Red Hat 8845 Published by

Red Hat has released the following updates for Red Hat Enterprise Linux: [RHSA-2012:1346-01] Critical: flash-plugin security update, [RHSA-2012:1347-01] Important: kernel security and bug fix update, [RHSA-2012:1351-01] Critical: thunderbird security update, [RHSA-2012:1350-01] Critical: firefox security and bug fix update, [RHSA-2012:1359-01] Moderate: libvirt security and bug fix update, [RHSA-2012:1364-01] Important: bind97 security update, [RHSA-2012:1363-01] Important: bind security update, [RHSA-2012:1361-01] Critical: xulrunner security update, [RHSA-2012:1362-01] Critical: thunderbird security update, and [RHSA-2012:1365-01] Important: bind security update



[RHSA-2012:1346-01] Critical: flash-plugin security update
=====================================================================
Red Hat Security Advisory

Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2012:1346-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1346.html
Issue date: 2012-10-09
CVE Names: CVE-2012-5248 CVE-2012-5249 CVE-2012-5250
CVE-2012-5251 CVE-2012-5252 CVE-2012-5253
CVE-2012-5254 CVE-2012-5255 CVE-2012-5256
CVE-2012-5257 CVE-2012-5258 CVE-2012-5259
CVE-2012-5260 CVE-2012-5261 CVE-2012-5262
CVE-2012-5263 CVE-2012-5264 CVE-2012-5265
CVE-2012-5266 CVE-2012-5267 CVE-2012-5268
CVE-2012-5269 CVE-2012-5270 CVE-2012-5271
CVE-2012-5272
=====================================================================

1. Summary:

An updated Adobe Flash Player package that fixes several security issues is
now available for Red Hat Enterprise Linux 5 and 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

This update fixes several vulnerabilities in Adobe Flash Player. These
vulnerabilities are detailed on the Adobe security page APSB12-22, listed
in the References section. Specially-crafted SWF content could cause
flash-plugin to crash or, potentially, execute arbitrary code when a victim
loads a page containing the malicious SWF content. (CVE-2012-5248,
CVE-2012-5249, CVE-2012-5250, CVE-2012-5251, CVE-2012-5252, CVE-2012-5253,
CVE-2012-5254, CVE-2012-5255, CVE-2012-5256, CVE-2012-5257, CVE-2012-5258,
CVE-2012-5259, CVE-2012-5260, CVE-2012-5261, CVE-2012-5262, CVE-2012-5263,
CVE-2012-5264, CVE-2012-5265, CVE-2012-5266, CVE-2012-5267, CVE-2012-5268,
CVE-2012-5269, CVE-2012-5270, CVE-2012-5271, CVE-2012-5272)

All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.243.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

864284 - flash-plugin: multiple code-execution flaws (APSB12-22)

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 5):

i386:
flash-plugin-11.2.202.243-1.el5.i386.rpm

x86_64:
flash-plugin-11.2.202.243-1.el5.i386.rpm

Red Hat Enterprise Linux Server Supplementary (v. 5):

i386:
flash-plugin-11.2.202.243-1.el5.i386.rpm

x86_64:
flash-plugin-11.2.202.243-1.el5.i386.rpm

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
flash-plugin-11.2.202.243-1.el6.i686.rpm

x86_64:
flash-plugin-11.2.202.243-1.el6.i686.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
flash-plugin-11.2.202.243-1.el6.i686.rpm

x86_64:
flash-plugin-11.2.202.243-1.el6.i686.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
flash-plugin-11.2.202.243-1.el6.i686.rpm

x86_64:
flash-plugin-11.2.202.243-1.el6.i686.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-5248.html
https://www.redhat.com/security/data/cve/CVE-2012-5249.html
https://www.redhat.com/security/data/cve/CVE-2012-5250.html
https://www.redhat.com/security/data/cve/CVE-2012-5251.html
https://www.redhat.com/security/data/cve/CVE-2012-5252.html
https://www.redhat.com/security/data/cve/CVE-2012-5253.html
https://www.redhat.com/security/data/cve/CVE-2012-5254.html
https://www.redhat.com/security/data/cve/CVE-2012-5255.html
https://www.redhat.com/security/data/cve/CVE-2012-5256.html
https://www.redhat.com/security/data/cve/CVE-2012-5257.html
https://www.redhat.com/security/data/cve/CVE-2012-5258.html
https://www.redhat.com/security/data/cve/CVE-2012-5259.html
https://www.redhat.com/security/data/cve/CVE-2012-5260.html
https://www.redhat.com/security/data/cve/CVE-2012-5261.html
https://www.redhat.com/security/data/cve/CVE-2012-5262.html
https://www.redhat.com/security/data/cve/CVE-2012-5263.html
https://www.redhat.com/security/data/cve/CVE-2012-5264.html
https://www.redhat.com/security/data/cve/CVE-2012-5265.html
https://www.redhat.com/security/data/cve/CVE-2012-5266.html
https://www.redhat.com/security/data/cve/CVE-2012-5267.html
https://www.redhat.com/security/data/cve/CVE-2012-5268.html
https://www.redhat.com/security/data/cve/CVE-2012-5269.html
https://www.redhat.com/security/data/cve/CVE-2012-5270.html
https://www.redhat.com/security/data/cve/CVE-2012-5271.html
https://www.redhat.com/security/data/cve/CVE-2012-5272.html
https://access.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb12-22.html

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1347-01] Important: kernel security and bug fix update

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2012:1347-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1347.html
Issue date: 2012-10-09
CVE Names: CVE-2012-2319 CVE-2012-3412
=====================================================================

1. Summary:

Updated kernel packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A flaw was found in the way socket buffers (skb) requiring TSO (TCP
segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

* A buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS Plus (HFS+) file system implementation in the Linux kernel. A local
user able to mount a specially-crafted HFS+ file system image could use
this flaw to cause a denial of service or escalate their privileges.
(CVE-2012-2319, Low)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412.

This update also fixes the following bug:

* Some subsystems clear the TIF_SIGPENDING flag during error handling in
fork() paths. Previously, if the flag was cleared, the ERESTARTNOINTR error
code could be returned. The underlying source code has been modified so
that the error code is no longer returned. (BZ#855754)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

5. Bugs fixed (http://bugzilla.redhat.com/):

819471 - CVE-2012-2319 kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

6. Package List:

Red Hat Enterprise Linux EUS (v. 5.6 server):

Source:
kernel-2.6.18-238.45.1.el5.src.rpm

i386:
kernel-2.6.18-238.45.1.el5.i686.rpm
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-238.45.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm
kernel-debug-2.6.18-238.45.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-238.45.1.el5.i686.rpm
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm
kernel-debuginfo-2.6.18-238.45.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-238.45.1.el5.i686.rpm
kernel-devel-2.6.18-238.45.1.el5.i686.rpm
kernel-headers-2.6.18-238.45.1.el5.i386.rpm
kernel-xen-2.6.18-238.45.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-238.45.1.el5.i686.rpm
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm

ia64:
kernel-2.6.18-238.45.1.el5.ia64.rpm
kernel-debug-2.6.18-238.45.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-238.45.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-238.45.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-238.45.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-238.45.1.el5.ia64.rpm
kernel-devel-2.6.18-238.45.1.el5.ia64.rpm
kernel-headers-2.6.18-238.45.1.el5.ia64.rpm
kernel-xen-2.6.18-238.45.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-238.45.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-238.45.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm

ppc:
kernel-2.6.18-238.45.1.el5.ppc64.rpm
kernel-debug-2.6.18-238.45.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-238.45.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-238.45.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-238.45.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-238.45.1.el5.ppc64.rpm
kernel-devel-2.6.18-238.45.1.el5.ppc64.rpm
kernel-headers-2.6.18-238.45.1.el5.ppc.rpm
kernel-headers-2.6.18-238.45.1.el5.ppc64.rpm
kernel-kdump-2.6.18-238.45.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-238.45.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-238.45.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-238.45.1.el5.s390x.rpm
kernel-debug-2.6.18-238.45.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-238.45.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-238.45.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-238.45.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-238.45.1.el5.s390x.rpm
kernel-devel-2.6.18-238.45.1.el5.s390x.rpm
kernel-headers-2.6.18-238.45.1.el5.s390x.rpm
kernel-kdump-2.6.18-238.45.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-238.45.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-238.45.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-238.45.1.el5.x86_64.rpm
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-238.45.1.el5.x86_64.rpm
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-2319.html
https://www.redhat.com/security/data/cve/CVE-2012-3412.html
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1351-01] Critical: thunderbird security update
=====================================================================
Red Hat Security Advisory

Synopsis: Critical: thunderbird security update
Advisory ID: RHSA-2012:1351-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1351.html
Issue date: 2012-10-09
CVE Names: CVE-2012-1956 CVE-2012-3982 CVE-2012-3986
CVE-2012-3988 CVE-2012-3990 CVE-2012-3991
CVE-2012-3992 CVE-2012-3993 CVE-2012-3994
CVE-2012-3995 CVE-2012-4179 CVE-2012-4180
CVE-2012-4181 CVE-2012-4182 CVE-2012-4183
CVE-2012-4184 CVE-2012-4185 CVE-2012-4186
CVE-2012-4187 CVE-2012-4188
=====================================================================

1. Summary:

An updated thunderbird package that fixes several security issues is now
available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

Several flaws were found in the processing of malformed content. Malicious
content could cause Thunderbird to crash or, potentially, execute arbitrary
code with the privileges of the user running Thunderbird. (CVE-2012-3982,
CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,
CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,
CVE-2012-4187, CVE-2012-4188)

Two flaws in Thunderbird could allow malicious content to bypass intended
restrictions, possibly leading to information disclosure, or Thunderbird
executing arbitrary code. Note that the information disclosure issue could
possibly be combined with other flaws to achieve arbitrary code execution.
(CVE-2012-3986, CVE-2012-3991)

Multiple flaws were found in the location object implementation in
Thunderbird. Malicious content could be used to perform cross-site
scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,
CVE-2012-3992, CVE-2012-3994)

Two flaws were found in the way Chrome Object Wrappers were implemented.
Malicious content could be used to perform cross-site scripting attacks or
cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,
miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,
moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these
issues.

Note: None of the issues in this advisory can be exploited by a
specially-crafted HTML mail message as JavaScript is disabled by default
for mail messages. They could be exploited another way in Thunderbird, for
example, when viewing the full remote content of an RSS feed.

All Thunderbird users should upgrade to this updated package, which
contains Thunderbird version 10.0.8 ESR, which corrects these issues. After
installing the update, Thunderbird must be restarted for the changes to
take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

851912 - CVE-2012-1956 Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59)
863614 - CVE-2012-3982 Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74)
863618 - CVE-2012-3986 Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77)
863619 - CVE-2012-3988 Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79)
863621 - CVE-2012-3991 Mozilla: GetProperty function can bypass security checks (MFSA 2012-81)
863622 - CVE-2012-3994 Mozilla: top object and location property accessible by plugins (MFSA 2012-82)
863623 - CVE-2012-3993 CVE-2012-4184 Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83)
863624 - CVE-2012-3992 Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84)
863625 - CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85)
863626 - CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
863628 - CVE-2012-3990 Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-10.0.8-1.el5_8.src.rpm

i386:
thunderbird-10.0.8-1.el5_8.i386.rpm
thunderbird-debuginfo-10.0.8-1.el5_8.i386.rpm

x86_64:
thunderbird-10.0.8-1.el5_8.x86_64.rpm
thunderbird-debuginfo-10.0.8-1.el5_8.x86_64.rpm

RHEL Optional Productivity Applications (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-10.0.8-1.el5_8.src.rpm

i386:
thunderbird-10.0.8-1.el5_8.i386.rpm
thunderbird-debuginfo-10.0.8-1.el5_8.i386.rpm

x86_64:
thunderbird-10.0.8-1.el5_8.x86_64.rpm
thunderbird-debuginfo-10.0.8-1.el5_8.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-10.0.8-1.el6_3.src.rpm

i386:
thunderbird-10.0.8-1.el6_3.i686.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm

x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-10.0.8-1.el6_3.src.rpm

i386:
thunderbird-10.0.8-1.el6_3.i686.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm

ppc64:
thunderbird-10.0.8-1.el6_3.ppc64.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.ppc64.rpm

s390x:
thunderbird-10.0.8-1.el6_3.s390x.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.s390x.rpm

x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-10.0.8-1.el6_3.src.rpm

i386:
thunderbird-10.0.8-1.el6_3.i686.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.i686.rpm

x86_64:
thunderbird-10.0.8-1.el6_3.x86_64.rpm
thunderbird-debuginfo-10.0.8-1.el6_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-1956.html
https://www.redhat.com/security/data/cve/CVE-2012-3982.html
https://www.redhat.com/security/data/cve/CVE-2012-3986.html
https://www.redhat.com/security/data/cve/CVE-2012-3988.html
https://www.redhat.com/security/data/cve/CVE-2012-3990.html
https://www.redhat.com/security/data/cve/CVE-2012-3991.html
https://www.redhat.com/security/data/cve/CVE-2012-3992.html
https://www.redhat.com/security/data/cve/CVE-2012-3993.html
https://www.redhat.com/security/data/cve/CVE-2012-3994.html
https://www.redhat.com/security/data/cve/CVE-2012-3995.html
https://www.redhat.com/security/data/cve/CVE-2012-4179.html
https://www.redhat.com/security/data/cve/CVE-2012-4180.html
https://www.redhat.com/security/data/cve/CVE-2012-4181.html
https://www.redhat.com/security/data/cve/CVE-2012-4182.html
https://www.redhat.com/security/data/cve/CVE-2012-4183.html
https://www.redhat.com/security/data/cve/CVE-2012-4184.html
https://www.redhat.com/security/data/cve/CVE-2012-4185.html
https://www.redhat.com/security/data/cve/CVE-2012-4186.html
https://www.redhat.com/security/data/cve/CVE-2012-4187.html
https://www.redhat.com/security/data/cve/CVE-2012-4188.html
https://access.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1350-01] Critical: firefox security and bug fix update
=====================================================================
Red Hat Security Advisory

Synopsis: Critical: firefox security and bug fix update
Advisory ID: RHSA-2012:1350-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1350.html
Issue date: 2012-10-09
CVE Names: CVE-2012-1956 CVE-2012-3982 CVE-2012-3986
CVE-2012-3988 CVE-2012-3990 CVE-2012-3991
CVE-2012-3992 CVE-2012-3993 CVE-2012-3994
CVE-2012-3995 CVE-2012-4179 CVE-2012-4180
CVE-2012-4181 CVE-2012-4182 CVE-2012-4183
CVE-2012-4184 CVE-2012-4185 CVE-2012-4186
CVE-2012-4187 CVE-2012-4188
=====================================================================

1. Summary:

Updated firefox packages that fix several security issues and one bug are
now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

Mozilla Firefox is an open source web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,
CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,
CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)

Two flaws in Firefox could allow a malicious website to bypass intended
restrictions, possibly leading to information disclosure, or Firefox
executing arbitrary code. Note that the information disclosure issue could
possibly be combined with other flaws to achieve arbitrary code execution.
(CVE-2012-3986, CVE-2012-3991)

Multiple flaws were found in the location object implementation in Firefox.
Malicious content could be used to perform cross-site scripting attacks,
script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,
CVE-2012-3994)

Two flaws were found in the way Chrome Object Wrappers were implemented.
Malicious content could be used to perform cross-site scripting attacks or
cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla
advisories in the References section of this erratum.

Red Hat would like to thank the Mozilla project for reporting these issues.
Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,
miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,
moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these
issues.

This update also fixes the following bug:

* In certain environments, storing personal Firefox configuration files
(~/.mozilla/) on an NFS share, such as when your home directory is on a
NFS share, led to Firefox functioning incorrectly, for example, navigation
buttons not working as expected, and bookmarks not saving. This update
adds a new configuration option, storage.nfs_filesystem, that can be used
to resolve this issue.

If you experience this issue:

1) Start Firefox.

2) Type "about:config" (without quotes) into the URL bar and press the
Enter key.

3) If prompted with "This might void your warranty!", click the "I'll be
careful, I promise!" button.

4) Right-click in the Preference Name list. In the menu that opens, select
New -> Boolean.

5) Type "storage.nfs_filesystem" (without quotes) for the preference name
and then click the OK button.

6) Select "true" for the boolean value and then press the OK button.
(BZ#809571, BZ#816234)

All Firefox users should upgrade to these updated packages, which contain
Firefox version 10.0.8 ESR, which corrects these issues. After installing
the update, Firefox must be restarted for the changes to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

851912 - CVE-2012-1956 Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59)
863614 - CVE-2012-3982 Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74)
863618 - CVE-2012-3986 Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77)
863619 - CVE-2012-3988 Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79)
863621 - CVE-2012-3991 Mozilla: GetProperty function can bypass security checks (MFSA 2012-81)
863622 - CVE-2012-3994 Mozilla: top object and location property accessible by plugins (MFSA 2012-82)
863623 - CVE-2012-3993 CVE-2012-4184 Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83)
863624 - CVE-2012-3992 Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84)
863625 - CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85)
863626 - CVE-2012-4185 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
863628 - CVE-2012-3990 Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-10.0.8-1.el5_8.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-10.0.8-1.el5_8.src.rpm

i386:
firefox-10.0.8-1.el5_8.i386.rpm
firefox-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-10.0.8-1.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.i386.rpm

x86_64:
firefox-10.0.8-1.el5_8.i386.rpm
firefox-10.0.8-1.el5_8.x86_64.rpm
firefox-debuginfo-10.0.8-1.el5_8.i386.rpm
firefox-debuginfo-10.0.8-1.el5_8.x86_64.rpm
xulrunner-10.0.8-1.el5_8.i386.rpm
xulrunner-10.0.8-1.el5_8.x86_64.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-10.0.8-1.el5_8.src.rpm

i386:
xulrunner-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-devel-10.0.8-1.el5_8.i386.rpm

x86_64:
xulrunner-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.x86_64.rpm
xulrunner-devel-10.0.8-1.el5_8.i386.rpm
xulrunner-devel-10.0.8-1.el5_8.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-10.0.8-1.el5_8.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-10.0.8-1.el5_8.src.rpm

i386:
firefox-10.0.8-1.el5_8.i386.rpm
firefox-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-10.0.8-1.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-devel-10.0.8-1.el5_8.i386.rpm

ia64:
firefox-10.0.8-1.el5_8.ia64.rpm
firefox-debuginfo-10.0.8-1.el5_8.ia64.rpm
xulrunner-10.0.8-1.el5_8.ia64.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.ia64.rpm
xulrunner-devel-10.0.8-1.el5_8.ia64.rpm

ppc:
firefox-10.0.8-1.el5_8.ppc.rpm
firefox-debuginfo-10.0.8-1.el5_8.ppc.rpm
xulrunner-10.0.8-1.el5_8.ppc.rpm
xulrunner-10.0.8-1.el5_8.ppc64.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.ppc.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.ppc64.rpm
xulrunner-devel-10.0.8-1.el5_8.ppc.rpm
xulrunner-devel-10.0.8-1.el5_8.ppc64.rpm

s390x:
firefox-10.0.8-1.el5_8.s390.rpm
firefox-10.0.8-1.el5_8.s390x.rpm
firefox-debuginfo-10.0.8-1.el5_8.s390.rpm
firefox-debuginfo-10.0.8-1.el5_8.s390x.rpm
xulrunner-10.0.8-1.el5_8.s390.rpm
xulrunner-10.0.8-1.el5_8.s390x.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.s390.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.s390x.rpm
xulrunner-devel-10.0.8-1.el5_8.s390.rpm
xulrunner-devel-10.0.8-1.el5_8.s390x.rpm

x86_64:
firefox-10.0.8-1.el5_8.i386.rpm
firefox-10.0.8-1.el5_8.x86_64.rpm
firefox-debuginfo-10.0.8-1.el5_8.i386.rpm
firefox-debuginfo-10.0.8-1.el5_8.x86_64.rpm
xulrunner-10.0.8-1.el5_8.i386.rpm
xulrunner-10.0.8-1.el5_8.x86_64.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-1.el5_8.x86_64.rpm
xulrunner-devel-10.0.8-1.el5_8.i386.rpm
xulrunner-devel-10.0.8-1.el5_8.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/firefox-10.0.8-1.el6_3.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

i386:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm

x86_64:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-10.0.8-1.el6_3.x86_64.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

i386:
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm

x86_64:
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/firefox-10.0.8-1.el6_3.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

x86_64:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-10.0.8-1.el6_3.x86_64.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/firefox-10.0.8-1.el6_3.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

i386:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm

ppc64:
firefox-10.0.8-1.el6_3.ppc.rpm
firefox-10.0.8-1.el6_3.ppc64.rpm
firefox-debuginfo-10.0.8-1.el6_3.ppc.rpm
firefox-debuginfo-10.0.8-1.el6_3.ppc64.rpm
xulrunner-10.0.8-1.el6_3.ppc.rpm
xulrunner-10.0.8-1.el6_3.ppc64.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.ppc.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.ppc64.rpm

s390x:
firefox-10.0.8-1.el6_3.s390.rpm
firefox-10.0.8-1.el6_3.s390x.rpm
firefox-debuginfo-10.0.8-1.el6_3.s390.rpm
firefox-debuginfo-10.0.8-1.el6_3.s390x.rpm
xulrunner-10.0.8-1.el6_3.s390.rpm
xulrunner-10.0.8-1.el6_3.s390x.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.s390.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.s390x.rpm

x86_64:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-10.0.8-1.el6_3.x86_64.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

i386:
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm

ppc64:
xulrunner-debuginfo-10.0.8-1.el6_3.ppc.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.ppc64.rpm
xulrunner-devel-10.0.8-1.el6_3.ppc.rpm
xulrunner-devel-10.0.8-1.el6_3.ppc64.rpm

s390x:
xulrunner-debuginfo-10.0.8-1.el6_3.s390.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.s390x.rpm
xulrunner-devel-10.0.8-1.el6_3.s390.rpm
xulrunner-devel-10.0.8-1.el6_3.s390x.rpm

x86_64:
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/firefox-10.0.8-1.el6_3.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

i386:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm

x86_64:
firefox-10.0.8-1.el6_3.i686.rpm
firefox-10.0.8-1.el6_3.x86_64.rpm
firefox-debuginfo-10.0.8-1.el6_3.i686.rpm
firefox-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-10.0.8-1.el6_3.i686.rpm
xulrunner-10.0.8-1.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-10.0.8-1.el6_3.src.rpm

i386:
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm

x86_64:
xulrunner-debuginfo-10.0.8-1.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-1.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-1.el6_3.i686.rpm
xulrunner-devel-10.0.8-1.el6_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-1956.html
https://www.redhat.com/security/data/cve/CVE-2012-3982.html
https://www.redhat.com/security/data/cve/CVE-2012-3986.html
https://www.redhat.com/security/data/cve/CVE-2012-3988.html
https://www.redhat.com/security/data/cve/CVE-2012-3990.html
https://www.redhat.com/security/data/cve/CVE-2012-3991.html
https://www.redhat.com/security/data/cve/CVE-2012-3992.html
https://www.redhat.com/security/data/cve/CVE-2012-3993.html
https://www.redhat.com/security/data/cve/CVE-2012-3994.html
https://www.redhat.com/security/data/cve/CVE-2012-3995.html
https://www.redhat.com/security/data/cve/CVE-2012-4179.html
https://www.redhat.com/security/data/cve/CVE-2012-4180.html
https://www.redhat.com/security/data/cve/CVE-2012-4181.html
https://www.redhat.com/security/data/cve/CVE-2012-4182.html
https://www.redhat.com/security/data/cve/CVE-2012-4183.html
https://www.redhat.com/security/data/cve/CVE-2012-4184.html
https://www.redhat.com/security/data/cve/CVE-2012-4185.html
https://www.redhat.com/security/data/cve/CVE-2012-4186.html
https://www.redhat.com/security/data/cve/CVE-2012-4187.html
https://www.redhat.com/security/data/cve/CVE-2012-4188.html
https://access.redhat.com/security/updates/classification/#critical
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1359-01] Moderate: libvirt security and bug fix update
=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: libvirt security and bug fix update
Advisory ID: RHSA-2012:1359-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1359.html
Issue date: 2012-10-11
CVE Names: CVE-2012-4423
=====================================================================

1. Summary:

Updated libvirt packages that fix one security issue and multiple bugs are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64

3. Description:

The libvirt library is a C API for managing and interacting with the
virtualization capabilities of Linux and other operating systems. In
addition, libvirt provides tools for remote management of virtualized
systems.

A flaw was found in libvirtd's RPC call handling. An attacker able to
establish a read-only connection to libvirtd could use this flaw to crash
libvirtd by sending an RPC message that has an event as the RPC number, or
an RPC number that falls into a gap in the RPC dispatch table.
(CVE-2012-4423)

This issue was discovered by Wenlong Huang of the Red Hat Virtualization QE
Team.

This update also fixes the following bugs:

* When the host_uuid option was present in the libvirtd.conf file, the
augeas libvirt lens was unable to parse the file. This bug has been fixed
and the augeas libvirt lens now parses libvirtd.conf as expected in the
described scenario. (BZ#858988)

* Disk hot plug is a two-part action: the qemuMonitorAddDrive() call is
followed by the qemuMonitorAddDevice() call. When the first part succeeded
but the second one failed, libvirt failed to roll back the first part and
the device remained in use even though the disk hot plug failed. With this
update, the rollback for the drive addition is properly performed in the
described scenario and disk hot plug now works as expected. (BZ#859376)

* When a virtual machine was started with an image chain using block
devices and a block rebase operation was issued, the operation failed on
completion in the blockJobAbort() function. This update relabels and
configures cgroups for the backing files and the rebase operation now
succeeds. (BZ#860720)

All users of libvirt are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, libvirtd will be restarted automatically.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

857133 - CVE-2012-4423 libvirt: null function pointer invocation in virNetServerProgramDispatchCall()
858988 - The libvirt augeas lens can't parse a libvirtd.conf file where host_uuid is present
859376 - after failed hotplug qemu keeps the file descriptor open
860720 - Relabel and configure cgroups for the backing files on VIR_DOMAIN_BLOCK_JOB_ABORT_PIVOT

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

i386:
libvirt-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-python-0.9.10-21.el6_3.5.i686.rpm

x86_64:
libvirt-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-python-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

i386:
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm

x86_64:
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-lock-sanlock-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

x86_64:
libvirt-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-python-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

x86_64:
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-lock-sanlock-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

i386:
libvirt-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm
libvirt-python-0.9.10-21.el6_3.5.i686.rpm

ppc64:
libvirt-0.9.10-21.el6_3.5.ppc64.rpm
libvirt-client-0.9.10-21.el6_3.5.ppc.rpm
libvirt-client-0.9.10-21.el6_3.5.ppc64.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.ppc.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.ppc64.rpm
libvirt-devel-0.9.10-21.el6_3.5.ppc.rpm
libvirt-devel-0.9.10-21.el6_3.5.ppc64.rpm
libvirt-python-0.9.10-21.el6_3.5.ppc64.rpm

s390x:
libvirt-0.9.10-21.el6_3.5.s390x.rpm
libvirt-client-0.9.10-21.el6_3.5.s390.rpm
libvirt-client-0.9.10-21.el6_3.5.s390x.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.s390.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.s390x.rpm
libvirt-devel-0.9.10-21.el6_3.5.s390.rpm
libvirt-devel-0.9.10-21.el6_3.5.s390x.rpm
libvirt-python-0.9.10-21.el6_3.5.s390x.rpm

x86_64:
libvirt-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-python-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

x86_64:
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-lock-sanlock-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

i386:
libvirt-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm
libvirt-python-0.9.10-21.el6_3.5.i686.rpm

x86_64:
libvirt-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-client-0.9.10-21.el6_3.5.i686.rpm
libvirt-client-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.i686.rpm
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-devel-0.9.10-21.el6_3.5.i686.rpm
libvirt-devel-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-python-0.9.10-21.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libvirt-0.9.10-21.el6_3.5.src.rpm

x86_64:
libvirt-debuginfo-0.9.10-21.el6_3.5.x86_64.rpm
libvirt-lock-sanlock-0.9.10-21.el6_3.5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-4423.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1364-01] Important: bind97 security update
=====================================================================
Red Hat Security Advisory

Synopsis: Important: bind97 security update
Advisory ID: RHSA-2012:1364-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1364.html
Issue date: 2012-10-12
CVE Names: CVE-2012-5166
=====================================================================

1. Summary:

Updated bind97 packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Description:

The Berkeley Internet Name Domain (BIND) is an implementation of the
Domain Name System (DNS) protocols. BIND includes a DNS server (named); a
resolver library (routines for applications to use when interfacing with
DNS); and tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handled certain combinations of resource
records. A remote attacker could use this flaw to cause a recursive
resolver, or an authoritative server in certain configurations, to lockup.
(CVE-2012-5166)

Users of bind97 are advised to upgrade to these updated packages, which
correct this issue. After installing the update, the BIND daemon (named)
will be restarted automatically.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

864273 - CVE-2012-5166 bind: Specially crafted DNS data can cause a lockup in named

6. Package List:

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind97-9.7.0-10.P2.el5_8.4.src.rpm

i386:
bind97-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.i386.rpm

x86_64:
bind97-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind97-9.7.0-10.P2.el5_8.4.src.rpm

i386:
bind97-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.i386.rpm

ia64:
bind97-9.7.0-10.P2.el5_8.4.ia64.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.ia64.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.ia64.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.ia64.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.ia64.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.ia64.rpm

ppc:
bind97-9.7.0-10.P2.el5_8.4.ppc.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.ppc.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.ppc.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.ppc64.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.ppc.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.ppc64.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.ppc.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.ppc64.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.ppc.rpm

s390x:
bind97-9.7.0-10.P2.el5_8.4.s390x.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.s390x.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.s390.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.s390x.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.s390.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.s390x.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.s390.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.s390x.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.s390x.rpm

x86_64:
bind97-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-chroot-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-debuginfo-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-devel-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.i386.rpm
bind97-libs-9.7.0-10.P2.el5_8.4.x86_64.rpm
bind97-utils-9.7.0-10.P2.el5_8.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-5166.html
https://access.redhat.com/security/updates/classification/#important
http://www.isc.org/software/bind/advisories/cve-2012-5166

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1363-01] Important: bind security update
=====================================================================
Red Hat Security Advisory

Synopsis: Important: bind security update
Advisory ID: RHSA-2012:1363-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1363.html
Issue date: 2012-10-12
CVE Names: CVE-2012-5166
=====================================================================

1. Summary:

Updated bind packages that fix one security issue are now available for
Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The Berkeley Internet Name Domain (BIND) is an implementation of the
Domain Name System (DNS) protocols. BIND includes a DNS server (named); a
resolver library (routines for applications to use when interfacing with
DNS); and tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handled certain combinations of resource
records. A remote attacker could use this flaw to cause a recursive
resolver, or an authoritative server in certain configurations, to lockup.
(CVE-2012-5166)

Users of bind are advised to upgrade to these updated packages, which
correct this issue. After installing the update, the BIND daemon (named)
will be restarted automatically.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

864273 - CVE-2012-5166 bind: Specially crafted DNS data can cause a lockup in named

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-20.P1.el5_8.5.src.rpm

i386:
bind-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libs-9.3.6-20.P1.el5_8.5.i386.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.i386.rpm
bind-utils-9.3.6-20.P1.el5_8.5.i386.rpm

x86_64:
bind-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-libs-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libs-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-utils-9.3.6-20.P1.el5_8.5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-20.P1.el5_8.5.src.rpm

i386:
bind-chroot-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.i386.rpm

x86_64:
bind-chroot-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-devel-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.x86_64.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind-9.3.6-20.P1.el5_8.5.src.rpm

i386:
bind-9.3.6-20.P1.el5_8.5.i386.rpm
bind-chroot-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libs-9.3.6-20.P1.el5_8.5.i386.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.i386.rpm
bind-utils-9.3.6-20.P1.el5_8.5.i386.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.i386.rpm

ia64:
bind-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-chroot-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-devel-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-libs-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libs-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.ia64.rpm
bind-utils-9.3.6-20.P1.el5_8.5.ia64.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.ia64.rpm

ppc:
bind-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-chroot-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.ppc64.rpm
bind-devel-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-devel-9.3.6-20.P1.el5_8.5.ppc64.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.ppc64.rpm
bind-libs-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-libs-9.3.6-20.P1.el5_8.5.ppc64.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.ppc.rpm
bind-utils-9.3.6-20.P1.el5_8.5.ppc.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.ppc.rpm

s390x:
bind-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-chroot-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.s390.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-devel-9.3.6-20.P1.el5_8.5.s390.rpm
bind-devel-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.s390.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-libs-9.3.6-20.P1.el5_8.5.s390.rpm
bind-libs-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.s390x.rpm
bind-utils-9.3.6-20.P1.el5_8.5.s390x.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.s390x.rpm

x86_64:
bind-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-chroot-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.i386.rpm
bind-debuginfo-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-devel-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libbind-devel-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-libs-9.3.6-20.P1.el5_8.5.i386.rpm
bind-libs-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-sdb-9.3.6-20.P1.el5_8.5.x86_64.rpm
bind-utils-9.3.6-20.P1.el5_8.5.x86_64.rpm
caching-nameserver-9.3.6-20.P1.el5_8.5.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

i386:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.i686.rpm

x86_64:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

i386:
bind-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.i686.rpm

x86_64:
bind-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

x86_64:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

x86_64:
bind-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

i386:
bind-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.i686.rpm

ppc64:
bind-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.ppc.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.ppc.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm

s390x:
bind-9.8.2-0.10.rc1.el6_3.5.s390x.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.s390x.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.s390.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.s390x.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.s390.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.s390x.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.s390x.rpm

x86_64:
bind-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

i386:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.i686.rpm

ppc64:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.ppc.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.ppc.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.ppc64.rpm

s390x:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.s390.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.s390x.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.s390.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.s390x.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.s390x.rpm

x86_64:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

i386:
bind-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.i686.rpm

x86_64:
bind-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/bind-9.8.2-0.10.rc1.el6_3.5.src.rpm

i386:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.i686.rpm

x86_64:
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-5166.html
https://access.redhat.com/security/updates/classification/#important
http://www.isc.org/software/bind/advisories/cve-2012-5166

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1361-01] Critical: xulrunner security update
=====================================================================
Red Hat Security Advisory

Synopsis: Critical: xulrunner security update
Advisory ID: RHSA-2012:1361-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1361.html
Issue date: 2012-10-12
CVE Names: CVE-2012-4193
=====================================================================

1. Summary:

Updated xulrunner packages that fix one security issue are now available
for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.

A flaw was found in the way XULRunner handled security wrappers. A web page
containing malicious content could possibly cause an application linked
against XULRunner (such as Mozilla Firefox) to execute arbitrary code with
the privileges of the user running the application. (CVE-2012-4193)

For technical details regarding this flaw, refer to the Mozilla security
advisories. You can find a link to the Mozilla advisories in the References
section of this erratum.

Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges moz_bug_r_a4 as the original reporter.

All XULRunner users should upgrade to these updated packages, which correct
this issue. After installing the update, applications using XULRunner must
be restarted for the changes to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

865215 - CVE-2012-4193 Mozilla: defaultValue security checks not applied (MFSA 2012-89)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-10.0.8-2.el5_8.src.rpm

i386:
xulrunner-10.0.8-2.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.i386.rpm

x86_64:
xulrunner-10.0.8-2.el5_8.i386.rpm
xulrunner-10.0.8-2.el5_8.x86_64.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-10.0.8-2.el5_8.src.rpm

i386:
xulrunner-debuginfo-10.0.8-2.el5_8.i386.rpm
xulrunner-devel-10.0.8-2.el5_8.i386.rpm

x86_64:
xulrunner-debuginfo-10.0.8-2.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.x86_64.rpm
xulrunner-devel-10.0.8-2.el5_8.i386.rpm
xulrunner-devel-10.0.8-2.el5_8.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-10.0.8-2.el5_8.src.rpm

i386:
xulrunner-10.0.8-2.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.i386.rpm
xulrunner-devel-10.0.8-2.el5_8.i386.rpm

ia64:
xulrunner-10.0.8-2.el5_8.ia64.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.ia64.rpm
xulrunner-devel-10.0.8-2.el5_8.ia64.rpm

ppc:
xulrunner-10.0.8-2.el5_8.ppc.rpm
xulrunner-10.0.8-2.el5_8.ppc64.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.ppc.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.ppc64.rpm
xulrunner-devel-10.0.8-2.el5_8.ppc.rpm
xulrunner-devel-10.0.8-2.el5_8.ppc64.rpm

s390x:
xulrunner-10.0.8-2.el5_8.s390.rpm
xulrunner-10.0.8-2.el5_8.s390x.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.s390.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.s390x.rpm
xulrunner-devel-10.0.8-2.el5_8.s390.rpm
xulrunner-devel-10.0.8-2.el5_8.s390x.rpm

x86_64:
xulrunner-10.0.8-2.el5_8.i386.rpm
xulrunner-10.0.8-2.el5_8.x86_64.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.i386.rpm
xulrunner-debuginfo-10.0.8-2.el5_8.x86_64.rpm
xulrunner-devel-10.0.8-2.el5_8.i386.rpm
xulrunner-devel-10.0.8-2.el5_8.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

i386:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm

x86_64:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-10.0.8-2.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

i386:
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm

x86_64:
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

x86_64:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-10.0.8-2.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

i386:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm

ppc64:
xulrunner-10.0.8-2.el6_3.ppc.rpm
xulrunner-10.0.8-2.el6_3.ppc64.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.ppc.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.ppc64.rpm

s390x:
xulrunner-10.0.8-2.el6_3.s390.rpm
xulrunner-10.0.8-2.el6_3.s390x.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.s390.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.s390x.rpm

x86_64:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-10.0.8-2.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

i386:
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm

ppc64:
xulrunner-debuginfo-10.0.8-2.el6_3.ppc.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.ppc64.rpm
xulrunner-devel-10.0.8-2.el6_3.ppc.rpm
xulrunner-devel-10.0.8-2.el6_3.ppc64.rpm

s390x:
xulrunner-debuginfo-10.0.8-2.el6_3.s390.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.s390x.rpm
xulrunner-devel-10.0.8-2.el6_3.s390.rpm
xulrunner-devel-10.0.8-2.el6_3.s390x.rpm

x86_64:
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

i386:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm

x86_64:
xulrunner-10.0.8-2.el6_3.i686.rpm
xulrunner-10.0.8-2.el6_3.x86_64.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xulrunner-10.0.8-2.el6_3.src.rpm

i386:
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm

x86_64:
xulrunner-debuginfo-10.0.8-2.el6_3.i686.rpm
xulrunner-debuginfo-10.0.8-2.el6_3.x86_64.rpm
xulrunner-devel-10.0.8-2.el6_3.i686.rpm
xulrunner-devel-10.0.8-2.el6_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-4193.html
https://access.redhat.com/security/updates/classification/#critical
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1362-01] Critical: thunderbird security update
=====================================================================
Red Hat Security Advisory

Synopsis: Critical: thunderbird security update
Advisory ID: RHSA-2012:1362-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1362.html
Issue date: 2012-10-12
CVE Names: CVE-2012-4193
=====================================================================

1. Summary:

An updated thunderbird package that fixes one security issue is now
available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

A flaw was found in the way Thunderbird handled security wrappers.
Malicious content could cause Thunderbird to execute arbitrary code with
the privileges of the user running Thunderbird. (CVE-2012-4193)

Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges moz_bug_r_a4 as the original reporter.

Note: This issue cannot be exploited by a specially-crafted HTML mail
message as JavaScript is disabled by default for mail messages. It could be
exploited another way in Thunderbird, for example, when viewing the full
remote content of an RSS feed.

All Thunderbird users should upgrade to this updated package, which
corrects this issue. After installing the update, Thunderbird must be
restarted for the changes to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

865215 - CVE-2012-4193 Mozilla: defaultValue security checks not applied (MFSA 2012-89)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/thunderbird-10.0.8-2.el5_8.src.rpm

i386:
thunderbird-10.0.8-2.el5_8.i386.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.i386.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.i386.rpm

x86_64:
thunderbird-10.0.8-2.el5_8.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.x86_64.rpm

RHEL Optional Productivity Applications (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-10.0.8-2.el5_8.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/thunderbird-10.0.8-2.el5_8.src.rpm

i386:
thunderbird-10.0.8-2.el5_8.i386.rpm
thunderbird-10.0.8-2.el5_8.i386.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.i386.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.i386.rpm

x86_64:
thunderbird-10.0.8-2.el5_8.x86_64.rpm
thunderbird-10.0.8-2.el5_8.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el5_8.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/thunderbird-10.0.8-2.el6_3.src.rpm

i386:
thunderbird-10.0.8-2.el6_3.i686.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.i686.rpm

x86_64:
thunderbird-10.0.8-2.el6_3.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/thunderbird-10.0.8-2.el6_3.src.rpm

i386:
thunderbird-10.0.8-2.el6_3.i686.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.i686.rpm

ppc64:
thunderbird-10.0.8-2.el6_3.ppc64.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.ppc64.rpm

s390x:
thunderbird-10.0.8-2.el6_3.s390x.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.s390x.rpm

x86_64:
thunderbird-10.0.8-2.el6_3.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/thunderbird-10.0.8-2.el6_3.src.rpm

i386:
thunderbird-10.0.8-2.el6_3.i686.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.i686.rpm

x86_64:
thunderbird-10.0.8-2.el6_3.x86_64.rpm
thunderbird-debuginfo-10.0.8-2.el6_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-4193.html
https://access.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
[RHSA-2012:1365-01] Important: bind security update
=====================================================================
Red Hat Security Advisory

Synopsis: Important: bind security update
Advisory ID: RHSA-2012:1365-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1365.html
Issue date: 2012-10-12
CVE Names: CVE-2012-4244 CVE-2012-5166
=====================================================================

1. Summary:

Updated bind packages that fix two security issues are now available for
Red Hat Enterprise Linux 4 Extended Life Cycle Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (v. 4 ELS) - i386, ia64, x86_64
Red Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64

3. Description:

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handled resource records with a large
RDATA value. A malicious owner of a DNS domain could use this flaw to
create specially-crafted DNS resource records, that would cause a recursive
resolver or secondary server to exit unexpectedly with an assertion
failure. (CVE-2012-4244)

A flaw was found in the way BIND handled certain combinations of resource
records. A remote attacker could use this flaw to cause a recursive
resolver, or an authoritative server in certain configurations, to lockup.
(CVE-2012-5166)

Users of bind are advised to upgrade to these updated packages, which
correct these issues. After installing the update, the BIND daemon (named)
will be restarted automatically.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

856754 - CVE-2012-4244 bind: specially crafted resource record causes named to exit
864273 - CVE-2012-5166 bind: Specially crafted DNS data can cause a lockup in named

6. Package List:

Red Hat Enterprise Linux AS (v. 4 ELS):

Source:
bind-9.2.4-41.el4.src.rpm

i386:
bind-9.2.4-41.el4.i386.rpm
bind-chroot-9.2.4-41.el4.i386.rpm
bind-debuginfo-9.2.4-41.el4.i386.rpm
bind-devel-9.2.4-41.el4.i386.rpm
bind-libs-9.2.4-41.el4.i386.rpm
bind-utils-9.2.4-41.el4.i386.rpm

ia64:
bind-9.2.4-41.el4.ia64.rpm
bind-chroot-9.2.4-41.el4.ia64.rpm
bind-debuginfo-9.2.4-41.el4.i386.rpm
bind-debuginfo-9.2.4-41.el4.ia64.rpm
bind-devel-9.2.4-41.el4.ia64.rpm
bind-libs-9.2.4-41.el4.i386.rpm
bind-libs-9.2.4-41.el4.ia64.rpm
bind-utils-9.2.4-41.el4.ia64.rpm

x86_64:
bind-9.2.4-41.el4.x86_64.rpm
bind-chroot-9.2.4-41.el4.x86_64.rpm
bind-debuginfo-9.2.4-41.el4.i386.rpm
bind-debuginfo-9.2.4-41.el4.x86_64.rpm
bind-devel-9.2.4-41.el4.x86_64.rpm
bind-libs-9.2.4-41.el4.i386.rpm
bind-libs-9.2.4-41.el4.x86_64.rpm
bind-utils-9.2.4-41.el4.x86_64.rpm

Red Hat Enterprise Linux ES (v. 4 ELS):

Source:
bind-9.2.4-41.el4.src.rpm

i386:
bind-9.2.4-41.el4.i386.rpm
bind-chroot-9.2.4-41.el4.i386.rpm
bind-debuginfo-9.2.4-41.el4.i386.rpm
bind-devel-9.2.4-41.el4.i386.rpm
bind-libs-9.2.4-41.el4.i386.rpm
bind-utils-9.2.4-41.el4.i386.rpm

x86_64:
bind-9.2.4-41.el4.x86_64.rpm
bind-chroot-9.2.4-41.el4.x86_64.rpm
bind-debuginfo-9.2.4-41.el4.i386.rpm
bind-debuginfo-9.2.4-41.el4.x86_64.rpm
bind-devel-9.2.4-41.el4.x86_64.rpm
bind-libs-9.2.4-41.el4.i386.rpm
bind-libs-9.2.4-41.el4.x86_64.rpm
bind-utils-9.2.4-41.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-4244.html
https://www.redhat.com/security/data/cve/CVE-2012-5166.html
https://access.redhat.com/security/updates/classification/#important
http://www.isc.org/software/bind/advisories/cve-2012-4244
http://www.isc.org/software/bind/advisories/cve-2012-5166

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/