From bugzilla at redhat.com Thu Sep 1 14:00:02 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 1 Sep 2016 10:00:02 -0400 Subject: [RHSA-2016:1797-01] Moderate: ipa security update Message-ID: <201609011400.u81E027k008471@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ipa security update Advisory ID: RHSA-2016:1797-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1797.html Issue date: 2016-09-01 CVE Names: CVE-2016-5404 ===================================================================== 1. Summary: An update for ipa is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * An insufficient permission check issue was found in the way IPA server treats certificate revocation requests. An attacker logged in with the 'retrieve certificate' permission enabled could use this flaw to revoke certificates, possibly triggering a denial of service attack. (CVE-2016-5404) This issue was discovered by Fraser Tweedale (Red Hat). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1351593 - CVE-2016-5404 ipa: Insufficient privileges check in certificate revocation 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ipa-3.0.0-50.el6_8.2.src.rpm i386: ipa-client-3.0.0-50.el6_8.2.i686.rpm ipa-debuginfo-3.0.0-50.el6_8.2.i686.rpm ipa-python-3.0.0-50.el6_8.2.i686.rpm x86_64: ipa-client-3.0.0-50.el6_8.2.x86_64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.x86_64.rpm ipa-python-3.0.0-50.el6_8.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: ipa-admintools-3.0.0-50.el6_8.2.i686.rpm ipa-debuginfo-3.0.0-50.el6_8.2.i686.rpm ipa-server-3.0.0-50.el6_8.2.i686.rpm ipa-server-selinux-3.0.0-50.el6_8.2.i686.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.i686.rpm x86_64: ipa-admintools-3.0.0-50.el6_8.2.x86_64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-selinux-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ipa-3.0.0-50.el6_8.2.src.rpm x86_64: ipa-client-3.0.0-50.el6_8.2.x86_64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.x86_64.rpm ipa-python-3.0.0-50.el6_8.2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: ipa-admintools-3.0.0-50.el6_8.2.x86_64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-selinux-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ipa-3.0.0-50.el6_8.2.src.rpm i386: ipa-admintools-3.0.0-50.el6_8.2.i686.rpm ipa-client-3.0.0-50.el6_8.2.i686.rpm ipa-debuginfo-3.0.0-50.el6_8.2.i686.rpm ipa-python-3.0.0-50.el6_8.2.i686.rpm ipa-server-3.0.0-50.el6_8.2.i686.rpm ipa-server-selinux-3.0.0-50.el6_8.2.i686.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.i686.rpm ppc64: ipa-admintools-3.0.0-50.el6_8.2.ppc64.rpm ipa-client-3.0.0-50.el6_8.2.ppc64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.ppc64.rpm ipa-python-3.0.0-50.el6_8.2.ppc64.rpm s390x: ipa-admintools-3.0.0-50.el6_8.2.s390x.rpm ipa-client-3.0.0-50.el6_8.2.s390x.rpm ipa-debuginfo-3.0.0-50.el6_8.2.s390x.rpm ipa-python-3.0.0-50.el6_8.2.s390x.rpm x86_64: ipa-admintools-3.0.0-50.el6_8.2.x86_64.rpm ipa-client-3.0.0-50.el6_8.2.x86_64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.x86_64.rpm ipa-python-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-selinux-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ipa-3.0.0-50.el6_8.2.src.rpm i386: ipa-admintools-3.0.0-50.el6_8.2.i686.rpm ipa-client-3.0.0-50.el6_8.2.i686.rpm ipa-debuginfo-3.0.0-50.el6_8.2.i686.rpm ipa-python-3.0.0-50.el6_8.2.i686.rpm ipa-server-3.0.0-50.el6_8.2.i686.rpm ipa-server-selinux-3.0.0-50.el6_8.2.i686.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.i686.rpm x86_64: ipa-admintools-3.0.0-50.el6_8.2.x86_64.rpm ipa-client-3.0.0-50.el6_8.2.x86_64.rpm ipa-debuginfo-3.0.0-50.el6_8.2.x86_64.rpm ipa-python-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-selinux-3.0.0-50.el6_8.2.x86_64.rpm ipa-server-trust-ad-3.0.0-50.el6_8.2.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: ipa-4.2.0-15.el7_2.19.src.rpm x86_64: ipa-client-4.2.0-15.el7_2.19.x86_64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.x86_64.rpm ipa-python-4.2.0-15.el7_2.19.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: ipa-admintools-4.2.0-15.el7_2.19.x86_64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-dns-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-trust-ad-4.2.0-15.el7_2.19.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: ipa-4.2.0-15.el7_2.19.src.rpm x86_64: ipa-client-4.2.0-15.el7_2.19.x86_64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.x86_64.rpm ipa-python-4.2.0-15.el7_2.19.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: ipa-admintools-4.2.0-15.el7_2.19.x86_64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-dns-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-trust-ad-4.2.0-15.el7_2.19.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: ipa-4.2.0-15.el7_2.19.src.rpm ppc64: ipa-admintools-4.2.0-15.el7_2.19.ppc64.rpm ipa-client-4.2.0-15.el7_2.19.ppc64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.ppc64.rpm ipa-python-4.2.0-15.el7_2.19.ppc64.rpm ppc64le: ipa-admintools-4.2.0-15.el7_2.19.ppc64le.rpm ipa-client-4.2.0-15.el7_2.19.ppc64le.rpm ipa-debuginfo-4.2.0-15.el7_2.19.ppc64le.rpm ipa-python-4.2.0-15.el7_2.19.ppc64le.rpm s390x: ipa-admintools-4.2.0-15.el7_2.19.s390x.rpm ipa-client-4.2.0-15.el7_2.19.s390x.rpm ipa-debuginfo-4.2.0-15.el7_2.19.s390x.rpm ipa-python-4.2.0-15.el7_2.19.s390x.rpm x86_64: ipa-admintools-4.2.0-15.el7_2.19.x86_64.rpm ipa-client-4.2.0-15.el7_2.19.x86_64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.x86_64.rpm ipa-python-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-dns-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-trust-ad-4.2.0-15.el7_2.19.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: ipa-4.2.0-15.el7_2.19.src.rpm x86_64: ipa-admintools-4.2.0-15.el7_2.19.x86_64.rpm ipa-client-4.2.0-15.el7_2.19.x86_64.rpm ipa-debuginfo-4.2.0-15.el7_2.19.x86_64.rpm ipa-python-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-dns-4.2.0-15.el7_2.19.x86_64.rpm ipa-server-trust-ad-4.2.0-15.el7_2.19.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5404 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXyDRgXlSAg2UNWIIRAtzpAJwMIg5Nc5t3W9O5zWOG1XopXFyDrQCgrZH7 bmB6xnt/KwN4jSxxVU4hEYg= =NfFl -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 5 14:20:10 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 5 Sep 2016 14:20:10 +0000 Subject: [RHSA-2016:1809-01] Important: thunderbird security update Message-ID: <201609051420.u85EKA3L012820@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: thunderbird security update Advisory ID: RHSA-2016:1809-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1809.html Issue date: 2016-09-05 CVE Names: CVE-2016-2836 ===================================================================== 1. Summary: An update for thunderbird is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 45.3.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2836) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Carsten Book, Christian Holler, Gary Kwong, Jesse Ruderman, Andrew McCreight, Phil Ringnalda, and Philipp as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of Thunderbird must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1361974 - CVE-2016-2836 Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: thunderbird-45.3.0-1.el5_11.src.rpm i386: thunderbird-45.3.0-1.el5_11.i386.rpm thunderbird-debuginfo-45.3.0-1.el5_11.i386.rpm x86_64: thunderbird-45.3.0-1.el5_11.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server): Source: thunderbird-45.3.0-1.el5_11.src.rpm i386: thunderbird-45.3.0-1.el5_11.i386.rpm thunderbird-debuginfo-45.3.0-1.el5_11.i386.rpm x86_64: thunderbird-45.3.0-1.el5_11.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: thunderbird-45.3.0-1.el6_8.src.rpm i386: thunderbird-45.3.0-1.el6_8.i686.rpm thunderbird-debuginfo-45.3.0-1.el6_8.i686.rpm x86_64: thunderbird-45.3.0-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: thunderbird-45.3.0-1.el6_8.src.rpm i386: thunderbird-45.3.0-1.el6_8.i686.rpm thunderbird-debuginfo-45.3.0-1.el6_8.i686.rpm ppc64: thunderbird-45.3.0-1.el6_8.ppc64.rpm thunderbird-debuginfo-45.3.0-1.el6_8.ppc64.rpm s390x: thunderbird-45.3.0-1.el6_8.s390x.rpm thunderbird-debuginfo-45.3.0-1.el6_8.s390x.rpm x86_64: thunderbird-45.3.0-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: thunderbird-45.3.0-1.el6_8.src.rpm i386: thunderbird-45.3.0-1.el6_8.i686.rpm thunderbird-debuginfo-45.3.0-1.el6_8.i686.rpm x86_64: thunderbird-45.3.0-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: thunderbird-45.3.0-1.el7_2.src.rpm x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: thunderbird-45.3.0-1.el7_2.src.rpm ppc64le: thunderbird-45.3.0-1.el7_2.ppc64le.rpm thunderbird-debuginfo-45.3.0-1.el7_2.ppc64le.rpm x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: thunderbird-45.3.0-1.el7_2.src.rpm x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2836 https://access.redhat.com/security/updates/classification/#important https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird45.3 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXzX73XlSAg2UNWIIRAr0DAJ4jYgMmIzytoqrr6RdIDjMOKrCJwQCffOgE 28o5fH/E4ww1kZ/ZZbp+1sA= =awNN -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 6 10:29:34 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Sep 2016 10:29:34 +0000 Subject: [RHSA-2016:1814-01] Important: kernel security and bug fix update Message-ID: <201609061028.u86ASLmk026136@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1814-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1814.html Issue date: 2016-09-06 CVE Names: CVE-2016-4565 CVE-2016-5696 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) * It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important) Red Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696. Bug Fix(es): * After upgrading the kernel, CPU load average increased compared to the prior kernel version due to the modification of the scheduler. The provided patchset makes the calculation algorithm of this load average roll back to the status of the previous system version thus resulting in relatively lower values in the same system load. (BZ#1343010) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1310570 - CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko 1354708 - CVE-2016-5696 kernel: challenge ACK counter information disclosure. 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.73.2.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.73.2.el6.noarch.rpm kernel-doc-2.6.32-431.73.2.el6.noarch.rpm kernel-firmware-2.6.32-431.73.2.el6.noarch.rpm x86_64: kernel-2.6.32-431.73.2.el6.x86_64.rpm kernel-debug-2.6.32-431.73.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.73.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.73.2.el6.x86_64.rpm kernel-devel-2.6.32-431.73.2.el6.x86_64.rpm kernel-headers-2.6.32-431.73.2.el6.x86_64.rpm perf-2.6.32-431.73.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.73.2.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.73.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm python-perf-2.6.32-431.73.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4565 https://access.redhat.com/security/cve/CVE-2016-5696 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXzposXlSAg2UNWIIRAuybAJ9MRx+JVA3tCu9So5+54xN1wLmRuACgnG/+ kDtW5FKASUKGhg7izUPYaow= =Ds79 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 6 10:30:13 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 6 Sep 2016 10:30:13 +0000 Subject: [RHSA-2016:1815-01] Important: kernel security and bug fix update Message-ID: <201609061029.u86AT1aY009166@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1815-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1815.html Issue date: 2016-09-06 CVE Names: CVE-2016-5696 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important) Red Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue. Bug Fix(es): * When an interrupt request occurred and the new API was scheduled on a different CPU, the enic driver previously generated a warning message. This behavior was caused by a race condition between the vnic_intr_unmask() function and the enic_poll_unlock_napi() function. This update fixes the napi_poll() function to unlock before unmasking the interrupt. As a result, the warning message no longer occurs in the described situation. (BZ#1351192) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1354708 - CVE-2016-5696 kernel: challenge ACK counter information disclosure. 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.7): Source: kernel-2.6.32-573.34.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-573.34.1.el6.noarch.rpm kernel-doc-2.6.32-573.34.1.el6.noarch.rpm kernel-firmware-2.6.32-573.34.1.el6.noarch.rpm x86_64: kernel-2.6.32-573.34.1.el6.x86_64.rpm kernel-debug-2.6.32-573.34.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.34.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.34.1.el6.x86_64.rpm kernel-devel-2.6.32-573.34.1.el6.x86_64.rpm kernel-headers-2.6.32-573.34.1.el6.x86_64.rpm perf-2.6.32-573.34.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7): x86_64: kernel-debug-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.34.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm python-perf-2.6.32-573.34.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.7): Source: kernel-2.6.32-573.34.1.el6.src.rpm i386: kernel-2.6.32-573.34.1.el6.i686.rpm kernel-debug-2.6.32-573.34.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.34.1.el6.i686.rpm kernel-devel-2.6.32-573.34.1.el6.i686.rpm kernel-headers-2.6.32-573.34.1.el6.i686.rpm perf-2.6.32-573.34.1.el6.i686.rpm perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.34.1.el6.noarch.rpm kernel-doc-2.6.32-573.34.1.el6.noarch.rpm kernel-firmware-2.6.32-573.34.1.el6.noarch.rpm ppc64: kernel-2.6.32-573.34.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-573.34.1.el6.ppc64.rpm kernel-debug-2.6.32-573.34.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-573.34.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.34.1.el6.ppc64.rpm kernel-devel-2.6.32-573.34.1.el6.ppc64.rpm kernel-headers-2.6.32-573.34.1.el6.ppc64.rpm perf-2.6.32-573.34.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm s390x: kernel-2.6.32-573.34.1.el6.s390x.rpm kernel-debug-2.6.32-573.34.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.s390x.rpm kernel-debug-devel-2.6.32-573.34.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.34.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.34.1.el6.s390x.rpm kernel-devel-2.6.32-573.34.1.el6.s390x.rpm kernel-headers-2.6.32-573.34.1.el6.s390x.rpm kernel-kdump-2.6.32-573.34.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.34.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-573.34.1.el6.s390x.rpm perf-2.6.32-573.34.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.34.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.s390x.rpm x86_64: kernel-2.6.32-573.34.1.el6.x86_64.rpm kernel-debug-2.6.32-573.34.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.34.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.34.1.el6.x86_64.rpm kernel-devel-2.6.32-573.34.1.el6.x86_64.rpm kernel-headers-2.6.32-573.34.1.el6.x86_64.rpm perf-2.6.32-573.34.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.7): i386: kernel-debug-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.34.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.34.1.el6.i686.rpm perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm python-perf-2.6.32-573.34.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.34.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm python-perf-2.6.32-573.34.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-573.34.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.34.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.34.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.34.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.34.1.el6.s390x.rpm python-perf-2.6.32-573.34.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.34.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm python-perf-2.6.32-573.34.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.34.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5696 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXzppjXlSAg2UNWIIRAiA0AKCVdRUYjCaWTlTsVHeDOceuheWKfACeMVp4 ilC0zfgs5Wb2ZQGWgDcKsU8= =E4Y9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 7 09:57:59 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Sep 2016 09:57:59 +0000 Subject: [RHSA-2016:1821-01] Moderate: rh-postgresql95-postgresql security update Message-ID: <201609070958.u879vxKN012670@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-postgresql95-postgresql security update Advisory ID: RHSA-2016:1821-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1821.html Issue date: 2016-09-07 CVE Names: CVE-2016-5423 CVE-2016-5424 ===================================================================== 1. Summary: An update for rh-postgresql95-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a newer upstream version: rh-postgresql95-postgresql (9.5.4) Security Fix(es): * A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code. (CVE-2016-5423) * A flaw was found in the way PostgreSQL client programs handled database and role names containing newlines, carriage returns, double quotes, or backslashes. By crafting such an object name, roles with the CREATEDB or CREATEROLE option could escalate their privileges to superuser when a superuser next executes maintenance with a vulnerable client program. (CVE-2016-5424) Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Heikki Linnakangas as the original reporter of CVE-2016-5423; and Nathan Bossart as the original reporter of CVE-2016-5424. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 If the postgresql service is running, it will be automatically restarted after installing this update. 5. Bugs fixed (https://bugzilla.redhat.com/): 1364001 - CVE-2016-5423 postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference 1364002 - CVE-2016-5424 postgresql: privilege escalation via crafted database and role names 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: rh-postgresql95-postgresql-9.5.4-1.el6.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: rh-postgresql95-postgresql-9.5.4-1.el6.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: rh-postgresql95-postgresql-9.5.4-1.el6.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: rh-postgresql95-postgresql-9.5.4-1.el6.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el6.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-postgresql95-postgresql-9.5.4-1.el7.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: rh-postgresql95-postgresql-9.5.4-1.el7.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: rh-postgresql95-postgresql-9.5.4-1.el7.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-postgresql95-postgresql-9.5.4-1.el7.src.rpm x86_64: rh-postgresql95-postgresql-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-contrib-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-debuginfo-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-devel-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-docs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-libs-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plperl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-plpython-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-pltcl-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-server-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-static-9.5.4-1.el7.x86_64.rpm rh-postgresql95-postgresql-test-9.5.4-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5423 https://access.redhat.com/security/cve/CVE-2016-5424 https://access.redhat.com/security/updates/classification/#moderate https://www.postgresql.org/about/news/1688/ https://www.postgresql.org/docs/current/static/release-9-5-4.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXz+SOXlSAg2UNWIIRAtftAKC02z2IUxUTlMtyGuFnMOYLWiCeywCgkKJP IlkkpUOYc/n5rnp4GfrrHc4= =tVlu -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 7 10:32:11 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 7 Sep 2016 10:32:11 +0000 Subject: [RHSA-2016:1820-01] Moderate: postgresql92-postgresql security update Message-ID: <201609071032.u87AWCbJ005012@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: postgresql92-postgresql security update Advisory ID: RHSA-2016:1820-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1820.html Issue date: 2016-09-07 CVE Names: CVE-2016-5423 CVE-2016-5424 ===================================================================== 1. Summary: An update for postgresql92-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a newer upstream version: postgresql92-postgresql (9.2.18) Security Fix(es): * A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code. (CVE-2016-5423) * A flaw was found in the way PostgreSQL client programs handled database and role names containing newlines, carriage returns, double quotes, or backslashes. By crafting such an object name, roles with the CREATEDB or CREATEROLE option could escalate their privileges to superuser when a superuser next executes maintenance with a vulnerable client program. (CVE-2016-5424) Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Heikki Linnakangas as the original reporter of CVE-2016-5423; and Nathan Bossart as the original reporter of CVE-2016-5424. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 If the postgresql service is running, it will be automatically restarted after installing this update. 5. Bugs fixed (https://bugzilla.redhat.com/): 1364001 - CVE-2016-5423 postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference 1364002 - CVE-2016-5424 postgresql: privilege escalation via crafted database and role names 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: postgresql92-postgresql-9.2.18-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: postgresql92-postgresql-9.2.18-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: postgresql92-postgresql-9.2.18-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: postgresql92-postgresql-9.2.18-1.el6.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el6.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: postgresql92-postgresql-9.2.18-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: postgresql92-postgresql-9.2.18-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: postgresql92-postgresql-9.2.18-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: postgresql92-postgresql-9.2.18-1.el7.src.rpm x86_64: postgresql92-postgresql-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-contrib-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-debuginfo-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-devel-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-docs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-libs-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plperl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-plpython-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-pltcl-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-server-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-test-9.2.18-1.el7.x86_64.rpm postgresql92-postgresql-upgrade-9.2.18-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5423 https://access.redhat.com/security/cve/CVE-2016-5424 https://access.redhat.com/security/updates/classification/#moderate https://www.postgresql.org/about/news/1688/ https://www.postgresql.org/docs/current/static/release-9-2-18.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXz+yMXlSAg2UNWIIRAio2AJ9QJAkkfobfVa+pqMfO2+dkFNh4zwCeIOZg NOJluHN9Hcj6/1Yka9aFfD4= =hzgb -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 8 16:26:17 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 8 Sep 2016 16:26:17 +0000 Subject: [RHSA-2016:1836-01] Moderate: Red Hat OpenShift Enterprise Kibana security update Message-ID: <201609081626.u88GQHUM014913@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenShift Enterprise Kibana security update Advisory ID: RHSA-2016:1836-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2016:1836 Issue date: 2016-09-08 ===================================================================== 1. Summary: An update for Red Hat OpenShift Enterprise Kibana images is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise 3.1 - noarch, x86_64 Red Hat OpenShift Enterprise 3.2 - noarch, x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Security Fix(es): * A flaw was found in Kibana's logging functionality. If custom logging output was configured in Kibana, private user data could be written to the Kibana log files. A system attacker could use this data to hijack sessions of other users when using Kibana behind some form of authentication such as Shield. * A cross-site scripting (XSS) flaw was found in Kibana. A remote attacker could use this flaw to inject arbitrary web script into pages served to other users. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 The following images are included in this errata: openshift3/logging-kibana:3.1.1-10 openshift3/logging-elasticsearch:3.1.1-14 openshift3/logging-kibana:3.2.1-5 openshift3/logging-elasticsearch:3.2.1-7 5. Bugs fixed (https://bugzilla.redhat.com/): 1364389 - kibana: XSS vulnerability 1364394 - kibana: Session hijack via stealing cookies and auth headers from log 6. Package List: Red Hat OpenShift Enterprise 3.1: Source: kibana-4.1.11-1.el7.src.rpm openshift-elasticsearch-plugin-0.16.0.redhat_1-1.el7.src.rpm noarch: openshift-elasticsearch-plugin-0.16.0.redhat_1-1.el7.noarch.rpm x86_64: kibana-4.1.11-1.el7.x86_64.rpm kibana-debuginfo-4.1.11-1.el7.x86_64.rpm Red Hat OpenShift Enterprise 3.2: Source: kibana-4.1.11-1.el7.src.rpm openshift-elasticsearch-plugin-0.16.0.redhat_1-1.el7.src.rpm noarch: openshift-elasticsearch-plugin-0.16.0.redhat_1-1.el7.noarch.rpm x86_64: kibana-4.1.11-1.el7.x86_64.rpm kibana-debuginfo-4.1.11-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX0ZEgXlSAg2UNWIIRAiE+AJ46vz5Jo5yLR2y7TdOEhUMjwqkNsgCcDwiL k1FicvFYFudR0nOZ47fNlGw= =hSkW -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 12 19:14:31 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Sep 2016 19:14:31 +0000 Subject: [RHSA-2016:1852-01] Important: Red Hat OpenShift Enterprise 3.1 security update Message-ID: <201609121914.u8CJEVlm007121@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Enterprise 3.1 security update Advisory ID: RHSA-2016:1852-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2016:1852 Issue date: 2016-09-12 CVE Names: CVE-2016-5418 ===================================================================== 1. Summary: An update for Red Hat OpenShift Enterprise 3.1 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise 3.1 - x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Security Fix(es): * A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418) Red Hat would like to thank Insomnia Security for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The following images are included in this errata: openshift3/openvswitch:v3.1.1.7 openshift3/ose-pod:v3.1.1.7 openshift3/ose:v3.1.1.7 openshift3/ose-docker-registry:v3.1.1.7 openshift3/ose-keepalived-ipfailover:v3.1.1.7 openshift3/ose-recycler:v3.1.1.7 openshift3/ose-f5-router:v3.1.1.7 openshift3/ose-deployer:v3.1.1.7 openshift3/node:v3.1.1.7 openshift3/ose-sti-builder:v3.1.1.7 openshift3/ose-docker-builder:v3.1.1.7 openshift3/ose-haproxy-router:v3.1.1.7 5. Package List: Red Hat OpenShift Enterprise 3.1: Source: atomic-openshift-3.1.1.7-1.git.0.65f396b.el7aos.src.rpm x86_64: atomic-openshift-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-clients-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-clients-redistributable-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-dockerregistry-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-master-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-node-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-pod-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-recycle-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm atomic-openshift-sdn-ovs-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm tuned-profiles-atomic-openshift-node-3.1.1.7-1.git.0.65f396b.el7aos.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 6. References: https://access.redhat.com/security/cve/CVE-2016-5418 https://access.redhat.com/security/updates/classification/#important 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1v6PXlSAg2UNWIIRAl+UAJ93KBaeMJ7x1g9M8Kmx7HD/zPpZagCdFRwM 9VJNvChhErG1DKP+kW7VlMg= =IX/9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 12 19:14:56 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Sep 2016 19:14:56 +0000 Subject: [RHSA-2016:1853-01] Important: Red Hat OpenShift Enterprise 3.2 security update and bug fix update Message-ID: <201609121914.u8CJEvdp001191@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Enterprise 3.2 security update and bug fix update Advisory ID: RHSA-2016:1853-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2016:1853 Issue date: 2016-09-12 CVE Names: CVE-2016-5418 ===================================================================== 1. Summary: An update for atomic-openshift and heapster is now available for Red Hat OpenShift Enterprise 3.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise 3.2 - noarch, x86_64 3. Description: OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Security Fix(es): * When processing an archive file that contains an archive entry with type 1 (hardlink) but also having a non-zero data size a file overwrite can occur. This would allow an attacker that can pass data to an application that uses libarchive to unpack it to overwrite arbitrary files with arbitrary data. (CVE-2016-5418) Red Hat would like to thank Insomnia Security for reporting this issue. This update also fixes the following bugs: * Previously, pods that had a resource request of 0 and specified limits were classified as BestEffort when they should have been classified as Burstable. This bug fix ensures that those pods are correctly classified as Burstable.(BZ#1357475) * Future versions of docker will require containerized installations of OpenShift Container Platform to mount /var/lib/origin with the `rslave` flag. New installations of OpenShift Container Platform 3.2 have this value set. However, upgrades from 3.1 did not properly set this value. This bug fix ensures that this flag is now set during upgrades, ensuring that OpenShift Container Platform works properly under future versions of docker. (BZ#1358197) * The PersistentVolumeLabel admission plug-in is now enabled by default. This plug-in labels AWS and GCE volumes with their zone so the scheduler can limit the nodes for a pod to only those in the same zone as the persistent volumes being used by the pod. (BZ#1365600) * Previously, heapster incorrectly generated error messages indicating that it "Failed to find node". This bug fix corrects that error and ensures that erroneous warnings are generated.(BZ#1366367) * The deployment controllers' resync interval can now be configured. The previously hard-coded 2-minute default is the likely cause of performance regressions when thousands of deploymentconfigs are present in the system. Increase the resync interval by setting deploymentControllerResyncMinute in /etc/origin/master/master-config.yaml.(BZ#1366381) * Previously, AWS-related environment variables were removed from /etc/sysconfig/atomic-openshift-master files during an upgrade if these values were not included in the advanced installer's inventory file. This bug fix ensures that these variables are now preserved during upgrades. (BZ#1370641) * Previously, updates to the containerized atomic-openshift-node service were not properly reloaded during upgrades. This bug fix corrects this error and ensures that the service is reloaded during upgrades. (BZ#1371708) * Previously the installer did not properly configure an environment for flannel when openshift_use_flannel was set to `true`. This bug fix corrects those errors and the installer will now correctly deploy environments using flannel. (BZ#1372026) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The following images are included in this errata : openshift3/openvswitch:v3.2.1.15 openshift3/ose-pod:v3.2.1.15 openshift3/ose:v3.2.1.15 openshift3/ose-docker-registry:v3.2.1.15 openshift3/ose-keepalived-ipfailover:v3.2.1.15 openshift3/ose-recycler:v3.2.1.15 openshift3/ose-f5-router:v3.2.1.15 openshift3/ose-deployer:v3.2.1.15 openshift3/node:v3.2.1.15 openshift3/ose-sti-builder:v3.2.1.15 openshift3/ose-docker-builder:v3.2.1.15 openshift3/ose-haproxy-router:v3.2.1.15 openshift3/metrics-heapster:3.2.1-4 5. Bugs fixed (https://bugzilla.redhat.com/): 1357475 - Pod QoS Tier are different between OpenShift 3.2 and 3.3 1358197 - docker's per-mount propagation mode wasn't turn on after upgrade 1365600 - Volume affinity in OCP 3.2 1366367 - Heapster "Failed to find node" warning and verbose logging 1366381 - [ocp3.2.1] deployments and scale up/down are very, very slow 1370641 - Upgrade from 3.1 to 3.2 overwrites AWS variables in /etc/sysconfig/atomic-openshift-master-* 1371708 - atomic-openshift-node service wasn't reload on containerized env. 1372026 - openshift_use_flannel=true does not work properly 6. Package List: Red Hat OpenShift Enterprise 3.2: Source: atomic-openshift-3.2.1.15-1.git.0.d84be7f.el7.src.rpm heapster-1.1.0-1.beta2.el7.1.src.rpm openshift-ansible-3.2.28-1.git.0.5a85fc5.el7.src.rpm noarch: atomic-openshift-utils-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm openshift-ansible-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm openshift-ansible-docs-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm openshift-ansible-filter-plugins-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm openshift-ansible-lookup-plugins-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm openshift-ansible-playbooks-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm openshift-ansible-roles-3.2.28-1.git.0.5a85fc5.el7.noarch.rpm x86_64: atomic-openshift-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-clients-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-clients-redistributable-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-dockerregistry-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-master-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-node-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-pod-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-recycle-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-sdn-ovs-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm atomic-openshift-tests-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm heapster-1.1.0-1.beta2.el7.1.x86_64.rpm tuned-profiles-atomic-openshift-node-3.2.1.15-1.git.0.d84be7f.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5418 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1v6fXlSAg2UNWIIRAvbAAKC6BJtJfOnHdVFYSA/35fCykCp7GgCcDb1V PpZ3NXDMRufi0djHizYJoqc= =obun -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 12 19:59:39 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Sep 2016 19:59:39 +0000 Subject: [RHSA-2016:1854-01] Important: chromium-browser security update Message-ID: <201609121959.u8CJxeIq020360@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2016:1854-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1854.html Issue date: 2016-09-12 CVE Names: CVE-2016-5147 CVE-2016-5148 CVE-2016-5149 CVE-2016-5150 CVE-2016-5151 CVE-2016-5152 CVE-2016-5153 CVE-2016-5154 CVE-2016-5155 CVE-2016-5156 CVE-2016-5157 CVE-2016-5158 CVE-2016-5159 CVE-2016-5160 CVE-2016-5161 CVE-2016-5162 CVE-2016-5163 CVE-2016-5164 CVE-2016-5165 CVE-2016-5166 CVE-2016-5167 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 53.0.2785.89. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-5147, CVE-2016-5148, CVE-2016-5149, CVE-2016-5150, CVE-2016-5151, CVE-2016-5152, CVE-2016-5153, CVE-2016-5154, CVE-2016-5155, CVE-2016-5156, CVE-2016-5157, CVE-2016-5158, CVE-2016-5159, CVE-2016-5167, CVE-2016-5161, CVE-2016-5162, CVE-2016-5163, CVE-2016-5164, CVE-2016-5165, CVE-2016-5166, CVE-2016-5160) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1372207 - CVE-2016-5147 chromium-browser: universal xss in blink 1372208 - CVE-2016-5148 chromium-browser: universal xss in blink 1372209 - CVE-2016-5149 chromium-browser: script injection in extensions 1372210 - CVE-2016-5150 chromium-browser: use after free in blink 1372212 - CVE-2016-5151 chromium-browser: use after free in pdfium 1372213 - CVE-2016-5152 chromium-browser: heap overflow in pdfium 1372214 - CVE-2016-5153 chromium-browser: use after destruction in blink 1372215 - CVE-2016-5154 chromium-browser: heap overflow in pdfium 1372216 - CVE-2016-5155 chromium-browser: address bar spoofing 1372217 - CVE-2016-5156 chromium-browser: use after free in event bindings 1372218 - CVE-2016-5157 chromium-browser: heap overflow in pdfium 1372219 - CVE-2016-5158 chromium-browser: heap overflow in pdfium 1372220 - CVE-2016-5159 chromium-browser: heap overflow in pdfium 1372221 - CVE-2016-5161 chromium-browser: type confusion in blink 1372222 - CVE-2016-5162 chromium-browser: extensions web accessible resources bypass 1372223 - CVE-2016-5163 chromium-browser: address bar spoofing 1372224 - CVE-2016-5164 chromium-browser: universal xss using devtools 1372225 - CVE-2016-5165 chromium-browser: script injection in devtools 1372227 - CVE-2016-5166 chromium-browser: smb relay attack via save page as 1372228 - CVE-2016-5160 chromium-browser: extensions web accessible resources bypass 1372229 - CVE-2016-5167 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-53.0.2785.89-3.el6.i686.rpm chromium-browser-debuginfo-53.0.2785.89-3.el6.i686.rpm x86_64: chromium-browser-53.0.2785.89-3.el6.x86_64.rpm chromium-browser-debuginfo-53.0.2785.89-3.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-53.0.2785.89-3.el6.i686.rpm chromium-browser-debuginfo-53.0.2785.89-3.el6.i686.rpm x86_64: chromium-browser-53.0.2785.89-3.el6.x86_64.rpm chromium-browser-debuginfo-53.0.2785.89-3.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-53.0.2785.89-3.el6.i686.rpm chromium-browser-debuginfo-53.0.2785.89-3.el6.i686.rpm x86_64: chromium-browser-53.0.2785.89-3.el6.x86_64.rpm chromium-browser-debuginfo-53.0.2785.89-3.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5147 https://access.redhat.com/security/cve/CVE-2016-5148 https://access.redhat.com/security/cve/CVE-2016-5149 https://access.redhat.com/security/cve/CVE-2016-5150 https://access.redhat.com/security/cve/CVE-2016-5151 https://access.redhat.com/security/cve/CVE-2016-5152 https://access.redhat.com/security/cve/CVE-2016-5153 https://access.redhat.com/security/cve/CVE-2016-5154 https://access.redhat.com/security/cve/CVE-2016-5155 https://access.redhat.com/security/cve/CVE-2016-5156 https://access.redhat.com/security/cve/CVE-2016-5157 https://access.redhat.com/security/cve/CVE-2016-5158 https://access.redhat.com/security/cve/CVE-2016-5159 https://access.redhat.com/security/cve/CVE-2016-5160 https://access.redhat.com/security/cve/CVE-2016-5161 https://access.redhat.com/security/cve/CVE-2016-5162 https://access.redhat.com/security/cve/CVE-2016-5163 https://access.redhat.com/security/cve/CVE-2016-5164 https://access.redhat.com/security/cve/CVE-2016-5165 https://access.redhat.com/security/cve/CVE-2016-5166 https://access.redhat.com/security/cve/CVE-2016-5167 https://access.redhat.com/security/updates/classification/#important https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1wkdXlSAg2UNWIIRAo19AKCYY24BGTS3pCe88UaKl6eCZ4ykmACgv0iJ SAjzzrBiLDEH4/kIVLeFMUU= =33re -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 12 20:13:07 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Sep 2016 20:13:07 +0000 Subject: [RHSA-2016:1844-01] Important: libarchive security update Message-ID: <201609122013.u8CKD7xA014362@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libarchive security update Advisory ID: RHSA-2016:1844-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1844.html Issue date: 2016-09-12 CVE Names: CVE-2015-8916 CVE-2015-8917 CVE-2015-8919 CVE-2015-8920 CVE-2015-8921 CVE-2015-8922 CVE-2015-8923 CVE-2015-8924 CVE-2015-8925 CVE-2015-8926 CVE-2015-8928 CVE-2015-8930 CVE-2015-8931 CVE-2015-8932 CVE-2015-8934 CVE-2016-1541 CVE-2016-4300 CVE-2016-4302 CVE-2016-4809 CVE-2016-5418 CVE-2016-5844 CVE-2016-6250 CVE-2016-7166 ===================================================================== 1. Summary: An update for libarchive is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418) * Multiple out-of-bounds write flaws were found in libarchive. Specially crafted ZIP, 7ZIP, or RAR files could cause a heap overflow, potentially allowing code execution in the context of the application using libarchive. (CVE-2016-1541, CVE-2016-4300, CVE-2016-4302) * Multiple out-of-bounds read flaws were found in libarchive. Specially crafted LZA/LZH, AR, MTREE, ZIP, TAR, or RAR files could cause the application to read data out of bounds, potentially disclosing a small amount of application memory, or causing an application crash. (CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8934) * Multiple NULL pointer dereference flaws were found in libarchive. Specially crafted RAR, CAB, or 7ZIP files could cause an application using libarchive to crash. (CVE-2015-8916, CVE-2015-8917, CVE-2015-8922) * Multiple infinite loop / resource exhaustion flaws were found in libarchive. Specially crafted GZIP or ISO files could cause the application to consume an excessive amount of resources, eventually leading to a crash on memory exhaustion. (CVE-2016-7166, CVE-2015-8930) * A denial of service vulnerability was found in libarchive. A specially crafted CPIO archive containing a symbolic link to a large target path could cause memory allocation to fail, causing an application using libarchive that attempted to view or extract such archive to crash. (CVE-2016-4809) * An integer overflow flaw, leading to a buffer overflow, was found in libarchive's construction of ISO9660 volumes. Attempting to create an ISO9660 volume with 2 GB or 4 GB file names could cause the application to attempt to allocate 20 GB of memory. If this were to succeed, it could lead to an out of bounds write on the heap and potential code execution. (CVE-2016-6250) * Multiple instances of undefined behavior due to arithmetic overflow were found in libarchive. Specially crafted MTREE archives, Compress streams, or ISO9660 volumes could potentially cause the application to fail to read the archive, or to crash. (CVE-2015-8931, CVE-2015-8932, CVE-2016-5844) Red Hat would like to thank Insomnia Security for reporting CVE-2016-5418. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1334211 - CVE-2016-1541 libarchive: zip_read_mac_metadata() heap-based buffer overflow 1347084 - CVE-2016-4809 libarchive: Memory allocate error with symbolic links in cpio archives 1347085 - CVE-2016-6250 libarchive: Buffer overflow when writing large iso9660 containers 1347086 - CVE-2016-7166 libarchive: Denial of service using a crafted gzip file 1348412 - CVE-2015-8916 libarchive: NULL pointer access in RAR parser through bsdtar 1348413 - CVE-2015-8917 libarchive: NULL pointer access in CAB parser 1348414 - CVE-2015-8919 libarchive: Heap out of bounds read in LHA/LZH parser 1348416 - CVE-2015-8920 libarchive: Stack out of bounds read in ar parser 1348419 - CVE-2015-8922 libarchive: NULL pointer access in 7z parser 1348421 - CVE-2015-8924 libarchive: Heap out of bounds read in TAR parser 1348423 - CVE-2015-8925 libarchive: Unclear invalid memory read in mtree parser 1348424 - CVE-2015-8926 libarchive: NULL pointer access in RAR parser 1348429 - CVE-2015-8928 libarchive: Heap out of bounds read in mtree parser 1348439 - CVE-2016-4300 libarchive: Heap buffer overflow vulnerability in the 7zip read_SubStreamsInfo 1348444 - CVE-2016-4302 libarchive: Heap buffer overflow in the Rar decompression functionality 1348772 - CVE-2015-8921 libarchive: Global out of bounds read in mtree parser 1348773 - CVE-2015-8923 libarchive: Unclear crashes in ZIP parser 1348779 - CVE-2015-8931 libarchive: Undefined behavior (signed integer overflow) in mtree parser 1348780 - CVE-2015-8932 libarchive: Undefined behavior / invalid shiftleft in TAR parser 1349204 - CVE-2015-8930 libarchive: Endless loop in ISO parser 1349229 - CVE-2015-8934 libarchive: out of bounds heap read in RAR parser 1350280 - CVE-2016-5844 libarchive: undefined behaviour (integer overflow) in iso parser 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libarchive-3.1.2-10.el7_2.src.rpm x86_64: libarchive-3.1.2-10.el7_2.i686.rpm libarchive-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bsdcpio-3.1.2-10.el7_2.x86_64.rpm bsdtar-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm libarchive-devel-3.1.2-10.el7_2.i686.rpm libarchive-devel-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libarchive-3.1.2-10.el7_2.src.rpm x86_64: libarchive-3.1.2-10.el7_2.i686.rpm libarchive-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bsdcpio-3.1.2-10.el7_2.x86_64.rpm bsdtar-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm libarchive-devel-3.1.2-10.el7_2.i686.rpm libarchive-devel-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libarchive-3.1.2-10.el7_2.src.rpm ppc64: libarchive-3.1.2-10.el7_2.ppc.rpm libarchive-3.1.2-10.el7_2.ppc64.rpm libarchive-debuginfo-3.1.2-10.el7_2.ppc.rpm libarchive-debuginfo-3.1.2-10.el7_2.ppc64.rpm ppc64le: libarchive-3.1.2-10.el7_2.ppc64le.rpm libarchive-debuginfo-3.1.2-10.el7_2.ppc64le.rpm s390x: libarchive-3.1.2-10.el7_2.s390.rpm libarchive-3.1.2-10.el7_2.s390x.rpm libarchive-debuginfo-3.1.2-10.el7_2.s390.rpm libarchive-debuginfo-3.1.2-10.el7_2.s390x.rpm x86_64: libarchive-3.1.2-10.el7_2.i686.rpm libarchive-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bsdcpio-3.1.2-10.el7_2.ppc64.rpm bsdtar-3.1.2-10.el7_2.ppc64.rpm libarchive-debuginfo-3.1.2-10.el7_2.ppc.rpm libarchive-debuginfo-3.1.2-10.el7_2.ppc64.rpm libarchive-devel-3.1.2-10.el7_2.ppc.rpm libarchive-devel-3.1.2-10.el7_2.ppc64.rpm ppc64le: bsdcpio-3.1.2-10.el7_2.ppc64le.rpm bsdtar-3.1.2-10.el7_2.ppc64le.rpm libarchive-debuginfo-3.1.2-10.el7_2.ppc64le.rpm libarchive-devel-3.1.2-10.el7_2.ppc64le.rpm s390x: bsdcpio-3.1.2-10.el7_2.s390x.rpm bsdtar-3.1.2-10.el7_2.s390x.rpm libarchive-debuginfo-3.1.2-10.el7_2.s390.rpm libarchive-debuginfo-3.1.2-10.el7_2.s390x.rpm libarchive-devel-3.1.2-10.el7_2.s390.rpm libarchive-devel-3.1.2-10.el7_2.s390x.rpm x86_64: bsdcpio-3.1.2-10.el7_2.x86_64.rpm bsdtar-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm libarchive-devel-3.1.2-10.el7_2.i686.rpm libarchive-devel-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libarchive-3.1.2-10.el7_2.src.rpm x86_64: libarchive-3.1.2-10.el7_2.i686.rpm libarchive-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bsdcpio-3.1.2-10.el7_2.x86_64.rpm bsdtar-3.1.2-10.el7_2.x86_64.rpm libarchive-debuginfo-3.1.2-10.el7_2.i686.rpm libarchive-debuginfo-3.1.2-10.el7_2.x86_64.rpm libarchive-devel-3.1.2-10.el7_2.i686.rpm libarchive-devel-3.1.2-10.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8916 https://access.redhat.com/security/cve/CVE-2015-8917 https://access.redhat.com/security/cve/CVE-2015-8919 https://access.redhat.com/security/cve/CVE-2015-8920 https://access.redhat.com/security/cve/CVE-2015-8921 https://access.redhat.com/security/cve/CVE-2015-8922 https://access.redhat.com/security/cve/CVE-2015-8923 https://access.redhat.com/security/cve/CVE-2015-8924 https://access.redhat.com/security/cve/CVE-2015-8925 https://access.redhat.com/security/cve/CVE-2015-8926 https://access.redhat.com/security/cve/CVE-2015-8928 https://access.redhat.com/security/cve/CVE-2015-8930 https://access.redhat.com/security/cve/CVE-2015-8931 https://access.redhat.com/security/cve/CVE-2015-8932 https://access.redhat.com/security/cve/CVE-2015-8934 https://access.redhat.com/security/cve/CVE-2016-1541 https://access.redhat.com/security/cve/CVE-2016-4300 https://access.redhat.com/security/cve/CVE-2016-4302 https://access.redhat.com/security/cve/CVE-2016-4809 https://access.redhat.com/security/cve/CVE-2016-5418 https://access.redhat.com/security/cve/CVE-2016-5844 https://access.redhat.com/security/cve/CVE-2016-6250 https://access.redhat.com/security/cve/CVE-2016-7166 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1wxAXlSAg2UNWIIRAu+sAJ9YBTSA1dpQZcFYj711f5PjfV1VDACfayj8 9/KldGYTdVwUF8hM+CWE2uU= =pIdF -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Sep 12 20:13:46 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 12 Sep 2016 20:13:46 +0000 Subject: [RHSA-2016:1850-01] Important: libarchive security update Message-ID: <201609122013.u8CKDkai012861@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libarchive security update Advisory ID: RHSA-2016:1850-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1850.html Issue date: 2016-09-12 CVE Names: CVE-2015-8920 CVE-2015-8921 CVE-2015-8932 CVE-2016-4809 CVE-2016-5418 CVE-2016-5844 CVE-2016-7166 ===================================================================== 1. Summary: An update for libarchive is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418) * Multiple out-of-bounds read flaws were found in libarchive. Specially crafted AR or MTREE files could cause the application to read data out of bounds, potentially disclosing a small amount of application memory, or causing an application crash. (CVE-2015-8920, CVE-2015-8921) * A denial of service vulnerability was found in libarchive's handling of GZIP streams. A crafted GZIP file could cause libarchive to allocate an excessive amount of memory, eventually leading to a crash. (CVE-2016-7166) * A denial of service vulnerability was found in libarchive. A specially crafted CPIO archive containing a symbolic link to a large target path could cause memory allocation to fail, causing an application using libarchive that attempted to view or extract such archive to crash. (CVE-2016-4809) * Multiple instances of undefined behavior due to arithmetic overflow were found in libarchive. Specially crafted Compress streams or ISO9660 volumes could potentially cause the application to fail to read the archive, or to crash. (CVE-2015-8932, CVE-2016-5844) Red Hat would like to thank Insomnia Security for reporting CVE-2016-5418. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1347084 - CVE-2016-4809 libarchive: Memory allocate error with symbolic links in cpio archives 1347086 - CVE-2016-7166 libarchive: Denial of service using a crafted gzip file 1348416 - CVE-2015-8920 libarchive: Stack out of bounds read in ar parser 1348772 - CVE-2015-8921 libarchive: Global out of bounds read in mtree parser 1348780 - CVE-2015-8932 libarchive: Undefined behavior / invalid shiftleft in TAR parser 1350280 - CVE-2016-5844 libarchive: undefined behaviour (integer overflow) in iso parser 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libarchive-2.8.3-7.el6_8.src.rpm i386: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm x86_64: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-2.8.3-7.el6_8.x86_64.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm x86_64: libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: libarchive-2.8.3-7.el6_8.src.rpm x86_64: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-2.8.3-7.el6_8.x86_64.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libarchive-2.8.3-7.el6_8.src.rpm i386: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm ppc64: libarchive-2.8.3-7.el6_8.ppc.rpm libarchive-2.8.3-7.el6_8.ppc64.rpm libarchive-debuginfo-2.8.3-7.el6_8.ppc.rpm libarchive-debuginfo-2.8.3-7.el6_8.ppc64.rpm s390x: libarchive-2.8.3-7.el6_8.s390.rpm libarchive-2.8.3-7.el6_8.s390x.rpm libarchive-debuginfo-2.8.3-7.el6_8.s390.rpm libarchive-debuginfo-2.8.3-7.el6_8.s390x.rpm x86_64: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-2.8.3-7.el6_8.x86_64.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm ppc64: libarchive-debuginfo-2.8.3-7.el6_8.ppc.rpm libarchive-debuginfo-2.8.3-7.el6_8.ppc64.rpm libarchive-devel-2.8.3-7.el6_8.ppc.rpm libarchive-devel-2.8.3-7.el6_8.ppc64.rpm s390x: libarchive-debuginfo-2.8.3-7.el6_8.s390.rpm libarchive-debuginfo-2.8.3-7.el6_8.s390x.rpm libarchive-devel-2.8.3-7.el6_8.s390.rpm libarchive-devel-2.8.3-7.el6_8.s390x.rpm x86_64: libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libarchive-2.8.3-7.el6_8.src.rpm i386: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm x86_64: libarchive-2.8.3-7.el6_8.i686.rpm libarchive-2.8.3-7.el6_8.x86_64.rpm libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm x86_64: libarchive-debuginfo-2.8.3-7.el6_8.i686.rpm libarchive-debuginfo-2.8.3-7.el6_8.x86_64.rpm libarchive-devel-2.8.3-7.el6_8.i686.rpm libarchive-devel-2.8.3-7.el6_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8920 https://access.redhat.com/security/cve/CVE-2015-8921 https://access.redhat.com/security/cve/CVE-2015-8932 https://access.redhat.com/security/cve/CVE-2016-4809 https://access.redhat.com/security/cve/CVE-2016-5418 https://access.redhat.com/security/cve/CVE-2016-5844 https://access.redhat.com/security/cve/CVE-2016-7166 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1wxlXlSAg2UNWIIRAiK3AJoDa+37CtcxIy2UFieXxeNXLotiCgCcD411 h4H/7wKipV7MTN2z247GmnM= =RwwI -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 13 11:12:25 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Sep 2016 11:12:25 +0000 Subject: [RHSA-2016:1855-01] Moderate: rh-ror42 security update Message-ID: <201609131112.u8DBCPsu023048@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-ror42 security update Advisory ID: RHSA-2016:1855-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1855.html Issue date: 2016-09-13 CVE Names: CVE-2016-6316 CVE-2016-6317 ===================================================================== 1. Summary: An update for rh-ror42-rubygem-actionview, rh-ror42-rubygem-activerecord, and rh-ror42-rubygem-actionpack is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch 3. Description: Ruby on Rails is a model-view-controller (MVC) framework for web application development. Action View implements the view component, and Active Record implements the model component. Security Fix(es) in rubygem-actionview: * It was discovered that Action View tag helpers did not escape quotes when using strings declared as HTML safe as attribute values. A remote attacker could use this flaw to conduct a cross-site scripting (XSS) attack. (CVE-2016-6316) Security Fix(es) in rubygem-activerecord: * A flaw was found in the way Active Record handled certain special values in dynamic finders and relations. If a Ruby on Rails application performed JSON parameter parsing, a remote attacker could possibly manipulate search conditions in SQL queries generated by the application. (CVE-2016-6317) Red Hat would like to thank the Ruby on Rails project for reporting these issues. Upstream acknowledges Andrew Carpenter (Critical Juncture) as the original reporter of CVE-2016-6316; and joernchen (Phenoelit) as the original reporter of CVE-2016-6317. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1365008 - CVE-2016-6316 rubygem-actionview: cross-site scripting flaw in Action View 1365017 - CVE-2016-6317 rubygem-activerecord: unsafe query generation in Active Record 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6316 https://access.redhat.com/security/cve/CVE-2016-6317 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1977XlSAg2UNWIIRAgmUAJ9CAZsdFov2snrXXLOrRTt0sUrfxgCgpwgG F0o+B5gJPw4TXZWYKzOkv5I= =n1+g -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 13 11:13:00 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Sep 2016 11:13:00 +0000 Subject: [RHSA-2016:1856-01] Moderate: rh-ror41-rubygem-actionview security update Message-ID: <201609131113.u8DBD0cc006001@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-ror41-rubygem-actionview security update Advisory ID: RHSA-2016:1856-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1856.html Issue date: 2016-09-13 CVE Names: CVE-2016-6316 ===================================================================== 1. Summary: An update for rh-ror41-rubygem-actionview is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch 3. Description: Ruby on Rails is a model-view-controller (MVC) framework for web application development. Action View implements the view component. Security Fix(es): * It was discovered that Action View tag helpers did not escape quotes when using strings declared as HTML safe as attribute values. A remote attacker could use this flaw to conduct a cross-site scripting (XSS) attack. (CVE-2016-6316) Red Hat would like to thank the Ruby on Rails project for reporting this issue. Upstream acknowledges Andrew Carpenter (Critical Juncture) as the original reporter. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications using rh-ror41-rubygem-actionviewmust be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1365008 - CVE-2016-6316 rubygem-actionview: cross-site scripting flaw in Action View 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: rh-ror41-rubygem-actionview-4.1.5-6.el6.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el6.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: rh-ror41-rubygem-actionview-4.1.5-6.el6.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el6.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: rh-ror41-rubygem-actionview-4.1.5-6.el6.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el6.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: rh-ror41-rubygem-actionview-4.1.5-6.el6.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el6.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-ror41-rubygem-actionview-4.1.5-6.el7.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el7.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: rh-ror41-rubygem-actionview-4.1.5-6.el7.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el7.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: rh-ror41-rubygem-actionview-4.1.5-6.el7.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el7.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-ror41-rubygem-actionview-4.1.5-6.el7.src.rpm noarch: rh-ror41-rubygem-actionview-4.1.5-6.el7.noarch.rpm rh-ror41-rubygem-actionview-doc-4.1.5-6.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6316 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX198pXlSAg2UNWIIRAtaRAJ40rTGE5OQvJcSTDcLGzfGfgD1J8wCfcDTw qa6PQ0emQrhPkLNKUjpFGpA= =K/Ov -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 13 11:13:32 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Sep 2016 11:13:32 +0000 Subject: [RHSA-2016:1857-01] Moderate: ror40-rubygem-actionpack security update Message-ID: <201609131113.u8DBDXuT002475@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ror40-rubygem-actionpack security update Advisory ID: RHSA-2016:1857-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1857.html Issue date: 2016-09-13 CVE Names: CVE-2016-6316 ===================================================================== 1. Summary: An update for ror40-rubygem-actionpack is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch 3. Description: Ruby on Rails is a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * It was discovered that Action View tag helpers did not escape quotes when using strings declared as HTML safe as attribute values. A remote attacker could use this flaw to conduct a cross-site scripting (XSS) attack. (CVE-2016-6316) Red Hat would like to thank the Ruby on Rails project for reporting this issue. Upstream acknowledges Andrew Carpenter (Critical Juncture) as the original reporter. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications using ror40-rubygem-actionpack must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1365008 - CVE-2016-6316 rubygem-actionview: cross-site scripting flaw in Action View 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: ror40-rubygem-actionpack-4.0.2-8.el6.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el6.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: ror40-rubygem-actionpack-4.0.2-8.el6.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el6.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: ror40-rubygem-actionpack-4.0.2-8.el6.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el6.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: ror40-rubygem-actionpack-4.0.2-8.el6.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el6.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: ror40-rubygem-actionpack-4.0.2-8.el7.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el7.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: ror40-rubygem-actionpack-4.0.2-8.el7.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el7.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: ror40-rubygem-actionpack-4.0.2-8.el7.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el7.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: ror40-rubygem-actionpack-4.0.2-8.el7.src.rpm noarch: ror40-rubygem-actionpack-4.0.2-8.el7.noarch.rpm ror40-rubygem-actionpack-doc-4.0.2-8.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6316 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX199NXlSAg2UNWIIRAjWGAJ95vFDU/L3V3Fc6JPrrMCzhb8TenQCbBgwU 4Hl+Ut1R+baT+RM3HCRoPGE= =SA6M -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 13 11:14:09 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 13 Sep 2016 11:14:09 +0000 Subject: [RHSA-2016:1858-01] Moderate: ruby193-rubygem-actionpack security update Message-ID: <201609131114.u8DBE98m006552@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ruby193-rubygem-actionpack security update Advisory ID: RHSA-2016:1858-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1858.html Issue date: 2016-09-13 CVE Names: CVE-2016-6316 ===================================================================== 1. Summary: An update for ruby193-rubygem-actionpack is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch 3. Description: Ruby on Rails is a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * It was discovered that Action View tag helpers did not escape quotes when using strings declared as HTML safe as attribute values. A remote attacker could use this flaw to conduct a cross-site scripting (XSS) attack. (CVE-2016-6316) Red Hat would like to thank the Ruby on Rails project for reporting this issue. Upstream acknowledges Andrew Carpenter (Critical Juncture) as the original reporter. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications using ruby193-rubygem-actionpack must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1365008 - CVE-2016-6316 rubygem-actionview: cross-site scripting flaw in Action View 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: ruby193-rubygem-actionpack-3.2.8-20.el6.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el6.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: ruby193-rubygem-actionpack-3.2.8-20.el6.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el6.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: ruby193-rubygem-actionpack-3.2.8-20.el6.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el6.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: ruby193-rubygem-actionpack-3.2.8-20.el6.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el6.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el6.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: ruby193-rubygem-actionpack-3.2.8-20.el7.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el7.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: ruby193-rubygem-actionpack-3.2.8-20.el7.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el7.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: ruby193-rubygem-actionpack-3.2.8-20.el7.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el7.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: ruby193-rubygem-actionpack-3.2.8-20.el7.src.rpm noarch: ruby193-rubygem-actionpack-3.2.8-20.el7.noarch.rpm ruby193-rubygem-actionpack-doc-3.2.8-20.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6316 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX199vXlSAg2UNWIIRAoA8AJ9clPt0H/tu/Np3oZf5cBdoNP0ZGgCdEn0e 3hn6PJDDzZXjBNEmVp2xq/E= =sh6Z -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 14 07:21:55 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 14 Sep 2016 07:21:55 +0000 Subject: [RHSA-2016:1865-01] Critical: flash-plugin security update Message-ID: <201609140721.u8E7LupH030551@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2016:1865-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html Issue date: 2016-09-14 CVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 CVE-2016-6931 CVE-2016-6932 ===================================================================== 1. Summary: An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 11.2.202.635. Security Fix(es): * This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4271 https://access.redhat.com/security/cve/CVE-2016-4272 https://access.redhat.com/security/cve/CVE-2016-4274 https://access.redhat.com/security/cve/CVE-2016-4275 https://access.redhat.com/security/cve/CVE-2016-4276 https://access.redhat.com/security/cve/CVE-2016-4277 https://access.redhat.com/security/cve/CVE-2016-4278 https://access.redhat.com/security/cve/CVE-2016-4279 https://access.redhat.com/security/cve/CVE-2016-4280 https://access.redhat.com/security/cve/CVE-2016-4281 https://access.redhat.com/security/cve/CVE-2016-4282 https://access.redhat.com/security/cve/CVE-2016-4283 https://access.redhat.com/security/cve/CVE-2016-4284 https://access.redhat.com/security/cve/CVE-2016-4285 https://access.redhat.com/security/cve/CVE-2016-4287 https://access.redhat.com/security/cve/CVE-2016-6921 https://access.redhat.com/security/cve/CVE-2016-6922 https://access.redhat.com/security/cve/CVE-2016-6923 https://access.redhat.com/security/cve/CVE-2016-6924 https://access.redhat.com/security/cve/CVE-2016-6925 https://access.redhat.com/security/cve/CVE-2016-6926 https://access.redhat.com/security/cve/CVE-2016-6927 https://access.redhat.com/security/cve/CVE-2016-6929 https://access.redhat.com/security/cve/CVE-2016-6930 https://access.redhat.com/security/cve/CVE-2016-6931 https://access.redhat.com/security/cve/CVE-2016-6932 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb16-29.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh ynwsnFlRoTlOLVQLiobHvps= =1fXO -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 15 09:59:05 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 15 Sep 2016 09:59:05 +0000 Subject: [RHSA-2016:1847-01] Important: kernel security, bug fix, and enhancement update Message-ID: <201609150957.u8F9vhVn012703@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2016:1847-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1847.html Issue date: 2016-09-14 CVE Names: CVE-2016-3134 CVE-2016-4997 CVE-2016-4998 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important) * A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important) * An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate) Bug Fix(es): * In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. (BZ#1353947) * Previously, running I/O-intensive operations in some cases caused the system to terminate unexpectedly after a null pointer dereference in the kernel. With this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers that fix this bug. As a result, the system no longer crashes in the described scenario. (BZ#1362040) * Previously, the Stream Control Transmission Protocol (SCTP) sockets did not inherit the SELinux labels properly. As a consequence, the sockets were labeled with the unlabeled_t SELinux type which caused SCTP connections to fail. The underlying source code has been modified, and SCTP connections now works as expected. (BZ#1354302) * Previously, the bnx2x driver waited for transmission completions when recovering from a parity event, which substantially increased the recovery time. With this update, bnx2x does not wait for transmission completion in the described circumstances. As a result, the recovery of bnx2x after a parity event now takes less time. (BZ#1351972) Enhancement(s): * With this update, the audit subsystem enables filtering of processes by name besides filtering by PID. Users can now audit by executable name (with the "-F exe=" option), which allows expression of many new audit rules. This functionality can be used to create events when specific applications perform a syscall. (BZ#1345774) * With this update, the Nonvolatile Memory Express (NVMe) and the multi-queue block layer (blk_mq) have been upgraded to the Linux 4.5 upstream version. Previously, a race condition between timeout and freeing request in blk_mq occurred, which could affect the blk_mq_tag_to_rq() function and consequently a kernel oops could occur. The provided patch fixes this race condition by updating the tags with the active request. The patch simplifies blk_mq_tag_to_rq() and ensures that the two requests are not active at the same time. (BZ#1350352) * The Hyper-V storage driver (storvsc) has been upgraded from upstream. This update provides moderate performance improvement of I/O operations when using storvscr for certain workloads. (BZ#1360161) Additional Changes: Space precludes documenting all of the bug fixes and enhancements included in this advisory. To see the complete list of bug fixes and enhancements, refer to the following KnowledgeBase article: https://access.redhat.com/articles/2592321 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1317383 - CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure 1349722 - CVE-2016-4997 kernel: compat IPT_SO_SET_REPLACE setsockopt 1349886 - CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-327.36.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm kernel-doc-3.10.0-327.36.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm perf-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-327.36.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm kernel-doc-3.10.0-327.36.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm perf-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-327.36.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm kernel-doc-3.10.0-327.36.1.el7.noarch.rpm ppc64: kernel-3.10.0-327.36.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.36.1.el7.ppc64.rpm kernel-debug-3.10.0-327.36.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.36.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.36.1.el7.ppc64.rpm kernel-devel-3.10.0-327.36.1.el7.ppc64.rpm kernel-headers-3.10.0-327.36.1.el7.ppc64.rpm kernel-tools-3.10.0-327.36.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.36.1.el7.ppc64.rpm perf-3.10.0-327.36.1.el7.ppc64.rpm perf-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm python-perf-3.10.0-327.36.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.36.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debug-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.36.1.el7.ppc64le.rpm kernel-devel-3.10.0-327.36.1.el7.ppc64le.rpm kernel-headers-3.10.0-327.36.1.el7.ppc64le.rpm kernel-tools-3.10.0-327.36.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.36.1.el7.ppc64le.rpm perf-3.10.0-327.36.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm python-perf-3.10.0-327.36.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm s390x: kernel-3.10.0-327.36.1.el7.s390x.rpm kernel-debug-3.10.0-327.36.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.s390x.rpm kernel-debug-devel-3.10.0-327.36.1.el7.s390x.rpm kernel-debuginfo-3.10.0-327.36.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.36.1.el7.s390x.rpm kernel-devel-3.10.0-327.36.1.el7.s390x.rpm kernel-headers-3.10.0-327.36.1.el7.s390x.rpm kernel-kdump-3.10.0-327.36.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.36.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.36.1.el7.s390x.rpm perf-3.10.0-327.36.1.el7.s390x.rpm perf-debuginfo-3.10.0-327.36.1.el7.s390x.rpm python-perf-3.10.0-327.36.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.s390x.rpm x86_64: kernel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm perf-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.36.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.36.1.el7.ppc64.rpm perf-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.36.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.36.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-327.36.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm kernel-doc-3.10.0-327.36.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm perf-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3134 https://access.redhat.com/security/cve/CVE-2016-4997 https://access.redhat.com/security/cve/CVE-2016-4998 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2592321 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX2nCAXlSAg2UNWIIRAtmoAJkBQIYu34OUz+4H7RibKQUcSgZNQgCgmLOi wMvLho3Vp8gsAzdtYdvR1qk= =4G3Z -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 15 09:59:52 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 15 Sep 2016 09:59:52 +0000 Subject: [RHSA-2016:1883-01] Important: kernel-rt security and bug fix update Message-ID: <201609150958.u8F9wVQZ010274@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2016:1883-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1883.html Issue date: 2016-09-14 CVE Names: CVE-2016-3134 CVE-2016-4997 CVE-2016-4998 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. The kernel-rt packages have been upgraded to version 3.10.0-327.rt56.197, which provides a number of bug fixes over the previous version. (BZ#1366059) Security Fix(es): * A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important) * A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important) * An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1317383 - CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure 1349722 - CVE-2016-4997 kernel: compat IPT_SO_SET_REPLACE setsockopt 1349886 - CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt 1366059 - update the MRG 2.5.z 3.10 kernel-rt sources 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-327.rt56.197.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-327.rt56.197.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-327.rt56.197.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3134 https://access.redhat.com/security/cve/CVE-2016-4997 https://access.redhat.com/security/cve/CVE-2016-4998 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX2nC6XlSAg2UNWIIRApEPAJ4qa1wm2UJAA8hm6WzObpqcnH2MrgCffWXb jZd+YJH/WCrr4DozAXsSCOI= =UKTE -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 15 10:05:30 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 15 Sep 2016 10:05:30 +0000 Subject: [RHSA-2016:1875-01] Important: kernel-rt security and bug fix update Message-ID: <201609151004.u8FA4BgJ023740@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2016:1875-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1875.html Issue date: 2016-09-14 CVE Names: CVE-2016-3134 CVE-2016-4997 CVE-2016-4998 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. The kernel-rt packages have been upgraded to the kernel-3.10.0-327.36.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1366538) Security Fix(es): * A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important) * A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important) * An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1317383 - CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure 1349722 - CVE-2016-4997 kernel: compat IPT_SO_SET_REPLACE setsockopt 1349886 - CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt 1366538 - kernel-rt: update to the RHEL7.2.z batch#7 source tree 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-327.36.1.rt56.237.el7.src.rpm noarch: kernel-rt-doc-3.10.0-327.36.1.rt56.237.el7.noarch.rpm x86_64: kernel-rt-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-devel-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-kvm-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-327.36.1.rt56.237.el7.src.rpm noarch: kernel-rt-doc-3.10.0-327.36.1.rt56.237.el7.noarch.rpm x86_64: kernel-rt-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-devel-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.36.1.rt56.237.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3134 https://access.redhat.com/security/cve/CVE-2016-4997 https://access.redhat.com/security/cve/CVE-2016-4998 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX2nHYXlSAg2UNWIIRAi9lAJ0ZAItgVyLqEckIpEgKUrgOun4/YgCePodm luwQfjceNxKu1LgXoLR9mMc= =68Az -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Sep 16 07:34:22 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 16 Sep 2016 07:34:22 +0000 Subject: [RHSA-2016:1905-01] Important: chromium-browser security update Message-ID: <201609160734.u8G7YMeP011956@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2016:1905-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1905.html Issue date: 2016-09-16 CVE Names: CVE-2016-5170 CVE-2016-5171 CVE-2016-5172 CVE-2016-5173 CVE-2016-5174 CVE-2016-5175 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 53.0.2785.113. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2016-5170, CVE-2016-5171, CVE-2016-5175, CVE-2016-5172, CVE-2016-5173, CVE-2016-5174) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375863 - CVE-2016-5170 chromium-browser: use after free in blink 1375864 - CVE-2016-5171 chromium-browser: use after free in blink 1375865 - CVE-2016-5172 chromium-browser: arbitrary memory read in v8 1375866 - CVE-2016-5173 chromium-browser: extension resource access 1375867 - CVE-2016-5174 chromium-browser: popup not correctly suppressed 1375868 - CVE-2016-5175 chromium-browser: various fixes from internal audits 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-53.0.2785.113-1.el6.i686.rpm chromium-browser-debuginfo-53.0.2785.113-1.el6.i686.rpm x86_64: chromium-browser-53.0.2785.113-1.el6.x86_64.rpm chromium-browser-debuginfo-53.0.2785.113-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-53.0.2785.113-1.el6.i686.rpm chromium-browser-debuginfo-53.0.2785.113-1.el6.i686.rpm x86_64: chromium-browser-53.0.2785.113-1.el6.x86_64.rpm chromium-browser-debuginfo-53.0.2785.113-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-53.0.2785.113-1.el6.i686.rpm chromium-browser-debuginfo-53.0.2785.113-1.el6.i686.rpm x86_64: chromium-browser-53.0.2785.113-1.el6.x86_64.rpm chromium-browser-debuginfo-53.0.2785.113-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5170 https://access.redhat.com/security/cve/CVE-2016-5171 https://access.redhat.com/security/cve/CVE-2016-5172 https://access.redhat.com/security/cve/CVE-2016-5173 https://access.redhat.com/security/cve/CVE-2016-5174 https://access.redhat.com/security/cve/CVE-2016-5175 https://access.redhat.com/security/updates/classification/#important https://googlechromereleases.blogspot.com/2016/09/stable-channel-update-for-desktop_13.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX26BSXlSAg2UNWIIRAhB0AJ0aNGgex8x8P5PhmvHX2jGp6ZuHfgCgkhA5 b/wUh9vFKEKRhf8SzZ2r5ak= =m/vt -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 21 08:39:33 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 21 Sep 2016 08:39:33 +0000 Subject: [RHSA-2016:1912-01] Critical: firefox security update Message-ID: <201609210839.u8L8dYe5016812@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2016:1912-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1912.html Issue date: 2016-09-21 CVE Names: CVE-2016-5250 CVE-2016-5257 CVE-2016-5261 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 45.4.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5257, CVE-2016-5278, CVE-2016-5270, CVE-2016-5272, CVE-2016-5274, CVE-2016-5276, CVE-2016-5277, CVE-2016-5280, CVE-2016-5281, CVE-2016-5284, CVE-2016-5250, CVE-2016-5261) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Samuel Gro?, Brian Carpenter, Mei Wang, Ryan Duff, Catalin Dumitru, Mozilla developers, Christoph Diehl, Andrew McCreight, Dan Minor, Byron Campen, Jon Coppeard, Steve Fink, Tyson Smith, Philipp, Carsten Book, Abhishek Arya, Atte Kettunen, and Nils as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1361986 - CVE-2016-5261 Mozilla: Integer overflow and memory corruption in WebSocketChannel (MFSA 2016-86) 1361998 - CVE-2016-5250 Mozilla: Resource Timing API is storing resources sent by the previous page (MFSA 2016-86) 1377543 - CVE-2016-5257 Mozilla: Memory safety bugs fixed in Firefox ESR 45.4 (MFSA 2016-86) 1377549 - CVE-2016-5278 Mozilla: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame (MFSA 2016-86) 1377552 - CVE-2016-5270 Mozilla: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString (MFSA 2016-86) 1377554 - CVE-2016-5272 Mozilla: Bad cast in nsImageGeometryMixin (MFSA 2016-86) 1377557 - CVE-2016-5276 Mozilla: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList (MFSA 2016-86) 1377558 - CVE-2016-5274 Mozilla: use-after-free in nsFrameManager::CaptureFrameState (MFSA 2016-86) 1377559 - CVE-2016-5277 Mozilla: Heap-use-after-free in nsRefreshDriver::Tick (MFSA 2016-86) 1377561 - CVE-2016-5280 Mozilla: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap (MFSA 2016-86) 1377563 - CVE-2016-5281 Mozilla: use-after-free in DOMSVGLength (MFSA 2016-86) 1377565 - CVE-2016-5284 Mozilla: Add-on update site certificate pin expiration (MFSA 2016-86) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-45.4.0-1.el5_11.src.rpm i386: firefox-45.4.0-1.el5_11.i386.rpm firefox-debuginfo-45.4.0-1.el5_11.i386.rpm x86_64: firefox-45.4.0-1.el5_11.i386.rpm firefox-45.4.0-1.el5_11.x86_64.rpm firefox-debuginfo-45.4.0-1.el5_11.i386.rpm firefox-debuginfo-45.4.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-45.4.0-1.el5_11.src.rpm i386: firefox-45.4.0-1.el5_11.i386.rpm firefox-debuginfo-45.4.0-1.el5_11.i386.rpm ppc: firefox-45.4.0-1.el5_11.ppc64.rpm firefox-debuginfo-45.4.0-1.el5_11.ppc64.rpm s390x: firefox-45.4.0-1.el5_11.s390.rpm firefox-45.4.0-1.el5_11.s390x.rpm firefox-debuginfo-45.4.0-1.el5_11.s390.rpm firefox-debuginfo-45.4.0-1.el5_11.s390x.rpm x86_64: firefox-45.4.0-1.el5_11.i386.rpm firefox-45.4.0-1.el5_11.x86_64.rpm firefox-debuginfo-45.4.0-1.el5_11.i386.rpm firefox-debuginfo-45.4.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-45.4.0-1.el6_8.src.rpm i386: firefox-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm x86_64: firefox-45.4.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.4.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-45.4.0-1.el6_8.src.rpm x86_64: firefox-45.4.0-1.el6_8.i686.rpm firefox-45.4.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-45.4.0-1.el6_8.src.rpm i386: firefox-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm ppc64: firefox-45.4.0-1.el6_8.ppc64.rpm firefox-debuginfo-45.4.0-1.el6_8.ppc64.rpm s390x: firefox-45.4.0-1.el6_8.s390x.rpm firefox-debuginfo-45.4.0-1.el6_8.s390x.rpm x86_64: firefox-45.4.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.4.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-45.4.0-1.el6_8.ppc.rpm firefox-debuginfo-45.4.0-1.el6_8.ppc.rpm s390x: firefox-45.4.0-1.el6_8.s390.rpm firefox-debuginfo-45.4.0-1.el6_8.s390.rpm x86_64: firefox-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-45.4.0-1.el6_8.src.rpm i386: firefox-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm x86_64: firefox-45.4.0-1.el6_8.x86_64.rpm firefox-debuginfo-45.4.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-45.4.0-1.el6_8.i686.rpm firefox-debuginfo-45.4.0-1.el6_8.i686.rpm Red Hat Enterprise Linux Client (v. 7): Source: firefox-45.4.0-1.el7_2.src.rpm x86_64: firefox-45.4.0-1.el7_2.x86_64.rpm firefox-debuginfo-45.4.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-45.4.0-1.el7_2.i686.rpm firefox-debuginfo-45.4.0-1.el7_2.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-45.4.0-1.el7_2.src.rpm ppc64: firefox-45.4.0-1.el7_2.ppc64.rpm firefox-debuginfo-45.4.0-1.el7_2.ppc64.rpm ppc64le: firefox-45.4.0-1.el7_2.ppc64le.rpm firefox-debuginfo-45.4.0-1.el7_2.ppc64le.rpm s390x: firefox-45.4.0-1.el7_2.s390x.rpm firefox-debuginfo-45.4.0-1.el7_2.s390x.rpm x86_64: firefox-45.4.0-1.el7_2.x86_64.rpm firefox-debuginfo-45.4.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-45.4.0-1.el7_2.ppc.rpm firefox-debuginfo-45.4.0-1.el7_2.ppc.rpm s390x: firefox-45.4.0-1.el7_2.s390.rpm firefox-debuginfo-45.4.0-1.el7_2.s390.rpm x86_64: firefox-45.4.0-1.el7_2.i686.rpm firefox-debuginfo-45.4.0-1.el7_2.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-45.4.0-1.el7_2.src.rpm x86_64: firefox-45.4.0-1.el7_2.x86_64.rpm firefox-debuginfo-45.4.0-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-45.4.0-1.el7_2.i686.rpm firefox-debuginfo-45.4.0-1.el7_2.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5250 https://access.redhat.com/security/cve/CVE-2016-5257 https://access.redhat.com/security/cve/CVE-2016-5261 https://access.redhat.com/security/cve/CVE-2016-5270 https://access.redhat.com/security/cve/CVE-2016-5272 https://access.redhat.com/security/cve/CVE-2016-5274 https://access.redhat.com/security/cve/CVE-2016-5276 https://access.redhat.com/security/cve/CVE-2016-5277 https://access.redhat.com/security/cve/CVE-2016-5278 https://access.redhat.com/security/cve/CVE-2016-5280 https://access.redhat.com/security/cve/CVE-2016-5281 https://access.redhat.com/security/cve/CVE-2016-5284 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr45.4 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX4kYEXlSAg2UNWIIRAnk/AJ9n5AKd+tAgSLbPdHeTXejUFECOpwCeLD15 ejuJ6vbiy0FmsWvgNTKhqRU= =ekeH -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 27 13:55:19 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 27 Sep 2016 13:55:19 +0000 Subject: [RHSA-2016:1940-01] Important: openssl security update Message-ID: <201609271355.u8RDtJNq013032@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2016:1940-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1940.html Issue date: 2016-09-27 CVE Names: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-6302 CVE-2016-6304 CVE-2016-6306 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) * It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178) * It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. (CVE-2016-2179) * A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181) * An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code. (CVE-2016-2182) * A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default. * An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets. (CVE-2016-6302) * Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177) * An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. (CVE-2016-2180) * Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304 and CVE-2016-6306; and Karthikeyan Bhargavan (Inria) and Ga?tan Leurent (Inria) as the original reporters of CVE-2016-2183. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase 1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation 1359615 - CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() 1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() 1369113 - CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1369504 - CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer 1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks 1377594 - CVE-2016-6306 openssl: certificate message OOB reads 1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-48.el6_8.3.src.rpm i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-48.el6_8.3.src.rpm x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-48.el6_8.3.src.rpm i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm ppc64: openssl-1.0.1e-48.el6_8.3.ppc.rpm openssl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc.rpm openssl-devel-1.0.1e-48.el6_8.3.ppc64.rpm s390x: openssl-1.0.1e-48.el6_8.3.s390.rpm openssl-1.0.1e-48.el6_8.3.s390x.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-devel-1.0.1e-48.el6_8.3.s390.rpm openssl-devel-1.0.1e-48.el6_8.3.s390x.rpm x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm ppc64: openssl-debuginfo-1.0.1e-48.el6_8.3.ppc64.rpm openssl-perl-1.0.1e-48.el6_8.3.ppc64.rpm openssl-static-1.0.1e-48.el6_8.3.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-48.el6_8.3.s390x.rpm openssl-perl-1.0.1e-48.el6_8.3.s390x.rpm openssl-static-1.0.1e-48.el6_8.3.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-48.el6_8.3.src.rpm i386: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm x86_64: openssl-1.0.1e-48.el6_8.3.i686.rpm openssl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.3.i686.rpm openssl-devel-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.3.i686.rpm openssl-perl-1.0.1e-48.el6_8.3.i686.rpm openssl-static-1.0.1e-48.el6_8.3.i686.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.3.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.3.x86_64.rpm openssl-static-1.0.1e-48.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.1e-51.el7_2.7.src.rpm x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.1e-51.el7_2.7.src.rpm x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-51.el7_2.7.src.rpm ppc64: openssl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64.rpm ppc64le: openssl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.7.ppc64le.rpm s390x: openssl-1.0.1e-51.el7_2.7.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-devel-1.0.1e-51.el7_2.7.s390.rpm openssl-devel-1.0.1e-51.el7_2.7.s390x.rpm openssl-libs-1.0.1e-51.el7_2.7.s390.rpm openssl-libs-1.0.1e-51.el7_2.7.s390x.rpm x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64.rpm openssl-static-1.0.1e-51.el7_2.7.ppc.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64.rpm ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.7.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.7.ppc64le.rpm s390x: openssl-debuginfo-1.0.1e-51.el7_2.7.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.s390x.rpm openssl-perl-1.0.1e-51.el7_2.7.s390x.rpm openssl-static-1.0.1e-51.el7_2.7.s390.rpm openssl-static-1.0.1e-51.el7_2.7.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.1e-51.el7_2.7.src.rpm x86_64: openssl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.7.i686.rpm openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.7.i686.rpm openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.7.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.7.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm openssl-static-1.0.1e-51.el7_2.7.i686.rpm openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-2179 https://access.redhat.com/security/cve/CVE-2016-2180 https://access.redhat.com/security/cve/CVE-2016-2181 https://access.redhat.com/security/cve/CVE-2016-2182 https://access.redhat.com/security/cve/CVE-2016-6302 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-6306 https://access.redhat.com/security/updates/classification/#important https://www.openssl.org/news/secadv/20160922.txt 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX6nnFXlSAg2UNWIIRAqklAJ9uGMit/wxZ0CfuGjR7Vi2+AjmGMwCfTpEI xpTW7ApBLmKhVjs49DGYouI= =4VgY -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 27 15:21:52 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 27 Sep 2016 15:21:52 +0000 Subject: [RHSA-2016:1939-01] Important: kernel security and bug fix update Message-ID: <201609271520.u8RFKHB4009280@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1939-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1939.html Issue date: 2016-09-27 CVE Names: CVE-2016-5696 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux HPC Node EUS (v. 6.6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.6) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important) Red Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue. Bug Fix(es): * Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode->npages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365163) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1354708 - CVE-2016-5696 kernel: challenge ACK counter information disclosure. 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.6): Source: kernel-2.6.32-504.52.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-504.52.1.el6.noarch.rpm kernel-doc-2.6.32-504.52.1.el6.noarch.rpm kernel-firmware-2.6.32-504.52.1.el6.noarch.rpm x86_64: kernel-2.6.32-504.52.1.el6.x86_64.rpm kernel-debug-2.6.32-504.52.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.52.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-504.52.1.el6.x86_64.rpm kernel-devel-2.6.32-504.52.1.el6.x86_64.rpm kernel-headers-2.6.32-504.52.1.el6.x86_64.rpm perf-2.6.32-504.52.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6): x86_64: kernel-debug-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.52.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm python-perf-2.6.32-504.52.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.6): Source: kernel-2.6.32-504.52.1.el6.src.rpm i386: kernel-2.6.32-504.52.1.el6.i686.rpm kernel-debug-2.6.32-504.52.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.52.1.el6.i686.rpm kernel-devel-2.6.32-504.52.1.el6.i686.rpm kernel-headers-2.6.32-504.52.1.el6.i686.rpm perf-2.6.32-504.52.1.el6.i686.rpm perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-504.52.1.el6.noarch.rpm kernel-doc-2.6.32-504.52.1.el6.noarch.rpm kernel-firmware-2.6.32-504.52.1.el6.noarch.rpm ppc64: kernel-2.6.32-504.52.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-504.52.1.el6.ppc64.rpm kernel-debug-2.6.32-504.52.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-504.52.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.52.1.el6.ppc64.rpm kernel-devel-2.6.32-504.52.1.el6.ppc64.rpm kernel-headers-2.6.32-504.52.1.el6.ppc64.rpm perf-2.6.32-504.52.1.el6.ppc64.rpm perf-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm s390x: kernel-2.6.32-504.52.1.el6.s390x.rpm kernel-debug-2.6.32-504.52.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.s390x.rpm kernel-debug-devel-2.6.32-504.52.1.el6.s390x.rpm kernel-debuginfo-2.6.32-504.52.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.52.1.el6.s390x.rpm kernel-devel-2.6.32-504.52.1.el6.s390x.rpm kernel-headers-2.6.32-504.52.1.el6.s390x.rpm kernel-kdump-2.6.32-504.52.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.52.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-504.52.1.el6.s390x.rpm perf-2.6.32-504.52.1.el6.s390x.rpm perf-debuginfo-2.6.32-504.52.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.s390x.rpm x86_64: kernel-2.6.32-504.52.1.el6.x86_64.rpm kernel-debug-2.6.32-504.52.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.52.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-504.52.1.el6.x86_64.rpm kernel-devel-2.6.32-504.52.1.el6.x86_64.rpm kernel-headers-2.6.32-504.52.1.el6.x86_64.rpm perf-2.6.32-504.52.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.6): i386: kernel-debug-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.52.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.52.1.el6.i686.rpm perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm python-perf-2.6.32-504.52.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.52.1.el6.ppc64.rpm perf-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm python-perf-2.6.32-504.52.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-504.52.1.el6.s390x.rpm kernel-debuginfo-2.6.32-504.52.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.52.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.52.1.el6.s390x.rpm perf-debuginfo-2.6.32-504.52.1.el6.s390x.rpm python-perf-2.6.32-504.52.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.52.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm python-perf-2.6.32-504.52.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.52.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5696 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX6o4fXlSAg2UNWIIRAjgrAJ4wqUWXEmG3769ycxYKA0e/jtRAkwCfWOUn kls74N7MY3LKo17IvKh1Md8= =cmdw -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Sep 27 16:07:10 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 27 Sep 2016 12:07:10 -0400 Subject: [RHSA-2016:1943-01] Important: kvm security update Message-ID: <201609271607.u8RG7An1031133@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kvm security update Advisory ID: RHSA-2016:1943-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1943.html Issue date: 2016-09-27 CVE Names: CVE-2016-3710 CVE-2016-5403 ===================================================================== 1. Summary: An update for kvm is now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Multi OS (v. 5 client) - x86_64 Red Hat Enterprise Linux Virtualization (v. 5 server) - x86_64 3. Description: KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. Security Fix(es): * An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710) * Quick Emulator(QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403) Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360 Marvel Team) for reporting CVE-2016-3710 and hongzhenhao (Marvel Team) for reporting CVE-2016-5403. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 Note: The procedure in the Solution section must be performed before this update will take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1331401 - CVE-2016-3710 qemu: incorrect banked access bounds checking in vga module 1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest leading to DoS 6. Package List: Red Hat Enterprise Linux Desktop Multi OS (v. 5 client): Source: kvm-83-276.el5_11.src.rpm x86_64: kmod-kvm-83-276.el5_11.x86_64.rpm kmod-kvm-debug-83-276.el5_11.x86_64.rpm kvm-83-276.el5_11.x86_64.rpm kvm-debuginfo-83-276.el5_11.x86_64.rpm kvm-qemu-img-83-276.el5_11.x86_64.rpm kvm-tools-83-276.el5_11.x86_64.rpm Red Hat Enterprise Linux Virtualization (v. 5 server): Source: kvm-83-276.el5_11.src.rpm x86_64: kmod-kvm-83-276.el5_11.x86_64.rpm kmod-kvm-debug-83-276.el5_11.x86_64.rpm kvm-83-276.el5_11.x86_64.rpm kvm-debuginfo-83-276.el5_11.x86_64.rpm kvm-qemu-img-83-276.el5_11.x86_64.rpm kvm-tools-83-276.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3710 https://access.redhat.com/security/cve/CVE-2016-5403 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX6pksXlSAg2UNWIIRAjT6AKCbdp8zHq3cHFmNd3HvfNOuBoHA9wCdGIcl nghWH7GgFCM4mrWvbUElvRg= =2zya -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 28 13:40:22 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 28 Sep 2016 13:40:22 +0000 Subject: [RHSA-2016:1944-01] Important: bind security update Message-ID: <201609281340.u8SDeOST027313@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2016:1944-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1944.html Issue date: 2016-09-28 CVE Names: CVE-2016-2776 ===================================================================== 1. Summary: An update for bind is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776) Red Hat would like to thank ISC for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1378380 - CVE-2016-2776 bind: assertion failure in buffer.c while building responses to a specifically constructed request 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.9.src.rpm i386: bind-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-libs-9.3.6-25.P1.el5_11.9.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.9.i386.rpm bind-utils-9.3.6-25.P1.el5_11.9.i386.rpm x86_64: bind-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.9.i386.rpm bind-libs-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.9.x86_64.rpm Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.9.src.rpm i386: bind-chroot-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.i386.rpm x86_64: bind-chroot-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-devel-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind-9.3.6-25.P1.el5_11.9.src.rpm i386: bind-9.3.6-25.P1.el5_11.9.i386.rpm bind-chroot-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-libs-9.3.6-25.P1.el5_11.9.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.9.i386.rpm bind-utils-9.3.6-25.P1.el5_11.9.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.i386.rpm ia64: bind-9.3.6-25.P1.el5_11.9.ia64.rpm bind-chroot-9.3.6-25.P1.el5_11.9.ia64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.ia64.rpm bind-devel-9.3.6-25.P1.el5_11.9.ia64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.ia64.rpm bind-libs-9.3.6-25.P1.el5_11.9.i386.rpm bind-libs-9.3.6-25.P1.el5_11.9.ia64.rpm bind-sdb-9.3.6-25.P1.el5_11.9.ia64.rpm bind-utils-9.3.6-25.P1.el5_11.9.ia64.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.ia64.rpm ppc: bind-9.3.6-25.P1.el5_11.9.ppc.rpm bind-chroot-9.3.6-25.P1.el5_11.9.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.ppc64.rpm bind-devel-9.3.6-25.P1.el5_11.9.ppc.rpm bind-devel-9.3.6-25.P1.el5_11.9.ppc64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.ppc.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.ppc64.rpm bind-libs-9.3.6-25.P1.el5_11.9.ppc.rpm bind-libs-9.3.6-25.P1.el5_11.9.ppc64.rpm bind-sdb-9.3.6-25.P1.el5_11.9.ppc.rpm bind-utils-9.3.6-25.P1.el5_11.9.ppc.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.ppc.rpm s390x: bind-9.3.6-25.P1.el5_11.9.s390x.rpm bind-chroot-9.3.6-25.P1.el5_11.9.s390x.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.s390.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.s390x.rpm bind-devel-9.3.6-25.P1.el5_11.9.s390.rpm bind-devel-9.3.6-25.P1.el5_11.9.s390x.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.s390.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.s390x.rpm bind-libs-9.3.6-25.P1.el5_11.9.s390.rpm bind-libs-9.3.6-25.P1.el5_11.9.s390x.rpm bind-sdb-9.3.6-25.P1.el5_11.9.s390x.rpm bind-utils-9.3.6-25.P1.el5_11.9.s390x.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.s390x.rpm x86_64: bind-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-chroot-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-devel-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.9.i386.rpm bind-libs-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.9.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.9.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.9.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.1.src.rpm i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.i686.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.i686.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.1.src.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.1.src.rpm i386: bind-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.i686.rpm ppc64: bind-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.ppc.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.ppc.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm s390x: bind-9.8.2-0.47.rc1.el6_8.1.s390x.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.s390x.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.s390.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.s390x.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.s390.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.s390x.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.s390x.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.i686.rpm ppc64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.ppc.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.ppc.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.s390.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.s390x.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.s390.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.s390x.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.1.src.rpm i386: bind-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.i686.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.i686.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: bind-9.9.4-29.el7_2.4.src.rpm noarch: bind-license-9.9.4-29.el7_2.4.noarch.rpm x86_64: bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-9.9.4-29.el7_2.4.i686.rpm bind-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.4.i686.rpm bind-libs-lite-9.9.4-29.el7_2.4.x86_64.rpm bind-utils-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bind-9.9.4-29.el7_2.4.x86_64.rpm bind-chroot-9.9.4-29.el7_2.4.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-devel-9.9.4-29.el7_2.4.i686.rpm bind-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.4.i686.rpm bind-lite-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: bind-9.9.4-29.el7_2.4.src.rpm noarch: bind-license-9.9.4-29.el7_2.4.noarch.rpm x86_64: bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-9.9.4-29.el7_2.4.i686.rpm bind-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.4.i686.rpm bind-libs-lite-9.9.4-29.el7_2.4.x86_64.rpm bind-utils-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bind-9.9.4-29.el7_2.4.x86_64.rpm bind-chroot-9.9.4-29.el7_2.4.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-devel-9.9.4-29.el7_2.4.i686.rpm bind-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.4.i686.rpm bind-lite-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: bind-9.9.4-29.el7_2.4.src.rpm noarch: bind-license-9.9.4-29.el7_2.4.noarch.rpm ppc64: bind-9.9.4-29.el7_2.4.ppc64.rpm bind-chroot-9.9.4-29.el7_2.4.ppc64.rpm bind-debuginfo-9.9.4-29.el7_2.4.ppc.rpm bind-debuginfo-9.9.4-29.el7_2.4.ppc64.rpm bind-libs-9.9.4-29.el7_2.4.ppc.rpm bind-libs-9.9.4-29.el7_2.4.ppc64.rpm bind-libs-lite-9.9.4-29.el7_2.4.ppc.rpm bind-libs-lite-9.9.4-29.el7_2.4.ppc64.rpm bind-utils-9.9.4-29.el7_2.4.ppc64.rpm ppc64le: bind-9.9.4-29.el7_2.4.ppc64le.rpm bind-chroot-9.9.4-29.el7_2.4.ppc64le.rpm bind-debuginfo-9.9.4-29.el7_2.4.ppc64le.rpm bind-libs-9.9.4-29.el7_2.4.ppc64le.rpm bind-libs-lite-9.9.4-29.el7_2.4.ppc64le.rpm bind-pkcs11-9.9.4-29.el7_2.4.ppc64le.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.ppc64le.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.ppc64le.rpm bind-utils-9.9.4-29.el7_2.4.ppc64le.rpm s390x: bind-9.9.4-29.el7_2.4.s390x.rpm bind-chroot-9.9.4-29.el7_2.4.s390x.rpm bind-debuginfo-9.9.4-29.el7_2.4.s390.rpm bind-debuginfo-9.9.4-29.el7_2.4.s390x.rpm bind-libs-9.9.4-29.el7_2.4.s390.rpm bind-libs-9.9.4-29.el7_2.4.s390x.rpm bind-libs-lite-9.9.4-29.el7_2.4.s390.rpm bind-libs-lite-9.9.4-29.el7_2.4.s390x.rpm bind-utils-9.9.4-29.el7_2.4.s390x.rpm x86_64: bind-9.9.4-29.el7_2.4.x86_64.rpm bind-chroot-9.9.4-29.el7_2.4.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-9.9.4-29.el7_2.4.i686.rpm bind-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.4.i686.rpm bind-libs-lite-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.x86_64.rpm bind-utils-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bind-debuginfo-9.9.4-29.el7_2.4.ppc.rpm bind-debuginfo-9.9.4-29.el7_2.4.ppc64.rpm bind-devel-9.9.4-29.el7_2.4.ppc.rpm bind-devel-9.9.4-29.el7_2.4.ppc64.rpm bind-lite-devel-9.9.4-29.el7_2.4.ppc.rpm bind-lite-devel-9.9.4-29.el7_2.4.ppc64.rpm bind-pkcs11-9.9.4-29.el7_2.4.ppc64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.ppc.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.ppc64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.ppc.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.ppc64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.ppc64.rpm bind-sdb-9.9.4-29.el7_2.4.ppc64.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.ppc64.rpm ppc64le: bind-debuginfo-9.9.4-29.el7_2.4.ppc64le.rpm bind-devel-9.9.4-29.el7_2.4.ppc64le.rpm bind-lite-devel-9.9.4-29.el7_2.4.ppc64le.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.ppc64le.rpm bind-sdb-9.9.4-29.el7_2.4.ppc64le.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.ppc64le.rpm s390x: bind-debuginfo-9.9.4-29.el7_2.4.s390.rpm bind-debuginfo-9.9.4-29.el7_2.4.s390x.rpm bind-devel-9.9.4-29.el7_2.4.s390.rpm bind-devel-9.9.4-29.el7_2.4.s390x.rpm bind-lite-devel-9.9.4-29.el7_2.4.s390.rpm bind-lite-devel-9.9.4-29.el7_2.4.s390x.rpm bind-pkcs11-9.9.4-29.el7_2.4.s390x.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.s390.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.s390x.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.s390.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.s390x.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.s390x.rpm bind-sdb-9.9.4-29.el7_2.4.s390x.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.s390x.rpm x86_64: bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-devel-9.9.4-29.el7_2.4.i686.rpm bind-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.4.i686.rpm bind-lite-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: bind-9.9.4-29.el7_2.4.src.rpm noarch: bind-license-9.9.4-29.el7_2.4.noarch.rpm x86_64: bind-9.9.4-29.el7_2.4.x86_64.rpm bind-chroot-9.9.4-29.el7_2.4.x86_64.rpm bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-9.9.4-29.el7_2.4.i686.rpm bind-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-libs-lite-9.9.4-29.el7_2.4.i686.rpm bind-libs-lite-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-libs-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-utils-9.9.4-29.el7_2.4.x86_64.rpm bind-utils-9.9.4-29.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bind-debuginfo-9.9.4-29.el7_2.4.i686.rpm bind-debuginfo-9.9.4-29.el7_2.4.x86_64.rpm bind-devel-9.9.4-29.el7_2.4.i686.rpm bind-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-lite-devel-9.9.4-29.el7_2.4.i686.rpm bind-lite-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.i686.rpm bind-pkcs11-devel-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-9.9.4-29.el7_2.4.x86_64.rpm bind-sdb-chroot-9.9.4-29.el7_2.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2776 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01419 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX68gxXlSAg2UNWIIRArnvAJ9ED8GThp5lPSeOJyxpMswRFGd+agCguICE 7nvkADhOzxJ8sxyzea7P5rQ= =GxjB -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Sep 28 13:29:20 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 28 Sep 2016 13:29:20 +0000 Subject: [RHSA-2016:1945-01] Important: bind97 security update Message-ID: <201609281329.u8SDTLJ4015205@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind97 security update Advisory ID: RHSA-2016:1945-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1945.html Issue date: 2016-09-28 CVE Names: CVE-2016-2776 ===================================================================== 1. Summary: An update for bind97 is now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776) Red Hat would like to thank ISC for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1378380 - CVE-2016-2776 bind: assertion failure in buffer.c while building responses to a specifically constructed request 6. Package List: Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind97-9.7.0-21.P2.el5_11.7.src.rpm i386: bind97-9.7.0-21.P2.el5_11.7.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm x86_64: bind97-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.7.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind97-9.7.0-21.P2.el5_11.7.src.rpm i386: bind97-9.7.0-21.P2.el5_11.7.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm ia64: bind97-9.7.0-21.P2.el5_11.7.ia64.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.ia64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.ia64.rpm bind97-devel-9.7.0-21.P2.el5_11.7.ia64.rpm bind97-libs-9.7.0-21.P2.el5_11.7.ia64.rpm bind97-utils-9.7.0-21.P2.el5_11.7.ia64.rpm ppc: bind97-9.7.0-21.P2.el5_11.7.ppc.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.ppc64.rpm bind97-devel-9.7.0-21.P2.el5_11.7.ppc.rpm bind97-devel-9.7.0-21.P2.el5_11.7.ppc64.rpm bind97-libs-9.7.0-21.P2.el5_11.7.ppc.rpm bind97-libs-9.7.0-21.P2.el5_11.7.ppc64.rpm bind97-utils-9.7.0-21.P2.el5_11.7.ppc.rpm s390x: bind97-9.7.0-21.P2.el5_11.7.s390x.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.s390x.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.s390.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.s390x.rpm bind97-devel-9.7.0-21.P2.el5_11.7.s390.rpm bind97-devel-9.7.0-21.P2.el5_11.7.s390x.rpm bind97-libs-9.7.0-21.P2.el5_11.7.s390.rpm bind97-libs-9.7.0-21.P2.el5_11.7.s390x.rpm bind97-utils-9.7.0-21.P2.el5_11.7.s390x.rpm x86_64: bind97-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.7.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2776 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01419 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD4DBQFX68WcXlSAg2UNWIIRAu7BAJiFBSdLVJ0nFFPGg+jM9HRgVolhAJ0UPHAW c/EkOoJyrtAoLrcLQD9cmA== =mfCk -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Sep 29 18:57:35 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 29 Sep 2016 14:57:35 -0400 Subject: [RHSA-2016:1978-01] Important: python-twisted-web security update Message-ID: <201609291857.u8TIvZFZ031857@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-twisted-web security update Advisory ID: RHSA-2016:1978-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1978.html Issue date: 2016-09-29 CVE Names: CVE-2016-1000111 ===================================================================== 1. Summary: An update for python-twisted-web is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Security Fix(es): * It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000111) Note: After this update, python-twisted-web will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable. Red Hat would like to thank Scott Geary (VendHQ) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1357345 - CVE-2016-1000111 Python Twisted: sets environmental variable based on user supplied Proxy request header 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: python-twisted-web-8.2.0-5.el6_8.src.rpm i386: python-twisted-web-8.2.0-5.el6_8.i686.rpm x86_64: python-twisted-web-8.2.0-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: python-twisted-web-8.2.0-5.el6_8.src.rpm i386: python-twisted-web-8.2.0-5.el6_8.i686.rpm ppc64: python-twisted-web-8.2.0-5.el6_8.ppc64.rpm s390x: python-twisted-web-8.2.0-5.el6_8.s390x.rpm x86_64: python-twisted-web-8.2.0-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: python-twisted-web-8.2.0-5.el6_8.src.rpm i386: python-twisted-web-8.2.0-5.el6_8.i686.rpm x86_64: python-twisted-web-8.2.0-5.el6_8.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): Source: python-twisted-web-12.1.0-5.el7_2.src.rpm x86_64: python-twisted-web-12.1.0-5.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: python-twisted-web-12.1.0-5.el7_2.src.rpm ppc64: python-twisted-web-12.1.0-5.el7_2.ppc64.rpm ppc64le: python-twisted-web-12.1.0-5.el7_2.ppc64le.rpm s390x: python-twisted-web-12.1.0-5.el7_2.s390x.rpm x86_64: python-twisted-web-12.1.0-5.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): Source: python-twisted-web-12.1.0-5.el7_2.src.rpm x86_64: python-twisted-web-12.1.0-5.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-1000111 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX7WQdXlSAg2UNWIIRAvsdAJwJNdcT5nFCAQd4ns+oOb3mpPX6wwCfUEF+ 19pGvKakDq7qt0ackqgQTzA= =2dOk -----END PGP SIGNATURE-----