3 RHEL Security Updates
Posted on: 07/06/2011 11:10 AM

The following three updates are available for Redhat Enterprise Linux: [RHSA-2011:0919-01] Important: qemu-kvm security and bug fix update, [RHSA-2011:0918-01] Moderate: curl security update, and [RHSA-2011:0920-01] Important: krb5-appl security update

[RHSA-2011:0919-01] Important: qemu-kvm security and bug fix update
=====================================================================
Red Hat Security Advisory

Synopsis: Important: qemu-kvm security and bug fix update
Advisory ID: RHSA-2011:0919-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0919.html
Issue date: 2011-07-05
CVE Names: CVE-2011-2212 CVE-2011-2512
=====================================================================

1. Summary:

Updated qemu-kvm packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Enterprise Linux Workstation (v. 6) - x86_64

3. Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
for running virtual machines using KVM.

It was found that the virtio subsystem in qemu-kvm did not properly
validate virtqueue in and out requests from the guest. A privileged guest
user could use this flaw to trigger a buffer overflow, allowing them to
crash the guest (denial of service) or, possibly, escalate their privileges
on the host. (CVE-2011-2212)

It was found that the virtio_queue_notify() function in qemu-kvm did not
perform sufficient input validation on the value later used as an index
into the array of virtqueues. An unprivileged guest user could use this
flaw to crash the guest (denial of service) or, possibly, escalate their
privileges on the host. (CVE-2011-2512)

Red Hat would like to thank Nelson Elhage for reporting CVE-2011-2212.

This update also fixes the following bug:

* A bug was found in the way vhost (in qemu-kvm) set up mappings with the
host kernel's vhost module. This could result in the host kernel's vhost
module not having a complete view of a guest system's memory, if that guest
had more than 4 GB of memory. Consequently, hot plugging a vhost-net
network device and restarting the guest may have resulted in that device no
longer working. (BZ#701771)

All users of qemu-kvm should upgrade to these updated packages, which
contain backported patches to resolve these issues. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

713589 - CVE-2011-2212 qemu-kvm: virtqueue: too-large indirect descriptor buffer overflow
717399 - CVE-2011-2512 qemu-kvm: OOB memory access caused by negative vq notifies

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpm

x86_64:
qemu-img-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-debuginfo-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.160.el6_1.2.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpm

x86_64:
qemu-img-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-debuginfo-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.160.el6_1.2.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpm

x86_64:
qemu-img-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-debuginfo-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.160.el6_1.2.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpm

x86_64:
qemu-img-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-debuginfo-0.12.1.2-2.160.el6_1.2.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.160.el6_1.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-2212.html
https://www.redhat.com/security/data/cve/CVE-2011-2512.html
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.

[RHSA-2011:0918-01] Moderate: curl security update
=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: curl security update
Advisory ID: RHSA-2011:0918-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0918.html
Issue date: 2011-07-05
CVE Names: CVE-2011-2192
=====================================================================

1. Summary:

Updated curl packages that fix one security issue are now available for Red
Hat Enterprise Linux 4, 5, and 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64

3. Description:

cURL provides the libcurl library and a command line tool for downloading
files from servers using various protocols, including HTTP, FTP, and LDAP.

It was found that cURL always performed credential delegation when
authenticating with GSSAPI. A rogue server could use this flaw to obtain
the client's credentials and impersonate that client to other servers that
are using GSSAPI. (CVE-2011-2192)

Users of curl should upgrade to these updated packages, which contain a
backported patch to correct this issue. All running applications using
libcurl must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

711454 - CVE-2011-2192 curl: Improper delegation of client credentials during GSS negotiation

6. Package List:

Red Hat Enterprise Linux AS version 4:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm

i386:
curl-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-devel-7.12.1-17.el4.i386.rpm

ia64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.ia64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.ia64.rpm
curl-devel-7.12.1-17.el4.ia64.rpm

ppc:
curl-7.12.1-17.el4.ppc.rpm
curl-7.12.1-17.el4.ppc64.rpm
curl-debuginfo-7.12.1-17.el4.ppc.rpm
curl-debuginfo-7.12.1-17.el4.ppc64.rpm
curl-devel-7.12.1-17.el4.ppc.rpm

s390:
curl-7.12.1-17.el4.s390.rpm
curl-debuginfo-7.12.1-17.el4.s390.rpm
curl-devel-7.12.1-17.el4.s390.rpm

s390x:
curl-7.12.1-17.el4.s390.rpm
curl-7.12.1-17.el4.s390x.rpm
curl-debuginfo-7.12.1-17.el4.s390.rpm
curl-debuginfo-7.12.1-17.el4.s390x.rpm
curl-devel-7.12.1-17.el4.s390x.rpm

x86_64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.x86_64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.x86_64.rpm
curl-devel-7.12.1-17.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm

i386:
curl-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-devel-7.12.1-17.el4.i386.rpm

x86_64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.x86_64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.x86_64.rpm
curl-devel-7.12.1-17.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm

i386:
curl-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-devel-7.12.1-17.el4.i386.rpm

ia64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.ia64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.ia64.rpm
curl-devel-7.12.1-17.el4.ia64.rpm

x86_64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.x86_64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.x86_64.rpm
curl-devel-7.12.1-17.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm

i386:
curl-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-devel-7.12.1-17.el4.i386.rpm

ia64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.ia64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.ia64.rpm
curl-devel-7.12.1-17.el4.ia64.rpm

x86_64:
curl-7.12.1-17.el4.i386.rpm
curl-7.12.1-17.el4.x86_64.rpm
curl-debuginfo-7.12.1-17.el4.i386.rpm
curl-debuginfo-7.12.1-17.el4.x86_64.rpm
curl-devel-7.12.1-17.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm

i386:
curl-7.15.5-9.el5_6.3.i386.rpm
curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm

x86_64:
curl-7.15.5-9.el5_6.3.i386.rpm
curl-7.15.5-9.el5_6.3.x86_64.rpm
curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm
curl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm

i386:
curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm
curl-devel-7.15.5-9.el5_6.3.i386.rpm

x86_64:
curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm
curl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm
curl-devel-7.15.5-9.el5_6.3.i386.rpm
curl-devel-7.15.5-9.el5_6.3.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm

i386:
curl-7.15.5-9.el5_6.3.i386.rpm
curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm
curl-devel-7.15.5-9.el5_6.3.i386.rpm

ia64:
curl-7.15.5-9.el5_6.3.ia64.rpm
curl-debuginfo-7.15.5-9.el5_6.3.ia64.rpm
curl-devel-7.15.5-9.el5_6.3.ia64.rpm

ppc:
curl-7.15.5-9.el5_6.3.ppc.rpm
curl-7.15.5-9.el5_6.3.ppc64.rpm
curl-debuginfo-7.15.5-9.el5_6.3.ppc.rpm
curl-debuginfo-7.15.5-9.el5_6.3.ppc64.rpm
curl-devel-7.15.5-9.el5_6.3.ppc.rpm
curl-devel-7.15.5-9.el5_6.3.ppc64.rpm

s390x:
curl-7.15.5-9.el5_6.3.s390.rpm
curl-7.15.5-9.el5_6.3.s390x.rpm
curl-debuginfo-7.15.5-9.el5_6.3.s390.rpm
curl-debuginfo-7.15.5-9.el5_6.3.s390x.rpm
curl-devel-7.15.5-9.el5_6.3.s390.rpm
curl-devel-7.15.5-9.el5_6.3.s390x.rpm

x86_64:
curl-7.15.5-9.el5_6.3.i386.rpm
curl-7.15.5-9.el5_6.3.x86_64.rpm
curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm
curl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm
curl-devel-7.15.5-9.el5_6.3.i386.rpm
curl-devel-7.15.5-9.el5_6.3.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm

i386:
curl-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm

x86_64:
curl-7.19.7-26.el6_1.1.x86_64.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm

i386:
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm

x86_64:
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm

x86_64:
curl-7.19.7-26.el6_1.1.x86_64.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm

x86_64:
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm

i386:
curl-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm

ppc64:
curl-7.19.7-26.el6_1.1.ppc64.rpm
curl-debuginfo-7.19.7-26.el6_1.1.ppc.rpm
curl-debuginfo-7.19.7-26.el6_1.1.ppc64.rpm
libcurl-7.19.7-26.el6_1.1.ppc.rpm
libcurl-7.19.7-26.el6_1.1.ppc64.rpm
libcurl-devel-7.19.7-26.el6_1.1.ppc.rpm
libcurl-devel-7.19.7-26.el6_1.1.ppc64.rpm

s390x:
curl-7.19.7-26.el6_1.1.s390x.rpm
curl-debuginfo-7.19.7-26.el6_1.1.s390.rpm
curl-debuginfo-7.19.7-26.el6_1.1.s390x.rpm
libcurl-7.19.7-26.el6_1.1.s390.rpm
libcurl-7.19.7-26.el6_1.1.s390x.rpm
libcurl-devel-7.19.7-26.el6_1.1.s390.rpm
libcurl-devel-7.19.7-26.el6_1.1.s390x.rpm

x86_64:
curl-7.19.7-26.el6_1.1.x86_64.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm

i386:
curl-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm

x86_64:
curl-7.19.7-26.el6_1.1.x86_64.rpm
curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm
curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-7.19.7-26.el6_1.1.i686.rpm
libcurl-7.19.7-26.el6_1.1.x86_64.rpm
libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-2192.html
https://access.redhat.com/security/updates/classification/#moderate
http://curl.haxx.se/docs/adv_20110623.html

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.

[RHSA-2011:0920-01] Important: krb5-appl security update

=====================================================================
Red Hat Security Advisory

Synopsis: Important: krb5-appl security update
Advisory ID: RHSA-2011:0920-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0920.html
Issue date: 2011-07-05
CVE Names: CVE-2011-1526
=====================================================================

1. Summary:

Updated krb5-appl packages that fix one security issue are now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64

3. Description:

The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and
rlogin clients and servers. While these have been replaced by tools such as
OpenSSH in most environments, they remain in use in others.

It was found that gssftp, a Kerberos-aware FTP server, did not properly
drop privileges. A remote FTP user could use this flaw to gain unauthorized
read or write access to files that are owned by the root group.
(CVE-2011-1526)

Red Hat would like to thank the MIT Kerberos project for reporting this
issue. Upstream acknowledges Tim Zingelman as the original reporter.

All krb5-appl users should upgrade to these updated packages, which contain
a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

711419 - CVE-2011-1526 krb5, krb5-appl: ftpd incorrect group privilege dropping (MITKRB5-SA-2011-005)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/krb5-appl-1.0.1-2.el6_1.1.src.rpm

i386:
krb5-appl-clients-1.0.1-2.el6_1.1.i686.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.i686.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.i686.rpm

x86_64:
krb5-appl-clients-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-appl-1.0.1-2.el6_1.1.src.rpm

x86_64:
krb5-appl-debuginfo-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/krb5-appl-1.0.1-2.el6_1.1.src.rpm

x86_64:
krb5-appl-clients-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/krb5-appl-1.0.1-2.el6_1.1.src.rpm

i386:
krb5-appl-clients-1.0.1-2.el6_1.1.i686.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.i686.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.i686.rpm

ppc64:
krb5-appl-clients-1.0.1-2.el6_1.1.ppc64.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.ppc64.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.ppc64.rpm

s390x:
krb5-appl-clients-1.0.1-2.el6_1.1.s390x.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.s390x.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.s390x.rpm

x86_64:
krb5-appl-clients-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/krb5-appl-1.0.1-2.el6_1.1.src.rpm

i386:
krb5-appl-clients-1.0.1-2.el6_1.1.i686.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.i686.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.i686.rpm

x86_64:
krb5-appl-clients-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-debuginfo-1.0.1-2.el6_1.1.x86_64.rpm
krb5-appl-servers-1.0.1-2.el6_1.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-1526.html
https://access.redhat.com/security/updates/classification/#important
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-005.txt

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.




Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/3_rhel_security_updates.html)