From bugzilla at redhat.com Wed Mar 1 11:13:06 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Mar 2017 11:13:06 +0000 Subject: [RHSA-2017:0352-01] Important: qemu-kvm security update Message-ID: <201703011113.v21BD7T2023842@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2017:0352-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0352.html Issue date: 2017-03-01 CVE Names: CVE-2017-2620 ===================================================================== 1. Summary: An update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1420484 - CVE-2017-2620 Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm i386: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-img-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.491.el6_8.7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-img-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.491.el6_8.7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm i386: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.i686.rpm ppc64: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.ppc64.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.ppc64.rpm x86_64: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-img-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.491.el6_8.7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm i386: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-img-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.491.el6_8.7.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.491.el6_8.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2620 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYtqy8XlSAg2UNWIIRApAqAJ43zfRP8iqyU43OAix03vimWJK/lQCgwRsy r3EVUGQOvtOZc71rajGBKXs= =83nq -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 1 17:36:23 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Mar 2017 17:36:23 +0000 Subject: [RHSA-2017:0365-01] Important: kernel security update Message-ID: <201703011736.v21HaYaU018234@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0365-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0365.html Issue date: 2017-03-01 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.2) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.2): Source: kernel-2.6.32-220.70.1.el6.src.rpm noarch: kernel-doc-2.6.32-220.70.1.el6.noarch.rpm kernel-firmware-2.6.32-220.70.1.el6.noarch.rpm x86_64: kernel-2.6.32-220.70.1.el6.x86_64.rpm kernel-debug-2.6.32-220.70.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-220.70.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.70.1.el6.x86_64.rpm kernel-devel-2.6.32-220.70.1.el6.x86_64.rpm kernel-headers-2.6.32-220.70.1.el6.x86_64.rpm perf-2.6.32-220.70.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.2): Source: kernel-2.6.32-220.70.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-220.70.1.el6.x86_64.rpm perf-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm python-perf-2.6.32-220.70.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-220.70.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYtwaLXlSAg2UNWIIRAm29AJ9FXdc4Dn4lCGIs0jrg7sIZPqtsHgCdHXw/ +OHagxo6Ry3HosTpFCJeZAQ= =TFcY -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 1 17:40:05 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Mar 2017 17:40:05 +0000 Subject: [RHSA-2017:0366-01] Important: kernel security update Message-ID: <201703011740.v21He69o010064@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0366-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0366.html Issue date: 2017-03-01 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.5) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.78.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.78.1.el6.noarch.rpm kernel-doc-2.6.32-431.78.1.el6.noarch.rpm kernel-firmware-2.6.32-431.78.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.78.1.el6.x86_64.rpm kernel-debug-2.6.32-431.78.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.78.1.el6.x86_64.rpm kernel-devel-2.6.32-431.78.1.el6.x86_64.rpm kernel-headers-2.6.32-431.78.1.el6.x86_64.rpm perf-2.6.32-431.78.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 6.5): Source: kernel-2.6.32-431.78.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.78.1.el6.noarch.rpm kernel-doc-2.6.32-431.78.1.el6.noarch.rpm kernel-firmware-2.6.32-431.78.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.78.1.el6.x86_64.rpm kernel-debug-2.6.32-431.78.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.78.1.el6.x86_64.rpm kernel-devel-2.6.32-431.78.1.el6.x86_64.rpm kernel-headers-2.6.32-431.78.1.el6.x86_64.rpm perf-2.6.32-431.78.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.78.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.78.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm python-perf-2.6.32-431.78.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 6.5): Source: kernel-2.6.32-431.78.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.78.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm python-perf-2.6.32-431.78.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.78.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYtwatXlSAg2UNWIIRAqOuAJ4lbOtfqj3ExIVAfnvsCRcfEt8OjgCfbR8W s7bi+3r1VgNMrL9uEP2nBCs= =e3U0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 1 23:39:11 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Mar 2017 23:39:11 +0000 Subject: [RHSA-2017:0361-01] Moderate: openstack-puppet-modules security update Message-ID: <201703012339.v21NdCN9015238@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-puppet-modules security update Advisory ID: RHSA-2017:0361-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0361.html Issue date: 2017-03-01 CVE Names: CVE-2016-9590 ===================================================================== 1. Summary: An update for openstack-puppet-modules is now available for Red Hat OpenStack Platform 8.0 (Liberty). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 8.0 (Liberty) - noarch 3. Description: openstack-puppet-modules provides a collection of Puppet modules which Red Hat OpenStack Platform director uses to install and configure OpenStack. Security Fix(es): * An information-disclosure flaw was discovered in Red Hat OpenStack Platform director's installation of Object Storage (swift). During installation, the Puppet script responsible for deploying the service incorrectly removes and recreates the proxy-server.conf file with world-readable permissions. (CVE-2016-9590) Red Hat would like to thank Hans Feldt (Ericsson) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1410293 - CVE-2016-9590 puppet-swift: installs config file with world readable permissions 6. Package List: Red Hat OpenStack Platform 8.0 (Liberty): Source: openstack-puppet-modules-7.1.5-2.el7ost.src.rpm noarch: openstack-puppet-modules-7.1.5-2.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-9590 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYt1uSXlSAg2UNWIIRAkL+AJ91G5sUL+fWNWLRFixQl0nb+b2Y/wCfX12p pVCrgwukPf83OTKlSGJtIMo= =65uc -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 1 23:40:57 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Mar 2017 23:40:57 +0000 Subject: [RHSA-2017:0359-01] Moderate: openstack-puppet-modules security update Message-ID: <201703012340.v21NevV8010869@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-puppet-modules security update Advisory ID: RHSA-2017:0359-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0359.html Issue date: 2017-03-01 CVE Names: CVE-2016-9590 ===================================================================== 1. Summary: An update for openstack-puppet-modules is now available for Red Hat OpenStack Platform 9.0 (Mitaka). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 9.0 - noarch 3. Description: openstack-puppet-modules provides a collection of Puppet modules which Red Hat OpenStack Platform director uses to install and configure OpenStack. Security Fix(es): * An information-disclosure flaw was discovered in Red Hat OpenStack Platform director's installation of Object Storage (swift). During installation, the Puppet script responsible for deploying the service incorrectly removes and recreates the proxy-server.conf file with world-readable permissions. (CVE-2016-9590) Red Hat would like to thank Hans Feldt (Ericsson) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1410293 - CVE-2016-9590 puppet-swift: installs config file with world readable permissions 6. Package List: Red Hat OpenStack Platform 9.0: Source: openstack-puppet-modules-8.1.10-2.el7ost.src.rpm noarch: openstack-puppet-modules-8.1.10-2.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-9590 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYt1vMXlSAg2UNWIIRAtsBAJ0dpYYUxtcGTbOeaLS3YVmbuToEbgCgie2b /MrY2F5AdQ+pFEz0VrU4qdk= =/A8c -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 18:18:18 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 18:18:18 +0000 Subject: [RHSA-2017:0396-01] Important: qemu-kvm security and bug fix update Message-ID: <201703021818.v22IIKKx032225@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: qemu-kvm security and bug fix update Advisory ID: RHSA-2017:0396-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0396.html Issue date: 2017-03-02 CVE Names: CVE-2017-2615 CVE-2017-2620 ===================================================================== 1. Summary: An update for qemu-kvm is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host. (CVE-2017-2615) * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620) Red Hat would like to thank Wjjzhang (Tencent.com Inc.) and Li Qiang (360.cn Inc.) for reporting CVE-2017-2615. Bug Fix(es): * When using the virtio-blk driver on a guest virtual machine with no space on the virtual hard drive, the guest terminated unexpectedly with a "block I/O error in device" message and the qemu-kvm process exited with a segmentation fault. This update fixes how the system_reset QEMU signal is handled in the above scenario. As a result, if a guest crashes due to no space left on the device, qemu-kvm continues running and the guest can be reset as expected. (BZ#1420049) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1418200 - CVE-2017-2615 Qemu: display: cirrus: oob access while doing bitblt copy backward mode 1420049 - system_reset should clear pending request for error (virtio-blk) 1420428 - Remove dependencies required by spice on ppc64le 1420484 - CVE-2017-2620 Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: qemu-kvm-1.5.3-126.el7_3.5.src.rpm x86_64: qemu-img-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-debuginfo-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: qemu-kvm-1.5.3-126.el7_3.5.src.rpm x86_64: qemu-img-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-debuginfo-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: qemu-kvm-1.5.3-126.el7_3.5.src.rpm ppc64: qemu-img-1.5.3-126.el7_3.5.ppc64.rpm qemu-kvm-debuginfo-1.5.3-126.el7_3.5.ppc64.rpm ppc64le: qemu-img-1.5.3-126.el7_3.5.ppc64le.rpm qemu-kvm-debuginfo-1.5.3-126.el7_3.5.ppc64le.rpm x86_64: qemu-img-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-debuginfo-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: qemu-kvm-1.5.3-126.el7_3.5.src.rpm x86_64: qemu-img-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-debuginfo-1.5.3-126.el7_3.5.x86_64.rpm qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2615 https://access.redhat.com/security/cve/CVE-2017-2620 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuGHEXlSAg2UNWIIRAuK3AKCN7rF9UWUMzvPvnGoMN1hmMIvGDQCgpxDy XApHa+kSe9hZ0jkPl1iMYm0= =Fn4n -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 20:42:47 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 20:42:47 +0000 Subject: [RHSA-2017:0386-01] Important: kernel security, bug fix, and enhancement update Message-ID: <201703022042.v22Kgnrc011527@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2017:0386-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0386.html Issue date: 2017-03-02 CVE Names: CVE-2016-8630 CVE-2016-8655 CVE-2016-9083 CVE-2016-9084 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS. (CVE-2016-8630, Important) * A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2016-8655, Important) * A flaw was discovered in the Linux kernel's implementation of VFIO. An attacker issuing an ioctl can create a situation where memory is corrupted and modify memory outside of the expected area. This may overwrite kernel memory and subvert kernel execution. (CVE-2016-9083, Important) * The use of a kzalloc with an integer multiplication allowed an integer overflow condition to be reached in vfio_pci_intrs.c. This combined with CVE-2016-9083 may allow an attacker to craft an attack and use unallocated memory, potentially crashing the machine. (CVE-2016-9084, Moderate) Red Hat would like to thank Philip Pettersson for reporting CVE-2016-8655. Additional Changes: Space precludes documenting all of the bug fixes and enhancements included in this advisory. To see the complete list of bug fixes and enhancements, refer to the following KnowledgeBase article: https://access.redhat.com/articles/2940041. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1389258 - CVE-2016-9083 kernel: State machine confusion bug in vfio driver leading to memory corruption 1389259 - CVE-2016-9084 kernel: Integer overflow when using kzalloc in vfio driver 1393350 - CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference during instruction decode 1400019 - CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-514.10.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.10.2.el7.noarch.rpm kernel-doc-3.10.0-514.10.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-headers-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.10.2.el7.x86_64.rpm perf-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-514.10.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.10.2.el7.noarch.rpm kernel-doc-3.10.0-514.10.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-headers-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.10.2.el7.x86_64.rpm perf-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-514.10.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.10.2.el7.noarch.rpm kernel-doc-3.10.0-514.10.2.el7.noarch.rpm ppc64: kernel-3.10.0-514.10.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-514.10.2.el7.ppc64.rpm kernel-debug-3.10.0-514.10.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-514.10.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.10.2.el7.ppc64.rpm kernel-devel-3.10.0-514.10.2.el7.ppc64.rpm kernel-headers-3.10.0-514.10.2.el7.ppc64.rpm kernel-tools-3.10.0-514.10.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-514.10.2.el7.ppc64.rpm perf-3.10.0-514.10.2.el7.ppc64.rpm perf-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm python-perf-3.10.0-514.10.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-514.10.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debug-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.10.2.el7.ppc64le.rpm kernel-devel-3.10.0-514.10.2.el7.ppc64le.rpm kernel-headers-3.10.0-514.10.2.el7.ppc64le.rpm kernel-tools-3.10.0-514.10.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.10.2.el7.ppc64le.rpm perf-3.10.0-514.10.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm python-perf-3.10.0-514.10.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm s390x: kernel-3.10.0-514.10.2.el7.s390x.rpm kernel-debug-3.10.0-514.10.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.s390x.rpm kernel-debug-devel-3.10.0-514.10.2.el7.s390x.rpm kernel-debuginfo-3.10.0-514.10.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-514.10.2.el7.s390x.rpm kernel-devel-3.10.0-514.10.2.el7.s390x.rpm kernel-headers-3.10.0-514.10.2.el7.s390x.rpm kernel-kdump-3.10.0-514.10.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-514.10.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-514.10.2.el7.s390x.rpm perf-3.10.0-514.10.2.el7.s390x.rpm perf-debuginfo-3.10.0-514.10.2.el7.s390x.rpm python-perf-3.10.0-514.10.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.s390x.rpm x86_64: kernel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-headers-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.10.2.el7.x86_64.rpm perf-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.10.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-514.10.2.el7.ppc64.rpm perf-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.10.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.10.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-514.10.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.10.2.el7.noarch.rpm kernel-doc-3.10.0-514.10.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-devel-3.10.0-514.10.2.el7.x86_64.rpm kernel-headers-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.10.2.el7.x86_64.rpm perf-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.10.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.10.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8630 https://access.redhat.com/security/cve/CVE-2016-8655 https://access.redhat.com/security/cve/CVE-2016-9083 https://access.redhat.com/security/cve/CVE-2016-9084 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2940041 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuIO9XlSAg2UNWIIRAneoAJ9Dl7tC/O5QcM4cxbQ/O7GpEhlqFgCggphP iNhwzasw45J7N7h/YrhN204= =AJ2E -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 20:43:24 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 20:43:24 +0000 Subject: [RHSA-2017:0387-01] Important: kernel-rt security and bug fix update Message-ID: <201703022043.v22KhSQ8023428@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2017:0387-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0387.html Issue date: 2017-03-02 CVE Names: CVE-2016-8630 CVE-2016-8655 CVE-2016-9083 CVE-2016-9084 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS. (CVE-2016-8630, Important) * A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2016-8655, Important) * A flaw was discovered in the Linux kernel's implementation of VFIO. An attacker issuing an ioctl can create a situation where memory is corrupted and modify memory outside of the expected area. This may overwrite kernel memory and subvert kernel execution. (CVE-2016-9083, Important) * The use of a kzalloc with an integer multiplication allowed an integer overflow condition to be reached in vfio_pci_intrs.c. This combined with CVE-2016-9083 may allow an attacker to craft an attack and use unallocated memory, potentially crashing the machine. (CVE-2016-9084, Moderate) Red Hat would like to thank Philip Pettersson for reporting CVE-2016-8655. Bug Fix(es): * Previously, the asynchronous page fault woke code references spinlocks, which were actually sleeping locks in the RT kernel. Because of this, when the code was executed from the exception context, a bug warning appeared on the console. With this update, the regular wait queue and spinlock code in this area has been modified to use simple-wait-queue and raw-spinlocks. This code change enables the asynchronous page fault code to run in a non-preemptable state without bug warnings. (BZ#1418035) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1389258 - CVE-2016-9083 kernel: State machine confusion bug in vfio driver leading to memory corruption 1389259 - CVE-2016-9084 kernel: Integer overflow when using kzalloc in vfio driver 1393350 - CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference during instruction decode 1400019 - CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free 1415172 - kernel-rt: update to the RHEL7.3.z batch#3 source tree [rt-7.3.z] 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-514.10.2.rt56.435.el7.src.rpm noarch: kernel-rt-doc-3.10.0-514.10.2.rt56.435.el7.noarch.rpm x86_64: kernel-rt-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-devel-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-kvm-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-514.10.2.rt56.435.el7.src.rpm noarch: kernel-rt-doc-3.10.0-514.10.2.rt56.435.el7.noarch.rpm x86_64: kernel-rt-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-devel-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-514.10.2.rt56.435.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8630 https://access.redhat.com/security/cve/CVE-2016-8655 https://access.redhat.com/security/cve/CVE-2016-9083 https://access.redhat.com/security/cve/CVE-2016-9084 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuIPXXlSAg2UNWIIRAmxKAJ9G4RRJGM0haoDf9p+7eqUmyCvBEgCgqZI9 1Tm4aHVEAyf+TPzZ+58RCb0= =0JLE -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 20:44:03 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 20:44:03 +0000 Subject: [RHSA-2017:0388-01] Moderate: ipa security and bug fix update Message-ID: <201703022044.v22Ki5k3008863@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ipa security and bug fix update Advisory ID: RHSA-2017:0388-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0388.html Issue date: 2017-03-02 CVE Names: CVE-2017-2590 ===================================================================== 1. Summary: An update for ipa is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * It was found that IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys. (CVE-2017-2590) This issue was discovered by Fraser Tweedale (Red Hat). Bug Fix(es): * Previously, during an Identity Management (IdM) replica installation that runs on domain level "1" or higher, Directory Server was not configured to use TLS encryption. As a consequence, installing a certificate authority (CA) on that replica failed. Directory Server is now configured to use TLS encryption during the replica installation and as a result, the CA installation works as expected. (BZ#1410760) * Previously, the Identity Management (IdM) public key infrastructure (PKI) component was configured to listen on the "::1" IPv6 localhost address. In environments have the the IPv6 protocol disabled, the replica installer was unable to retrieve the Directory Server certificate, and the installation failed. The default listening address of the PKI connector has been updated from the IP address to "localhost". As a result, the PKI connector now listens on the correct addresses in IPv4 and IPv6 environments. (BZ#1416481) * Previously, when installing a certificate authority (CA) on a replica, Identity Management (IdM) was unable to provide third-party CA certificates to the Certificate System CA installer. As a consequence, the installer was unable to connect to the remote master if the remote master used a third-party server certificate, and the installation failed. This updates applies a patch and as a result, installing a CA replica works as expected in the described situation. (BZ#1415158) * When installing a replica, the web server service entry is created on the Identity Management (IdM) master and replicated to all IdM servers. Previously, when installing a replica without a certificate authority (CA), in certain situations the service entry was not replicated to the new replica on time, and the installation failed. The replica installer has been updated and now waits until the web server service entry is replicated. As a result, the replica installation no longer fails in the described situation. (BZ#1416488) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1410760 - ipa-ca-install fails on replica when IPA Master is installed without CA 1413137 - CVE-2017-2590 ipa: Insufficient permission check for ca-del, ca-disable and ca-enable commands 1415158 - ipa-ca-install fails on replica when IPA server is converted from CA-less to CA-full 1416481 - IPA replica install fails with dirsrv errors. 1416488 - replication race condition prevents IPA to install 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: ipa-4.4.0-14.el7_3.6.src.rpm noarch: ipa-client-common-4.4.0-14.el7_3.6.noarch.rpm ipa-common-4.4.0-14.el7_3.6.noarch.rpm ipa-python-compat-4.4.0-14.el7_3.6.noarch.rpm python2-ipaclient-4.4.0-14.el7_3.6.noarch.rpm python2-ipalib-4.4.0-14.el7_3.6.noarch.rpm x86_64: ipa-client-4.4.0-14.el7_3.6.x86_64.rpm ipa-debuginfo-4.4.0-14.el7_3.6.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: ipa-admintools-4.4.0-14.el7_3.6.noarch.rpm ipa-server-common-4.4.0-14.el7_3.6.noarch.rpm ipa-server-dns-4.4.0-14.el7_3.6.noarch.rpm python2-ipaserver-4.4.0-14.el7_3.6.noarch.rpm x86_64: ipa-debuginfo-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-trust-ad-4.4.0-14.el7_3.6.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: ipa-4.4.0-14.el7_3.6.src.rpm noarch: ipa-client-common-4.4.0-14.el7_3.6.noarch.rpm ipa-common-4.4.0-14.el7_3.6.noarch.rpm ipa-python-compat-4.4.0-14.el7_3.6.noarch.rpm python2-ipaclient-4.4.0-14.el7_3.6.noarch.rpm python2-ipalib-4.4.0-14.el7_3.6.noarch.rpm x86_64: ipa-client-4.4.0-14.el7_3.6.x86_64.rpm ipa-debuginfo-4.4.0-14.el7_3.6.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: ipa-admintools-4.4.0-14.el7_3.6.noarch.rpm ipa-server-common-4.4.0-14.el7_3.6.noarch.rpm ipa-server-dns-4.4.0-14.el7_3.6.noarch.rpm python2-ipaserver-4.4.0-14.el7_3.6.noarch.rpm x86_64: ipa-debuginfo-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-trust-ad-4.4.0-14.el7_3.6.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: ipa-4.4.0-14.el7_3.6.src.rpm aarch64: ipa-client-4.4.0-14.el7_3.6.aarch64.rpm ipa-debuginfo-4.4.0-14.el7_3.6.aarch64.rpm noarch: ipa-admintools-4.4.0-14.el7_3.6.noarch.rpm ipa-client-common-4.4.0-14.el7_3.6.noarch.rpm ipa-common-4.4.0-14.el7_3.6.noarch.rpm ipa-python-compat-4.4.0-14.el7_3.6.noarch.rpm ipa-server-common-4.4.0-14.el7_3.6.noarch.rpm ipa-server-dns-4.4.0-14.el7_3.6.noarch.rpm python2-ipaclient-4.4.0-14.el7_3.6.noarch.rpm python2-ipalib-4.4.0-14.el7_3.6.noarch.rpm python2-ipaserver-4.4.0-14.el7_3.6.noarch.rpm ppc64: ipa-client-4.4.0-14.el7_3.6.ppc64.rpm ipa-debuginfo-4.4.0-14.el7_3.6.ppc64.rpm ppc64le: ipa-client-4.4.0-14.el7_3.6.ppc64le.rpm ipa-debuginfo-4.4.0-14.el7_3.6.ppc64le.rpm s390x: ipa-client-4.4.0-14.el7_3.6.s390x.rpm ipa-debuginfo-4.4.0-14.el7_3.6.s390x.rpm x86_64: ipa-client-4.4.0-14.el7_3.6.x86_64.rpm ipa-debuginfo-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-trust-ad-4.4.0-14.el7_3.6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: ipa-4.4.0-14.el7_3.6.src.rpm noarch: ipa-admintools-4.4.0-14.el7_3.6.noarch.rpm ipa-client-common-4.4.0-14.el7_3.6.noarch.rpm ipa-common-4.4.0-14.el7_3.6.noarch.rpm ipa-python-compat-4.4.0-14.el7_3.6.noarch.rpm ipa-server-common-4.4.0-14.el7_3.6.noarch.rpm ipa-server-dns-4.4.0-14.el7_3.6.noarch.rpm python2-ipaclient-4.4.0-14.el7_3.6.noarch.rpm python2-ipalib-4.4.0-14.el7_3.6.noarch.rpm python2-ipaserver-4.4.0-14.el7_3.6.noarch.rpm x86_64: ipa-client-4.4.0-14.el7_3.6.x86_64.rpm ipa-debuginfo-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-4.4.0-14.el7_3.6.x86_64.rpm ipa-server-trust-ad-4.4.0-14.el7_3.6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2590 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuIQFXlSAg2UNWIIRApIlAJ0f4aEIwePPgIHUosmcDiwtWFVHzwCgnDJF mo0rvm3jXAHkL3ouYd21vV4= =JN8s -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 20:44:22 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 20:44:22 +0000 Subject: [RHSA-2017:0402-01] Important: kernel-rt security, bug fix, and enhancement update Message-ID: <201703022044.v22KiO8t031773@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security, bug fix, and enhancement update Advisory ID: RHSA-2017:0402-01 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0402.html Issue date: 2017-03-02 CVE Names: CVE-2016-8655 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2016-8655, Important) Red Hat would like to thank Philip Pettersson for reporting this issue. Enhancement(s): * Previously, the Broadcom bnx2x driver in the MRG kernel-rt used an incorrect PTP Hardware Clock (PHC) timer divisor value, which broke Precision Time Protocol (PTP) timestamping due to an unstable clock. This update corrects the divisor value, and the PTP timestamping is now accurate, with monotonically increasing timestamp values. (BZ#1411139) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1400019 - CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free 1414055 - update the MRG 2.5.z 3.10 kernel-rt sources 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-514.rt56.215.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-514.rt56.215.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-514.rt56.215.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-514.rt56.215.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-514.rt56.215.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8655 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuIQhXlSAg2UNWIIRAvfnAJ9jPtQizw4lrZLk/wvzgSvz67KmbwCggd0v D4+RjLqHQhL1iV2a9LenBbE= =7jJ0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 20:44:49 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 20:44:49 +0000 Subject: [RHSA-2017:0403-01] Important: kernel security update Message-ID: <201703022044.v22KipEC017907@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0403-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0403.html Issue date: 2017-03-02 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.1) - ppc64, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1): Source: kernel-3.10.0-229.49.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.49.1.el7.noarch.rpm kernel-doc-3.10.0-229.49.1.el7.noarch.rpm x86_64: kernel-3.10.0-229.49.1.el7.x86_64.rpm kernel-debug-3.10.0-229.49.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.49.1.el7.x86_64.rpm kernel-devel-3.10.0-229.49.1.el7.x86_64.rpm kernel-headers-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.49.1.el7.x86_64.rpm perf-3.10.0-229.49.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1): x86_64: kernel-debug-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.49.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm python-perf-3.10.0-229.49.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: kernel-3.10.0-229.49.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.49.1.el7.noarch.rpm kernel-doc-3.10.0-229.49.1.el7.noarch.rpm ppc64: kernel-3.10.0-229.49.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-229.49.1.el7.ppc64.rpm kernel-debug-3.10.0-229.49.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-229.49.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.49.1.el7.ppc64.rpm kernel-devel-3.10.0-229.49.1.el7.ppc64.rpm kernel-headers-3.10.0-229.49.1.el7.ppc64.rpm kernel-tools-3.10.0-229.49.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-229.49.1.el7.ppc64.rpm perf-3.10.0-229.49.1.el7.ppc64.rpm perf-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm s390x: kernel-3.10.0-229.49.1.el7.s390x.rpm kernel-debug-3.10.0-229.49.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-229.49.1.el7.s390x.rpm kernel-debug-devel-3.10.0-229.49.1.el7.s390x.rpm kernel-debuginfo-3.10.0-229.49.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.49.1.el7.s390x.rpm kernel-devel-3.10.0-229.49.1.el7.s390x.rpm kernel-headers-3.10.0-229.49.1.el7.s390x.rpm kernel-kdump-3.10.0-229.49.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.49.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-229.49.1.el7.s390x.rpm perf-3.10.0-229.49.1.el7.s390x.rpm perf-debuginfo-3.10.0-229.49.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.s390x.rpm x86_64: kernel-3.10.0-229.49.1.el7.x86_64.rpm kernel-debug-3.10.0-229.49.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.49.1.el7.x86_64.rpm kernel-devel-3.10.0-229.49.1.el7.x86_64.rpm kernel-headers-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.49.1.el7.x86_64.rpm perf-3.10.0-229.49.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: kernel-3.10.0-229.49.1.ael7b.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.49.1.ael7b.noarch.rpm kernel-doc-3.10.0-229.49.1.ael7b.noarch.rpm ppc64le: kernel-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-bootwrapper-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debug-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debug-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-devel-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-headers-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-tools-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-tools-libs-3.10.0-229.49.1.ael7b.ppc64le.rpm perf-3.10.0-229.49.1.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64: kernel-debug-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.49.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-229.49.1.el7.ppc64.rpm perf-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm python-perf-3.10.0-229.49.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.ppc64.rpm s390x: kernel-debug-debuginfo-3.10.0-229.49.1.el7.s390x.rpm kernel-debuginfo-3.10.0-229.49.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.49.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.49.1.el7.s390x.rpm perf-debuginfo-3.10.0-229.49.1.el7.s390x.rpm python-perf-3.10.0-229.49.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.s390x.rpm x86_64: kernel-debug-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.49.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm python-perf-3.10.0-229.49.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.49.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64le: kernel-debug-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debug-devel-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm kernel-tools-libs-devel-3.10.0-229.49.1.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm python-perf-3.10.0-229.49.1.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.49.1.ael7b.ppc64le.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2039563 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuIQ9XlSAg2UNWIIRAjGHAJ4sgOUJblqbiESe+Wmnp2sfuAegLwCfQPa9 COjI4K5BpC2Te8uAUMgcRW8= =nTiR -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 2 21:21:05 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 2 Mar 2017 21:21:05 +0000 Subject: [RHSA-2017:0435-01] Moderate: python-oslo-middleware security update Message-ID: <201703022121.v22LL5NM031954@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python-oslo-middleware security update Advisory ID: RHSA-2017:0435-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0435.html Issue date: 2017-03-02 CVE Names: CVE-2017-2592 ===================================================================== 1. Summary: An update for python-oslo-middleware is now available for Red Hat OpenStack Platform 9.0 (Mitaka). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 9.0 - noarch 3. Description: The OpenStack Oslo Middleware library provides components that can be injected into WSGI pipelines to intercept request and response flows. The base class can be enhanced with functionality like adding or updating HTTP headers, or to offer support for limiting size or connections. Security Fix(es): * An information-disclosure flaw was found in oslo.middleware. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens). (CVE-2017-2592) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Divya K Konoor (IBM) as the original reporter. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1414698 - CVE-2017-2592 python-oslo-middleware: CatchErrors leaks sensitive values into error logs 6. Package List: Red Hat OpenStack Platform 9.0: Source: python-oslo-middleware-3.7.0-2.el7ost.src.rpm noarch: python-oslo-middleware-3.7.0-2.el7ost.noarch.rpm python-oslo-middleware-tests-3.7.0-2.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2592 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYuIyrXlSAg2UNWIIRAqAIAKDEAYHd1OjZYgmbbAd2pOygVWE+BgCfe9tH K1/gs1ZYd1ihomnS8N7ZMyQ= =9QDK -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Mar 3 17:56:05 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 3 Mar 2017 17:56:05 +0000 Subject: [RHSA-2017:0444-02] Moderate: rpm-ostree and rpm-ostree-client security, bug fix, and enhancement update Message-ID: <201703031758.v23Hw9NU013938@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rpm-ostree and rpm-ostree-client security, bug fix, and enhancement update Advisory ID: RHSA-2017:0444-02 Product: Red Hat Enterprise Linux Atomic Host Advisory URL: https://access.redhat.com/errata/RHSA-2017:0444 Issue date: 2017-03-02 CVE Names: CVE-2017-2623 ===================================================================== 1. Summary: An update for rpm-ostree and rpm-ostree-client is now available for Red Hat Enterprise Linux Atomic Host 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Atomic Host 7 - x86_64 3. Description: The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands which can be used both on client systems as well as server-side composes. The rpm-ostree-client package provides commands usable on client systems to upgrade and rollback. The following packages have been upgraded to a later upstream version: rpm-ostree (2017.1), rpm-ostree-client (2017.1). (BZ#1416089) Security Fix(es): * It was discovered that rpm-ostree and rpm-ostree-client fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default. (CVE-2017-2623) This issue was discovered by Colin Walters (Red Hat). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1416089 - Rebase ostree + rpm-ostree for 7.3.3 1421781 - Package layering non-root packages does not install var paths owned by root 1421867 - rpm-ostree daemon does not start when system is unsubscribed 1422157 - CVE-2017-2623 rpm-ostree and rpm-ostree-client fail to check gpg package signatures when layering 6. Package List: Red Hat Enterprise Linux Atomic Host 7: Source: rpm-ostree-2017.1-5.atomic.el7.src.rpm rpm-ostree-client-2017.1-6.atomic.el7.src.rpm x86_64: rpm-ostree-2017.1-5.atomic.el7.x86_64.rpm rpm-ostree-client-2017.1-6.atomic.el7.x86_64.rpm rpm-ostree-client-debuginfo-2017.1-6.atomic.el7.x86_64.rpm rpm-ostree-debuginfo-2017.1-5.atomic.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2623 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYua6VXlSAg2UNWIIRArH9AKC6iEqsWOpD4fnaGUOv/+lX/lA+hwCgrhqf MiRkWlUViSI8bMY3ORUT38k= =iyES -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Mar 6 16:52:17 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 6 Mar 2017 16:52:17 +0000 Subject: [RHSA-2017:0448-01] Important: ansible and openshift-ansible security and bug fix update Message-ID: <201703061652.v26GqJaK023548@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: ansible and openshift-ansible security and bug fix update Advisory ID: RHSA-2017:0448-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2017:0448 Issue date: 2017-03-06 CVE Names: CVE-2016-9587 ===================================================================== 1. Summary: An update for ansible and openshift-ansible is now available for Red Hat OpenShift Container Platform 3.2, Red Hat OpenShift Container Platform 3.3, and Red Hat OpenShift Container Platform 3.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 3.2 - noarch Red Hat OpenShift Container Platform 3.3 - noarch Red Hat OpenShift Container Platform 3.4 - noarch 3. Description: Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments. Ansible is a SSH-based configuration management, deployment, and task execution system. The openshift-ansible packages contain Ansible code and playbooks for installing and upgrading OpenShift Container Platform 3. Security Fix(es): * An input validation vulnerability was found in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. (CVE-2016-9587) Bug Fix(es): Space precludes documenting all of the non-security bug fixes in this advisory. See the relevant OpenShift Container Platform Release Notes linked to in the References section, which will be updated shortly for this release. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures: # yum update atomic-openshift-utils This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1379189 - [3.2] ansible sometimes gets UNREACHABLE error after iptables restarted 1388016 - [3.3] The insecure-registry address was removed during upgrade 1389263 - [3.4] the summary of json report should include total/ok number after certificate expiry check 1393000 - [3.3] Ansible upgrade from 3.2 to 3.3 fails 1404378 - CVE-2016-9587 Ansible: Compromised remote hosts can lead to running commands on the Ansible controller 1414276 - [3.3] Installer is failing when `ansible_user` is set to Windows Login which requires dom\user format 1415067 - [3.2]Installer should persist net.ipv4.ip_forward 1416926 - [3.3] ansible sometimes gets UNREACHABLE error after iptables restarted 1416927 - [3.4] ansible sometimes gets UNREACHABLE error after iptables restarted 1417680 - [3.2] Backport openshift_certificate_expiry role 1417681 - [3.4] Backport openshift_certificate_expiry role 1417682 - [3.3] Backport openshift_certificate_expiry role 1419493 - [3.4] Installer pulls in 3.3 registry-console image 1419533 - [3.2]Installation on node failed when creating node config 1419654 - [3.4] Containerized advanced installation fails due to missing CA certificate /etc/origin/master/ca.crt 1420393 - [3.4] conntrack executable not found on $PATH during cluster horizontal run 1420395 - [3.3] conntrack executable not found on $PATH during cluster horizontal run 1421053 - [quick installer 3.4] quick installer failed due to a python method failure 1421059 - [quick installer 3.2]quick installer failed due to a python method failure 1421061 - [quick installer 3.3]quick installer failed due to a python method failure 1421860 - [3.4] Metrics Resolution of Heapster Image Should be 30s to Match cAdvisor 1422361 - [3.4] Advanced installer fails if python-six not available 1426705 - [3.4] Installer is failing when `ansible_user` is set to Windows Login which requires dom\user format 6. Package List: Red Hat OpenShift Container Platform 3.2: Source: ansible-2.2.1.0-2.el7.src.rpm openshift-ansible-3.2.53-1.git.0.2fefc17.el7.src.rpm noarch: ansible-2.2.1.0-2.el7.noarch.rpm atomic-openshift-utils-3.2.53-1.git.0.2fefc17.el7.noarch.rpm openshift-ansible-3.2.53-1.git.0.2fefc17.el7.noarch.rpm openshift-ansible-docs-3.2.53-1.git.0.2fefc17.el7.noarch.rpm openshift-ansible-filter-plugins-3.2.53-1.git.0.2fefc17.el7.noarch.rpm openshift-ansible-lookup-plugins-3.2.53-1.git.0.2fefc17.el7.noarch.rpm openshift-ansible-playbooks-3.2.53-1.git.0.2fefc17.el7.noarch.rpm openshift-ansible-roles-3.2.53-1.git.0.2fefc17.el7.noarch.rpm Red Hat OpenShift Container Platform 3.3: Source: ansible-2.2.1.0-2.el7.src.rpm openshift-ansible-3.3.67-1.git.0.7c5da0c.el7.src.rpm noarch: ansible-2.2.1.0-2.el7.noarch.rpm atomic-openshift-utils-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-callback-plugins-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-docs-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-filter-plugins-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-lookup-plugins-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-playbooks-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm openshift-ansible-roles-3.3.67-1.git.0.7c5da0c.el7.noarch.rpm Red Hat OpenShift Container Platform 3.4: Source: ansible-2.2.1.0-2.el7.src.rpm openshift-ansible-3.4.67-1.git.0.14a0b4d.el7.src.rpm noarch: ansible-2.2.1.0-2.el7.noarch.rpm atomic-openshift-utils-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-callback-plugins-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-docs-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-filter-plugins-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-lookup-plugins-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-playbooks-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm openshift-ansible-roles-3.4.67-1.git.0.14a0b4d.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-9587 https://access.redhat.com/security/updates/classification/#important https://docs.openshift.com/enterprise/3.2/release_notes/ose_3_2_release_notes.html https://docs.openshift.com/container-platform/3.3/release_notes/ocp_3_3_release_notes.html https://docs.openshift.com/container-platform/3.4/release_notes/ocp_3_4_release_notes.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYvZOvXlSAg2UNWIIRAtBgAKC/a5j2ToXiQ4uD9JYy2bMKYn+9JwCeL4nh A7ntVFTpJOYbu3M9BeVZGqk= =mgid -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 7 11:18:30 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 7 Mar 2017 11:18:30 +0000 Subject: [RHSA-2017:0454-01] Important: kvm security update Message-ID: <201703071118.v27BIWmE029058@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kvm security update Advisory ID: RHSA-2017:0454-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0454.html Issue date: 2017-03-07 CVE Names: CVE-2017-2615 CVE-2017-2620 ===================================================================== 1. Summary: An update for kvm is now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Multi OS (v. 5 client) - x86_64 Red Hat Enterprise Linux Virtualization (v. 5 server) - x86_64 3. Description: KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. Security Fix(es): * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host. (CVE-2017-2615) * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620) Red Hat would like to thank Wjjzhang (Tencent.com Inc.) and Li Qiang (360.cn Inc.) for reporting CVE-2017-2615. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 Note: The procedure in the Solution section must be performed before this update will take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1418200 - CVE-2017-2615 Qemu: display: cirrus: oob access while doing bitblt copy backward mode 1420484 - CVE-2017-2620 Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo 6. Package List: Red Hat Enterprise Linux Desktop Multi OS (v. 5 client): Source: kvm-83-277.el5_11.src.rpm x86_64: kmod-kvm-83-277.el5_11.x86_64.rpm kmod-kvm-debug-83-277.el5_11.x86_64.rpm kvm-83-277.el5_11.x86_64.rpm kvm-debuginfo-83-277.el5_11.x86_64.rpm kvm-qemu-img-83-277.el5_11.x86_64.rpm kvm-tools-83-277.el5_11.x86_64.rpm Red Hat Enterprise Linux Virtualization (v. 5 server): Source: kvm-83-277.el5_11.src.rpm x86_64: kmod-kvm-83-277.el5_11.x86_64.rpm kmod-kvm-debug-83-277.el5_11.x86_64.rpm kvm-83-277.el5_11.x86_64.rpm kvm-debuginfo-83-277.el5_11.x86_64.rpm kvm-qemu-img-83-277.el5_11.x86_64.rpm kvm-tools-83-277.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2615 https://access.redhat.com/security/cve/CVE-2017-2620 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYvpbiXlSAg2UNWIIRApHSAJ9IfMJsxpXxxdsUI0NFoMcuBYBZtQCfZt2X tHRNJqedRPYZzgtRGRNtzSU= =8TuI -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 8 13:32:33 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Mar 2017 13:32:33 +0000 Subject: [RHSA-2017:0462-01] Moderate: java-1.8.0-ibm security update Message-ID: <201703081332.v28DWZP7012452@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: java-1.8.0-ibm security update Advisory ID: RHSA-2017:0462-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0462.html Issue date: 2017-03-08 CVE Names: CVE-2016-2183 ===================================================================== 1. Summary: An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR4-FP1. Security Fix(es): * This update fixes a vulnerability in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about this flaw can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2016-2183) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm ppc64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm s390x: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.ppc64.rpm ppc64le: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm s390x: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.s390.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.s390.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/updates/classification/#moderate https://developer.ibm.com/javasdk/support/security-vulnerabilities/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwAfWXlSAg2UNWIIRApdJAJ9aWdfCBOWjqVaBLGFXAtS6LJvZXACgkneE 4LO+U1cfPB3cdxvKJ71gfCg= =89qB -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 8 16:27:51 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Mar 2017 11:27:51 -0500 Subject: [RHSA-2017:0461-01] Critical: firefox security update Message-ID: <201703081627.v28GRpJ5000318@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2017:0461-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0461.html Issue date: 2017-03-08 CVE Names: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Nils, Jerri Rice, Rh0, Anton Eliasson, David Kohlbrenner, Ivan Fratric of Google Project Zero, Anonymous, Eric Lawrence of Chrome Security, Boris Zbarsky, Christian Holler, Honza Bambas, Jon Coppeard, Randell Jesup, Andr? Bargull, Kan-Ru Chen, and Nathan Froyd as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1429778 - CVE-2017-5400 Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) 1429779 - CVE-2017-5401 Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) 1429780 - CVE-2017-5402 Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) 1429781 - CVE-2017-5404 Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) 1429782 - CVE-2017-5407 Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) 1429783 - CVE-2017-5410 Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) 1429784 - CVE-2017-5408 Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) 1429785 - CVE-2017-5405 Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) 1429786 - CVE-2017-5398 Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-52.0-4.el7_3.src.rpm x86_64: firefox-52.0-4.el7_3.x86_64.rpm firefox-debuginfo-52.0-4.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-52.0-4.el7_3.i686.rpm firefox-debuginfo-52.0-4.el7_3.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-52.0-4.el7_3.src.rpm aarch64: firefox-52.0-4.el7_3.aarch64.rpm firefox-debuginfo-52.0-4.el7_3.aarch64.rpm ppc64: firefox-52.0-4.el7_3.ppc64.rpm firefox-debuginfo-52.0-4.el7_3.ppc64.rpm ppc64le: firefox-52.0-4.el7_3.ppc64le.rpm firefox-debuginfo-52.0-4.el7_3.ppc64le.rpm s390x: firefox-52.0-4.el7_3.s390x.rpm firefox-debuginfo-52.0-4.el7_3.s390x.rpm x86_64: firefox-52.0-4.el7_3.x86_64.rpm firefox-debuginfo-52.0-4.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-52.0-4.el7_3.ppc.rpm firefox-debuginfo-52.0-4.el7_3.ppc.rpm s390x: firefox-52.0-4.el7_3.s390.rpm firefox-debuginfo-52.0-4.el7_3.s390.rpm x86_64: firefox-52.0-4.el7_3.i686.rpm firefox-debuginfo-52.0-4.el7_3.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-52.0-4.el7_3.src.rpm x86_64: firefox-52.0-4.el7_3.x86_64.rpm firefox-debuginfo-52.0-4.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-52.0-4.el7_3.i686.rpm firefox-debuginfo-52.0-4.el7_3.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5398 https://access.redhat.com/security/cve/CVE-2017-5400 https://access.redhat.com/security/cve/CVE-2017-5401 https://access.redhat.com/security/cve/CVE-2017-5402 https://access.redhat.com/security/cve/CVE-2017-5404 https://access.redhat.com/security/cve/CVE-2017-5405 https://access.redhat.com/security/cve/CVE-2017-5407 https://access.redhat.com/security/cve/CVE-2017-5408 https://access.redhat.com/security/cve/CVE-2017-5410 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2017-06 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwDECXlSAg2UNWIIRAhVbAJ0c/ktwnZJnJ4uvRFmys3PXJWfV2ACfSSu1 VdCJR8sX8trAF3L6yWo1lPY= =v6Wf -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 8 16:28:05 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Mar 2017 11:28:05 -0500 Subject: [RHSA-2017:0459-01] Critical: firefox security update Message-ID: <201703081628.v28GS5FS005401@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2017:0459-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0459.html Issue date: 2017-03-08 CVE Names: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 45.8.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Nils, Jerri Rice, Rh0, Anton Eliasson, David Kohlbrenner, Ivan Fratric of Google Project Zero, Anonymous, Eric Lawrence of Chrome Security, Boris Zbarsky, Christian Holler, Honza Bambas, Jon Coppeard, Randell Jesup, Andr? Bargull, Kan-Ru Chen, and Nathan Froyd as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1429778 - CVE-2017-5400 Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) 1429779 - CVE-2017-5401 Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) 1429780 - CVE-2017-5402 Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) 1429781 - CVE-2017-5404 Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) 1429782 - CVE-2017-5407 Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) 1429783 - CVE-2017-5410 Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) 1429784 - CVE-2017-5408 Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) 1429785 - CVE-2017-5405 Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) 1429786 - CVE-2017-5398 Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-45.8.0-2.el5_11.src.rpm i386: firefox-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm x86_64: firefox-45.8.0-2.el5_11.i386.rpm firefox-45.8.0-2.el5_11.x86_64.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-45.8.0-2.el5_11.src.rpm i386: firefox-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm ppc: firefox-45.8.0-2.el5_11.ppc64.rpm firefox-debuginfo-45.8.0-2.el5_11.ppc64.rpm s390x: firefox-45.8.0-2.el5_11.s390.rpm firefox-45.8.0-2.el5_11.s390x.rpm firefox-debuginfo-45.8.0-2.el5_11.s390.rpm firefox-debuginfo-45.8.0-2.el5_11.s390x.rpm x86_64: firefox-45.8.0-2.el5_11.i386.rpm firefox-45.8.0-2.el5_11.x86_64.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm i386: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm x86_64: firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm i386: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm ppc64: firefox-45.8.0-2.el6_8.ppc64.rpm firefox-debuginfo-45.8.0-2.el6_8.ppc64.rpm s390x: firefox-45.8.0-2.el6_8.s390x.rpm firefox-debuginfo-45.8.0-2.el6_8.s390x.rpm x86_64: firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-45.8.0-2.el6_8.ppc.rpm firefox-debuginfo-45.8.0-2.el6_8.ppc.rpm s390x: firefox-45.8.0-2.el6_8.s390.rpm firefox-debuginfo-45.8.0-2.el6_8.s390.rpm x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm i386: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm x86_64: firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5398 https://access.redhat.com/security/cve/CVE-2017-5400 https://access.redhat.com/security/cve/CVE-2017-5401 https://access.redhat.com/security/cve/CVE-2017-5402 https://access.redhat.com/security/cve/CVE-2017-5404 https://access.redhat.com/security/cve/CVE-2017-5405 https://access.redhat.com/security/cve/CVE-2017-5407 https://access.redhat.com/security/cve/CVE-2017-5408 https://access.redhat.com/security/cve/CVE-2017-5410 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2017-06 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwDESXlSAg2UNWIIRAnjwAKCdfWTRC98zhFV8g4cN9y2iLmZA1ACfbhez PNgicWgxJKDjkzmbQWkBwY4= =9w9S -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 14 06:22:52 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 14 Mar 2017 06:22:52 +0000 Subject: [RHSA-2017:0498-01] Important: thunderbird security update Message-ID: <201703140622.v2E6Mr3L027659@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: thunderbird security update Advisory ID: RHSA-2017:0498-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0498.html Issue date: 2017-03-14 CVE Names: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410 ===================================================================== 1. Summary: An update for thunderbird is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 45.8.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Nils, Jerri Rice, Rh0, Anton Eliasson, David Kohlbrenner, Ivan Fratric of Google Project Zero, Anonymous, Eric Lawrence of Chrome Security, Boris Zbarsky, Christian Holler, Honza Bambas, Jon Coppeard, Randell Jesup, Andr? Bargull, Kan-Ru Chen, and Nathan Froyd as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of Thunderbird must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1429778 - CVE-2017-5400 Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) 1429779 - CVE-2017-5401 Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) 1429780 - CVE-2017-5402 Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) 1429781 - CVE-2017-5404 Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) 1429782 - CVE-2017-5407 Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) 1429783 - CVE-2017-5410 Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) 1429784 - CVE-2017-5408 Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) 1429785 - CVE-2017-5405 Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) 1429786 - CVE-2017-5398 Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: thunderbird-45.8.0-1.el5_11.src.rpm i386: thunderbird-45.8.0-1.el5_11.i386.rpm thunderbird-debuginfo-45.8.0-1.el5_11.i386.rpm x86_64: thunderbird-45.8.0-1.el5_11.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server): Source: thunderbird-45.8.0-1.el5_11.src.rpm i386: thunderbird-45.8.0-1.el5_11.i386.rpm thunderbird-debuginfo-45.8.0-1.el5_11.i386.rpm x86_64: thunderbird-45.8.0-1.el5_11.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: thunderbird-45.8.0-1.el6_8.src.rpm i386: thunderbird-45.8.0-1.el6_8.i686.rpm thunderbird-debuginfo-45.8.0-1.el6_8.i686.rpm x86_64: thunderbird-45.8.0-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: thunderbird-45.8.0-1.el6_8.src.rpm i386: thunderbird-45.8.0-1.el6_8.i686.rpm thunderbird-debuginfo-45.8.0-1.el6_8.i686.rpm ppc64: thunderbird-45.8.0-1.el6_8.ppc64.rpm thunderbird-debuginfo-45.8.0-1.el6_8.ppc64.rpm s390x: thunderbird-45.8.0-1.el6_8.s390x.rpm thunderbird-debuginfo-45.8.0-1.el6_8.s390x.rpm x86_64: thunderbird-45.8.0-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: thunderbird-45.8.0-1.el6_8.src.rpm i386: thunderbird-45.8.0-1.el6_8.i686.rpm thunderbird-debuginfo-45.8.0-1.el6_8.i686.rpm x86_64: thunderbird-45.8.0-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: thunderbird-45.8.0-1.el7_3.src.rpm x86_64: thunderbird-45.8.0-1.el7_3.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: thunderbird-45.8.0-1.el7_3.src.rpm aarch64: thunderbird-45.8.0-1.el7_3.aarch64.rpm thunderbird-debuginfo-45.8.0-1.el7_3.aarch64.rpm ppc64le: thunderbird-45.8.0-1.el7_3.ppc64le.rpm thunderbird-debuginfo-45.8.0-1.el7_3.ppc64le.rpm x86_64: thunderbird-45.8.0-1.el7_3.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: thunderbird-45.8.0-1.el7_3.src.rpm x86_64: thunderbird-45.8.0-1.el7_3.x86_64.rpm thunderbird-debuginfo-45.8.0-1.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5398 https://access.redhat.com/security/cve/CVE-2017-5400 https://access.redhat.com/security/cve/CVE-2017-5401 https://access.redhat.com/security/cve/CVE-2017-5402 https://access.redhat.com/security/cve/CVE-2017-5404 https://access.redhat.com/security/cve/CVE-2017-5405 https://access.redhat.com/security/cve/CVE-2017-5407 https://access.redhat.com/security/cve/CVE-2017-5408 https://access.redhat.com/security/cve/CVE-2017-5410 https://access.redhat.com/security/updates/classification/#important https://www.mozilla.org/en-US/security/advisories/mfsa2017-07/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYx4wXXlSAg2UNWIIRAj6vAKCArI4a829ubCAR++6ubZgLxKOBYQCeJxnX +obsuOqy9xGOjcEdmZKYsn0= =RxER -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 14 06:23:46 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 14 Mar 2017 06:23:46 +0000 Subject: [RHSA-2017:0499-01] Important: chromium-browser security update Message-ID: <201703140623.v2E6NlRT013407@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2017:0499-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0499.html Issue date: 2017-03-14 CVE Names: CVE-2017-5029 CVE-2017-5030 CVE-2017-5031 CVE-2017-5032 CVE-2017-5033 CVE-2017-5034 CVE-2017-5035 CVE-2017-5036 CVE-2017-5037 CVE-2017-5038 CVE-2017-5039 CVE-2017-5040 CVE-2017-5041 CVE-2017-5042 CVE-2017-5043 CVE-2017-5044 CVE-2017-5045 CVE-2017-5046 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 57.0.2987.98. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5029, CVE-2017-5030, CVE-2017-5031, CVE-2017-5032, CVE-2017-5034, CVE-2017-5035, CVE-2017-5036, CVE-2017-5037, CVE-2017-5039, CVE-2017-5033, CVE-2017-5038, CVE-2017-5040, CVE-2017-5041, CVE-2017-5042, CVE-2017-5043, CVE-2017-5044, CVE-2017-5045, CVE-2017-5046) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1431030 - CVE-2017-5030 chromium-browser: memory corruption in v8 1431031 - CVE-2017-5031 chromium-browser: use after free in angle 1431032 - CVE-2017-5032 chromium-browser: out of bounds write in pdfium 1431033 - CVE-2017-5029 chromium-browser: integer overflow in libxslt 1431034 - CVE-2017-5034 chromium-browser: use after free in pdfium 1431036 - CVE-2017-5035 chromium-browser: incorrect security ui in omnibox 1431037 - CVE-2017-5036 chromium-browser: use after free in pdfium 1431038 - CVE-2017-5037 chromium-browser: multiple out of bounds writes in chunkdemuxer 1431039 - CVE-2017-5039 chromium-browser: use after free in pdfium 1431040 - CVE-2017-5040 chromium-browser: information disclosure in v8 1431041 - CVE-2017-5041 chromium-browser: address spoofing in omnibox 1431042 - CVE-2017-5033 chromium-browser: bypass of content security policy in blink 1431043 - CVE-2017-5042 chromium-browser: incorrect handling of cookies in cast 1431044 - CVE-2017-5038 chromium-browser: use after free in guestview 1431045 - CVE-2017-5043 chromium-browser: use after free in guestview 1431046 - CVE-2017-5044 chromium-browser: heap overflow in skia 1431047 - CVE-2017-5045 chromium-browser: information disclosure in xss auditor 1431048 - CVE-2017-5046 chromium-browser: information disclosure in blink 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-57.0.2987.98-1.el6.i686.rpm chromium-browser-debuginfo-57.0.2987.98-1.el6.i686.rpm x86_64: chromium-browser-57.0.2987.98-1.el6.x86_64.rpm chromium-browser-debuginfo-57.0.2987.98-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-57.0.2987.98-1.el6.i686.rpm chromium-browser-debuginfo-57.0.2987.98-1.el6.i686.rpm x86_64: chromium-browser-57.0.2987.98-1.el6.x86_64.rpm chromium-browser-debuginfo-57.0.2987.98-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-57.0.2987.98-1.el6.i686.rpm chromium-browser-debuginfo-57.0.2987.98-1.el6.i686.rpm x86_64: chromium-browser-57.0.2987.98-1.el6.x86_64.rpm chromium-browser-debuginfo-57.0.2987.98-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5029 https://access.redhat.com/security/cve/CVE-2017-5030 https://access.redhat.com/security/cve/CVE-2017-5031 https://access.redhat.com/security/cve/CVE-2017-5032 https://access.redhat.com/security/cve/CVE-2017-5033 https://access.redhat.com/security/cve/CVE-2017-5034 https://access.redhat.com/security/cve/CVE-2017-5035 https://access.redhat.com/security/cve/CVE-2017-5036 https://access.redhat.com/security/cve/CVE-2017-5037 https://access.redhat.com/security/cve/CVE-2017-5038 https://access.redhat.com/security/cve/CVE-2017-5039 https://access.redhat.com/security/cve/CVE-2017-5040 https://access.redhat.com/security/cve/CVE-2017-5041 https://access.redhat.com/security/cve/CVE-2017-5042 https://access.redhat.com/security/cve/CVE-2017-5043 https://access.redhat.com/security/cve/CVE-2017-5044 https://access.redhat.com/security/cve/CVE-2017-5045 https://access.redhat.com/security/cve/CVE-2017-5046 https://access.redhat.com/security/updates/classification/#important https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYx4xUXlSAg2UNWIIRAoY/AJ4wLDzxxWt36h8cXHuH+po71VaBEwCeOFOj PYNzUREm9y2ZxdWb+S9oQvE= =a7NV -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 14 15:48:18 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 14 Mar 2017 15:48:18 +0000 Subject: [RHSA-2017:0501-01] Important: kernel security and bug fix update Message-ID: <201703141547.v2EFlo4k015794@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2017:0501-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0501.html Issue date: 2017-03-14 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.2) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue. Bug Fix(es): * Previously, running the "ethtool -S" command to get the statistics of a Brocade Network Adapter (BNA) sometimes caused a kernel panic. This update applies a set of patches to the bna driver, and the kernel panic no longer occurs in the described scenario. (BZ#1408130) * Use of a multi-threaded workload with high memory mappings sometimes caused a kernel panic, due to a race condition between the context switch and the pagetable upgrade. This update fixes the switch_mm() by using the complete asce parameter instead of the asce_bits parameter. As a result, the kernel no longer panics in the described scenario. (BZ#1410865) * Previously, the kernel was sending a Transmission Control Protocol (TCP) window which had a size of zero for a socket with an empty receive queue. Consequently, the TCP session became unresponsive. This update fixes the ibmveth driver to set correct values of the gso_size and gso_type variables and to calculate the value of the gso_segs variable for large packets. As a result, the TCP session no longer hangs in the described scenario. (BZ#1411381) * Previously, booting a kdump kernel in some cases failed with this error: Kernel panic - not syncing: Watchdog detected hard LOCKUP on CPU 0. This update ensures that the hpet timer software counters, including hpet_default_delta and hpet_t1_cmp, are initialized before an interrupt request is registered, and the kdump kernel now boots without the mentioned error message. (BZ#1404183) * When one of the drives became unresponsive, all other drives intermittently hung, because the megaraid_sas driver incorrectly sent a reset request to the PowerEdge RAID Controller (PERC). This update fixes megaraid_sas, and thus the hang of one drive no longer leads to intermittent loss of access to all drives on the system. (BZ#1398174) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.2): Source: kernel-3.10.0-327.49.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.49.2.el7.noarch.rpm kernel-doc-3.10.0-327.49.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.49.2.el7.x86_64.rpm kernel-debug-3.10.0-327.49.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.49.2.el7.x86_64.rpm kernel-devel-3.10.0-327.49.2.el7.x86_64.rpm kernel-headers-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.49.2.el7.x86_64.rpm perf-3.10.0-327.49.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm python-perf-3.10.0-327.49.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.49.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.2): Source: kernel-3.10.0-327.49.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.49.2.el7.noarch.rpm kernel-doc-3.10.0-327.49.2.el7.noarch.rpm ppc64: kernel-3.10.0-327.49.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.49.2.el7.ppc64.rpm kernel-debug-3.10.0-327.49.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.49.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.49.2.el7.ppc64.rpm kernel-devel-3.10.0-327.49.2.el7.ppc64.rpm kernel-headers-3.10.0-327.49.2.el7.ppc64.rpm kernel-tools-3.10.0-327.49.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.49.2.el7.ppc64.rpm perf-3.10.0-327.49.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm python-perf-3.10.0-327.49.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.49.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debug-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.49.2.el7.ppc64le.rpm kernel-devel-3.10.0-327.49.2.el7.ppc64le.rpm kernel-headers-3.10.0-327.49.2.el7.ppc64le.rpm kernel-tools-3.10.0-327.49.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.49.2.el7.ppc64le.rpm perf-3.10.0-327.49.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm python-perf-3.10.0-327.49.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm s390x: kernel-3.10.0-327.49.2.el7.s390x.rpm kernel-debug-3.10.0-327.49.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.49.2.el7.s390x.rpm kernel-debug-devel-3.10.0-327.49.2.el7.s390x.rpm kernel-debuginfo-3.10.0-327.49.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.49.2.el7.s390x.rpm kernel-devel-3.10.0-327.49.2.el7.s390x.rpm kernel-headers-3.10.0-327.49.2.el7.s390x.rpm kernel-kdump-3.10.0-327.49.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.49.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.49.2.el7.s390x.rpm perf-3.10.0-327.49.2.el7.s390x.rpm perf-debuginfo-3.10.0-327.49.2.el7.s390x.rpm python-perf-3.10.0-327.49.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.s390x.rpm x86_64: kernel-3.10.0-327.49.2.el7.x86_64.rpm kernel-debug-3.10.0-327.49.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.49.2.el7.x86_64.rpm kernel-devel-3.10.0-327.49.2.el7.x86_64.rpm kernel-headers-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.49.2.el7.x86_64.rpm perf-3.10.0-327.49.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm python-perf-3.10.0-327.49.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.2): ppc64: kernel-debug-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.49.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.49.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.49.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.49.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.49.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.49.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyBCVXlSAg2UNWIIRAgHdAJ97IVCejcXddxnLrTFBO5qrp35lNACfbQN7 q1pdhdo5qO/uSRjGNnbw/yg= =Ccwh -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 13:54:35 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 13:54:35 +0000 Subject: [RHSA-2017:0526-01] Critical: flash-plugin security update Message-ID: <201703151354.v2FDsbuc014765@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2017:0526-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0526.html Issue date: 2017-03-15 CVE Names: CVE-2017-2997 CVE-2017-2998 CVE-2017-2999 CVE-2017-3000 CVE-2017-3001 CVE-2017-3002 CVE-2017-3003 ===================================================================== 1. Summary: An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 25.0.0.127. Security Fix(es): * This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2017-2997, CVE-2017-2998, CVE-2017-2999, CVE-2017-3000, CVE-2017-3001, CVE-2017-3002, CVE-2017-3003) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1432200 - CVE-2017-2997 CVE-2017-2998 CVE-2017-2999 CVE-2017-3000 CVE-2017-3001 CVE-2017-3002 CVE-2017-3003 flash-plugin: multiple code execution issues fixed in APSB17-07 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-25.0.0.127-1.el6_8.i686.rpm x86_64: flash-plugin-25.0.0.127-1.el6_8.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-25.0.0.127-1.el6_8.i686.rpm x86_64: flash-plugin-25.0.0.127-1.el6_8.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-25.0.0.127-1.el6_8.i686.rpm x86_64: flash-plugin-25.0.0.127-1.el6_8.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2997 https://access.redhat.com/security/cve/CVE-2017-2998 https://access.redhat.com/security/cve/CVE-2017-2999 https://access.redhat.com/security/cve/CVE-2017-3000 https://access.redhat.com/security/cve/CVE-2017-3001 https://access.redhat.com/security/cve/CVE-2017-3002 https://access.redhat.com/security/cve/CVE-2017-3003 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb17-07.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUd/XlSAg2UNWIIRAjo7AKCrimVBIyGj6P/1clscrU/Wa/oPmgCgsiiz 2TaW/olyN7VTrwthyA0biv4= =zVqu -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 13:56:22 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 13:56:22 +0000 Subject: [RHSA-2017:0527-01] Moderate: tomcat6 security update Message-ID: <201703151356.v2FDuRcg000714@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tomcat6 security update Advisory ID: RHSA-2017:0527-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0527.html Issue date: 2017-03-15 CVE Names: CVE-2016-6816 CVE-2016-8745 ===================================================================== 1. Summary: An update for tomcat6 is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816) Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. * A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1397484 - CVE-2016-6816 tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests 1403824 - CVE-2016-8745 tomcat: information disclosure due to incorrect Processor sharing 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: tomcat6-6.0.24-105.el6_8.src.rpm noarch: tomcat6-6.0.24-105.el6_8.noarch.rpm tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-lib-6.0.24-105.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: tomcat6-6.0.24-105.el6_8.src.rpm noarch: tomcat6-6.0.24-105.el6_8.noarch.rpm tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-lib-6.0.24-105.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: tomcat6-6.0.24-105.el6_8.src.rpm noarch: tomcat6-6.0.24-105.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-lib-6.0.24-105.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: tomcat6-6.0.24-105.el6_8.src.rpm noarch: tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: tomcat6-6.0.24-105.el6_8.src.rpm noarch: tomcat6-6.0.24-105.el6_8.noarch.rpm tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm tomcat6-lib-6.0.24-105.el6_8.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: tomcat6-6.0.24-105.el6_8.src.rpm noarch: tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6816 https://access.redhat.com/security/cve/CVE-2016-8745 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUfJXlSAg2UNWIIRAkTcAKCDm0ks64tetMz1A5Ui5bTODMeXCQCgreFB 8LuRSPjXmcOCIpY9D4+w5R0= =OgIl -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 13:58:23 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 13:58:23 +0000 Subject: [RHSA-2017:0530-01] Moderate: rabbitmq-server security and bug fix update Message-ID: <201703151358.v2FDwPue018225@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rabbitmq-server security and bug fix update Advisory ID: RHSA-2017:0530-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0530.html Issue date: 2017-03-15 CVE Names: CVE-2015-8786 ===================================================================== 1. Summary: An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 - noarch 3. Description: RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. Security Fix(es): * A resource-consumption flaw was found in RabbitMQ Server, where the lengths_age or lengths_incr parameters were not validated in the management plugin. Remote, authenticated users with certain privileges could exploit this flaw to cause a denial of service by passing values which were too large. (CVE-2015-8786) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1404150 - CVE-2015-8786 rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin 1405211 - RabbitMQ logs are not rotated properly 6. Package List: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7: Source: rabbitmq-server-3.3.5-31.el7ost.src.rpm noarch: rabbitmq-server-3.3.5-31.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8786 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUhPXlSAg2UNWIIRAhpWAJ9stnNphS6VFrD2DhJ7/7eEuvDiAQCgvdL3 jmcjylRQELM9tK08nIBBAPs= =axL1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 14:00:08 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 14:00:08 +0000 Subject: [RHSA-2017:0531-01] Moderate: rabbitmq-server security and bug fix update Message-ID: <201703151400.v2FE09xX020876@int-mx13.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rabbitmq-server security and bug fix update Advisory ID: RHSA-2017:0531-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0531.html Issue date: 2017-03-15 CVE Names: CVE-2015-8786 ===================================================================== 1. Summary: An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 - noarch 3. Description: RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. Security Fix(es): * A resource-consumption flaw was found in RabbitMQ Server, where the lengths_age or lengths_incr parameters were not validated in the management plugin. Remote, authenticated users with certain privileges could exploit this flaw to cause a denial of service by passing values which were too large. (CVE-2015-8786) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1404150 - CVE-2015-8786 rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin 6. Package List: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7: Source: rabbitmq-server-3.3.5-31.el7ost.src.rpm noarch: rabbitmq-server-3.3.5-31.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8786 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUjWXlSAg2UNWIIRAgOyAJ4goS06DufwLleq2u0/E+C4jgdKXQCglq1y kL1r8or5F1urEI02Eyf26Rc= =yJI6 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 14:00:44 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 14:00:44 +0000 Subject: [RHSA-2017:0532-01] Moderate: rabbitmq-server security and bug fix update Message-ID: <201703151400.v2FE0ldq002397@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rabbitmq-server security and bug fix update Advisory ID: RHSA-2017:0532-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0532.html Issue date: 2017-03-15 CVE Names: CVE-2015-8786 ===================================================================== 1. Summary: An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 - noarch 3. Description: RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. Security Fix(es): * A resource-consumption flaw was found in RabbitMQ Server, where the lengths_age or lengths_incr parameters were not validated in the management plugin. Remote, authenticated users with certain privileges could exploit this flaw to cause a denial of service by passing values which were too large. (CVE-2015-8786) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1404150 - CVE-2015-8786 rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7: Source: rabbitmq-server-3.3.5-31.el7ost.src.rpm noarch: rabbitmq-server-3.3.5-31.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8786 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUj0XlSAg2UNWIIRAgjcAJ42i3fyzeKkGp8jYKVy0C9fIBf5+ACgkOJg U6qVLRSwiLgtjP571vdwPHc= =N/TM -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 14:02:35 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 14:02:35 +0000 Subject: [RHSA-2017:0533-01] Moderate: rabbitmq-server security update Message-ID: <201703151402.v2FE2bQa022107@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rabbitmq-server security update Advisory ID: RHSA-2017:0533-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0533.html Issue date: 2017-03-15 CVE Names: CVE-2015-8786 ===================================================================== 1. Summary: An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 - noarch 3. Description: RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. Security Fix(es): * A resource-consumption flaw was found in RabbitMQ Server, where the lengths_age or lengths_incr parameters were not validated in the management plugin. Remote, authenticated users with certain privileges could exploit this flaw to cause a denial of service by passing values which were too large. (CVE-2015-8786) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1404150 - CVE-2015-8786 rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6: Source: rabbitmq-server-3.1.5-7.el6ost.src.rpm noarch: rabbitmq-server-3.1.5-7.el6ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8786 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUkpXlSAg2UNWIIRAqc6AKCoUdnjTEWkdm4bdBH5w5RtZQ+15gCfahMz tCBGFLHZNMlJwV/h6Gdfcgg= =QAzf -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 14:03:36 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 10:03:36 -0400 Subject: [RHSA-2017:0535-01] Important: policycoreutils security update Message-ID: <201703151403.v2FE3agO014270@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: policycoreutils security update Advisory ID: RHSA-2017:0535-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0535.html Issue date: 2017-03-15 CVE Names: CVE-2016-7545 ===================================================================== 1. Summary: An update for policycoreutils is now available for Red Hat Enterprise Linux 7.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64 3. Description: The policycoreutils packages contain the core policy utilities required to manage a SELinux environment. Security Fix(es): * It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox. (CVE-2016-7545) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1378577 - CVE-2016-7545 policycoreutils: SELinux sandbox escape via TIOCSTI ioctl 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.2): Source: policycoreutils-2.2.5-21.el7_2.src.rpm x86_64: policycoreutils-2.2.5-21.el7_2.x86_64.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.x86_64.rpm policycoreutils-newrole-2.2.5-21.el7_2.x86_64.rpm policycoreutils-python-2.2.5-21.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2): x86_64: policycoreutils-debuginfo-2.2.5-21.el7_2.i686.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.x86_64.rpm policycoreutils-devel-2.2.5-21.el7_2.i686.rpm policycoreutils-devel-2.2.5-21.el7_2.x86_64.rpm policycoreutils-gui-2.2.5-21.el7_2.x86_64.rpm policycoreutils-restorecond-2.2.5-21.el7_2.x86_64.rpm policycoreutils-sandbox-2.2.5-21.el7_2.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.2): Source: policycoreutils-2.2.5-21.el7_2.src.rpm ppc64: policycoreutils-2.2.5-21.el7_2.ppc64.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.ppc.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.ppc64.rpm policycoreutils-devel-2.2.5-21.el7_2.ppc.rpm policycoreutils-devel-2.2.5-21.el7_2.ppc64.rpm policycoreutils-gui-2.2.5-21.el7_2.ppc64.rpm policycoreutils-newrole-2.2.5-21.el7_2.ppc64.rpm policycoreutils-python-2.2.5-21.el7_2.ppc64.rpm policycoreutils-sandbox-2.2.5-21.el7_2.ppc64.rpm ppc64le: policycoreutils-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-devel-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-gui-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-newrole-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-python-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-sandbox-2.2.5-21.el7_2.ppc64le.rpm s390x: policycoreutils-2.2.5-21.el7_2.s390x.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.s390.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.s390x.rpm policycoreutils-devel-2.2.5-21.el7_2.s390.rpm policycoreutils-devel-2.2.5-21.el7_2.s390x.rpm policycoreutils-gui-2.2.5-21.el7_2.s390x.rpm policycoreutils-newrole-2.2.5-21.el7_2.s390x.rpm policycoreutils-python-2.2.5-21.el7_2.s390x.rpm policycoreutils-sandbox-2.2.5-21.el7_2.s390x.rpm x86_64: policycoreutils-2.2.5-21.el7_2.x86_64.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.i686.rpm policycoreutils-debuginfo-2.2.5-21.el7_2.x86_64.rpm policycoreutils-devel-2.2.5-21.el7_2.i686.rpm policycoreutils-devel-2.2.5-21.el7_2.x86_64.rpm policycoreutils-gui-2.2.5-21.el7_2.x86_64.rpm policycoreutils-newrole-2.2.5-21.el7_2.x86_64.rpm policycoreutils-python-2.2.5-21.el7_2.x86_64.rpm policycoreutils-sandbox-2.2.5-21.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.2): ppc64: policycoreutils-debuginfo-2.2.5-21.el7_2.ppc64.rpm policycoreutils-restorecond-2.2.5-21.el7_2.ppc64.rpm ppc64le: policycoreutils-debuginfo-2.2.5-21.el7_2.ppc64le.rpm policycoreutils-restorecond-2.2.5-21.el7_2.ppc64le.rpm s390x: policycoreutils-debuginfo-2.2.5-21.el7_2.s390x.rpm policycoreutils-restorecond-2.2.5-21.el7_2.s390x.rpm x86_64: policycoreutils-debuginfo-2.2.5-21.el7_2.x86_64.rpm policycoreutils-restorecond-2.2.5-21.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-7545 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUm2XlSAg2UNWIIRAgmuAJ0ZFvl6kYTuFqzVDBe3YT5vZIMnQQCgtqDI DMt+NnX2qyM13MAkwgIOZVA= =dbZF -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 15 14:03:52 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Mar 2017 10:03:52 -0400 Subject: [RHSA-2017:0536-01] Important: policycoreutils security update Message-ID: <201703151403.v2FE3qKA002563@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: policycoreutils security update Advisory ID: RHSA-2017:0536-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0536.html Issue date: 2017-03-15 CVE Names: CVE-2016-7545 ===================================================================== 1. Summary: An update for policycoreutils is now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.1) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.1) - ppc64, ppc64le, s390x, x86_64 3. Description: The policycoreutils packages contain the core policy utilities required to manage a SELinux environment. Security Fix(es): * It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox. (CVE-2016-7545) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1378577 - CVE-2016-7545 policycoreutils: SELinux sandbox escape via TIOCSTI ioctl 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1): Source: policycoreutils-2.2.5-16.el7_1.src.rpm x86_64: policycoreutils-2.2.5-16.el7_1.x86_64.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.x86_64.rpm policycoreutils-newrole-2.2.5-16.el7_1.x86_64.rpm policycoreutils-python-2.2.5-16.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1): x86_64: policycoreutils-debuginfo-2.2.5-16.el7_1.i686.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.x86_64.rpm policycoreutils-devel-2.2.5-16.el7_1.i686.rpm policycoreutils-devel-2.2.5-16.el7_1.x86_64.rpm policycoreutils-gui-2.2.5-16.el7_1.x86_64.rpm policycoreutils-restorecond-2.2.5-16.el7_1.x86_64.rpm policycoreutils-sandbox-2.2.5-16.el7_1.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: policycoreutils-2.2.5-16.el7_1.src.rpm ppc64: policycoreutils-2.2.5-16.el7_1.ppc64.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.ppc.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.ppc64.rpm policycoreutils-devel-2.2.5-16.el7_1.ppc.rpm policycoreutils-devel-2.2.5-16.el7_1.ppc64.rpm policycoreutils-gui-2.2.5-16.el7_1.ppc64.rpm policycoreutils-newrole-2.2.5-16.el7_1.ppc64.rpm policycoreutils-python-2.2.5-16.el7_1.ppc64.rpm policycoreutils-sandbox-2.2.5-16.el7_1.ppc64.rpm s390x: policycoreutils-2.2.5-16.el7_1.s390x.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.s390.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.s390x.rpm policycoreutils-devel-2.2.5-16.el7_1.s390.rpm policycoreutils-devel-2.2.5-16.el7_1.s390x.rpm policycoreutils-gui-2.2.5-16.el7_1.s390x.rpm policycoreutils-newrole-2.2.5-16.el7_1.s390x.rpm policycoreutils-python-2.2.5-16.el7_1.s390x.rpm policycoreutils-sandbox-2.2.5-16.el7_1.s390x.rpm x86_64: policycoreutils-2.2.5-16.el7_1.x86_64.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.i686.rpm policycoreutils-debuginfo-2.2.5-16.el7_1.x86_64.rpm policycoreutils-devel-2.2.5-16.el7_1.i686.rpm policycoreutils-devel-2.2.5-16.el7_1.x86_64.rpm policycoreutils-gui-2.2.5-16.el7_1.x86_64.rpm policycoreutils-newrole-2.2.5-16.el7_1.x86_64.rpm policycoreutils-python-2.2.5-16.el7_1.x86_64.rpm policycoreutils-sandbox-2.2.5-16.el7_1.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: policycoreutils-2.2.5-16.ael7b_1.src.rpm ppc64le: policycoreutils-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-debuginfo-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-devel-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-gui-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-newrole-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-python-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-sandbox-2.2.5-16.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64: policycoreutils-debuginfo-2.2.5-16.el7_1.ppc64.rpm policycoreutils-restorecond-2.2.5-16.el7_1.ppc64.rpm s390x: policycoreutils-debuginfo-2.2.5-16.el7_1.s390x.rpm policycoreutils-restorecond-2.2.5-16.el7_1.s390x.rpm x86_64: policycoreutils-debuginfo-2.2.5-16.el7_1.x86_64.rpm policycoreutils-restorecond-2.2.5-16.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64le: policycoreutils-debuginfo-2.2.5-16.ael7b_1.ppc64le.rpm policycoreutils-restorecond-2.2.5-16.ael7b_1.ppc64le.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-7545 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYyUnEXlSAg2UNWIIRAon4AKCgxQUpVa9MI+Lfg2nkNvQxAZMz7QCgwyr7 GjOwIm9OkFYG6Qg45YRBDWM= =Vwr4 -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Mar 17 22:22:37 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 17 Mar 2017 18:22:37 -0400 Subject: [RHSA-2017:0558-01] Critical: firefox security update Message-ID: <201703172222.v2HMMb3s020930@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2017:0558-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0558.html Issue date: 2017-03-17 CVE Names: CVE-2017-5428 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. Security Fix(es): * A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5428) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Chaitin Security Research Lab via Trend Micro's Zero Day Initiative as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1433202 - CVE-2017-5428 Mozilla: integer overflow in createImageBitmap() (MFSA 2017-08) 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-52.0-5.el7_3.src.rpm x86_64: firefox-52.0-5.el7_3.x86_64.rpm firefox-debuginfo-52.0-5.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-52.0-5.el7_3.i686.rpm firefox-debuginfo-52.0-5.el7_3.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-52.0-5.el7_3.src.rpm aarch64: firefox-52.0-5.el7_3.aarch64.rpm firefox-debuginfo-52.0-5.el7_3.aarch64.rpm ppc64: firefox-52.0-5.el7_3.ppc64.rpm firefox-debuginfo-52.0-5.el7_3.ppc64.rpm ppc64le: firefox-52.0-5.el7_3.ppc64le.rpm firefox-debuginfo-52.0-5.el7_3.ppc64le.rpm s390x: firefox-52.0-5.el7_3.s390x.rpm firefox-debuginfo-52.0-5.el7_3.s390x.rpm x86_64: firefox-52.0-5.el7_3.x86_64.rpm firefox-debuginfo-52.0-5.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-52.0-5.el7_3.ppc.rpm firefox-debuginfo-52.0-5.el7_3.ppc.rpm s390x: firefox-52.0-5.el7_3.s390.rpm firefox-debuginfo-52.0-5.el7_3.s390.rpm x86_64: firefox-52.0-5.el7_3.i686.rpm firefox-debuginfo-52.0-5.el7_3.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-52.0-5.el7_3.src.rpm x86_64: firefox-52.0-5.el7_3.x86_64.rpm firefox-debuginfo-52.0-5.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-52.0-5.el7_3.i686.rpm firefox-debuginfo-52.0-5.el7_3.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5428 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2017-08 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYzGGjXlSAg2UNWIIRAiy9AKCpeaKmIcfQkfh/0cfKBmmf75ZYFACfdNsp /cWFCFUcYQADTjlNKWGSlN0= =pZC8 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Mar 20 01:33:17 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Sun, 19 Mar 2017 21:33:17 -0400 Subject: [RHSA-2017:0559-01] Moderate: openjpeg security update Message-ID: <201703200133.v2K1XHkn022257@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openjpeg security update Advisory ID: RHSA-2017:0559-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0559.html Issue date: 2017-03-19 CVE Names: CVE-2016-5139 CVE-2016-5158 CVE-2016-5159 CVE-2016-7163 CVE-2016-9675 ===================================================================== 1. Summary: An update for openjpeg is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in OpenJPEG. A specially crafted JPEG2000 image could cause an application using OpenJPEG to crash or, potentially, execute arbitrary code. (CVE-2016-5139, CVE-2016-5158, CVE-2016-5159, CVE-2016-7163) * A vulnerability was found in the patch for CVE-2013-6045 for OpenJPEG. A specially crafted JPEG2000 image, when read by an application using OpenJPEG, could cause heap-based buffer overflows leading to a crash or, potentially, arbitrary code execution. (CVE-2016-9675) The CVE-2016-9675 issue was discovered by Doran Moppert (Red Hat Product Security). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications using OpenJPEG must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1363982 - CVE-2016-5139 chromium-browser, openjpeg: Heap overflow in parsing of JPEG2000 precincts 1372219 - CVE-2016-5158 chromium-browser, openjpeg: heap overflow due to unsafe use of opj_aligned_malloc 1372220 - CVE-2016-5159 chromium-browser, openjpeg: heap overflow in parsing of JPEG2000 code blocks 1374329 - CVE-2016-7163 openjpeg: Integer overflow in opj_pi_create_decode 1382202 - CVE-2016-9675 openjpeg: incorrect fix for CVE-2013-6045 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openjpeg-1.3-16.el6_8.src.rpm i386: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm x86_64: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openjpeg-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm x86_64: openjpeg-1.3-16.el6_8.x86_64.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openjpeg-1.3-16.el6_8.src.rpm x86_64: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openjpeg-1.3-16.el6_8.x86_64.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openjpeg-1.3-16.el6_8.src.rpm i386: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm ppc64: openjpeg-debuginfo-1.3-16.el6_8.ppc.rpm openjpeg-debuginfo-1.3-16.el6_8.ppc64.rpm openjpeg-libs-1.3-16.el6_8.ppc.rpm openjpeg-libs-1.3-16.el6_8.ppc64.rpm s390x: openjpeg-debuginfo-1.3-16.el6_8.s390.rpm openjpeg-debuginfo-1.3-16.el6_8.s390x.rpm openjpeg-libs-1.3-16.el6_8.s390.rpm openjpeg-libs-1.3-16.el6_8.s390x.rpm x86_64: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openjpeg-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm ppc64: openjpeg-1.3-16.el6_8.ppc64.rpm openjpeg-debuginfo-1.3-16.el6_8.ppc.rpm openjpeg-debuginfo-1.3-16.el6_8.ppc64.rpm openjpeg-devel-1.3-16.el6_8.ppc.rpm openjpeg-devel-1.3-16.el6_8.ppc64.rpm s390x: openjpeg-1.3-16.el6_8.s390x.rpm openjpeg-debuginfo-1.3-16.el6_8.s390.rpm openjpeg-debuginfo-1.3-16.el6_8.s390x.rpm openjpeg-devel-1.3-16.el6_8.s390.rpm openjpeg-devel-1.3-16.el6_8.s390x.rpm x86_64: openjpeg-1.3-16.el6_8.x86_64.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openjpeg-1.3-16.el6_8.src.rpm i386: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm x86_64: openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-libs-1.3-16.el6_8.i686.rpm openjpeg-libs-1.3-16.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openjpeg-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm x86_64: openjpeg-1.3-16.el6_8.x86_64.rpm openjpeg-debuginfo-1.3-16.el6_8.i686.rpm openjpeg-debuginfo-1.3-16.el6_8.x86_64.rpm openjpeg-devel-1.3-16.el6_8.i686.rpm openjpeg-devel-1.3-16.el6_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5139 https://access.redhat.com/security/cve/CVE-2016-5158 https://access.redhat.com/security/cve/CVE-2016-5159 https://access.redhat.com/security/cve/CVE-2016-7163 https://access.redhat.com/security/cve/CVE-2016-9675 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYzzFTXlSAg2UNWIIRAvcTAJ0SX0UlZRTQidQ7CRf6C4HtRQ9eAQCghCNT Hc9Xk9JIOQX4HMiyschjSg8= =ORo5 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:33:38 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:33:38 +0000 Subject: [RHSA-2017:0564-01] Moderate: libguestfs security and bug fix update Message-ID: <201703210933.v2L9XiES028836@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libguestfs security and bug fix update Advisory ID: RHSA-2017:0564-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0564.html Issue date: 2017-03-21 CVE Names: CVE-2015-8869 ===================================================================== 1. Summary: An update for libguestfs is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Security Fix(es): * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1319086 - libguestfs-java: mismatch class version vs java dependency 1332090 - CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits 1388407 - virt-sysprep will fail detecting OS if "/usr" is a distinct partition mounted in "/" via fstab 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libguestfs-1.20.11-20.el6.src.rpm x86_64: libguestfs-1.20.11-20.el6.x86_64.rpm libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-java-1.20.11-20.el6.x86_64.rpm libguestfs-tools-1.20.11-20.el6.x86_64.rpm libguestfs-tools-c-1.20.11-20.el6.x86_64.rpm perl-Sys-Guestfs-1.20.11-20.el6.x86_64.rpm python-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-devel-1.20.11-20.el6.x86_64.rpm libguestfs-java-devel-1.20.11-20.el6.x86_64.rpm libguestfs-javadoc-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-devel-1.20.11-20.el6.x86_64.rpm ruby-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: libguestfs-1.20.11-20.el6.src.rpm x86_64: libguestfs-1.20.11-20.el6.x86_64.rpm libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-java-1.20.11-20.el6.x86_64.rpm libguestfs-tools-1.20.11-20.el6.x86_64.rpm libguestfs-tools-c-1.20.11-20.el6.x86_64.rpm perl-Sys-Guestfs-1.20.11-20.el6.x86_64.rpm python-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-devel-1.20.11-20.el6.x86_64.rpm libguestfs-java-devel-1.20.11-20.el6.x86_64.rpm libguestfs-javadoc-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-devel-1.20.11-20.el6.x86_64.rpm ruby-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libguestfs-1.20.11-20.el6.src.rpm x86_64: libguestfs-1.20.11-20.el6.x86_64.rpm libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-java-1.20.11-20.el6.x86_64.rpm libguestfs-tools-1.20.11-20.el6.x86_64.rpm libguestfs-tools-c-1.20.11-20.el6.x86_64.rpm perl-Sys-Guestfs-1.20.11-20.el6.x86_64.rpm python-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): x86_64: libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-devel-1.20.11-20.el6.x86_64.rpm libguestfs-java-devel-1.20.11-20.el6.x86_64.rpm libguestfs-javadoc-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-devel-1.20.11-20.el6.x86_64.rpm ruby-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libguestfs-1.20.11-20.el6.src.rpm x86_64: libguestfs-1.20.11-20.el6.x86_64.rpm libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-java-1.20.11-20.el6.x86_64.rpm libguestfs-tools-1.20.11-20.el6.x86_64.rpm libguestfs-tools-c-1.20.11-20.el6.x86_64.rpm perl-Sys-Guestfs-1.20.11-20.el6.x86_64.rpm python-libguestfs-1.20.11-20.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: libguestfs-debuginfo-1.20.11-20.el6.x86_64.rpm libguestfs-devel-1.20.11-20.el6.x86_64.rpm libguestfs-java-devel-1.20.11-20.el6.x86_64.rpm libguestfs-javadoc-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-1.20.11-20.el6.x86_64.rpm ocaml-libguestfs-devel-1.20.11-20.el6.x86_64.rpm ruby-libguestfs-1.20.11-20.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8869 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PM/XlSAg2UNWIIRAsh5AJ9uYOz1Vh7C+iGchMXh+5WcPoqvUQCeOgMN p+d2DYe4l+Mj3WDUflLM1F0= =GFWF -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:34:06 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:34:06 +0000 Subject: [RHSA-2017:0565-01] Moderate: ocaml security update Message-ID: <201703210934.v2L9YC7B028871@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ocaml security update Advisory ID: RHSA-2017:0565-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0565.html Issue date: 2017-03-21 CVE Names: CVE-2015-8869 ===================================================================== 1. Summary: An update for ocaml is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es): * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1332090 - CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ocaml-3.11.2-5.el6.src.rpm i386: ocaml-3.11.2-5.el6.i686.rpm ocaml-camlp4-3.11.2-5.el6.i686.rpm ocaml-camlp4-devel-3.11.2-5.el6.i686.rpm ocaml-debuginfo-3.11.2-5.el6.i686.rpm ocaml-docs-3.11.2-5.el6.i686.rpm ocaml-emacs-3.11.2-5.el6.i686.rpm ocaml-labltk-3.11.2-5.el6.i686.rpm ocaml-labltk-devel-3.11.2-5.el6.i686.rpm ocaml-ocamldoc-3.11.2-5.el6.i686.rpm ocaml-runtime-3.11.2-5.el6.i686.rpm ocaml-source-3.11.2-5.el6.i686.rpm ocaml-x11-3.11.2-5.el6.i686.rpm x86_64: ocaml-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-devel-3.11.2-5.el6.x86_64.rpm ocaml-debuginfo-3.11.2-5.el6.x86_64.rpm ocaml-docs-3.11.2-5.el6.x86_64.rpm ocaml-emacs-3.11.2-5.el6.x86_64.rpm ocaml-labltk-3.11.2-5.el6.x86_64.rpm ocaml-labltk-devel-3.11.2-5.el6.x86_64.rpm ocaml-ocamldoc-3.11.2-5.el6.x86_64.rpm ocaml-runtime-3.11.2-5.el6.x86_64.rpm ocaml-source-3.11.2-5.el6.x86_64.rpm ocaml-x11-3.11.2-5.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ocaml-3.11.2-5.el6.src.rpm x86_64: ocaml-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-devel-3.11.2-5.el6.x86_64.rpm ocaml-debuginfo-3.11.2-5.el6.x86_64.rpm ocaml-docs-3.11.2-5.el6.x86_64.rpm ocaml-emacs-3.11.2-5.el6.x86_64.rpm ocaml-labltk-3.11.2-5.el6.x86_64.rpm ocaml-labltk-devel-3.11.2-5.el6.x86_64.rpm ocaml-ocamldoc-3.11.2-5.el6.x86_64.rpm ocaml-runtime-3.11.2-5.el6.x86_64.rpm ocaml-source-3.11.2-5.el6.x86_64.rpm ocaml-x11-3.11.2-5.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ocaml-3.11.2-5.el6.src.rpm i386: ocaml-3.11.2-5.el6.i686.rpm ocaml-camlp4-3.11.2-5.el6.i686.rpm ocaml-camlp4-devel-3.11.2-5.el6.i686.rpm ocaml-debuginfo-3.11.2-5.el6.i686.rpm ocaml-docs-3.11.2-5.el6.i686.rpm ocaml-emacs-3.11.2-5.el6.i686.rpm ocaml-labltk-3.11.2-5.el6.i686.rpm ocaml-labltk-devel-3.11.2-5.el6.i686.rpm ocaml-ocamldoc-3.11.2-5.el6.i686.rpm ocaml-runtime-3.11.2-5.el6.i686.rpm ocaml-source-3.11.2-5.el6.i686.rpm ocaml-x11-3.11.2-5.el6.i686.rpm ppc64: ocaml-3.11.2-5.el6.ppc64.rpm ocaml-camlp4-3.11.2-5.el6.ppc64.rpm ocaml-camlp4-devel-3.11.2-5.el6.ppc64.rpm ocaml-debuginfo-3.11.2-5.el6.ppc64.rpm ocaml-docs-3.11.2-5.el6.ppc64.rpm ocaml-emacs-3.11.2-5.el6.ppc64.rpm ocaml-labltk-3.11.2-5.el6.ppc64.rpm ocaml-labltk-devel-3.11.2-5.el6.ppc64.rpm ocaml-ocamldoc-3.11.2-5.el6.ppc64.rpm ocaml-runtime-3.11.2-5.el6.ppc64.rpm ocaml-source-3.11.2-5.el6.ppc64.rpm ocaml-x11-3.11.2-5.el6.ppc64.rpm x86_64: ocaml-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-devel-3.11.2-5.el6.x86_64.rpm ocaml-debuginfo-3.11.2-5.el6.x86_64.rpm ocaml-docs-3.11.2-5.el6.x86_64.rpm ocaml-emacs-3.11.2-5.el6.x86_64.rpm ocaml-labltk-3.11.2-5.el6.x86_64.rpm ocaml-labltk-devel-3.11.2-5.el6.x86_64.rpm ocaml-ocamldoc-3.11.2-5.el6.x86_64.rpm ocaml-runtime-3.11.2-5.el6.x86_64.rpm ocaml-source-3.11.2-5.el6.x86_64.rpm ocaml-x11-3.11.2-5.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ocaml-3.11.2-5.el6.src.rpm i386: ocaml-3.11.2-5.el6.i686.rpm ocaml-camlp4-3.11.2-5.el6.i686.rpm ocaml-camlp4-devel-3.11.2-5.el6.i686.rpm ocaml-debuginfo-3.11.2-5.el6.i686.rpm ocaml-docs-3.11.2-5.el6.i686.rpm ocaml-emacs-3.11.2-5.el6.i686.rpm ocaml-labltk-3.11.2-5.el6.i686.rpm ocaml-labltk-devel-3.11.2-5.el6.i686.rpm ocaml-ocamldoc-3.11.2-5.el6.i686.rpm ocaml-runtime-3.11.2-5.el6.i686.rpm ocaml-source-3.11.2-5.el6.i686.rpm ocaml-x11-3.11.2-5.el6.i686.rpm x86_64: ocaml-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-3.11.2-5.el6.x86_64.rpm ocaml-camlp4-devel-3.11.2-5.el6.x86_64.rpm ocaml-debuginfo-3.11.2-5.el6.x86_64.rpm ocaml-docs-3.11.2-5.el6.x86_64.rpm ocaml-emacs-3.11.2-5.el6.x86_64.rpm ocaml-labltk-3.11.2-5.el6.x86_64.rpm ocaml-labltk-devel-3.11.2-5.el6.x86_64.rpm ocaml-ocamldoc-3.11.2-5.el6.x86_64.rpm ocaml-runtime-3.11.2-5.el6.x86_64.rpm ocaml-source-3.11.2-5.el6.x86_64.rpm ocaml-x11-3.11.2-5.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8869 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PODXlSAg2UNWIIRAjSzAJ451YOvztrJKd5IVIW+WxeSmOzYqQCgtuww mNqHWnvL0vxIZyRZBSgInro= =7LjI -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:34:44 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:34:44 +0000 Subject: [RHSA-2017:0574-01] Moderate: gnutls security, bug fix, and enhancement update Message-ID: <201703210934.v2L9Ypc2028935@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gnutls security, bug fix, and enhancement update Advisory ID: RHSA-2017:0574-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0574.html Issue date: 2017-03-21 CVE Names: CVE-2016-8610 CVE-2017-5335 CVE-2017-5336 CVE-2017-5337 ===================================================================== 1. Summary: An update for gnutls is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. The following packages have been upgraded to a later upstream version: gnutls (2.12.23). (BZ#1321112, BZ#1326073, BZ#1415682, BZ#1326389) Security Fix(es): * A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610) * Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1320982 - ASSERT failure in gnutls-cli-debug 1321112 - DHE_DSS ciphers don't work with client certificates and OpenSSL using TLSv1.2 1323215 - gnutls-serv --http crashes with client certificates with NSS client 1326073 - GnuTLS prefers SHA-1 signatures in TLSv1.2 1326389 - GnuTLS server does not accept SHA-384 and SHA-512 Certificate Verify signatures despite advertising support for them 1326886 - GnuTLS server rejects connections that do not advertise support for SHA-1 signature algorithms 1327656 - gnutls-serv: closing connection without sending an Alert message 1328205 - gnutls-cli won't send certificates that don't match hashes in Certificate Request 1333521 - Provide ability to set the expected server name in gnutls-serv utility 1335924 - gnutls: Disable TLS connections with less than 1024-bit DH parameters 1337460 - Disable/remove export ciphersuites in GnuTLS 1384743 - CVE-2016-8610 SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS 1411836 - CVE-2017-5337 gnutls: Heap read overflow in read-packet.c 1412235 - CVE-2017-5335 gnutls: Out of memory while parsing crafted OpenPGP certificate 1412236 - CVE-2017-5336 gnutls: Stack overflow in cdk_pk_get_keyid 1415682 - Changes introduced by rebase to 2.12.23 break API and ABI compatibility for some libraries 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: gnutls-2.12.23-21.el6.src.rpm i386: gnutls-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-utils-2.12.23-21.el6.i686.rpm x86_64: gnutls-2.12.23-21.el6.i686.rpm gnutls-2.12.23-21.el6.x86_64.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-utils-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.i686.rpm x86_64: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.x86_64.rpm gnutls-guile-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: gnutls-2.12.23-21.el6.src.rpm x86_64: gnutls-2.12.23-21.el6.i686.rpm gnutls-2.12.23-21.el6.x86_64.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-utils-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.x86_64.rpm gnutls-guile-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: gnutls-2.12.23-21.el6.src.rpm i386: gnutls-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-utils-2.12.23-21.el6.i686.rpm ppc64: gnutls-2.12.23-21.el6.ppc.rpm gnutls-2.12.23-21.el6.ppc64.rpm gnutls-debuginfo-2.12.23-21.el6.ppc.rpm gnutls-debuginfo-2.12.23-21.el6.ppc64.rpm gnutls-devel-2.12.23-21.el6.ppc.rpm gnutls-devel-2.12.23-21.el6.ppc64.rpm gnutls-utils-2.12.23-21.el6.ppc64.rpm s390x: gnutls-2.12.23-21.el6.s390.rpm gnutls-2.12.23-21.el6.s390x.rpm gnutls-debuginfo-2.12.23-21.el6.s390.rpm gnutls-debuginfo-2.12.23-21.el6.s390x.rpm gnutls-devel-2.12.23-21.el6.s390.rpm gnutls-devel-2.12.23-21.el6.s390x.rpm gnutls-utils-2.12.23-21.el6.s390x.rpm x86_64: gnutls-2.12.23-21.el6.i686.rpm gnutls-2.12.23-21.el6.x86_64.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.x86_64.rpm gnutls-utils-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.i686.rpm ppc64: gnutls-debuginfo-2.12.23-21.el6.ppc.rpm gnutls-debuginfo-2.12.23-21.el6.ppc64.rpm gnutls-guile-2.12.23-21.el6.ppc.rpm gnutls-guile-2.12.23-21.el6.ppc64.rpm s390x: gnutls-debuginfo-2.12.23-21.el6.s390.rpm gnutls-debuginfo-2.12.23-21.el6.s390x.rpm gnutls-guile-2.12.23-21.el6.s390.rpm gnutls-guile-2.12.23-21.el6.s390x.rpm x86_64: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-guile-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: gnutls-2.12.23-21.el6.src.rpm i386: gnutls-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-utils-2.12.23-21.el6.i686.rpm x86_64: gnutls-2.12.23-21.el6.i686.rpm gnutls-2.12.23-21.el6.x86_64.rpm gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-devel-2.12.23-21.el6.i686.rpm gnutls-devel-2.12.23-21.el6.x86_64.rpm gnutls-utils-2.12.23-21.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.i686.rpm x86_64: gnutls-debuginfo-2.12.23-21.el6.i686.rpm gnutls-debuginfo-2.12.23-21.el6.x86_64.rpm gnutls-guile-2.12.23-21.el6.i686.rpm gnutls-guile-2.12.23-21.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8610 https://access.redhat.com/security/cve/CVE-2017-5335 https://access.redhat.com/security/cve/CVE-2017-5336 https://access.redhat.com/security/cve/CVE-2017-5337 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0POlXlSAg2UNWIIRAhsCAJ0f16s1qzndcPHdUSHLmbQGvbQvcACggquH 8b1zEPEmPqMh/S/pZTQy6OE= =e+1d -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:35:10 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:35:10 +0000 Subject: [RHSA-2017:0621-01] Moderate: qemu-kvm security and bug fix update Message-ID: <201703210935.v2L9ZJAD028982@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm security and bug fix update Advisory ID: RHSA-2017:0621-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0621.html Issue date: 2017-03-21 CVE Names: CVE-2016-3712 ===================================================================== 1. Summary: An update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance. (CVE-2016-3712) Red Hat would like to thank Zuozhi Fzz (Alibaba Inc.) for reporting this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 876993 - qemu-kvm: vm's become non-responsive during migrate disk load from 2 domains to a 3ed 1281713 - system_reset should clear pending request for error (IDE) 1292678 - Qemu should report error when cmdline set threads=2 in amd host 1294941 - QEMU crash on snapshot revert when using Cirrus 1297653 - "qemu-img convert" can't create a fully allocated image passed a "-S 0" option 1300626 - e1000/rtl8139: qemu mac address can not be changed via set the hardware address in guest 1318712 - CVE-2016-3712 qemu-kvm: Out-of-bounds read when creating weird vga screen surface 1320066 - Qemu should not report error when cmdline set threads=2 in Intel host 1333697 - qemu-kvm: /builddir/build/BUILD/qemu-kvm-0.12.1.2/hw/virtio-scsi.c:724: virtio_scsi_push_event: Assertion `event == 0' failed 1346981 - Regression from CVE-2016-3712: windows installer fails to start [rhel-6.9] 1356924 - rtl8139 driver hangs in widows guests 1361490 - system_reset should clear pending request for error (virtio-blk) 1392287 - Core dump occurs when query qtree after migration with "-vga cirrus" 1392520 - [RHEL6.9] KVM guest shuts itself down after 128th reboot 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: qemu-kvm-0.12.1.2-2.503.el6.src.rpm i386: qemu-guest-agent-0.12.1.2-2.503.el6.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.503.el6.x86_64.rpm qemu-img-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.503.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: qemu-kvm-0.12.1.2-2.503.el6.src.rpm x86_64: qemu-guest-agent-0.12.1.2-2.503.el6.x86_64.rpm qemu-img-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.503.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: qemu-kvm-0.12.1.2-2.503.el6.src.rpm i386: qemu-guest-agent-0.12.1.2-2.503.el6.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.i686.rpm ppc64: qemu-guest-agent-0.12.1.2-2.503.el6.ppc64.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.ppc64.rpm x86_64: qemu-guest-agent-0.12.1.2-2.503.el6.x86_64.rpm qemu-img-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.503.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: qemu-kvm-0.12.1.2-2.503.el6.src.rpm i386: qemu-guest-agent-0.12.1.2-2.503.el6.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.i686.rpm x86_64: qemu-guest-agent-0.12.1.2-2.503.el6.x86_64.rpm qemu-img-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.503.el6.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.503.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-3712 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PPGXlSAg2UNWIIRAgw5AKCAMF/URlZmNOgr8yCFfeEKLqpxSgCbBIKS sC7bBv8SYbZXjKAmWa10ewM= =jAzj -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:35:39 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:35:39 +0000 Subject: [RHSA-2017:0630-01] Moderate: tigervnc security and bug fix update Message-ID: <201703210935.v2L9Zkq0029327@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tigervnc security and bug fix update Advisory ID: RHSA-2017:0630-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0630.html Issue date: 2017-03-21 CVE Names: CVE-2016-10207 CVE-2017-5581 ===================================================================== 1. Summary: An update for tigervnc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 3. Description: Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. The tigervnc packages contain a client which allows users to connect to other desktops running a VNC server. Security Fix(es): * A denial of service flaw was found in the TigerVNC's Xvnc server. A remote unauthenticated attacker could use this flaw to make Xvnc crash by terminating the TLS handshake process early. (CVE-2016-10207) * A buffer overflow flaw, leading to memory corruption, was found in TigerVNC viewer. A remote malicious VNC server could use this flaw to crash the client vncviewer process resulting in denial of service. (CVE-2017-5581) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1323065 - tigervnc cannot build against xorg-x11-server-source 1378922 - tigervnc-server needs to be rebuilt to re-enable listen-on-tcp behavior in RHEL 6.8 1390458 - New version of tigervnc-server disconnects Xsession when initiated from xinetd 1415712 - CVE-2017-5581 tigervnc: Buffer overflow in ModifiablePixelBuffer::fillRect 1418761 - CVE-2016-10207 tigervnc: VNC server can crash when TLS handshake terminates early 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: tigervnc-1.1.0-24.el6.src.rpm i386: tigervnc-1.1.0-24.el6.i686.rpm tigervnc-debuginfo-1.1.0-24.el6.i686.rpm tigervnc-server-1.1.0-24.el6.i686.rpm x86_64: tigervnc-1.1.0-24.el6.x86_64.rpm tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-1.1.0-24.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: tigervnc-debuginfo-1.1.0-24.el6.i686.rpm tigervnc-server-module-1.1.0-24.el6.i686.rpm noarch: tigervnc-server-applet-1.1.0-24.el6.noarch.rpm x86_64: tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-module-1.1.0-24.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: tigervnc-1.1.0-24.el6.src.rpm noarch: tigervnc-server-applet-1.1.0-24.el6.noarch.rpm x86_64: tigervnc-1.1.0-24.el6.x86_64.rpm tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-1.1.0-24.el6.x86_64.rpm tigervnc-server-module-1.1.0-24.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: tigervnc-1.1.0-24.el6.src.rpm i386: tigervnc-1.1.0-24.el6.i686.rpm tigervnc-debuginfo-1.1.0-24.el6.i686.rpm tigervnc-server-1.1.0-24.el6.i686.rpm ppc64: tigervnc-1.1.0-24.el6.ppc64.rpm tigervnc-debuginfo-1.1.0-24.el6.ppc64.rpm tigervnc-server-1.1.0-24.el6.ppc64.rpm s390x: tigervnc-1.1.0-24.el6.s390x.rpm tigervnc-debuginfo-1.1.0-24.el6.s390x.rpm tigervnc-server-1.1.0-24.el6.s390x.rpm x86_64: tigervnc-1.1.0-24.el6.x86_64.rpm tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-1.1.0-24.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: tigervnc-debuginfo-1.1.0-24.el6.i686.rpm tigervnc-server-module-1.1.0-24.el6.i686.rpm noarch: tigervnc-server-applet-1.1.0-24.el6.noarch.rpm ppc64: tigervnc-debuginfo-1.1.0-24.el6.ppc64.rpm tigervnc-server-module-1.1.0-24.el6.ppc64.rpm x86_64: tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-module-1.1.0-24.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: tigervnc-1.1.0-24.el6.src.rpm i386: tigervnc-1.1.0-24.el6.i686.rpm tigervnc-debuginfo-1.1.0-24.el6.i686.rpm tigervnc-server-1.1.0-24.el6.i686.rpm x86_64: tigervnc-1.1.0-24.el6.x86_64.rpm tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-1.1.0-24.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: tigervnc-debuginfo-1.1.0-24.el6.i686.rpm tigervnc-server-module-1.1.0-24.el6.i686.rpm noarch: tigervnc-server-applet-1.1.0-24.el6.noarch.rpm x86_64: tigervnc-debuginfo-1.1.0-24.el6.x86_64.rpm tigervnc-server-module-1.1.0-24.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-10207 https://access.redhat.com/security/cve/CVE-2017-5581 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PPlXlSAg2UNWIIRAoieAJ4q8tyit2+xODoaleVP+7d0c50PYQCfbjhp 3VwSxFQUXaRD0jKuopoPGds= =mFj1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:36:24 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:36:24 +0000 Subject: [RHSA-2017:0631-01] Moderate: wireshark security and bug fix update Message-ID: <201703210936.v2L9aj9Z029432@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: wireshark security and bug fix update Advisory ID: RHSA-2017:0631-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0631.html Issue date: 2017-03-21 CVE Names: CVE-2013-4075 CVE-2015-3811 CVE-2015-3812 CVE-2015-3813 ===================================================================== 1. Summary: An update for wireshark is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2015-3811, CVE-2015-3812, CVE-2015-3813, CVE-2013-4075) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of Wireshark must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 972680 - CVE-2013-4075 wireshark: DoS (crash) in the GMR-1 BCCH dissector (wnpa-sec-2013-33) 1222436 - CVE-2015-3811 wireshark: WCP dissector crash (wnpa-sec-2015-14) 1222437 - CVE-2015-3812 wireshark: X11 memory leak (wnpa-sec-2015-15) 1222438 - CVE-2015-3813 wireshark: Reassembly memory leak (wnpa-sec-2015-16) 1222895 - Problems decoding TLS Server Key Exchange messages 1222902 - Encrypt-then-MAC TLS extension unrecognised 1238166 - tshark -F option fails to create capture files in .pcap format. 1240675 - No dissection of the TLS Certificate Verify message 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: wireshark-1.8.10-25.el6.src.rpm i386: wireshark-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-gnome-1.8.10-25.el6.i686.rpm x86_64: wireshark-1.8.10-25.el6.i686.rpm wireshark-1.8.10-25.el6.x86_64.rpm wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.x86_64.rpm wireshark-gnome-1.8.10-25.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-devel-1.8.10-25.el6.i686.rpm x86_64: wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.x86_64.rpm wireshark-devel-1.8.10-25.el6.i686.rpm wireshark-devel-1.8.10-25.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: wireshark-1.8.10-25.el6.src.rpm i386: wireshark-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-gnome-1.8.10-25.el6.i686.rpm ppc64: wireshark-1.8.10-25.el6.ppc.rpm wireshark-1.8.10-25.el6.ppc64.rpm wireshark-debuginfo-1.8.10-25.el6.ppc.rpm wireshark-debuginfo-1.8.10-25.el6.ppc64.rpm wireshark-gnome-1.8.10-25.el6.ppc64.rpm s390x: wireshark-1.8.10-25.el6.s390.rpm wireshark-1.8.10-25.el6.s390x.rpm wireshark-debuginfo-1.8.10-25.el6.s390.rpm wireshark-debuginfo-1.8.10-25.el6.s390x.rpm wireshark-gnome-1.8.10-25.el6.s390x.rpm x86_64: wireshark-1.8.10-25.el6.i686.rpm wireshark-1.8.10-25.el6.x86_64.rpm wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.x86_64.rpm wireshark-gnome-1.8.10-25.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-devel-1.8.10-25.el6.i686.rpm ppc64: wireshark-debuginfo-1.8.10-25.el6.ppc.rpm wireshark-debuginfo-1.8.10-25.el6.ppc64.rpm wireshark-devel-1.8.10-25.el6.ppc.rpm wireshark-devel-1.8.10-25.el6.ppc64.rpm s390x: wireshark-debuginfo-1.8.10-25.el6.s390.rpm wireshark-debuginfo-1.8.10-25.el6.s390x.rpm wireshark-devel-1.8.10-25.el6.s390.rpm wireshark-devel-1.8.10-25.el6.s390x.rpm x86_64: wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.x86_64.rpm wireshark-devel-1.8.10-25.el6.i686.rpm wireshark-devel-1.8.10-25.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: wireshark-1.8.10-25.el6.src.rpm i386: wireshark-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-gnome-1.8.10-25.el6.i686.rpm x86_64: wireshark-1.8.10-25.el6.i686.rpm wireshark-1.8.10-25.el6.x86_64.rpm wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.x86_64.rpm wireshark-gnome-1.8.10-25.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-devel-1.8.10-25.el6.i686.rpm x86_64: wireshark-debuginfo-1.8.10-25.el6.i686.rpm wireshark-debuginfo-1.8.10-25.el6.x86_64.rpm wireshark-devel-1.8.10-25.el6.i686.rpm wireshark-devel-1.8.10-25.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2013-4075 https://access.redhat.com/security/cve/CVE-2015-3811 https://access.redhat.com/security/cve/CVE-2015-3812 https://access.redhat.com/security/cve/CVE-2015-3813 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PQCXlSAg2UNWIIRAi7hAKCGdAZrAsxu0CZZcptOrqRNEI8V5ACggyFd rDJs2bcg7mbGoZL4jUwUSCY= =13EA -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:38:24 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:38:24 +0000 Subject: [RHSA-2017:0641-01] Moderate: openssh security and bug fix update Message-ID: <201703210938.v2L9cVtZ029484@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssh security and bug fix update Advisory ID: RHSA-2017:0641-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0641.html Issue date: 2017-03-21 CVE Names: CVE-2015-8325 ===================================================================== 1. Summary: An update for openssh is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program. In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root. (CVE-2015-8325) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1218424 - infinite loop, at 100% cpu in ssh if ^Z is pressed at password prompt 1327547 - ssh-copy-id fails with shells unaware of ~/ 1328012 - CVE-2015-8325 openssh: privilege escalation via user's PAM environment and UseLogin=yes 1341747 - sftp -m doesn't work as advertised 1353359 - 5.3p1-117.el6 breaks gss-group1-sha1- key exchange algorithm for GSSAPIKeyExchange authentication 1353410 - [ssh-copy-id] add "The agent has no identities." in remote ~/.ssh/authorized_keys 1373836 - Remove RC4 cipher and questionable MACs enabled by default from OpenSSH 1397547 - SSH does not use the ibmca crypto hardware 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssh-5.3p1-122.el6.src.rpm i386: openssh-5.3p1-122.el6.i686.rpm openssh-askpass-5.3p1-122.el6.i686.rpm openssh-clients-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-server-5.3p1-122.el6.i686.rpm x86_64: openssh-5.3p1-122.el6.x86_64.rpm openssh-askpass-5.3p1-122.el6.x86_64.rpm openssh-clients-5.3p1-122.el6.x86_64.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-server-5.3p1-122.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-ldap-5.3p1-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm x86_64: openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-ldap-5.3p1-122.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssh-5.3p1-122.el6.src.rpm x86_64: openssh-5.3p1-122.el6.x86_64.rpm openssh-clients-5.3p1-122.el6.x86_64.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-server-5.3p1-122.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssh-askpass-5.3p1-122.el6.x86_64.rpm openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-ldap-5.3p1-122.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssh-5.3p1-122.el6.src.rpm i386: openssh-5.3p1-122.el6.i686.rpm openssh-askpass-5.3p1-122.el6.i686.rpm openssh-clients-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-server-5.3p1-122.el6.i686.rpm ppc64: openssh-5.3p1-122.el6.ppc64.rpm openssh-askpass-5.3p1-122.el6.ppc64.rpm openssh-clients-5.3p1-122.el6.ppc64.rpm openssh-debuginfo-5.3p1-122.el6.ppc64.rpm openssh-server-5.3p1-122.el6.ppc64.rpm s390x: openssh-5.3p1-122.el6.s390x.rpm openssh-askpass-5.3p1-122.el6.s390x.rpm openssh-clients-5.3p1-122.el6.s390x.rpm openssh-debuginfo-5.3p1-122.el6.s390x.rpm openssh-server-5.3p1-122.el6.s390x.rpm x86_64: openssh-5.3p1-122.el6.x86_64.rpm openssh-askpass-5.3p1-122.el6.x86_64.rpm openssh-clients-5.3p1-122.el6.x86_64.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-server-5.3p1-122.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-ldap-5.3p1-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm ppc64: openssh-debuginfo-5.3p1-122.el6.ppc.rpm openssh-debuginfo-5.3p1-122.el6.ppc64.rpm openssh-ldap-5.3p1-122.el6.ppc64.rpm pam_ssh_agent_auth-0.9.3-122.el6.ppc.rpm pam_ssh_agent_auth-0.9.3-122.el6.ppc64.rpm s390x: openssh-debuginfo-5.3p1-122.el6.s390.rpm openssh-debuginfo-5.3p1-122.el6.s390x.rpm openssh-ldap-5.3p1-122.el6.s390x.rpm pam_ssh_agent_auth-0.9.3-122.el6.s390.rpm pam_ssh_agent_auth-0.9.3-122.el6.s390x.rpm x86_64: openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-ldap-5.3p1-122.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssh-5.3p1-122.el6.src.rpm i386: openssh-5.3p1-122.el6.i686.rpm openssh-askpass-5.3p1-122.el6.i686.rpm openssh-clients-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-server-5.3p1-122.el6.i686.rpm x86_64: openssh-5.3p1-122.el6.x86_64.rpm openssh-askpass-5.3p1-122.el6.x86_64.rpm openssh-clients-5.3p1-122.el6.x86_64.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-server-5.3p1-122.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-ldap-5.3p1-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm x86_64: openssh-debuginfo-5.3p1-122.el6.i686.rpm openssh-debuginfo-5.3p1-122.el6.x86_64.rpm openssh-ldap-5.3p1-122.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm pam_ssh_agent_auth-0.9.3-122.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8325 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PQ/XlSAg2UNWIIRAi5mAJ9N0SUovsOhyNa/26rOagBARxm0RACgn5Sc xwXZcqKY2U+28IaC5rAYIB8= =zb8F -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:38:58 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:38:58 +0000 Subject: [RHSA-2017:0654-01] Moderate: coreutils security and bug fix update Message-ID: <201703210939.v2L9d5l2029650@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: coreutils security and bug fix update Advisory ID: RHSA-2017:0654-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0654.html Issue date: 2017-03-21 CVE Names: CVE-2017-2616 ===================================================================== 1. Summary: An update for coreutils is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The coreutils packages contain the GNU Core Utilities and represent a combination of the previously used GNU fileutils, sh-utils, and textutils packages. Security Fix(es): * A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616) Red Hat would like to thank Tobias St?ckmann for reporting this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1321643 - Bug in /etc/profile.d/colorls.sh when using the ksh shell [el6] 1418710 - CVE-2017-2616 util-linux: Sending SIGKILL to other processes with root privileges via su 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: coreutils-8.4-46.el6.src.rpm i386: coreutils-8.4-46.el6.i686.rpm coreutils-debuginfo-8.4-46.el6.i686.rpm coreutils-libs-8.4-46.el6.i686.rpm x86_64: coreutils-8.4-46.el6.x86_64.rpm coreutils-debuginfo-8.4-46.el6.x86_64.rpm coreutils-libs-8.4-46.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: coreutils-8.4-46.el6.src.rpm x86_64: coreutils-8.4-46.el6.x86_64.rpm coreutils-debuginfo-8.4-46.el6.x86_64.rpm coreutils-libs-8.4-46.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: coreutils-8.4-46.el6.src.rpm i386: coreutils-8.4-46.el6.i686.rpm coreutils-debuginfo-8.4-46.el6.i686.rpm coreutils-libs-8.4-46.el6.i686.rpm ppc64: coreutils-8.4-46.el6.ppc64.rpm coreutils-debuginfo-8.4-46.el6.ppc64.rpm coreutils-libs-8.4-46.el6.ppc64.rpm s390x: coreutils-8.4-46.el6.s390x.rpm coreutils-debuginfo-8.4-46.el6.s390x.rpm coreutils-libs-8.4-46.el6.s390x.rpm x86_64: coreutils-8.4-46.el6.x86_64.rpm coreutils-debuginfo-8.4-46.el6.x86_64.rpm coreutils-libs-8.4-46.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: coreutils-8.4-46.el6.src.rpm i386: coreutils-8.4-46.el6.i686.rpm coreutils-debuginfo-8.4-46.el6.i686.rpm coreutils-libs-8.4-46.el6.i686.rpm x86_64: coreutils-8.4-46.el6.x86_64.rpm coreutils-debuginfo-8.4-46.el6.x86_64.rpm coreutils-libs-8.4-46.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2616 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PShXlSAg2UNWIIRAsDzAJ9rIuKes9g8dhnNL61X5kDNzEmBqACdFTop dIaDEKdFObp7QGbZs1T0ZZc= =/Cbw -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:40:40 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:40:40 +0000 Subject: [RHSA-2017:0662-01] Moderate: samba security and bug fix update Message-ID: <201703210940.v2L9emWa030665@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: samba security and bug fix update Advisory ID: RHSA-2017:0662-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0662.html Issue date: 2017-03-21 CVE Names: CVE-2016-2125 CVE-2016-2126 ===================================================================== 1. Summary: An update for samba is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) * A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the smb service will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1327697 - schannel connections fail to the DC because netlogon credentials are not updated correctly 1372611 - NetAPP SMB servers don't negotiate NTLMSSP_SIGN for SESSION KEY setup 1403114 - CVE-2016-2125 samba: Unconditional privilege delegation to Kerberos servers in trusted realms 1403115 - CVE-2016-2126 samba: Flaws in Kerberos PAC validation can trigger privilege elevation 1413672 - BADLOCK REGRESSION: Member fails to authenticate against nt4_dc, if the member changes it secret 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: samba-3.6.23-41.el6.src.rpm i386: libsmbclient-3.6.23-41.el6.i686.rpm samba-client-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-winbind-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm x86_64: libsmbclient-3.6.23-41.el6.i686.rpm libsmbclient-3.6.23-41.el6.x86_64.rpm samba-client-3.6.23-41.el6.x86_64.rpm samba-common-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-winbind-3.6.23-41.el6.x86_64.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libsmbclient-devel-3.6.23-41.el6.i686.rpm samba-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-doc-3.6.23-41.el6.i686.rpm samba-domainjoin-gui-3.6.23-41.el6.i686.rpm samba-swat-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-krb5-locator-3.6.23-41.el6.i686.rpm x86_64: libsmbclient-devel-3.6.23-41.el6.i686.rpm libsmbclient-devel-3.6.23-41.el6.x86_64.rpm samba-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-doc-3.6.23-41.el6.x86_64.rpm samba-domainjoin-gui-3.6.23-41.el6.x86_64.rpm samba-glusterfs-3.6.23-41.el6.x86_64.rpm samba-swat-3.6.23-41.el6.x86_64.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.x86_64.rpm samba-winbind-krb5-locator-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: samba-3.6.23-41.el6.src.rpm x86_64: samba-client-3.6.23-41.el6.x86_64.rpm samba-common-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-winbind-3.6.23-41.el6.x86_64.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libsmbclient-3.6.23-41.el6.i686.rpm libsmbclient-3.6.23-41.el6.x86_64.rpm libsmbclient-devel-3.6.23-41.el6.i686.rpm libsmbclient-devel-3.6.23-41.el6.x86_64.rpm samba-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-doc-3.6.23-41.el6.x86_64.rpm samba-domainjoin-gui-3.6.23-41.el6.x86_64.rpm samba-glusterfs-3.6.23-41.el6.x86_64.rpm samba-swat-3.6.23-41.el6.x86_64.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.x86_64.rpm samba-winbind-krb5-locator-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: samba-3.6.23-41.el6.src.rpm i386: libsmbclient-3.6.23-41.el6.i686.rpm samba-3.6.23-41.el6.i686.rpm samba-client-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-winbind-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm ppc64: libsmbclient-3.6.23-41.el6.ppc.rpm libsmbclient-3.6.23-41.el6.ppc64.rpm samba-3.6.23-41.el6.ppc64.rpm samba-client-3.6.23-41.el6.ppc64.rpm samba-common-3.6.23-41.el6.ppc.rpm samba-common-3.6.23-41.el6.ppc64.rpm samba-debuginfo-3.6.23-41.el6.ppc.rpm samba-debuginfo-3.6.23-41.el6.ppc64.rpm samba-winbind-3.6.23-41.el6.ppc64.rpm samba-winbind-clients-3.6.23-41.el6.ppc.rpm samba-winbind-clients-3.6.23-41.el6.ppc64.rpm s390x: libsmbclient-3.6.23-41.el6.s390.rpm libsmbclient-3.6.23-41.el6.s390x.rpm samba-3.6.23-41.el6.s390x.rpm samba-client-3.6.23-41.el6.s390x.rpm samba-common-3.6.23-41.el6.s390.rpm samba-common-3.6.23-41.el6.s390x.rpm samba-debuginfo-3.6.23-41.el6.s390.rpm samba-debuginfo-3.6.23-41.el6.s390x.rpm samba-winbind-3.6.23-41.el6.s390x.rpm samba-winbind-clients-3.6.23-41.el6.s390.rpm samba-winbind-clients-3.6.23-41.el6.s390x.rpm x86_64: libsmbclient-3.6.23-41.el6.i686.rpm libsmbclient-3.6.23-41.el6.x86_64.rpm samba-3.6.23-41.el6.x86_64.rpm samba-client-3.6.23-41.el6.x86_64.rpm samba-common-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-winbind-3.6.23-41.el6.x86_64.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libsmbclient-devel-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-doc-3.6.23-41.el6.i686.rpm samba-domainjoin-gui-3.6.23-41.el6.i686.rpm samba-swat-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-krb5-locator-3.6.23-41.el6.i686.rpm ppc64: libsmbclient-devel-3.6.23-41.el6.ppc.rpm libsmbclient-devel-3.6.23-41.el6.ppc64.rpm samba-debuginfo-3.6.23-41.el6.ppc.rpm samba-debuginfo-3.6.23-41.el6.ppc64.rpm samba-doc-3.6.23-41.el6.ppc64.rpm samba-domainjoin-gui-3.6.23-41.el6.ppc64.rpm samba-swat-3.6.23-41.el6.ppc64.rpm samba-winbind-devel-3.6.23-41.el6.ppc.rpm samba-winbind-devel-3.6.23-41.el6.ppc64.rpm samba-winbind-krb5-locator-3.6.23-41.el6.ppc64.rpm s390x: libsmbclient-devel-3.6.23-41.el6.s390.rpm libsmbclient-devel-3.6.23-41.el6.s390x.rpm samba-debuginfo-3.6.23-41.el6.s390.rpm samba-debuginfo-3.6.23-41.el6.s390x.rpm samba-doc-3.6.23-41.el6.s390x.rpm samba-domainjoin-gui-3.6.23-41.el6.s390x.rpm samba-swat-3.6.23-41.el6.s390x.rpm samba-winbind-devel-3.6.23-41.el6.s390.rpm samba-winbind-devel-3.6.23-41.el6.s390x.rpm samba-winbind-krb5-locator-3.6.23-41.el6.s390x.rpm x86_64: libsmbclient-devel-3.6.23-41.el6.i686.rpm libsmbclient-devel-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-doc-3.6.23-41.el6.x86_64.rpm samba-domainjoin-gui-3.6.23-41.el6.x86_64.rpm samba-glusterfs-3.6.23-41.el6.x86_64.rpm samba-swat-3.6.23-41.el6.x86_64.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.x86_64.rpm samba-winbind-krb5-locator-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: samba-3.6.23-41.el6.src.rpm i386: libsmbclient-3.6.23-41.el6.i686.rpm samba-3.6.23-41.el6.i686.rpm samba-client-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-winbind-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm x86_64: libsmbclient-3.6.23-41.el6.i686.rpm libsmbclient-3.6.23-41.el6.x86_64.rpm samba-3.6.23-41.el6.x86_64.rpm samba-client-3.6.23-41.el6.x86_64.rpm samba-common-3.6.23-41.el6.i686.rpm samba-common-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-winbind-3.6.23-41.el6.x86_64.rpm samba-winbind-clients-3.6.23-41.el6.i686.rpm samba-winbind-clients-3.6.23-41.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libsmbclient-devel-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-doc-3.6.23-41.el6.i686.rpm samba-domainjoin-gui-3.6.23-41.el6.i686.rpm samba-swat-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-krb5-locator-3.6.23-41.el6.i686.rpm x86_64: libsmbclient-devel-3.6.23-41.el6.i686.rpm libsmbclient-devel-3.6.23-41.el6.x86_64.rpm samba-debuginfo-3.6.23-41.el6.i686.rpm samba-debuginfo-3.6.23-41.el6.x86_64.rpm samba-doc-3.6.23-41.el6.x86_64.rpm samba-domainjoin-gui-3.6.23-41.el6.x86_64.rpm samba-glusterfs-3.6.23-41.el6.x86_64.rpm samba-swat-3.6.23-41.el6.x86_64.rpm samba-winbind-devel-3.6.23-41.el6.i686.rpm samba-winbind-devel-3.6.23-41.el6.x86_64.rpm samba-winbind-krb5-locator-3.6.23-41.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2125 https://access.redhat.com/security/cve/CVE-2016-2126 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html https://www.samba.org/samba/security/CVE-2016-2125.html https://www.samba.org/samba/security/CVE-2016-2126.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PTJXlSAg2UNWIIRAj7/AKC4d9EjAtWkRfzZcMTNjs9QSyA7WwCeO3zK 2t8dVsQW4eJIwkQvC5dEpS0= =OzKU -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:41:11 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:41:11 +0000 Subject: [RHSA-2017:0680-01] Moderate: glibc security and bug fix update Message-ID: <201703210941.v2L9fImV030845@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: glibc security and bug fix update Advisory ID: RHSA-2017:0680-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0680.html Issue date: 2017-03-21 CVE Names: CVE-2014-9761 CVE-2015-8776 CVE-2015-8778 CVE-2015-8779 ===================================================================== 1. Summary: An update for glibc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) * An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1012343 - Thread issue in glibc can cause the application to not get any identity information 1101858 - glibc: Add el_GR at euro, ur_IN, and wal_ET locales 1223095 - access to uninitialized memory in getaddrinfo if nscd is running 1270950 - getaddrinfo() takes long time when lots of IP addresses are configured 1300299 - CVE-2015-8776 glibc: Segmentation fault caused by passing out-of-range data to strftime() 1300303 - CVE-2015-8778 glibc: Integer overflow in hcreate and hcreate_r 1300310 - CVE-2014-9761 glibc: Unbounded stack allocation in nan* functions 1300312 - CVE-2015-8779 glibc: Unbounded stack allocation in catopen function 1338673 - glibc: GCC 6 enablement for struct sockaddr_storage [el6] 1373646 - tzdata-update uses default umask 1416496 - getaddrinfo() call returns wrong IPv6 address if nscd is used 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: glibc-2.12-1.209.el6.src.rpm i386: glibc-2.12-1.209.el6.i686.rpm glibc-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-headers-2.12-1.209.el6.i686.rpm glibc-utils-2.12-1.209.el6.i686.rpm nscd-2.12-1.209.el6.i686.rpm x86_64: glibc-2.12-1.209.el6.i686.rpm glibc-2.12-1.209.el6.x86_64.rpm glibc-common-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.x86_64.rpm glibc-headers-2.12-1.209.el6.x86_64.rpm glibc-utils-2.12-1.209.el6.x86_64.rpm nscd-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.i686.rpm x86_64: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-static-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: glibc-2.12-1.209.el6.src.rpm x86_64: glibc-2.12-1.209.el6.i686.rpm glibc-2.12-1.209.el6.x86_64.rpm glibc-common-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.x86_64.rpm glibc-headers-2.12-1.209.el6.x86_64.rpm glibc-utils-2.12-1.209.el6.x86_64.rpm nscd-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-static-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: glibc-2.12-1.209.el6.src.rpm i386: glibc-2.12-1.209.el6.i686.rpm glibc-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-headers-2.12-1.209.el6.i686.rpm glibc-utils-2.12-1.209.el6.i686.rpm nscd-2.12-1.209.el6.i686.rpm ppc64: glibc-2.12-1.209.el6.ppc.rpm glibc-2.12-1.209.el6.ppc64.rpm glibc-common-2.12-1.209.el6.ppc64.rpm glibc-debuginfo-2.12-1.209.el6.ppc.rpm glibc-debuginfo-2.12-1.209.el6.ppc64.rpm glibc-debuginfo-common-2.12-1.209.el6.ppc.rpm glibc-debuginfo-common-2.12-1.209.el6.ppc64.rpm glibc-devel-2.12-1.209.el6.ppc.rpm glibc-devel-2.12-1.209.el6.ppc64.rpm glibc-headers-2.12-1.209.el6.ppc64.rpm glibc-utils-2.12-1.209.el6.ppc64.rpm nscd-2.12-1.209.el6.ppc64.rpm s390x: glibc-2.12-1.209.el6.s390.rpm glibc-2.12-1.209.el6.s390x.rpm glibc-common-2.12-1.209.el6.s390x.rpm glibc-debuginfo-2.12-1.209.el6.s390.rpm glibc-debuginfo-2.12-1.209.el6.s390x.rpm glibc-debuginfo-common-2.12-1.209.el6.s390.rpm glibc-debuginfo-common-2.12-1.209.el6.s390x.rpm glibc-devel-2.12-1.209.el6.s390.rpm glibc-devel-2.12-1.209.el6.s390x.rpm glibc-headers-2.12-1.209.el6.s390x.rpm glibc-utils-2.12-1.209.el6.s390x.rpm nscd-2.12-1.209.el6.s390x.rpm x86_64: glibc-2.12-1.209.el6.i686.rpm glibc-2.12-1.209.el6.x86_64.rpm glibc-common-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.x86_64.rpm glibc-headers-2.12-1.209.el6.x86_64.rpm glibc-utils-2.12-1.209.el6.x86_64.rpm nscd-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.i686.rpm ppc64: glibc-debuginfo-2.12-1.209.el6.ppc.rpm glibc-debuginfo-2.12-1.209.el6.ppc64.rpm glibc-debuginfo-common-2.12-1.209.el6.ppc.rpm glibc-debuginfo-common-2.12-1.209.el6.ppc64.rpm glibc-static-2.12-1.209.el6.ppc.rpm glibc-static-2.12-1.209.el6.ppc64.rpm s390x: glibc-debuginfo-2.12-1.209.el6.s390.rpm glibc-debuginfo-2.12-1.209.el6.s390x.rpm glibc-debuginfo-common-2.12-1.209.el6.s390.rpm glibc-debuginfo-common-2.12-1.209.el6.s390x.rpm glibc-static-2.12-1.209.el6.s390.rpm glibc-static-2.12-1.209.el6.s390x.rpm x86_64: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-static-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: glibc-2.12-1.209.el6.src.rpm i386: glibc-2.12-1.209.el6.i686.rpm glibc-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-headers-2.12-1.209.el6.i686.rpm glibc-utils-2.12-1.209.el6.i686.rpm nscd-2.12-1.209.el6.i686.rpm x86_64: glibc-2.12-1.209.el6.i686.rpm glibc-2.12-1.209.el6.x86_64.rpm glibc-common-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-devel-2.12-1.209.el6.i686.rpm glibc-devel-2.12-1.209.el6.x86_64.rpm glibc-headers-2.12-1.209.el6.x86_64.rpm glibc-utils-2.12-1.209.el6.x86_64.rpm nscd-2.12-1.209.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.i686.rpm x86_64: glibc-debuginfo-2.12-1.209.el6.i686.rpm glibc-debuginfo-2.12-1.209.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.209.el6.i686.rpm glibc-debuginfo-common-2.12-1.209.el6.x86_64.rpm glibc-static-2.12-1.209.el6.i686.rpm glibc-static-2.12-1.209.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9761 https://access.redhat.com/security/cve/CVE-2015-8776 https://access.redhat.com/security/cve/CVE-2015-8778 https://access.redhat.com/security/cve/CVE-2015-8779 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PUyXlSAg2UNWIIRAhr6AJ41TwpX4GlTdzHFMpTodtlmlfMZTwCfQ0pd XJUoh8+cFg11T95uhak9bLA= =V1Eh -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:43:40 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:43:40 +0000 Subject: [RHSA-2017:0698-01] Moderate: subscription-manager security, bug fix, and enhancement update Message-ID: <201703210943.v2L9hljh030993@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subscription-manager security, bug fix, and enhancement update Advisory ID: RHSA-2017:0698-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0698.html Issue date: 2017-03-21 CVE Names: CVE-2016-4455 ===================================================================== 1. Summary: An update for subscription-manager, subscription-manager-migration-data, and python-rhsm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform. The subscription-manager-migration-data package provides certificates for migrating a system from the legacy Red Hat Network Classic (RHN) to Red Hat Subscription Management (RHSM). The python-rhsm packages provide a library for communicating with the representational state transfer (REST) interface of a Red Hat Unified Entitlement Platform. The Subscription Management tools use this interface to manage system entitlements, certificates, and access to content. The following packages have been upgraded to a later upstream version: subscription-manager (1.18.10), python-rhsm (1.18.6), subscription-manager-migration-data (2.0.34). (BZ#1383475, BZ#1385446, BZ#1385382) Security Fix(es): * It was found that subscription-manager set weak permissions on files in /var/lib/rhsm/, causing an information disclosure. A local, unprivileged user could use this flaw to access sensitive data that could potentially be used in a social engineering attack. (CVE-2016-4455) Red Hat would like to thank Robert Scheck for reporting this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1176219 - subscription-manager repos --list with bad proxy options is silently using cache 1185914 - [RFE] rhn-migrate-classic-to-rhsm should give the option to remove RHN Classic related packages / daemons 1232472 - rhel-x86_64-server-sap-hana-6 channel maps are missing from channel-cert-mapping.txt 1283749 - Some GUI dialogs which should be error dialogs are information dialogs, breaking automated testing 1286842 - 'rhel-x86_64-server-6-rh-gluster-3-samba-debuginfo' channel map is missing from channel-cert-mapping.txt 1287925 - /bin/sh /etc/cron.daily/rhsmd does not stop. 1298140 - There is no proper icon in license window nor in date selection window for subscription-manager-gui 1301215 - The cmd "repos --list --proxy" with a fake proxy server url will not stop running. 1315591 - GUI : No network is thrown when you try to remove a subscription on the system with no network 1317613 - typo in src/subscription_manager/gui/data/ui/selectsla.ui 1320507 - Wrong prefix prompts when register using serverurl without prefix 1320597 - rhel-x86_64-server-hpn-fastrack-6 channel maps are absent from channel-cert-mapping.txt 1320607 - rhel-x86_64-server-hpn-6 channel maps are absent from channel-cert-mapping.txt 1320647 - rhn channels 'rhel-ARCH-workstation-6-thirdparty-oracle-java-beta' should maps to the Beta product cert, not the GA cert. 1321831 - When consumer ID has been deleted, the Back button and Next button should be disabled in Attaching window. 1323276 - Proxy dialog displays None:{None,3128} in field "Proxy Location" in some cases 1327179 - Subscription Manager cannot start when entitlement server is unreachable in case a proxy connection is used 1337817 - The 'Start-End Date' of expired subscription is not in red status when the subscription expired. 1340525 - CVE-2016-4455 subscription-manager: sensitive world readable files in /var/lib/rhsm/ 1351009 - Error when disable all repos by 'subscription-manager repos --disable=*' 1367128 - [RFE] upload FQDN with facts 1382355 - CLI Does Not Display Error Message When Auto-Attach has Failure 1383475 - Rebase subscription-manager component to the latest upstream branch for RHEL 6.9 1385382 - Rebase python-rhsm component to the latest upstream branch for RHEL 6.9 1385446 - Rebase subscription-manager-migration-data component to the latest upstream branch for RHEL 6.9 1389559 - logging to /var/log/rhsm/rhsm.log ceases after upgrade from rhel6.8 to rhel6.9 1390258 - rhn-migrate-classic-to-rhsm --keep --remove-rhn-packages should error out due to conflicting options 1390341 - rhn-migrate-classic-to-rhsm is failing to stop and disable services 1390688 - global name 'socket' is not defined 1390712 - man page for rhn-migrate-classic-to-rhsm needs a description for new option --remove-rhn-packages 1391681 - Zanata translations for subscription-manager 1.18 are not 100% 1393573 - subscription-manager-migration-data for RHEL6.9 needs RHEL6.9 product certs 1394351 - 'module' object has no attribute 'PROXY_AUTHENTICATION_REQUIRED' 1394776 - Registration fails with RemoteServerException: Server error attempting a GET to /subscription/users/stage_test_rhel69/owners returned status 404 1395659 - Firstboot : Exception occurs while trying to register via auth proxy with invalid credentials 1395662 - Firstboot: Exception occured while trying to register the system using activation-key with org and activation-key field empty 1395684 - GUI: No error dialogue when you try to register via auth proxy without selecting "Use Authentication with http proxy" option 1395794 - /usr/libexec/rhsmd is failing with ImportError: No module named decorator 1396405 - Message "an integer is required" is displayed when tired to list release versions against stage server 1397201 - AttributeError: 'module' object has no attribute 'BadStatusLine' 1400719 - AttributeError: 'ContentConnection' object has no attribute 'proxy_host' 1401078 - unrepeatable "BadStatusLine" tracebacks are silently encountered when stage testing 1402009 - subscription-manager stdout contains ESC[?1034h 1403387 - there is an error in processing the specified proxy arguments versus proxy configurations 1404930 - Unable to launch subscription-manager gui when configure invalid proxy in proxy url 1417731 - [ko][pt_BR] pofilter endwhitespace test fails for subscription-manager 1.18.X 1417736 - [pt_BR][fr][ja] pofilter accelerators test fails for subscription-manager 1.18.X 1417740 - [ko] pofilter startwhitespace test fails for subscription-manager 1.18.X 1417746 - [it][fr][es_ES][pt_BR] pofilter unchanged test fails for subscription-manager 1.18.X 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: python-rhsm-1.18.6-1.el6.src.rpm subscription-manager-1.18.10-1.el6.src.rpm subscription-manager-migration-data-2.0.34-1.el6.src.rpm i386: python-rhsm-1.18.6-1.el6.i686.rpm python-rhsm-certificates-1.18.6-1.el6.i686.rpm python-rhsm-debuginfo-1.18.6-1.el6.i686.rpm subscription-manager-1.18.10-1.el6.i686.rpm subscription-manager-debuginfo-1.18.10-1.el6.i686.rpm subscription-manager-firstboot-1.18.10-1.el6.i686.rpm subscription-manager-gui-1.18.10-1.el6.i686.rpm subscription-manager-migration-1.18.10-1.el6.i686.rpm noarch: subscription-manager-migration-data-2.0.34-1.el6.noarch.rpm x86_64: python-rhsm-1.18.6-1.el6.x86_64.rpm python-rhsm-certificates-1.18.6-1.el6.x86_64.rpm python-rhsm-debuginfo-1.18.6-1.el6.x86_64.rpm subscription-manager-1.18.10-1.el6.x86_64.rpm subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-firstboot-1.18.10-1.el6.x86_64.rpm subscription-manager-gui-1.18.10-1.el6.x86_64.rpm subscription-manager-migration-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: subscription-manager-debuginfo-1.18.10-1.el6.i686.rpm subscription-manager-plugin-container-1.18.10-1.el6.i686.rpm x86_64: subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-plugin-container-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: python-rhsm-1.18.6-1.el6.src.rpm subscription-manager-1.18.10-1.el6.src.rpm subscription-manager-migration-data-2.0.34-1.el6.src.rpm noarch: subscription-manager-migration-data-2.0.34-1.el6.noarch.rpm x86_64: python-rhsm-1.18.6-1.el6.x86_64.rpm python-rhsm-certificates-1.18.6-1.el6.x86_64.rpm python-rhsm-debuginfo-1.18.6-1.el6.x86_64.rpm subscription-manager-1.18.10-1.el6.x86_64.rpm subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-migration-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-firstboot-1.18.10-1.el6.x86_64.rpm subscription-manager-gui-1.18.10-1.el6.x86_64.rpm subscription-manager-plugin-container-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: python-rhsm-1.18.6-1.el6.src.rpm subscription-manager-1.18.10-1.el6.src.rpm subscription-manager-migration-data-2.0.34-1.el6.src.rpm i386: python-rhsm-1.18.6-1.el6.i686.rpm python-rhsm-certificates-1.18.6-1.el6.i686.rpm python-rhsm-debuginfo-1.18.6-1.el6.i686.rpm subscription-manager-1.18.10-1.el6.i686.rpm subscription-manager-debuginfo-1.18.10-1.el6.i686.rpm subscription-manager-firstboot-1.18.10-1.el6.i686.rpm subscription-manager-gui-1.18.10-1.el6.i686.rpm subscription-manager-migration-1.18.10-1.el6.i686.rpm noarch: subscription-manager-migration-data-2.0.34-1.el6.noarch.rpm ppc64: python-rhsm-1.18.6-1.el6.ppc64.rpm python-rhsm-certificates-1.18.6-1.el6.ppc64.rpm python-rhsm-debuginfo-1.18.6-1.el6.ppc64.rpm subscription-manager-1.18.10-1.el6.ppc64.rpm subscription-manager-debuginfo-1.18.10-1.el6.ppc64.rpm subscription-manager-firstboot-1.18.10-1.el6.ppc64.rpm subscription-manager-gui-1.18.10-1.el6.ppc64.rpm subscription-manager-migration-1.18.10-1.el6.ppc64.rpm s390x: python-rhsm-1.18.6-1.el6.s390x.rpm python-rhsm-certificates-1.18.6-1.el6.s390x.rpm python-rhsm-debuginfo-1.18.6-1.el6.s390x.rpm subscription-manager-1.18.10-1.el6.s390x.rpm subscription-manager-debuginfo-1.18.10-1.el6.s390x.rpm subscription-manager-firstboot-1.18.10-1.el6.s390x.rpm subscription-manager-gui-1.18.10-1.el6.s390x.rpm subscription-manager-migration-1.18.10-1.el6.s390x.rpm x86_64: python-rhsm-1.18.6-1.el6.x86_64.rpm python-rhsm-certificates-1.18.6-1.el6.x86_64.rpm python-rhsm-debuginfo-1.18.6-1.el6.x86_64.rpm subscription-manager-1.18.10-1.el6.x86_64.rpm subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-firstboot-1.18.10-1.el6.x86_64.rpm subscription-manager-gui-1.18.10-1.el6.x86_64.rpm subscription-manager-migration-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: subscription-manager-debuginfo-1.18.10-1.el6.i686.rpm subscription-manager-plugin-container-1.18.10-1.el6.i686.rpm ppc64: subscription-manager-debuginfo-1.18.10-1.el6.ppc64.rpm subscription-manager-plugin-container-1.18.10-1.el6.ppc64.rpm s390x: subscription-manager-debuginfo-1.18.10-1.el6.s390x.rpm subscription-manager-plugin-container-1.18.10-1.el6.s390x.rpm x86_64: subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-plugin-container-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: python-rhsm-1.18.6-1.el6.src.rpm subscription-manager-1.18.10-1.el6.src.rpm subscription-manager-migration-data-2.0.34-1.el6.src.rpm i386: python-rhsm-1.18.6-1.el6.i686.rpm python-rhsm-certificates-1.18.6-1.el6.i686.rpm python-rhsm-debuginfo-1.18.6-1.el6.i686.rpm subscription-manager-1.18.10-1.el6.i686.rpm subscription-manager-debuginfo-1.18.10-1.el6.i686.rpm subscription-manager-firstboot-1.18.10-1.el6.i686.rpm subscription-manager-gui-1.18.10-1.el6.i686.rpm subscription-manager-migration-1.18.10-1.el6.i686.rpm noarch: subscription-manager-migration-data-2.0.34-1.el6.noarch.rpm x86_64: python-rhsm-1.18.6-1.el6.x86_64.rpm python-rhsm-certificates-1.18.6-1.el6.x86_64.rpm python-rhsm-debuginfo-1.18.6-1.el6.x86_64.rpm subscription-manager-1.18.10-1.el6.x86_64.rpm subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-firstboot-1.18.10-1.el6.x86_64.rpm subscription-manager-gui-1.18.10-1.el6.x86_64.rpm subscription-manager-migration-1.18.10-1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: subscription-manager-debuginfo-1.18.10-1.el6.i686.rpm subscription-manager-plugin-container-1.18.10-1.el6.i686.rpm x86_64: subscription-manager-debuginfo-1.18.10-1.el6.x86_64.rpm subscription-manager-plugin-container-1.18.10-1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4455 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PVPXlSAg2UNWIIRArMdAJ9xIj8PVV0ztHRNuAakmN1xLVLhswCZAWNa nAPD+QePV0XBb9YPxXYETC0= =IVQw -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:44:17 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:44:17 +0000 Subject: [RHSA-2017:0725-01] Moderate: bash security and bug fix update Message-ID: <201703210944.v2L9iOmU031060@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: bash security and bug fix update Advisory ID: RHSA-2017:0725-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0725.html Issue date: 2017-03-21 CVE Names: CVE-2016-0634 CVE-2016-7543 CVE-2016-9401 ===================================================================== 1. Summary: An update for bash is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The bash packages provide Bash (Bourne-again shell), which is the default shell for Red Hat Enterprise Linux. Security Fix(es): * An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances. (CVE-2016-0634) * An arbitrary command injection flaw was found in the way bash processed the SHELLOPTS and PS4 environment variables. A local, authenticated attacker could use this flaw to exploit poorly written setuid programs to elevate their privileges under certain circumstances. (CVE-2016-7543) * A denial of service flaw was found in the way bash handled popd commands. A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session. (CVE-2016-9401) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1377613 - CVE-2016-0634 bash: Arbitrary code execution via malicious hostname 1379630 - CVE-2016-7543 bash: Specially crafted SHELLOPTS+PS4 variables allows command substitution 1396383 - CVE-2016-9401 bash: popd controlled free 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: bash-4.1.2-48.el6.src.rpm i386: bash-4.1.2-48.el6.i686.rpm bash-debuginfo-4.1.2-48.el6.i686.rpm x86_64: bash-4.1.2-48.el6.x86_64.rpm bash-debuginfo-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bash-debuginfo-4.1.2-48.el6.i686.rpm bash-doc-4.1.2-48.el6.i686.rpm x86_64: bash-debuginfo-4.1.2-48.el6.x86_64.rpm bash-doc-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bash-4.1.2-48.el6.src.rpm x86_64: bash-4.1.2-48.el6.x86_64.rpm bash-debuginfo-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bash-debuginfo-4.1.2-48.el6.x86_64.rpm bash-doc-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bash-4.1.2-48.el6.src.rpm i386: bash-4.1.2-48.el6.i686.rpm bash-debuginfo-4.1.2-48.el6.i686.rpm ppc64: bash-4.1.2-48.el6.ppc64.rpm bash-debuginfo-4.1.2-48.el6.ppc64.rpm s390x: bash-4.1.2-48.el6.s390x.rpm bash-debuginfo-4.1.2-48.el6.s390x.rpm x86_64: bash-4.1.2-48.el6.x86_64.rpm bash-debuginfo-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bash-debuginfo-4.1.2-48.el6.i686.rpm bash-doc-4.1.2-48.el6.i686.rpm ppc64: bash-debuginfo-4.1.2-48.el6.ppc64.rpm bash-doc-4.1.2-48.el6.ppc64.rpm s390x: bash-debuginfo-4.1.2-48.el6.s390x.rpm bash-doc-4.1.2-48.el6.s390x.rpm x86_64: bash-debuginfo-4.1.2-48.el6.x86_64.rpm bash-doc-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bash-4.1.2-48.el6.src.rpm i386: bash-4.1.2-48.el6.i686.rpm bash-debuginfo-4.1.2-48.el6.i686.rpm x86_64: bash-4.1.2-48.el6.x86_64.rpm bash-debuginfo-4.1.2-48.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bash-debuginfo-4.1.2-48.el6.i686.rpm bash-doc-4.1.2-48.el6.i686.rpm x86_64: bash-debuginfo-4.1.2-48.el6.x86_64.rpm bash-doc-4.1.2-48.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-0634 https://access.redhat.com/security/cve/CVE-2016-7543 https://access.redhat.com/security/cve/CVE-2016-9401 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PXiXlSAg2UNWIIRAkzvAJ9AilUrzIuCwUxQdYRW0I9Vgfn4CgCeI5qM qqsmNOk843TXCuOsO5jEa8E= =3vnw -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:44:53 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:44:53 +0000 Subject: [RHSA-2017:0744-01] Moderate: samba4 security and bug fix update Message-ID: <201703210944.v2L9ixYS031182@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: samba4 security and bug fix update Advisory ID: RHSA-2017:0744-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0744.html Issue date: 2017-03-21 CVE Names: CVE-2016-2125 CVE-2016-2126 ===================================================================== 1. Summary: An update for samba4 is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. Security Fix(es): * It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) * A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the smb service will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1403114 - CVE-2016-2125 samba: Unconditional privilege delegation to Kerberos servers in trusted realms 1403115 - CVE-2016-2126 samba: Flaws in Kerberos PAC validation can trigger privilege elevation 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: samba4-4.2.10-9.el6.src.rpm i386: samba4-4.2.10-9.el6.i686.rpm samba4-client-4.2.10-9.el6.i686.rpm samba4-common-4.2.10-9.el6.i686.rpm samba4-dc-4.2.10-9.el6.i686.rpm samba4-dc-libs-4.2.10-9.el6.i686.rpm samba4-debuginfo-4.2.10-9.el6.i686.rpm samba4-devel-4.2.10-9.el6.i686.rpm samba4-libs-4.2.10-9.el6.i686.rpm samba4-pidl-4.2.10-9.el6.i686.rpm samba4-python-4.2.10-9.el6.i686.rpm samba4-test-4.2.10-9.el6.i686.rpm samba4-winbind-4.2.10-9.el6.i686.rpm samba4-winbind-clients-4.2.10-9.el6.i686.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.i686.rpm x86_64: samba4-4.2.10-9.el6.x86_64.rpm samba4-client-4.2.10-9.el6.x86_64.rpm samba4-common-4.2.10-9.el6.x86_64.rpm samba4-dc-4.2.10-9.el6.x86_64.rpm samba4-dc-libs-4.2.10-9.el6.x86_64.rpm samba4-debuginfo-4.2.10-9.el6.x86_64.rpm samba4-devel-4.2.10-9.el6.x86_64.rpm samba4-libs-4.2.10-9.el6.x86_64.rpm samba4-pidl-4.2.10-9.el6.x86_64.rpm samba4-python-4.2.10-9.el6.x86_64.rpm samba4-test-4.2.10-9.el6.x86_64.rpm samba4-winbind-4.2.10-9.el6.x86_64.rpm samba4-winbind-clients-4.2.10-9.el6.x86_64.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: samba4-4.2.10-9.el6.src.rpm x86_64: samba4-4.2.10-9.el6.x86_64.rpm samba4-client-4.2.10-9.el6.x86_64.rpm samba4-common-4.2.10-9.el6.x86_64.rpm samba4-dc-4.2.10-9.el6.x86_64.rpm samba4-dc-libs-4.2.10-9.el6.x86_64.rpm samba4-debuginfo-4.2.10-9.el6.x86_64.rpm samba4-devel-4.2.10-9.el6.x86_64.rpm samba4-libs-4.2.10-9.el6.x86_64.rpm samba4-pidl-4.2.10-9.el6.x86_64.rpm samba4-python-4.2.10-9.el6.x86_64.rpm samba4-test-4.2.10-9.el6.x86_64.rpm samba4-winbind-4.2.10-9.el6.x86_64.rpm samba4-winbind-clients-4.2.10-9.el6.x86_64.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: samba4-4.2.10-9.el6.src.rpm i386: samba4-4.2.10-9.el6.i686.rpm samba4-client-4.2.10-9.el6.i686.rpm samba4-common-4.2.10-9.el6.i686.rpm samba4-dc-4.2.10-9.el6.i686.rpm samba4-dc-libs-4.2.10-9.el6.i686.rpm samba4-debuginfo-4.2.10-9.el6.i686.rpm samba4-devel-4.2.10-9.el6.i686.rpm samba4-libs-4.2.10-9.el6.i686.rpm samba4-pidl-4.2.10-9.el6.i686.rpm samba4-python-4.2.10-9.el6.i686.rpm samba4-test-4.2.10-9.el6.i686.rpm samba4-winbind-4.2.10-9.el6.i686.rpm samba4-winbind-clients-4.2.10-9.el6.i686.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.i686.rpm ppc64: samba4-4.2.10-9.el6.ppc64.rpm samba4-client-4.2.10-9.el6.ppc64.rpm samba4-common-4.2.10-9.el6.ppc64.rpm samba4-dc-4.2.10-9.el6.ppc64.rpm samba4-dc-libs-4.2.10-9.el6.ppc64.rpm samba4-debuginfo-4.2.10-9.el6.ppc64.rpm samba4-devel-4.2.10-9.el6.ppc64.rpm samba4-libs-4.2.10-9.el6.ppc64.rpm samba4-pidl-4.2.10-9.el6.ppc64.rpm samba4-python-4.2.10-9.el6.ppc64.rpm samba4-test-4.2.10-9.el6.ppc64.rpm samba4-winbind-4.2.10-9.el6.ppc64.rpm samba4-winbind-clients-4.2.10-9.el6.ppc64.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.ppc64.rpm s390x: samba4-4.2.10-9.el6.s390x.rpm samba4-client-4.2.10-9.el6.s390x.rpm samba4-common-4.2.10-9.el6.s390x.rpm samba4-dc-4.2.10-9.el6.s390x.rpm samba4-dc-libs-4.2.10-9.el6.s390x.rpm samba4-debuginfo-4.2.10-9.el6.s390x.rpm samba4-devel-4.2.10-9.el6.s390x.rpm samba4-libs-4.2.10-9.el6.s390x.rpm samba4-pidl-4.2.10-9.el6.s390x.rpm samba4-python-4.2.10-9.el6.s390x.rpm samba4-test-4.2.10-9.el6.s390x.rpm samba4-winbind-4.2.10-9.el6.s390x.rpm samba4-winbind-clients-4.2.10-9.el6.s390x.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.s390x.rpm x86_64: samba4-4.2.10-9.el6.x86_64.rpm samba4-client-4.2.10-9.el6.x86_64.rpm samba4-common-4.2.10-9.el6.x86_64.rpm samba4-dc-4.2.10-9.el6.x86_64.rpm samba4-dc-libs-4.2.10-9.el6.x86_64.rpm samba4-debuginfo-4.2.10-9.el6.x86_64.rpm samba4-devel-4.2.10-9.el6.x86_64.rpm samba4-libs-4.2.10-9.el6.x86_64.rpm samba4-pidl-4.2.10-9.el6.x86_64.rpm samba4-python-4.2.10-9.el6.x86_64.rpm samba4-test-4.2.10-9.el6.x86_64.rpm samba4-winbind-4.2.10-9.el6.x86_64.rpm samba4-winbind-clients-4.2.10-9.el6.x86_64.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: samba4-4.2.10-9.el6.src.rpm i386: samba4-4.2.10-9.el6.i686.rpm samba4-client-4.2.10-9.el6.i686.rpm samba4-common-4.2.10-9.el6.i686.rpm samba4-dc-4.2.10-9.el6.i686.rpm samba4-dc-libs-4.2.10-9.el6.i686.rpm samba4-debuginfo-4.2.10-9.el6.i686.rpm samba4-devel-4.2.10-9.el6.i686.rpm samba4-libs-4.2.10-9.el6.i686.rpm samba4-pidl-4.2.10-9.el6.i686.rpm samba4-python-4.2.10-9.el6.i686.rpm samba4-test-4.2.10-9.el6.i686.rpm samba4-winbind-4.2.10-9.el6.i686.rpm samba4-winbind-clients-4.2.10-9.el6.i686.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.i686.rpm x86_64: samba4-4.2.10-9.el6.x86_64.rpm samba4-client-4.2.10-9.el6.x86_64.rpm samba4-common-4.2.10-9.el6.x86_64.rpm samba4-dc-4.2.10-9.el6.x86_64.rpm samba4-dc-libs-4.2.10-9.el6.x86_64.rpm samba4-debuginfo-4.2.10-9.el6.x86_64.rpm samba4-devel-4.2.10-9.el6.x86_64.rpm samba4-libs-4.2.10-9.el6.x86_64.rpm samba4-pidl-4.2.10-9.el6.x86_64.rpm samba4-python-4.2.10-9.el6.x86_64.rpm samba4-test-4.2.10-9.el6.x86_64.rpm samba4-winbind-4.2.10-9.el6.x86_64.rpm samba4-winbind-clients-4.2.10-9.el6.x86_64.rpm samba4-winbind-krb5-locator-4.2.10-9.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2125 https://access.redhat.com/security/cve/CVE-2016-2126 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html https://www.samba.org/samba/security/CVE-2016-2125.html https://www.samba.org/samba/security/CVE-2016-2126.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PYDXlSAg2UNWIIRAuDlAKCyaEBSSXFP4FpwlPq2aeSqpX+DWQCeIjyE z92Fk6IIfEI0tGbw3EQZXQw= =yv/o -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:46:20 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:46:20 +0000 Subject: [RHSA-2017:0794-01] Moderate: quagga security and bug fix update Message-ID: <201703210946.v2L9kTIU032088@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: quagga security and bug fix update Advisory ID: RHSA-2017:0794-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0794.html Issue date: 2017-03-21 CVE Names: CVE-2013-2236 CVE-2016-1245 CVE-2016-2342 CVE-2016-4049 CVE-2017-5495 ===================================================================== 1. Summary: An update for quagga is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector. Security Fix(es): * A stack-based buffer overflow flaw was found in the way Quagga handled IPv6 router advertisement messages. A remote attacker could use this flaw to crash the zebra daemon resulting in denial of service. (CVE-2016-1245) * A stack-based buffer overflow flaw was found in the way the Quagga BGP routing daemon (bgpd) handled Labeled-VPN SAFI routes data. A remote attacker could use this flaw to crash the bgpd daemon resulting in denial of service. (CVE-2016-2342) * A denial of service flaw was found in the Quagga BGP routing daemon (bgpd). Under certain circumstances, a remote attacker could send a crafted packet to crash the bgpd daemon resulting in denial of service. (CVE-2016-4049) * A denial of service flaw affecting various daemons in Quagga was found. A remote attacker could use this flaw to cause the various Quagga daemons, which expose their telnet interface, to crash. (CVE-2017-5495) * A stack-based buffer overflow flaw was found in the way the Quagga OSPFD daemon handled LSA (link-state advertisement) packets. A remote attacker could use this flaw to crash the ospfd daemon resulting in denial of service. (CVE-2013-2236) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, the bgpd daemon must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 674862 - Add missing man pages in quagga package 770731 - Interface prefix advertisement declaration prevents ospf6d from starting 839620 - /etc/sysconfig/quagga defines QCONFDIR, init scripts do not use it 842308 - quagga daemon pidfiles remain after daemons are stopped 862826 - Correct spec to add watchquagga 981124 - CVE-2013-2236 Quagga: OSPFD Potential remote code exec (stack based buffer overflow) 1316571 - CVE-2016-2342 quagga: VPNv4 NLRI parser memcpys to stack on unchecked length 1331372 - CVE-2016-4049 quagga: denial of service vulnerability in BGP routing daemon 1386109 - CVE-2016-1245 quagga: Buffer Overflow in IPv6 RA handling 1416013 - CVE-2017-5495 quagga: Telnet interface input buffer allocates unbounded amounts of memory 6. Package List: Red Hat Enterprise Linux Server (v. 6): Source: quagga-0.99.15-14.el6.src.rpm i386: quagga-0.99.15-14.el6.i686.rpm quagga-debuginfo-0.99.15-14.el6.i686.rpm ppc64: quagga-0.99.15-14.el6.ppc64.rpm quagga-debuginfo-0.99.15-14.el6.ppc64.rpm s390x: quagga-0.99.15-14.el6.s390x.rpm quagga-debuginfo-0.99.15-14.el6.s390x.rpm x86_64: quagga-0.99.15-14.el6.x86_64.rpm quagga-debuginfo-0.99.15-14.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: quagga-contrib-0.99.15-14.el6.i686.rpm quagga-debuginfo-0.99.15-14.el6.i686.rpm quagga-devel-0.99.15-14.el6.i686.rpm ppc64: quagga-contrib-0.99.15-14.el6.ppc64.rpm quagga-debuginfo-0.99.15-14.el6.ppc.rpm quagga-debuginfo-0.99.15-14.el6.ppc64.rpm quagga-devel-0.99.15-14.el6.ppc.rpm quagga-devel-0.99.15-14.el6.ppc64.rpm s390x: quagga-contrib-0.99.15-14.el6.s390x.rpm quagga-debuginfo-0.99.15-14.el6.s390.rpm quagga-debuginfo-0.99.15-14.el6.s390x.rpm quagga-devel-0.99.15-14.el6.s390.rpm quagga-devel-0.99.15-14.el6.s390x.rpm x86_64: quagga-contrib-0.99.15-14.el6.x86_64.rpm quagga-debuginfo-0.99.15-14.el6.i686.rpm quagga-debuginfo-0.99.15-14.el6.x86_64.rpm quagga-devel-0.99.15-14.el6.i686.rpm quagga-devel-0.99.15-14.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: quagga-0.99.15-14.el6.src.rpm i386: quagga-0.99.15-14.el6.i686.rpm quagga-debuginfo-0.99.15-14.el6.i686.rpm x86_64: quagga-0.99.15-14.el6.x86_64.rpm quagga-debuginfo-0.99.15-14.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: quagga-contrib-0.99.15-14.el6.i686.rpm quagga-debuginfo-0.99.15-14.el6.i686.rpm quagga-devel-0.99.15-14.el6.i686.rpm x86_64: quagga-contrib-0.99.15-14.el6.x86_64.rpm quagga-debuginfo-0.99.15-14.el6.i686.rpm quagga-debuginfo-0.99.15-14.el6.x86_64.rpm quagga-devel-0.99.15-14.el6.i686.rpm quagga-devel-0.99.15-14.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2013-2236 https://access.redhat.com/security/cve/CVE-2016-1245 https://access.redhat.com/security/cve/CVE-2016-2342 https://access.redhat.com/security/cve/CVE-2016-4049 https://access.redhat.com/security/cve/CVE-2017-5495 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PZlXlSAg2UNWIIRAk04AJ9quLI5264pSVvfyo8UnOkIRLPkxgCePk5v hgFzQjA6W9PSi1maCzaBHug= =Wvx0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Mar 21 09:48:32 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 21 Mar 2017 09:48:32 +0000 Subject: [RHSA-2017:0817-01] Moderate: kernel security, bug fix, and enhancement update Message-ID: <201703210948.v2L9mdjt032628@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2017:0817-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0817.html Issue date: 2017-03-21 CVE Names: CVE-2016-10088 CVE-2016-10142 CVE-2016-2069 CVE-2016-2384 CVE-2016-6480 CVE-2016-7042 CVE-2016-7097 CVE-2016-8399 CVE-2016-9576 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * It was discovered that a remote attacker could leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and could subsequently perform any type of a fragmentation-based attack against legacy IPv6 nodes that do not implement RFC6946. (CVE-2016-10142, Moderate) * A flaw was discovered in the way the Linux kernel dealt with paging structures. When the kernel invalidated a paging structure that was not in use locally, it could, in principle, race against another CPU that is switching to a process that uses the paging structure in question. A local user could use a thread running with a stale cached virtual->physical translation to potentially escalate their privileges if the translation in question were writable and the physical page got reused for something critical (for example, a page table). (CVE-2016-2069, Moderate) * A race condition flaw was found in the ioctl_send_fib() function in the Linux kernel's aacraid implementation. A local attacker could use this flaw to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value. (CVE-2016-6480, Moderate) * It was found that when the gcc stack protector was enabled, reading the /proc/keys file could cause a panic in the Linux kernel due to stack corruption. This happened because an incorrect buffer size was used to hold a 64-bit timeout value rendered as weeks. (CVE-2016-7042, Moderate) * It was found that when file permissions were modified via chmod and the user modifying them was not in the owning group or capable of CAP_FSETID, the setgid bit would be cleared. Setting a POSIX ACL via setxattr sets the file permissions as well as the new ACL, but doesn't clear the setgid bit in a similar way. This could allow a local user to gain group privileges via certain setgid applications. (CVE-2016-7097, Moderate) * A flaw was found in the Linux networking subsystem where a local attacker with CAP_NET_ADMIN capabilities could cause an out-of-bounds memory access by creating a smaller-than-expected ICMP header and sending to its destination via sendto(). (CVE-2016-8399, Moderate) * It was found that the blk_rq_map_user_iov() function in the Linux kernel's block device implementation did not properly restrict the type of iterator, which could allow a local attacker to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging write access to a /dev/sg device. (CVE-2016-9576, CVE-2016-10088, Moderate) * A flaw was found in the USB-MIDI Linux kernel driver: a double-free error could be triggered for the 'umidi' object. An attacker with physical access to the system could use this flaw to escalate their privileges. (CVE-2016-2384, Low) The CVE-2016-7042 issue was discovered by Ondrej Kozina (Red Hat) and the CVE-2016-7097 issue was discovered by Andreas Gruenbacher (Red Hat) and Jan Kara (SUSE). Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 847106 - ext2 tests hang while running fsfuzzer 1301893 - CVE-2016-2069 kernel: race condition in the TLB flush logic 1308444 - CVE-2016-2384 kernel: double-free in usb-audio triggered by invalid USB descriptor 1325766 - RHEL6.7: NFSv3 client performance regression where ls -l takes too long with "aggressive readdirplus" commit 1362466 - CVE-2016-6480 kernel: scsi: aacraid: double fetch in ioctl_send_fib() 1368938 - CVE-2016-7097 kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit 1373966 - CVE-2016-7042 kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled 1403145 - CVE-2016-9576 kernel: Use after free in SCSI generic device interface 1403833 - CVE-2016-8399 kernel: net: Out of bounds stack read in memcpy_fromiovec 1412210 - CVE-2016-10088 kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) 1415908 - CVE-2016-10142 kernel - IPV6 fragmentation flaw 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-696.el6.src.rpm i386: kernel-2.6.32-696.el6.i686.rpm kernel-debug-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-devel-2.6.32-696.el6.i686.rpm kernel-headers-2.6.32-696.el6.i686.rpm perf-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-696.el6.noarch.rpm kernel-doc-2.6.32-696.el6.noarch.rpm kernel-firmware-2.6.32-696.el6.noarch.rpm x86_64: kernel-2.6.32-696.el6.x86_64.rpm kernel-debug-2.6.32-696.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm kernel-devel-2.6.32-696.el6.x86_64.rpm kernel-headers-2.6.32-696.el6.x86_64.rpm perf-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-696.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-696.el6.noarch.rpm kernel-doc-2.6.32-696.el6.noarch.rpm kernel-firmware-2.6.32-696.el6.noarch.rpm x86_64: kernel-2.6.32-696.el6.x86_64.rpm kernel-debug-2.6.32-696.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm kernel-devel-2.6.32-696.el6.x86_64.rpm kernel-headers-2.6.32-696.el6.x86_64.rpm perf-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-696.el6.src.rpm i386: kernel-2.6.32-696.el6.i686.rpm kernel-debug-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-devel-2.6.32-696.el6.i686.rpm kernel-headers-2.6.32-696.el6.i686.rpm perf-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-696.el6.noarch.rpm kernel-doc-2.6.32-696.el6.noarch.rpm kernel-firmware-2.6.32-696.el6.noarch.rpm ppc64: kernel-2.6.32-696.el6.ppc64.rpm kernel-bootwrapper-2.6.32-696.el6.ppc64.rpm kernel-debug-2.6.32-696.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-696.el6.ppc64.rpm kernel-debug-devel-2.6.32-696.el6.ppc64.rpm kernel-debuginfo-2.6.32-696.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-696.el6.ppc64.rpm kernel-devel-2.6.32-696.el6.ppc64.rpm kernel-headers-2.6.32-696.el6.ppc64.rpm perf-2.6.32-696.el6.ppc64.rpm perf-debuginfo-2.6.32-696.el6.ppc64.rpm python-perf-debuginfo-2.6.32-696.el6.ppc64.rpm s390x: kernel-2.6.32-696.el6.s390x.rpm kernel-debug-2.6.32-696.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-696.el6.s390x.rpm kernel-debug-devel-2.6.32-696.el6.s390x.rpm kernel-debuginfo-2.6.32-696.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-696.el6.s390x.rpm kernel-devel-2.6.32-696.el6.s390x.rpm kernel-headers-2.6.32-696.el6.s390x.rpm kernel-kdump-2.6.32-696.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-696.el6.s390x.rpm kernel-kdump-devel-2.6.32-696.el6.s390x.rpm perf-2.6.32-696.el6.s390x.rpm perf-debuginfo-2.6.32-696.el6.s390x.rpm python-perf-debuginfo-2.6.32-696.el6.s390x.rpm x86_64: kernel-2.6.32-696.el6.x86_64.rpm kernel-debug-2.6.32-696.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm kernel-devel-2.6.32-696.el6.x86_64.rpm kernel-headers-2.6.32-696.el6.x86_64.rpm perf-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-696.el6.ppc64.rpm kernel-debuginfo-2.6.32-696.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-696.el6.ppc64.rpm perf-debuginfo-2.6.32-696.el6.ppc64.rpm python-perf-2.6.32-696.el6.ppc64.rpm python-perf-debuginfo-2.6.32-696.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-696.el6.s390x.rpm kernel-debuginfo-2.6.32-696.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-696.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-696.el6.s390x.rpm perf-debuginfo-2.6.32-696.el6.s390x.rpm python-perf-2.6.32-696.el6.s390x.rpm python-perf-debuginfo-2.6.32-696.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-696.el6.src.rpm i386: kernel-2.6.32-696.el6.i686.rpm kernel-debug-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-devel-2.6.32-696.el6.i686.rpm kernel-headers-2.6.32-696.el6.i686.rpm perf-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-696.el6.noarch.rpm kernel-doc-2.6.32-696.el6.noarch.rpm kernel-firmware-2.6.32-696.el6.noarch.rpm x86_64: kernel-2.6.32-696.el6.x86_64.rpm kernel-debug-2.6.32-696.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debug-devel-2.6.32-696.el6.i686.rpm kernel-debug-devel-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm kernel-devel-2.6.32-696.el6.x86_64.rpm kernel-headers-2.6.32-696.el6.x86_64.rpm perf-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-2.6.32-696.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-696.el6.i686.rpm perf-debuginfo-2.6.32-696.el6.i686.rpm python-perf-2.6.32-696.el6.i686.rpm python-perf-debuginfo-2.6.32-696.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-2.6.32-696.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-696.el6.x86_64.rpm perf-debuginfo-2.6.32-696.el6.x86_64.rpm python-perf-2.6.32-696.el6.x86_64.rpm python-perf-debuginfo-2.6.32-696.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-10088 https://access.redhat.com/security/cve/CVE-2016-10142 https://access.redhat.com/security/cve/CVE-2016-2069 https://access.redhat.com/security/cve/CVE-2016-2384 https://access.redhat.com/security/cve/CVE-2016-6480 https://access.redhat.com/security/cve/CVE-2016-7042 https://access.redhat.com/security/cve/CVE-2016-7097 https://access.redhat.com/security/cve/CVE-2016-8399 https://access.redhat.com/security/cve/CVE-2016-9576 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0PauXlSAg2UNWIIRAtSfAKC8sQfht134oUfec4ggIEa8jkjXMgCeP5bw HKjCaYBkw7DdfdypB4+Q5MA= =JUIp -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 23 01:12:22 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 22 Mar 2017 21:12:22 -0400 Subject: [RHSA-2017:0837-01] Important: icoutils security update Message-ID: <201703230112.v2N1CM6S015547@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: icoutils security update Advisory ID: RHSA-2017:0837-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0837.html Issue date: 2017-03-23 CVE Names: CVE-2017-5208 CVE-2017-5332 CVE-2017-5333 CVE-2017-6009 CVE-2017-6010 CVE-2017-6011 ===================================================================== 1. Summary: An update for icoutils is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: The icoutils are a set of programs for extracting and converting images in Microsoft Windows icon and cursor files. These files usually have the extension .ico or .cur, but they can also be embedded in executables or libraries. Security Fix(es): * Multiple vulnerabilities were found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in memory corruption leading to a crash or potential code execution. (CVE-2017-5208, CVE-2017-5333, CVE-2017-6009) * A vulnerability was found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in failure to allocate memory or an over-large memcpy operation, leading to a crash. (CVE-2017-5332) * Multiple vulnerabilities were found in icoutils, in the icotool program. An attacker could create a crafted ICO or CUR file that, when read by icotool, could result in memory corruption leading to a crash or potential code execution. (CVE-2017-6010, CVE-2017-6011) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1411251 - CVE-2017-5208 icoutils: Check_offset overflow on 64-bit systems 1412259 - CVE-2017-5333 icoutils: Integer overflow vulnerability in extract.c 1412263 - CVE-2017-5332 icoutils: Access to unallocated memory possible in extract.c 1422906 - CVE-2017-6009 icoutils: Buffer overflow in the decode_ne_resource_id function 1422907 - CVE-2017-6010 icoutils: Buffer overflow in the extract_icons function 1422908 - CVE-2017-6011 icoutils: Buffer overflow in the simple_vec function 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: icoutils-0.31.3-1.el7_3.src.rpm x86_64: icoutils-0.31.3-1.el7_3.x86_64.rpm icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: icoutils-0.31.3-1.el7_3.src.rpm x86_64: icoutils-0.31.3-1.el7_3.x86_64.rpm icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: icoutils-0.31.3-1.el7_3.src.rpm aarch64: icoutils-0.31.3-1.el7_3.aarch64.rpm icoutils-debuginfo-0.31.3-1.el7_3.aarch64.rpm ppc64le: icoutils-0.31.3-1.el7_3.ppc64le.rpm icoutils-debuginfo-0.31.3-1.el7_3.ppc64le.rpm x86_64: icoutils-0.31.3-1.el7_3.x86_64.rpm icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: icoutils-0.31.3-1.el7_3.src.rpm ppc64: icoutils-0.31.3-1.el7_3.ppc64.rpm icoutils-debuginfo-0.31.3-1.el7_3.ppc64.rpm s390x: icoutils-0.31.3-1.el7_3.s390x.rpm icoutils-debuginfo-0.31.3-1.el7_3.s390x.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: icoutils-0.31.3-1.el7_3.src.rpm x86_64: icoutils-0.31.3-1.el7_3.x86_64.rpm icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5208 https://access.redhat.com/security/cve/CVE-2017-5332 https://access.redhat.com/security/cve/CVE-2017-5333 https://access.redhat.com/security/cve/CVE-2017-6009 https://access.redhat.com/security/cve/CVE-2017-6010 https://access.redhat.com/security/cve/CVE-2017-6011 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY0yDrXlSAg2UNWIIRAnbpAJwKPfo+sG8Id1gt+QuN/L1FF8dzTACdGdS9 GWPQgSp4zotoovuN6hXlavE= =aSHi -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Mar 23 03:59:00 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 22 Mar 2017 23:59:00 -0400 Subject: [RHSA-2017:0838-01] Moderate: openjpeg security update Message-ID: <201703230359.v2N3x00C001593@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openjpeg security update Advisory ID: RHSA-2017:0838-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0838.html Issue date: 2017-03-23 CVE Names: CVE-2016-5139 CVE-2016-5158 CVE-2016-5159 CVE-2016-7163 CVE-2016-9573 CVE-2016-9675 ===================================================================== 1. Summary: An update for openjpeg is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in OpenJPEG. A specially crafted JPEG2000 image could cause an application using OpenJPEG to crash or, potentially, execute arbitrary code. (CVE-2016-5139, CVE-2016-5158, CVE-2016-5159, CVE-2016-7163) * An out-of-bounds read vulnerability was found in OpenJPEG, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap. (CVE-2016-9573) * A heap-based buffer overflow vulnerability was found in OpenJPEG. A specially crafted JPEG2000 image, when read by an application using OpenJPEG, could cause the application to crash or, potentially, execute arbitrary code. (CVE-2016-9675) Red Hat would like to thank Liu Bingchang (IIE) for reporting CVE-2016-9573. The CVE-2016-9675 issue was discovered by Doran Moppert (Red Hat Product Security). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications using OpenJPEG must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1363982 - CVE-2016-5139 chromium-browser, openjpeg: Heap overflow in parsing of JPEG2000 precincts 1372219 - CVE-2016-5158 chromium-browser, openjpeg: heap overflow due to unsafe use of opj_aligned_malloc 1372220 - CVE-2016-5159 chromium-browser, openjpeg: heap overflow in parsing of JPEG2000 code blocks 1374329 - CVE-2016-7163 openjpeg: Integer overflow in opj_pi_create_decode 1382202 - CVE-2016-9675 openjpeg: incorrect fix for CVE-2013-6045 1402711 - CVE-2016-9573 openjpeg: heap out-of-bounds read due to insufficient check in imagetopnm() 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: openjpeg-1.5.1-16.el7_3.src.rpm x86_64: openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-libs-1.5.1-16.el7_3.i686.rpm openjpeg-libs-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openjpeg-1.5.1-16.el7_3.x86_64.rpm openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-devel-1.5.1-16.el7_3.i686.rpm openjpeg-devel-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openjpeg-1.5.1-16.el7_3.src.rpm x86_64: openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-libs-1.5.1-16.el7_3.i686.rpm openjpeg-libs-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openjpeg-1.5.1-16.el7_3.x86_64.rpm openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-devel-1.5.1-16.el7_3.i686.rpm openjpeg-devel-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openjpeg-1.5.1-16.el7_3.src.rpm aarch64: openjpeg-debuginfo-1.5.1-16.el7_3.aarch64.rpm openjpeg-libs-1.5.1-16.el7_3.aarch64.rpm ppc64: openjpeg-debuginfo-1.5.1-16.el7_3.ppc.rpm openjpeg-debuginfo-1.5.1-16.el7_3.ppc64.rpm openjpeg-libs-1.5.1-16.el7_3.ppc.rpm openjpeg-libs-1.5.1-16.el7_3.ppc64.rpm ppc64le: openjpeg-debuginfo-1.5.1-16.el7_3.ppc64le.rpm openjpeg-libs-1.5.1-16.el7_3.ppc64le.rpm s390x: openjpeg-debuginfo-1.5.1-16.el7_3.s390.rpm openjpeg-debuginfo-1.5.1-16.el7_3.s390x.rpm openjpeg-libs-1.5.1-16.el7_3.s390.rpm openjpeg-libs-1.5.1-16.el7_3.s390x.rpm x86_64: openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-libs-1.5.1-16.el7_3.i686.rpm openjpeg-libs-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: openjpeg-1.5.1-16.el7_3.aarch64.rpm openjpeg-debuginfo-1.5.1-16.el7_3.aarch64.rpm openjpeg-devel-1.5.1-16.el7_3.aarch64.rpm ppc64: openjpeg-1.5.1-16.el7_3.ppc64.rpm openjpeg-debuginfo-1.5.1-16.el7_3.ppc.rpm openjpeg-debuginfo-1.5.1-16.el7_3.ppc64.rpm openjpeg-devel-1.5.1-16.el7_3.ppc.rpm openjpeg-devel-1.5.1-16.el7_3.ppc64.rpm ppc64le: openjpeg-1.5.1-16.el7_3.ppc64le.rpm openjpeg-debuginfo-1.5.1-16.el7_3.ppc64le.rpm openjpeg-devel-1.5.1-16.el7_3.ppc64le.rpm s390x: openjpeg-1.5.1-16.el7_3.s390x.rpm openjpeg-debuginfo-1.5.1-16.el7_3.s390.rpm openjpeg-debuginfo-1.5.1-16.el7_3.s390x.rpm openjpeg-devel-1.5.1-16.el7_3.s390.rpm openjpeg-devel-1.5.1-16.el7_3.s390x.rpm x86_64: openjpeg-1.5.1-16.el7_3.x86_64.rpm openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-devel-1.5.1-16.el7_3.i686.rpm openjpeg-devel-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openjpeg-1.5.1-16.el7_3.src.rpm x86_64: openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-libs-1.5.1-16.el7_3.i686.rpm openjpeg-libs-1.5.1-16.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openjpeg-1.5.1-16.el7_3.x86_64.rpm openjpeg-debuginfo-1.5.1-16.el7_3.i686.rpm openjpeg-debuginfo-1.5.1-16.el7_3.x86_64.rpm openjpeg-devel-1.5.1-16.el7_3.i686.rpm openjpeg-devel-1.5.1-16.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5139 https://access.redhat.com/security/cve/CVE-2016-5158 https://access.redhat.com/security/cve/CVE-2016-5159 https://access.redhat.com/security/cve/CVE-2016-7163 https://access.redhat.com/security/cve/CVE-2016-9573 https://access.redhat.com/security/cve/CVE-2016-9675 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY00f4XlSAg2UNWIIRAnUwAKCpfNH1c09qPSz4/4zxnUu7sEdo1QCgmV2N zWY7Jr1dIKbY/F2Kmqk9TM8= =hxup -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Mar 29 06:36:02 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 29 Mar 2017 02:36:02 -0400 Subject: [RHSA-2017:0847-01] Moderate: curl security update Message-ID: <201703290636.v2T6a25P028059@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: curl security update Advisory ID: RHSA-2017:0847-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0847.html Issue date: 2017-03-29 CVE Names: CVE-2017-2628 ===================================================================== 1. Summary: An update for curl is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. (CVE-2017-2628) This issue was discovered by Paulo Andrade (Red Hat). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1422464 - CVE-2017-2628 curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: curl-7.19.7-53.el6_9.src.rpm i386: curl-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.i686.rpm x86_64: curl-7.19.7-53.el6_9.x86_64.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.x86_64.rpm libcurl-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: curl-debuginfo-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm x86_64: curl-debuginfo-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.x86_64.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: curl-7.19.7-53.el6_9.src.rpm x86_64: curl-7.19.7-53.el6_9.x86_64.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.x86_64.rpm libcurl-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: curl-debuginfo-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.x86_64.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: curl-7.19.7-53.el6_9.src.rpm i386: curl-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm ppc64: curl-7.19.7-53.el6_9.ppc64.rpm curl-debuginfo-7.19.7-53.el6_9.ppc.rpm curl-debuginfo-7.19.7-53.el6_9.ppc64.rpm libcurl-7.19.7-53.el6_9.ppc.rpm libcurl-7.19.7-53.el6_9.ppc64.rpm libcurl-devel-7.19.7-53.el6_9.ppc.rpm libcurl-devel-7.19.7-53.el6_9.ppc64.rpm s390x: curl-7.19.7-53.el6_9.s390x.rpm curl-debuginfo-7.19.7-53.el6_9.s390.rpm curl-debuginfo-7.19.7-53.el6_9.s390x.rpm libcurl-7.19.7-53.el6_9.s390.rpm libcurl-7.19.7-53.el6_9.s390x.rpm libcurl-devel-7.19.7-53.el6_9.s390.rpm libcurl-devel-7.19.7-53.el6_9.s390x.rpm x86_64: curl-7.19.7-53.el6_9.x86_64.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.x86_64.rpm libcurl-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.x86_64.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: curl-7.19.7-53.el6_9.src.rpm i386: curl-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm x86_64: curl-7.19.7-53.el6_9.x86_64.rpm curl-debuginfo-7.19.7-53.el6_9.i686.rpm curl-debuginfo-7.19.7-53.el6_9.x86_64.rpm libcurl-7.19.7-53.el6_9.i686.rpm libcurl-7.19.7-53.el6_9.x86_64.rpm libcurl-devel-7.19.7-53.el6_9.i686.rpm libcurl-devel-7.19.7-53.el6_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2628 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY21W9XlSAg2UNWIIRApj6AJ9nT1BuFnhp2R5OaDLZizlZdvhdxACdGdBw 1szPVbtexMFml1W3PV83tcY= =Ef6U -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Mar 31 10:33:44 2017 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 31 Mar 2017 10:33:44 +0000 Subject: [RHSA-2017:0860-01] Critical: chromium-browser security update Message-ID: <201703311033.v2VAXoDM005201@lists01.pubmisc.prod.ext.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: chromium-browser security update Advisory ID: RHSA-2017:0860-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2017:0860 Issue date: 2017-03-31 CVE Names: CVE-2017-5052 CVE-2017-5053 CVE-2017-5054 CVE-2017-5055 CVE-2017-5056 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 57.0.2987.133. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5055, CVE-2017-5052, CVE-2017-5053, CVE-2017-5054, CVE-2017-5056) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1437348 - CVE-2017-5055 chromium-browser: use after free in printing 1437350 - CVE-2017-5054 chromium-browser: heap buffer overflow in v8 1437351 - CVE-2017-5052 chromium-browser: bad cast in blink 1437352 - CVE-2017-5056 chromium-browser: use after free in blink 1437353 - CVE-2017-5053 chromium-browser: out of bounds memory access in v8 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-57.0.2987.133-1.el6_9.i686.rpm chromium-browser-debuginfo-57.0.2987.133-1.el6_9.i686.rpm x86_64: chromium-browser-57.0.2987.133-1.el6_9.x86_64.rpm chromium-browser-debuginfo-57.0.2987.133-1.el6_9.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-57.0.2987.133-1.el6_9.i686.rpm chromium-browser-debuginfo-57.0.2987.133-1.el6_9.i686.rpm x86_64: chromium-browser-57.0.2987.133-1.el6_9.x86_64.rpm chromium-browser-debuginfo-57.0.2987.133-1.el6_9.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-57.0.2987.133-1.el6_9.i686.rpm chromium-browser-debuginfo-57.0.2987.133-1.el6_9.i686.rpm x86_64: chromium-browser-57.0.2987.133-1.el6_9.x86_64.rpm chromium-browser-debuginfo-57.0.2987.133-1.el6_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5052 https://access.redhat.com/security/cve/CVE-2017-5053 https://access.redhat.com/security/cve/CVE-2017-5054 https://access.redhat.com/security/cve/CVE-2017-5055 https://access.redhat.com/security/cve/CVE-2017-5056 https://access.redhat.com/security/updates/classification/#critical https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY3jBmXlSAg2UNWIIRAqx8AKCwU72uHgmJfIhJCYFdsUb8bXRVawCglJru xTtkj1O9HKUJ+VDadY8qRGM= =QWt/ -----END PGP SIGNATURE-----