From bugzilla at redhat.com Tue Sep 1 07:47:44 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 1 Sep 2015 07:47:44 +0000 Subject: [RHSA-2015:1699-01] Moderate: nss-softokn security update Message-ID: <201509010734.t817YIj0002531@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: nss-softokn security update Advisory ID: RHSA-2015:1699-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1699.html Issue date: 2015-09-01 CVE Names: CVE-2015-2730 ===================================================================== 1. Summary: Updated nss-softokn packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Watson Ladd as the original reporter of this issue. All nss-softokn users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1236954 - CVE-2015-2730 NSS: ECDSA signature validation fails to handle some signatures correctly (MFSA 2015-64) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: nss-softokn-3.14.3-23.el6_7.src.rpm i386: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm x86_64: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-3.14.3-23.el6_7.x86_64.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm x86_64: nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.x86_64.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: nss-softokn-3.14.3-23.el6_7.src.rpm x86_64: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-3.14.3-23.el6_7.x86_64.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.x86_64.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: nss-softokn-3.14.3-23.el6_7.src.rpm i386: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm ppc64: nss-softokn-3.14.3-23.el6_7.ppc.rpm nss-softokn-3.14.3-23.el6_7.ppc64.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.ppc.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.ppc64.rpm nss-softokn-devel-3.14.3-23.el6_7.ppc.rpm nss-softokn-devel-3.14.3-23.el6_7.ppc64.rpm nss-softokn-freebl-3.14.3-23.el6_7.ppc.rpm nss-softokn-freebl-3.14.3-23.el6_7.ppc64.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.ppc.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.ppc64.rpm s390x: nss-softokn-3.14.3-23.el6_7.s390.rpm nss-softokn-3.14.3-23.el6_7.s390x.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.s390.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.s390x.rpm nss-softokn-devel-3.14.3-23.el6_7.s390.rpm nss-softokn-devel-3.14.3-23.el6_7.s390x.rpm nss-softokn-freebl-3.14.3-23.el6_7.s390.rpm nss-softokn-freebl-3.14.3-23.el6_7.s390x.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.s390.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.s390x.rpm x86_64: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-3.14.3-23.el6_7.x86_64.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.x86_64.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: nss-softokn-3.14.3-23.el6_7.src.rpm i386: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm x86_64: nss-softokn-3.14.3-23.el6_7.i686.rpm nss-softokn-3.14.3-23.el6_7.x86_64.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.i686.rpm nss-softokn-debuginfo-3.14.3-23.el6_7.x86_64.rpm nss-softokn-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-devel-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.x86_64.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm nss-softokn-freebl-devel-3.14.3-23.el6_7.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: nss-softokn-3.16.2.3-13.el7_1.src.rpm x86_64: nss-softokn-3.16.2.3-13.el7_1.i686.rpm nss-softokn-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.i686.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: nss-softokn-debuginfo-3.16.2.3-13.el7_1.i686.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-devel-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: nss-softokn-3.16.2.3-13.el7_1.src.rpm x86_64: nss-softokn-3.16.2.3-13.el7_1.i686.rpm nss-softokn-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.i686.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: nss-softokn-debuginfo-3.16.2.3-13.el7_1.i686.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-devel-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-softokn-3.16.2.3-13.el7_1.src.rpm ppc64: nss-softokn-3.16.2.3-13.el7_1.ppc.rpm nss-softokn-3.16.2.3-13.el7_1.ppc64.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.ppc.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.ppc64.rpm nss-softokn-devel-3.16.2.3-13.el7_1.ppc.rpm nss-softokn-devel-3.16.2.3-13.el7_1.ppc64.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.ppc.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.ppc64.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.ppc.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.ppc64.rpm s390x: nss-softokn-3.16.2.3-13.el7_1.s390.rpm nss-softokn-3.16.2.3-13.el7_1.s390x.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.s390.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.s390x.rpm nss-softokn-devel-3.16.2.3-13.el7_1.s390.rpm nss-softokn-devel-3.16.2.3-13.el7_1.s390x.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.s390.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.s390x.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.s390.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.s390x.rpm x86_64: nss-softokn-3.16.2.3-13.el7_1.i686.rpm nss-softokn-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.i686.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-devel-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-softokn-3.16.2.3-13.ael7b_1.src.rpm ppc64le: nss-softokn-3.16.2.3-13.ael7b_1.ppc64le.rpm nss-softokn-debuginfo-3.16.2.3-13.ael7b_1.ppc64le.rpm nss-softokn-devel-3.16.2.3-13.ael7b_1.ppc64le.rpm nss-softokn-freebl-3.16.2.3-13.ael7b_1.ppc64le.rpm nss-softokn-freebl-devel-3.16.2.3-13.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: nss-softokn-3.16.2.3-13.el7_1.src.rpm x86_64: nss-softokn-3.16.2.3-13.el7_1.i686.rpm nss-softokn-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.i686.rpm nss-softokn-debuginfo-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-devel-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-3.16.2.3-13.el7_1.x86_64.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.i686.rpm nss-softokn-freebl-devel-3.16.2.3-13.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2730 https://access.redhat.com/security/updates/classification/#moderate https://www.mozilla.org/en-US/security/advisories/mfsa2015-64/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV5VTYXlSAg2UNWIIRAnWfAJ4oXxVdGvFy6RImBDW5toHCaCXjOACbBQNv m8sdYrT7Zn0Hd063xefRssg= =Baf2 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 1 13:45:29 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 1 Sep 2015 13:45:29 +0000 Subject: [RHSA-2015:1700-01] Important: pcs security update Message-ID: <201509011344.t81DiVD0016163@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: pcs security update Advisory ID: RHSA-2015:1700-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1700.html Issue date: 2015-09-01 CVE Names: CVE-2015-5189 CVE-2015-5190 ===================================================================== 1. Summary: Updated pcs packages that fix two security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux High Availability (v. 6) - i386, x86_64 Red Hat Enterprise Linux Resilient Storage (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server High Availability (v. 7) - x86_64 Red Hat Enterprise Linux Server Resilient Storage (v. 7) - x86_64 3. Description: The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. A command injection flaw was found in the pcsd web UI. An attacker able to trick a victim that was logged in to the pcsd web UI into visiting a specially crafted URL could use this flaw to execute arbitrary code with root privileges on the server hosting the web UI. (CVE-2015-5190) A race condition was found in the way the pcsd web UI backend performed authorization of user requests. An attacker could use this flaw to send a request that would be evaluated as originating from a different user, potentially allowing the attacker to perform actions with permissions of a more privileged user. (CVE-2015-5189) These issues were discovered by Tom?? Jel?nek of Red Hat. All pcs users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1252805 - CVE-2015-5189 pcs: Incorrect authorization when using pcs web UI 1252813 - CVE-2015-5190 pcs: Command injection with root privileges. 6. Package List: Red Hat Enterprise Linux High Availability (v. 6): Source: pcs-0.9.139-9.el6_7.1.src.rpm i386: pcs-0.9.139-9.el6_7.1.i686.rpm pcs-debuginfo-0.9.139-9.el6_7.1.i686.rpm x86_64: pcs-0.9.139-9.el6_7.1.x86_64.rpm pcs-debuginfo-0.9.139-9.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Resilient Storage (v. 6): Source: pcs-0.9.139-9.el6_7.1.src.rpm i386: pcs-0.9.139-9.el6_7.1.i686.rpm pcs-debuginfo-0.9.139-9.el6_7.1.i686.rpm x86_64: pcs-0.9.139-9.el6_7.1.x86_64.rpm pcs-debuginfo-0.9.139-9.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server High Availability (v. 7): Source: pcs-0.9.137-13.el7_1.4.src.rpm x86_64: pcs-0.9.137-13.el7_1.4.x86_64.rpm pcs-debuginfo-0.9.137-13.el7_1.4.x86_64.rpm python-clufter-0.9.137-13.el7_1.4.x86_64.rpm Red Hat Enterprise Linux Server Resilient Storage (v. 7): Source: pcs-0.9.137-13.el7_1.4.src.rpm x86_64: pcs-0.9.137-13.el7_1.4.x86_64.rpm pcs-debuginfo-0.9.137-13.el7_1.4.x86_64.rpm python-clufter-0.9.137-13.el7_1.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5189 https://access.redhat.com/security/cve/CVE-2015-5190 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV5aufXlSAg2UNWIIRAp4uAJ9yWqu5/RTwBvPMFe6tkqKOp+RFmgCdEphT cQWCwkVPkq2UBk75nwG0+k0= =pkh5 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 04:56:57 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 04:56:57 +0000 Subject: [RHSA-2015:1705-01] Important: bind security update Message-ID: <201509030443.t834hVv8015590@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2015:1705-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1705.html Issue date: 2015-09-03 CVE Names: CVE-2015-5722 ===================================================================== 1. Summary: Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno B?ck as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1259087 - CVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.4.src.rpm i386: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.i686.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.i686.rpm x86_64: bind-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.4.src.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.4.src.rpm i386: bind-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.i686.rpm ppc64: bind-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.ppc.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.ppc.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm s390x: bind-9.8.2-0.37.rc1.el6_7.4.s390x.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.s390x.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.s390.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.s390x.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.s390.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.s390x.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.s390x.rpm x86_64: bind-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.i686.rpm ppc64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.ppc.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.ppc.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.s390.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.s390x.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.s390.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.s390x.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.37.rc1.el6_7.4.src.rpm i386: bind-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.i686.rpm x86_64: bind-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-chroot-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-libs-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-utils-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.i686.rpm x86_64: bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-debuginfo-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm bind-devel-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm bind-sdb-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: bind-9.9.4-18.el7_1.5.src.rpm noarch: bind-license-9.9.4-18.el7_1.5.noarch.rpm x86_64: bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-9.9.4-18.el7_1.5.i686.rpm bind-libs-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-lite-9.9.4-18.el7_1.5.i686.rpm bind-libs-lite-9.9.4-18.el7_1.5.x86_64.rpm bind-utils-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bind-9.9.4-18.el7_1.5.x86_64.rpm bind-chroot-9.9.4-18.el7_1.5.x86_64.rpm bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-devel-9.9.4-18.el7_1.5.i686.rpm bind-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-lite-devel-9.9.4-18.el7_1.5.i686.rpm bind-lite-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-chroot-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: bind-9.9.4-18.el7_1.5.src.rpm noarch: bind-license-9.9.4-18.el7_1.5.noarch.rpm x86_64: bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-9.9.4-18.el7_1.5.i686.rpm bind-libs-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-lite-9.9.4-18.el7_1.5.i686.rpm bind-libs-lite-9.9.4-18.el7_1.5.x86_64.rpm bind-utils-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bind-9.9.4-18.el7_1.5.x86_64.rpm bind-chroot-9.9.4-18.el7_1.5.x86_64.rpm bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-devel-9.9.4-18.el7_1.5.i686.rpm bind-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-lite-devel-9.9.4-18.el7_1.5.i686.rpm bind-lite-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-chroot-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: bind-9.9.4-18.el7_1.5.src.rpm noarch: bind-license-9.9.4-18.el7_1.5.noarch.rpm ppc64: bind-9.9.4-18.el7_1.5.ppc64.rpm bind-chroot-9.9.4-18.el7_1.5.ppc64.rpm bind-debuginfo-9.9.4-18.el7_1.5.ppc.rpm bind-debuginfo-9.9.4-18.el7_1.5.ppc64.rpm bind-libs-9.9.4-18.el7_1.5.ppc.rpm bind-libs-9.9.4-18.el7_1.5.ppc64.rpm bind-libs-lite-9.9.4-18.el7_1.5.ppc.rpm bind-libs-lite-9.9.4-18.el7_1.5.ppc64.rpm bind-utils-9.9.4-18.el7_1.5.ppc64.rpm s390x: bind-9.9.4-18.el7_1.5.s390x.rpm bind-chroot-9.9.4-18.el7_1.5.s390x.rpm bind-debuginfo-9.9.4-18.el7_1.5.s390.rpm bind-debuginfo-9.9.4-18.el7_1.5.s390x.rpm bind-libs-9.9.4-18.el7_1.5.s390.rpm bind-libs-9.9.4-18.el7_1.5.s390x.rpm bind-libs-lite-9.9.4-18.el7_1.5.s390.rpm bind-libs-lite-9.9.4-18.el7_1.5.s390x.rpm bind-utils-9.9.4-18.el7_1.5.s390x.rpm x86_64: bind-9.9.4-18.el7_1.5.x86_64.rpm bind-chroot-9.9.4-18.el7_1.5.x86_64.rpm bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-9.9.4-18.el7_1.5.i686.rpm bind-libs-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-lite-9.9.4-18.el7_1.5.i686.rpm bind-libs-lite-9.9.4-18.el7_1.5.x86_64.rpm bind-utils-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: bind-9.9.4-18.ael7b_1.5.src.rpm noarch: bind-license-9.9.4-18.ael7b_1.5.noarch.rpm ppc64le: bind-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-chroot-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-debuginfo-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-libs-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-libs-lite-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-utils-9.9.4-18.ael7b_1.5.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bind-debuginfo-9.9.4-18.el7_1.5.ppc.rpm bind-debuginfo-9.9.4-18.el7_1.5.ppc64.rpm bind-devel-9.9.4-18.el7_1.5.ppc.rpm bind-devel-9.9.4-18.el7_1.5.ppc64.rpm bind-lite-devel-9.9.4-18.el7_1.5.ppc.rpm bind-lite-devel-9.9.4-18.el7_1.5.ppc64.rpm bind-sdb-9.9.4-18.el7_1.5.ppc64.rpm bind-sdb-chroot-9.9.4-18.el7_1.5.ppc64.rpm s390x: bind-debuginfo-9.9.4-18.el7_1.5.s390.rpm bind-debuginfo-9.9.4-18.el7_1.5.s390x.rpm bind-devel-9.9.4-18.el7_1.5.s390.rpm bind-devel-9.9.4-18.el7_1.5.s390x.rpm bind-lite-devel-9.9.4-18.el7_1.5.s390.rpm bind-lite-devel-9.9.4-18.el7_1.5.s390x.rpm bind-sdb-9.9.4-18.el7_1.5.s390x.rpm bind-sdb-chroot-9.9.4-18.el7_1.5.s390x.rpm x86_64: bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-devel-9.9.4-18.el7_1.5.i686.rpm bind-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-lite-devel-9.9.4-18.el7_1.5.i686.rpm bind-lite-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-chroot-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: bind-debuginfo-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-devel-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-lite-devel-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-sdb-9.9.4-18.ael7b_1.5.ppc64le.rpm bind-sdb-chroot-9.9.4-18.ael7b_1.5.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: bind-9.9.4-18.el7_1.5.src.rpm noarch: bind-license-9.9.4-18.el7_1.5.noarch.rpm x86_64: bind-9.9.4-18.el7_1.5.x86_64.rpm bind-chroot-9.9.4-18.el7_1.5.x86_64.rpm bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-9.9.4-18.el7_1.5.i686.rpm bind-libs-9.9.4-18.el7_1.5.x86_64.rpm bind-libs-lite-9.9.4-18.el7_1.5.i686.rpm bind-libs-lite-9.9.4-18.el7_1.5.x86_64.rpm bind-utils-9.9.4-18.el7_1.5.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bind-debuginfo-9.9.4-18.el7_1.5.i686.rpm bind-debuginfo-9.9.4-18.el7_1.5.x86_64.rpm bind-devel-9.9.4-18.el7_1.5.i686.rpm bind-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-lite-devel-9.9.4-18.el7_1.5.i686.rpm bind-lite-devel-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-9.9.4-18.el7_1.5.x86_64.rpm bind-sdb-chroot-9.9.4-18.el7_1.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5722 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV58/pXlSAg2UNWIIRAqo9AKCYvGAS0XIjah0Rvz9F9cWxd/VCxwCcDkOK 9T/pbmUk+4CypupOJP/vVmA= =hqc9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 04:57:36 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 04:57:36 +0000 Subject: [RHSA-2015:1706-01] Important: bind security update Message-ID: <201509030444.t834i98h007855@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2015:1706-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1706.html Issue date: 2015-09-03 CVE Names: CVE-2015-5722 ===================================================================== 1. Summary: Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno B?ck as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1259087 - CVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.4.src.rpm i386: bind-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-libs-9.3.6-25.P1.el5_11.4.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.4.i386.rpm bind-utils-9.3.6-25.P1.el5_11.4.i386.rpm x86_64: bind-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.4.i386.rpm bind-libs-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.4.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.4.src.rpm i386: bind-chroot-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.i386.rpm x86_64: bind-chroot-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-devel-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind-9.3.6-25.P1.el5_11.4.src.rpm i386: bind-9.3.6-25.P1.el5_11.4.i386.rpm bind-chroot-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-libs-9.3.6-25.P1.el5_11.4.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.4.i386.rpm bind-utils-9.3.6-25.P1.el5_11.4.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.i386.rpm ia64: bind-9.3.6-25.P1.el5_11.4.ia64.rpm bind-chroot-9.3.6-25.P1.el5_11.4.ia64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.ia64.rpm bind-devel-9.3.6-25.P1.el5_11.4.ia64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.ia64.rpm bind-libs-9.3.6-25.P1.el5_11.4.i386.rpm bind-libs-9.3.6-25.P1.el5_11.4.ia64.rpm bind-sdb-9.3.6-25.P1.el5_11.4.ia64.rpm bind-utils-9.3.6-25.P1.el5_11.4.ia64.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.ia64.rpm ppc: bind-9.3.6-25.P1.el5_11.4.ppc.rpm bind-chroot-9.3.6-25.P1.el5_11.4.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.ppc64.rpm bind-devel-9.3.6-25.P1.el5_11.4.ppc.rpm bind-devel-9.3.6-25.P1.el5_11.4.ppc64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.ppc.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.ppc64.rpm bind-libs-9.3.6-25.P1.el5_11.4.ppc.rpm bind-libs-9.3.6-25.P1.el5_11.4.ppc64.rpm bind-sdb-9.3.6-25.P1.el5_11.4.ppc.rpm bind-utils-9.3.6-25.P1.el5_11.4.ppc.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.ppc.rpm s390x: bind-9.3.6-25.P1.el5_11.4.s390x.rpm bind-chroot-9.3.6-25.P1.el5_11.4.s390x.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.s390.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.s390x.rpm bind-devel-9.3.6-25.P1.el5_11.4.s390.rpm bind-devel-9.3.6-25.P1.el5_11.4.s390x.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.s390.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.s390x.rpm bind-libs-9.3.6-25.P1.el5_11.4.s390.rpm bind-libs-9.3.6-25.P1.el5_11.4.s390x.rpm bind-sdb-9.3.6-25.P1.el5_11.4.s390x.rpm bind-utils-9.3.6-25.P1.el5_11.4.s390x.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.s390x.rpm x86_64: bind-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-chroot-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-devel-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.4.i386.rpm bind-libs-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.4.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.4.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5722 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV59ANXlSAg2UNWIIRAl4sAJ4rHv+3uymvJUe23BzvyYsrKxEsFACdHPQB n4inWg764uenOoZJomQcmBk= =iThT -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 04:58:01 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 04:58:01 +0000 Subject: [RHSA-2015:1707-01] Important: bind97 security update Message-ID: <201509030444.t834iZvC015864@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind97 security update Advisory ID: RHSA-2015:1707-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1707.html Issue date: 2015-09-03 CVE Names: CVE-2015-5722 ===================================================================== 1. Summary: Updated bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno B?ck as the original reporter. All bind97 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1259087 - CVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service 6. Package List: RHEL Desktop Workstation (v. 5 client): Source: bind97-9.7.0-21.P2.el5_11.3.src.rpm i386: bind97-9.7.0-21.P2.el5_11.3.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.3.i386.rpm x86_64: bind97-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind97-9.7.0-21.P2.el5_11.3.src.rpm i386: bind97-9.7.0-21.P2.el5_11.3.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.3.i386.rpm ia64: bind97-9.7.0-21.P2.el5_11.3.ia64.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.ia64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.ia64.rpm bind97-devel-9.7.0-21.P2.el5_11.3.ia64.rpm bind97-libs-9.7.0-21.P2.el5_11.3.ia64.rpm bind97-utils-9.7.0-21.P2.el5_11.3.ia64.rpm ppc: bind97-9.7.0-21.P2.el5_11.3.ppc.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.ppc64.rpm bind97-devel-9.7.0-21.P2.el5_11.3.ppc.rpm bind97-devel-9.7.0-21.P2.el5_11.3.ppc64.rpm bind97-libs-9.7.0-21.P2.el5_11.3.ppc.rpm bind97-libs-9.7.0-21.P2.el5_11.3.ppc64.rpm bind97-utils-9.7.0-21.P2.el5_11.3.ppc.rpm s390x: bind97-9.7.0-21.P2.el5_11.3.s390x.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.s390x.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.s390.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.s390x.rpm bind97-devel-9.7.0-21.P2.el5_11.3.s390.rpm bind97-devel-9.7.0-21.P2.el5_11.3.s390x.rpm bind97-libs-9.7.0-21.P2.el5_11.3.s390.rpm bind97-libs-9.7.0-21.P2.el5_11.3.s390x.rpm bind97-utils-9.7.0-21.P2.el5_11.3.s390x.rpm x86_64: bind97-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5722 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV59AtXlSAg2UNWIIRAnvDAJ9SOprCf8AmvbUAlK9iG9MuyBtsbQCfZhpe aEOWXJ0SapxRyOPaUFx5WpY= =mXF8 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 11:31:22 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 07:31:22 -0400 Subject: [RHSA-2015:1708-01] Important: libXfont security update Message-ID: <201509031131.t83BVMNr011548@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libXfont security update Advisory ID: RHSA-2015:1708-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1708.html Issue date: 2015-09-03 CVE Names: CVE-2015-1802 CVE-2015-1803 CVE-2015-1804 ===================================================================== 1. Summary: An updated libXfont package that fixes three security issues is now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libXfont package provides the X.Org libXfont runtime library. X.Org is an open source implementation of the X Window System. An integer overflow flaw was found in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1802) An integer truncation flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1804) A NULL pointer dereference flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server. (CVE-2015-1803) All libXfont users are advised to upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1203715 - CVE-2015-1802 libXfont: missing range check in bdfReadProperties 1203718 - CVE-2015-1803 libXfont: crash on invalid read in bdfReadCharacters 1203719 - CVE-2015-1804 libXfont: out-of-bounds memory access in bdfReadCharacters 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libXfont-1.4.5-5.el6_7.src.rpm i386: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm x86_64: libXfont-1.4.5-5.el6_7.x86_64.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm x86_64: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: libXfont-1.4.5-5.el6_7.src.rpm x86_64: libXfont-1.4.5-5.el6_7.x86_64.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libXfont-1.4.5-5.el6_7.src.rpm i386: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm ppc64: libXfont-1.4.5-5.el6_7.ppc64.rpm libXfont-debuginfo-1.4.5-5.el6_7.ppc64.rpm s390x: libXfont-1.4.5-5.el6_7.s390x.rpm libXfont-debuginfo-1.4.5-5.el6_7.s390x.rpm x86_64: libXfont-1.4.5-5.el6_7.x86_64.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm ppc64: libXfont-1.4.5-5.el6_7.ppc.rpm libXfont-debuginfo-1.4.5-5.el6_7.ppc.rpm libXfont-debuginfo-1.4.5-5.el6_7.ppc64.rpm libXfont-devel-1.4.5-5.el6_7.ppc.rpm libXfont-devel-1.4.5-5.el6_7.ppc64.rpm s390x: libXfont-1.4.5-5.el6_7.s390.rpm libXfont-debuginfo-1.4.5-5.el6_7.s390.rpm libXfont-debuginfo-1.4.5-5.el6_7.s390x.rpm libXfont-devel-1.4.5-5.el6_7.s390.rpm libXfont-devel-1.4.5-5.el6_7.s390x.rpm x86_64: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libXfont-1.4.5-5.el6_7.src.rpm i386: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm x86_64: libXfont-1.4.5-5.el6_7.x86_64.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm x86_64: libXfont-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.i686.rpm libXfont-debuginfo-1.4.5-5.el6_7.x86_64.rpm libXfont-devel-1.4.5-5.el6_7.i686.rpm libXfont-devel-1.4.5-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: libXfont-1.4.7-3.el7_1.src.rpm x86_64: libXfont-1.4.7-3.el7_1.i686.rpm libXfont-1.4.7-3.el7_1.x86_64.rpm libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm libXfont-devel-1.4.7-3.el7_1.i686.rpm libXfont-devel-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libXfont-1.4.7-3.el7_1.src.rpm x86_64: libXfont-1.4.7-3.el7_1.i686.rpm libXfont-1.4.7-3.el7_1.x86_64.rpm libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm libXfont-devel-1.4.7-3.el7_1.i686.rpm libXfont-devel-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libXfont-1.4.7-3.el7_1.src.rpm ppc64: libXfont-1.4.7-3.el7_1.ppc.rpm libXfont-1.4.7-3.el7_1.ppc64.rpm libXfont-debuginfo-1.4.7-3.el7_1.ppc.rpm libXfont-debuginfo-1.4.7-3.el7_1.ppc64.rpm s390x: libXfont-1.4.7-3.el7_1.s390.rpm libXfont-1.4.7-3.el7_1.s390x.rpm libXfont-debuginfo-1.4.7-3.el7_1.s390.rpm libXfont-debuginfo-1.4.7-3.el7_1.s390x.rpm x86_64: libXfont-1.4.7-3.el7_1.i686.rpm libXfont-1.4.7-3.el7_1.x86_64.rpm libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libXfont-1.4.7-3.ael7b_1.src.rpm ppc64le: libXfont-1.4.7-3.ael7b_1.ppc64le.rpm libXfont-debuginfo-1.4.7-3.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libXfont-debuginfo-1.4.7-3.el7_1.ppc.rpm libXfont-debuginfo-1.4.7-3.el7_1.ppc64.rpm libXfont-devel-1.4.7-3.el7_1.ppc.rpm libXfont-devel-1.4.7-3.el7_1.ppc64.rpm s390x: libXfont-debuginfo-1.4.7-3.el7_1.s390.rpm libXfont-debuginfo-1.4.7-3.el7_1.s390x.rpm libXfont-devel-1.4.7-3.el7_1.s390.rpm libXfont-devel-1.4.7-3.el7_1.s390x.rpm x86_64: libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm libXfont-devel-1.4.7-3.el7_1.i686.rpm libXfont-devel-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: libXfont-debuginfo-1.4.7-3.ael7b_1.ppc64le.rpm libXfont-devel-1.4.7-3.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libXfont-1.4.7-3.el7_1.src.rpm x86_64: libXfont-1.4.7-3.el7_1.i686.rpm libXfont-1.4.7-3.el7_1.x86_64.rpm libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libXfont-debuginfo-1.4.7-3.el7_1.i686.rpm libXfont-debuginfo-1.4.7-3.el7_1.x86_64.rpm libXfont-devel-1.4.7-3.el7_1.i686.rpm libXfont-devel-1.4.7-3.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1802 https://access.redhat.com/security/cve/CVE-2015-1803 https://access.redhat.com/security/cve/CVE-2015-1804 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV6C+IXlSAg2UNWIIRAnZzAKC8of9UG7hkcsVp1sWrrtNzePvSVgCfePjy SAqlsaJyoa5OwDDzp7qWIlU= =uinF -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 16:07:51 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 12:07:51 -0400 Subject: [RHSA-2015:1712-01] Important: chromium-browser security update Message-ID: <201509031607.t83G7psn018239@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2015:1712-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1712.html Issue date: 2015-09-03 CVE Names: CVE-2015-1291 CVE-2015-1292 CVE-2015-1293 CVE-2015-1294 CVE-2015-1295 CVE-2015-1296 CVE-2015-1297 CVE-2015-1298 CVE-2015-1299 CVE-2015-1300 CVE-2015-1301 ===================================================================== 1. Summary: Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297, CVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301) All Chromium users should upgrade to these updated packages, which contain Chromium version 45.0.2454.85, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1259141 - CVE-2015-1291 chromium-browser: Cross-origin bypass in DOM 1259159 - CVE-2015-1292 chromium-browser: Cross-origin bypass in ServiceWorker 1259161 - CVE-2015-1293 chromium-browser: Cross-origin bypass in DOM 1259162 - CVE-2015-1294 chromium-browser: Use-after-free in Skia 1259163 - CVE-2015-1295 chromium-browser: Use-after-free in Printing 1259164 - CVE-2015-1296 chromium-browser: Character spoofing in omnibox 1259165 - CVE-2015-1297 chromium-browser: Permission scoping error in WebRequest 1259166 - CVE-2015-1298 chromium-browser: URL validation error in extensions 1259168 - CVE-2015-1299 chromium-browser: Use-after-free in Blink 1259169 - CVE-2015-1300 chromium-browser: Information leak in Blink 1259170 - CVE-2015-1301 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-45.0.2454.85-2.el6.i686.rpm chromium-browser-debuginfo-45.0.2454.85-2.el6.i686.rpm x86_64: chromium-browser-45.0.2454.85-2.el6.x86_64.rpm chromium-browser-debuginfo-45.0.2454.85-2.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-45.0.2454.85-2.el6.i686.rpm chromium-browser-debuginfo-45.0.2454.85-2.el6.i686.rpm x86_64: chromium-browser-45.0.2454.85-2.el6.x86_64.rpm chromium-browser-debuginfo-45.0.2454.85-2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-45.0.2454.85-2.el6.i686.rpm chromium-browser-debuginfo-45.0.2454.85-2.el6.i686.rpm x86_64: chromium-browser-45.0.2454.85-2.el6.x86_64.rpm chromium-browser-debuginfo-45.0.2454.85-2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1291 https://access.redhat.com/security/cve/CVE-2015-1292 https://access.redhat.com/security/cve/CVE-2015-1293 https://access.redhat.com/security/cve/CVE-2015-1294 https://access.redhat.com/security/cve/CVE-2015-1295 https://access.redhat.com/security/cve/CVE-2015-1296 https://access.redhat.com/security/cve/CVE-2015-1297 https://access.redhat.com/security/cve/CVE-2015-1298 https://access.redhat.com/security/cve/CVE-2015-1299 https://access.redhat.com/security/cve/CVE-2015-1300 https://access.redhat.com/security/cve/CVE-2015-1301 https://access.redhat.com/security/updates/classification/#important http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV6HBVXlSAg2UNWIIRAhXxAJ9CRj++VPpdML9dQEpVkFl2ts+eDACgwP7Y XrGMUTAhVCo+Mp5n3FQSJYs= =xAiC -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 18:16:31 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 14:16:31 -0400 Subject: [RHSA-2015:1714-01] Important: spice security update Message-ID: <201509031816.t83IGVEu005648@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: spice security update Advisory ID: RHSA-2015:1714-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1714.html Issue date: 2015-09-03 CVE Names: CVE-2015-3247 ===================================================================== 1. Summary: An updated spice package that fixes one security issue is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A race condition flaw, leading to a heap-based memory corruption, was found in spice's worker_update_monitors_config() function, which runs under the QEMU-KVM context on the host. A user in a guest could leverage this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-3247) This issue was discovered by Frediano Ziglio of Red Hat. All spice users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1233238 - CVE-2015-3247 spice: memory corruption in worker_update_monitors_config() 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: spice-0.12.4-9.el7_1.1.src.rpm x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-0.12.4-9.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-devel-0.12.4-9.el7_1.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: spice-0.12.4-9.el7_1.1.src.rpm x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-0.12.4-9.el7_1.1.x86_64.rpm spice-server-devel-0.12.4-9.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: spice-0.12.4-9.el7_1.1.src.rpm x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-0.12.4-9.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-devel-0.12.4-9.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: spice-0.12.4-9.el7_1.1.src.rpm x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-0.12.4-9.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: spice-debuginfo-0.12.4-9.el7_1.1.x86_64.rpm spice-server-devel-0.12.4-9.el7_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3247 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV6I5+XlSAg2UNWIIRArKHAKCTaDcVPz5f85T/ieGsNYEjROM+mwCgoc6d l2FElUHyHL7FS7LKp9veLGA= =bR5V -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 18:16:42 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 14:16:42 -0400 Subject: [RHSA-2015:1715-01] Important: spice-server security update Message-ID: <201509031816.t83IGgGU005765@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: spice-server security update Advisory ID: RHSA-2015:1715-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1715.html Issue date: 2015-09-03 CVE Names: CVE-2015-3247 ===================================================================== 1. Summary: An updated spice-server package that fixes one security issue is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A race condition flaw, leading to a heap-based memory corruption, was found in spice's worker_update_monitors_config() function, which runs under the QEMU-KVM context on the host. A user in a guest could leverage this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-3247) This issue was discovered by Frediano Ziglio of Red Hat. All spice-server users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1233238 - CVE-2015-3247 spice: memory corruption in worker_update_monitors_config() 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: spice-server-0.12.4-12.el6_7.1.src.rpm x86_64: spice-server-0.12.4-12.el6_7.1.x86_64.rpm spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm spice-server-devel-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: spice-server-0.12.4-12.el6_7.1.src.rpm x86_64: spice-server-0.12.4-12.el6_7.1.x86_64.rpm spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm spice-server-devel-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: spice-server-0.12.4-12.el6_7.1.src.rpm x86_64: spice-server-0.12.4-12.el6_7.1.x86_64.rpm spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm spice-server-devel-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: spice-server-0.12.4-12.el6_7.1.src.rpm x86_64: spice-server-0.12.4-12.el6_7.1.x86_64.rpm spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-12.el6_7.1.x86_64.rpm spice-server-devel-0.12.4-12.el6_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3247 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV6I6JXlSAg2UNWIIRAvcgAKCGsZhram/SKWWsxH6ZqP5D8nTqoACgv3/W QLr5/LvrNi6fv+TpKsCLJnc= =e4if -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 23:46:41 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 23:46:41 +0000 Subject: [RHSA-2015:1718-01] Moderate: qemu-kvm-rhev security update Message-ID: <201509032346.t83NkfEL006431@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm-rhev security update Advisory ID: RHSA-2015:1718-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2015:1718 Issue date: 2015-09-03 CVE Names: CVE-2015-5165 ===================================================================== 1. Summary: Updated qemu-kvm-rhev packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory. (CVE-2015-5165) Red Hat would like to thank the Xen project for reporting this issue. Upstream acknowledges Donghai Zhu of Alibaba as the original reporter. All qemu-kvm-rhev users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) 6. Package List: Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7: Source: qemu-kvm-rhev-2.1.2-23.el7_1.8.src.rpm x86_64: libcacard-rhev-2.1.2-23.el7_1.8.x86_64.rpm libcacard-tools-rhev-2.1.2-23.el7_1.8.x86_64.rpm qemu-img-rhev-2.1.2-23.el7_1.8.x86_64.rpm qemu-kvm-common-rhev-2.1.2-23.el7_1.8.x86_64.rpm qemu-kvm-rhev-2.1.2-23.el7_1.8.x86_64.rpm qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.8.x86_64.rpm qemu-kvm-tools-rhev-2.1.2-23.el7_1.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5165 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV6NvMXlSAg2UNWIIRAsqKAJ9axwuxvt8Ch1c7EYShMbrerU95igCgryAx hNLemDJFZdtIM4FanpYUmAE= =19A+ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 3 23:47:04 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 3 Sep 2015 23:47:04 +0000 Subject: [RHSA-2015:1723-01] Moderate: openstack-nova security update Message-ID: <201509032347.t83Nl4eq002271@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-nova security update Advisory ID: RHSA-2015:1723-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2015:1723 Issue date: 2015-09-03 CVE Names: CVE-2015-3241 ===================================================================== 1. Summary: Updated openstack-nova packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 7.0. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7 - noarch 3. Description: OpenStack Compute (nova) launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A denial of service flaw was found in the OpenStack Compute (nova) instance migration process. Because the migration process does not terminate when an instance is deleted, an authenticated user could bypass user quota and deplete all available disk space by repeatedly re-sizing and deleting an instance. (CVE-2015-3241) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges George Shuklin of Webzilla LTD as the original reporter. All openstack-nova users are advised to upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1232782 - CVE-2015-3241 openstack-nova: Nova instance migration process does not stop when instance is deleted 6. Package List: Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7: Source: openstack-nova-2015.1.0-18.el7ost.src.rpm noarch: openstack-nova-2015.1.0-18.el7ost.noarch.rpm openstack-nova-api-2015.1.0-18.el7ost.noarch.rpm openstack-nova-cells-2015.1.0-18.el7ost.noarch.rpm openstack-nova-cert-2015.1.0-18.el7ost.noarch.rpm openstack-nova-common-2015.1.0-18.el7ost.noarch.rpm openstack-nova-compute-2015.1.0-18.el7ost.noarch.rpm openstack-nova-conductor-2015.1.0-18.el7ost.noarch.rpm openstack-nova-console-2015.1.0-18.el7ost.noarch.rpm openstack-nova-doc-2015.1.0-18.el7ost.noarch.rpm openstack-nova-network-2015.1.0-18.el7ost.noarch.rpm openstack-nova-novncproxy-2015.1.0-18.el7ost.noarch.rpm openstack-nova-objectstore-2015.1.0-18.el7ost.noarch.rpm openstack-nova-scheduler-2015.1.0-18.el7ost.noarch.rpm openstack-nova-serialproxy-2015.1.0-18.el7ost.noarch.rpm openstack-nova-spicehtml5proxy-2015.1.0-18.el7ost.noarch.rpm python-nova-2015.1.0-18.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3241 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV6NvqXlSAg2UNWIIRAlxUAJkBEqRi+n9OdmrgmiFrAuhPdO1SfQCeJ2wD A/KHg5YbxGP95vFZd37XtLo= =DHyb -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Sep 4 03:05:02 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 4 Sep 2015 03:05:02 +0000 Subject: [RHSA-2015:1736-01] Moderate: openshift security update Message-ID: <201509040305.t84352Sl032693@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openshift security update Advisory ID: RHSA-2015:1736-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2015:1736 Issue date: 2015-09-03 CVE Names: CVE-2015-5250 ===================================================================== 1. Summary: Updated openshift packages that fix one security issue are now available for Red Hat OpenShift Enterprise 3.0. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHOSE 3.0 - x86_64 3. Description: Red Hat OpenShift Enterprise is a cloud computing Platform-as-a- Service (PaaS) solution designed for on-premise or private cloud deployments. Improper error handling in the API server can cause the master process to crash. A user with network access to the master could cause this to happen. (CVE-2015-5250) This issue was discovered by Jordan Liggitt of the Red Hat OpenShift Enterprise Team. All OpenShift Enterprise 3.0 users are advised to upgrade to these updated packages, which correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258. After running the "yum update" command on each host and ensuring all packages have been updated, restart the openshift-master service on the master host: # systemctl restart openshift-master 5. Bugs fixed (https://bugzilla.redhat.com/): 1258641 - Malformed JSON can cause API process crash 1259867 - CVE-2015-5250 OpenShift: Malformed JSON can cause API process crash 6. Package List: RHOSE 3.0: Source: openshift-3.0.1.0-1.git.529.dcab62c.el7ose.src.rpm x86_64: openshift-3.0.1.0-1.git.529.dcab62c.el7ose.x86_64.rpm openshift-clients-3.0.1.0-1.git.529.dcab62c.el7ose.x86_64.rpm openshift-master-3.0.1.0-1.git.529.dcab62c.el7ose.x86_64.rpm openshift-node-3.0.1.0-1.git.529.dcab62c.el7ose.x86_64.rpm openshift-sdn-ovs-3.0.1.0-1.git.529.dcab62c.el7ose.x86_64.rpm tuned-profiles-openshift-node-3.0.1.0-1.git.529.dcab62c.el7ose.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5250 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD4DBQFV6QpIXlSAg2UNWIIRAmjZAJdUdCCIsSuXtJnkEqtlVzwFSpo+AKCvIvgq 6EJk7FY6RQcG3B5fuUmGmQ== =TZuG -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 8 13:12:10 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 8 Sep 2015 09:12:10 -0400 Subject: [RHSA-2015:1741-01] Important: haproxy security update Message-ID: <201509081312.t88DCAhT018842@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: haproxy security update Advisory ID: RHSA-2015:1741-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1741.html Issue date: 2015-09-08 CVE Names: CVE-2015-3281 ===================================================================== 1. Summary: An updated haproxy package that fixes one security issue is now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Load Balancer (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: HAProxy provides high availability, load balancing, and proxying for TCP and HTTP-based applications. An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session. (CVE-2015-3281) All haproxy users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1239072 - CVE-2015-3281 haproxy: information leak in buffer_slow_realign() 6. Package List: Red Hat Enterprise Linux Load Balancer (v. 6): Source: haproxy-1.5.4-2.el6_7.1.src.rpm i386: haproxy-1.5.4-2.el6_7.1.i686.rpm haproxy-debuginfo-1.5.4-2.el6_7.1.i686.rpm x86_64: haproxy-1.5.4-2.el6_7.1.x86_64.rpm haproxy-debuginfo-1.5.4-2.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: haproxy-1.5.4-4.el7_1.1.src.rpm x86_64: haproxy-1.5.4-4.el7_1.1.x86_64.rpm haproxy-debuginfo-1.5.4-4.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: haproxy-1.5.4-4.el7_1.1.src.rpm x86_64: haproxy-1.5.4-4.el7_1.1.x86_64.rpm haproxy-debuginfo-1.5.4-4.el7_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3281 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV7t6oXlSAg2UNWIIRApYGAJ9VOYlmlv0qVHKVP/Pjj/LLIqXyBgCdEZ2k rpFQc8peyMcc9lWq16QHX7A= =9UCT -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 8 13:12:31 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 8 Sep 2015 09:12:31 -0400 Subject: [RHSA-2015:1742-01] Moderate: subversion security update Message-ID: <201509081312.t88DCVGV011761@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subversion security update Advisory ID: RHSA-2015:1742-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1742.html Issue date: 2015-09-08 CVE Names: CVE-2015-0248 CVE-2015-0251 CVE-2015-3184 CVE-2015-3187 ===================================================================== 1. Summary: Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3184 and CVE-2015-3187 flaws. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1205138 - CVE-2015-0248 subversion: (mod_dav_svn) remote denial of service with certain requests with dynamically evaluated revision numbers 1205140 - CVE-2015-0251 subversion: (mod_dav_svn) spoofing svn:author property values for new revisions 1247249 - CVE-2015-3184 subversion: Mixed anonymous/authenticated path-based authz with httpd 2.4 1247252 - CVE-2015-3187 subversion: svn_repos_trace_node_locations() reveals paths hidden by authz 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.i686.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.i686.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm ppc64: mod_dav_svn-1.7.14-7.el7_1.1.ppc64.rpm subversion-1.7.14-7.el7_1.1.ppc64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm subversion-libs-1.7.14-7.el7_1.1.ppc.rpm subversion-libs-1.7.14-7.el7_1.1.ppc64.rpm s390x: mod_dav_svn-1.7.14-7.el7_1.1.s390x.rpm subversion-1.7.14-7.el7_1.1.s390x.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm subversion-libs-1.7.14-7.el7_1.1.s390.rpm subversion-libs-1.7.14-7.el7_1.1.s390x.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: subversion-1.7.14-7.ael7b_1.1.src.rpm ppc64le: mod_dav_svn-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-libs-1.7.14-7.ael7b_1.1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: subversion-1.7.14-7.el7_1.1.ppc.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm subversion-devel-1.7.14-7.el7_1.1.ppc.rpm subversion-devel-1.7.14-7.el7_1.1.ppc64.rpm subversion-gnome-1.7.14-7.el7_1.1.ppc.rpm subversion-gnome-1.7.14-7.el7_1.1.ppc64.rpm subversion-javahl-1.7.14-7.el7_1.1.ppc.rpm subversion-javahl-1.7.14-7.el7_1.1.ppc64.rpm subversion-kde-1.7.14-7.el7_1.1.ppc.rpm subversion-kde-1.7.14-7.el7_1.1.ppc64.rpm subversion-perl-1.7.14-7.el7_1.1.ppc.rpm subversion-perl-1.7.14-7.el7_1.1.ppc64.rpm subversion-python-1.7.14-7.el7_1.1.ppc64.rpm subversion-ruby-1.7.14-7.el7_1.1.ppc.rpm subversion-ruby-1.7.14-7.el7_1.1.ppc64.rpm subversion-tools-1.7.14-7.el7_1.1.ppc64.rpm s390x: subversion-1.7.14-7.el7_1.1.s390.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm subversion-devel-1.7.14-7.el7_1.1.s390.rpm subversion-devel-1.7.14-7.el7_1.1.s390x.rpm subversion-gnome-1.7.14-7.el7_1.1.s390.rpm subversion-gnome-1.7.14-7.el7_1.1.s390x.rpm subversion-javahl-1.7.14-7.el7_1.1.s390.rpm subversion-javahl-1.7.14-7.el7_1.1.s390x.rpm subversion-kde-1.7.14-7.el7_1.1.s390.rpm subversion-kde-1.7.14-7.el7_1.1.s390x.rpm subversion-perl-1.7.14-7.el7_1.1.s390.rpm subversion-perl-1.7.14-7.el7_1.1.s390x.rpm subversion-python-1.7.14-7.el7_1.1.s390x.rpm subversion-ruby-1.7.14-7.el7_1.1.s390.rpm subversion-ruby-1.7.14-7.el7_1.1.s390x.rpm subversion-tools-1.7.14-7.el7_1.1.s390x.rpm x86_64: subversion-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-devel-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-gnome-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-javahl-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-kde-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-perl-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-python-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-ruby-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-tools-1.7.14-7.ael7b_1.1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: subversion-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-0248 https://access.redhat.com/security/cve/CVE-2015-0251 https://access.redhat.com/security/cve/CVE-2015-3184 https://access.redhat.com/security/cve/CVE-2015-3187 https://access.redhat.com/security/updates/classification/#moderate https://subversion.apache.org/security/CVE-2015-0248-advisory.txt https://subversion.apache.org/security/CVE-2015-3184-advisory.txt https://subversion.apache.org/security/CVE-2015-0251-advisory.txt https://subversion.apache.org/security/CVE-2015-3187-advisory.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV7t6+XlSAg2UNWIIRAivqAKCtV0lnW3RGFsCNsKIU9lBHeBk4UQCdE8/b KVJwbobNcmPzKule+9U7RnM= =F2J4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 10 21:06:09 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 10 Sep 2015 21:06:09 +0000 Subject: [RHSA-2015:1768-01] Low: libunwind security update Message-ID: <201509102106.t8AL69sS030720@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: libunwind security update Advisory ID: RHSA-2015:1768-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1768.html Issue date: 2015-09-10 CVE Names: CVE-2015-3239 ===================================================================== 1. Summary: Updated libunwind packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6 - x86_64 3. Description: Libunwind provides a C ABI to determine the call-chain of a program. An off-by-one array indexing error was found in the libunwind API, which could cause an error when reading untrusted binaries or dwarf debug info data. Red Hat products do not call the API in this way; and it is unlikely that any exploitable attack vector exists in current builds or supported usage. (CVE-2015-3239) This issue was discovered by Paolo Bonzini of Red Hat. All users of libunwind are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1232265 - CVE-2015-3239 libunwind: off-by-one in dwarf_to_unw_regnum() 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6: Source: libunwind-1.1-4.1.el6ost.src.rpm x86_64: libunwind-1.1-4.1.el6ost.x86_64.rpm libunwind-debuginfo-1.1-4.1.el6ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3239 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV8fC0XlSAg2UNWIIRAiJPAJ9zsMQMgM34lS9eUyf9D0K4X0rL9QCfcTMX LdFtheAu17m2G54YX3sYW3M= =GYbN -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 10 21:06:43 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 10 Sep 2015 21:06:43 +0000 Subject: [RHSA-2015:1769-01] Low: libunwind security update Message-ID: <201509102106.t8AL6iAm031108@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: libunwind security update Advisory ID: RHSA-2015:1769-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1769.html Issue date: 2015-09-10 CVE Names: CVE-2015-3239 ===================================================================== 1. Summary: Updated libunwind packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7 - x86_64 3. Description: Libunwind provides a C ABI to determine the call-chain of a program. An off-by-one array indexing error was found in the libunwind API, which could cause an error when reading untrusted binaries or dwarf debug info data. Red Hat products do not call the API in this way; and it is unlikely that any exploitable attack vector exists in current builds or supported usage. (CVE-2015-3239) This issue was discovered by Paolo Bonzini of Red Hat. All users of libunwind are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1232265 - CVE-2015-3239 libunwind: off-by-one in dwarf_to_unw_regnum() 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7: Source: libunwind-1.1-4.1.el7ost.src.rpm x86_64: libunwind-1.1-4.1.el7ost.x86_64.rpm libunwind-debuginfo-1.1-4.1.el7ost.x86_64.rpm libunwind-devel-1.1-4.1.el7ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3239 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV8fDaXlSAg2UNWIIRAu2cAJ0bVBh0/PZmuR0LqvVs2d6fv8QU4gCfV1es IUqjA1rVQA50Wk0XYWb2TMk= =4S0l -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 10 21:08:11 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 10 Sep 2015 21:08:11 +0000 Subject: [RHSA-2015:1766-01] Moderate: python-django security update Message-ID: <201509102108.t8AL8Bmt031855@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python-django security update Advisory ID: RHSA-2015:1766-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1766.html Issue date: 2015-09-10 CVE Names: CVE-2015-5963 CVE-2015-5964 ===================================================================== 1. Summary: Updated python-django packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6 - noarch 3. Description: Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle. It was found that Django incorrectly handled the session store. A session could be created by anonymously accessing the django.contrib.auth.views.logout view if it was not decorated correctly with django.contrib.auth.decorators.login_required. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions. (CVE-2015-5963) It was found that certain Django functions would, in certain circumstances, create empty sessions. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions. (CVE-2015-5964) Red Hat would like to thank the upstream Django project for reporting these issues. Upstream acknowledges Lin Hua Cheng as the original reporter of CVE-2015-5964. All python-django users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1252890 - CVE-2015-5963 python-django: Denial-of-service possibility in logout() view by filling session store 1252891 - CVE-2015-5964 python-django: Denial-of-service possibility in logout() view by filling session store 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6: Source: python-django-1.6.11-3.el6ost.src.rpm noarch: python-django-1.6.11-3.el6ost.noarch.rpm python-django-bash-completion-1.6.11-3.el6ost.noarch.rpm python-django-doc-1.6.11-3.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5963 https://access.redhat.com/security/cve/CVE-2015-5964 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV8fEkXlSAg2UNWIIRAq05AJ9OMahDG8/SsL1zr7MhxPErvY4qfgCfRhFu RJspBUYYA7hrM5ToToyssxA= =AP6k -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 10 21:08:43 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 10 Sep 2015 21:08:43 +0000 Subject: [RHSA-2015:1767-01] Moderate: python-django security update Message-ID: <201509102108.t8AL8ivi025816@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python-django security update Advisory ID: RHSA-2015:1767-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1767.html Issue date: 2015-09-10 CVE Names: CVE-2015-5963 CVE-2015-5964 ===================================================================== 1. Summary: Updated python-django packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7 - noarch 3. Description: Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY (Don't Repeat Yourself) principle. It was found that Django incorrectly handled the session store. A session could be created by anonymously accessing the django.contrib.auth.views.logout view if it was not decorated correctly with django.contrib.auth.decorators.login_required. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions. (CVE-2015-5963) It was found that certain Django functions would, in certain circumstances, create empty sessions. A remote attacker could use this flaw to fill up the session store or cause other users' session records to be evicted by requesting a large number of new sessions. (CVE-2015-5964) Red Hat would like to thank the upstream Django project for reporting these issues. Upstream acknowledges Lin Hua Cheng as the original reporter of CVE-2015-5964. All python-django users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1252890 - CVE-2015-5963 python-django: Denial-of-service possibility in logout() view by filling session store 1252891 - CVE-2015-5964 python-django: Denial-of-service possibility in logout() view by filling session store 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7: Source: python-django-1.6.11-3.el7ost.src.rpm noarch: python-django-1.6.11-3.el7ost.noarch.rpm python-django-bash-completion-1.6.11-3.el7ost.noarch.rpm python-django-doc-1.6.11-3.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5963 https://access.redhat.com/security/cve/CVE-2015-5964 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV8fFTXlSAg2UNWIIRAhryAJ9JVw6OGeOgBDkCSLWxlunt8sJqsgCfcx/b XNsjoCx9G9VQy/TYUo78RH0= =Bwsa -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 14 04:27:59 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 14 Sep 2015 04:27:59 +0000 Subject: [RHSA-2015:1772-01] Important: qemu-kvm-rhev security update Message-ID: <201509140428.t8E4Rxov026619@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm-rhev security update Advisory ID: RHSA-2015:1772-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1772.html Issue date: 2015-09-14 CVE Names: CVE-2015-5225 ===================================================================== 1. Summary: Updated qemu-kvm-rhev packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 5.0, 6.0 and 7.0, for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7 - x86_64 Red Hat Enterprise Linux OpenStack Platform 6.0 for RHEL 7 - x86_64 Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow issue was found in the QEMU emulator's VNC display driver. It could occur while refreshing the VNC server's display surface using the vnc_refresh_server_surface() routine. A privileged guest user could use this flaw to corrupt the heap memory and crash the QEMU process instance, or to potentially use it to execute arbitrary code on the host. (CVE-2015-5225) Red Hat would like to thank Mr Qinghao Tang from QIHU 360 Inc. and Mr Zuozhi from Alibaba Inc. for reporting this issue. All qemu-kvm-rhev users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. After all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1255896 - CVE-2015-5225 Qemu: ui: vnc: heap memory corruption in vnc_refresh_server_surface 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7: Source: qemu-kvm-rhev-2.1.2-23.el7_1.9.src.rpm x86_64: libcacard-devel-rhev-2.1.2-23.el7_1.9.x86_64.rpm libcacard-rhev-2.1.2-23.el7_1.9.x86_64.rpm libcacard-tools-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-img-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-common-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-tools-rhev-2.1.2-23.el7_1.9.x86_64.rpm Red Hat Enterprise Linux OpenStack Platform 6.0 for RHEL 7: Source: qemu-kvm-rhev-2.1.2-23.el7_1.9.src.rpm x86_64: libcacard-devel-rhev-2.1.2-23.el7_1.9.x86_64.rpm libcacard-rhev-2.1.2-23.el7_1.9.x86_64.rpm libcacard-tools-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-img-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-common-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-tools-rhev-2.1.2-23.el7_1.9.x86_64.rpm Red Hat Enterprise Linux OpenStack Platform 7.0 for RHEL 7: Source: qemu-kvm-rhev-2.1.2-23.el7_1.9.src.rpm x86_64: libcacard-rhev-2.1.2-23.el7_1.9.x86_64.rpm libcacard-tools-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-img-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-common-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-rhev-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.9.x86_64.rpm qemu-kvm-tools-rhev-2.1.2-23.el7_1.9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5225 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV9kxLXlSAg2UNWIIRAsamAKDEndu160W+en3wAWPII+zdqbI0hQCcCT/b ObuDdZKCWgA637dzPLMzzbM= =/FS1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 15 18:18:13 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Sep 2015 18:18:13 +0000 Subject: [RHSA-2015:1778-01] Important: kernel security and bug fix update Message-ID: <201509151818.t8FIIEEb020499@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2015:1778-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1778.html Issue date: 2015-09-15 CVE Names: CVE-2014-9585 CVE-2015-0275 CVE-2015-1333 CVE-2015-3212 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the kernel's implementation of the Berkeley Packet Filter (BPF). A local attacker could craft BPF code to crash the system by creating a situation in which the JIT compiler would fail to correctly optimize the JIT image on the last pass. This would lead to the CPU executing instructions that were not part of the JIT code. (CVE-2015-4700, Important) * Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) * A flaw was found in the way the Linux kernel's ext4 file system handled the "page size > block size" condition when the fallocate zero range functionality was used. A local attacker could use this flaw to crash the system. (CVE-2015-0275, Moderate) * It was found that the Linux kernel's keyring implementation would leak memory when adding a key to a keyring via the add_key() function. A local attacker could use this flaw to exhaust all available memory on the system. (CVE-2015-1333, Moderate) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket. (CVE-2015-3212, Moderate) * An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) Red Hat would like to thank Daniel Borkmann for reporting CVE-2015-4700, and Canonical for reporting the CVE-2015-1333 issue. The CVE-2015-0275 issue was discovered by Xiong Zhou of Red Hat, and the CVE-2015-3212 issue was discovered by Ji Jianwen of Red Hat Engineering. This update also fixes several bugs. Refer to the following Knowledgebase article for further information: https://access.redhat.com/articles/1614563 All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1181054 - CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library 1193907 - CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG() 1226442 - CVE-2015-3212 kernel: SCTP race condition allows list corruption and panic from userlevel 1233615 - CVE-2015-4700 kernel: Crafted BPF filters may crash kernel during JIT optimisation 1239029 - CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation 1245658 - CVE-2015-1333 kernel: denial of service due to memory leak in add_key() 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-229.14.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm kernel-doc-3.10.0-229.14.1.el7.noarch.rpm x86_64: kernel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-headers-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm perf-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-229.14.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm kernel-doc-3.10.0-229.14.1.el7.noarch.rpm x86_64: kernel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-headers-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm perf-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-229.14.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm kernel-doc-3.10.0-229.14.1.el7.noarch.rpm ppc64: kernel-3.10.0-229.14.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-229.14.1.el7.ppc64.rpm kernel-debug-3.10.0-229.14.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-229.14.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.14.1.el7.ppc64.rpm kernel-devel-3.10.0-229.14.1.el7.ppc64.rpm kernel-headers-3.10.0-229.14.1.el7.ppc64.rpm kernel-tools-3.10.0-229.14.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-229.14.1.el7.ppc64.rpm perf-3.10.0-229.14.1.el7.ppc64.rpm perf-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm s390x: kernel-3.10.0-229.14.1.el7.s390x.rpm kernel-debug-3.10.0-229.14.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-229.14.1.el7.s390x.rpm kernel-debug-devel-3.10.0-229.14.1.el7.s390x.rpm kernel-debuginfo-3.10.0-229.14.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.14.1.el7.s390x.rpm kernel-devel-3.10.0-229.14.1.el7.s390x.rpm kernel-headers-3.10.0-229.14.1.el7.s390x.rpm kernel-kdump-3.10.0-229.14.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.14.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-229.14.1.el7.s390x.rpm perf-3.10.0-229.14.1.el7.s390x.rpm perf-debuginfo-3.10.0-229.14.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.s390x.rpm x86_64: kernel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-headers-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm perf-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-229.14.1.ael7b.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.14.1.ael7b.noarch.rpm kernel-doc-3.10.0-229.14.1.ael7b.noarch.rpm ppc64le: kernel-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-bootwrapper-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debug-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debug-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-devel-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-headers-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-tools-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-tools-libs-3.10.0-229.14.1.ael7b.ppc64le.rpm perf-3.10.0-229.14.1.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.14.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-229.14.1.el7.ppc64.rpm perf-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm python-perf-3.10.0-229.14.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.ppc64.rpm s390x: kernel-debug-debuginfo-3.10.0-229.14.1.el7.s390x.rpm kernel-debuginfo-3.10.0-229.14.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.14.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.14.1.el7.s390x.rpm perf-debuginfo-3.10.0-229.14.1.el7.s390x.rpm python-perf-3.10.0-229.14.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.s390x.rpm x86_64: kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: kernel-debug-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debug-devel-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm kernel-tools-libs-devel-3.10.0-229.14.1.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm python-perf-3.10.0-229.14.1.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.14.1.ael7b.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-229.14.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm kernel-doc-3.10.0-229.14.1.el7.noarch.rpm x86_64: kernel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm kernel-headers-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm perf-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm python-perf-3.10.0-229.14.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.14.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9585 https://access.redhat.com/security/cve/CVE-2015-0275 https://access.redhat.com/security/cve/CVE-2015-1333 https://access.redhat.com/security/cve/CVE-2015-3212 https://access.redhat.com/security/cve/CVE-2015-4700 https://access.redhat.com/security/cve/CVE-2015-5364 https://access.redhat.com/security/cve/CVE-2015-5366 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1614563 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV+GBWXlSAg2UNWIIRAkQQAJ9Tn121mLPtVutXckDN9HNEWTqhLACgjesi o9JJ1HRjn/H7bTuQw8bxhr4= =gOwz -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 15 18:22:22 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Sep 2015 18:22:22 +0000 Subject: [RHSA-2015:1787-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <201509151822.t8FIMMKh011580@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2015:1787-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1787.html Issue date: 2015-09-15 CVE Names: CVE-2014-9585 CVE-2015-0275 CVE-2015-1333 CVE-2015-3212 CVE-2015-5364 CVE-2015-5366 ===================================================================== 1. Summary: Updated kernel-rt packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. * Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) * A flaw was found in the way the Linux kernel's ext4 file system handled the "page size > block size" condition when the fallocate zero range functionality was used. A local attacker could use this flaw to crash the system. (CVE-2015-0275, Moderate) * It was found that the Linux kernel's keyring implementation would leak memory when adding a key to a keyring via the add_key() function. A local attacker could use this flaw to exhaust all available memory on the system. (CVE-2015-1333, Moderate) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket. (CVE-2015-3212, Moderate) * An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) Red Hat would like to thank Canonical for reporting the CVE-2015-1333 issue. The CVE-2015-0275 issue was discovered by Xiong Zhou of Red Hat, and the CVE-2015-3212 issue was discovered by Ji Jianwen of Red Hat Engineering. This update provides a build of the kernel-rt package for Red Hat Enterprise MRG 2.5 that is layered on Red Hat Enterprise Linux 6, and fixes the following issues: * Fix regression in scsi_send_eh_cmnd() * boot hangs at "Console: switching to colour dummy device 80x25" * Update tcp stack to 3.17 kernel * ksoftirqd high CPU usage due to stray tasklet from ioatdma driver (BZ#1245345) This update also fixes the following bugs: * The configuration option CONFIG_RTC_HCTOSYS was disabled on the realtime kernel causing the RTC clock to be adjusted with the UTC time even if the system is configured to set the RTC to the local time. By enabling the CONFIG_RTC_HCTOSYS configuration option, when the system is configured to use local time, RTC will correctly update with the local time and not try to use another timezone. (BZ#1248047) * In the realtime kernel, if a rt_mutex was taken while in interrupt context the normal priority inheritance protocol would falsely identify a deadlock and trigger a kernel crash. The patch that added the rt_mutex in this interrupt context was reverted. (BZ#1250649) All kernel-rt users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1181054 - CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library 1193907 - CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG() 1226442 - CVE-2015-3212 kernel: SCTP race condition allows list corruption and panic from userlevel 1239029 - CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation 1245345 - RFE: update the MRG 2.5 3.10 kernel-rt sources 1245658 - CVE-2015-1333 kernel: denial of service due to memory leak in add_key() 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-229.rt56.161.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-229.rt56.161.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-229.rt56.161.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-229.rt56.161.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-229.rt56.161.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9585 https://access.redhat.com/security/cve/CVE-2015-0275 https://access.redhat.com/security/cve/CVE-2015-1333 https://access.redhat.com/security/cve/CVE-2015-3212 https://access.redhat.com/security/cve/CVE-2015-5364 https://access.redhat.com/security/cve/CVE-2015-5366 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV+GGbXlSAg2UNWIIRAljkAKCLaKXmKZrSaYstcw53dahQgQcedACeNPpv FPw+nLBtsHTmkO28JBMAgHA= =OB8Q -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 15 18:30:18 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Sep 2015 18:30:18 +0000 Subject: [RHSA-2015:1793-01] Moderate: qemu-kvm security fix update Message-ID: <201509151830.t8FIUJ46023221@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm security fix update Advisory ID: RHSA-2015:1793-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1793.html Issue date: 2015-09-15 CVE Names: CVE-2015-5165 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory. (CVE-2015-5165) Red Hat would like to thank the Xen project for reporting this issue. Upstream acknowledges Donghai Zhu of Alibaba as the original reporter. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: qemu-kvm-1.5.3-86.el7_1.6.src.rpm x86_64: libcacard-1.5.3-86.el7_1.6.i686.rpm libcacard-1.5.3-86.el7_1.6.x86_64.rpm qemu-img-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-common-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-tools-1.5.3-86.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libcacard-devel-1.5.3-86.el7_1.6.i686.rpm libcacard-devel-1.5.3-86.el7_1.6.x86_64.rpm libcacard-tools-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: qemu-kvm-1.5.3-86.el7_1.6.src.rpm x86_64: libcacard-1.5.3-86.el7_1.6.i686.rpm libcacard-1.5.3-86.el7_1.6.x86_64.rpm libcacard-devel-1.5.3-86.el7_1.6.i686.rpm libcacard-devel-1.5.3-86.el7_1.6.x86_64.rpm libcacard-tools-1.5.3-86.el7_1.6.x86_64.rpm qemu-img-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-common-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-tools-1.5.3-86.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: qemu-kvm-1.5.3-86.el7_1.6.src.rpm ppc64: qemu-img-1.5.3-86.el7_1.6.ppc64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.ppc64.rpm x86_64: libcacard-1.5.3-86.el7_1.6.i686.rpm libcacard-1.5.3-86.el7_1.6.x86_64.rpm qemu-img-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-common-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-tools-1.5.3-86.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libcacard-1.5.3-86.el7_1.6.ppc.rpm libcacard-1.5.3-86.el7_1.6.ppc64.rpm libcacard-devel-1.5.3-86.el7_1.6.ppc.rpm libcacard-devel-1.5.3-86.el7_1.6.ppc64.rpm libcacard-tools-1.5.3-86.el7_1.6.ppc64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.ppc.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.ppc64.rpm x86_64: libcacard-devel-1.5.3-86.el7_1.6.i686.rpm libcacard-devel-1.5.3-86.el7_1.6.x86_64.rpm libcacard-tools-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: qemu-kvm-1.5.3-86.el7_1.6.src.rpm x86_64: libcacard-1.5.3-86.el7_1.6.i686.rpm libcacard-1.5.3-86.el7_1.6.x86_64.rpm qemu-img-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-common-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-tools-1.5.3-86.el7_1.6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libcacard-devel-1.5.3-86.el7_1.6.i686.rpm libcacard-devel-1.5.3-86.el7_1.6.x86_64.rpm libcacard-tools-1.5.3-86.el7_1.6.x86_64.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.i686.rpm qemu-kvm-debuginfo-1.5.3-86.el7_1.6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5165 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV+GOpXlSAg2UNWIIRAgGDAJoDJQ694tQKB8srO+zjh5g7xTuhGACgvqsO WwtsBny+M8stB+SkJnQt0gY= =WNQA -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 15 19:07:52 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 15 Sep 2015 19:07:52 +0000 Subject: [RHSA-2015:1788-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <201509151907.t8FJ7rBH015943@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2015:1788-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1788.html Issue date: 2015-08-12 Updated on: 2015-09-15 CVE Names: CVE-2014-9585 CVE-2015-0275 CVE-2015-1333 CVE-2015-3212 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 ===================================================================== 1. Summary: Updated kernel-rt packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the kernel's implementation of the Berkeley Packet Filter (BPF). A local attacker could craft BPF code to crash the system by creating a situation in which the JIT compiler would fail to correctly optimize the JIT image on the last pass. This would lead to the CPU executing instructions that were not part of the JIT code. (CVE-2015-4700, Important) * Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) * A flaw was found in the way the Linux kernel's ext4 file system handled the "page size > block size" condition when the fallocate zero range functionality was used. A local attacker could use this flaw to crash the system. (CVE-2015-0275, Moderate) * It was found that the Linux kernel's keyring implementation would leak memory when adding a key to a keyring via the add_key() function. A local attacker could use this flaw to exhaust all available memory on the system. (CVE-2015-1333, Moderate) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket. (CVE-2015-3212, Moderate) * An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) Red Hat would like to thank Daniel Borkmann for reporting CVE-2015-4700, and Canonical for reporting the CVE-2015-1333 issue. The CVE-2015-0275 issue was discovered by Xiong Zhou of Red Hat, and the CVE-2015-3212 issue was discovered by Ji Jianwen of Red Hat Engineering. The kernel-rt packages have been upgraded to version 3.10.0-229.13.1, which provides a number of bug fixes and enhancements over the previous version, including: * Fix regression in scsi_send_eh_cmnd() * boot hangs at "Console: switching to colour dummy device 80x25" * Update tcp stack to 3.17 kernel * Missing some code from patch "(...) Fix VGA switcheroo problem related to hotplug" * ksoftirqd high CPU usage due to stray tasklet from ioatdma driver * During Live Partition Mobility (LPM) testing, RHEL 7.1 LPARs will crash in kmem_cache_alloc (BZ#1253809) This update also fixes the following bug: * The hwlat_detector.ko module samples the clock and records any intervals between reads that exceed a specified threshold. However, the module previously tracked the maximum interval seen for the "inner" interval but did not record when the "outer" interval was greater. A patch has been applied to fix this bug, and hwlat_detector.ko now correctly records if the outer interval is the maximal interval encountered during the run. (BZ#1252365) All kernel-rt users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1181054 - CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library 1193907 - CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG() 1226442 - CVE-2015-3212 kernel: SCTP race condition allows list corruption and panic from userlevel 1233615 - CVE-2015-4700 kernel: Crafted BPF filters may crash kernel during JIT optimisation 1239029 - CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation 1245658 - CVE-2015-1333 kernel: denial of service due to memory leak in add_key() 1253809 - kernel-rt: update to the RHEL7.1.z batch 5 source tree 6. Package List: Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-229.14.1.rt56.141.13.el7_1.src.rpm noarch: kernel-rt-doc-3.10.0-229.14.1.rt56.141.13.el7_1.noarch.rpm x86_64: kernel-rt-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-debug-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-debug-devel-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-debuginfo-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-devel-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-trace-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm kernel-rt-trace-devel-3.10.0-229.14.1.rt56.141.13.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9585 https://access.redhat.com/security/cve/CVE-2015-0275 https://access.redhat.com/security/cve/CVE-2015-1333 https://access.redhat.com/security/cve/CVE-2015-3212 https://access.redhat.com/security/cve/CVE-2015-4700 https://access.redhat.com/security/cve/CVE-2015-5364 https://access.redhat.com/security/cve/CVE-2015-5366 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV+Gx1XlSAg2UNWIIRAr1xAJ91YowjpWY/uyknjksZDa7QiLOFtwCgviJJ laVTecQYSGE/TAsvZYhuhww= =fahp -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 16 19:07:39 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 16 Sep 2015 19:07:39 +0000 Subject: [RHSA-2015:1808-01] Important: rubygem-openshift-origin-console security update Message-ID: <201509161907.t8GJ7efM025664@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: rubygem-openshift-origin-console security update Advisory ID: RHSA-2015:1808-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1808.html Issue date: 2015-09-16 CVE Names: CVE-2015-5274 ===================================================================== 1. Summary: Updated rubygem-openshift-origin-console packages that fix one security issue are now available for Red Hat OpenShift Enterprise 2.2. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the references section. 2. Relevant releases/architectures: RHOSE Infrastructure 2.2 - noarch 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. A command injection flaw was found in the rubygem-openshift-origin- console. A remote, authenticated user permitted to send requests to the Broker could execute arbitrary commands with elevated privileges on the Red Hat OpenShift server. (CVE-2015-5274) All rubygem-openshift-origin-console users are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Package List: RHOSE Infrastructure 2.2: Source: rubygem-openshift-origin-console-1.34.1.3-1.el6op.src.rpm noarch: rubygem-openshift-origin-console-1.34.1.3-1.el6op.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 6. References: https://access.redhat.com/security/cve/CVE-2015-5274 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/articles/11258 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV+b3fXlSAg2UNWIIRAteSAJ9ND0xOHtkR2KTDw4V2zl4huXJ2LgCgs6J4 yHOO8nglmjMgm3qsdbj0UB0= =YlnH -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 22 12:25:16 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Sep 2015 12:25:16 +0000 Subject: [RHSA-2015:1814-01] Critical: flash-plugin security update Message-ID: <201509221225.t8MCPGiu005376@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1814-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1814.html Issue date: 2015-09-22 CVE Names: CVE-2015-5567 CVE-2015-5568 CVE-2015-5570 CVE-2015-5571 CVE-2015-5572 CVE-2015-5573 CVE-2015-5574 CVE-2015-5575 CVE-2015-5576 CVE-2015-5577 CVE-2015-5578 CVE-2015-5579 CVE-2015-5580 CVE-2015-5581 CVE-2015-5582 CVE-2015-5584 CVE-2015-5587 CVE-2015-5588 CVE-2015-6676 CVE-2015-6677 CVE-2015-6678 CVE-2015-6679 CVE-2015-6682 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-23 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.521. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1264992 - flash-plugin: multiple code execution issues fixed in APSB15-23 1265121 - flash-plugin: information leaks and hardening bypass fixed in APSB15-23 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.521-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.521-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.521-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.521-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.521-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.521-1.el6_7.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.521-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.521-1.el6_7.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.521-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.521-1.el6_7.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5567 https://access.redhat.com/security/cve/CVE-2015-5568 https://access.redhat.com/security/cve/CVE-2015-5570 https://access.redhat.com/security/cve/CVE-2015-5571 https://access.redhat.com/security/cve/CVE-2015-5572 https://access.redhat.com/security/cve/CVE-2015-5573 https://access.redhat.com/security/cve/CVE-2015-5574 https://access.redhat.com/security/cve/CVE-2015-5575 https://access.redhat.com/security/cve/CVE-2015-5576 https://access.redhat.com/security/cve/CVE-2015-5577 https://access.redhat.com/security/cve/CVE-2015-5578 https://access.redhat.com/security/cve/CVE-2015-5579 https://access.redhat.com/security/cve/CVE-2015-5580 https://access.redhat.com/security/cve/CVE-2015-5581 https://access.redhat.com/security/cve/CVE-2015-5582 https://access.redhat.com/security/cve/CVE-2015-5584 https://access.redhat.com/security/cve/CVE-2015-5587 https://access.redhat.com/security/cve/CVE-2015-5588 https://access.redhat.com/security/cve/CVE-2015-6676 https://access.redhat.com/security/cve/CVE-2015-6677 https://access.redhat.com/security/cve/CVE-2015-6678 https://access.redhat.com/security/cve/CVE-2015-6679 https://access.redhat.com/security/cve/CVE-2015-6682 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-23.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWAUhqXlSAg2UNWIIRAtwLAJ9AIILXDTBc54JCyPGAJZPwlvTTbgCfRwgv VC/tCEoNGrkMNfvhCrQ4wBs= =9aOW -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 22 18:18:24 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Sep 2015 14:18:24 -0400 Subject: [RHSA-2015:1833-01] Moderate: qemu-kvm security update Message-ID: <201509221818.t8MIIOkS029620@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm security update Advisory ID: RHSA-2015:1833-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1833.html Issue date: 2015-09-22 CVE Names: CVE-2015-5165 ===================================================================== 1. Summary: Updated qemu-kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory. (CVE-2015-5165) Red Hat would like to thank the Xen project for reporting this issue. Upstream acknowledges Donghai Zhu of Alibaba as the original reporter. All qemu-kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm i386: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm i386: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.i686.rpm ppc64: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.ppc64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.ppc64.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm i386: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.1.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5165 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWAZtuXlSAg2UNWIIRAo9kAJ0a71guij6GAor1UlA1gkZE9wyrVACeNueh NWLvE7Y1/h8ytzaeuKpbVh0= =awcM -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 22 18:18:46 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 22 Sep 2015 14:18:46 -0400 Subject: [RHSA-2015:1834-01] Critical: firefox security update Message-ID: <201509221818.t8MIIkfv029798@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2015:1834-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1834.html Issue date: 2015-09-22 CVE Names: CVE-2015-4500 CVE-2015-4509 CVE-2015-4510 ===================================================================== 1. Summary: Updated firefox packages that fix three security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4510) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack, and Looben Yang as the original reporters of these issues. All Firefox users should upgrade to these updated packages, which contain Firefox version 38.3.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1265186 - CVE-2015-4500 Mozilla: Miscellaneous memory safety hazards (MFSA 2015-96) 1265190 - CVE-2015-4510 Mozilla: Use-after-free with shared workers and IndexedDB (MFSA 2015-104) 1265192 - CVE-2015-4509 Mozilla: Use-after-free while manipulating HTML media content (MFSA 2015-106) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-38.3.0-2.el5_11.src.rpm i386: firefox-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm x86_64: firefox-38.3.0-2.el5_11.i386.rpm firefox-38.3.0-2.el5_11.x86_64.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-38.3.0-2.el5_11.src.rpm i386: firefox-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm ppc: firefox-38.3.0-2.el5_11.ppc64.rpm firefox-debuginfo-38.3.0-2.el5_11.ppc64.rpm s390x: firefox-38.3.0-2.el5_11.s390.rpm firefox-38.3.0-2.el5_11.s390x.rpm firefox-debuginfo-38.3.0-2.el5_11.s390.rpm firefox-debuginfo-38.3.0-2.el5_11.s390x.rpm x86_64: firefox-38.3.0-2.el5_11.i386.rpm firefox-38.3.0-2.el5_11.x86_64.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm i386: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm x86_64: firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm i386: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm ppc64: firefox-38.3.0-2.el6_7.ppc64.rpm firefox-debuginfo-38.3.0-2.el6_7.ppc64.rpm s390x: firefox-38.3.0-2.el6_7.s390x.rpm firefox-debuginfo-38.3.0-2.el6_7.s390x.rpm x86_64: firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-38.3.0-2.el6_7.ppc.rpm firefox-debuginfo-38.3.0-2.el6_7.ppc.rpm s390x: firefox-38.3.0-2.el6_7.s390.rpm firefox-debuginfo-38.3.0-2.el6_7.s390.rpm x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm i386: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm x86_64: firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm Red Hat Enterprise Linux Client (v. 7): Source: firefox-38.3.0-2.el7_1.src.rpm x86_64: firefox-38.3.0-2.el7_1.x86_64.rpm firefox-debuginfo-38.3.0-2.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-38.3.0-2.el7_1.i686.rpm firefox-debuginfo-38.3.0-2.el7_1.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-38.3.0-2.el7_1.src.rpm ppc64: firefox-38.3.0-2.el7_1.ppc64.rpm firefox-debuginfo-38.3.0-2.el7_1.ppc64.rpm s390x: firefox-38.3.0-2.el7_1.s390x.rpm firefox-debuginfo-38.3.0-2.el7_1.s390x.rpm x86_64: firefox-38.3.0-2.el7_1.x86_64.rpm firefox-debuginfo-38.3.0-2.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-38.3.0-2.ael7b_1.src.rpm ppc64le: firefox-38.3.0-2.ael7b_1.ppc64le.rpm firefox-debuginfo-38.3.0-2.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-38.3.0-2.el7_1.ppc.rpm firefox-debuginfo-38.3.0-2.el7_1.ppc.rpm s390x: firefox-38.3.0-2.el7_1.s390.rpm firefox-debuginfo-38.3.0-2.el7_1.s390.rpm x86_64: firefox-38.3.0-2.el7_1.i686.rpm firefox-debuginfo-38.3.0-2.el7_1.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-38.3.0-2.el7_1.src.rpm x86_64: firefox-38.3.0-2.el7_1.x86_64.rpm firefox-debuginfo-38.3.0-2.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-38.3.0-2.el7_1.i686.rpm firefox-debuginfo-38.3.0-2.el7_1.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4500 https://access.redhat.com/security/cve/CVE-2015-4509 https://access.redhat.com/security/cve/CVE-2015-4510 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr38.3 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWAZuEXlSAg2UNWIIRAuT8AJ4pIl853JYP2huW6B4wJiB01kWsbwCffec3 Oot4c0Q9u8Xncf0i1yc6WYs= =Olpc -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 24 20:39:22 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 24 Sep 2015 20:39:22 +0000 Subject: [RHSA-2015:1834-02] Critical: firefox security update Message-ID: <201509242039.t8OKdMOE009158@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2015:1834-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1834.html Issue date: 2015-09-22 Updated on: 2015-09-24 CVE Names: CVE-2015-4500 CVE-2015-4506 CVE-2015-4509 CVE-2015-4511 CVE-2015-4517 CVE-2015-4519 CVE-2015-4520 CVE-2015-4521 CVE-2015-4522 CVE-2015-7174 CVE-2015-7175 CVE-2015-7176 CVE-2015-7177 CVE-2015-7180 ===================================================================== 1. Summary: Updated firefox packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. [Updated 25 August 2014] This erratum previously included an incorrect list of fixed issues. The issue list has been updated to reflect the CVEs that were fixed in this update. The firefox packages provided by this advisory have not been modified in any way. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4500, CVE-2015-4506, CVE-2015-4509, CVE-2015-4511, CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180) Two information leak flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to disclose sensitive information or, in certain cases, crash. (CVE-2015-4519, CVE-2015-4520) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack, Khalil Zhani, Atte Kettunen, Ronald Crane, Mario Gomes, and Ehsan Akhgari as the original reporters of these issues. All Firefox users should upgrade to these updated packages, which contain Firefox version 38.3.0 ESR, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1265186 - CVE-2015-4500 Mozilla: Miscellaneous memory safety hazards (MFSA 2015-96) 1265192 - CVE-2015-4509 Mozilla: Use-after-free while manipulating HTML media content (MFSA 2015-106) 1265617 - CVE-2015-4506 Mozilla: Buffer overflow in libvpx while parsing vp9 format video (MFSA 2015-101) 1265630 - CVE-2015-4511 Mozilla: Buffer overflow while decoding WebM video (MFSA 2015-105) 1265778 - CVE-2015-4519 Mozilla: Dragging and dropping images exposes final URL after redirects (MFSA 2015-110) 1265781 - CVE-2015-4520 Mozilla: Errors in the handling of CORS preflight request headers (MFSA 2015-111) 1265784 - CVE-2015-4517 CVE-2015-4521 CVE-2015-4522 CVE-2015-7174 CVE-2015-7175 CVE-2015-7176 CVE-2015-7177 CVE-2015-7180 Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-38.3.0-2.el5_11.src.rpm i386: firefox-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm x86_64: firefox-38.3.0-2.el5_11.i386.rpm firefox-38.3.0-2.el5_11.x86_64.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-38.3.0-2.el5_11.src.rpm i386: firefox-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm ppc: firefox-38.3.0-2.el5_11.ppc64.rpm firefox-debuginfo-38.3.0-2.el5_11.ppc64.rpm s390x: firefox-38.3.0-2.el5_11.s390.rpm firefox-38.3.0-2.el5_11.s390x.rpm firefox-debuginfo-38.3.0-2.el5_11.s390.rpm firefox-debuginfo-38.3.0-2.el5_11.s390x.rpm x86_64: firefox-38.3.0-2.el5_11.i386.rpm firefox-38.3.0-2.el5_11.x86_64.rpm firefox-debuginfo-38.3.0-2.el5_11.i386.rpm firefox-debuginfo-38.3.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm i386: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm x86_64: firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm i386: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm ppc64: firefox-38.3.0-2.el6_7.ppc64.rpm firefox-debuginfo-38.3.0-2.el6_7.ppc64.rpm s390x: firefox-38.3.0-2.el6_7.s390x.rpm firefox-debuginfo-38.3.0-2.el6_7.s390x.rpm x86_64: firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-38.3.0-2.el6_7.ppc.rpm firefox-debuginfo-38.3.0-2.el6_7.ppc.rpm s390x: firefox-38.3.0-2.el6_7.s390.rpm firefox-debuginfo-38.3.0-2.el6_7.s390.rpm x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-38.3.0-2.el6_7.src.rpm i386: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm x86_64: firefox-38.3.0-2.el6_7.x86_64.rpm firefox-debuginfo-38.3.0-2.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-38.3.0-2.el6_7.i686.rpm firefox-debuginfo-38.3.0-2.el6_7.i686.rpm Red Hat Enterprise Linux Client (v. 7): Source: firefox-38.3.0-2.el7_1.src.rpm x86_64: firefox-38.3.0-2.el7_1.x86_64.rpm firefox-debuginfo-38.3.0-2.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-38.3.0-2.el7_1.i686.rpm firefox-debuginfo-38.3.0-2.el7_1.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-38.3.0-2.el7_1.src.rpm ppc64: firefox-38.3.0-2.el7_1.ppc64.rpm firefox-debuginfo-38.3.0-2.el7_1.ppc64.rpm s390x: firefox-38.3.0-2.el7_1.s390x.rpm firefox-debuginfo-38.3.0-2.el7_1.s390x.rpm x86_64: firefox-38.3.0-2.el7_1.x86_64.rpm firefox-debuginfo-38.3.0-2.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-38.3.0-2.ael7b_1.src.rpm ppc64le: firefox-38.3.0-2.ael7b_1.ppc64le.rpm firefox-debuginfo-38.3.0-2.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-38.3.0-2.el7_1.ppc.rpm firefox-debuginfo-38.3.0-2.el7_1.ppc.rpm s390x: firefox-38.3.0-2.el7_1.s390.rpm firefox-debuginfo-38.3.0-2.el7_1.s390.rpm x86_64: firefox-38.3.0-2.el7_1.i686.rpm firefox-debuginfo-38.3.0-2.el7_1.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-38.3.0-2.el7_1.src.rpm x86_64: firefox-38.3.0-2.el7_1.x86_64.rpm firefox-debuginfo-38.3.0-2.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-38.3.0-2.el7_1.i686.rpm firefox-debuginfo-38.3.0-2.el7_1.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4500 https://access.redhat.com/security/cve/CVE-2015-4506 https://access.redhat.com/security/cve/CVE-2015-4509 https://access.redhat.com/security/cve/CVE-2015-4511 https://access.redhat.com/security/cve/CVE-2015-4517 https://access.redhat.com/security/cve/CVE-2015-4519 https://access.redhat.com/security/cve/CVE-2015-4520 https://access.redhat.com/security/cve/CVE-2015-4521 https://access.redhat.com/security/cve/CVE-2015-4522 https://access.redhat.com/security/cve/CVE-2015-7174 https://access.redhat.com/security/cve/CVE-2015-7175 https://access.redhat.com/security/cve/CVE-2015-7176 https://access.redhat.com/security/cve/CVE-2015-7177 https://access.redhat.com/security/cve/CVE-2015-7180 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr38.3 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWBF9ZXlSAg2UNWIIRAjNAAJ4lQrzW6u8I1FTi2UF4bA2QYtXEtgCffRUP 5YftyFXKgAS3DmBBDeDW4+E= =I+pa -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 29 10:39:11 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 29 Sep 2015 10:39:11 +0000 Subject: [RHSA-2015:1840-01] Important: openldap security update Message-ID: <201509291025.t8TAPNNA001887@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openldap security update Advisory ID: RHSA-2015:1840-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1840.html Issue date: 2015-09-29 CVE Names: CVE-2015-6908 ===================================================================== 1. Summary: Updated openldap packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap package contains configuration files, libraries, and documentation for OpenLDAP. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908) All openldap users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1262393 - CVE-2015-6908 openldap: ber_get_next denial of service vulnerability 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: openldap-2.3.43-29.el5_11.src.rpm i386: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-clients-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm x86_64: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.x86_64.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.x86_64.rpm openldap-clients-2.3.43-29.el5_11.x86_64.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: openldap-2.3.43-29.el5_11.src.rpm i386: openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-servers-2.3.43-29.el5_11.i386.rpm openldap-servers-overlays-2.3.43-29.el5_11.i386.rpm openldap-servers-sql-2.3.43-29.el5_11.i386.rpm x86_64: openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.x86_64.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.x86_64.rpm openldap-servers-2.3.43-29.el5_11.x86_64.rpm openldap-servers-overlays-2.3.43-29.el5_11.x86_64.rpm openldap-servers-sql-2.3.43-29.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: openldap-2.3.43-29.el5_11.src.rpm i386: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-clients-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-servers-2.3.43-29.el5_11.i386.rpm openldap-servers-overlays-2.3.43-29.el5_11.i386.rpm openldap-servers-sql-2.3.43-29.el5_11.i386.rpm ia64: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.ia64.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.ia64.rpm openldap-clients-2.3.43-29.el5_11.ia64.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.ia64.rpm openldap-devel-2.3.43-29.el5_11.ia64.rpm openldap-servers-2.3.43-29.el5_11.ia64.rpm openldap-servers-overlays-2.3.43-29.el5_11.ia64.rpm openldap-servers-sql-2.3.43-29.el5_11.ia64.rpm ppc: compat-openldap-2.3.43_2.2.29-29.el5_11.ppc.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.ppc64.rpm openldap-2.3.43-29.el5_11.ppc.rpm openldap-2.3.43-29.el5_11.ppc64.rpm openldap-clients-2.3.43-29.el5_11.ppc.rpm openldap-debuginfo-2.3.43-29.el5_11.ppc.rpm openldap-debuginfo-2.3.43-29.el5_11.ppc64.rpm openldap-devel-2.3.43-29.el5_11.ppc.rpm openldap-devel-2.3.43-29.el5_11.ppc64.rpm openldap-servers-2.3.43-29.el5_11.ppc.rpm openldap-servers-overlays-2.3.43-29.el5_11.ppc.rpm openldap-servers-sql-2.3.43-29.el5_11.ppc.rpm s390x: compat-openldap-2.3.43_2.2.29-29.el5_11.s390.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.s390x.rpm openldap-2.3.43-29.el5_11.s390.rpm openldap-2.3.43-29.el5_11.s390x.rpm openldap-clients-2.3.43-29.el5_11.s390x.rpm openldap-debuginfo-2.3.43-29.el5_11.s390.rpm openldap-debuginfo-2.3.43-29.el5_11.s390x.rpm openldap-devel-2.3.43-29.el5_11.s390.rpm openldap-devel-2.3.43-29.el5_11.s390x.rpm openldap-servers-2.3.43-29.el5_11.s390x.rpm openldap-servers-overlays-2.3.43-29.el5_11.s390x.rpm openldap-servers-sql-2.3.43-29.el5_11.s390x.rpm x86_64: compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm compat-openldap-2.3.43_2.2.29-29.el5_11.x86_64.rpm openldap-2.3.43-29.el5_11.i386.rpm openldap-2.3.43-29.el5_11.x86_64.rpm openldap-clients-2.3.43-29.el5_11.x86_64.rpm openldap-debuginfo-2.3.43-29.el5_11.i386.rpm openldap-debuginfo-2.3.43-29.el5_11.x86_64.rpm openldap-devel-2.3.43-29.el5_11.i386.rpm openldap-devel-2.3.43-29.el5_11.x86_64.rpm openldap-servers-2.3.43-29.el5_11.x86_64.rpm openldap-servers-overlays-2.3.43-29.el5_11.x86_64.rpm openldap-servers-sql-2.3.43-29.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm i386: openldap-2.4.40-6.el6_7.i686.rpm openldap-clients-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-servers-2.4.40-6.el6_7.i686.rpm openldap-servers-sql-2.4.40-6.el6_7.i686.rpm x86_64: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm i386: openldap-2.4.40-6.el6_7.i686.rpm openldap-clients-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-servers-2.4.40-6.el6_7.i686.rpm ppc64: openldap-2.4.40-6.el6_7.ppc.rpm openldap-2.4.40-6.el6_7.ppc64.rpm openldap-clients-2.4.40-6.el6_7.ppc64.rpm openldap-debuginfo-2.4.40-6.el6_7.ppc.rpm openldap-debuginfo-2.4.40-6.el6_7.ppc64.rpm openldap-devel-2.4.40-6.el6_7.ppc.rpm openldap-devel-2.4.40-6.el6_7.ppc64.rpm openldap-servers-2.4.40-6.el6_7.ppc64.rpm s390x: openldap-2.4.40-6.el6_7.s390.rpm openldap-2.4.40-6.el6_7.s390x.rpm openldap-clients-2.4.40-6.el6_7.s390x.rpm openldap-debuginfo-2.4.40-6.el6_7.s390.rpm openldap-debuginfo-2.4.40-6.el6_7.s390x.rpm openldap-devel-2.4.40-6.el6_7.s390.rpm openldap-devel-2.4.40-6.el6_7.s390x.rpm openldap-servers-2.4.40-6.el6_7.s390x.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-servers-sql-2.4.40-6.el6_7.i686.rpm ppc64: openldap-debuginfo-2.4.40-6.el6_7.ppc64.rpm openldap-servers-sql-2.4.40-6.el6_7.ppc64.rpm s390x: openldap-debuginfo-2.4.40-6.el6_7.s390x.rpm openldap-servers-sql-2.4.40-6.el6_7.s390x.rpm x86_64: openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openldap-2.4.40-6.el6_7.src.rpm i386: openldap-2.4.40-6.el6_7.i686.rpm openldap-clients-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-servers-2.4.40-6.el6_7.i686.rpm x86_64: openldap-2.4.40-6.el6_7.i686.rpm openldap-2.4.40-6.el6_7.x86_64.rpm openldap-clients-2.4.40-6.el6_7.x86_64.rpm openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-devel-2.4.40-6.el6_7.i686.rpm openldap-devel-2.4.40-6.el6_7.x86_64.rpm openldap-servers-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openldap-debuginfo-2.4.40-6.el6_7.i686.rpm openldap-servers-sql-2.4.40-6.el6_7.i686.rpm x86_64: openldap-debuginfo-2.4.40-6.el6_7.x86_64.rpm openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm ppc64: openldap-2.4.39-7.el7_1.ppc.rpm openldap-2.4.39-7.el7_1.ppc64.rpm openldap-clients-2.4.39-7.el7_1.ppc64.rpm openldap-debuginfo-2.4.39-7.el7_1.ppc.rpm openldap-debuginfo-2.4.39-7.el7_1.ppc64.rpm openldap-devel-2.4.39-7.el7_1.ppc.rpm openldap-devel-2.4.39-7.el7_1.ppc64.rpm openldap-servers-2.4.39-7.el7_1.ppc64.rpm s390x: openldap-2.4.39-7.el7_1.s390.rpm openldap-2.4.39-7.el7_1.s390x.rpm openldap-clients-2.4.39-7.el7_1.s390x.rpm openldap-debuginfo-2.4.39-7.el7_1.s390.rpm openldap-debuginfo-2.4.39-7.el7_1.s390x.rpm openldap-devel-2.4.39-7.el7_1.s390.rpm openldap-devel-2.4.39-7.el7_1.s390x.rpm openldap-servers-2.4.39-7.el7_1.s390x.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openldap-2.4.39-7.ael7b_1.src.rpm ppc64le: openldap-2.4.39-7.ael7b_1.ppc64le.rpm openldap-clients-2.4.39-7.ael7b_1.ppc64le.rpm openldap-debuginfo-2.4.39-7.ael7b_1.ppc64le.rpm openldap-devel-2.4.39-7.ael7b_1.ppc64le.rpm openldap-servers-2.4.39-7.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openldap-debuginfo-2.4.39-7.el7_1.ppc64.rpm openldap-servers-sql-2.4.39-7.el7_1.ppc64.rpm s390x: openldap-debuginfo-2.4.39-7.el7_1.s390x.rpm openldap-servers-sql-2.4.39-7.el7_1.s390x.rpm x86_64: openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: openldap-debuginfo-2.4.39-7.ael7b_1.ppc64le.rpm openldap-servers-sql-2.4.39-7.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openldap-2.4.39-7.el7_1.src.rpm x86_64: openldap-2.4.39-7.el7_1.i686.rpm openldap-2.4.39-7.el7_1.x86_64.rpm openldap-clients-2.4.39-7.el7_1.x86_64.rpm openldap-debuginfo-2.4.39-7.el7_1.i686.rpm openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-devel-2.4.39-7.el7_1.i686.rpm openldap-devel-2.4.39-7.el7_1.x86_64.rpm openldap-servers-2.4.39-7.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openldap-debuginfo-2.4.39-7.el7_1.x86_64.rpm openldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-6908 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWCmcKXlSAg2UNWIIRAgn9AKC6H/fZbUDj3e0AyA/xkOrOx+U+/QCeIpMZ iKKXpo+XKDlK4zZLlWedI64= =yvhg -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 29 10:40:56 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 29 Sep 2015 10:40:56 +0000 Subject: [RHSA-2015:1841-01] Important: chromium-browser security update Message-ID: <201509291027.t8TAR8G5029757@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2015:1841-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1841.html Issue date: 2015-09-29 CVE Names: CVE-2015-1303 CVE-2015-1304 ===================================================================== 1. Summary: Updated chromium-browser packages that fix two security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to bypass cross origin restrictions, and access or modify data from an unrelated web site. (CVE-2015-1303, CVE-2015-1304) All Chromium users should upgrade to these updated packages, which contain Chromium version 45.0.2454.101, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1266409 - CVE-2015-1303 chromium-browser: Cross-origin bypass in DOM 1266410 - CVE-2015-1304 chromium-browser: Cross-origin bypass in V8 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-45.0.2454.101-1.el6.i686.rpm chromium-browser-debuginfo-45.0.2454.101-1.el6.i686.rpm x86_64: chromium-browser-45.0.2454.101-1.el6.x86_64.rpm chromium-browser-debuginfo-45.0.2454.101-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-45.0.2454.101-1.el6.i686.rpm chromium-browser-debuginfo-45.0.2454.101-1.el6.i686.rpm x86_64: chromium-browser-45.0.2454.101-1.el6.x86_64.rpm chromium-browser-debuginfo-45.0.2454.101-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-45.0.2454.101-1.el6.i686.rpm chromium-browser-debuginfo-45.0.2454.101-1.el6.i686.rpm x86_64: chromium-browser-45.0.2454.101-1.el6.x86_64.rpm chromium-browser-debuginfo-45.0.2454.101-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1303 https://access.redhat.com/security/cve/CVE-2015-1304 https://access.redhat.com/security/updates/classification/#important http://googlechromereleases.blogspot.com/2015/09/stable-channel-update_24.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWCmd0XlSAg2UNWIIRAnraAJ9xjVYxPbXKe4gKiqujKrZC1WDMNwCfYQK5 Cymgk6qK++37SCRtFCdJmy8= =ub90 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 30 16:37:49 2015 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 30 Sep 2015 16:37:49 +0000 Subject: [RHSA-2015:1844-01] Important: Red Hat OpenShift Enterprise 2.2.7 security, bug fix and enhancement update Message-ID: <201509301637.t8UGbnLK023620@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Enterprise 2.2.7 security, bug fix and enhancement update Advisory ID: RHSA-2015:1844-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1844.html Issue date: 2015-09-30 CVE Names: CVE-2015-1806 CVE-2015-1807 CVE-2015-1808 CVE-2015-1809 CVE-2015-1810 CVE-2015-1811 CVE-2015-1812 CVE-2015-1813 CVE-2015-1814 ===================================================================== 1. Summary: Red Hat OpenShift Enterprise release 2.2.7 is now available with updates to packages that fix several bugs and introduce feature enhancements. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the references section. 2. Relevant releases/architectures: RHOSE Client 2.2 - noarch RHOSE Infrastructure 2.2 - noarch, x86_64 RHOSE JBoss EAP add-on 2.2 - noarch RHOSE Node 2.2 - noarch, x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Space precludes documenting all of the bug fixes in this advisory. See the OpenShift Enterprise Technical Notes, which will be updated shortly for release 2.2.7, for details about these changes. The following security issues are addressed in this release: A flaw was found in the Jenkins API token-issuing service. The service was not properly protected against anonymous users, potentially allowing remote attackers to escalate privileges. (CVE-2015-1814) It was found that the combination filter Groovy script could allow a remote attacker to potentially execute arbitrary code on a Jenkins master. (CVE-2015-1806) It was found that when building artifacts, the Jenkins server would follow symbolic links, potentially resulting in disclosure of information on the server. (CVE-2015-1807) A denial of service flaw was found in the way Jenkins handled certain update center data. An authenticated user could provide specially crafted update center data to Jenkins, causing plug-in and tool installation to not work properly. (CVE-2015-1808) It was found that Jenkins' XPath handling allowed XML External Entity (XXE) expansion. A remote attacker with read access could use this flaw to read arbitrary XML files on the Jenkins server. (CVE-2015-1809) It was discovered that the internal Jenkins user database did not restrict access to reserved names, allowing users to escalate privileges. (CVE-2015-1810) It was found that Jenkins' XML handling allowed XML External Entity (XXE) expansion. A remote attacker with the ability to pass XML data to Jenkins could use this flaw to read arbitrary XML files on the Jenkins server. (CVE-2015-1811) Two cross-site scripting (XSS) flaws were found in Jenkins. A remote attacker could use these flaws to conduct XSS attacks against users of an application using Jenkins. (CVE-2015-1812, CVE-2015-1813) https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-s ingle/Technical_Notes/index.html All OpenShift Enterprise 2 users are advised to upgrade to these updated packages. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. See the OpenShift Enterprise 2.2 Release Notes, which will be updated shortly for release 2.2.7, for important instructions on how to fully apply this asynchronous errata update: https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-s ingle/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258. 5. Bugs fixed (https://bugzilla.redhat.com/): 1062253 - JBoss Cartridge needs to have dependency on both JDK 1.6 and JDK 1.7 packages. 1128567 - Cron/Jenkins-client cartridge can't be shown on scalable app when using "rhc app show $app -g" command 1130028 - 'rhc app-show --gears' lists jbossas and jbosseap cartridges four times for scalable apps 1138522 - Values of MaxClients/ServerLimit in performance.conf is overidden by httpd_nolog.conf 1152524 - [RFE] Dns timeout setting for oo-accept-broker 1160699 - App didn't inherit HA when created from another HA app. 1171815 - Cannot create Jenkins cartridge 1191283 - Duplicate cartridges are seen when importing active cartridges 1197123 - Error reported while adding storage to gear should be informative to the user 1197576 - Upgrade Jenkins from jenkins-1.565.3-1 to jenkins-1.580.3-1 1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) 1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180) 1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125) 1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162) 1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163) 1205625 - CVE-2015-1809 jenkins: external entity injection via XPath (SECURITY-165) 1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) 1205632 - CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167) 1216206 - [RFE] --always-auth should be an allowed option for rhc setup 1217572 - [RFE] routing daemon should have a sync option for F5 1221931 - Move scale app to different profile district node should return 1 1225943 - oo-init-quota function get_filesystem_type pulls in commented lines in fstab if same mount point 1226061 - Lack of raising exception and error logging for the ssh and scp commands while copying keys and certs from broker to F5 LTM 1227501 - routing-daemon not removing var/tmp/*.key and var/tmp/*.crt 1228373 - Gears from a scaled application are not evenly distributed across nodes in the district or zone 1229300 - oo-admin-move across node profiles should update quota limits appropriately 1232827 - [RFE] Provide java 8 in OpenShift Enterprise 1232921 - No error reported when app-create environment variables cannot be parsed 1241750 - SLOW_HOST should be SLOW_HOSTS in openshift-origin-gear-placement.conf.pin-user-to-host-example 1257757 - Scaled application takes 4+mins to unidle 1264039 - logshifter does not parse config properly if there's no newline at the end 1264210 - nodejs control script should wait for http to be available 1264216 - "service openshift-gears start" should not be calling unidle 6. Package List: RHOSE Client 2.2: Source: rhc-1.37.1.2-1.el6op.src.rpm noarch: rhc-1.37.1.2-1.el6op.noarch.rpm RHOSE Infrastructure 2.2: Source: openshift-origin-broker-1.16.2.10-1.el6op.src.rpm openshift-origin-broker-util-1.36.2.2-1.el6op.src.rpm openshift-origin-logshifter-1.10.1.2-1.el6op.src.rpm rubygem-openshift-origin-console-1.35.2.1-1.el6op.src.rpm rubygem-openshift-origin-controller-1.37.3.1-1.el6op.src.rpm rubygem-openshift-origin-gear-placement-0.0.2.1-1.el6op.src.rpm rubygem-openshift-origin-msg-broker-mcollective-1.35.3.1-1.el6op.src.rpm rubygem-openshift-origin-routing-daemon-0.25.1.2-1.el6op.src.rpm noarch: openshift-origin-broker-1.16.2.10-1.el6op.noarch.rpm openshift-origin-broker-util-1.36.2.2-1.el6op.noarch.rpm rubygem-openshift-origin-console-1.35.2.1-1.el6op.noarch.rpm rubygem-openshift-origin-controller-1.37.3.1-1.el6op.noarch.rpm rubygem-openshift-origin-gear-placement-0.0.2.1-1.el6op.noarch.rpm rubygem-openshift-origin-msg-broker-mcollective-1.35.3.1-1.el6op.noarch.rpm rubygem-openshift-origin-routing-daemon-0.25.1.2-1.el6op.noarch.rpm x86_64: openshift-origin-logshifter-1.10.1.2-1.el6op.x86_64.rpm RHOSE JBoss EAP add-on 2.2: Source: openshift-origin-cartridge-jbosseap-2.26.3.1-1.el6op.src.rpm noarch: openshift-origin-cartridge-jbosseap-2.26.3.1-1.el6op.noarch.rpm RHOSE Node 2.2: Source: jenkins-1.609.1-1.el6op.src.rpm openshift-origin-cartridge-diy-1.26.1.1-1.el6op.src.rpm openshift-origin-cartridge-haproxy-1.30.1.1-1.el6op.src.rpm openshift-origin-cartridge-jbossews-1.34.3.1-1.el6op.src.rpm openshift-origin-cartridge-jenkins-1.28.2.1-1.el6op.src.rpm openshift-origin-cartridge-mock-1.22.1.1-1.el6op.src.rpm openshift-origin-cartridge-nodejs-1.33.1.1-1.el6op.src.rpm openshift-origin-cartridge-perl-1.30.1.1-1.el6op.src.rpm openshift-origin-cartridge-php-1.34.1.1-1.el6op.src.rpm openshift-origin-cartridge-python-1.33.3.1-1.el6op.src.rpm openshift-origin-cartridge-ruby-1.32.1.1-1.el6op.src.rpm openshift-origin-logshifter-1.10.1.2-1.el6op.src.rpm openshift-origin-node-util-1.37.2.1-1.el6op.src.rpm rubygem-openshift-origin-frontend-apache-vhost-0.12.4.2-1.el6op.src.rpm rubygem-openshift-origin-node-1.37.1.1-1.el6op.src.rpm noarch: jenkins-1.609.1-1.el6op.noarch.rpm openshift-origin-cartridge-diy-1.26.1.1-1.el6op.noarch.rpm openshift-origin-cartridge-haproxy-1.30.1.1-1.el6op.noarch.rpm openshift-origin-cartridge-jbossews-1.34.3.1-1.el6op.noarch.rpm openshift-origin-cartridge-jenkins-1.28.2.1-1.el6op.noarch.rpm openshift-origin-cartridge-mock-1.22.1.1-1.el6op.noarch.rpm openshift-origin-cartridge-nodejs-1.33.1.1-1.el6op.noarch.rpm openshift-origin-cartridge-perl-1.30.1.1-1.el6op.noarch.rpm openshift-origin-cartridge-php-1.34.1.1-1.el6op.noarch.rpm openshift-origin-cartridge-python-1.33.3.1-1.el6op.noarch.rpm openshift-origin-cartridge-ruby-1.32.1.1-1.el6op.noarch.rpm openshift-origin-node-util-1.37.2.1-1.el6op.noarch.rpm rubygem-openshift-origin-frontend-apache-vhost-0.12.4.2-1.el6op.noarch.rpm rubygem-openshift-origin-node-1.37.1.1-1.el6op.noarch.rpm x86_64: openshift-origin-logshifter-1.10.1.2-1.el6op.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1806 https://access.redhat.com/security/cve/CVE-2015-1807 https://access.redhat.com/security/cve/CVE-2015-1808 https://access.redhat.com/security/cve/CVE-2015-1809 https://access.redhat.com/security/cve/CVE-2015-1810 https://access.redhat.com/security/cve/CVE-2015-1811 https://access.redhat.com/security/cve/CVE-2015-1812 https://access.redhat.com/security/cve/CVE-2015-1813 https://access.redhat.com/security/cve/CVE-2015-1814 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWDA+7XlSAg2UNWIIRAourAJ9S+czEpyfUmPPnvaNOEnxGPf3EtACdEXKz 7UVciid34ARw+f3FFvzulro= =83Zt -----END PGP SIGNATURE-----