Date: Wed, 1 Oct 2008 13:29:51 -0500 Reply-To: Troy DawsonSender: Security Errata for Scientific Linux From: Troy Dawson Subject: FASTBUGS for SL 5.x i386/x86_64 Comments: To: "scientific-linux-errata@fnal.gov" The following FASTBUGS have been uploaded to i386: gnome-terminal-2.16.0-5.3.el5.i386.rpm cman-2.0.84-2.el5_2.1.i386.rpm cman-devel-2.0.84-2.el5_2.1.i386.rpm freeipmi-0.5.1-6.el5.i386.rpm freeipmi-bmc-watchdog-0.5.1-6.el5.i386.rpm freeipmi-devel-0.5.1-6.el5.i386.rpm freeipmi-ipmidetectd-0.5.1-6.el5.i386.rpm initscripts-8.45.19.1.EL-1.i386.rpm redhat-menus-6.7.8-3.el5.noarch.rpm stunnel-4.15-2.el5.1.i386.rpm x86_64: gnome-terminal-2.16.0-5.3.el5.x86_64.rpm cman-2.0.84-2.el5_2.1.x86_64.rpm cman-devel-2.0.84-2.el5_2.1.i386.rpm cman-devel-2.0.84-2.el5_2.1.x86_64.rpm freeipmi-0.5.1-6.el5.i386.rpm freeipmi-0.5.1-6.el5.x86_64.rpm freeipmi-bmc-watchdog-0.5.1-6.el5.x86_64.rpm freeipmi-devel-0.5.1-6.el5.i386.rpm freeipmi-devel-0.5.1-6.el5.x86_64.rpm freeipmi-ipmidetectd-0.5.1-6.el5.x86_64.rpm initscripts-8.45.19.1.EL-1.x86_64.rpm redhat-menus-6.7.8-3.el5.noarch.rpm stunnel-4.15-2.el5.1.x86_64.rpm -Connie Sieh -Troy Dawson Date: Wed, 1 Oct 2008 13:31:34 -0500 Reply-To: Troy Dawson Sender: Security Errata for Scientific Linux From: Troy Dawson Subject: FASTBUGS for SL 4.x i386/x86_64 Comments: To: "scientific-linux-errata@fnal.gov" The following FASTBUGS have been uploaded to i386: fence-1.32.63-1.el4_7.1.i686.rpm fence-debuginfo-1.32.63-1.el4_7.1.i686.rpm sos-1.7-6.1.el4_6.3.noarch.rpm traceroute-1.4a12-26.EL4.1.i386.rpm traceroute-debuginfo-1.4a12-26.EL4.1.i386.rpm x86_64: fence-1.32.63-1.el4_7.1.x86_64.rpm fence-debuginfo-1.32.63-1.el4_7.1.x86_64.rpm sos-1.7-6.1.el4_6.3.noarch.rpm traceroute-1.4a12-26.EL4.1.x86_64.rpm traceroute-debuginfo-1.4a12-26.EL4.1.x86_64.rpm -Connie Sieh -Troy Dawson Date: Wed, 1 Oct 2008 14:22:39 -0500 Reply-To: Troy Dawson Sender: Security Errata for Scientific Linux From: Troy Dawson Subject: Security ERRATA for xen on SL5.x i386/x86_64 Comments: To: "scientific-linux-errata@fnal.gov" Synopsis: Important: xen security and bug fix update Issue date: 2008-10-01 CVE Names: CVE-2008-1945 CVE-2008-1952 It was discovered that the hypervisor's para-virtualized framebuffer (PVFB) backend failed to validate the frontend's framebuffer description properly. This could allow a privileged user in the unprivileged domain (DomU) to cause a denial of service, or, possibly, elevate privileges to the privileged domain (Dom0). (CVE-2008-1952) A flaw was found in the QEMU block format auto-detection, when running fully-virtualized guests and using Qemu images written on removable media (USB storage, 3.5" disks). Privileged users of such fully-virtualized guests (DomU), with a raw-formatted disk image, were able to write a header to that disk image describing another format. This could allow such guests to read arbitrary files in their hypervisor's host (Dom0). (CVE-2008-1945) Additionally, the following bug is addressed in this update: * The qcow-create command terminated when invoked due to glibc bounds checking on the realpath() function. SL 5.x SRPMS: xen-3.0.3-64.el5_2.3.src.rpm i386: xen-3.0.3-64.el5_2.3.i386.rpm xen-devel-3.0.3-64.el5_2.3.i386.rpm xen-libs-3.0.3-64.el5_2.3.i386.rpm x86_64: xen-3.0.3-64.el5_2.3.x86_64.rpm xen-devel-3.0.3-64.el5_2.3.i386.rpm xen-devel-3.0.3-64.el5_2.3.x86_64.rpm xen-libs-3.0.3-64.el5_2.3.i386.rpm xen-libs-3.0.3-64.el5_2.3.x86_64.rpm -Connie Sieh -Troy Dawson