.4.40-1.el7.x86_64.rpm php54-php-common-5.4.40-1.el7.x86_64.rpm php54-php-dba-5.4.40-1.el7.x86_64.rpm php54-php-debuginfo-5.4.40-1.el7.x86_64.rpm php54-php-devel-5.4.40-1.el7.x86_64.rpm php54-php-enchant-5.4.40-1.el7.x86_64.rpm php54-php-fpm-5.4.40-1.el7.x86_64.rpm php54-php-gd-5.4.40-1.el7.x86_64.rpm php54-php-intl-5.4.40-1.el7.x86_64.rpm php54-php-ldap-5.4.40-1.el7.x86_64.rpm php54-php-mbstring-5.4.40-1.el7.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el7.x86_64.rpm php54-php-odbc-5.4.40-1.el7.x86_64.rpm php54-php-pdo-5.4.40-1.el7.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el7.x86_64.rpm php54-php-pgsql-5.4.40-1.el7.x86_64.rpm php54-php-process-5.4.40-1.el7.x86_64.rpm php54-php-pspell-5.4.40-1.el7.x86_64.rpm php54-php-recode-5.4.40-1.el7.x86_64.rpm php54-php-snmp-5.4.40-1.el7.x86_64.rpm php54-php-soap-5.4.40-1.el7.x86_64.rpm php54-php-xml-5.4.40-1.el7.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el7.x86_64.rpm php54-runtime-2.0-1.el7.x86_64.rpm php54-scldevel-2.0-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: php54-2.0-1.el7.src.rpm php54-php-5.4.40-1.el7.src.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.src.rpm x86_64: php54-2.0-1.el7.x86_64.rpm php54-php-5.4.40-1.el7.x86_64.rpm php54-php-bcmath-5.4.40-1.el7.x86_64.rpm php54-php-cli-5.4.40-1.el7.x86_64.rpm php54-php-common-5.4.40-1.el7.x86_64.rpm php54-php-dba-5.4.40-1.el7.x86_64.rpm php54-php-debuginfo-5.4.40-1.el7.x86_64.rpm php54-php-devel-5.4.40-1.el7.x86_64.rpm php54-php-enchant-5.4.40-1.el7.x86_64.rpm php54-php-fpm-5.4.40-1.el7.x86_64.rpm php54-php-gd-5.4.40-1.el7.x86_64.rpm php54-php-intl-5.4.40-1.el7.x86_64.rpm php54-php-ldap-5.4.40-1.el7.x86_64.rpm php54-php-mbstring-5.4.40-1.el7.x86_64.rpm php54-php-mysqlnd-5.4.40-1.el7.x86_64.rpm php54-php-odbc-5.4.40-1.el7.x86_64.rpm php54-php-pdo-5.4.40-1.el7.x86_64.rpm php54-php-pecl-zendopcache-7.0.4-3.el7.x86_64.rpm php54-php-pecl-zendopcache-debuginfo-7.0.4-3.el7.x86_64.rpm php54-php-pgsql-5.4.40-1.el7.x86_64.rpm php54-php-process-5.4.40-1.el7.x86_64.rpm php54-php-pspell-5.4.40-1.el7.x86_64.rpm php54-php-recode-5.4.40-1.el7.x86_64.rpm php54-php-snmp-5.4.40-1.el7.x86_64.rpm php54-php-soap-5.4.40-1.el7.x86_64.rpm php54-php-xml-5.4.40-1.el7.x86_64.rpm php54-php-xmlrpc-5.4.40-1.el7.x86_64.rpm php54-runtime-2.0-1.el7.x86_64.rpm php54-scldevel-2.0-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8142 https://access.redhat.com/security/cve/CVE-2014-9427 https://access.redhat.com/security/cve/CVE-2014-9652 https://access.redhat.com/security/cve/CVE-2014-9705 https://access.redhat.com/security/cve/CVE-2014-9709 https://access.redhat.com/security/cve/CVE-2015-0231 https://access.redhat.com/security/cve/CVE-2015-0232 https://access.redhat.com/security/cve/CVE-2015-0273 https://access.redhat.com/security/cve/CVE-2015-1351 https://access.redhat.com/security/cve/CVE-2015-2301 https://access.redhat.com/security/cve/CVE-2015-2305 https://access.redhat.com/security/cve/CVE-2015-2348 https://access.redhat.com/security/cve/CVE-2015-2787 https://access.redhat.com/security/cve/CVE-2015-4147 https://access.redhat.com/security/cve/CVE-2015-4148 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVcBYSXlSAg2UNWIIRAoT1AJ9XFBGeD9SIxEla6ub7VHSrmJAtcgCfSjPe YJoyzmnxjsdToxpNcMlTQOw= =BUIg -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 4 09:13:17 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Jun 2015 09:13:17 +0000 Subject: [RHSA-2015:1064-01] Moderate: python27 security, bug fix, and enhancement update Message-ID: <201506040913.t549DI0F027571@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python27 security, bug fix, and enhancement update Advisory ID: RHSA-2015:1064-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1064.html Issue date: 2015-06-04 CVE Names: CVE-2013-1752 CVE-2013-1753 CVE-2014-1912 CVE-2014-4616 CVE-2014-4650 CVE-2014-7185 ===================================================================== 1. Summary: Updated python27 collection packages that fix multiple security issues and several bugs are now available as part of Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 collection provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The python27-python packages have been upgraded to upstream version 2.7.8, which provides numerous bug fixes over the previous version. (BZ#1167912) The following security issues were fixed in the python27-python component: It was discovered that the socket.recvfrom_into() function failed to check the size of the supplied buffer. This could lead to a buffer overflow when the function was called with an insufficiently sized buffer. (CVE-2014-1912) It was discovered that the Python xmlrpclib module did not restrict the size of gzip-compressed HTTP responses. A malicious XMLRPC server could cause an XMLRPC client using xmlrpclib to consume an excessive amount of memory. (CVE-2013-1753) It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict the sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752) It was discovered that the CGIHTTPServer module incorrectly handled URL encoded paths. A remote attacker could use this flaw to execute scripts outside of the cgi-bin directory, or disclose the source code of the scripts in the cgi-bin directory. (CVE-2014-4650) An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control these arguments could use this flaw to disclose portions of the application memory or cause it to crash. (CVE-2014-7185) The following security issue was fixed in the python27-python and python27-python-simplejson components: A flaw was found in the way the json module handled negative index arguments passed to certain functions (such as raw_decode()). An attacker able to control the index value passed to one of the affected functions could possibly use this flaw to disclose portions of the application memory. (CVE-2014-4616) In addition, this update adds the following enhancement: * The python27 Software Collection now includes the python-wheel and python-pip modules. (BZ#994189, BZ#1167902) All python27 users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. All running python27 instances must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 994189 - Please create a python-pip build for the python 2.7 and 3.3 SCL environments on RHEL 6 1046170 - CVE-2013-1753 python: XMLRPC library unrestricted decompression of HTTP responses using gzip enconding 1046174 - CVE-2013-1752 python: multiple unbound readline() DoS flaws in python stdlib 1062370 - CVE-2014-1912 python: buffer overflow in socket.recvfrom_into() 1112285 - CVE-2014-4616 python: missing boundary check in JSON module 1113527 - CVE-2014-4650 python: CGIHTTPServer module does not properly handle URL-encoded path separators in URLs 1146026 - CVE-2014-7185 python: buffer() integer overflow leading to out of bounds read 1167912 - Update Python in python27 SCL to Python 2.7.8 1170993 - RPM macro rpm/macros.python2.python27 references non-existing /usr/lib/rpm/brp-scl-compress 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: python27-1.1-17.el6.src.rpm python27-python-2.7.8-3.el6.src.rpm python27-python-pip-1.5.6-5.el6.src.rpm python27-python-setuptools-0.9.8-3.el6.src.rpm python27-python-simplejson-3.2.0-2.el6.src.rpm python27-python-wheel-0.24.0-2.el6.src.rpm noarch: python27-python-pip-1.5.6-5.el6.noarch.rpm python27-python-setuptools-0.9.8-3.el6.noarch.rpm python27-python-wheel-0.24.0-2.el6.noarch.rpm x86_64: python27-1.1-17.el6.x86_64.rpm python27-python-2.7.8-3.el6.x86_64.rpm python27-python-debug-2.7.8-3.el6.x86_64.rpm python27-python-debuginfo-2.7.8-3.el6.x86_64.rpm python27-python-devel-2.7.8-3.el6.x86_64.rpm python27-python-libs-2.7.8-3.el6.x86_64.rpm python27-python-simplejson-3.2.0-2.el6.x86_64.rpm python27-python-simplejson-debuginfo-3.2.0-2.el6.x86_64.rpm python27-python-test-2.7.8-3.el6.x86_64.rpm python27-python-tools-2.7.8-3.el6.x86_64.rpm python27-runtime-1.1-17.el6.x86_64.rpm python27-scldevel-1.1-17.el6.x86_64.rpm python27-tkinter-2.7.8-3.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: python27-1.1-17.el6.src.rpm python27-python-2.7.8-3.el6.src.rpm python27-python-pip-1.5.6-5.el6.src.rpm python27-python-setuptools-0.9.8-3.el6.src.rpm python27-python-simplejson-3.2.0-2.el6.src.rpm python27-python-wheel-0.24.0-2.el6.src.rpm noarch: python27-python-pip-1.5.6-5.el6.noarch.rpm python27-python-setuptools-0.9.8-3.el6.noarch.rpm python27-python-wheel-0.24.0-2.el6.noarch.rpm x86_64: python27-1.1-17.el6.x86_64.rpm python27-python-2.7.8-3.el6.x86_64.rpm python27-python-debug-2.7.8-3.el6.x86_64.rpm python27-python-debuginfo-2.7.8-3.el6.x86_64.rpm python27-python-devel-2.7.8-3.el6.x86_64.rpm python27-python-libs-2.7.8-3.el6.x86_64.rpm python27-python-simplejson-3.2.0-2.el6.x86_64.rpm python27-python-simplejson-debuginfo-3.2.0-2.el6.x86_64.rpm python27-python-test-2.7.8-3.el6.x86_64.rpm python27-python-tools-2.7.8-3.el6.x86_64.rpm python27-runtime-1.1-17.el6.x86_64.rpm python27-scldevel-1.1-17.el6.x86_64.rpm python27-tkinter-2.7.8-3.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: python27-1.1-17.el6.src.rpm python27-python-2.7.8-3.el6.src.rpm python27-python-pip-1.5.6-5.el6.src.rpm python27-python-setuptools-0.9.8-3.el6.src.rpm python27-python-simplejson-3.2.0-2.el6.src.rpm python27-python-wheel-0.24.0-2.el6.src.rpm noarch: python27-python-pip-1.5.6-5.el6.noarch.rpm python27-python-setuptools-0.9.8-3.el6.noarch.rpm python27-python-wheel-0.24.0-2.el6.noarch.rpm x86_64: python27-1.1-17.el6.x86_64.rpm python27-python-2.7.8-3.el6.x86_64.rpm python27-python-debug-2.7.8-3.el6.x86_64.rpm python27-python-debuginfo-2.7.8-3.el6.x86_64.rpm python27-python-devel-2.7.8-3.el6.x86_64.rpm python27-python-libs-2.7.8-3.el6.x86_64.rpm python27-python-simplejson-3.2.0-2.el6.x86_64.rpm python27-python-simplejson-debuginfo-3.2.0-2.el6.x86_64.rpm python27-python-test-2.7.8-3.el6.x86_64.rpm python27-python-tools-2.7.8-3.el6.x86_64.rpm python27-runtime-1.1-17.el6.x86_64.rpm python27-scldevel-1.1-17.el6.x86_64.rpm python27-tkinter-2.7.8-3.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: python27-1.1-17.el6.src.rpm python27-python-2.7.8-3.el6.src.rpm python27-python-pip-1.5.6-5.el6.src.rpm python27-python-setuptools-0.9.8-3.el6.src.rpm python27-python-simplejson-3.2.0-2.el6.src.rpm python27-python-wheel-0.24.0-2.el6.src.rpm noarch: python27-python-pip-1.5.6-5.el6.noarch.rpm python27-python-setuptools-0.9.8-3.el6.noarch.rpm python27-python-wheel-0.24.0-2.el6.noarch.rpm x86_64: python27-1.1-17.el6.x86_64.rpm python27-python-2.7.8-3.el6.x86_64.rpm python27-python-debug-2.7.8-3.el6.x86_64.rpm python27-python-debuginfo-2.7.8-3.el6.x86_64.rpm python27-python-devel-2.7.8-3.el6.x86_64.rpm python27-python-libs-2.7.8-3.el6.x86_64.rpm python27-python-simplejson-3.2.0-2.el6.x86_64.rpm python27-python-simplejson-debuginfo-3.2.0-2.el6.x86_64.rpm python27-python-test-2.7.8-3.el6.x86_64.rpm python27-python-tools-2.7.8-3.el6.x86_64.rpm python27-runtime-1.1-17.el6.x86_64.rpm python27-scldevel-1.1-17.el6.x86_64.rpm python27-tkinter-2.7.8-3.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: python27-1.1-20.el7.src.rpm python27-python-2.7.8-3.el7.src.rpm python27-python-pip-1.5.6-5.el7.src.rpm python27-python-setuptools-0.9.8-5.el7.src.rpm python27-python-simplejson-3.2.0-3.el7.src.rpm python27-python-wheel-0.24.0-2.el7.src.rpm noarch: python27-python-pip-1.5.6-5.el7.noarch.rpm python27-python-setuptools-0.9.8-5.el7.noarch.rpm python27-python-wheel-0.24.0-2.el7.noarch.rpm x86_64: python27-1.1-20.el7.x86_64.rpm python27-python-2.7.8-3.el7.x86_64.rpm python27-python-debug-2.7.8-3.el7.x86_64.rpm python27-python-debuginfo-2.7.8-3.el7.x86_64.rpm python27-python-devel-2.7.8-3.el7.x86_64.rpm python27-python-libs-2.7.8-3.el7.x86_64.rpm python27-python-simplejson-3.2.0-3.el7.x86_64.rpm python27-python-simplejson-debuginfo-3.2.0-3.el7.x86_64.rpm python27-python-test-2.7.8-3.el7.x86_64.rpm python27-python-tools-2.7.8-3.el7.x86_64.rpm python27-runtime-1.1-20.el7.x86_64.rpm python27-scldevel-1.1-20.el7.x86_64.rpm python27-tkinter-2.7.8-3.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: python27-1.1-20.el7.src.rpm python27-python-2.7.8-3.el7.src.rpm python27-python-pip-1.5.6-5.el7.src.rpm python27-python-setuptools-0.9.8-5.el7.src.rpm python27-python-simplejson-3.2.0-3.el7.src.rpm python27-python-wheel-0.24.0-2.el7.src.rpm noarch: python27-python-pip-1.5.6-5.el7.noarch.rpm python27-python-setuptools-0.9.8-5.el7.noarch.rpm python27-python-wheel-0.24.0-2.el7.noarch.rpm x86_64: python27-1.1-20.el7.x86_64.rpm python27-python-2.7.8-3.el7.x86_64.rpm python27-python-debug-2.7.8-3.el7.x86_64.rpm python27-python-debuginfo-2.7.8-3.el7.x86_64.rpm python27-python-devel-2.7.8-3.el7.x86_64.rpm python27-python-libs-2.7.8-3.el7.x86_64.rpm python27-python-simplejson-3.2.0-3.el7.x86_64.rpm python27-python-simplejson-debuginfo-3.2.0-3.el7.x86_64.rpm python27-python-test-2.7.8-3.el7.x86_64.rpm python27-python-tools-2.7.8-3.el7.x86_64.rpm python27-runtime-1.1-20.el7.x86_64.rpm python27-scldevel-1.1-20.el7.x86_64.rpm python27-tkinter-2.7.8-3.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2013-1752 https://access.redhat.com/security/cve/CVE-2013-1753 https://access.redhat.com/security/cve/CVE-2014-1912 https://access.redhat.com/security/cve/CVE-2014-4616 https://access.redhat.com/security/cve/CVE-2014-4650 https://access.redhat.com/security/cve/CVE-2014-7185 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVcBZ/XlSAg2UNWIIRAojaAKC/1aPfLPbhJulkzyGMdfoFYq3itwCgns9a lOwtT2ZeE8hH6JpnObD51MU= =ulrW -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 4 17:50:39 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 4 Jun 2015 13:50:39 -0400 Subject: [RHSA-2015:1072-01] Moderate: openssl security update Message-ID: <201506041750.t54HodX4013724@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:1072-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1072.html Issue date: 2015-06-04 CVE Names: CVE-2015-4000 ===================================================================== 1. Summary: Updated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. All openssl users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-30.el6_6.9.src.rpm i386: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm x86_64: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm openssl-perl-1.0.1e-30.el6_6.9.i686.rpm openssl-static-1.0.1e-30.el6_6.9.i686.rpm x86_64: openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-static-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-30.el6_6.9.src.rpm x86_64: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-static-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-30.el6_6.9.src.rpm i386: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm ppc64: openssl-1.0.1e-30.el6_6.9.ppc.rpm openssl-1.0.1e-30.el6_6.9.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.9.ppc.rpm openssl-devel-1.0.1e-30.el6_6.9.ppc64.rpm s390x: openssl-1.0.1e-30.el6_6.9.s390.rpm openssl-1.0.1e-30.el6_6.9.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.s390x.rpm openssl-devel-1.0.1e-30.el6_6.9.s390.rpm openssl-devel-1.0.1e-30.el6_6.9.s390x.rpm x86_64: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-perl-1.0.1e-30.el6_6.9.i686.rpm openssl-static-1.0.1e-30.el6_6.9.i686.rpm ppc64: openssl-debuginfo-1.0.1e-30.el6_6.9.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.9.ppc64.rpm openssl-static-1.0.1e-30.el6_6.9.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-30.el6_6.9.s390x.rpm openssl-perl-1.0.1e-30.el6_6.9.s390x.rpm openssl-static-1.0.1e-30.el6_6.9.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-static-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-30.el6_6.9.src.rpm i386: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm x86_64: openssl-1.0.1e-30.el6_6.9.i686.rpm openssl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.9.i686.rpm openssl-devel-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-30.el6_6.9.i686.rpm openssl-perl-1.0.1e-30.el6_6.9.i686.rpm openssl-static-1.0.1e-30.el6_6.9.i686.rpm x86_64: openssl-debuginfo-1.0.1e-30.el6_6.9.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.9.x86_64.rpm openssl-static-1.0.1e-30.el6_6.9.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.1e-42.el7_1.6.src.rpm x86_64: openssl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.6.i686.rpm openssl-libs-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.6.i686.rpm openssl-devel-1.0.1e-42.el7_1.6.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-static-1.0.1e-42.el7_1.6.i686.rpm openssl-static-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.1e-42.el7_1.6.src.rpm x86_64: openssl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.6.i686.rpm openssl-libs-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.6.i686.rpm openssl-devel-1.0.1e-42.el7_1.6.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-static-1.0.1e-42.el7_1.6.i686.rpm openssl-static-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-42.el7_1.6.src.rpm ppc64: openssl-1.0.1e-42.el7_1.6.ppc64.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.ppc64.rpm openssl-devel-1.0.1e-42.el7_1.6.ppc.rpm openssl-devel-1.0.1e-42.el7_1.6.ppc64.rpm openssl-libs-1.0.1e-42.el7_1.6.ppc.rpm openssl-libs-1.0.1e-42.el7_1.6.ppc64.rpm s390x: openssl-1.0.1e-42.el7_1.6.s390x.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.s390x.rpm openssl-devel-1.0.1e-42.el7_1.6.s390.rpm openssl-devel-1.0.1e-42.el7_1.6.s390x.rpm openssl-libs-1.0.1e-42.el7_1.6.s390.rpm openssl-libs-1.0.1e-42.el7_1.6.s390x.rpm x86_64: openssl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.6.i686.rpm openssl-devel-1.0.1e-42.el7_1.6.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.6.i686.rpm openssl-libs-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-42.ael7b_1.6.src.rpm ppc64le: openssl-1.0.1e-42.ael7b_1.6.ppc64le.rpm openssl-debuginfo-1.0.1e-42.ael7b_1.6.ppc64le.rpm openssl-devel-1.0.1e-42.ael7b_1.6.ppc64le.rpm openssl-libs-1.0.1e-42.ael7b_1.6.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openssl-debuginfo-1.0.1e-42.el7_1.6.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.ppc64.rpm openssl-perl-1.0.1e-42.el7_1.6.ppc64.rpm openssl-static-1.0.1e-42.el7_1.6.ppc.rpm openssl-static-1.0.1e-42.el7_1.6.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-42.el7_1.6.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.s390x.rpm openssl-perl-1.0.1e-42.el7_1.6.s390x.rpm openssl-static-1.0.1e-42.el7_1.6.s390.rpm openssl-static-1.0.1e-42.el7_1.6.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-static-1.0.1e-42.el7_1.6.i686.rpm openssl-static-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: openssl-debuginfo-1.0.1e-42.ael7b_1.6.ppc64le.rpm openssl-perl-1.0.1e-42.ael7b_1.6.ppc64le.rpm openssl-static-1.0.1e-42.ael7b_1.6.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.1e-42.el7_1.6.src.rpm x86_64: openssl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.6.i686.rpm openssl-devel-1.0.1e-42.el7_1.6.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.6.i686.rpm openssl-libs-1.0.1e-42.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-42.el7_1.6.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.6.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.6.x86_64.rpm openssl-static-1.0.1e-42.el7_1.6.i686.rpm openssl-static-1.0.1e-42.el7_1.6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/articles/1456263 https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVcI/tXlSAg2UNWIIRAjkVAKCBQzufGAQrAiZwwGvjXbepo/c2oACglmdg cY5Kwol2YDkKtcLO2F/XsEc= =/Lzq -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 9 16:49:01 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Jun 2015 16:49:01 +0000 Subject: [RHSA-2015:1081-01] Important: kernel security, bug fix, and enhancement update Message-ID: <201506091649.t59Gn1fI025993@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2015:1081-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1081.html Issue date: 2015-06-09 CVE Names: CVE-2014-9419 CVE-2014-9420 CVE-2014-9585 CVE-2015-1805 CVE-2015-3331 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AES-GCM mode IPSec security association. (CVE-2015-3331, Important) * An information leak flaw was found in the way the Linux kernel changed certain segment registers and thread-local storage (TLS) during a context switch. A local, unprivileged user could use this flaw to leak the user space TLS base address of an arbitrary process. (CVE-2014-9419, Low) * It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) * An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) Red Hat would like to thank Carl Henrik Lunde for reporting CVE-2014-9420. The security impact of the CVE-2015-1805 issue was discovered by Red Hat. This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Technical Notes document linked to in the References section. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1175235 - CVE-2014-9420 Kernel: fs: isofs: infinite loop in CE record entries 1177260 - CVE-2014-9419 kernel: partial ASLR bypass through TLS base addresses leak 1181054 - CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 1213322 - CVE-2015-3331 Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-504.23.4.el6.src.rpm i386: kernel-2.6.32-504.23.4.el6.i686.rpm kernel-debug-2.6.32-504.23.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debug-devel-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm kernel-devel-2.6.32-504.23.4.el6.i686.rpm kernel-headers-2.6.32-504.23.4.el6.i686.rpm perf-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm kernel-doc-2.6.32-504.23.4.el6.noarch.rpm kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm x86_64: kernel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm perf-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-504.23.4.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm kernel-doc-2.6.32-504.23.4.el6.noarch.rpm kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm x86_64: kernel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm perf-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-504.23.4.el6.src.rpm i386: kernel-2.6.32-504.23.4.el6.i686.rpm kernel-debug-2.6.32-504.23.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debug-devel-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm kernel-devel-2.6.32-504.23.4.el6.i686.rpm kernel-headers-2.6.32-504.23.4.el6.i686.rpm perf-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm kernel-doc-2.6.32-504.23.4.el6.noarch.rpm kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm ppc64: kernel-2.6.32-504.23.4.el6.ppc64.rpm kernel-bootwrapper-2.6.32-504.23.4.el6.ppc64.rpm kernel-debug-2.6.32-504.23.4.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm kernel-debug-devel-2.6.32-504.23.4.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.23.4.el6.ppc64.rpm kernel-devel-2.6.32-504.23.4.el6.ppc64.rpm kernel-headers-2.6.32-504.23.4.el6.ppc64.rpm perf-2.6.32-504.23.4.el6.ppc64.rpm perf-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm s390x: kernel-2.6.32-504.23.4.el6.s390x.rpm kernel-debug-2.6.32-504.23.4.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.s390x.rpm kernel-debug-devel-2.6.32-504.23.4.el6.s390x.rpm kernel-debuginfo-2.6.32-504.23.4.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.23.4.el6.s390x.rpm kernel-devel-2.6.32-504.23.4.el6.s390x.rpm kernel-headers-2.6.32-504.23.4.el6.s390x.rpm kernel-kdump-2.6.32-504.23.4.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.23.4.el6.s390x.rpm kernel-kdump-devel-2.6.32-504.23.4.el6.s390x.rpm perf-2.6.32-504.23.4.el6.s390x.rpm perf-debuginfo-2.6.32-504.23.4.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.s390x.rpm x86_64: kernel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm perf-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.23.4.el6.ppc64.rpm perf-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm python-perf-2.6.32-504.23.4.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-504.23.4.el6.s390x.rpm kernel-debuginfo-2.6.32-504.23.4.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.23.4.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.23.4.el6.s390x.rpm perf-debuginfo-2.6.32-504.23.4.el6.s390x.rpm python-perf-2.6.32-504.23.4.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-504.23.4.el6.src.rpm i386: kernel-2.6.32-504.23.4.el6.i686.rpm kernel-debug-2.6.32-504.23.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debug-devel-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm kernel-devel-2.6.32-504.23.4.el6.i686.rpm kernel-headers-2.6.32-504.23.4.el6.i686.rpm perf-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm kernel-doc-2.6.32-504.23.4.el6.noarch.rpm kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm x86_64: kernel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm perf-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-2.6.32-504.23.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.23.4.el6.i686.rpm perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm python-perf-2.6.32-504.23.4.el6.i686.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.23.4.el6.x86_64.rpm perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm python-perf-2.6.32-504.23.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.23.4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9419 https://access.redhat.com/security/cve/CVE-2014-9420 https://access.redhat.com/security/cve/CVE-2014-9585 https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/cve/CVE-2015-3331 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.6_Technical_Notes/kernel.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVdxjkXlSAg2UNWIIRAm7dAJ4tILGnT6wSzQR/yZNrR6G1KA8W6gCgv0y9 nCvSEiBSm5nibvkjL2PJSe4= =tGx0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 9 16:51:38 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Jun 2015 16:51:38 +0000 Subject: [RHSA-2015:1082-01] Important: kernel security update Message-ID: <201506091651.t59GpcsQ019190@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2015:1082-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1082.html Issue date: 2015-06-09 CVE Names: CVE-2015-1421 CVE-2015-1805 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues are now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AUS (v. 6.2 server) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1421, Important) * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) The CVE-2015-1421 issue was discovered by Sun Baoliang of Red Hat, and the security impact of the CVE-2015-1805 issue was discovered by Red Hat. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1196581 - CVE-2015-1421 kernel: net: slab corruption from use after free on INIT collisions 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 6. Package List: Red Hat Enterprise Linux AUS (v. 6.2 server): Source: kernel-2.6.32-220.63.2.el6.src.rpm noarch: kernel-doc-2.6.32-220.63.2.el6.noarch.rpm kernel-firmware-2.6.32-220.63.2.el6.noarch.rpm x86_64: kernel-2.6.32-220.63.2.el6.x86_64.rpm kernel-debug-2.6.32-220.63.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.63.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.63.2.el6.x86_64.rpm kernel-devel-2.6.32-220.63.2.el6.x86_64.rpm kernel-headers-2.6.32-220.63.2.el6.x86_64.rpm perf-2.6.32-220.63.2.el6.x86_64.rpm perf-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.2): Source: kernel-2.6.32-220.63.2.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.63.2.el6.x86_64.rpm perf-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm python-perf-2.6.32-220.63.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-220.63.2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1421 https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVdxlwXlSAg2UNWIIRAq41AJ9dbum4Kx9BDT6UjClqVRA61ykm1ACgnMWy 2/hNg5uSCxBPGyaXhIXcxFM= =z03C -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 9 19:49:13 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 9 Jun 2015 15:49:13 -0400 Subject: [RHSA-2015:1083-01] Important: abrt security update Message-ID: <201506091949.t59JnDOP026266@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: abrt security update Advisory ID: RHSA-2015:1083-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1083.html Issue date: 2015-06-09 CVE Names: CVE-2015-1869 CVE-2015-1870 CVE-2015-3142 CVE-2015-3147 CVE-2015-3150 CVE-2015-3151 CVE-2015-3159 CVE-2015-3315 ===================================================================== 1. Summary: Updated abrt packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. It was found that ABRT was vulnerable to multiple race condition and symbolic link flaws. A local attacker could use these flaws to potentially escalate their privileges on the system. (CVE-2015-3315) It was discovered that the kernel-invoked coredump processor provided by ABRT wrote core dumps to files owned by other system users. This could result in information disclosure if an application crashed while its current directory was a directory writable to by other users (such as /tmp). (CVE-2015-3142) It was discovered that the default event handling scripts installed by ABRT did not handle symbolic links correctly. A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-1869) It was found that the ABRT event scripts created a user-readable copy of an sosreport file in ABRT problem directories, and included excerpts of /var/log/messages selected by the user-controlled process name, leading to an information disclosure. (CVE-2015-1870) It was discovered that, when moving problem reports between certain directories, abrt-handle-upload did not verify that the new problem directory had appropriate permissions and did not contain symbolic links. An attacker able to create a crafted problem report could use this flaw to expose other parts of ABRT to attack, or to overwrite arbitrary files on the system. (CVE-2015-3147) Multiple directory traversal flaws were found in the abrt-dbus D-Bus service. A local attacker could use these flaws to read and write arbitrary files as the root user. (CVE-2015-3151) It was discovered that the abrt-dbus D-Bus service did not properly check the validity of the problem directory argument in the ChownProblemDir, DeleteElement, and DeleteProblem methods. A local attacker could use this flaw to take ownership of arbitrary files and directories, or to delete files and directories as the root user. (CVE-2015-3150) It was discovered that the abrt-action-install-debuginfo-to-abrt-cache helper program did not properly filter the process environment before invoking abrt-action-install-debuginfo. A local attacker could use this flaw to escalate their privileges on the system. (CVE-2015-3159) All users of abrt are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1211835 - CVE-2015-3315 abrt: Various race-conditions and symlink issues found in abrt 1212818 - CVE-2015-3142 abrt: abrt-hook-ccpp writes core dumps to existing files owned by others 1212861 - CVE-2015-1869 abrt: default event scripts follow symbolic links 1212868 - CVE-2015-1870 abrt: default abrt event scripts lead to information disclosure 1212953 - CVE-2015-3147 abrt: does not validate contents of uploaded problem reports 1214451 - CVE-2015-3151 abrt: directory traversals in several D-Bus methods implemented by abrt-dbus 1214457 - CVE-2015-3150 abrt: abrt-dbus does not guard against crafted problem directory path arguments 1216962 - CVE-2015-3159 abrt: missing process environment sanitizaton in abrt-action-install-debuginfo-to-abrt-cache 1218610 - libreport: races in dump directory handling code [rhel-7.1.z] 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: abrt-2.1.11-22.el7_1.src.rpm libreport-2.1.11-23.el7_1.src.rpm x86_64: abrt-2.1.11-22.el7_1.x86_64.rpm abrt-addon-ccpp-2.1.11-22.el7_1.x86_64.rpm abrt-addon-kerneloops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-pstoreoops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-python-2.1.11-22.el7_1.x86_64.rpm abrt-addon-vmcore-2.1.11-22.el7_1.x86_64.rpm abrt-addon-xorg-2.1.11-22.el7_1.x86_64.rpm abrt-cli-2.1.11-22.el7_1.x86_64.rpm abrt-console-notification-2.1.11-22.el7_1.x86_64.rpm abrt-dbus-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-desktop-2.1.11-22.el7_1.x86_64.rpm abrt-gui-2.1.11-22.el7_1.x86_64.rpm abrt-gui-libs-2.1.11-22.el7_1.i686.rpm abrt-gui-libs-2.1.11-22.el7_1.x86_64.rpm abrt-libs-2.1.11-22.el7_1.i686.rpm abrt-libs-2.1.11-22.el7_1.x86_64.rpm abrt-python-2.1.11-22.el7_1.x86_64.rpm abrt-tui-2.1.11-22.el7_1.x86_64.rpm libreport-2.1.11-23.el7_1.i686.rpm libreport-2.1.11-23.el7_1.x86_64.rpm libreport-anaconda-2.1.11-23.el7_1.x86_64.rpm libreport-cli-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-filesystem-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-2.1.11-23.el7_1.i686.rpm libreport-gtk-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-mailx-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-reportuploader-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-rhtsupport-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-ureport-2.1.11-23.el7_1.x86_64.rpm libreport-python-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-2.1.11-23.el7_1.i686.rpm libreport-web-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: abrt-python-doc-2.1.11-22.el7_1.noarch.rpm x86_64: abrt-addon-upload-watch-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-devel-2.1.11-22.el7_1.i686.rpm abrt-devel-2.1.11-22.el7_1.x86_64.rpm abrt-gui-devel-2.1.11-22.el7_1.i686.rpm abrt-gui-devel-2.1.11-22.el7_1.x86_64.rpm abrt-retrace-client-2.1.11-22.el7_1.x86_64.rpm libreport-compat-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-devel-2.1.11-23.el7_1.i686.rpm libreport-devel-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-devel-2.1.11-23.el7_1.i686.rpm libreport-gtk-devel-2.1.11-23.el7_1.x86_64.rpm libreport-newt-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-kerneloops-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-logger-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-devel-2.1.11-23.el7_1.i686.rpm libreport-web-devel-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: abrt-2.1.11-22.el7_1.src.rpm libreport-2.1.11-23.el7_1.src.rpm x86_64: abrt-2.1.11-22.el7_1.x86_64.rpm abrt-addon-ccpp-2.1.11-22.el7_1.x86_64.rpm abrt-addon-kerneloops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-pstoreoops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-python-2.1.11-22.el7_1.x86_64.rpm abrt-addon-vmcore-2.1.11-22.el7_1.x86_64.rpm abrt-addon-xorg-2.1.11-22.el7_1.x86_64.rpm abrt-cli-2.1.11-22.el7_1.x86_64.rpm abrt-console-notification-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-libs-2.1.11-22.el7_1.i686.rpm abrt-libs-2.1.11-22.el7_1.x86_64.rpm abrt-python-2.1.11-22.el7_1.x86_64.rpm abrt-tui-2.1.11-22.el7_1.x86_64.rpm libreport-2.1.11-23.el7_1.i686.rpm libreport-2.1.11-23.el7_1.x86_64.rpm libreport-anaconda-2.1.11-23.el7_1.x86_64.rpm libreport-cli-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-filesystem-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-2.1.11-23.el7_1.i686.rpm libreport-gtk-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-mailx-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-reportuploader-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-rhtsupport-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-ureport-2.1.11-23.el7_1.x86_64.rpm libreport-python-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-2.1.11-23.el7_1.i686.rpm libreport-web-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: abrt-python-doc-2.1.11-22.el7_1.noarch.rpm x86_64: abrt-addon-upload-watch-2.1.11-22.el7_1.x86_64.rpm abrt-dbus-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-desktop-2.1.11-22.el7_1.x86_64.rpm abrt-devel-2.1.11-22.el7_1.i686.rpm abrt-devel-2.1.11-22.el7_1.x86_64.rpm abrt-gui-2.1.11-22.el7_1.x86_64.rpm abrt-gui-devel-2.1.11-22.el7_1.i686.rpm abrt-gui-devel-2.1.11-22.el7_1.x86_64.rpm abrt-gui-libs-2.1.11-22.el7_1.i686.rpm abrt-gui-libs-2.1.11-22.el7_1.x86_64.rpm abrt-retrace-client-2.1.11-22.el7_1.x86_64.rpm libreport-compat-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-devel-2.1.11-23.el7_1.i686.rpm libreport-devel-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-devel-2.1.11-23.el7_1.i686.rpm libreport-gtk-devel-2.1.11-23.el7_1.x86_64.rpm libreport-newt-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-kerneloops-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-logger-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-devel-2.1.11-23.el7_1.i686.rpm libreport-web-devel-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: abrt-2.1.11-22.el7_1.src.rpm libreport-2.1.11-23.el7_1.src.rpm ppc64: abrt-2.1.11-22.el7_1.ppc64.rpm abrt-addon-ccpp-2.1.11-22.el7_1.ppc64.rpm abrt-addon-kerneloops-2.1.11-22.el7_1.ppc64.rpm abrt-addon-pstoreoops-2.1.11-22.el7_1.ppc64.rpm abrt-addon-python-2.1.11-22.el7_1.ppc64.rpm abrt-addon-vmcore-2.1.11-22.el7_1.ppc64.rpm abrt-addon-xorg-2.1.11-22.el7_1.ppc64.rpm abrt-cli-2.1.11-22.el7_1.ppc64.rpm abrt-console-notification-2.1.11-22.el7_1.ppc64.rpm abrt-dbus-2.1.11-22.el7_1.ppc64.rpm abrt-debuginfo-2.1.11-22.el7_1.ppc.rpm abrt-debuginfo-2.1.11-22.el7_1.ppc64.rpm abrt-desktop-2.1.11-22.el7_1.ppc64.rpm abrt-gui-2.1.11-22.el7_1.ppc64.rpm abrt-gui-libs-2.1.11-22.el7_1.ppc.rpm abrt-gui-libs-2.1.11-22.el7_1.ppc64.rpm abrt-libs-2.1.11-22.el7_1.ppc.rpm abrt-libs-2.1.11-22.el7_1.ppc64.rpm abrt-python-2.1.11-22.el7_1.ppc64.rpm abrt-tui-2.1.11-22.el7_1.ppc64.rpm libreport-2.1.11-23.el7_1.ppc.rpm libreport-2.1.11-23.el7_1.ppc64.rpm libreport-anaconda-2.1.11-23.el7_1.ppc64.rpm libreport-cli-2.1.11-23.el7_1.ppc64.rpm libreport-debuginfo-2.1.11-23.el7_1.ppc.rpm libreport-debuginfo-2.1.11-23.el7_1.ppc64.rpm libreport-filesystem-2.1.11-23.el7_1.ppc64.rpm libreport-gtk-2.1.11-23.el7_1.ppc.rpm libreport-gtk-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-bugzilla-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-mailx-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-reportuploader-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-rhtsupport-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-ureport-2.1.11-23.el7_1.ppc64.rpm libreport-python-2.1.11-23.el7_1.ppc64.rpm libreport-rhel-2.1.11-23.el7_1.ppc64.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.el7_1.ppc64.rpm libreport-web-2.1.11-23.el7_1.ppc.rpm libreport-web-2.1.11-23.el7_1.ppc64.rpm s390x: abrt-2.1.11-22.el7_1.s390x.rpm abrt-addon-ccpp-2.1.11-22.el7_1.s390x.rpm abrt-addon-kerneloops-2.1.11-22.el7_1.s390x.rpm abrt-addon-pstoreoops-2.1.11-22.el7_1.s390x.rpm abrt-addon-python-2.1.11-22.el7_1.s390x.rpm abrt-addon-vmcore-2.1.11-22.el7_1.s390x.rpm abrt-addon-xorg-2.1.11-22.el7_1.s390x.rpm abrt-cli-2.1.11-22.el7_1.s390x.rpm abrt-console-notification-2.1.11-22.el7_1.s390x.rpm abrt-dbus-2.1.11-22.el7_1.s390x.rpm abrt-debuginfo-2.1.11-22.el7_1.s390.rpm abrt-debuginfo-2.1.11-22.el7_1.s390x.rpm abrt-desktop-2.1.11-22.el7_1.s390x.rpm abrt-gui-2.1.11-22.el7_1.s390x.rpm abrt-gui-libs-2.1.11-22.el7_1.s390.rpm abrt-gui-libs-2.1.11-22.el7_1.s390x.rpm abrt-libs-2.1.11-22.el7_1.s390.rpm abrt-libs-2.1.11-22.el7_1.s390x.rpm abrt-python-2.1.11-22.el7_1.s390x.rpm abrt-tui-2.1.11-22.el7_1.s390x.rpm libreport-2.1.11-23.el7_1.s390.rpm libreport-2.1.11-23.el7_1.s390x.rpm libreport-anaconda-2.1.11-23.el7_1.s390x.rpm libreport-cli-2.1.11-23.el7_1.s390x.rpm libreport-debuginfo-2.1.11-23.el7_1.s390.rpm libreport-debuginfo-2.1.11-23.el7_1.s390x.rpm libreport-filesystem-2.1.11-23.el7_1.s390x.rpm libreport-gtk-2.1.11-23.el7_1.s390.rpm libreport-gtk-2.1.11-23.el7_1.s390x.rpm libreport-plugin-bugzilla-2.1.11-23.el7_1.s390x.rpm libreport-plugin-mailx-2.1.11-23.el7_1.s390x.rpm libreport-plugin-reportuploader-2.1.11-23.el7_1.s390x.rpm libreport-plugin-rhtsupport-2.1.11-23.el7_1.s390x.rpm libreport-plugin-ureport-2.1.11-23.el7_1.s390x.rpm libreport-python-2.1.11-23.el7_1.s390x.rpm libreport-rhel-2.1.11-23.el7_1.s390x.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.el7_1.s390x.rpm libreport-web-2.1.11-23.el7_1.s390.rpm libreport-web-2.1.11-23.el7_1.s390x.rpm x86_64: abrt-2.1.11-22.el7_1.x86_64.rpm abrt-addon-ccpp-2.1.11-22.el7_1.x86_64.rpm abrt-addon-kerneloops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-pstoreoops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-python-2.1.11-22.el7_1.x86_64.rpm abrt-addon-vmcore-2.1.11-22.el7_1.x86_64.rpm abrt-addon-xorg-2.1.11-22.el7_1.x86_64.rpm abrt-cli-2.1.11-22.el7_1.x86_64.rpm abrt-console-notification-2.1.11-22.el7_1.x86_64.rpm abrt-dbus-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-desktop-2.1.11-22.el7_1.x86_64.rpm abrt-gui-2.1.11-22.el7_1.x86_64.rpm abrt-gui-libs-2.1.11-22.el7_1.i686.rpm abrt-gui-libs-2.1.11-22.el7_1.x86_64.rpm abrt-libs-2.1.11-22.el7_1.i686.rpm abrt-libs-2.1.11-22.el7_1.x86_64.rpm abrt-python-2.1.11-22.el7_1.x86_64.rpm abrt-tui-2.1.11-22.el7_1.x86_64.rpm libreport-2.1.11-23.el7_1.i686.rpm libreport-2.1.11-23.el7_1.x86_64.rpm libreport-anaconda-2.1.11-23.el7_1.x86_64.rpm libreport-cli-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-filesystem-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-2.1.11-23.el7_1.i686.rpm libreport-gtk-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-mailx-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-reportuploader-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-rhtsupport-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-ureport-2.1.11-23.el7_1.x86_64.rpm libreport-python-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-2.1.11-23.el7_1.i686.rpm libreport-web-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: abrt-2.1.11-22.ael7b_1.src.rpm libreport-2.1.11-23.ael7b_1.src.rpm ppc64le: abrt-2.1.11-22.ael7b_1.ppc64le.rpm abrt-addon-ccpp-2.1.11-22.ael7b_1.ppc64le.rpm abrt-addon-kerneloops-2.1.11-22.ael7b_1.ppc64le.rpm abrt-addon-pstoreoops-2.1.11-22.ael7b_1.ppc64le.rpm abrt-addon-python-2.1.11-22.ael7b_1.ppc64le.rpm abrt-addon-vmcore-2.1.11-22.ael7b_1.ppc64le.rpm abrt-addon-xorg-2.1.11-22.ael7b_1.ppc64le.rpm abrt-cli-2.1.11-22.ael7b_1.ppc64le.rpm abrt-console-notification-2.1.11-22.ael7b_1.ppc64le.rpm abrt-dbus-2.1.11-22.ael7b_1.ppc64le.rpm abrt-debuginfo-2.1.11-22.ael7b_1.ppc64le.rpm abrt-desktop-2.1.11-22.ael7b_1.ppc64le.rpm abrt-gui-2.1.11-22.ael7b_1.ppc64le.rpm abrt-gui-libs-2.1.11-22.ael7b_1.ppc64le.rpm abrt-libs-2.1.11-22.ael7b_1.ppc64le.rpm abrt-python-2.1.11-22.ael7b_1.ppc64le.rpm abrt-tui-2.1.11-22.ael7b_1.ppc64le.rpm libreport-2.1.11-23.ael7b_1.ppc64le.rpm libreport-anaconda-2.1.11-23.ael7b_1.ppc64le.rpm libreport-cli-2.1.11-23.ael7b_1.ppc64le.rpm libreport-debuginfo-2.1.11-23.ael7b_1.ppc64le.rpm libreport-filesystem-2.1.11-23.ael7b_1.ppc64le.rpm libreport-gtk-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-bugzilla-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-mailx-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-reportuploader-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-rhtsupport-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-ureport-2.1.11-23.ael7b_1.ppc64le.rpm libreport-python-2.1.11-23.ael7b_1.ppc64le.rpm libreport-rhel-2.1.11-23.ael7b_1.ppc64le.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.ael7b_1.ppc64le.rpm libreport-web-2.1.11-23.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: abrt-python-doc-2.1.11-22.el7_1.noarch.rpm ppc64: abrt-addon-upload-watch-2.1.11-22.el7_1.ppc64.rpm abrt-debuginfo-2.1.11-22.el7_1.ppc.rpm abrt-debuginfo-2.1.11-22.el7_1.ppc64.rpm abrt-devel-2.1.11-22.el7_1.ppc.rpm abrt-devel-2.1.11-22.el7_1.ppc64.rpm abrt-gui-devel-2.1.11-22.el7_1.ppc.rpm abrt-gui-devel-2.1.11-22.el7_1.ppc64.rpm abrt-retrace-client-2.1.11-22.el7_1.ppc64.rpm libreport-compat-2.1.11-23.el7_1.ppc64.rpm libreport-debuginfo-2.1.11-23.el7_1.ppc.rpm libreport-debuginfo-2.1.11-23.el7_1.ppc64.rpm libreport-devel-2.1.11-23.el7_1.ppc.rpm libreport-devel-2.1.11-23.el7_1.ppc64.rpm libreport-gtk-devel-2.1.11-23.el7_1.ppc.rpm libreport-gtk-devel-2.1.11-23.el7_1.ppc64.rpm libreport-newt-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-kerneloops-2.1.11-23.el7_1.ppc64.rpm libreport-plugin-logger-2.1.11-23.el7_1.ppc64.rpm libreport-rhel-bugzilla-2.1.11-23.el7_1.ppc64.rpm libreport-web-devel-2.1.11-23.el7_1.ppc.rpm libreport-web-devel-2.1.11-23.el7_1.ppc64.rpm s390x: abrt-addon-upload-watch-2.1.11-22.el7_1.s390x.rpm abrt-debuginfo-2.1.11-22.el7_1.s390.rpm abrt-debuginfo-2.1.11-22.el7_1.s390x.rpm abrt-devel-2.1.11-22.el7_1.s390.rpm abrt-devel-2.1.11-22.el7_1.s390x.rpm abrt-gui-devel-2.1.11-22.el7_1.s390.rpm abrt-gui-devel-2.1.11-22.el7_1.s390x.rpm abrt-retrace-client-2.1.11-22.el7_1.s390x.rpm libreport-compat-2.1.11-23.el7_1.s390x.rpm libreport-debuginfo-2.1.11-23.el7_1.s390.rpm libreport-debuginfo-2.1.11-23.el7_1.s390x.rpm libreport-devel-2.1.11-23.el7_1.s390.rpm libreport-devel-2.1.11-23.el7_1.s390x.rpm libreport-gtk-devel-2.1.11-23.el7_1.s390.rpm libreport-gtk-devel-2.1.11-23.el7_1.s390x.rpm libreport-newt-2.1.11-23.el7_1.s390x.rpm libreport-plugin-kerneloops-2.1.11-23.el7_1.s390x.rpm libreport-plugin-logger-2.1.11-23.el7_1.s390x.rpm libreport-rhel-bugzilla-2.1.11-23.el7_1.s390x.rpm libreport-web-devel-2.1.11-23.el7_1.s390.rpm libreport-web-devel-2.1.11-23.el7_1.s390x.rpm x86_64: abrt-addon-upload-watch-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-devel-2.1.11-22.el7_1.i686.rpm abrt-devel-2.1.11-22.el7_1.x86_64.rpm abrt-gui-devel-2.1.11-22.el7_1.i686.rpm abrt-gui-devel-2.1.11-22.el7_1.x86_64.rpm abrt-retrace-client-2.1.11-22.el7_1.x86_64.rpm libreport-compat-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-devel-2.1.11-23.el7_1.i686.rpm libreport-devel-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-devel-2.1.11-23.el7_1.i686.rpm libreport-gtk-devel-2.1.11-23.el7_1.x86_64.rpm libreport-newt-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-kerneloops-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-logger-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-devel-2.1.11-23.el7_1.i686.rpm libreport-web-devel-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: abrt-python-doc-2.1.11-22.ael7b_1.noarch.rpm ppc64le: abrt-addon-upload-watch-2.1.11-22.ael7b_1.ppc64le.rpm abrt-debuginfo-2.1.11-22.ael7b_1.ppc64le.rpm abrt-devel-2.1.11-22.ael7b_1.ppc64le.rpm abrt-gui-devel-2.1.11-22.ael7b_1.ppc64le.rpm abrt-retrace-client-2.1.11-22.ael7b_1.ppc64le.rpm libreport-compat-2.1.11-23.ael7b_1.ppc64le.rpm libreport-debuginfo-2.1.11-23.ael7b_1.ppc64le.rpm libreport-devel-2.1.11-23.ael7b_1.ppc64le.rpm libreport-gtk-devel-2.1.11-23.ael7b_1.ppc64le.rpm libreport-newt-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-kerneloops-2.1.11-23.ael7b_1.ppc64le.rpm libreport-plugin-logger-2.1.11-23.ael7b_1.ppc64le.rpm libreport-rhel-bugzilla-2.1.11-23.ael7b_1.ppc64le.rpm libreport-web-devel-2.1.11-23.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: abrt-2.1.11-22.el7_1.src.rpm libreport-2.1.11-23.el7_1.src.rpm x86_64: abrt-2.1.11-22.el7_1.x86_64.rpm abrt-addon-ccpp-2.1.11-22.el7_1.x86_64.rpm abrt-addon-kerneloops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-pstoreoops-2.1.11-22.el7_1.x86_64.rpm abrt-addon-python-2.1.11-22.el7_1.x86_64.rpm abrt-addon-vmcore-2.1.11-22.el7_1.x86_64.rpm abrt-addon-xorg-2.1.11-22.el7_1.x86_64.rpm abrt-cli-2.1.11-22.el7_1.x86_64.rpm abrt-console-notification-2.1.11-22.el7_1.x86_64.rpm abrt-dbus-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-desktop-2.1.11-22.el7_1.x86_64.rpm abrt-gui-2.1.11-22.el7_1.x86_64.rpm abrt-gui-libs-2.1.11-22.el7_1.i686.rpm abrt-gui-libs-2.1.11-22.el7_1.x86_64.rpm abrt-libs-2.1.11-22.el7_1.i686.rpm abrt-libs-2.1.11-22.el7_1.x86_64.rpm abrt-python-2.1.11-22.el7_1.x86_64.rpm abrt-tui-2.1.11-22.el7_1.x86_64.rpm libreport-2.1.11-23.el7_1.i686.rpm libreport-2.1.11-23.el7_1.x86_64.rpm libreport-anaconda-2.1.11-23.el7_1.x86_64.rpm libreport-cli-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-filesystem-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-2.1.11-23.el7_1.i686.rpm libreport-gtk-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-mailx-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-reportuploader-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-rhtsupport-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-ureport-2.1.11-23.el7_1.x86_64.rpm libreport-python-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-anaconda-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-2.1.11-23.el7_1.i686.rpm libreport-web-2.1.11-23.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: abrt-python-doc-2.1.11-22.el7_1.noarch.rpm x86_64: abrt-addon-upload-watch-2.1.11-22.el7_1.x86_64.rpm abrt-debuginfo-2.1.11-22.el7_1.i686.rpm abrt-debuginfo-2.1.11-22.el7_1.x86_64.rpm abrt-devel-2.1.11-22.el7_1.i686.rpm abrt-devel-2.1.11-22.el7_1.x86_64.rpm abrt-gui-devel-2.1.11-22.el7_1.i686.rpm abrt-gui-devel-2.1.11-22.el7_1.x86_64.rpm abrt-retrace-client-2.1.11-22.el7_1.x86_64.rpm libreport-compat-2.1.11-23.el7_1.x86_64.rpm libreport-debuginfo-2.1.11-23.el7_1.i686.rpm libreport-debuginfo-2.1.11-23.el7_1.x86_64.rpm libreport-devel-2.1.11-23.el7_1.i686.rpm libreport-devel-2.1.11-23.el7_1.x86_64.rpm libreport-gtk-devel-2.1.11-23.el7_1.i686.rpm libreport-gtk-devel-2.1.11-23.el7_1.x86_64.rpm libreport-newt-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-kerneloops-2.1.11-23.el7_1.x86_64.rpm libreport-plugin-logger-2.1.11-23.el7_1.x86_64.rpm libreport-rhel-bugzilla-2.1.11-23.el7_1.x86_64.rpm libreport-web-devel-2.1.11-23.el7_1.i686.rpm libreport-web-devel-2.1.11-23.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1869 https://access.redhat.com/security/cve/CVE-2015-1870 https://access.redhat.com/security/cve/CVE-2015-3142 https://access.redhat.com/security/cve/CVE-2015-3147 https://access.redhat.com/security/cve/CVE-2015-3150 https://access.redhat.com/security/cve/CVE-2015-3151 https://access.redhat.com/security/cve/CVE-2015-3159 https://access.redhat.com/security/cve/CVE-2015-3315 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVd0M3XlSAg2UNWIIRAk23AJ4valPk7aoyP6ll9lrDZs1RxloJWQCgrt9X 3w5AfzTFCoMDNKdzm4yO+LY= =k93f -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 10 14:52:59 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 10 Jun 2015 14:52:59 +0000 Subject: [RHSA-2015:1086-01] Critical: flash-plugin security update Message-ID: <201506101453.t5AEr0D9027231@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1086-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html Issue date: 2015-06-10 CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099 CVE-2015-3100 CVE-2015-3102 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 CVE-2015-3108 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105, CVE-2015-3106, CVE-2015-3107) Multiple security bypass flaws were found in flash-plugin that could lead to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098, CVE-2015-3099, CVE-2015-3102) A memory information leak flaw was found in flash-plugin that could allow an attacker to potentially bypass ASLR (Address Space Layout Randomization) protection, and make it easier to exploit other flaws. (CVE-2015-3108) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.466. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11 1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333) 1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11 1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.466-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.466-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.466-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.466-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.466-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.466-1.el6_6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.466-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.466-1.el6_6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.466-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.466-1.el6_6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3096 https://access.redhat.com/security/cve/CVE-2015-3098 https://access.redhat.com/security/cve/CVE-2015-3099 https://access.redhat.com/security/cve/CVE-2015-3100 https://access.redhat.com/security/cve/CVE-2015-3102 https://access.redhat.com/security/cve/CVE-2015-3103 https://access.redhat.com/security/cve/CVE-2015-3104 https://access.redhat.com/security/cve/CVE-2015-3105 https://access.redhat.com/security/cve/CVE-2015-3106 https://access.redhat.com/security/cve/CVE-2015-3107 https://access.redhat.com/security/cve/CVE-2015-3108 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-11.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa u416jfOUFziDYbxIZyHYjaI= =EMNe -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 10 17:32:06 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 10 Jun 2015 17:32:06 +0000 Subject: [RHSA-2015:1087-01] Important: qemu-kvm security update Message-ID: <201506101732.t5AHW766022730@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2015:1087-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1087.html Issue date: 2015-06-10 CVE Names: CVE-2015-3209 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. (CVE-2015-3209) Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm i386: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3209 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVeHRmXlSAg2UNWIIRAkq5AKCeYGr9MG7Kdic1FVJZw2avAhO6eACdFG0W VCkW3jIuuaxOqeYM0s8u6ss= =+WsT -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 10 17:33:37 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 10 Jun 2015 17:33:37 +0000 Subject: [RHSA-2015:1089-01] Important: qemu-kvm-rhev security update Message-ID: <201506101733.t5AHXcsi023427@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm-rhev security update Advisory ID: RHSA-2015:1089-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1089.html Issue date: 2015-06-10 CVE Names: CVE-2015-3209 ===================================================================== 1. Summary: Updated qemu-kvm-rhev packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. (CVE-2015-3209) Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue. All qemu-kvm-rhev users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6: Source: qemu-kvm-rhev-0.12.1.2-2.448.el6_6.4.src.rpm x86_64: qemu-img-rhev-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-rhev-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-rhev-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm qemu-kvm-rhev-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3209 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVeHTiXlSAg2UNWIIRAt/NAJ90ZnxpEVDqj+pWL8lXmaXc0rh9cgCgkcgz k2jSKgC736nQWQ8Np03I4WI= =/QWm -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 11 18:30:56 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 11 Jun 2015 18:30:56 +0000 Subject: [RHSA-2015:1090-01] Important: wpa_supplicant security and enhancement update Message-ID: <201506111830.t5BIUv4T027856@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: wpa_supplicant security and enhancement update Advisory ID: RHSA-2015:1090-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1090.html Issue date: 2015-06-11 CVE Names: CVE-2015-1863 CVE-2015-4142 ===================================================================== 1. Summary: An updated wpa_supplicant package that fixes two security issues and adds one enhancement is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: The wpa_supplicant package contains an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. It implements key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A buffer overflow flaw was found in the way wpa_supplicant handled SSID information in the Wi-Fi Direct / P2P management frames. A specially crafted frame could allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash or, possibly, execute arbitrary code. (CVE-2015-1863) An integer underflow flaw, leading to a buffer over-read, was found in the way wpa_supplicant handled WMM Action frames. A specially crafted frame could possibly allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash. (CVE-2015-4142) Red Hat would like to thank Jouni Malinen of the wpa_supplicant upstream for reporting the CVE-2015-1863 issue. Upstream acknowledges Alibaba security team as the original reporter. This update also adds the following enhancement: * Prior to this update, wpa_supplicant did not provide a way to require the host name to be listed in an X.509 certificate's Common Name or Subject Alternative Name, and only allowed host name suffix or subject substring checks. This update introduces a new configuration directive, 'domain_match', which adds a full host name check. (BZ#1178263) All wpa_supplicant users are advised to upgrade to this updated package, which contains backported patches to correct these issues and add this enhancement. After installing this update, the wpa_supplicant service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1178263 - wpa_supplicant: add support for non-substring server identity check [rhel-7] 1211191 - CVE-2015-1863 wpa_supplicant: P2P SSID processing vulnerability 1221178 - CVE-2015-4142 wpa_supplicant and hostapd: integer underflow in AP mode WMM Action frame processing 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: wpa_supplicant-2.0-17.el7_1.src.rpm x86_64: wpa_supplicant-2.0-17.el7_1.x86_64.rpm wpa_supplicant-debuginfo-2.0-17.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: wpa_supplicant-2.0-17.el7_1.src.rpm x86_64: wpa_supplicant-2.0-17.el7_1.x86_64.rpm wpa_supplicant-debuginfo-2.0-17.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: wpa_supplicant-2.0-17.el7_1.src.rpm ppc64: wpa_supplicant-2.0-17.el7_1.ppc64.rpm wpa_supplicant-debuginfo-2.0-17.el7_1.ppc64.rpm s390x: wpa_supplicant-2.0-17.el7_1.s390x.rpm wpa_supplicant-debuginfo-2.0-17.el7_1.s390x.rpm x86_64: wpa_supplicant-2.0-17.el7_1.x86_64.rpm wpa_supplicant-debuginfo-2.0-17.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: wpa_supplicant-2.0-17.ael7b_1.src.rpm ppc64le: wpa_supplicant-2.0-17.ael7b_1.ppc64le.rpm wpa_supplicant-debuginfo-2.0-17.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: wpa_supplicant-2.0-17.el7_1.src.rpm x86_64: wpa_supplicant-2.0-17.el7_1.x86_64.rpm wpa_supplicant-debuginfo-2.0-17.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1863 https://access.redhat.com/security/cve/CVE-2015-4142 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVedO1XlSAg2UNWIIRAvUJAJ9TVHZ2kbV6waoitmo4Qd+YaW9hkACeJ+NO kAtGC/JP88zWCDGXCIcgpRw= =lQcr -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 15 21:28:36 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 15 Jun 2015 21:28:36 +0000 Subject: [RHSA-2015:1115-01] Moderate: openssl security update Message-ID: <201506152128.t5FLSaxZ003403@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:1115-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1115.html Issue date: 2015-06-15 CVE Names: CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 ===================================================================== 1. Summary: Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176) A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216) An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. (CVE-2015-1791) A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno B?ck as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia K?sper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression 1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time 1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent 1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function 1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket 1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-30.el6_6.11.src.rpm i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-30.el6_6.11.src.rpm x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-30.el6_6.11.src.rpm i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm ppc64: openssl-1.0.1e-30.el6_6.11.ppc.rpm openssl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm s390x: openssl-1.0.1e-30.el6_6.11.s390.rpm openssl-1.0.1e-30.el6_6.11.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-devel-1.0.1e-30.el6_6.11.s390.rpm openssl-devel-1.0.1e-30.el6_6.11.s390x.rpm x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm ppc64: openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-static-1.0.1e-30.el6_6.11.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-perl-1.0.1e-30.el6_6.11.s390x.rpm openssl-static-1.0.1e-30.el6_6.11.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-30.el6_6.11.src.rpm i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.1e-42.el7_1.8.src.rpm x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.1e-42.el7_1.8.src.rpm x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-42.el7_1.8.src.rpm ppc64: openssl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm s390x: openssl-1.0.1e-42.el7_1.8.s390x.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-devel-1.0.1e-42.el7_1.8.s390.rpm openssl-devel-1.0.1e-42.el7_1.8.s390x.rpm openssl-libs-1.0.1e-42.el7_1.8.s390.rpm openssl-libs-1.0.1e-42.el7_1.8.s390x.rpm x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-42.ael7b_1.8.src.rpm ppc64le: openssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-static-1.0.1e-42.el7_1.8.ppc.rpm openssl-static-1.0.1e-42.el7_1.8.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-perl-1.0.1e-42.el7_1.8.s390x.rpm openssl-static-1.0.1e-42.el7_1.8.s390.rpm openssl-static-1.0.1e-42.el7_1.8.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.1e-42.el7_1.8.src.rpm x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8176 https://access.redhat.com/security/cve/CVE-2015-1789 https://access.redhat.com/security/cve/CVE-2015-1790 https://access.redhat.com/security/cve/CVE-2015-1791 https://access.redhat.com/security/cve/CVE-2015-1792 https://access.redhat.com/security/cve/CVE-2015-3216 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150611.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk ZyXizCcFL9oAQexObjxp/Mo= =PXiY -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 16 15:24:21 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 16 Jun 2015 15:24:21 +0000 Subject: [RHSA-2015:1120-01] Important: kernel security and bug fix update Message-ID: <201506161524.t5GFON0f008971@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:1120-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1120.html Issue date: 2015-06-16 CVE Names: CVE-2015-1805 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 5.9 Advanced Update Support. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AUS (v. 5.9 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) The security impact of this issue was discovered by Red Hat. This update also fixes the following bug: * Previously, the signal delivery paths did not clear the TS_USEDFPU flag, which could confuse the switch_to() function and lead to floating-point unit (FPU) corruption. With this update, TS_USEDFPU is cleared as expected, and FPU is no longer under threat of corruption. (BZ#1214239) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 6. Package List: Red Hat Enterprise Linux AUS (v. 5.9 server): Source: kernel-2.6.18-348.31.2.el5.src.rpm i386: kernel-2.6.18-348.31.2.el5.i686.rpm kernel-PAE-2.6.18-348.31.2.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-348.31.2.el5.i686.rpm kernel-PAE-devel-2.6.18-348.31.2.el5.i686.rpm kernel-debug-2.6.18-348.31.2.el5.i686.rpm kernel-debug-debuginfo-2.6.18-348.31.2.el5.i686.rpm kernel-debug-devel-2.6.18-348.31.2.el5.i686.rpm kernel-debuginfo-2.6.18-348.31.2.el5.i686.rpm kernel-debuginfo-common-2.6.18-348.31.2.el5.i686.rpm kernel-devel-2.6.18-348.31.2.el5.i686.rpm kernel-headers-2.6.18-348.31.2.el5.i386.rpm kernel-xen-2.6.18-348.31.2.el5.i686.rpm kernel-xen-debuginfo-2.6.18-348.31.2.el5.i686.rpm kernel-xen-devel-2.6.18-348.31.2.el5.i686.rpm ia64: kernel-2.6.18-348.31.2.el5.ia64.rpm kernel-debug-2.6.18-348.31.2.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-348.31.2.el5.ia64.rpm kernel-debug-devel-2.6.18-348.31.2.el5.ia64.rpm kernel-debuginfo-2.6.18-348.31.2.el5.ia64.rpm kernel-debuginfo-common-2.6.18-348.31.2.el5.ia64.rpm kernel-devel-2.6.18-348.31.2.el5.ia64.rpm kernel-headers-2.6.18-348.31.2.el5.ia64.rpm kernel-xen-2.6.18-348.31.2.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-348.31.2.el5.ia64.rpm kernel-xen-devel-2.6.18-348.31.2.el5.ia64.rpm noarch: kernel-doc-2.6.18-348.31.2.el5.noarch.rpm ppc: kernel-2.6.18-348.31.2.el5.ppc64.rpm kernel-debug-2.6.18-348.31.2.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-348.31.2.el5.ppc64.rpm kernel-debug-devel-2.6.18-348.31.2.el5.ppc64.rpm kernel-debuginfo-2.6.18-348.31.2.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-348.31.2.el5.ppc64.rpm kernel-devel-2.6.18-348.31.2.el5.ppc64.rpm kernel-headers-2.6.18-348.31.2.el5.ppc.rpm kernel-headers-2.6.18-348.31.2.el5.ppc64.rpm kernel-kdump-2.6.18-348.31.2.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-348.31.2.el5.ppc64.rpm kernel-kdump-devel-2.6.18-348.31.2.el5.ppc64.rpm s390x: kernel-2.6.18-348.31.2.el5.s390x.rpm kernel-debug-2.6.18-348.31.2.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-348.31.2.el5.s390x.rpm kernel-debug-devel-2.6.18-348.31.2.el5.s390x.rpm kernel-debuginfo-2.6.18-348.31.2.el5.s390x.rpm kernel-debuginfo-common-2.6.18-348.31.2.el5.s390x.rpm kernel-devel-2.6.18-348.31.2.el5.s390x.rpm kernel-headers-2.6.18-348.31.2.el5.s390x.rpm kernel-kdump-2.6.18-348.31.2.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-348.31.2.el5.s390x.rpm kernel-kdump-devel-2.6.18-348.31.2.el5.s390x.rpm x86_64: kernel-2.6.18-348.31.2.el5.x86_64.rpm kernel-debug-2.6.18-348.31.2.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-348.31.2.el5.x86_64.rpm kernel-debug-devel-2.6.18-348.31.2.el5.x86_64.rpm kernel-debuginfo-2.6.18-348.31.2.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-348.31.2.el5.x86_64.rpm kernel-devel-2.6.18-348.31.2.el5.x86_64.rpm kernel-headers-2.6.18-348.31.2.el5.x86_64.rpm kernel-xen-2.6.18-348.31.2.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-348.31.2.el5.x86_64.rpm kernel-xen-devel-2.6.18-348.31.2.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVgD9+XlSAg2UNWIIRAiIlAJ9Ym4LlZANhYITTSwI3VXYHnCtbRgCeN//g QtifwlBizlaXcGcTfQX/Jis= =xFk6 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 17 21:08:46 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 17 Jun 2015 17:08:46 -0400 Subject: [RHSA-2015:1123-01] Important: cups security update Message-ID: <201506172108.t5HL8kUK019310@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: cups security update Advisory ID: RHSA-2015:1123-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1123.html Issue date: 2015-06-17 CVE Names: CVE-2014-9679 CVE-2015-1158 CVE-2015-1159 ===================================================================== 1. Summary: Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. A string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the 'localhost' or loopback interface. (CVE-2015-1159) An integer overflow leading to a heap-based buffer overflow was found in the way cups handled compressed raster image files. An attacker could create a specially-crafted image file, which when passed via the cups Raster filter, could cause the cups filter to crash. (CVE-2014-9679) Red Hat would like to thank the CERT/CC for reporting CVE-2015-1158 and CVE-2015-1159 issues. All cups users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cupsd daemon will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1191588 - CVE-2014-9679 cups: cupsRasterReadPixels buffer overflow 1221641 - CVE-2015-1158 cups: incorrect string reference counting (VU#810572) 1221642 - CVE-2015-1159 cups: cross-site scripting flaw in CUPS web UI (VU#810572) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: cups-1.4.2-67.el6_6.1.src.rpm i386: cups-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-lpd-1.4.2-67.el6_6.1.i686.rpm x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.x86_64.rpm cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-php-1.4.2-67.el6_6.1.i686.rpm x86_64: cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.x86_64.rpm cups-php-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: cups-1.4.2-67.el6_6.1.src.rpm x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.x86_64.rpm cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.x86_64.rpm cups-php-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: cups-1.4.2-67.el6_6.1.src.rpm i386: cups-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-lpd-1.4.2-67.el6_6.1.i686.rpm ppc64: cups-1.4.2-67.el6_6.1.ppc64.rpm cups-debuginfo-1.4.2-67.el6_6.1.ppc.rpm cups-debuginfo-1.4.2-67.el6_6.1.ppc64.rpm cups-devel-1.4.2-67.el6_6.1.ppc.rpm cups-devel-1.4.2-67.el6_6.1.ppc64.rpm cups-libs-1.4.2-67.el6_6.1.ppc.rpm cups-libs-1.4.2-67.el6_6.1.ppc64.rpm cups-lpd-1.4.2-67.el6_6.1.ppc64.rpm s390x: cups-1.4.2-67.el6_6.1.s390x.rpm cups-debuginfo-1.4.2-67.el6_6.1.s390.rpm cups-debuginfo-1.4.2-67.el6_6.1.s390x.rpm cups-devel-1.4.2-67.el6_6.1.s390.rpm cups-devel-1.4.2-67.el6_6.1.s390x.rpm cups-libs-1.4.2-67.el6_6.1.s390.rpm cups-libs-1.4.2-67.el6_6.1.s390x.rpm cups-lpd-1.4.2-67.el6_6.1.s390x.rpm x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.x86_64.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.x86_64.rpm cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-php-1.4.2-67.el6_6.1.i686.rpm ppc64: cups-debuginfo-1.4.2-67.el6_6.1.ppc64.rpm cups-php-1.4.2-67.el6_6.1.ppc64.rpm s390x: cups-debuginfo-1.4.2-67.el6_6.1.s390x.rpm cups-php-1.4.2-67.el6_6.1.s390x.rpm x86_64: cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-php-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: cups-1.4.2-67.el6_6.1.src.rpm i386: cups-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-lpd-1.4.2-67.el6_6.1.i686.rpm x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-devel-1.4.2-67.el6_6.1.i686.rpm cups-devel-1.4.2-67.el6_6.1.x86_64.rpm cups-libs-1.4.2-67.el6_6.1.i686.rpm cups-libs-1.4.2-67.el6_6.1.x86_64.rpm cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm cups-php-1.4.2-67.el6_6.1.i686.rpm x86_64: cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm cups-php-1.4.2-67.el6_6.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: cups-1.6.3-17.el7_1.1.src.rpm noarch: cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm cups-client-1.6.3-17.el7_1.1.x86_64.rpm cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-libs-1.6.3-17.el7_1.1.i686.rpm cups-libs-1.6.3-17.el7_1.1.x86_64.rpm cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-devel-1.6.3-17.el7_1.1.i686.rpm cups-devel-1.6.3-17.el7_1.1.x86_64.rpm cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: cups-1.6.3-17.el7_1.1.src.rpm noarch: cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm cups-client-1.6.3-17.el7_1.1.x86_64.rpm cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-libs-1.6.3-17.el7_1.1.i686.rpm cups-libs-1.6.3-17.el7_1.1.x86_64.rpm cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-devel-1.6.3-17.el7_1.1.i686.rpm cups-devel-1.6.3-17.el7_1.1.x86_64.rpm cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: cups-1.6.3-17.el7_1.1.src.rpm noarch: cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm ppc64: cups-1.6.3-17.el7_1.1.ppc64.rpm cups-client-1.6.3-17.el7_1.1.ppc64.rpm cups-debuginfo-1.6.3-17.el7_1.1.ppc.rpm cups-debuginfo-1.6.3-17.el7_1.1.ppc64.rpm cups-devel-1.6.3-17.el7_1.1.ppc.rpm cups-devel-1.6.3-17.el7_1.1.ppc64.rpm cups-libs-1.6.3-17.el7_1.1.ppc.rpm cups-libs-1.6.3-17.el7_1.1.ppc64.rpm cups-lpd-1.6.3-17.el7_1.1.ppc64.rpm s390x: cups-1.6.3-17.el7_1.1.s390x.rpm cups-client-1.6.3-17.el7_1.1.s390x.rpm cups-debuginfo-1.6.3-17.el7_1.1.s390.rpm cups-debuginfo-1.6.3-17.el7_1.1.s390x.rpm cups-devel-1.6.3-17.el7_1.1.s390.rpm cups-devel-1.6.3-17.el7_1.1.s390x.rpm cups-libs-1.6.3-17.el7_1.1.s390.rpm cups-libs-1.6.3-17.el7_1.1.s390x.rpm cups-lpd-1.6.3-17.el7_1.1.s390x.rpm x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm cups-client-1.6.3-17.el7_1.1.x86_64.rpm cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-devel-1.6.3-17.el7_1.1.i686.rpm cups-devel-1.6.3-17.el7_1.1.x86_64.rpm cups-libs-1.6.3-17.el7_1.1.i686.rpm cups-libs-1.6.3-17.el7_1.1.x86_64.rpm cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: cups-1.6.3-17.ael7b_1.1.src.rpm noarch: cups-filesystem-1.6.3-17.ael7b_1.1.noarch.rpm ppc64le: cups-1.6.3-17.ael7b_1.1.ppc64le.rpm cups-client-1.6.3-17.ael7b_1.1.ppc64le.rpm cups-debuginfo-1.6.3-17.ael7b_1.1.ppc64le.rpm cups-devel-1.6.3-17.ael7b_1.1.ppc64le.rpm cups-libs-1.6.3-17.ael7b_1.1.ppc64le.rpm cups-lpd-1.6.3-17.ael7b_1.1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: cups-debuginfo-1.6.3-17.el7_1.1.ppc64.rpm cups-ipptool-1.6.3-17.el7_1.1.ppc64.rpm s390x: cups-debuginfo-1.6.3-17.el7_1.1.s390x.rpm cups-ipptool-1.6.3-17.el7_1.1.s390x.rpm x86_64: cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: cups-debuginfo-1.6.3-17.ael7b_1.1.ppc64le.rpm cups-ipptool-1.6.3-17.ael7b_1.1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: cups-1.6.3-17.el7_1.1.src.rpm noarch: cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm cups-client-1.6.3-17.el7_1.1.x86_64.rpm cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-devel-1.6.3-17.el7_1.1.i686.rpm cups-devel-1.6.3-17.el7_1.1.x86_64.rpm cups-libs-1.6.3-17.el7_1.1.i686.rpm cups-libs-1.6.3-17.el7_1.1.x86_64.rpm cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9679 https://access.redhat.com/security/cve/CVE-2015-1158 https://access.redhat.com/security/cve/CVE-2015-1159 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVgeHcXlSAg2UNWIIRAh1nAJ98EaDYp4J/i4NRT5iKDxSHRt5fVgCeOhjy Z4wgeyBJzfNJJ63iLHjIPPg= =T7rG -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Jun 19 06:19:00 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 19 Jun 2015 06:19:00 +0000 Subject: [RHSA-2015:1127-02] Low: Red Hat Enterprise Linux OpenStack Platform 4.0 Retirement Notice Message-ID: <201506190619.t5J6J0Ti017438@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Enterprise Linux OpenStack Platform 4.0 Retirement Notice Advisory ID: RHSA-2015:1127-02 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1127.html Issue date: 2015-06-19 ===================================================================== 1. Summary: This is the final notification for the retirement of Red Hat Enterprise Linux OpenStack Platform 4.0. 2. Description: In accordance with the Red Hat Enterprise Linux OpenStack Platform Support Policy, the life cycle of Production Support for version 4 will end on June 19, 2015. On June 20, 2015, Red Hat Enterprise Linux OpenStack Platform version 4 will enter an inactive state and will no longer receive updated packages, including Critical-impact security patches or urgent-priority bug fixes. In addition, technical support through Red Hat's Global Support Services will no longer be provided after this date. We encourage customers to plan their migration from Red Hat Enterprise Linux OpenStack Platform 4.0 to a supported version of Red Hat Enterprise Linux OpenStack Platform. To upgrade to Red Hat Enterprise Linux OpenStack Platform version 5, see Chapter "Upgrading" in the Release Notes document linked to in the References section. Full details of the Red Hat Enterprise Linux OpenStack Platform Life Cycle can be found at: https://access.redhat.com/support/policy/updates/openstack/platform/ 3. Solution: Customers are encouraged to plan their migration from Red Hat Enterprise Linux OpenStack Platform 4.0 to a supported version of Red Hat Enterprise Linux OpenStack Platform. 4. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/support/policy/updates/openstack/platform/ https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/4/html/Release_Notes/chap-OpenStackNotes-Upgrading.html 5. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVg7RHXlSAg2UNWIIRAthQAKC0RRqwMuTjO2gb6vifTGSxGsSVrgCgxUpy /wY4oCSpx2702ZxQPjV9ydQ= =4cET -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 23 08:49:06 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Jun 2015 08:49:06 +0000 Subject: [RHSA-2015:1135-01] Important: php security and bug fix update Message-ID: <201506230849.t5N8n6EH005551@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: php security and bug fix update Advisory ID: RHSA-2015:1135-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1135.html Issue date: 2015-06-23 CVE Names: CVE-2014-8142 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0273 CVE-2015-2301 CVE-2015-2348 CVE-2015-2783 CVE-2015-2787 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-3411 CVE-2015-3412 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 CVE-2015-4598 CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 CVE-2015-4602 CVE-2015-4603 CVE-2015-4604 CVE-2015-4605 ===================================================================== 1. Summary: Updated php packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. (CVE-2015-3330) A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024) An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-0232) An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2014-8142, CVE-2015-0231, CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603) It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-2348, CVE-2015-4025, CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598) Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2301, CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021) Multiple flaws were found in PHP's File Information (fileinfo) extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. (CVE-2014-9652, CVE-2015-4604, CVE-2015-4605) A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) This update also fixes the following bugs: * The libgmp library in some cases terminated unexpectedly with a segmentation fault when being used with other libraries that use the GMP memory management. With this update, PHP no longer changes libgmp memory allocators, which prevents the described crash from occurring. (BZ#1212305) * When using the Open Database Connectivity (ODBC) API, the PHP process in some cases terminated unexpectedly with a segmentation fault. The underlying code has been adjusted to prevent this crash. (BZ#1212299) * Previously, running PHP on a big-endian system sometimes led to memory corruption in the fileinfo module. This update adjusts the behavior of the PHP pointer so that it can be freed without causing memory corruption. (BZ#1212298) All php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1175718 - CVE-2014-8142 php: use after free vulnerability in unserialize() 1185397 - CVE-2015-0231 php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) 1185472 - CVE-2015-0232 php: Free called on unitialized pointer in exif.c 1188599 - CVE-2014-9652 file: out of bounds read in mconvert() 1188639 - CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c 1194730 - CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone 1194737 - CVE-2014-9705 php: heap buffer overflow in enchant_broker_request_dict() 1194747 - CVE-2015-2301 php: use after free in phar_object.c 1204868 - CVE-2015-4147 php: SoapClient's __call() type confusion through unserialize() 1207676 - CVE-2015-2787 php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re 1207682 - CVE-2015-2348 php: move_uploaded_file() NUL byte injection in file name 1213394 - CVE-2015-3330 php: pipelined request executed in deinitialized interpreter under httpd 2.4 1213407 - CVE-2015-3411 php: missing null byte checks for paths in various PHP extensions 1213442 - CVE-2015-4604 CVE-2015-4605 php: denial of service when processing a crafted file with Fileinfo 1213446 - CVE-2015-2783 php: buffer over-read in Phar metadata parsing 1213449 - CVE-2015-3329 php: buffer overflow in phar_set_inode() 1222485 - CVE-2015-4024 php: multipart/form-data request paring CPU usage DoS 1222538 - CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 php: type confusion issue in unserialize() with various SOAP methods 1223408 - CVE-2015-4025 php: CVE-2006-7243 regressions in 5.4+ 1223412 - CVE-2015-4022 php: integer overflow leading to heap overflow when reading FTP file listing 1223422 - CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character 1223425 - CVE-2015-4021 php: memory corruption in phar_parse_tarfile caused by empty entry file name 1223441 - CVE-2015-3307 php: invalid pointer free() in phar_tar_process_metadata() 1226916 - CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize() 1232823 - CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions 1232897 - CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions 1232918 - CVE-2015-4603 php: exception::getTraceAsString type confusion issue after unserialize 1232923 - CVE-2015-4602 php: Incomplete Class unserialization type confusion 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: php-5.4.16-36.el7_1.src.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: php-5.4.16-36.el7_1.src.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: php-5.4.16-36.el7_1.src.rpm ppc64: php-5.4.16-36.el7_1.ppc64.rpm php-cli-5.4.16-36.el7_1.ppc64.rpm php-common-5.4.16-36.el7_1.ppc64.rpm php-debuginfo-5.4.16-36.el7_1.ppc64.rpm php-gd-5.4.16-36.el7_1.ppc64.rpm php-ldap-5.4.16-36.el7_1.ppc64.rpm php-mysql-5.4.16-36.el7_1.ppc64.rpm php-odbc-5.4.16-36.el7_1.ppc64.rpm php-pdo-5.4.16-36.el7_1.ppc64.rpm php-pgsql-5.4.16-36.el7_1.ppc64.rpm php-process-5.4.16-36.el7_1.ppc64.rpm php-recode-5.4.16-36.el7_1.ppc64.rpm php-soap-5.4.16-36.el7_1.ppc64.rpm php-xml-5.4.16-36.el7_1.ppc64.rpm php-xmlrpc-5.4.16-36.el7_1.ppc64.rpm s390x: php-5.4.16-36.el7_1.s390x.rpm php-cli-5.4.16-36.el7_1.s390x.rpm php-common-5.4.16-36.el7_1.s390x.rpm php-debuginfo-5.4.16-36.el7_1.s390x.rpm php-gd-5.4.16-36.el7_1.s390x.rpm php-ldap-5.4.16-36.el7_1.s390x.rpm php-mysql-5.4.16-36.el7_1.s390x.rpm php-odbc-5.4.16-36.el7_1.s390x.rpm php-pdo-5.4.16-36.el7_1.s390x.rpm php-pgsql-5.4.16-36.el7_1.s390x.rpm php-process-5.4.16-36.el7_1.s390x.rpm php-recode-5.4.16-36.el7_1.s390x.rpm php-soap-5.4.16-36.el7_1.s390x.rpm php-xml-5.4.16-36.el7_1.s390x.rpm php-xmlrpc-5.4.16-36.el7_1.s390x.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: php-5.4.16-36.ael7b_1.src.rpm ppc64le: php-5.4.16-36.ael7b_1.ppc64le.rpm php-cli-5.4.16-36.ael7b_1.ppc64le.rpm php-common-5.4.16-36.ael7b_1.ppc64le.rpm php-debuginfo-5.4.16-36.ael7b_1.ppc64le.rpm php-gd-5.4.16-36.ael7b_1.ppc64le.rpm php-ldap-5.4.16-36.ael7b_1.ppc64le.rpm php-mysql-5.4.16-36.ael7b_1.ppc64le.rpm php-odbc-5.4.16-36.ael7b_1.ppc64le.rpm php-pdo-5.4.16-36.ael7b_1.ppc64le.rpm php-pgsql-5.4.16-36.ael7b_1.ppc64le.rpm php-process-5.4.16-36.ael7b_1.ppc64le.rpm php-recode-5.4.16-36.ael7b_1.ppc64le.rpm php-soap-5.4.16-36.ael7b_1.ppc64le.rpm php-xml-5.4.16-36.ael7b_1.ppc64le.rpm php-xmlrpc-5.4.16-36.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: php-bcmath-5.4.16-36.el7_1.ppc64.rpm php-dba-5.4.16-36.el7_1.ppc64.rpm php-debuginfo-5.4.16-36.el7_1.ppc64.rpm php-devel-5.4.16-36.el7_1.ppc64.rpm php-embedded-5.4.16-36.el7_1.ppc64.rpm php-enchant-5.4.16-36.el7_1.ppc64.rpm php-fpm-5.4.16-36.el7_1.ppc64.rpm php-intl-5.4.16-36.el7_1.ppc64.rpm php-mbstring-5.4.16-36.el7_1.ppc64.rpm php-mysqlnd-5.4.16-36.el7_1.ppc64.rpm php-pspell-5.4.16-36.el7_1.ppc64.rpm php-snmp-5.4.16-36.el7_1.ppc64.rpm s390x: php-bcmath-5.4.16-36.el7_1.s390x.rpm php-dba-5.4.16-36.el7_1.s390x.rpm php-debuginfo-5.4.16-36.el7_1.s390x.rpm php-devel-5.4.16-36.el7_1.s390x.rpm php-embedded-5.4.16-36.el7_1.s390x.rpm php-enchant-5.4.16-36.el7_1.s390x.rpm php-fpm-5.4.16-36.el7_1.s390x.rpm php-intl-5.4.16-36.el7_1.s390x.rpm php-mbstring-5.4.16-36.el7_1.s390x.rpm php-mysqlnd-5.4.16-36.el7_1.s390x.rpm php-pspell-5.4.16-36.el7_1.s390x.rpm php-snmp-5.4.16-36.el7_1.s390x.rpm x86_64: php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: php-bcmath-5.4.16-36.ael7b_1.ppc64le.rpm php-dba-5.4.16-36.ael7b_1.ppc64le.rpm php-debuginfo-5.4.16-36.ael7b_1.ppc64le.rpm php-devel-5.4.16-36.ael7b_1.ppc64le.rpm php-embedded-5.4.16-36.ael7b_1.ppc64le.rpm php-enchant-5.4.16-36.ael7b_1.ppc64le.rpm php-fpm-5.4.16-36.ael7b_1.ppc64le.rpm php-intl-5.4.16-36.ael7b_1.ppc64le.rpm php-mbstring-5.4.16-36.ael7b_1.ppc64le.rpm php-mysqlnd-5.4.16-36.ael7b_1.ppc64le.rpm php-pspell-5.4.16-36.ael7b_1.ppc64le.rpm php-snmp-5.4.16-36.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: php-5.4.16-36.el7_1.src.rpm x86_64: php-5.4.16-36.el7_1.x86_64.rpm php-cli-5.4.16-36.el7_1.x86_64.rpm php-common-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-gd-5.4.16-36.el7_1.x86_64.rpm php-ldap-5.4.16-36.el7_1.x86_64.rpm php-mysql-5.4.16-36.el7_1.x86_64.rpm php-odbc-5.4.16-36.el7_1.x86_64.rpm php-pdo-5.4.16-36.el7_1.x86_64.rpm php-pgsql-5.4.16-36.el7_1.x86_64.rpm php-process-5.4.16-36.el7_1.x86_64.rpm php-recode-5.4.16-36.el7_1.x86_64.rpm php-soap-5.4.16-36.el7_1.x86_64.rpm php-xml-5.4.16-36.el7_1.x86_64.rpm php-xmlrpc-5.4.16-36.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: php-bcmath-5.4.16-36.el7_1.x86_64.rpm php-dba-5.4.16-36.el7_1.x86_64.rpm php-debuginfo-5.4.16-36.el7_1.x86_64.rpm php-devel-5.4.16-36.el7_1.x86_64.rpm php-embedded-5.4.16-36.el7_1.x86_64.rpm php-enchant-5.4.16-36.el7_1.x86_64.rpm php-fpm-5.4.16-36.el7_1.x86_64.rpm php-intl-5.4.16-36.el7_1.x86_64.rpm php-mbstring-5.4.16-36.el7_1.x86_64.rpm php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm php-pspell-5.4.16-36.el7_1.x86_64.rpm php-snmp-5.4.16-36.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8142 https://access.redhat.com/security/cve/CVE-2014-9652 https://access.redhat.com/security/cve/CVE-2014-9705 https://access.redhat.com/security/cve/CVE-2014-9709 https://access.redhat.com/security/cve/CVE-2015-0231 https://access.redhat.com/security/cve/CVE-2015-0232 https://access.redhat.com/security/cve/CVE-2015-0273 https://access.redhat.com/security/cve/CVE-2015-2301 https://access.redhat.com/security/cve/CVE-2015-2348 https://access.redhat.com/security/cve/CVE-2015-2783 https://access.redhat.com/security/cve/CVE-2015-2787 https://access.redhat.com/security/cve/CVE-2015-3307 https://access.redhat.com/security/cve/CVE-2015-3329 https://access.redhat.com/security/cve/CVE-2015-3330 https://access.redhat.com/security/cve/CVE-2015-3411 https://access.redhat.com/security/cve/CVE-2015-3412 https://access.redhat.com/security/cve/CVE-2015-4021 https://access.redhat.com/security/cve/CVE-2015-4022 https://access.redhat.com/security/cve/CVE-2015-4024 https://access.redhat.com/security/cve/CVE-2015-4025 https://access.redhat.com/security/cve/CVE-2015-4026 https://access.redhat.com/security/cve/CVE-2015-4147 https://access.redhat.com/security/cve/CVE-2015-4148 https://access.redhat.com/security/cve/CVE-2015-4598 https://access.redhat.com/security/cve/CVE-2015-4599 https://access.redhat.com/security/cve/CVE-2015-4600 https://access.redhat.com/security/cve/CVE-2015-4601 https://access.redhat.com/security/cve/CVE-2015-4602 https://access.redhat.com/security/cve/CVE-2015-4603 https://access.redhat.com/security/cve/CVE-2015-4604 https://access.redhat.com/security/cve/CVE-2015-4605 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViR1aXlSAg2UNWIIRAuxPAJ42GLQVzvzc9kje0VjDv8NZWcPv6QCbBL+O dtqycPWs+07GhjmZ6NNx5Bg= =FREZ -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 23 11:56:43 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Jun 2015 11:56:43 +0000 Subject: [RHSA-2015:1137-01] Important: kernel security and bug fix update Message-ID: <201506231156.t5NBuitT004547@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:1137-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1137.html Issue date: 2015-06-23 CVE Names: CVE-2014-9420 CVE-2014-9529 CVE-2014-9584 CVE-2015-1573 CVE-2015-1593 CVE-2015-1805 CVE-2015-2830 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A race condition flaw was found in the way the Linux kernel keys management subsystem performed key garbage collection. A local attacker could attempt accessing a key while it was being garbage collected, which would cause the system to crash. (CVE-2014-9529, Moderate) * A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-2830, Low) * It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) * An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory. (CVE-2014-9584, Low) * A flaw was found in the way the nft_flush_table() function of the Linux kernel's netfilter tables implementation flushed rules that were referencing deleted chains. A local user who has the CAP_NET_ADMIN capability could use this flaw to crash the system. (CVE-2015-1573, Low) * An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593, Low) Red Hat would like to thank Carl Henrik Lunde for reporting CVE-2014-9420 and CVE-2014-9584. The security impact of the CVE-2015-1805 issue was discovered by Red Hat. This update also fixes several bugs. Documentation for these changes is available from the following Knowledgebase article: https://access.redhat.com/articles/1469163 All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1175235 - CVE-2014-9420 Kernel: fs: isofs: infinite loop in CE record entries 1179813 - CVE-2014-9529 kernel: use-after-free during key garbage collection 1180119 - CVE-2014-9584 kernel: isofs: unchecked printing of ER records 1190966 - CVE-2015-1573 kernel: panic while flushing nftables rules that reference deleted chains. 1192519 - CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 1208598 - CVE-2015-2830 kernel: int80 fork from 64-bit tasks mishandling 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-229.7.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.7.2.el7.noarch.rpm kernel-doc-3.10.0-229.7.2.el7.noarch.rpm x86_64: kernel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-headers-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.7.2.el7.x86_64.rpm perf-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-229.7.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.7.2.el7.noarch.rpm kernel-doc-3.10.0-229.7.2.el7.noarch.rpm x86_64: kernel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-headers-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.7.2.el7.x86_64.rpm perf-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-229.7.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.7.2.el7.noarch.rpm kernel-doc-3.10.0-229.7.2.el7.noarch.rpm ppc64: kernel-3.10.0-229.7.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-229.7.2.el7.ppc64.rpm kernel-debug-3.10.0-229.7.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-229.7.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.7.2.el7.ppc64.rpm kernel-devel-3.10.0-229.7.2.el7.ppc64.rpm kernel-headers-3.10.0-229.7.2.el7.ppc64.rpm kernel-tools-3.10.0-229.7.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-229.7.2.el7.ppc64.rpm perf-3.10.0-229.7.2.el7.ppc64.rpm perf-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm s390x: kernel-3.10.0-229.7.2.el7.s390x.rpm kernel-debug-3.10.0-229.7.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-229.7.2.el7.s390x.rpm kernel-debug-devel-3.10.0-229.7.2.el7.s390x.rpm kernel-debuginfo-3.10.0-229.7.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.7.2.el7.s390x.rpm kernel-devel-3.10.0-229.7.2.el7.s390x.rpm kernel-headers-3.10.0-229.7.2.el7.s390x.rpm kernel-kdump-3.10.0-229.7.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.7.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-229.7.2.el7.s390x.rpm perf-3.10.0-229.7.2.el7.s390x.rpm perf-debuginfo-3.10.0-229.7.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.s390x.rpm x86_64: kernel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-headers-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.7.2.el7.x86_64.rpm perf-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-229.7.2.ael7b.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.7.2.ael7b.noarch.rpm kernel-doc-3.10.0-229.7.2.ael7b.noarch.rpm ppc64le: kernel-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-bootwrapper-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debug-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debug-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-devel-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-headers-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-tools-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-tools-libs-3.10.0-229.7.2.ael7b.ppc64le.rpm perf-3.10.0-229.7.2.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.7.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-229.7.2.el7.ppc64.rpm perf-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm python-perf-3.10.0-229.7.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.ppc64.rpm s390x: kernel-debug-debuginfo-3.10.0-229.7.2.el7.s390x.rpm kernel-debuginfo-3.10.0-229.7.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.7.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.7.2.el7.s390x.rpm perf-debuginfo-3.10.0-229.7.2.el7.s390x.rpm python-perf-3.10.0-229.7.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.s390x.rpm x86_64: kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: kernel-debug-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debug-devel-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm kernel-tools-libs-devel-3.10.0-229.7.2.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm python-perf-3.10.0-229.7.2.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.7.2.ael7b.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-229.7.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.7.2.el7.noarch.rpm kernel-doc-3.10.0-229.7.2.el7.noarch.rpm x86_64: kernel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-devel-3.10.0-229.7.2.el7.x86_64.rpm kernel-headers-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.7.2.el7.x86_64.rpm perf-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.7.2.el7.x86_64.rpm perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm python-perf-3.10.0-229.7.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.7.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9420 https://access.redhat.com/security/cve/CVE-2014-9529 https://access.redhat.com/security/cve/CVE-2014-9584 https://access.redhat.com/security/cve/CVE-2015-1573 https://access.redhat.com/security/cve/CVE-2015-1593 https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/cve/CVE-2015-2830 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViUlNXlSAg2UNWIIRAiICAKCe5rS1pxmuaB8Twa9N+Wqzjw8iIwCeOUTB /M6H2s5DBQpEXynPWSzcecE= =BF4y -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 23 12:01:14 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Jun 2015 12:01:14 +0000 Subject: [RHSA-2015:1138-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <201506231201.t5NC1EOk013829@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2015:1138-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1138.html Issue date: 2015-06-23 CVE Names: CVE-2014-9420 CVE-2014-9529 CVE-2014-9584 CVE-2015-1573 CVE-2015-1593 CVE-2015-1805 CVE-2015-2830 ===================================================================== 1. Summary: Updated kernel-rt packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise MRG 2.5. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A race condition flaw was found in the way the Linux kernel keys management subsystem performed key garbage collection. A local attacker could attempt accessing a key while it was being garbage collected, which would cause the system to crash. (CVE-2014-9529, Moderate) * A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-2830, Low) * It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) * An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory. (CVE-2014-9584, Low) * A flaw was found in the way the nft_flush_table() function of the Linux kernel's netfilter tables implementation flushed rules that were referencing deleted chains. A local user who has the CAP_NET_ADMIN capability could use this flaw to crash the system. (CVE-2015-1573, Low) * An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593, Low) Red Hat would like to thank Carl Henrik Lunde for reporting CVE-2014-9420 and CVE-2014-9584. The security impact of CVE-2015-1805 was discovered by Red Hat. This update provides a build of the kernel-rt package for Red Hat Enterprise MRG 2.5 that is layered on Red Hat Enterprise Linux 6, and fixes the following issues: * storvsc: get rid of overly verbose warning messages * storvsc: force discovery of LUNs that may have been removed * storvsc: in responce to a scan event, scan the hos * storvsc: NULL pointer dereference fix * futex: Mention key referencing differences between shared and private futexes * futex: Ensure get_futex_key_refs() always implies a barrier * kernel module: set nx before marking module MODULE_STATE_COMING * kernel module: Clean up ro/nx after early module load failures * btrfs: make xattr replace operations atomic * megaraid_sas: revert: Add release date and update driver version * radeon: fix kernel segfault in hwmonitor (BZ#1223077) Bug fix: * There is an XFS optimization that depended on a spinlock to disable preemption using the preempt_disable() function. When CONFIG_PREEMPT_RT is enabled on realtime kernels, spinlocks do not disable preemption while held, so the XFS critical section was not protected from preemption. Systems on the Realtime kernel-rt could lock up in this XFS optimization when a task that locked all the counters was then preempted by a realtime task, causing all callers of that lock to block indefinitely. This update disables the optimization when building a kernel with CONFIG_PREEMPT_RT_FULL enabled. (BZ#1217849) All kernel-rt users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1175235 - CVE-2014-9420 Kernel: fs: isofs: infinite loop in CE record entries 1179813 - CVE-2014-9529 kernel: use-after-free during key garbage collection 1180119 - CVE-2014-9584 kernel: isofs: unchecked printing of ER records 1190966 - CVE-2015-1573 kernel: panic while flushing nftables rules that reference deleted chains. 1192519 - CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 1208598 - CVE-2015-2830 kernel: int80 fork from 64-bit tasks mishandling 1217849 - xfs can live lock 1223077 - RFE: rebase the 3.10 kernel-rt 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-229.rt56.153.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-229.rt56.153.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-229.rt56.153.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-229.rt56.153.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-229.rt56.153.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9420 https://access.redhat.com/security/cve/CVE-2014-9529 https://access.redhat.com/security/cve/CVE-2014-9584 https://access.redhat.com/security/cve/CVE-2015-1573 https://access.redhat.com/security/cve/CVE-2015-1593 https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/cve/CVE-2015-2830 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViUmIXlSAg2UNWIIRAuqEAJ458uJew8aiPl2EwYzRtI+MO/SA6wCfaZj1 J+XUwRcFDswj/xg/Hp/iAT4= =ZEWz -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 23 12:03:29 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Jun 2015 12:03:29 +0000 Subject: [RHSA-2015:1139-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <20150623120355.E7CC940313@orphan.localdomain> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2015:1139-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1139.html Issue date: 2015-05-20 Updated on: 2015-06-23 CVE Names: CVE-2014-9420 CVE-2014-9529 CVE-2014-9584 CVE-2015-1573 CVE-2015-1593 CVE-2015-1805 CVE-2015-2830 ===================================================================== 1. Summary: Updated kernel-rt packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A race condition flaw was found in the way the Linux kernel keys management subsystem performed key garbage collection. A local attacker could attempt accessing a key while it was being garbage collected, which would cause the system to crash. (CVE-2014-9529, Moderate) * A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-2830, Low) * It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) * An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory. (CVE-2014-9584, Low) * A flaw was found in the way the nft_flush_table() function of the Linux kernel's netfilter tables implementation flushed rules that were referencing deleted chains. A local user who has the CAP_NET_ADMIN capability could use this flaw to crash the system. (CVE-2015-1573, Low) * An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593, Low) Red Hat would like to thank Carl Henrik Lunde for reporting CVE-2014-9420 and CVE-2014-9584. The security impact of CVE-2015-1805 was discovered by Red Hat. The kernel-rt packages have been upgraded to version 3.10.0-229.7.2, which provides a number of bug fixes and enhancements over the previous version, including: * storvsc: get rid of overly verbose warning messages * storvsc: force discovery of LUNs that may have been removed * storvsc: in responce to a scan event, scan the hos * storvsc: NULL pointer dereference fix * futex: Mention key referencing differences between shared and private futexes * futex: Ensure get_futex_key_refs() always implies a barrier * kernel module: set nx before marking module MODULE_STATE_COMING * kernel module: Clean up ro/nx after early module load failures * btrfs: make xattr replace operations atomic * megaraid_sas: revert: Add release date and update driver version * radeon: fix kernel segfault in hwmonitor (BZ#1223955) Bug fix: * There is an XFS optimization that depended on a spinlock to disable preemption using the preempt_disable() function. When CONFIG_PREEMPT_RT is enabled on realtime kernels, spinlocks do not disable preemption while held, so the XFS critical section was not protected from preemption. Systems on the Realtime kernel-rt could lock up in this XFS optimization when a task that locked all the counters was then preempted by a realtime task, causing all callers of that lock to block indefinitely. This update disables the optimization when building a kernel with CONFIG_PREEMPT_RT_FULL enabled. (BZ#1223955) All kernel-rt users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1175235 - CVE-2014-9420 Kernel: fs: isofs: infinite loop in CE record entries 1179813 - CVE-2014-9529 kernel: use-after-free during key garbage collection 1180119 - CVE-2014-9584 kernel: isofs: unchecked printing of ER records 1190966 - CVE-2015-1573 kernel: panic while flushing nftables rules that reference deleted chains. 1192519 - CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 1208598 - CVE-2015-2830 kernel: int80 fork from 64-bit tasks mishandling 1212083 - kernel-rt: rebase to the RHEL7.1.z batch3 source tree 6. Package List: Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-229.7.2.rt56.141.6.el7_1.src.rpm noarch: kernel-rt-doc-3.10.0-229.7.2.rt56.141.6.el7_1.noarch.rpm x86_64: kernel-rt-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-debug-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-debug-devel-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-debuginfo-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-devel-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-trace-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm kernel-rt-trace-devel-3.10.0-229.7.2.rt56.141.6.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9420 https://access.redhat.com/security/cve/CVE-2014-9529 https://access.redhat.com/security/cve/CVE-2014-9584 https://access.redhat.com/security/cve/CVE-2015-1573 https://access.redhat.com/security/cve/CVE-2015-1593 https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/cve/CVE-2015-2830 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViUrXXlSAg2UNWIIRAo8GAKC2IWFpCka4KTyeAFFVxTSqmhN75gCcDw7x YMnhZK3sM26PhiU9TAE3On4= =VQHb -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 23 12:04:52 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Jun 2015 12:04:52 +0000 Subject: [RHSA-2015:1153-01] Moderate: mailman security and bug fix update Message-ID: <201506231204.t5NC4ri3015871@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: mailman security and bug fix update Advisory ID: RHSA-2015:1153-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1153.html Issue date: 2015-06-23 CVE Names: CVE-2015-2775 ===================================================================== 1. Summary: Updated mailman packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Mailman is a program used to help manage email discussion lists. It was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman. (CVE-2015-2775) This update also fixes the following bugs: * Previously, it was impossible to configure Mailman in a way that Domain-based Message Authentication, Reporting & Conformance (DMARC) would recognize Sender alignment for Domain Key Identified Mail (DKIM) signatures. Consequently, Mailman list subscribers that belonged to a mail server with a "reject" policy for DMARC, such as yahoo.com or AOL.com, were unable to receive Mailman forwarded messages from senders residing in any domain that provided DKIM signatures. With this update, domains with a "reject" DMARC policy are recognized correctly, and Mailman list administrators are able to configure the way these messages are handled. As a result, after a proper configuration, subscribers now correctly receive Mailman forwarded messages in this scenario. (BZ#1229288) * Previously, the /etc/mailman file had incorrectly set permissions, which in some cases caused removing Mailman lists to fail with a "'NoneType' object has no attribute 'close'" message. With this update, the permissions value for /etc/mailman is correctly set to 2775 instead of 0755, and removing Mailman lists now works as expected. (BZ#1229307) * Prior to this update, the mailman utility incorrectly installed the tmpfiles configuration in the /etc/tmpfiles.d/ directory. As a consequence, changes made to mailman tmpfiles configuration were overwritten if the mailman packages were reinstalled or updated. The mailman utility now installs the tmpfiles configuration in the /usr/lib/tmpfiles.d/ directory, and changes made to them by the user are preserved on reinstall or update. (BZ#1229306) All mailman users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1208059 - CVE-2015-2775 mailman: directory traversal in MTA transports that deliver programmatically 1229288 - Yahoo.com and AOL DMARC reject policies cripples Mailman-2.1.12 - update to newer release 1229307 - /etc/mailman has wrong permissions 0755 instead of 2775 6. Package List: Red Hat Enterprise Linux Server (v. 7): Source: mailman-2.1.15-21.el7_1.src.rpm ppc64: mailman-2.1.15-21.el7_1.ppc64.rpm mailman-debuginfo-2.1.15-21.el7_1.ppc64.rpm s390x: mailman-2.1.15-21.el7_1.s390x.rpm mailman-debuginfo-2.1.15-21.el7_1.s390x.rpm x86_64: mailman-2.1.15-21.el7_1.x86_64.rpm mailman-debuginfo-2.1.15-21.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: mailman-2.1.15-21.ael7b_1.src.rpm ppc64le: mailman-2.1.15-21.ael7b_1.ppc64le.rpm mailman-debuginfo-2.1.15-21.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: mailman-2.1.15-21.el7_1.src.rpm x86_64: mailman-2.1.15-21.el7_1.x86_64.rpm mailman-debuginfo-2.1.15-21.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2775 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViUs9XlSAg2UNWIIRAuYlAJ4q2rAStzwEbV1JGGjKY4tb1lhP/gCcCb5A btptJT3G85uqbP5yWdDNJoU= =xWgW -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 23 12:07:45 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 23 Jun 2015 12:07:45 +0000 Subject: [RHSA-2015:1154-01] Moderate: libreswan security, bug fix and enhancement update Message-ID: <201506231207.t5NC7kfJ017471@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libreswan security, bug fix and enhancement update Advisory ID: RHSA-2015:1154-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1154.html Issue date: 2015-06-23 CVE Names: CVE-2015-3204 ===================================================================== 1. Summary: Updated libreswan packages that fix one security issue, several bugs and add two enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Libreswan is an implementation of IPsec & IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). A flaw was discovered in the way Libreswan's IKE daemon processed certain IKEv1 payloads. A remote attacker could send specially crafted IKEv1 payloads that, when processed, would lead to a denial of service (daemon crash). (CVE-2015-3204) Red Hat would like to thank Javantea for reporting this issue. This update fixes the following bugs: * Previously, the programs/pluto/state.h and programs/pluto/kernel_netlink.c files had a maximum SELinux context size of 257 and 1024 respectively. These restrictions set by libreswan limited the size of the context that can be exchanged by pluto (the IPSec daemon) when using a Labeled Internet Protocol Security (IPsec). The SElinux labels for Labeled IPsec have been extended to 4096 bytes and the mentioned restrictions no longer exist. (BZ#1198650) * On some architectures, the kernel AES_GCM IPsec algorithm did not work properly with acceleration drivers. On those kernels, some acceleration modules are added to the modprobe blacklist. However, Libreswan was ignoring this blacklist, leading to AES_GCM failures. This update adds support for the module blacklist to the libreswan packages and thus prevents the AES_GCM failures from occurring. (BZ#1208022) * An IPv6 issue has been resolved that prevented ipv6-icmp Neighbour Discovery from working properly once an IPsec tunnel is established (and one endpoint reboots). When upgrading, ensure that /etc/ipsec.conf is loading all /etc/ipsec.d/*conf files using the /etc/ipsec.conf "include" statement, or explicitly include this new configuration file in /etc/ipsec.conf. (BZ#1208023) * A FIPS self-test prevented libreswan from properly starting in FIPS mode. This bug has been fixed and libreswan now works in FIPS mode as expected. (BZ#1211146) In addition, this update adds the following enhancements: * A new option "seedbits=" has been added to pre-seed the Network Security Services (NSS) pseudo random number generator (PRNG) function with entropy from the /dev/random file on startup. This option is disabled by default. It can be enabled by setting the "seedbits=" option in the "config setup" section in the /etc/ipsec.conf file. (BZ#1198649) * The build process now runs a Cryptographic Algorithm Validation Program (CAVP) certification test on the Internet Key Exchange version 1 and 2 (IKEv1 and IKEv2) PRF/PRF+ functions. (BZ#1213652) All libreswan users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1223361 - CVE-2015-3204 libreswan: crafted IKE packet causes daemon restart 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libreswan-3.12-10.1.el7_1.src.rpm x86_64: libreswan-3.12-10.1.el7_1.x86_64.rpm libreswan-debuginfo-3.12-10.1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libreswan-3.12-10.1.el7_1.src.rpm ppc64: libreswan-3.12-10.1.el7_1.ppc64.rpm libreswan-debuginfo-3.12-10.1.el7_1.ppc64.rpm s390x: libreswan-3.12-10.1.el7_1.s390x.rpm libreswan-debuginfo-3.12-10.1.el7_1.s390x.rpm x86_64: libreswan-3.12-10.1.el7_1.x86_64.rpm libreswan-debuginfo-3.12-10.1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libreswan-3.12-10.1.ael7b_1.src.rpm ppc64le: libreswan-3.12-10.1.ael7b_1.ppc64le.rpm libreswan-debuginfo-3.12-10.1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libreswan-3.12-10.1.el7_1.src.rpm x86_64: libreswan-3.12-10.1.el7_1.x86_64.rpm libreswan-debuginfo-3.12-10.1.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3204 https://access.redhat.com/security/updates/classification/#moderate https://libreswan.org/security/CVE-2015-3204/CVE-2015-3204.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViUt+XlSAg2UNWIIRAhLuAJsEddIeWs5sBhF5yjcnK+abjnEH/wCfU1Og 9jnVOnsR2dPY85MaUNTSg1o= =jAJY -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 24 19:44:04 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 24 Jun 2015 19:44:04 +0000 Subject: [RHSA-2015:1184-01] Critical: flash-plugin security update Message-ID: <201506241944.t5OJi5hS002372@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1184-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1184.html Issue date: 2015-06-24 CVE Names: CVE-2015-3113 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. A flaw was found in the way flash-plugin displayed certain SWF content. An attacker could use this flaw to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2015-3113) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.468. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1235036 - CVE-2015-3113 flash-plugin: code execution issue fixed in APSB15-14 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.468-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.468-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.468-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.468-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.468-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.468-1.el6_6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.468-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.468-1.el6_6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.468-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.468-1.el6_6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3113 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-14.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFViwhlXlSAg2UNWIIRAuJoAJ9NKtNEsIGloHW1POrLRnlosTuNdQCgjmyH Hua1dyu9I8s8oHfKflmLfEw= =K2M/ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 07:39:10 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2015 07:39:10 +0000 Subject: [RHSA-2015:1185-01] Moderate: nss security update Message-ID: <201506250726.t5P7QjZe030015@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: nss security update Advisory ID: RHSA-2015:1185-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1185.html Issue date: 2015-06-25 CVE Names: CVE-2015-4000 ===================================================================== 1. Summary: Updated nss and nss-util packages that fix one security issue, several bugs and add various enhancements are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Users of nss and nss-util are advised to upgrade to these updated packages, which fix these security flaws, bugs, and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm i386: nss-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-sysinit-3.19.1-3.el6_6.i686.rpm nss-tools-3.19.1-3.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm i386: nss-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-sysinit-3.19.1-3.el6_6.i686.rpm nss-tools-3.19.1-3.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm ppc64: nss-3.19.1-3.el6_6.ppc.rpm nss-3.19.1-3.el6_6.ppc64.rpm nss-debuginfo-3.19.1-3.el6_6.ppc.rpm nss-debuginfo-3.19.1-3.el6_6.ppc64.rpm nss-devel-3.19.1-3.el6_6.ppc.rpm nss-devel-3.19.1-3.el6_6.ppc64.rpm nss-sysinit-3.19.1-3.el6_6.ppc64.rpm nss-tools-3.19.1-3.el6_6.ppc64.rpm nss-util-3.19.1-1.el6_6.ppc.rpm nss-util-3.19.1-1.el6_6.ppc64.rpm nss-util-debuginfo-3.19.1-1.el6_6.ppc.rpm nss-util-debuginfo-3.19.1-1.el6_6.ppc64.rpm nss-util-devel-3.19.1-1.el6_6.ppc.rpm nss-util-devel-3.19.1-1.el6_6.ppc64.rpm s390x: nss-3.19.1-3.el6_6.s390.rpm nss-3.19.1-3.el6_6.s390x.rpm nss-debuginfo-3.19.1-3.el6_6.s390.rpm nss-debuginfo-3.19.1-3.el6_6.s390x.rpm nss-devel-3.19.1-3.el6_6.s390.rpm nss-devel-3.19.1-3.el6_6.s390x.rpm nss-sysinit-3.19.1-3.el6_6.s390x.rpm nss-tools-3.19.1-3.el6_6.s390x.rpm nss-util-3.19.1-1.el6_6.s390.rpm nss-util-3.19.1-1.el6_6.s390x.rpm nss-util-debuginfo-3.19.1-1.el6_6.s390.rpm nss-util-debuginfo-3.19.1-1.el6_6.s390x.rpm nss-util-devel-3.19.1-1.el6_6.s390.rpm nss-util-devel-3.19.1-1.el6_6.s390x.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm ppc64: nss-debuginfo-3.19.1-3.el6_6.ppc.rpm nss-debuginfo-3.19.1-3.el6_6.ppc64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.ppc.rpm nss-pkcs11-devel-3.19.1-3.el6_6.ppc64.rpm s390x: nss-debuginfo-3.19.1-3.el6_6.s390.rpm nss-debuginfo-3.19.1-3.el6_6.s390x.rpm nss-pkcs11-devel-3.19.1-3.el6_6.s390.rpm nss-pkcs11-devel-3.19.1-3.el6_6.s390x.rpm x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm i386: nss-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-sysinit-3.19.1-3.el6_6.i686.rpm nss-tools-3.19.1-3.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm ppc64: nss-3.19.1-3.el7_1.ppc.rpm nss-3.19.1-3.el7_1.ppc64.rpm nss-debuginfo-3.19.1-3.el7_1.ppc.rpm nss-debuginfo-3.19.1-3.el7_1.ppc64.rpm nss-devel-3.19.1-3.el7_1.ppc.rpm nss-devel-3.19.1-3.el7_1.ppc64.rpm nss-sysinit-3.19.1-3.el7_1.ppc64.rpm nss-tools-3.19.1-3.el7_1.ppc64.rpm nss-util-3.19.1-1.el7_1.ppc.rpm nss-util-3.19.1-1.el7_1.ppc64.rpm nss-util-debuginfo-3.19.1-1.el7_1.ppc.rpm nss-util-debuginfo-3.19.1-1.el7_1.ppc64.rpm nss-util-devel-3.19.1-1.el7_1.ppc.rpm nss-util-devel-3.19.1-1.el7_1.ppc64.rpm s390x: nss-3.19.1-3.el7_1.s390.rpm nss-3.19.1-3.el7_1.s390x.rpm nss-debuginfo-3.19.1-3.el7_1.s390.rpm nss-debuginfo-3.19.1-3.el7_1.s390x.rpm nss-devel-3.19.1-3.el7_1.s390.rpm nss-devel-3.19.1-3.el7_1.s390x.rpm nss-sysinit-3.19.1-3.el7_1.s390x.rpm nss-tools-3.19.1-3.el7_1.s390x.rpm nss-util-3.19.1-1.el7_1.s390.rpm nss-util-3.19.1-1.el7_1.s390x.rpm nss-util-debuginfo-3.19.1-1.el7_1.s390.rpm nss-util-debuginfo-3.19.1-1.el7_1.s390x.rpm nss-util-devel-3.19.1-1.el7_1.s390.rpm nss-util-devel-3.19.1-1.el7_1.s390x.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-3.19.1-3.ael7b_1.src.rpm nss-util-3.19.1-1.ael7b_1.src.rpm ppc64le: nss-3.19.1-3.ael7b_1.ppc64le.rpm nss-debuginfo-3.19.1-3.ael7b_1.ppc64le.rpm nss-devel-3.19.1-3.ael7b_1.ppc64le.rpm nss-sysinit-3.19.1-3.ael7b_1.ppc64le.rpm nss-tools-3.19.1-3.ael7b_1.ppc64le.rpm nss-util-3.19.1-1.ael7b_1.ppc64le.rpm nss-util-debuginfo-3.19.1-1.ael7b_1.ppc64le.rpm nss-util-devel-3.19.1-1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: nss-debuginfo-3.19.1-3.el7_1.ppc.rpm nss-debuginfo-3.19.1-3.el7_1.ppc64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.ppc.rpm nss-pkcs11-devel-3.19.1-3.el7_1.ppc64.rpm s390x: nss-debuginfo-3.19.1-3.el7_1.s390.rpm nss-debuginfo-3.19.1-3.el7_1.s390x.rpm nss-pkcs11-devel-3.19.1-3.el7_1.s390.rpm nss-pkcs11-devel-3.19.1-3.el7_1.s390x.rpm x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: nss-debuginfo-3.19.1-3.ael7b_1.ppc64le.rpm nss-pkcs11-devel-3.19.1-3.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVi60dXlSAg2UNWIIRAjqOAJ9fdQ42RbvWJ5RAAdEKHgCPYjidUQCePzlw +s/6Irm6/MeLWN04y51L8ww= =jxpf -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 08:55:45 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2015 08:55:45 +0000 Subject: [RHSA-2015:1186-01] Important: php55-php security update Message-ID: <201506250855.t5P8tkAC013431@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: php55-php security update Advisory ID: RHSA-2015:1186-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1186.html Issue date: 2015-06-25 CVE Names: CVE-2015-2783 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-3411 CVE-2015-3412 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4598 CVE-2015-4602 CVE-2015-4603 CVE-2015-4604 CVE-2015-4605 ===================================================================== 1. Summary: Updated php55-php packages that fix multiple security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. (CVE-2015-3330) A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024) An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4602, CVE-2015-4603) It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4025, CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598) Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021) Multiple flaws were found in PHP's File Information (fileinfo) extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. (CVE-2015-4604, CVE-2015-4605) All php55-php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd24-httpd service must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1213394 - CVE-2015-3330 php: pipelined request executed in deinitialized interpreter under httpd 2.4 1213407 - CVE-2015-3411 php: missing null byte checks for paths in various PHP extensions 1213442 - CVE-2015-4604 CVE-2015-4605 php: denial of service when processing a crafted file with Fileinfo 1213446 - CVE-2015-2783 php: buffer over-read in Phar metadata parsing 1213449 - CVE-2015-3329 php: buffer overflow in phar_set_inode() 1222485 - CVE-2015-4024 php: multipart/form-data request paring CPU usage DoS 1223408 - CVE-2015-4025 php: CVE-2006-7243 regressions in 5.4+ 1223412 - CVE-2015-4022 php: integer overflow leading to heap overflow when reading FTP file listing 1223422 - CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character 1223425 - CVE-2015-4021 php: memory corruption in phar_parse_tarfile caused by empty entry file name 1223441 - CVE-2015-3307 php: invalid pointer free() in phar_tar_process_metadata() 1232823 - CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions 1232897 - CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions 1232918 - CVE-2015-4603 php: exception::getTraceAsString type confusion issue after unserialize 1232923 - CVE-2015-4602 php: Incomplete Class unserialization type confusion 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: php55-php-5.5.21-4.el6.src.rpm x86_64: php55-php-5.5.21-4.el6.x86_64.rpm php55-php-bcmath-5.5.21-4.el6.x86_64.rpm php55-php-cli-5.5.21-4.el6.x86_64.rpm php55-php-common-5.5.21-4.el6.x86_64.rpm php55-php-dba-5.5.21-4.el6.x86_64.rpm php55-php-debuginfo-5.5.21-4.el6.x86_64.rpm php55-php-devel-5.5.21-4.el6.x86_64.rpm php55-php-enchant-5.5.21-4.el6.x86_64.rpm php55-php-fpm-5.5.21-4.el6.x86_64.rpm php55-php-gd-5.5.21-4.el6.x86_64.rpm php55-php-gmp-5.5.21-4.el6.x86_64.rpm php55-php-imap-5.5.21-4.el6.x86_64.rpm php55-php-intl-5.5.21-4.el6.x86_64.rpm php55-php-ldap-5.5.21-4.el6.x86_64.rpm php55-php-mbstring-5.5.21-4.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el6.x86_64.rpm php55-php-odbc-5.5.21-4.el6.x86_64.rpm php55-php-opcache-5.5.21-4.el6.x86_64.rpm php55-php-pdo-5.5.21-4.el6.x86_64.rpm php55-php-pgsql-5.5.21-4.el6.x86_64.rpm php55-php-process-5.5.21-4.el6.x86_64.rpm php55-php-pspell-5.5.21-4.el6.x86_64.rpm php55-php-recode-5.5.21-4.el6.x86_64.rpm php55-php-snmp-5.5.21-4.el6.x86_64.rpm php55-php-soap-5.5.21-4.el6.x86_64.rpm php55-php-tidy-5.5.21-4.el6.x86_64.rpm php55-php-xml-5.5.21-4.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: php55-php-5.5.21-4.el6.src.rpm x86_64: php55-php-5.5.21-4.el6.x86_64.rpm php55-php-bcmath-5.5.21-4.el6.x86_64.rpm php55-php-cli-5.5.21-4.el6.x86_64.rpm php55-php-common-5.5.21-4.el6.x86_64.rpm php55-php-dba-5.5.21-4.el6.x86_64.rpm php55-php-debuginfo-5.5.21-4.el6.x86_64.rpm php55-php-devel-5.5.21-4.el6.x86_64.rpm php55-php-enchant-5.5.21-4.el6.x86_64.rpm php55-php-fpm-5.5.21-4.el6.x86_64.rpm php55-php-gd-5.5.21-4.el6.x86_64.rpm php55-php-gmp-5.5.21-4.el6.x86_64.rpm php55-php-imap-5.5.21-4.el6.x86_64.rpm php55-php-intl-5.5.21-4.el6.x86_64.rpm php55-php-ldap-5.5.21-4.el6.x86_64.rpm php55-php-mbstring-5.5.21-4.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el6.x86_64.rpm php55-php-odbc-5.5.21-4.el6.x86_64.rpm php55-php-opcache-5.5.21-4.el6.x86_64.rpm php55-php-pdo-5.5.21-4.el6.x86_64.rpm php55-php-pgsql-5.5.21-4.el6.x86_64.rpm php55-php-process-5.5.21-4.el6.x86_64.rpm php55-php-pspell-5.5.21-4.el6.x86_64.rpm php55-php-recode-5.5.21-4.el6.x86_64.rpm php55-php-snmp-5.5.21-4.el6.x86_64.rpm php55-php-soap-5.5.21-4.el6.x86_64.rpm php55-php-tidy-5.5.21-4.el6.x86_64.rpm php55-php-xml-5.5.21-4.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: php55-php-5.5.21-4.el6.src.rpm x86_64: php55-php-5.5.21-4.el6.x86_64.rpm php55-php-bcmath-5.5.21-4.el6.x86_64.rpm php55-php-cli-5.5.21-4.el6.x86_64.rpm php55-php-common-5.5.21-4.el6.x86_64.rpm php55-php-dba-5.5.21-4.el6.x86_64.rpm php55-php-debuginfo-5.5.21-4.el6.x86_64.rpm php55-php-devel-5.5.21-4.el6.x86_64.rpm php55-php-enchant-5.5.21-4.el6.x86_64.rpm php55-php-fpm-5.5.21-4.el6.x86_64.rpm php55-php-gd-5.5.21-4.el6.x86_64.rpm php55-php-gmp-5.5.21-4.el6.x86_64.rpm php55-php-imap-5.5.21-4.el6.x86_64.rpm php55-php-intl-5.5.21-4.el6.x86_64.rpm php55-php-ldap-5.5.21-4.el6.x86_64.rpm php55-php-mbstring-5.5.21-4.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el6.x86_64.rpm php55-php-odbc-5.5.21-4.el6.x86_64.rpm php55-php-opcache-5.5.21-4.el6.x86_64.rpm php55-php-pdo-5.5.21-4.el6.x86_64.rpm php55-php-pgsql-5.5.21-4.el6.x86_64.rpm php55-php-process-5.5.21-4.el6.x86_64.rpm php55-php-pspell-5.5.21-4.el6.x86_64.rpm php55-php-recode-5.5.21-4.el6.x86_64.rpm php55-php-snmp-5.5.21-4.el6.x86_64.rpm php55-php-soap-5.5.21-4.el6.x86_64.rpm php55-php-tidy-5.5.21-4.el6.x86_64.rpm php55-php-xml-5.5.21-4.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: php55-php-5.5.21-4.el6.src.rpm x86_64: php55-php-5.5.21-4.el6.x86_64.rpm php55-php-bcmath-5.5.21-4.el6.x86_64.rpm php55-php-cli-5.5.21-4.el6.x86_64.rpm php55-php-common-5.5.21-4.el6.x86_64.rpm php55-php-dba-5.5.21-4.el6.x86_64.rpm php55-php-debuginfo-5.5.21-4.el6.x86_64.rpm php55-php-devel-5.5.21-4.el6.x86_64.rpm php55-php-enchant-5.5.21-4.el6.x86_64.rpm php55-php-fpm-5.5.21-4.el6.x86_64.rpm php55-php-gd-5.5.21-4.el6.x86_64.rpm php55-php-gmp-5.5.21-4.el6.x86_64.rpm php55-php-imap-5.5.21-4.el6.x86_64.rpm php55-php-intl-5.5.21-4.el6.x86_64.rpm php55-php-ldap-5.5.21-4.el6.x86_64.rpm php55-php-mbstring-5.5.21-4.el6.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el6.x86_64.rpm php55-php-odbc-5.5.21-4.el6.x86_64.rpm php55-php-opcache-5.5.21-4.el6.x86_64.rpm php55-php-pdo-5.5.21-4.el6.x86_64.rpm php55-php-pgsql-5.5.21-4.el6.x86_64.rpm php55-php-process-5.5.21-4.el6.x86_64.rpm php55-php-pspell-5.5.21-4.el6.x86_64.rpm php55-php-recode-5.5.21-4.el6.x86_64.rpm php55-php-snmp-5.5.21-4.el6.x86_64.rpm php55-php-soap-5.5.21-4.el6.x86_64.rpm php55-php-tidy-5.5.21-4.el6.x86_64.rpm php55-php-xml-5.5.21-4.el6.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: php55-php-5.5.21-4.el7.src.rpm x86_64: php55-php-5.5.21-4.el7.x86_64.rpm php55-php-bcmath-5.5.21-4.el7.x86_64.rpm php55-php-cli-5.5.21-4.el7.x86_64.rpm php55-php-common-5.5.21-4.el7.x86_64.rpm php55-php-dba-5.5.21-4.el7.x86_64.rpm php55-php-debuginfo-5.5.21-4.el7.x86_64.rpm php55-php-devel-5.5.21-4.el7.x86_64.rpm php55-php-enchant-5.5.21-4.el7.x86_64.rpm php55-php-fpm-5.5.21-4.el7.x86_64.rpm php55-php-gd-5.5.21-4.el7.x86_64.rpm php55-php-gmp-5.5.21-4.el7.x86_64.rpm php55-php-intl-5.5.21-4.el7.x86_64.rpm php55-php-ldap-5.5.21-4.el7.x86_64.rpm php55-php-mbstring-5.5.21-4.el7.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el7.x86_64.rpm php55-php-odbc-5.5.21-4.el7.x86_64.rpm php55-php-opcache-5.5.21-4.el7.x86_64.rpm php55-php-pdo-5.5.21-4.el7.x86_64.rpm php55-php-pgsql-5.5.21-4.el7.x86_64.rpm php55-php-process-5.5.21-4.el7.x86_64.rpm php55-php-pspell-5.5.21-4.el7.x86_64.rpm php55-php-recode-5.5.21-4.el7.x86_64.rpm php55-php-snmp-5.5.21-4.el7.x86_64.rpm php55-php-soap-5.5.21-4.el7.x86_64.rpm php55-php-xml-5.5.21-4.el7.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: php55-php-5.5.21-4.el7.src.rpm x86_64: php55-php-5.5.21-4.el7.x86_64.rpm php55-php-bcmath-5.5.21-4.el7.x86_64.rpm php55-php-cli-5.5.21-4.el7.x86_64.rpm php55-php-common-5.5.21-4.el7.x86_64.rpm php55-php-dba-5.5.21-4.el7.x86_64.rpm php55-php-debuginfo-5.5.21-4.el7.x86_64.rpm php55-php-devel-5.5.21-4.el7.x86_64.rpm php55-php-enchant-5.5.21-4.el7.x86_64.rpm php55-php-fpm-5.5.21-4.el7.x86_64.rpm php55-php-gd-5.5.21-4.el7.x86_64.rpm php55-php-gmp-5.5.21-4.el7.x86_64.rpm php55-php-intl-5.5.21-4.el7.x86_64.rpm php55-php-ldap-5.5.21-4.el7.x86_64.rpm php55-php-mbstring-5.5.21-4.el7.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el7.x86_64.rpm php55-php-odbc-5.5.21-4.el7.x86_64.rpm php55-php-opcache-5.5.21-4.el7.x86_64.rpm php55-php-pdo-5.5.21-4.el7.x86_64.rpm php55-php-pgsql-5.5.21-4.el7.x86_64.rpm php55-php-process-5.5.21-4.el7.x86_64.rpm php55-php-pspell-5.5.21-4.el7.x86_64.rpm php55-php-recode-5.5.21-4.el7.x86_64.rpm php55-php-snmp-5.5.21-4.el7.x86_64.rpm php55-php-soap-5.5.21-4.el7.x86_64.rpm php55-php-xml-5.5.21-4.el7.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: php55-php-5.5.21-4.el7.src.rpm x86_64: php55-php-5.5.21-4.el7.x86_64.rpm php55-php-bcmath-5.5.21-4.el7.x86_64.rpm php55-php-cli-5.5.21-4.el7.x86_64.rpm php55-php-common-5.5.21-4.el7.x86_64.rpm php55-php-dba-5.5.21-4.el7.x86_64.rpm php55-php-debuginfo-5.5.21-4.el7.x86_64.rpm php55-php-devel-5.5.21-4.el7.x86_64.rpm php55-php-enchant-5.5.21-4.el7.x86_64.rpm php55-php-fpm-5.5.21-4.el7.x86_64.rpm php55-php-gd-5.5.21-4.el7.x86_64.rpm php55-php-gmp-5.5.21-4.el7.x86_64.rpm php55-php-intl-5.5.21-4.el7.x86_64.rpm php55-php-ldap-5.5.21-4.el7.x86_64.rpm php55-php-mbstring-5.5.21-4.el7.x86_64.rpm php55-php-mysqlnd-5.5.21-4.el7.x86_64.rpm php55-php-odbc-5.5.21-4.el7.x86_64.rpm php55-php-opcache-5.5.21-4.el7.x86_64.rpm php55-php-pdo-5.5.21-4.el7.x86_64.rpm php55-php-pgsql-5.5.21-4.el7.x86_64.rpm php55-php-process-5.5.21-4.el7.x86_64.rpm php55-php-pspell-5.5.21-4.el7.x86_64.rpm php55-php-recode-5.5.21-4.el7.x86_64.rpm php55-php-snmp-5.5.21-4.el7.x86_64.rpm php55-php-soap-5.5.21-4.el7.x86_64.rpm php55-php-xml-5.5.21-4.el7.x86_64.rpm php55-php-xmlrpc-5.5.21-4.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2783 https://access.redhat.com/security/cve/CVE-2015-3307 https://access.redhat.com/security/cve/CVE-2015-3329 https://access.redhat.com/security/cve/CVE-2015-3330 https://access.redhat.com/security/cve/CVE-2015-3411 https://access.redhat.com/security/cve/CVE-2015-3412 https://access.redhat.com/security/cve/CVE-2015-4021 https://access.redhat.com/security/cve/CVE-2015-4022 https://access.redhat.com/security/cve/CVE-2015-4024 https://access.redhat.com/security/cve/CVE-2015-4025 https://access.redhat.com/security/cve/CVE-2015-4026 https://access.redhat.com/security/cve/CVE-2015-4598 https://access.redhat.com/security/cve/CVE-2015-4602 https://access.redhat.com/security/cve/CVE-2015-4603 https://access.redhat.com/security/cve/CVE-2015-4604 https://access.redhat.com/security/cve/CVE-2015-4605 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVi8HYXlSAg2UNWIIRAiyPAJ99IZMPIkUJWe8WmApDpEGV6ff98wCgxBYL TtBX6SWqx78H/4bsQXtRlo4= =EuyB -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 08:56:46 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2015 08:56:46 +0000 Subject: [RHSA-2015:1187-01] Important: rh-php56-php security update Message-ID: <201506250856.t5P8ulAA008209@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: rh-php56-php security update Advisory ID: RHSA-2015:1187-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1187.html Issue date: 2015-06-25 CVE Names: CVE-2015-2783 CVE-2015-3307 CVE-2015-3329 CVE-2015-3330 CVE-2015-3411 CVE-2015-3412 CVE-2015-4021 CVE-2015-4022 CVE-2015-4024 CVE-2015-4025 CVE-2015-4026 CVE-2015-4598 CVE-2015-4602 CVE-2015-4603 CVE-2015-4604 CVE-2015-4605 ===================================================================== 1. Summary: Updated rh-php56-php packages that fix multiple security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. (CVE-2015-3330) A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024) An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4602, CVE-2015-4603) It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4025, CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598) Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021) Multiple flaws were found in PHP's File Information (fileinfo) extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. (CVE-2015-4604, CVE-2015-4605) All rh-php56-php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd24-httpd service must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1213394 - CVE-2015-3330 php: pipelined request executed in deinitialized interpreter under httpd 2.4 1213407 - CVE-2015-3411 php: missing null byte checks for paths in various PHP extensions 1213442 - CVE-2015-4604 CVE-2015-4605 php: denial of service when processing a crafted file with Fileinfo 1213446 - CVE-2015-2783 php: buffer over-read in Phar metadata parsing 1213449 - CVE-2015-3329 php: buffer overflow in phar_set_inode() 1222485 - CVE-2015-4024 php: multipart/form-data request paring CPU usage DoS 1223408 - CVE-2015-4025 php: CVE-2006-7243 regressions in 5.4+ 1223412 - CVE-2015-4022 php: integer overflow leading to heap overflow when reading FTP file listing 1223422 - CVE-2015-4026 php: pcntl_exec() accepts paths with NUL character 1223425 - CVE-2015-4021 php: memory corruption in phar_parse_tarfile caused by empty entry file name 1223441 - CVE-2015-3307 php: invalid pointer free() in phar_tar_process_metadata() 1232823 - CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions 1232897 - CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions 1232918 - CVE-2015-4603 php: exception::getTraceAsString type confusion issue after unserialize 1232923 - CVE-2015-4602 php: Incomplete Class unserialization type confusion 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: rh-php56-php-5.6.5-7.el6.src.rpm x86_64: rh-php56-php-5.6.5-7.el6.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el6.x86_64.rpm rh-php56-php-cli-5.6.5-7.el6.x86_64.rpm rh-php56-php-common-5.6.5-7.el6.x86_64.rpm rh-php56-php-dba-5.6.5-7.el6.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el6.x86_64.rpm rh-php56-php-devel-5.6.5-7.el6.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el6.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el6.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el6.x86_64.rpm rh-php56-php-gd-5.6.5-7.el6.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-imap-5.6.5-7.el6.x86_64.rpm rh-php56-php-intl-5.6.5-7.el6.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el6.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el6.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el6.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el6.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el6.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el6.x86_64.rpm rh-php56-php-process-5.6.5-7.el6.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el6.x86_64.rpm rh-php56-php-recode-5.6.5-7.el6.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-soap-5.6.5-7.el6.x86_64.rpm rh-php56-php-tidy-5.6.5-7.el6.x86_64.rpm rh-php56-php-xml-5.6.5-7.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: rh-php56-php-5.6.5-7.el6.src.rpm x86_64: rh-php56-php-5.6.5-7.el6.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el6.x86_64.rpm rh-php56-php-cli-5.6.5-7.el6.x86_64.rpm rh-php56-php-common-5.6.5-7.el6.x86_64.rpm rh-php56-php-dba-5.6.5-7.el6.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el6.x86_64.rpm rh-php56-php-devel-5.6.5-7.el6.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el6.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el6.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el6.x86_64.rpm rh-php56-php-gd-5.6.5-7.el6.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-imap-5.6.5-7.el6.x86_64.rpm rh-php56-php-intl-5.6.5-7.el6.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el6.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el6.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el6.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el6.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el6.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el6.x86_64.rpm rh-php56-php-process-5.6.5-7.el6.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el6.x86_64.rpm rh-php56-php-recode-5.6.5-7.el6.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-soap-5.6.5-7.el6.x86_64.rpm rh-php56-php-tidy-5.6.5-7.el6.x86_64.rpm rh-php56-php-xml-5.6.5-7.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: rh-php56-php-5.6.5-7.el6.src.rpm x86_64: rh-php56-php-5.6.5-7.el6.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el6.x86_64.rpm rh-php56-php-cli-5.6.5-7.el6.x86_64.rpm rh-php56-php-common-5.6.5-7.el6.x86_64.rpm rh-php56-php-dba-5.6.5-7.el6.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el6.x86_64.rpm rh-php56-php-devel-5.6.5-7.el6.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el6.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el6.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el6.x86_64.rpm rh-php56-php-gd-5.6.5-7.el6.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-imap-5.6.5-7.el6.x86_64.rpm rh-php56-php-intl-5.6.5-7.el6.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el6.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el6.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el6.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el6.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el6.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el6.x86_64.rpm rh-php56-php-process-5.6.5-7.el6.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el6.x86_64.rpm rh-php56-php-recode-5.6.5-7.el6.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-soap-5.6.5-7.el6.x86_64.rpm rh-php56-php-tidy-5.6.5-7.el6.x86_64.rpm rh-php56-php-xml-5.6.5-7.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: rh-php56-php-5.6.5-7.el6.src.rpm x86_64: rh-php56-php-5.6.5-7.el6.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el6.x86_64.rpm rh-php56-php-cli-5.6.5-7.el6.x86_64.rpm rh-php56-php-common-5.6.5-7.el6.x86_64.rpm rh-php56-php-dba-5.6.5-7.el6.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el6.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el6.x86_64.rpm rh-php56-php-devel-5.6.5-7.el6.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el6.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el6.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el6.x86_64.rpm rh-php56-php-gd-5.6.5-7.el6.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-imap-5.6.5-7.el6.x86_64.rpm rh-php56-php-intl-5.6.5-7.el6.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el6.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el6.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el6.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el6.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el6.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el6.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el6.x86_64.rpm rh-php56-php-process-5.6.5-7.el6.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el6.x86_64.rpm rh-php56-php-recode-5.6.5-7.el6.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el6.x86_64.rpm rh-php56-php-soap-5.6.5-7.el6.x86_64.rpm rh-php56-php-tidy-5.6.5-7.el6.x86_64.rpm rh-php56-php-xml-5.6.5-7.el6.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-php56-php-5.6.5-7.el7.src.rpm x86_64: rh-php56-php-5.6.5-7.el7.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el7.x86_64.rpm rh-php56-php-cli-5.6.5-7.el7.x86_64.rpm rh-php56-php-common-5.6.5-7.el7.x86_64.rpm rh-php56-php-dba-5.6.5-7.el7.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el7.x86_64.rpm rh-php56-php-devel-5.6.5-7.el7.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el7.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el7.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el7.x86_64.rpm rh-php56-php-gd-5.6.5-7.el7.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el7.x86_64.rpm rh-php56-php-intl-5.6.5-7.el7.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el7.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el7.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el7.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el7.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el7.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el7.x86_64.rpm rh-php56-php-process-5.6.5-7.el7.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el7.x86_64.rpm rh-php56-php-recode-5.6.5-7.el7.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el7.x86_64.rpm rh-php56-php-soap-5.6.5-7.el7.x86_64.rpm rh-php56-php-xml-5.6.5-7.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: rh-php56-php-5.6.5-7.el7.src.rpm x86_64: rh-php56-php-5.6.5-7.el7.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el7.x86_64.rpm rh-php56-php-cli-5.6.5-7.el7.x86_64.rpm rh-php56-php-common-5.6.5-7.el7.x86_64.rpm rh-php56-php-dba-5.6.5-7.el7.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el7.x86_64.rpm rh-php56-php-devel-5.6.5-7.el7.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el7.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el7.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el7.x86_64.rpm rh-php56-php-gd-5.6.5-7.el7.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el7.x86_64.rpm rh-php56-php-intl-5.6.5-7.el7.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el7.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el7.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el7.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el7.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el7.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el7.x86_64.rpm rh-php56-php-process-5.6.5-7.el7.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el7.x86_64.rpm rh-php56-php-recode-5.6.5-7.el7.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el7.x86_64.rpm rh-php56-php-soap-5.6.5-7.el7.x86_64.rpm rh-php56-php-xml-5.6.5-7.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-php56-php-5.6.5-7.el7.src.rpm x86_64: rh-php56-php-5.6.5-7.el7.x86_64.rpm rh-php56-php-bcmath-5.6.5-7.el7.x86_64.rpm rh-php56-php-cli-5.6.5-7.el7.x86_64.rpm rh-php56-php-common-5.6.5-7.el7.x86_64.rpm rh-php56-php-dba-5.6.5-7.el7.x86_64.rpm rh-php56-php-dbg-5.6.5-7.el7.x86_64.rpm rh-php56-php-debuginfo-5.6.5-7.el7.x86_64.rpm rh-php56-php-devel-5.6.5-7.el7.x86_64.rpm rh-php56-php-embedded-5.6.5-7.el7.x86_64.rpm rh-php56-php-enchant-5.6.5-7.el7.x86_64.rpm rh-php56-php-fpm-5.6.5-7.el7.x86_64.rpm rh-php56-php-gd-5.6.5-7.el7.x86_64.rpm rh-php56-php-gmp-5.6.5-7.el7.x86_64.rpm rh-php56-php-intl-5.6.5-7.el7.x86_64.rpm rh-php56-php-ldap-5.6.5-7.el7.x86_64.rpm rh-php56-php-mbstring-5.6.5-7.el7.x86_64.rpm rh-php56-php-mysqlnd-5.6.5-7.el7.x86_64.rpm rh-php56-php-odbc-5.6.5-7.el7.x86_64.rpm rh-php56-php-opcache-5.6.5-7.el7.x86_64.rpm rh-php56-php-pdo-5.6.5-7.el7.x86_64.rpm rh-php56-php-pgsql-5.6.5-7.el7.x86_64.rpm rh-php56-php-process-5.6.5-7.el7.x86_64.rpm rh-php56-php-pspell-5.6.5-7.el7.x86_64.rpm rh-php56-php-recode-5.6.5-7.el7.x86_64.rpm rh-php56-php-snmp-5.6.5-7.el7.x86_64.rpm rh-php56-php-soap-5.6.5-7.el7.x86_64.rpm rh-php56-php-xml-5.6.5-7.el7.x86_64.rpm rh-php56-php-xmlrpc-5.6.5-7.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2783 https://access.redhat.com/security/cve/CVE-2015-3307 https://access.redhat.com/security/cve/CVE-2015-3329 https://access.redhat.com/security/cve/CVE-2015-3330 https://access.redhat.com/security/cve/CVE-2015-3411 https://access.redhat.com/security/cve/CVE-2015-3412 https://access.redhat.com/security/cve/CVE-2015-4021 https://access.redhat.com/security/cve/CVE-2015-4022 https://access.redhat.com/security/cve/CVE-2015-4024 https://access.redhat.com/security/cve/CVE-2015-4025 https://access.redhat.com/security/cve/CVE-2015-4026 https://access.redhat.com/security/cve/CVE-2015-4598 https://access.redhat.com/security/cve/CVE-2015-4602 https://access.redhat.com/security/cve/CVE-2015-4603 https://access.redhat.com/security/cve/CVE-2015-4604 https://access.redhat.com/security/cve/CVE-2015-4605 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVi8I0XlSAg2UNWIIRAmubAKC5rXf5JhG/5cpqV+nHMjAzi65r+ACgsMeH 8D57pGwBjGofafLO8NrCgY8= =Ruzr -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 08:57:31 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2015 08:57:31 +0000 Subject: [RHSA-2015:1188-01] Important: chromium-browser security update Message-ID: <201506250857.t5P8vWmG012599@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2015:1188-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1188.html Issue date: 2015-06-25 CVE Names: CVE-2015-1266 CVE-2015-1267 CVE-2015-1268 CVE-2015-1269 ===================================================================== 1. Summary: Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1266, CVE-2015-1267, CVE-2015-1268, CVE-2015-1269) All Chromium users should upgrade to these updated packages, which contain Chromium version 43.0.2357.130, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1234696 - CVE-2015-1266 chromium-browser: Scheme validation error in WebUI 1234697 - CVE-2015-1268 chromium-browser: Cross-origin bypass in Blink 1234698 - CVE-2015-1267 chromium-browser: Cross-origin bypass in Blink 1234699 - CVE-2015-1269 chromium-browser: Normalization error in HSTS/HPKP preload list 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-43.0.2357.130-1.el6_6.i686.rpm chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm x86_64: chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-43.0.2357.130-1.el6_6.i686.rpm chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm x86_64: chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-43.0.2357.130-1.el6_6.i686.rpm chromium-browser-debuginfo-43.0.2357.130-1.el6_6.i686.rpm x86_64: chromium-browser-43.0.2357.130-1.el6_6.x86_64.rpm chromium-browser-debuginfo-43.0.2357.130-1.el6_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1266 https://access.redhat.com/security/cve/CVE-2015-1267 https://access.redhat.com/security/cve/CVE-2015-1268 https://access.redhat.com/security/cve/CVE-2015-1269 https://access.redhat.com/security/updates/classification/#important https://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVi8JnXlSAg2UNWIIRAierAJ94meIXLcAv+RlTBMBAjnRv7brZVQCeKKZm oeprHWmM+BefnzL7lp3Hrkg= =8D/J -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 13:49:20 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2015 13:49:20 +0000 Subject: [RHSA-2015:1189-01] Important: kvm security update Message-ID: <201506251349.t5PDnLKF024031@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kvm security update Advisory ID: RHSA-2015:1189-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1189.html Issue date: 2015-06-25 CVE Names: CVE-2015-3209 ===================================================================== 1. Summary: Updated kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Multi OS (v. 5 client) - x86_64 RHEL Virtualization (v. 5 server) - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. (CVE-2015-3209) Red Hat would like to thank Matt Tait of Google's Project Zero security team for reporting this issue. All kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Note: The procedure in the Solution section must be performed before this update will take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 The following procedure must be performed before this update will take effect: 1) Stop all KVM guest virtual machines. 2) Either reboot the hypervisor machine or, as the root user, remove (using "modprobe -r [module]") and reload (using "modprobe [module]") all of the following modules which are currently running (determined using "lsmod"): kvm, ksm, kvm-intel or kvm-amd. 3) Restart the KVM guest virtual machines. 5. Bugs fixed (https://bugzilla.redhat.com/): 1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path 6. Package List: RHEL Desktop Multi OS (v. 5 client): Source: kvm-83-273.el5_11.src.rpm x86_64: kmod-kvm-83-273.el5_11.x86_64.rpm kmod-kvm-debug-83-273.el5_11.x86_64.rpm kvm-83-273.el5_11.x86_64.rpm kvm-debuginfo-83-273.el5_11.x86_64.rpm kvm-qemu-img-83-273.el5_11.x86_64.rpm kvm-tools-83-273.el5_11.x86_64.rpm RHEL Virtualization (v. 5 server): Source: kvm-83-273.el5_11.src.rpm x86_64: kmod-kvm-83-273.el5_11.x86_64.rpm kmod-kvm-debug-83-273.el5_11.x86_64.rpm kvm-83-273.el5_11.x86_64.rpm kvm-debuginfo-83-273.el5_11.x86_64.rpm kvm-qemu-img-83-273.el5_11.x86_64.rpm kvm-tools-83-273.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3209 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVjAbPXlSAg2UNWIIRAlgXAKCMoorgtYhIq9bFMVqEVZBNl4iqHwCguGTx SmIh0KT+gbe8ghRumo9UhyU= =3EVW -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 25 13:50:02 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 25 Jun 2015 13:50:02 +0000 Subject: [RHSA-2015:1190-01] Important: kernel security and bug fix update Message-ID: <201506251350.t5PDo2Wb000463@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:1190-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1190.html Issue date: 2015-06-25 CVE Names: CVE-2015-1805 ===================================================================== 1. Summary: Updated kernel packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 5.6 Long Life. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) The security impact of this issue was discovered by Red Hat. This update also fixes the following bug: * Previously, the signal delivery paths did not clear the TS_USEDFPU flag, which could cause problems in the switch_to() function and lead to floating-point unit (FPU) corruption. With this update, TS_USEDFPU is cleared as expected, and FPU is no longer under threat of corruption. (BZ#1214237) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 6. Package List: Red Hat Enterprise Linux LL (v. 5.6 server): Source: kernel-2.6.18-238.56.1.el5.src.rpm i386: kernel-2.6.18-238.56.1.el5.i686.rpm kernel-PAE-2.6.18-238.56.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.56.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.56.1.el5.i686.rpm kernel-debug-2.6.18-238.56.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.56.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.56.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.56.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.56.1.el5.i686.rpm kernel-devel-2.6.18-238.56.1.el5.i686.rpm kernel-headers-2.6.18-238.56.1.el5.i386.rpm kernel-xen-2.6.18-238.56.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.56.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.56.1.el5.i686.rpm ia64: kernel-2.6.18-238.56.1.el5.ia64.rpm kernel-debug-2.6.18-238.56.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-238.56.1.el5.ia64.rpm kernel-debug-devel-2.6.18-238.56.1.el5.ia64.rpm kernel-debuginfo-2.6.18-238.56.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-238.56.1.el5.ia64.rpm kernel-devel-2.6.18-238.56.1.el5.ia64.rpm kernel-headers-2.6.18-238.56.1.el5.ia64.rpm kernel-xen-2.6.18-238.56.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-238.56.1.el5.ia64.rpm kernel-xen-devel-2.6.18-238.56.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-238.56.1.el5.noarch.rpm x86_64: kernel-2.6.18-238.56.1.el5.x86_64.rpm kernel-debug-2.6.18-238.56.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.56.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.56.1.el5.x86_64.rpm kernel-devel-2.6.18-238.56.1.el5.x86_64.rpm kernel-headers-2.6.18-238.56.1.el5.x86_64.rpm kernel-xen-2.6.18-238.56.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.56.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVjAb+XlSAg2UNWIIRAnyMAJ9IVgFF32azGmrmBoeCaygdJIy27wCgj3bR YSJmUVkU1Ksje0yhbQQPL6U= =75Wv -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 29 16:44:26 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 29 Jun 2015 12:44:26 -0400 Subject: [RHSA-2015:1193-01] Moderate: xerces-c security update Message-ID: <201506291644.t5TGiQu2027497@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: xerces-c security update Advisory ID: RHSA-2015:1193-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1193.html Issue date: 2015-06-29 CVE Names: CVE-2015-0252 ===================================================================== 1. Summary: An updated xerces-c package that fixes one security issue is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: Xerces-C is a validating XML parser written in a portable subset of C++. A flaw was found in the way the Xerces-C XML parser processed certain XML documents. A remote attacker could provide specially crafted XML input that, when parsed by an application using Xerces-C, would cause that application to crash. (CVE-2015-0252) All xerces-c users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1199103 - CVE-2015-0252 xerces-c: crashes on malformed input 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: xerces-c-3.1.1-7.el7_1.src.rpm noarch: xerces-c-doc-3.1.1-7.el7_1.noarch.rpm x86_64: xerces-c-3.1.1-7.el7_1.i686.rpm xerces-c-3.1.1-7.el7_1.x86_64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm xerces-c-devel-3.1.1-7.el7_1.i686.rpm xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: xerces-c-3.1.1-7.el7_1.src.rpm ppc64: xerces-c-3.1.1-7.el7_1.ppc.rpm xerces-c-3.1.1-7.el7_1.ppc64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.ppc.rpm xerces-c-debuginfo-3.1.1-7.el7_1.ppc64.rpm s390x: xerces-c-3.1.1-7.el7_1.s390.rpm xerces-c-3.1.1-7.el7_1.s390x.rpm xerces-c-debuginfo-3.1.1-7.el7_1.s390.rpm xerces-c-debuginfo-3.1.1-7.el7_1.s390x.rpm x86_64: xerces-c-3.1.1-7.el7_1.i686.rpm xerces-c-3.1.1-7.el7_1.x86_64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: xerces-c-3.1.1-7.ael7b_1.src.rpm ppc64le: xerces-c-3.1.1-7.ael7b_1.ppc64le.rpm xerces-c-debuginfo-3.1.1-7.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: xerces-c-doc-3.1.1-7.el7_1.noarch.rpm ppc64: xerces-c-debuginfo-3.1.1-7.el7_1.ppc.rpm xerces-c-debuginfo-3.1.1-7.el7_1.ppc64.rpm xerces-c-devel-3.1.1-7.el7_1.ppc.rpm xerces-c-devel-3.1.1-7.el7_1.ppc64.rpm s390x: xerces-c-debuginfo-3.1.1-7.el7_1.s390.rpm xerces-c-debuginfo-3.1.1-7.el7_1.s390x.rpm xerces-c-devel-3.1.1-7.el7_1.s390.rpm xerces-c-devel-3.1.1-7.el7_1.s390x.rpm x86_64: xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm xerces-c-devel-3.1.1-7.el7_1.i686.rpm xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: xerces-c-doc-3.1.1-7.ael7b_1.noarch.rpm ppc64le: xerces-c-debuginfo-3.1.1-7.ael7b_1.ppc64le.rpm xerces-c-devel-3.1.1-7.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: xerces-c-3.1.1-7.el7_1.src.rpm x86_64: xerces-c-3.1.1-7.el7_1.i686.rpm xerces-c-3.1.1-7.el7_1.x86_64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: xerces-c-doc-3.1.1-7.el7_1.noarch.rpm x86_64: xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm xerces-c-devel-3.1.1-7.el7_1.i686.rpm xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-0252 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkXXpXlSAg2UNWIIRAu53AKDCXE2zsQezA82us0ZdmUd22im+eACbB7IC MoxIpSMVeFkuyS78GyzAGQE= =+F3q -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 29 16:44:53 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 29 Jun 2015 12:44:53 -0400 Subject: [RHSA-2015:1194-01] Moderate: postgresql security update Message-ID: <201506291644.t5TGirRO012659@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: postgresql security update Advisory ID: RHSA-2015:1194-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1194.html Issue date: 2015-06-29 CVE Names: CVE-2015-3165 CVE-2015-3166 CVE-2015-3167 ===================================================================== 1. Summary: Updated postgresql packages that fix three security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: PostgreSQL is an advanced object-relational database management system (DBMS). A double-free flaw was found in the connection handling. An unauthenticated attacker could exploit this flaw to crash the PostgreSQL back end by disconnecting at approximately the same time as the authentication time out is triggered. (CVE-2015-3165) It was discovered that PostgreSQL did not properly check the return values of certain standard library functions. If the system is in a state that would cause the standard library functions to fail, for example memory exhaustion, an authenticated user could exploit this flaw to disclose partial memory contents or cause the GSSAPI authentication to use an incorrect keytab file. (CVE-2015-3166) It was discovered that the pgcrypto module could return different error messages when decrypting certain data with an incorrect key. This can help an authenticated user to launch a possible cryptographic attack, although no suitable attack is currently known. (CVE-2015-3167) Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Benkocs Norbert Attila as the original reporter of CVE-2015-3165 and Noah Misch as the original reporter of CVE-2015-3166 and CVE-2015-3167. All PostgreSQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. If the postgresql service is running, it will be automatically restarted after installing this update. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221537 - CVE-2015-3165 postgresql: double-free after authentication timeout 1221539 - CVE-2015-3166 postgresql: unanticipated errors from the standard library 1221541 - CVE-2015-3167 postgresql: pgcrypto has multiple error messages for decryption with an incorrect key. 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm i386: postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm x86_64: postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-contrib-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-docs-8.4.20-3.el6_6.i686.rpm postgresql-plperl-8.4.20-3.el6_6.i686.rpm postgresql-plpython-8.4.20-3.el6_6.i686.rpm postgresql-pltcl-8.4.20-3.el6_6.i686.rpm postgresql-server-8.4.20-3.el6_6.i686.rpm postgresql-test-8.4.20-3.el6_6.i686.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm i386: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-contrib-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-docs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-plperl-8.4.20-3.el6_6.i686.rpm postgresql-plpython-8.4.20-3.el6_6.i686.rpm postgresql-pltcl-8.4.20-3.el6_6.i686.rpm postgresql-server-8.4.20-3.el6_6.i686.rpm postgresql-test-8.4.20-3.el6_6.i686.rpm ppc64: postgresql-8.4.20-3.el6_6.ppc.rpm postgresql-8.4.20-3.el6_6.ppc64.rpm postgresql-contrib-8.4.20-3.el6_6.ppc64.rpm postgresql-debuginfo-8.4.20-3.el6_6.ppc.rpm postgresql-debuginfo-8.4.20-3.el6_6.ppc64.rpm postgresql-devel-8.4.20-3.el6_6.ppc.rpm postgresql-devel-8.4.20-3.el6_6.ppc64.rpm postgresql-docs-8.4.20-3.el6_6.ppc64.rpm postgresql-libs-8.4.20-3.el6_6.ppc.rpm postgresql-libs-8.4.20-3.el6_6.ppc64.rpm postgresql-plperl-8.4.20-3.el6_6.ppc64.rpm postgresql-plpython-8.4.20-3.el6_6.ppc64.rpm postgresql-pltcl-8.4.20-3.el6_6.ppc64.rpm postgresql-server-8.4.20-3.el6_6.ppc64.rpm postgresql-test-8.4.20-3.el6_6.ppc64.rpm s390x: postgresql-8.4.20-3.el6_6.s390.rpm postgresql-8.4.20-3.el6_6.s390x.rpm postgresql-contrib-8.4.20-3.el6_6.s390x.rpm postgresql-debuginfo-8.4.20-3.el6_6.s390.rpm postgresql-debuginfo-8.4.20-3.el6_6.s390x.rpm postgresql-devel-8.4.20-3.el6_6.s390.rpm postgresql-devel-8.4.20-3.el6_6.s390x.rpm postgresql-docs-8.4.20-3.el6_6.s390x.rpm postgresql-libs-8.4.20-3.el6_6.s390.rpm postgresql-libs-8.4.20-3.el6_6.s390x.rpm postgresql-plperl-8.4.20-3.el6_6.s390x.rpm postgresql-plpython-8.4.20-3.el6_6.s390x.rpm postgresql-pltcl-8.4.20-3.el6_6.s390x.rpm postgresql-server-8.4.20-3.el6_6.s390x.rpm postgresql-test-8.4.20-3.el6_6.s390x.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm i386: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-contrib-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-docs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-plperl-8.4.20-3.el6_6.i686.rpm postgresql-plpython-8.4.20-3.el6_6.i686.rpm postgresql-pltcl-8.4.20-3.el6_6.i686.rpm postgresql-server-8.4.20-3.el6_6.i686.rpm postgresql-test-8.4.20-3.el6_6.i686.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm x86_64: postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm ppc64: postgresql-9.2.13-1.el7_1.ppc.rpm postgresql-9.2.13-1.el7_1.ppc64.rpm postgresql-contrib-9.2.13-1.el7_1.ppc64.rpm postgresql-debuginfo-9.2.13-1.el7_1.ppc.rpm postgresql-debuginfo-9.2.13-1.el7_1.ppc64.rpm postgresql-devel-9.2.13-1.el7_1.ppc.rpm postgresql-devel-9.2.13-1.el7_1.ppc64.rpm postgresql-docs-9.2.13-1.el7_1.ppc64.rpm postgresql-libs-9.2.13-1.el7_1.ppc.rpm postgresql-libs-9.2.13-1.el7_1.ppc64.rpm postgresql-plperl-9.2.13-1.el7_1.ppc64.rpm postgresql-plpython-9.2.13-1.el7_1.ppc64.rpm postgresql-pltcl-9.2.13-1.el7_1.ppc64.rpm postgresql-server-9.2.13-1.el7_1.ppc64.rpm postgresql-test-9.2.13-1.el7_1.ppc64.rpm s390x: postgresql-9.2.13-1.el7_1.s390.rpm postgresql-9.2.13-1.el7_1.s390x.rpm postgresql-contrib-9.2.13-1.el7_1.s390x.rpm postgresql-debuginfo-9.2.13-1.el7_1.s390.rpm postgresql-debuginfo-9.2.13-1.el7_1.s390x.rpm postgresql-devel-9.2.13-1.el7_1.s390.rpm postgresql-devel-9.2.13-1.el7_1.s390x.rpm postgresql-docs-9.2.13-1.el7_1.s390x.rpm postgresql-libs-9.2.13-1.el7_1.s390.rpm postgresql-libs-9.2.13-1.el7_1.s390x.rpm postgresql-plperl-9.2.13-1.el7_1.s390x.rpm postgresql-plpython-9.2.13-1.el7_1.s390x.rpm postgresql-pltcl-9.2.13-1.el7_1.s390x.rpm postgresql-server-9.2.13-1.el7_1.s390x.rpm postgresql-test-9.2.13-1.el7_1.s390x.rpm x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: postgresql-9.2.13-1.ael7b_1.src.rpm ppc64le: postgresql-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-contrib-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-debuginfo-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-devel-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-docs-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-libs-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-plperl-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-plpython-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-pltcl-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-server-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-test-9.2.13-1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: postgresql-debuginfo-9.2.13-1.el7_1.ppc64.rpm postgresql-upgrade-9.2.13-1.el7_1.ppc64.rpm s390x: postgresql-debuginfo-9.2.13-1.el7_1.s390x.rpm postgresql-upgrade-9.2.13-1.el7_1.s390x.rpm x86_64: postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: postgresql-debuginfo-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-upgrade-9.2.13-1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3165 https://access.redhat.com/security/cve/CVE-2015-3166 https://access.redhat.com/security/cve/CVE-2015-3167 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkXYEXlSAg2UNWIIRAqPyAJ4+oNPb8x+Rv86xVfq+hr0l7wvbBgCgrstj JLgqt0VKrW96edx3scvrmV0= =I50/ -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 29 16:45:09 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 29 Jun 2015 12:45:09 -0400 Subject: [RHSA-2015:1195-01] Moderate: postgresql92-postgresql security update Message-ID: <201506291645.t5TGj9pn028266@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: postgresql92-postgresql security update Advisory ID: RHSA-2015:1195-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1195.html Issue date: 2015-06-29 CVE Names: CVE-2015-3165 CVE-2015-3166 CVE-2015-3167 ===================================================================== 1. Summary: Updated postgresql92-postgresql packages that fix three security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PostgreSQL is an advanced object-relational database management system (DBMS). A double-free flaw was found in the connection handling. An unauthenticated attacker could exploit this flaw to crash the PostgreSQL back end by disconnecting at approximately the same time as the authentication time out is triggered. (CVE-2015-3165) It was discovered that PostgreSQL did not properly check the return values of certain standard library functions. If the system is in a state that would cause the standard library functions to fail, for example memory exhaustion, an authenticated user could exploit this flaw to disclose partial memory contents or cause the GSSAPI authentication to use an incorrect keytab file. (CVE-2015-3166) It was discovered that the pgcrypto module could return different error messages when decrypting certain data with an incorrect key. This can help an authenticated user to launch a possible cryptographic attack, although no suitable attack is currently known. (CVE-2015-3167) Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Benkocs Norbert Attila as the original reporter of CVE-2015-3165 and Noah Misch as the original reporter of CVE-2015-3166 and CVE-2015-3167. All PostgreSQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. If the postgresql92-postgresql service is running, it will be automatically restarted after installing this update. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221537 - CVE-2015-3165 postgresql: double-free after authentication timeout 1221539 - CVE-2015-3166 postgresql: unanticipated errors from the standard library 1221541 - CVE-2015-3167 postgresql: pgcrypto has multiple error messages for decryption with an incorrect key. 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: postgresql92-postgresql-9.2.13-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: postgresql92-postgresql-9.2.13-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: postgresql92-postgresql-9.2.13-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: postgresql92-postgresql-9.2.13-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: postgresql92-postgresql-9.2.13-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: postgresql92-postgresql-9.2.13-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: postgresql92-postgresql-9.2.13-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.13-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.13-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3165 https://access.redhat.com/security/cve/CVE-2015-3166 https://access.redhat.com/security/cve/CVE-2015-3167 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkXYTXlSAg2UNWIIRAi5yAJ9UxXQ2Lwctqx9n+s/qUJ5ePADJfQCfajrG T7AX6PRQzYEk40fdpvwTURY= =tZRl -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 29 16:45:26 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 29 Jun 2015 12:45:26 -0400 Subject: [RHSA-2015:1196-01] Moderate: rh-postgresql94-postgresql security update Message-ID: <201506291645.t5TGjQwK028874@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-postgresql94-postgresql security update Advisory ID: RHSA-2015:1196-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1196.html Issue date: 2015-06-29 CVE Names: CVE-2015-3165 CVE-2015-3166 CVE-2015-3167 ===================================================================== 1. Summary: Updated rh-postgresql94-postgresql packages that fix three security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PostgreSQL is an advanced object-relational database management system (DBMS). A double-free flaw was found in the connection handling. An unauthenticated attacker could exploit this flaw to crash the PostgreSQL back end by disconnecting at approximately the same time as the authentication time out is triggered. (CVE-2015-3165) It was discovered that PostgreSQL did not properly check the return values of certain standard library functions. If the system is in a state that would cause the standard library functions to fail, for example memory exhaustion, an authenticated user could exploit this flaw to disclose partial memory contents or cause the GSSAPI authentication to use an incorrect keytab file. (CVE-2015-3166) It was discovered that the pgcrypto module could return different error messages when decrypting certain data with an incorrect key. This can help an authenticated user to launch a possible cryptographic attack, although no suitable attack is currently known. (CVE-2015-3167) Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Benkocs Norbert Attila as the original reporter of CVE-2015-3165 and Noah Misch as the original reporter of CVE-2015-3166 and CVE-2015-3167. All PostgreSQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. If the rh-postgresql94-postgresql service is running, it will be automatically restarted after installing this update. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221537 - CVE-2015-3165 postgresql: double-free after authentication timeout 1221539 - CVE-2015-3166 postgresql: unanticipated errors from the standard library 1221541 - CVE-2015-3167 postgresql: pgcrypto has multiple error messages for decryption with an incorrect key. 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: rh-postgresql94-postgresql-9.4.4-1.el6.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5): Source: rh-postgresql94-postgresql-9.4.4-1.el6.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: rh-postgresql94-postgresql-9.4.4-1.el6.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: rh-postgresql94-postgresql-9.4.4-1.el6.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el6.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-postgresql94-postgresql-9.4.4-1.el7.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: rh-postgresql94-postgresql-9.4.4-1.el7.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-postgresql94-postgresql-9.4.4-1.el7.src.rpm x86_64: rh-postgresql94-postgresql-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-contrib-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-debuginfo-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-devel-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-docs-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-libs-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-plperl-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-plpython-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-pltcl-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-server-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-test-9.4.4-1.el7.x86_64.rpm rh-postgresql94-postgresql-upgrade-9.4.4-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3165 https://access.redhat.com/security/cve/CVE-2015-3166 https://access.redhat.com/security/cve/CVE-2015-3167 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkXYkXlSAg2UNWIIRAm+hAJ0VMCur8LvfuL8NkeX97WLXKT+ZNgCfby1E qudSta78k6T7F6k7PWtCxBw= =BaXr -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 30 06:42:37 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 30 Jun 2015 06:42:37 +0000 Subject: [RHSA-2015:1197-01] Moderate: openssl security update Message-ID: <201506300630.t5U6U8EL023738@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:1197-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1197.html Issue date: 2015-06-30 CVE Names: CVE-2015-1789 CVE-2015-1790 CVE-2015-4000 ===================================================================== 1. Summary: Updated openssl packages that fix three security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. Red Hat would like to thank the OpenSSL project for reporting CVE-2015-1789 and CVE-2015-1790. Upstream acknowledges Robert Swiecki and Hanno B?ck as the original reporters of CVE-2015-1789, and Michal Zalewski as the original reporter of CVE-2015-1790. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time 1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: openssl-0.9.8e-36.el5_11.src.rpm i386: openssl-0.9.8e-36.el5_11.i386.rpm openssl-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-perl-0.9.8e-36.el5_11.i386.rpm x86_64: openssl-0.9.8e-36.el5_11.i686.rpm openssl-0.9.8e-36.el5_11.x86_64.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm openssl-perl-0.9.8e-36.el5_11.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: openssl-0.9.8e-36.el5_11.src.rpm i386: openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm x86_64: openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm openssl-devel-0.9.8e-36.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: openssl-0.9.8e-36.el5_11.src.rpm i386: openssl-0.9.8e-36.el5_11.i386.rpm openssl-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm openssl-perl-0.9.8e-36.el5_11.i386.rpm ia64: openssl-0.9.8e-36.el5_11.i686.rpm openssl-0.9.8e-36.el5_11.ia64.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.ia64.rpm openssl-devel-0.9.8e-36.el5_11.ia64.rpm openssl-perl-0.9.8e-36.el5_11.ia64.rpm ppc: openssl-0.9.8e-36.el5_11.ppc.rpm openssl-0.9.8e-36.el5_11.ppc64.rpm openssl-debuginfo-0.9.8e-36.el5_11.ppc.rpm openssl-debuginfo-0.9.8e-36.el5_11.ppc64.rpm openssl-devel-0.9.8e-36.el5_11.ppc.rpm openssl-devel-0.9.8e-36.el5_11.ppc64.rpm openssl-perl-0.9.8e-36.el5_11.ppc.rpm s390x: openssl-0.9.8e-36.el5_11.s390.rpm openssl-0.9.8e-36.el5_11.s390x.rpm openssl-debuginfo-0.9.8e-36.el5_11.s390.rpm openssl-debuginfo-0.9.8e-36.el5_11.s390x.rpm openssl-devel-0.9.8e-36.el5_11.s390.rpm openssl-devel-0.9.8e-36.el5_11.s390x.rpm openssl-perl-0.9.8e-36.el5_11.s390x.rpm x86_64: openssl-0.9.8e-36.el5_11.i686.rpm openssl-0.9.8e-36.el5_11.x86_64.rpm openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm openssl-devel-0.9.8e-36.el5_11.i386.rpm openssl-devel-0.9.8e-36.el5_11.x86_64.rpm openssl-perl-0.9.8e-36.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1789 https://access.redhat.com/security/cve/CVE-2015-1790 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150611.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkjdoXlSAg2UNWIIRAgyhAKCuCDKa6L3jn/RVyOdvXAOOUFwNWgCfQ7eW QwDSR5RAZ5s20uFQDnravfY= =Shez -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 30 14:27:47 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 30 Jun 2015 14:27:47 +0000 Subject: [RHSA-2015:1199-01] Important: kernel security and bug fix update Message-ID: <201506301427.t5UERlsa005722@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:1199-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1199.html Issue date: 2015-06-30 CVE Names: CVE-2015-1805 CVE-2015-3331 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues and three bugs are now available for Red Hat Enterprise Linux 6.5 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5) - x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.5) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.5) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AES-GCM mode IPSec security association. (CVE-2015-3331, Important) The security impact of the CVE-2015-1805 issue was discovered by Red Hat. This update also fixes the following bugs: * Parallel extending direct I/O writes to a file could previously race to update the size of the file. If executed in an incorrect order, the file size could move backwards and push a previously completed write beyond the end of the file, which resulted in losing the write. With this update, file size updates always execute in appropriate order, thus fixing this bug. (BZ#1218498) * When the load rose and run queues were busy due to the effects of the enqueue_entity() function, tasks with large sched_entity.vruntime values could previously be prevented from using the CPU time. A patch eliminating the entity_key() function in the sched_fair.c latency value has been backported from upstream, and all tasks are now provided with fair CPU runtime. (BZ#1219121) * Previously, running the clock_gettime() function quickly in a loop could result in a jump back in time. Consequently, programs could behave unexpectedly when they assumed that clock_getime() returned an equal or greater time in subsequent calls. With this update, if the time delta between calls is negative, the clock is no longer updated. As a result, a subsequent call to clock_gettime() is guaranteed to return a time greater than or equal to a previous call. (BZ#1219500) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption 1213322 - CVE-2015-3331 Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.5): Source: kernel-2.6.32-431.59.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm kernel-doc-2.6.32-431.59.1.el6.noarch.rpm kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.59.1.el6.x86_64.rpm kernel-debug-2.6.32-431.59.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.59.1.el6.x86_64.rpm kernel-devel-2.6.32-431.59.1.el6.x86_64.rpm kernel-headers-2.6.32-431.59.1.el6.x86_64.rpm perf-2.6.32-431.59.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5): Source: kernel-2.6.32-431.59.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.59.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm python-perf-2.6.32-431.59.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.5): Source: kernel-2.6.32-431.59.1.el6.src.rpm i386: kernel-2.6.32-431.59.1.el6.i686.rpm kernel-debug-2.6.32-431.59.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-431.59.1.el6.i686.rpm kernel-debug-devel-2.6.32-431.59.1.el6.i686.rpm kernel-debuginfo-2.6.32-431.59.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.59.1.el6.i686.rpm kernel-devel-2.6.32-431.59.1.el6.i686.rpm kernel-headers-2.6.32-431.59.1.el6.i686.rpm perf-2.6.32-431.59.1.el6.i686.rpm perf-debuginfo-2.6.32-431.59.1.el6.i686.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm kernel-doc-2.6.32-431.59.1.el6.noarch.rpm kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm ppc64: kernel-2.6.32-431.59.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-431.59.1.el6.ppc64.rpm kernel-debug-2.6.32-431.59.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-431.59.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-431.59.1.el6.ppc64.rpm kernel-devel-2.6.32-431.59.1.el6.ppc64.rpm kernel-headers-2.6.32-431.59.1.el6.ppc64.rpm perf-2.6.32-431.59.1.el6.ppc64.rpm perf-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm s390x: kernel-2.6.32-431.59.1.el6.s390x.rpm kernel-debug-2.6.32-431.59.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-431.59.1.el6.s390x.rpm kernel-debug-devel-2.6.32-431.59.1.el6.s390x.rpm kernel-debuginfo-2.6.32-431.59.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-431.59.1.el6.s390x.rpm kernel-devel-2.6.32-431.59.1.el6.s390x.rpm kernel-headers-2.6.32-431.59.1.el6.s390x.rpm kernel-kdump-2.6.32-431.59.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-431.59.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-431.59.1.el6.s390x.rpm perf-2.6.32-431.59.1.el6.s390x.rpm perf-debuginfo-2.6.32-431.59.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.s390x.rpm x86_64: kernel-2.6.32-431.59.1.el6.x86_64.rpm kernel-debug-2.6.32-431.59.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.59.1.el6.x86_64.rpm kernel-devel-2.6.32-431.59.1.el6.x86_64.rpm kernel-headers-2.6.32-431.59.1.el6.x86_64.rpm perf-2.6.32-431.59.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.5): Source: kernel-2.6.32-431.59.1.el6.src.rpm i386: kernel-debug-debuginfo-2.6.32-431.59.1.el6.i686.rpm kernel-debuginfo-2.6.32-431.59.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.59.1.el6.i686.rpm perf-debuginfo-2.6.32-431.59.1.el6.i686.rpm python-perf-2.6.32-431.59.1.el6.i686.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-431.59.1.el6.ppc64.rpm perf-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm python-perf-2.6.32-431.59.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-431.59.1.el6.s390x.rpm kernel-debuginfo-2.6.32-431.59.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-431.59.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-431.59.1.el6.s390x.rpm perf-debuginfo-2.6.32-431.59.1.el6.s390x.rpm python-perf-2.6.32-431.59.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.59.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm python-perf-2.6.32-431.59.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1805 https://access.redhat.com/security/cve/CVE-2015-3331 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkqdQXlSAg2UNWIIRApgVAJ4hsDiyi3c8GBsEA5z2snGGNtSzYQCeP0fC 5RxVguWOruvS2RqTFuwjTzc= =ZeaY -----END PGP SIGNATURE-----