From bugzilla at redhat.com Wed Jun 1 10:52:45 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Jun 2016 10:52:45 +0000 Subject: [RHSA-2016:1190-01] Important: chromium-browser security update Message-ID: <201606011052.u51Aqk0u010980@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2016:1190-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2016:1190 Issue date: 2016-06-01 CVE Names: CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 51.0.2704.63. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675, CVE-2016-1676, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681, CVE-2016-1695, CVE-2016-1677, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684, CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689, CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1340005 - CVE-2016-1672 chromium-browser: cross-origin bypass in extension bindings 1340006 - CVE-2016-1673 chromium-browser: cross-origin bypass in blink 1340007 - CVE-2016-1674 chromium-browser: cross-origin bypass in extensions 1340008 - CVE-2016-1675 chromium-browser: cross-origin bypass in blink 1340009 - CVE-2016-1676 chromium-browser: cross-origin bypass in extension bindings 1340010 - CVE-2016-1677 chromium-browser: type confusion in v8 1340011 - CVE-2016-1678 chromium-browser: heap overflow in v8 1340012 - CVE-2016-1679 chromium-browser: heap use-after-free in v8 bindings 1340013 - CVE-2016-1680 chromium-browser: heap use-after-free in skia 1340014 - CVE-2016-1681 chromium-browser: heap overflow in pdfium 1340015 - CVE-2016-1682 chromium-browser: csp bypass for serviceworker 1340016 - CVE-2016-1683 chromium-browser: out-of-bounds access in libxslt 1340017 - CVE-2016-1684 chromium-browser: integer overflow in libxslt 1340018 - CVE-2016-1685 chromium-browser: out-of-bounds read in pdfium 1340019 - CVE-2016-1686 chromium-browser: out-of-bounds read in pdfium 1340021 - CVE-2016-1687 chromium-browser: information leak in extensions 1340022 - CVE-2016-1688 chromium-browser: out-of-bounds read in v8 1340023 - CVE-2016-1689 chromium-browser: heap buffer overflow in media 1340024 - CVE-2016-1690 chromium-browser: heap use-after-free in autofill 1340026 - CVE-2016-1691 chromium-browser: heap buffer-overflow in skia 1340027 - CVE-2016-1692 chromium-browser: limited cross-origin bypass in serviceworker 1340028 - CVE-2016-1693 chromium-browser: http download of software removal tool 1340029 - CVE-2016-1694 chromium-browser: hpkp pins removed on cache clearance 1340030 - CVE-2016-1695 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-51.0.2704.63-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.63-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-51.0.2704.63-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.63-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-51.0.2704.63-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.63-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.63-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1672 https://access.redhat.com/security/cve/CVE-2016-1673 https://access.redhat.com/security/cve/CVE-2016-1674 https://access.redhat.com/security/cve/CVE-2016-1675 https://access.redhat.com/security/cve/CVE-2016-1676 https://access.redhat.com/security/cve/CVE-2016-1677 https://access.redhat.com/security/cve/CVE-2016-1678 https://access.redhat.com/security/cve/CVE-2016-1679 https://access.redhat.com/security/cve/CVE-2016-1680 https://access.redhat.com/security/cve/CVE-2016-1681 https://access.redhat.com/security/cve/CVE-2016-1682 https://access.redhat.com/security/cve/CVE-2016-1683 https://access.redhat.com/security/cve/CVE-2016-1684 https://access.redhat.com/security/cve/CVE-2016-1685 https://access.redhat.com/security/cve/CVE-2016-1686 https://access.redhat.com/security/cve/CVE-2016-1687 https://access.redhat.com/security/cve/CVE-2016-1688 https://access.redhat.com/security/cve/CVE-2016-1689 https://access.redhat.com/security/cve/CVE-2016-1690 https://access.redhat.com/security/cve/CVE-2016-1691 https://access.redhat.com/security/cve/CVE-2016-1692 https://access.redhat.com/security/cve/CVE-2016-1693 https://access.redhat.com/security/cve/CVE-2016-1694 https://access.redhat.com/security/cve/CVE-2016-1695 https://access.redhat.com/security/updates/classification/#important https://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXTr55XlSAg2UNWIIRArchAKCbVKWgaYWF1/QmJX3HddKpdg0gXwCguYBu 3EcXdh7fpKsNLrlPwP6DAkY= =UZOj -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 2 18:53:41 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Jun 2016 18:53:41 +0000 Subject: [RHSA-2016:1201-01] Important: chromium-browser security update Message-ID: <201606021853.u52IrlF0012883@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2016:1201-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2016:1201 Issue date: 2016-06-02 CVE Names: CVE-2016-1696 CVE-2016-1697 CVE-2016-1698 CVE-2016-1699 CVE-2016-1700 CVE-2016-1701 CVE-2016-1702 CVE-2016-1703 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 51.0.2704.79. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1696, CVE-2016-1697, CVE-2016-1703, CVE-2016-1698, CVE-2016-1699, CVE-2016-1700, CVE-2016-1701, CVE-2016-1702) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1342001 - CVE-2016-1696 chromium-browser: cross-origin bypass in extension bindings 1342002 - CVE-2016-1697 chromium-browser: cross-origin bypass in blink 1342003 - CVE-2016-1698 chromium-browser: information leak in extension bindings 1342004 - CVE-2016-1699 chromium-browser: parameter sanitization failure in devtools 1342005 - CVE-2016-1700 chromium-browser: use-after-free in extensions 1342007 - CVE-2016-1701 chromium-browser: use-after-free in autofill 1342008 - CVE-2016-1702 chromium-browser: out-of-bounds read in skia 1342009 - CVE-2016-1703 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-51.0.2704.79-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.79-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-51.0.2704.79-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.79-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-51.0.2704.79-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.79-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.79-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.79-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1696 https://access.redhat.com/security/cve/CVE-2016-1697 https://access.redhat.com/security/cve/CVE-2016-1698 https://access.redhat.com/security/cve/CVE-2016-1699 https://access.redhat.com/security/cve/CVE-2016-1700 https://access.redhat.com/security/cve/CVE-2016-1701 https://access.redhat.com/security/cve/CVE-2016-1702 https://access.redhat.com/security/cve/CVE-2016-1703 https://access.redhat.com/security/updates/classification/#important http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXUICpXlSAg2UNWIIRAs1+AJ9Us24LC+Oop/AuL5JbTtWNW9e4dQCcC5/Y lbqCxyEQCwttZzdF4gEzJDA= =OPtc -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 6 15:56:27 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 6 Jun 2016 11:56:27 -0400 Subject: [RHSA-2016:1204-01] Important: spice-server security update Message-ID: <201606061556.u56FuRAR005976@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: spice-server security update Advisory ID: RHSA-2016:1204-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1204 Issue date: 2016-06-06 CVE Names: CVE-2016-0749 CVE-2016-2150 ===================================================================== 1. Summary: An update for spice-server is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat Enterprise Virtualization Hypervisors. Security Fix(es): * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 Applications acting as a SPICE server must be restarted for this update to take effect. Note that QEMU-KVM guests providing SPICE console access must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1300646 - CVE-2016-0749 spice: heap-based memory corruption within smartcard handling 1313496 - CVE-2016-2150 spice: Host memory access from guest with invalid primary surface parameters 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: spice-server-0.12.4-13.el6.1.src.rpm x86_64: spice-server-0.12.4-13.el6.1.x86_64.rpm spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm spice-server-devel-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: spice-server-0.12.4-13.el6.1.src.rpm x86_64: spice-server-0.12.4-13.el6.1.x86_64.rpm spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm spice-server-devel-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: spice-server-0.12.4-13.el6.1.src.rpm x86_64: spice-server-0.12.4-13.el6.1.x86_64.rpm spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm spice-server-devel-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: spice-server-0.12.4-13.el6.1.src.rpm x86_64: spice-server-0.12.4-13.el6.1.x86_64.rpm spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: spice-server-debuginfo-0.12.4-13.el6.1.x86_64.rpm spice-server-devel-0.12.4-13.el6.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-0749 https://access.redhat.com/security/cve/CVE-2016-2150 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXVZ0oXlSAg2UNWIIRAuRQAJ4mxOO5VUBXFRdEWyJqMKmiaXNp7gCgj2/8 4wv4qLrmOTsQ3qt52MZJFvU= =EHmH -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 6 15:56:49 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 6 Jun 2016 11:56:49 -0400 Subject: [RHSA-2016:1205-01] Important: spice security update Message-ID: <201606061556.u56Funp0006239@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: spice security update Advisory ID: RHSA-2016:1205-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1205 Issue date: 2016-06-06 CVE Names: CVE-2016-0749 CVE-2016-2150 ===================================================================== 1. Summary: An update for spice is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 Applications acting as a SPICE server must be restarted for this update to take effect. Note that QEMU-KVM guests providing SPICE console access must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1300646 - CVE-2016-0749 spice: heap-based memory corruption within smartcard handling 1313496 - CVE-2016-2150 spice: Host memory access from guest with invalid primary surface parameters 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: spice-0.12.4-15.el7_2.1.src.rpm x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-0.12.4-15.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: spice-0.12.4-15.el7_2.1.src.rpm x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-0.12.4-15.el7_2.1.x86_64.rpm spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: spice-0.12.4-15.el7_2.1.src.rpm x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-0.12.4-15.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: spice-0.12.4-15.el7_2.1.src.rpm x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-0.12.4-15.el7_2.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-0749 https://access.redhat.com/security/cve/CVE-2016-2150 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXVZ0+XlSAg2UNWIIRAqYnAKDBuRX8jKvQt6YZ7FUaFT3y0gJFGQCggCIA 5LWvnZ9fsT+4Wgmkpstcz8M= =zHA2 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 6 19:08:57 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 6 Jun 2016 19:08:57 +0000 Subject: [RHSA-2016:1206-01] Moderate: jenkins security update Message-ID: <201606061908.u56J8wQq024237@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: jenkins security update Advisory ID: RHSA-2016:1206-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2016:1206 Issue date: 2016-06-06 CVE Names: CVE-2016-3721 CVE-2016-3722 CVE-2016-3723 CVE-2016-3724 CVE-2016-3725 CVE-2016-3726 CVE-2016-3727 ===================================================================== 1. Summary: An updated Jenkins package and image that includes security fixes are now available for Red Hat OpenShift Enterprise 3.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise 3.1 - noarch, x86_64 Red Hat OpenShift Enterprise 3.2 - noarch, x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix(es): * The Jenkins continuous integration server has been updated to upstream version 1.651.2 LTS that addresses a large number of security issues, including open redirects, a potential denial of service, unsafe handling of user provided environment variables and several instances of sensitive information disclosure. (CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727) Refer to the changelog listed in the References section for a list of changes. This update includes the following image: openshift3/jenkins-1-rhel7:1.651.2-4 All OpenShift Enterprise 3.2 users are advised to upgrade to the updated package and image. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1333133 - better retry in accessing replication controllers from openshift jenkin-plugin 1335415 - CVE-2016-3721 jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170) 1335416 - CVE-2016-3722 jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243) 1335417 - CVE-2016-3723 jenkins: Information on installed plugins exposed via API (SECURITY-250) 1335418 - CVE-2016-3724 jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266) 1335420 - CVE-2016-3725 jenkins: Regular users can trigger download of update site metadata (SECURITY-273) 1335421 - CVE-2016-3726 jenkins: Open redirect to scheme-relative URLs (SECURITY-276) 1335422 - CVE-2016-3727 jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281) 6. Package List: Red Hat OpenShift Enterprise 3.1: Source: jenkins-1.651.2-1.el7.src.rpm jenkins-plugin-openshift-pipeline-1.0.12-1.el7.src.rpm noarch: jenkins-1.651.2-1.el7.noarch.rpm x86_64: jenkins-plugin-openshift-pipeline-1.0.12-1.el7.x86_64.rpm Red Hat OpenShift Enterprise 3.2: Source: jenkins-1.651.2-1.el7.src.rpm jenkins-plugin-openshift-pipeline-1.0.12-1.el7.src.rpm noarch: jenkins-1.651.2-1.el7.noarch.rpm x86_64: jenkins-plugin-openshift-pipeline-1.0.12-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3721 https://access.redhat.com/security/cve/CVE-2016-3722 https://access.redhat.com/security/cve/CVE-2016-3723 https://access.redhat.com/security/cve/CVE-2016-3724 https://access.redhat.com/security/cve/CVE-2016-3725 https://access.redhat.com/security/cve/CVE-2016-3726 https://access.redhat.com/security/cve/CVE-2016-3727 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXVcoxXlSAg2UNWIIRAjjDAJ9/afBTR6I1DBmhAQNsCh9ry7MtiwCghOu4 T2bcIlUp2dXyIGWIUVnA4Os= =gqNe -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 7 05:39:50 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 7 Jun 2016 05:39:50 +0000 Subject: [RHSA-2016:1207-01] Moderate: glibc security update Message-ID: <201606070539.u575dpBL002330@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: glibc security update Advisory ID: RHSA-2016:1207-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1207 Issue date: 2016-06-07 CVE Names: CVE-2013-7423 ===================================================================== 1. Summary: An update for glibc is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1187109 - CVE-2013-7423 glibc: getaddrinfo() writes DNS queries to random file descriptors under high load 1339960 - CVE-2013-7423 glibc: getaddrinfo() sends DNS queries to random file descriptors [rhel-6.5.z] 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: glibc-2.12-1.132.el6_5.8.src.rpm x86_64: glibc-2.12-1.132.el6_5.8.i686.rpm glibc-2.12-1.132.el6_5.8.x86_64.rpm glibc-common-2.12-1.132.el6_5.8.x86_64.rpm glibc-debuginfo-2.12-1.132.el6_5.8.i686.rpm glibc-debuginfo-2.12-1.132.el6_5.8.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6_5.8.i686.rpm glibc-debuginfo-common-2.12-1.132.el6_5.8.x86_64.rpm glibc-devel-2.12-1.132.el6_5.8.i686.rpm glibc-devel-2.12-1.132.el6_5.8.x86_64.rpm glibc-headers-2.12-1.132.el6_5.8.x86_64.rpm glibc-utils-2.12-1.132.el6_5.8.x86_64.rpm nscd-2.12-1.132.el6_5.8.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: glibc-2.12-1.132.el6_5.8.src.rpm x86_64: glibc-debuginfo-2.12-1.132.el6_5.8.i686.rpm glibc-debuginfo-2.12-1.132.el6_5.8.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6_5.8.i686.rpm glibc-debuginfo-common-2.12-1.132.el6_5.8.x86_64.rpm glibc-static-2.12-1.132.el6_5.8.i686.rpm glibc-static-2.12-1.132.el6_5.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2013-7423 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXVl4jXlSAg2UNWIIRAn0wAJ4kX3dQ/0sNx5wYlArGMUckAP5epgCfVc0N m5KIx5uk0DE9NTZs77BzZx8= =138u -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jun 8 17:06:49 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Jun 2016 13:06:49 -0400 Subject: [RHSA-2016:1217-01] Critical: firefox security update Message-ID: <201606081706.u58H6n0i013302@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2016:1217-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1217 Issue date: 2016-06-08 CVE Names: CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2828 CVE-2016-2831 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 45.2.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2818, CVE-2016-2819, CVE-2016-2821, CVE-2016-2822, CVE-2016-2828, CVE-2016-2831) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges sushi Anton Larsson, firehack, Jordi Chancel, Christian Holler, Sylvestre Ledru, Tyson Smith, jomo, Jesse Ruderman, Julian Seward, Timothy Nikkel, Karl Tomlinson, Olli Pettay, and Gary Kwong as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1342887 - CVE-2016-2818 Mozilla: Miscellaneous memory safety hazards (rv:45.2) (MFSA 2016-49) 1342891 - CVE-2016-2819 Mozilla: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) 1342892 - CVE-2016-2821 Mozilla: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) 1342893 - CVE-2016-2822 Mozilla: Addressbar spoofing though the SELECT element (MFSA 2016-52) 1342895 - CVE-2016-2828 Mozilla: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) 1342898 - CVE-2016-2831 Mozilla: Entering fullscreen and persistent pointerlock without user permission permission (MFSA 2016-59) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-45.2.0-1.el5_11.src.rpm i386: firefox-45.2.0-1.el5_11.i386.rpm firefox-debuginfo-45.2.0-1.el5_11.i386.rpm x86_64: firefox-45.2.0-1.el5_11.i386.rpm firefox-45.2.0-1.el5_11.x86_64.rpm firefox-debuginfo-45.2.0-1.el5_11.i386.rpm firefox-debuginfo-45.2.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-45.2.0-1.el5_11.src.rpm i386: firefox-45.2.0-1.el5_11.i386.rpm firefox-debuginfo-45.2.0-1.el5_11.i386.rpm ppc: firefox-45.2.0-1.el5_11.ppc64.rpm firefox-debuginfo-45.2.0-1.el5_11.ppc64.rpm s390x: firefox-45.2.0-1.el5_11.s390.rpm firefox-45.2.0-1.el5_11.s390x.rpm firefox-debuginfo-45.2.0-1.el5_11.s390.rpm firefox-debuginfo-45.2.0-1.el5_11.s390x.rpm x86_64: firefox-45.2.0-1.el5_11.i386.rpm firefox-45.2.0-1.el5_11.x86_64.rpm firefox-debuginfo-45.2.0-1.el5_11.i386.rpm firefox-debuginfo-45.2.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-45.2.0-1.el6_8.src.rpm i386: firefox-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm x86_64: firefox-45.2.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.2.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-45.2.0-1.el6_8.src.rpm x86_64: firefox-45.2.0-1.el6_8.i686.rpm firefox-45.2.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-45.2.0-1.el6_8.src.rpm i386: firefox-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm ppc64: firefox-45.2.0-1.el6_8.ppc64.rpm firefox-debuginfo-45.2.0-1.el6_8.ppc64.rpm s390x: firefox-45.2.0-1.el6_8.s390x.rpm firefox-debuginfo-45.2.0-1.el6_8.s390x.rpm x86_64: firefox-45.2.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.2.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-45.2.0-1.el6_8.ppc.rpm firefox-debuginfo-45.2.0-1.el6_8.ppc.rpm s390x: firefox-45.2.0-1.el6_8.s390.rpm firefox-debuginfo-45.2.0-1.el6_8.s390.rpm x86_64: firefox-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-45.2.0-1.el6_8.src.rpm i386: firefox-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm x86_64: firefox-45.2.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.2.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-45.2.0-1.el6_8.i686.rpm firefox-debuginfo-45.2.0-1.el6_8.i686.rpm Red Hat Enterprise Linux Client (v. 7): Source: firefox-45.2.0-1.el7_2.src.rpm x86_64: firefox-45.2.0-1.el7_2.x86_64.rpm firefox-debuginfo-45.2.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-45.2.0-1.el7_2.i686.rpm firefox-debuginfo-45.2.0-1.el7_2.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-45.2.0-1.el7_2.src.rpm ppc64: firefox-45.2.0-1.el7_2.ppc64.rpm firefox-debuginfo-45.2.0-1.el7_2.ppc64.rpm ppc64le: firefox-45.2.0-1.el7_2.ppc64le.rpm firefox-debuginfo-45.2.0-1.el7_2.ppc64le.rpm s390x: firefox-45.2.0-1.el7_2.s390x.rpm firefox-debuginfo-45.2.0-1.el7_2.s390x.rpm x86_64: firefox-45.2.0-1.el7_2.x86_64.rpm firefox-debuginfo-45.2.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-45.2.0-1.el7_2.ppc.rpm firefox-debuginfo-45.2.0-1.el7_2.ppc.rpm s390x: firefox-45.2.0-1.el7_2.s390.rpm firefox-debuginfo-45.2.0-1.el7_2.s390.rpm x86_64: firefox-45.2.0-1.el7_2.i686.rpm firefox-debuginfo-45.2.0-1.el7_2.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-45.2.0-1.el7_2.src.rpm x86_64: firefox-45.2.0-1.el7_2.x86_64.rpm firefox-debuginfo-45.2.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-45.2.0-1.el7_2.i686.rpm firefox-debuginfo-45.2.0-1.el7_2.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2818 https://access.redhat.com/security/cve/CVE-2016-2819 https://access.redhat.com/security/cve/CVE-2016-2821 https://access.redhat.com/security/cve/CVE-2016-2822 https://access.redhat.com/security/cve/CVE-2016-2828 https://access.redhat.com/security/cve/CVE-2016-2831 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr45.2 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXWFCnXlSAg2UNWIIRAre6AJsG776pxk86oQKBejKHZC/EFaVuDwCdEt6j LJtwyOvdcmFCa4yOnCfBaBk= =p2gE -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 14 11:50:04 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 14 Jun 2016 11:50:04 +0000 Subject: [RHSA-2016:1225-01] Important: kernel security and bug fix update Message-ID: <201606141150.u5EBnxpw000438@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1225-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1225 Issue date: 2016-06-14 CVE Names: CVE-2015-5364 CVE-2015-5366 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) Bug Fix(es): * At a process or thread exit, when the Linux kernel undoes any SysV semaphore operations done previously (ones done using semop with the SEM_UNDO flag), there was a possible race condition with another process or thread removing the same semaphore set where the operations occurred, leading to a possible use of in-kernel-freed memory and then to possible unpredictable behavior. This bug could be noticed with software which uses IPC SysV semaphores, such as IBM DB2, which could in certain cases have some of its processes or utilities get incorrectly stalled in an IPC semaphore operation or system call after the race condition happened. A patch has been provided to fix this bug, and the kernel now behaves as expected in the aforementioned scenario. (BZ#1326343) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1239029 - CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.72.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.72.1.el6.noarch.rpm kernel-doc-2.6.32-431.72.1.el6.noarch.rpm kernel-firmware-2.6.32-431.72.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.72.1.el6.x86_64.rpm kernel-debug-2.6.32-431.72.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.72.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm kernel-devel-2.6.32-431.72.1.el6.x86_64.rpm kernel-headers-2.6.32-431.72.1.el6.x86_64.rpm perf-2.6.32-431.72.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.72.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm python-perf-2.6.32-431.72.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5364 https://access.redhat.com/security/cve/CVE-2015-5366 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXX+9ZXlSAg2UNWIIRAiuSAJ9U7tZMrnAzppAFPGuh/UyKoAzftwCgkQ9G 3VCapq0UNUwLiD9BrkTegVM= =Bmw/ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 16 22:48:28 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 16 Jun 2016 18:48:28 -0400 Subject: [RHSA-2016:1237-01] Important: ImageMagick security update Message-ID: <201606162248.u5GMmSeE001066@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: ImageMagick security update Advisory ID: RHSA-2016:1237-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1237 Issue date: 2016-06-16 CVE Names: CVE-2015-8895 CVE-2015-8896 CVE-2015-8897 CVE-2015-8898 CVE-2016-5118 CVE-2016-5239 CVE-2016-5240 ===================================================================== 1. Summary: An update for ImageMagick is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Security Fix(es): * It was discovered that ImageMagick did not properly sanitize certain input before using it to invoke processes. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5118) * It was discovered that ImageMagick did not properly sanitize certain input before passing it to the gnuplot delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5239) * Multiple flaws have been discovered in ImageMagick. A remote attacker could, for example, create specially crafted images that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would result in a memory corruption and, potentially, execution of arbitrary code, a denial of service, or an application crash. (CVE-2015-8896, CVE-2015-8895, CVE-2016-5240, CVE-2015-8897, CVE-2015-8898) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1269553 - CVE-2015-8895 ImageMagick: Integer and buffer overflow in coders/icon.c 1269562 - CVE-2015-8896 ImageMagick: Integer truncation vulnerability in coders/pict.c 1333417 - CVE-2016-5240 ImageMagick: SVG converting issue resulting in DoS 1334188 - CVE-2016-5239 ImageMagick,GraphicsMagick: Gnuplot delegate vulnerability allowing command injection 1340814 - CVE-2016-5118 ImageMagick: Remote code execution via filename 1344264 - CVE-2015-8898 ImageMagick: Prevent NULL pointer access in magick/constitute.c 1344271 - CVE-2015-8897 ImageMagick: Crash due to out of bounds error in SpliceImage 6. Package List: Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ImageMagick-6.7.2.7-5.el6_8.src.rpm x86_64: ImageMagick-6.7.2.7-5.el6_8.i686.rpm ImageMagick-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-c++-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-devel-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-doc-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-perl-6.7.2.7-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ImageMagick-6.7.2.7-5.el6_8.src.rpm i386: ImageMagick-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ppc64: ImageMagick-6.7.2.7-5.el6_8.ppc.rpm ImageMagick-6.7.2.7-5.el6_8.ppc64.rpm ImageMagick-c++-6.7.2.7-5.el6_8.ppc64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.ppc.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.ppc64.rpm s390x: ImageMagick-6.7.2.7-5.el6_8.s390.rpm ImageMagick-6.7.2.7-5.el6_8.s390x.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.s390.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.s390x.rpm x86_64: ImageMagick-6.7.2.7-5.el6_8.i686.rpm ImageMagick-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-c++-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: ImageMagick-c++-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-doc-6.7.2.7-5.el6_8.i686.rpm ImageMagick-perl-6.7.2.7-5.el6_8.i686.rpm ppc64: ImageMagick-c++-6.7.2.7-5.el6_8.ppc.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.ppc.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.ppc64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.ppc.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.ppc64.rpm ImageMagick-devel-6.7.2.7-5.el6_8.ppc.rpm ImageMagick-devel-6.7.2.7-5.el6_8.ppc64.rpm ImageMagick-doc-6.7.2.7-5.el6_8.ppc64.rpm ImageMagick-perl-6.7.2.7-5.el6_8.ppc64.rpm s390x: ImageMagick-c++-6.7.2.7-5.el6_8.s390.rpm ImageMagick-c++-6.7.2.7-5.el6_8.s390x.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.s390.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.s390x.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.s390.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.s390x.rpm ImageMagick-devel-6.7.2.7-5.el6_8.s390.rpm ImageMagick-devel-6.7.2.7-5.el6_8.s390x.rpm ImageMagick-doc-6.7.2.7-5.el6_8.s390x.rpm ImageMagick-perl-6.7.2.7-5.el6_8.s390x.rpm x86_64: ImageMagick-c++-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-devel-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-doc-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-perl-6.7.2.7-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ImageMagick-6.7.2.7-5.el6_8.src.rpm i386: ImageMagick-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm x86_64: ImageMagick-6.7.2.7-5.el6_8.i686.rpm ImageMagick-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-c++-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: ImageMagick-c++-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-doc-6.7.2.7-5.el6_8.i686.rpm ImageMagick-perl-6.7.2.7-5.el6_8.i686.rpm x86_64: ImageMagick-c++-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-c++-devel-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.i686.rpm ImageMagick-debuginfo-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-devel-6.7.2.7-5.el6_8.i686.rpm ImageMagick-devel-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-doc-6.7.2.7-5.el6_8.x86_64.rpm ImageMagick-perl-6.7.2.7-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: ImageMagick-6.7.8.9-15.el7_2.src.rpm x86_64: ImageMagick-6.7.8.9-15.el7_2.i686.rpm ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: ImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: ImageMagick-6.7.8.9-15.el7_2.src.rpm x86_64: ImageMagick-6.7.8.9-15.el7_2.i686.rpm ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: ImageMagick-6.7.8.9-15.el7_2.src.rpm ppc64: ImageMagick-6.7.8.9-15.el7_2.ppc.rpm ImageMagick-6.7.8.9-15.el7_2.ppc64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.ppc.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.ppc64.rpm ImageMagick-perl-6.7.8.9-15.el7_2.ppc64.rpm ppc64le: ImageMagick-6.7.8.9-15.el7_2.ppc64le.rpm ImageMagick-c++-6.7.8.9-15.el7_2.ppc64le.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.ppc64le.rpm ImageMagick-perl-6.7.8.9-15.el7_2.ppc64le.rpm s390x: ImageMagick-6.7.8.9-15.el7_2.s390.rpm ImageMagick-6.7.8.9-15.el7_2.s390x.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.s390.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.s390x.rpm ImageMagick-perl-6.7.8.9-15.el7_2.s390x.rpm x86_64: ImageMagick-6.7.8.9-15.el7_2.i686.rpm ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: ImageMagick-c++-6.7.8.9-15.el7_2.ppc.rpm ImageMagick-c++-6.7.8.9-15.el7_2.ppc64.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.ppc.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.ppc64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.ppc.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.ppc64.rpm ImageMagick-devel-6.7.8.9-15.el7_2.ppc.rpm ImageMagick-devel-6.7.8.9-15.el7_2.ppc64.rpm ImageMagick-doc-6.7.8.9-15.el7_2.ppc64.rpm ppc64le: ImageMagick-c++-devel-6.7.8.9-15.el7_2.ppc64le.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.ppc64le.rpm ImageMagick-devel-6.7.8.9-15.el7_2.ppc64le.rpm ImageMagick-doc-6.7.8.9-15.el7_2.ppc64le.rpm s390x: ImageMagick-c++-6.7.8.9-15.el7_2.s390.rpm ImageMagick-c++-6.7.8.9-15.el7_2.s390x.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.s390.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.s390x.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.s390.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.s390x.rpm ImageMagick-devel-6.7.8.9-15.el7_2.s390.rpm ImageMagick-devel-6.7.8.9-15.el7_2.s390x.rpm ImageMagick-doc-6.7.8.9-15.el7_2.s390x.rpm x86_64: ImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: ImageMagick-6.7.8.9-15.el7_2.src.rpm x86_64: ImageMagick-6.7.8.9-15.el7_2.i686.rpm ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: ImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.i686.rpm ImageMagick-debuginfo-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-devel-6.7.8.9-15.el7_2.i686.rpm ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8895 https://access.redhat.com/security/cve/CVE-2015-8896 https://access.redhat.com/security/cve/CVE-2015-8897 https://access.redhat.com/security/cve/CVE-2015-8898 https://access.redhat.com/security/cve/CVE-2016-5118 https://access.redhat.com/security/cve/CVE-2016-5239 https://access.redhat.com/security/cve/CVE-2016-5240 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXYyy5XlSAg2UNWIIRAnE9AJ9sMQSWCBGAv8dfTao42DPl+Z7CYgCfefuw cXtnX7Koy5K61nZodyFedH4= =qUqC -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Jun 17 08:18:45 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 17 Jun 2016 08:18:45 +0000 Subject: [RHSA-2016:1238-01] Critical: flash-plugin security update Message-ID: <201606170818.u5H8IjNs010367@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2016:1238-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2016:1238 Issue date: 2016-06-17 CVE Names: CVE-2016-4122 CVE-2016-4123 CVE-2016-4124 CVE-2016-4125 CVE-2016-4127 CVE-2016-4128 CVE-2016-4129 CVE-2016-4130 CVE-2016-4131 CVE-2016-4132 CVE-2016-4133 CVE-2016-4134 CVE-2016-4135 CVE-2016-4136 CVE-2016-4137 CVE-2016-4138 CVE-2016-4139 CVE-2016-4140 CVE-2016-4141 CVE-2016-4142 CVE-2016-4143 CVE-2016-4144 CVE-2016-4145 CVE-2016-4146 CVE-2016-4147 CVE-2016-4148 CVE-2016-4149 CVE-2016-4150 CVE-2016-4151 CVE-2016-4152 CVE-2016-4153 CVE-2016-4154 CVE-2016-4155 CVE-2016-4156 CVE-2016-4166 CVE-2016-4171 ===================================================================== 1. Summary: An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 11.2.202.626. Security Fix(es): * This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137, CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141, CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149, CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, CVE-2016-4171) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1346665 - flash-plugin: multiple code execution issues fixed in APSB16-18 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.626-1.el5_11.i386.rpm x86_64: flash-plugin-11.2.202.626-1.el5_11.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.626-1.el5_11.i386.rpm x86_64: flash-plugin-11.2.202.626-1.el5_11.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.626-1.el6_8.i686.rpm x86_64: flash-plugin-11.2.202.626-1.el6_8.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.626-1.el6_8.i686.rpm x86_64: flash-plugin-11.2.202.626-1.el6_8.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.626-1.el6_8.i686.rpm x86_64: flash-plugin-11.2.202.626-1.el6_8.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4122 https://access.redhat.com/security/cve/CVE-2016-4123 https://access.redhat.com/security/cve/CVE-2016-4124 https://access.redhat.com/security/cve/CVE-2016-4125 https://access.redhat.com/security/cve/CVE-2016-4127 https://access.redhat.com/security/cve/CVE-2016-4128 https://access.redhat.com/security/cve/CVE-2016-4129 https://access.redhat.com/security/cve/CVE-2016-4130 https://access.redhat.com/security/cve/CVE-2016-4131 https://access.redhat.com/security/cve/CVE-2016-4132 https://access.redhat.com/security/cve/CVE-2016-4133 https://access.redhat.com/security/cve/CVE-2016-4134 https://access.redhat.com/security/cve/CVE-2016-4135 https://access.redhat.com/security/cve/CVE-2016-4136 https://access.redhat.com/security/cve/CVE-2016-4137 https://access.redhat.com/security/cve/CVE-2016-4138 https://access.redhat.com/security/cve/CVE-2016-4139 https://access.redhat.com/security/cve/CVE-2016-4140 https://access.redhat.com/security/cve/CVE-2016-4141 https://access.redhat.com/security/cve/CVE-2016-4142 https://access.redhat.com/security/cve/CVE-2016-4143 https://access.redhat.com/security/cve/CVE-2016-4144 https://access.redhat.com/security/cve/CVE-2016-4145 https://access.redhat.com/security/cve/CVE-2016-4146 https://access.redhat.com/security/cve/CVE-2016-4147 https://access.redhat.com/security/cve/CVE-2016-4148 https://access.redhat.com/security/cve/CVE-2016-4149 https://access.redhat.com/security/cve/CVE-2016-4150 https://access.redhat.com/security/cve/CVE-2016-4151 https://access.redhat.com/security/cve/CVE-2016-4152 https://access.redhat.com/security/cve/CVE-2016-4153 https://access.redhat.com/security/cve/CVE-2016-4154 https://access.redhat.com/security/cve/CVE-2016-4155 https://access.redhat.com/security/cve/CVE-2016-4156 https://access.redhat.com/security/cve/CVE-2016-4166 https://access.redhat.com/security/cve/CVE-2016-4171 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb16-18.html https://helpx.adobe.com/security/products/flash-player/apsa16-03.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXY7HIXlSAg2UNWIIRAmytAJ9KBVDAyt7RbmNznJhC6uA9WwA6tACfSNyo /QNQeCm3xe5AByAOnb1Veh0= =5kdV -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 20 19:36:09 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 20 Jun 2016 19:36:09 +0000 Subject: [RHSA-2016:1262-01] Important: chromium-browser security update Message-ID: <201606201936.u5KJaAxo010340@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2016:1262-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2016:1262 Issue date: 2016-06-20 CVE Names: CVE-2016-1704 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 51.0.2704.103. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-1704) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1347675 - CVE-2016-1704 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-51.0.2704.103-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.103-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.103-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.103-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-51.0.2704.103-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.103-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.103-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.103-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-51.0.2704.103-1.el6.i686.rpm chromium-browser-debuginfo-51.0.2704.103-1.el6.i686.rpm x86_64: chromium-browser-51.0.2704.103-1.el6.x86_64.rpm chromium-browser-debuginfo-51.0.2704.103-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1704 https://access.redhat.com/security/updates/classification/#important https://googlechromereleases.blogspot.com/2016/06/stable-channel-update_16.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXaEWbXlSAg2UNWIIRAsVGAKCZ+vTN9bV9Kd1y0w0DTgUAm+xi4wCggzru BOnVL6Xgm9A/cD5Q0azvXdc= =hPaR -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 21:34:44 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2016 21:34:44 +0000 Subject: [RHSA-2016:1267-01] Important: setroubleshoot and setroubleshoot-plugins security update Message-ID: <201606212134.u5LLYjV1023535@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: setroubleshoot and setroubleshoot-plugins security update Advisory ID: RHSA-2016:1267-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1267 Issue date: 2016-06-21 CVE Names: CVE-2016-4444 CVE-2016-4445 CVE-2016-4446 CVE-2016-4989 ===================================================================== 1. Summary: An update for setroubleshoot and setroubleshoot-plugins is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The setroubleshoot packages provide tools to help diagnose SELinux problems. When Access Vector Cache (AVC) messages are returned, an alert can be generated that provides information about the problem and helps to track its resolution. The setroubleshoot-plugins package provides a set of analysis plugins for use with setroubleshoot. Each plugin has the capacity to analyze SELinux AVC data and system data to provide user friendly reports describing how to interpret SELinux AVC denials. Security Fix(es): * Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with root privileges. (CVE-2016-4445, CVE-2016-4989) * Shell command injection flaws were found in the way the setroubleshoot allow_execmod and allow_execstack plugins executed external commands. A local attacker able to trigger an execmod or execstack SELinux denial could use these flaws to execute arbitrary code with root privileges. (CVE-2016-4444, CVE-2016-4446) The CVE-2016-4444 and CVE-2016-4446 issues were discovered by Milos Malik (Red Hat) and the CVE-2016-4445 and CVE-2016-4989 issues were discovered by Red Hat Product Security. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1332644 - CVE-2016-4444 setroubleshoot-plugins: insecure commands.getstatusoutput use in the allow_execmod plugin 1339183 - CVE-2016-4445 setroubleshoot: insecure use of commands.getstatusoutput 1339250 - CVE-2016-4446 setroubleshoot-plugins: insecure commands.getoutput use in the allow_execstack plugin 1346461 - CVE-2016-4989 setroubleshoot: command injection issues 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: setroubleshoot-3.0.47-12.el6_8.src.rpm setroubleshoot-plugins-3.0.40-3.1.el6_8.src.rpm i386: setroubleshoot-3.0.47-12.el6_8.i686.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.i686.rpm setroubleshoot-server-3.0.47-12.el6_8.i686.rpm noarch: setroubleshoot-plugins-3.0.40-3.1.el6_8.noarch.rpm x86_64: setroubleshoot-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-server-3.0.47-12.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: setroubleshoot-debuginfo-3.0.47-12.el6_8.i686.rpm setroubleshoot-doc-3.0.47-12.el6_8.i686.rpm x86_64: setroubleshoot-debuginfo-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-doc-3.0.47-12.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: setroubleshoot-3.0.47-12.el6_8.src.rpm setroubleshoot-plugins-3.0.40-3.1.el6_8.src.rpm i386: setroubleshoot-3.0.47-12.el6_8.i686.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.i686.rpm setroubleshoot-server-3.0.47-12.el6_8.i686.rpm noarch: setroubleshoot-plugins-3.0.40-3.1.el6_8.noarch.rpm ppc64: setroubleshoot-3.0.47-12.el6_8.ppc64.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.ppc64.rpm setroubleshoot-server-3.0.47-12.el6_8.ppc64.rpm s390x: setroubleshoot-3.0.47-12.el6_8.s390x.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.s390x.rpm setroubleshoot-server-3.0.47-12.el6_8.s390x.rpm x86_64: setroubleshoot-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-server-3.0.47-12.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: setroubleshoot-debuginfo-3.0.47-12.el6_8.i686.rpm setroubleshoot-doc-3.0.47-12.el6_8.i686.rpm ppc64: setroubleshoot-debuginfo-3.0.47-12.el6_8.ppc64.rpm setroubleshoot-doc-3.0.47-12.el6_8.ppc64.rpm s390x: setroubleshoot-debuginfo-3.0.47-12.el6_8.s390x.rpm setroubleshoot-doc-3.0.47-12.el6_8.s390x.rpm x86_64: setroubleshoot-debuginfo-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-doc-3.0.47-12.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: setroubleshoot-3.0.47-12.el6_8.src.rpm setroubleshoot-plugins-3.0.40-3.1.el6_8.src.rpm i386: setroubleshoot-3.0.47-12.el6_8.i686.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.i686.rpm setroubleshoot-server-3.0.47-12.el6_8.i686.rpm noarch: setroubleshoot-plugins-3.0.40-3.1.el6_8.noarch.rpm x86_64: setroubleshoot-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-debuginfo-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-server-3.0.47-12.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: setroubleshoot-debuginfo-3.0.47-12.el6_8.i686.rpm setroubleshoot-doc-3.0.47-12.el6_8.i686.rpm x86_64: setroubleshoot-debuginfo-3.0.47-12.el6_8.x86_64.rpm setroubleshoot-doc-3.0.47-12.el6_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4444 https://access.redhat.com/security/cve/CVE-2016-4445 https://access.redhat.com/security/cve/CVE-2016-4446 https://access.redhat.com/security/cve/CVE-2016-4989 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXabK0XlSAg2UNWIIRAgl2AKCwuWWYVViardJDIao2Wr2+gcH6VgCdFZBx 139ieIfI+rr9LCAAgmbTFPg= =VQ77 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 22:59:11 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2016 22:59:11 +0000 Subject: [RHSA-2016:1268-01] Important: python-django-horizon security update Message-ID: <201606212259.u5LMxCe7013632@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-django-horizon security update Advisory ID: RHSA-2016:1268-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2016:1268 Issue date: 2016-06-21 CVE Names: CVE-2016-4428 ===================================================================== 1. Summary: An update for python-django-horizon is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 - noarch 3. Description: OpenStack Dashboard (Horizon) provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources. Security Fix(es): * A DOM-based, cross-site scripting vulnerability was found in the OpenStack dashboard, where user input was not filtered correctly. An authenticated dashboard user could exploit the flaw by injecting an AngularJS template into a dashboard form (for example, using an image's description), triggering the vulnerability when another user browsed the affected page. As a result, this flaw could result in user accounts being compromised (for example, user-access credentials being stolen). (CVE-2016-4428) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Beth Lancaster (Virginia Tech) and Brandon Sawyers (Virginia Tech) as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1343982 - CVE-2016-4428 python-django-horizon: XSS in client side template 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6: Source: python-django-horizon-2014.1.5-4.el6ost.src.rpm noarch: openstack-dashboard-2014.1.5-4.el6ost.noarch.rpm openstack-dashboard-theme-2014.1.5-4.el6ost.noarch.rpm python-django-horizon-2014.1.5-4.el6ost.noarch.rpm python-django-horizon-doc-2014.1.5-4.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4428 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXacZ/XlSAg2UNWIIRArS5AJ0TFUgWJRYAcJjUSVAtyBzChtFUQACdGTEl 5SdH0Rb9qG0mu2wkX4/hvwM= =RD8P -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 22:59:54 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2016 22:59:54 +0000 Subject: [RHSA-2016:1269-01] Important: python-django-horizon security update Message-ID: <201606212259.u5LMxsLW013914@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-django-horizon security update Advisory ID: RHSA-2016:1269-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2016:1269 Issue date: 2016-06-21 CVE Names: CVE-2016-4428 ===================================================================== 1. Summary: An update for python-django-horizon is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 - noarch 3. Description: OpenStack Dashboard (Horizon) provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources. Security Fix(es): * A DOM-based, cross-site scripting vulnerability was found in the OpenStack dashboard, where user input was not filtered correctly. An authenticated dashboard user could exploit the flaw by injecting an AngularJS template into a dashboard form (for example, using an image's description), triggering the vulnerability when another user browsed the affected page. As a result, this flaw could result in user accounts being compromised (for example, user-access credentials being stolen). (CVE-2016-4428) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Beth Lancaster (Virginia Tech) and Brandon Sawyers (Virginia Tech) as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1343982 - CVE-2016-4428 python-django-horizon: XSS in client side template 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7: Source: python-django-horizon-2014.1.5-4.el7ost.src.rpm noarch: openstack-dashboard-2014.1.5-4.el7ost.noarch.rpm openstack-dashboard-theme-2014.1.5-4.el7ost.noarch.rpm python-django-horizon-2014.1.5-4.el7ost.noarch.rpm python-django-horizon-doc-2014.1.5-4.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4428 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXacbYXlSAg2UNWIIRAhoQAKDAvZgxmF1Km60dgi/jnQomPRa3aACgn77U esbz4X8MqgCfrpmIknFANHw= =PrAk -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:04:35 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2016 23:04:35 +0000 Subject: [RHSA-2016:1270-01] Important: python-django-horizon security update Message-ID: <201606212304.u5LN4ZP2000658@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-django-horizon security update Advisory ID: RHSA-2016:1270-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2016:1270 Issue date: 2016-06-21 CVE Names: CVE-2016-4428 ===================================================================== 1. Summary: An update for python-django-horizon is now available for Red Hat OpenStack Platform 8.0 (Liberty). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 8.0 (Liberty) - noarch 3. Description: OpenStack Dashboard (Horizon) provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources. Security Fix(es): * A DOM-based, cross-site scripting vulnerability was found in the OpenStack dashboard, where user input was not filtered correctly. An authenticated dashboard user could exploit the flaw by injecting an AngularJS template into a dashboard form (for example, using an image's description), triggering the vulnerability when another user browsed the affected page. As a result, this flaw could result in user accounts being compromised (for example, user-access credentials being stolen). (CVE-2016-4428) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Beth Lancaster (Virginia Tech) and Brandon Sawyers (Virginia Tech) as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1343982 - CVE-2016-4428 python-django-horizon: XSS in client side template 6. Package List: Red Hat OpenStack Platform 8.0 (Liberty): Source: python-django-horizon-8.0.1-4.el7ost.src.rpm noarch: openstack-dashboard-8.0.1-4.el7ost.noarch.rpm openstack-dashboard-theme-8.0.1-4.el7ost.noarch.rpm python-django-horizon-8.0.1-4.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4428 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXacfbXlSAg2UNWIIRAvyfAJ9c67dUziP8iq3oycZ4mmUHmWBpzACaA5PS WHr4VDZ09vFVp56Wv6s2id8= =15DT -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:05:28 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2016 23:05:28 +0000 Subject: [RHSA-2016:1271-01] Important: python-django-horizon security and bug fix update Message-ID: <201606212305.u5LN5TEf001585@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-django-horizon security and bug fix update Advisory ID: RHSA-2016:1271-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2016:1271 Issue date: 2016-06-21 CVE Names: CVE-2016-4428 ===================================================================== 1. Summary: An update for python-django-horizon is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 - noarch 3. Description: OpenStack Dashboard (Horizon) provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources. Security Fix(es): * A DOM-based, cross-site scripting vulnerability was found in the OpenStack dashboard, where user input was not filtered correctly. An authenticated dashboard user could exploit the flaw by injecting an AngularJS template into a dashboard form (for example, using an image's description), triggering the vulnerability when another user browsed the affected page. As a result, this flaw could result in user accounts being compromised (for example, user-access credentials being stolen). (CVE-2016-4428) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Beth Lancaster (Virginia Tech) and Brandon Sawyers (Virginia Tech) as the original reporters. Bug Fix(es): * Having two security groups with the same name previously resulted in not being able to launch an instance if it used one of these groups. This bug has been fixed. (BZ#1293232) * Previously, under some circumstances, the hypervisor list was not alphabetized. In this update, the sort attribute has been changed, and badly sorted lists no longer occur. (BZ#1238092) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1238092 - horizon hypervisor list not ordered alphabetically 1293232 - horizon is using the Security Group name rather than the ID 1343982 - CVE-2016-4428 python-django-horizon: XSS in client side template 6. Package List: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7: Source: python-django-horizon-2014.2.3-9.el7ost.src.rpm noarch: openstack-dashboard-2014.2.3-9.el7ost.noarch.rpm openstack-dashboard-theme-2014.2.3-9.el7ost.noarch.rpm python-django-horizon-2014.2.3-9.el7ost.noarch.rpm python-django-horizon-doc-2014.2.3-9.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4428 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXacgSXlSAg2UNWIIRArFEAJ4vEcJDeAkyNjZrznlJ8G5yrbRL3gCfYzQr WqbP0xDRtxUk/pPSij/OJeg= =/skb -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jun 21 23:05:59 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Jun 2016 23:05:59 +0000 Subject: [RHSA-2016:1272-01] Important: python-django-horizon security, bug fix, and enhancement update Message-ID: <201606212305.u5LN5x1e030840@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-django-horizon security, bug fix, and enhancement update Advisory ID: RHSA-2016:1272-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2016:1272 Issue date: 2016-06-21 CVE Names: CVE-2016-4428 ===================================================================== 1. Summary: An update for python-django-horizon is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 - noarch 3. Description: OpenStack Dashboard (Horizon) provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources. The following packages have been upgraded to a newer upstream version: python-django-horizon: 2015.1.4 (BZ#1345822) Security Fix(es): * A DOM-based, cross-site scripting vulnerability was found in the OpenStack dashboard, where user input was not filtered correctly. An authenticated dashboard user could exploit the flaw by injecting an AngularJS template into a dashboard form (for example, using an image's description), triggering the vulnerability when another user browsed the affected page. As a result, this flaw could result in user accounts being compromised (for example, user-access credentials being stolen). (CVE-2016-4428) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Beth Lancaster (Virginia Tech) and Brandon Sawyers (Virginia Tech) as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1287881 - Heat UI objects are not displayed in the UI 1343982 - CVE-2016-4428 python-django-horizon: XSS in client side template 6. Package List: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7: Source: python-django-horizon-2015.1.4-1.el7ost.src.rpm noarch: openstack-dashboard-2015.1.4-1.el7ost.noarch.rpm openstack-dashboard-theme-2015.1.4-1.el7ost.noarch.rpm python-django-horizon-2015.1.4-1.el7ost.noarch.rpm python-django-horizon-doc-2015.1.4-1.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4428 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXachHXlSAg2UNWIIRAhKZAKC6mM0Ub+H7YzWTjT0zejmI01a5vQCfdZKH DKaxh+sWpegAqcj0hmNlwjg= =N4+v -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 23 10:57:57 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 23 Jun 2016 10:57:57 +0000 Subject: [RHSA-2016:1292-01] Important: libxml2 security update Message-ID: <201606231057.u5NAvwHK009605@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libxml2 security update Advisory ID: RHSA-2016:1292-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1292 Issue date: 2016-06-23 CVE Names: CVE-2016-1762 CVE-2016-1833 CVE-2016-1834 CVE-2016-1835 CVE-2016-1836 CVE-2016-1837 CVE-2016-1838 CVE-2016-1839 CVE-2016-1840 CVE-2016-3627 CVE-2016-3705 CVE-2016-4447 CVE-2016-4448 CVE-2016-4449 ===================================================================== 1. Summary: An update for libxml2 is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2016-1834, CVE-2016-1840) Multiple denial of service flaws were found in libxml2. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, could cause that application to crash. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all applications linked to the libxml2 library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1319829 - CVE-2016-3627 libxml2: stack exhaustion while parsing xml files in recovery mode 1332443 - CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file 1338682 - CVE-2016-1833 libxml2: Heap-based buffer overread in htmlCurrentChar 1338686 - CVE-2016-4447 libxml2: Heap-based buffer underreads due to xmlParseName 1338691 - CVE-2016-1835 libxml2: Heap use-after-free in xmlSAX2AttributeNs 1338696 - CVE-2016-1837 libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral 1338700 - CVE-2016-4448 libxml2: Format string vulnerability 1338701 - CVE-2016-4449 libxml2: Inappropriate fetch of entities content 1338702 - CVE-2016-1836 libxml2: Heap use-after-free in xmlDictComputeFastKey 1338703 - CVE-2016-1839 libxml2: Heap-based buffer overread in xmlDictAddString 1338705 - CVE-2016-1838 libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal 1338706 - CVE-2016-1840 libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup 1338708 - CVE-2016-1834 libxml2: Heap-buffer-overflow in xmlStrncat 1338711 - CVE-2016-1762 libxml2: Heap-based buffer-overread in xmlNextChar 6. Package List: Red Hat Enterprise Linux HPC Node (v. 6): Source: libxml2-2.7.6-21.el6_8.1.src.rpm x86_64: libxml2-2.7.6-21.el6_8.1.i686.rpm libxml2-2.7.6-21.el6_8.1.x86_64.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.x86_64.rpm libxml2-python-2.7.6-21.el6_8.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.x86_64.rpm libxml2-devel-2.7.6-21.el6_8.1.i686.rpm libxml2-devel-2.7.6-21.el6_8.1.x86_64.rpm libxml2-static-2.7.6-21.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libxml2-2.7.6-21.el6_8.1.src.rpm i386: libxml2-2.7.6-21.el6_8.1.i686.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-devel-2.7.6-21.el6_8.1.i686.rpm libxml2-python-2.7.6-21.el6_8.1.i686.rpm ppc64: libxml2-2.7.6-21.el6_8.1.ppc.rpm libxml2-2.7.6-21.el6_8.1.ppc64.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.ppc.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.ppc64.rpm libxml2-devel-2.7.6-21.el6_8.1.ppc.rpm libxml2-devel-2.7.6-21.el6_8.1.ppc64.rpm libxml2-python-2.7.6-21.el6_8.1.ppc64.rpm s390x: libxml2-2.7.6-21.el6_8.1.s390.rpm libxml2-2.7.6-21.el6_8.1.s390x.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.s390.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.s390x.rpm libxml2-devel-2.7.6-21.el6_8.1.s390.rpm libxml2-devel-2.7.6-21.el6_8.1.s390x.rpm libxml2-python-2.7.6-21.el6_8.1.s390x.rpm x86_64: libxml2-2.7.6-21.el6_8.1.i686.rpm libxml2-2.7.6-21.el6_8.1.x86_64.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.x86_64.rpm libxml2-devel-2.7.6-21.el6_8.1.i686.rpm libxml2-devel-2.7.6-21.el6_8.1.x86_64.rpm libxml2-python-2.7.6-21.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-static-2.7.6-21.el6_8.1.i686.rpm ppc64: libxml2-debuginfo-2.7.6-21.el6_8.1.ppc64.rpm libxml2-static-2.7.6-21.el6_8.1.ppc64.rpm s390x: libxml2-debuginfo-2.7.6-21.el6_8.1.s390x.rpm libxml2-static-2.7.6-21.el6_8.1.s390x.rpm x86_64: libxml2-debuginfo-2.7.6-21.el6_8.1.x86_64.rpm libxml2-static-2.7.6-21.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libxml2-2.7.6-21.el6_8.1.src.rpm i386: libxml2-2.7.6-21.el6_8.1.i686.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-devel-2.7.6-21.el6_8.1.i686.rpm libxml2-python-2.7.6-21.el6_8.1.i686.rpm x86_64: libxml2-2.7.6-21.el6_8.1.i686.rpm libxml2-2.7.6-21.el6_8.1.x86_64.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-debuginfo-2.7.6-21.el6_8.1.x86_64.rpm libxml2-devel-2.7.6-21.el6_8.1.i686.rpm libxml2-devel-2.7.6-21.el6_8.1.x86_64.rpm libxml2-python-2.7.6-21.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libxml2-debuginfo-2.7.6-21.el6_8.1.i686.rpm libxml2-static-2.7.6-21.el6_8.1.i686.rpm x86_64: libxml2-debuginfo-2.7.6-21.el6_8.1.x86_64.rpm libxml2-static-2.7.6-21.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: libxml2-2.9.1-6.el7_2.3.src.rpm x86_64: libxml2-2.9.1-6.el7_2.3.i686.rpm libxml2-2.9.1-6.el7_2.3.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-python-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.3.i686.rpm libxml2-devel-2.9.1-6.el7_2.3.x86_64.rpm libxml2-static-2.9.1-6.el7_2.3.i686.rpm libxml2-static-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libxml2-2.9.1-6.el7_2.3.src.rpm x86_64: libxml2-2.9.1-6.el7_2.3.i686.rpm libxml2-2.9.1-6.el7_2.3.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-python-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.3.i686.rpm libxml2-devel-2.9.1-6.el7_2.3.x86_64.rpm libxml2-static-2.9.1-6.el7_2.3.i686.rpm libxml2-static-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libxml2-2.9.1-6.el7_2.3.src.rpm ppc64: libxml2-2.9.1-6.el7_2.3.ppc.rpm libxml2-2.9.1-6.el7_2.3.ppc64.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.ppc.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.ppc64.rpm libxml2-devel-2.9.1-6.el7_2.3.ppc.rpm libxml2-devel-2.9.1-6.el7_2.3.ppc64.rpm libxml2-python-2.9.1-6.el7_2.3.ppc64.rpm ppc64le: libxml2-2.9.1-6.el7_2.3.ppc64le.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.ppc64le.rpm libxml2-devel-2.9.1-6.el7_2.3.ppc64le.rpm libxml2-python-2.9.1-6.el7_2.3.ppc64le.rpm s390x: libxml2-2.9.1-6.el7_2.3.s390.rpm libxml2-2.9.1-6.el7_2.3.s390x.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.s390.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.s390x.rpm libxml2-devel-2.9.1-6.el7_2.3.s390.rpm libxml2-devel-2.9.1-6.el7_2.3.s390x.rpm libxml2-python-2.9.1-6.el7_2.3.s390x.rpm x86_64: libxml2-2.9.1-6.el7_2.3.i686.rpm libxml2-2.9.1-6.el7_2.3.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.3.i686.rpm libxml2-devel-2.9.1-6.el7_2.3.x86_64.rpm libxml2-python-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libxml2-debuginfo-2.9.1-6.el7_2.3.ppc.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.ppc64.rpm libxml2-static-2.9.1-6.el7_2.3.ppc.rpm libxml2-static-2.9.1-6.el7_2.3.ppc64.rpm ppc64le: libxml2-debuginfo-2.9.1-6.el7_2.3.ppc64le.rpm libxml2-static-2.9.1-6.el7_2.3.ppc64le.rpm s390x: libxml2-debuginfo-2.9.1-6.el7_2.3.s390.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.s390x.rpm libxml2-static-2.9.1-6.el7_2.3.s390.rpm libxml2-static-2.9.1-6.el7_2.3.s390x.rpm x86_64: libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-static-2.9.1-6.el7_2.3.i686.rpm libxml2-static-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libxml2-2.9.1-6.el7_2.3.src.rpm x86_64: libxml2-2.9.1-6.el7_2.3.i686.rpm libxml2-2.9.1-6.el7_2.3.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-devel-2.9.1-6.el7_2.3.i686.rpm libxml2-devel-2.9.1-6.el7_2.3.x86_64.rpm libxml2-python-2.9.1-6.el7_2.3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7_2.3.i686.rpm libxml2-debuginfo-2.9.1-6.el7_2.3.x86_64.rpm libxml2-static-2.9.1-6.el7_2.3.i686.rpm libxml2-static-2.9.1-6.el7_2.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1762 https://access.redhat.com/security/cve/CVE-2016-1833 https://access.redhat.com/security/cve/CVE-2016-1834 https://access.redhat.com/security/cve/CVE-2016-1835 https://access.redhat.com/security/cve/CVE-2016-1836 https://access.redhat.com/security/cve/CVE-2016-1837 https://access.redhat.com/security/cve/CVE-2016-1838 https://access.redhat.com/security/cve/CVE-2016-1839 https://access.redhat.com/security/cve/CVE-2016-1840 https://access.redhat.com/security/cve/CVE-2016-3627 https://access.redhat.com/security/cve/CVE-2016-3705 https://access.redhat.com/security/cve/CVE-2016-4447 https://access.redhat.com/security/cve/CVE-2016-4448 https://access.redhat.com/security/cve/CVE-2016-4449 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXa8B8XlSAg2UNWIIRAh9ZAJ99xgPhOaIopIxmynm+vlDcmw4jFACeLvTm ZsVLEgJAF0Zt6xZVzqvVW7U= =fREV -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 23 11:00:09 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 23 Jun 2016 11:00:09 +0000 Subject: [RHSA-2016:1293-01] Important: setroubleshoot and setroubleshoot-plugins security update Message-ID: <201606231100.u5NB091L029511@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: setroubleshoot and setroubleshoot-plugins security update Advisory ID: RHSA-2016:1293-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1293 Issue date: 2016-06-23 CVE Names: CVE-2016-4444 CVE-2016-4446 CVE-2016-4989 ===================================================================== 1. Summary: An update for setroubleshoot and setroubleshoot-plugins is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: The setroubleshoot packages provide tools to help diagnose SELinux problems. When Access Vector Cache (AVC) messages are returned, an alert can be generated that provides information about the problem and helps to track its resolution. The setroubleshoot-plugins package provides a set of analysis plugins for use with setroubleshoot. Each plugin has the capacity to analyze SELinux AVC data and system data to provide user friendly reports describing how to interpret SELinux AVC denials. Security Fix(es): * Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with privileges of the setroubleshoot user. (CVE-2016-4989) * Shell command injection flaws were found in the way the setroubleshoot allow_execmod and allow_execstack plugins executed external commands. A local attacker able to trigger an execmod or execstack SELinux denial could use these flaws to execute arbitrary code with privileges of the setroubleshoot user. (CVE-2016-4444, CVE-2016-4446) The CVE-2016-4444 and CVE-2016-4446 issues were discovered by Milos Malik (Red Hat) and the CVE-2016-4989 issue was discovered by Red Hat Product Security. Note: On Red Hat Enterprise Linux 7.0 and 7.1, the setroubleshoot is run with root privileges. Therefore, these issues could allow an attacker to execute arbitrary code with root privileges. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1332644 - CVE-2016-4444 setroubleshoot-plugins: insecure commands.getstatusoutput use in the allow_execmod plugin 1339250 - CVE-2016-4446 setroubleshoot-plugins: insecure commands.getoutput use in the allow_execstack plugin 1346461 - CVE-2016-4989 setroubleshoot: command injection issues 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: setroubleshoot-3.2.24-4.el7_2.src.rpm setroubleshoot-plugins-3.0.59-2.el7_2.src.rpm noarch: setroubleshoot-plugins-3.0.59-2.el7_2.noarch.rpm x86_64: setroubleshoot-3.2.24-4.el7_2.x86_64.rpm setroubleshoot-debuginfo-3.2.24-4.el7_2.x86_64.rpm setroubleshoot-server-3.2.24-4.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: setroubleshoot-3.2.24-4.el7_2.src.rpm setroubleshoot-plugins-3.0.59-2.el7_2.src.rpm noarch: setroubleshoot-plugins-3.0.59-2.el7_2.noarch.rpm ppc64: setroubleshoot-3.2.24-4.el7_2.ppc64.rpm setroubleshoot-debuginfo-3.2.24-4.el7_2.ppc64.rpm setroubleshoot-server-3.2.24-4.el7_2.ppc64.rpm ppc64le: setroubleshoot-3.2.24-4.el7_2.ppc64le.rpm setroubleshoot-debuginfo-3.2.24-4.el7_2.ppc64le.rpm setroubleshoot-server-3.2.24-4.el7_2.ppc64le.rpm s390x: setroubleshoot-3.2.24-4.el7_2.s390x.rpm setroubleshoot-debuginfo-3.2.24-4.el7_2.s390x.rpm setroubleshoot-server-3.2.24-4.el7_2.s390x.rpm x86_64: setroubleshoot-3.2.24-4.el7_2.x86_64.rpm setroubleshoot-debuginfo-3.2.24-4.el7_2.x86_64.rpm setroubleshoot-server-3.2.24-4.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: setroubleshoot-3.2.24-4.el7_2.src.rpm setroubleshoot-plugins-3.0.59-2.el7_2.src.rpm noarch: setroubleshoot-plugins-3.0.59-2.el7_2.noarch.rpm x86_64: setroubleshoot-3.2.24-4.el7_2.x86_64.rpm setroubleshoot-debuginfo-3.2.24-4.el7_2.x86_64.rpm setroubleshoot-server-3.2.24-4.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4444 https://access.redhat.com/security/cve/CVE-2016-4446 https://access.redhat.com/security/cve/CVE-2016-4989 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXa8EmXlSAg2UNWIIRApvkAKCI9L96Fz2h4VJdeJ8+wIlCeitfowCgk/uX 0WSuYqvfNoXDXQNq5OqvlFk= =Fhre -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 23 20:06:01 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 23 Jun 2016 20:06:01 +0000 Subject: [RHSA-2016:1277-01] Important: kernel security and bug fix update Message-ID: <201606232006.u5NK62Zw029623@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1277-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1277 Issue date: 2016-06-23 CVE Names: CVE-2015-8767 CVE-2016-4565 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated kernel packages include several security issues and numerous bug fixes, some of which you can see below. Space precludes documenting all of these bug fixes in this advisory. To see the complete list of bug fixes, users are directed to the related Knowledge Article: https://access.redhat.com/articles/2361921. Security Fixes: * A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) Red Hat would like to thank Jann Horn for reporting CVE-2016-4565. Bug Fixes: * When Small Computer System Interface (SCSI) devices were removed or deleted, a system crash could occur due to a race condition between listing all SCSI devices and SCSI device removal. The provided patch ensures that the starting node for the klist_iter_init_node() function is actually a member of the list before using it. As a result, a system crash no longer occurs in the described scenario. (BZ#1333403) * This update offers a reworked series of patches for the resizable hash table (rhashtable) including a number of backported bug fixes and enhancements from upstream. (BZ#1328801) * Previously, the same value of the mperf Model-Specific Register (MSR) read twice in a row could lead to a kernel panic due to the divide-by-zero error. The provided patch fixes this bug, and the kernel now handles two identical values of mperf gracefully. (BZ#1334438) * When a transparent proxy application was running and the number of established connections on the computer exceeded one million, unrelated processes, such as curl or ssh, were unable to bind to a local IP on the box to initiate a connection. The provided patch fixes the cooperation of the REUSEADDR/NOREUSEADDR socket option, and thus prevents the local port from being exhausted. As a result, the aforementioned bug no longer occurs in the described scenario. (BZ#1323960) * Previously, the kernel support for non-local bind for the IPv6 protocol was incomplete. As a consequence, an attempt to bind a socket to an IPv6 address that is not assigned to the host could fail. The provided patch includes changes in the ip_nonlocal_bind variable, which is now set to allow binding to an IPv6 address that is not assigned to the host. As a result, Linux servers are now able to bind to non-local IPv6 addresses as expected. (BZ#1324502) * On some servers with a faster CPU, USB initialization could previously lead to a kernel hang during boot. If this inconvenience occurred when booting the second kernel during the kdump operation, the kdump service failed and the vmcore was lost. The provided upstream patch fixes this bug, and the kernel no longer hangs after USB initialization. (BZ#1327581) * Previously, when running iperf servers using the mlx4_en module, a kernel panic occurred. The underlying source code has been fixed, and the kernel panic no longer occurs in the described scenario. (BZ#1327583) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1297389 - CVE-2015-8767 kernel: SCTP denial of service during timeout 1310570 - CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-327.22.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.22.2.el7.noarch.rpm kernel-doc-3.10.0-327.22.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-headers-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.22.2.el7.x86_64.rpm perf-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-327.22.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.22.2.el7.noarch.rpm kernel-doc-3.10.0-327.22.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-headers-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.22.2.el7.x86_64.rpm perf-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-327.22.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.22.2.el7.noarch.rpm kernel-doc-3.10.0-327.22.2.el7.noarch.rpm ppc64: kernel-3.10.0-327.22.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.22.2.el7.ppc64.rpm kernel-debug-3.10.0-327.22.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.22.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.22.2.el7.ppc64.rpm kernel-devel-3.10.0-327.22.2.el7.ppc64.rpm kernel-headers-3.10.0-327.22.2.el7.ppc64.rpm kernel-tools-3.10.0-327.22.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.22.2.el7.ppc64.rpm perf-3.10.0-327.22.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm python-perf-3.10.0-327.22.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.22.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debug-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.22.2.el7.ppc64le.rpm kernel-devel-3.10.0-327.22.2.el7.ppc64le.rpm kernel-headers-3.10.0-327.22.2.el7.ppc64le.rpm kernel-tools-3.10.0-327.22.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.22.2.el7.ppc64le.rpm perf-3.10.0-327.22.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm python-perf-3.10.0-327.22.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm s390x: kernel-3.10.0-327.22.2.el7.s390x.rpm kernel-debug-3.10.0-327.22.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.s390x.rpm kernel-debug-devel-3.10.0-327.22.2.el7.s390x.rpm kernel-debuginfo-3.10.0-327.22.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.22.2.el7.s390x.rpm kernel-devel-3.10.0-327.22.2.el7.s390x.rpm kernel-headers-3.10.0-327.22.2.el7.s390x.rpm kernel-kdump-3.10.0-327.22.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.22.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.22.2.el7.s390x.rpm perf-3.10.0-327.22.2.el7.s390x.rpm perf-debuginfo-3.10.0-327.22.2.el7.s390x.rpm python-perf-3.10.0-327.22.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.s390x.rpm x86_64: kernel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-headers-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.22.2.el7.x86_64.rpm perf-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.22.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.22.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.22.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.22.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-327.22.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.22.2.el7.noarch.rpm kernel-doc-3.10.0-327.22.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-devel-3.10.0-327.22.2.el7.x86_64.rpm kernel-headers-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.22.2.el7.x86_64.rpm perf-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.22.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.22.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8767 https://access.redhat.com/security/cve/CVE-2016-4565 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2361921 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXbEDgXlSAg2UNWIIRAvBWAJ9pXeUWeiCDIPPUMQjRdcCK6fxe+QCdHftv gttsq2vUbiFmuHlv1uqB4+k= =DZc1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 23 20:07:23 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 23 Jun 2016 20:07:23 +0000 Subject: [RHSA-2016:1296-01] Moderate: ocaml security update Message-ID: <201606232007.u5NK7NuE030470@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ocaml security update Advisory ID: RHSA-2016:1296-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1296 Issue date: 2016-06-23 CVE Names: CVE-2015-8869 ===================================================================== 1. Summary: An update for ocaml is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es): * OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign-extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1332090 - CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: ocaml-4.01.0-22.7.el7_2.src.rpm x86_64: ocaml-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.x86_64.rpm ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: ocaml-4.01.0-22.7.el7_2.src.rpm x86_64: ocaml-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.x86_64.rpm ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: ocaml-4.01.0-22.7.el7_2.src.rpm ppc64: ocaml-4.01.0-22.7.el7_2.ppc64.rpm ocaml-camlp4-4.01.0-22.7.el7_2.ppc64.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.ppc64.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.ppc64.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.ppc64.rpm ocaml-docs-4.01.0-22.7.el7_2.ppc64.rpm ocaml-emacs-4.01.0-22.7.el7_2.ppc64.rpm ocaml-labltk-4.01.0-22.7.el7_2.ppc64.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.ppc64.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.ppc64.rpm ocaml-runtime-4.01.0-22.7.el7_2.ppc64.rpm ocaml-source-4.01.0-22.7.el7_2.ppc64.rpm ocaml-x11-4.01.0-22.7.el7_2.ppc64.rpm ppc64le: ocaml-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-camlp4-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-docs-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-emacs-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-labltk-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-runtime-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-source-4.01.0-22.7.el7_2.ppc64le.rpm ocaml-x11-4.01.0-22.7.el7_2.ppc64le.rpm s390x: ocaml-4.01.0-22.7.el7_2.s390x.rpm ocaml-camlp4-4.01.0-22.7.el7_2.s390x.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.s390x.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.s390x.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.s390x.rpm ocaml-docs-4.01.0-22.7.el7_2.s390x.rpm ocaml-emacs-4.01.0-22.7.el7_2.s390x.rpm ocaml-labltk-4.01.0-22.7.el7_2.s390x.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.s390x.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.s390x.rpm ocaml-runtime-4.01.0-22.7.el7_2.s390x.rpm ocaml-source-4.01.0-22.7.el7_2.s390x.rpm ocaml-x11-4.01.0-22.7.el7_2.s390x.rpm x86_64: ocaml-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.x86_64.rpm ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): Source: ocaml-4.01.0-22.7.el7_2.src.rpm x86_64: ocaml-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-debuginfo-4.01.0-22.7.el7_2.x86_64.rpm ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8869 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXbEFFXlSAg2UNWIIRAs92AKChir6K9yzmb4pqiONlCyjpFTvqcACePv55 MenhYSW4Y0bnpnjmo3U5Xws= =/nKN -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jun 23 20:08:45 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 23 Jun 2016 20:08:45 +0000 Subject: [RHSA-2016:1301-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <201606232008.u5NK8jcW020460@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2016:1301-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1301 Issue date: 2016-06-23 CVE Names: CVE-2015-8767 CVE-2016-3707 CVE-2016-4565 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a newer upstream version: kernel-rt (3.10.0-327.22.1). This version provides a number of bug fixes and enhancements, including: * [netdrv] ixgbevf: fix spoofed packets with random MAC and use ether_addr_copy instead of memcpy * [mm] mmu_notifier: fix memory corruption * [mm] hugetlbfs: optimize when NUMA=n * [mm] optimize put_mems_allowed() usage * [x86] mm: suitable memory should go to ZONE_MOVABLE * [fs] xfs: fix splice/direct-IO deadlock * [acpi] tables: Add acpi_subtable_proc to ACPI table parsers * [acpi] table: Add new function to get table entries * [net] ipv6: Nonlocal bind * [net] ipv4: bind ip_nonlocal_bind to current netns (BZ#1335747) Security Fix(es): * A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) * A flaw was found in the way the realtime kernel processed specially crafted ICMP echo requests. A remote attacker could use this flaw to trigger a sysrql function based on values in the ICMP packet, allowing them to remotely restart the system. Note that this feature is not enabled by default and requires elevated privileges to be configured. (CVE-2016-3707, Moderate) Red Hat would like to thank Jann Horn for reporting CVE-2016-4565. Bug Fix(es): * Previously, configuration changes to the Hewlett Packard Smart Array (HPSA) driver during I/O operations could set the phys_disk pointer to NULL. Consequently, kernel oops could occur while the HPSA driver was submitting ioaccel2 commands. An upstream patch has been provided to fix this bug, and the oops in the hpsa_scsi_ioaccel_raid_map() function no longer occurs. (BZ#1335411) * In a previous code update one extra spin_lock operation was left untouched. Consequently, a deadlock could occur when looping through cache pages. With this update, the extra lock operation has been removed from the source code and the deadlock no longer occurs in the described situation. (BZ#1327073) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1297389 - CVE-2015-8767 kernel: SCTP denial of service during timeout 1310570 - CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko 1327073 - deadlock in fscache code (merge error) 1327484 - CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request 1334459 - rt: Use IPI to trigger RT task push migration instead of pulling 1335747 - kernel-rt: update to the RHEL7.2.z batch#5 source tree 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-327.22.2.rt56.230.el7_2.src.rpm noarch: kernel-rt-doc-3.10.0-327.22.2.rt56.230.el7_2.noarch.rpm x86_64: kernel-rt-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-kvm-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-devel-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-kvm-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-kvm-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-327.22.2.rt56.230.el7_2.src.rpm noarch: kernel-rt-doc-3.10.0-327.22.2.rt56.230.el7_2.noarch.rpm x86_64: kernel-rt-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-devel-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.22.2.rt56.230.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8767 https://access.redhat.com/security/cve/CVE-2016-3707 https://access.redhat.com/security/cve/CVE-2016-4565 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXbEGKXlSAg2UNWIIRApryAJ9yae6BE4tOcsTMSQ6a98gExb1cCgCcD17S OsYAqueNRn2U5OyUTWkaruY= =5bru -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jun 27 11:02:58 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 27 Jun 2016 11:02:58 +0000 Subject: [RHSA-2016:1341-01] Important: kernel-rt security and bug fix update Message-ID: <201606271102.u5RB2wsc023443@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2016:1341-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://access.redhat.com/errata/RHSA-2016:1341 Issue date: 2016-06-27 CVE Names: CVE-2015-8767 CVE-2016-3707 CVE-2016-4565 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt package contain the Linux kernel, the core of any Linux operating system. This update provides a build of the kernel-rt package for Red Hat Enterprise MRG 2.5 that is layered on Red Hat Enterprise Linux 6, and provides a number of bug fixes including: * [netdrv] ixgbevf: fix spoofed packets with random MAC and use ether_addr_copy instead of memcpy * [mm] mmu_notifier: fix memory corruption * [mm] hugetlbfs: optimize when NUMA=n * [mm] optimize put_mems_allowed() usage * [x86] mm: suitable memory should go to ZONE_MOVABLE * [fs] xfs: fix splice/direct-IO deadlock * [acpi] tables: Add acpi_subtable_proc to ACPI table parsers * [acpi] table: Add new function to get table entries * [net] ipv6: Nonlocal bind * [net] ipv4: bind ip_nonlocal_bind to current netns (BZ#1332298) Security Fix(es): * A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) * A flaw was found in the way the realtime kernel processed specially crafted ICMP echo requests. A remote attacker could use this flaw to trigger a sysrql function based on values in the ICMP packet, allowing them to remotely restart the system. Note that this feature is not enabled by default and requires elevated privileges to be configured. (CVE-2016-3707, Moderate) Red Hat would like to thank Jann Horn for reporting CVE-2016-4565. Bug Fix(es): * An oops can occur in the hpsa driver while submitting ioaccel2 commands when the phys_disk pointer is NULL (in hpsa_scsi_ioaccel_raid_map). Configuration changes during I/O operations could set the phys_disk pointer to NULL. In this case, send the command down the RAID path for correct processing, avoiding the oops. (BZ#1334260) * A faulty code merge left an extra spin_lock operation in the function fscache_invalidate_write(). The code has been correctly updated to remove this extra lock operation, which avoids a potential deadlock situation when looping through cache pages. (BZ#1327730) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1297389 - CVE-2015-8767 kernel: SCTP denial of service during timeout 1310570 - CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko 1327484 - CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request 1327730 - deadlock in fscache code (merge error) [mrg] 1332298 - update the MRG 2.5.z 3.10 kernel-rt sources 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-327.rt56.190.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-327.rt56.190.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-327.rt56.190.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8767 https://access.redhat.com/security/cve/CVE-2016-3707 https://access.redhat.com/security/cve/CVE-2016-4565 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXcQfQXlSAg2UNWIIRAjocAKCvUruegc7nqohWFCdf7UNDMmJrOwCfU7XX a6yPiq8mmURXlq4DK7n1N/A= =cKhL -----END PGP SIGNATURE-----