Date: Tue, 1 Jul 2014 10:02:40 -0500 Reply-To: Bonnie KingSender: Security Errata for Scientific Linux From: Bonnie King Subject: FASTBUGS for SL 6x i386, x86_64 now available Comments: To: scientific-linux-errata@fnal.gov In-Reply-To: <53A99B32.2040706@fnal.gov> MIME-Version: 1.0 The following FASTBUGS have been uploaded to i386: coreutils-8.4-31.el6_5.2.i686.rpm coreutils-libs-8.4-31.el6_5.2.i686.rpm gdb-7.2-60.el6_4.4.i686.rpm gdb-gdbserver-7.2-60.el6_4.4.i686.rpm gnupg2-2.0.14-8.el6.i686.rpm gnupg2-smime-2.0.14-8.el6.i686.rpm rsh-0.17-64.el6.i686.rpm rsh-server-0.17-64.el6.i686.rpm x86_64: coreutils-8.4-31.el6_5.2.x86_64.rpm coreutils-libs-8.4-31.el6_5.2.x86_64.rpm gdb-7.2-60.el6_4.4.x86_64.rpm gdb-gdbserver-7.2-60.el6_4.4.x86_64.rpm gnupg2-2.0.14-8.el6.x86_64.rpm gnupg2-smime-2.0.14-8.el6.x86_64.rpm rsh-0.17-64.el6.x86_64.rpm rsh-server-0.17-64.el6.x86_64.rpm Date: Tue, 8 Jul 2014 10:07:43 -0500 Reply-To: Bonnie King Sender: Security Errata for Scientific Linux From: Bonnie King Subject: FASTBUGS for SL 6x i386, x86_64 now available Comments: To: scientific-linux-errata@fnal.gov In-Reply-To: <53B2CD90.4050907@fnal.gov> MIME-Version: 1.0 The following FASTBUGS have been uploaded to i386: debugmode-9.03.40-2.el6_5.2.i686.rpm initscripts-9.03.40-2.el6_5.2.i686.rpm libvisual-0.4.0-10.el6.i686.rpm libvisual-devel-0.4.0-10.el6.i686.rpm nfs-utils-1.2.3-39.el6_5.3.i686.rpm system-config-firewall-1.2.27-7.1.el6.noarch.rpm system-config-firewall-base-1.2.27-7.1.el6.noarch.rpm system-config-firewall-tui-1.2.27-7.1.el6.noarch.rpm x86_64: debugmode-9.03.40-2.el6_5.2.x86_64.rpm initscripts-9.03.40-2.el6_5.2.x86_64.rpm libvisual-0.4.0-10.el6.i686.rpm libvisual-0.4.0-10.el6.x86_64.rpm libvisual-devel-0.4.0-10.el6.i686.rpm libvisual-devel-0.4.0-10.el6.x86_64.rpm nfs-utils-1.2.3-39.el6_5.3.x86_64.rpm system-config-firewall-1.2.27-7.1.el6.noarch.rpm system-config-firewall-base-1.2.27-7.1.el6.noarch.rpm system-config-firewall-tui-1.2.27-7.1.el6.noarch.rpm Date: Wed, 9 Jul 2014 10:48:30 -0500 Reply-To: Pat Riehecky Sender: Security Errata for Scientific Linux From: Pat Riehecky Subject: Now Available: Software Collections 1.1 for SL6 x86_64 MIME-Version: 1.0 The updated Software Collection Library 1.1 packages from upstream have been posted to SL6 x86_64's dedicated repo. This repo features updated software products with a shorter lifecycle than the base distribution. It includes: - Ruby 1.9.3 with Rails 3.2.8 - Ruby 2.0.0 with Rails 4.0 - Python 2.7 and 3.3 - PHP 5.4 and 5.5 - Perl 5.16.3 - Apache 2.4 - MySQL and MariaDB 5.5 - PostgreSQL 9.2 - MongoDB 2.4 With the following as Technology Preview: - Node.js 0.10 - Nginx 1.4.4 - Thermostat 1.0 The following supporting tools are provided: - V8 JavaScript engine 3.14 Please be sure to review the published documentation and upstream release notes. https://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/1/html/1.1_Release_Notes/ -- Pat Riehecky Scientific Linux developer Date: Wed, 9 Jul 2014 18:16:17 +0000 Reply-To: scientific-linux-users@listserv.fnal.gov Sender: Security Errata for Scientific Linux From: Pat Riehecky Subject: Security ERRATA Moderate: tomcat6 on SL6.x i386/srpm/x86_64 MIME-Version: 1.0 Synopsis: Moderate: tomcat6 security and bug fix update Advisory ID: SLSA-2014:0865-1 Issue Date: 2014-07-09 CVE Numbers: CVE-2014-0075 CVE-2014-0096 CVE-2014-0099 -- It was discovered that Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources. (CVE-2014-0075) It was found that Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a Tomcat server located behind a reverse proxy that processed the content length header correctly. (CVE-2014-0099) It was found that the org.apache.catalina.servlets.DefaultServlet implementation in Apache Tomcat allowed the definition of XML External Entities (XXEs) in provided XSLTs. A malicious application could use this to circumvent intended security restrictions to disclose sensitive information. (CVE-2014-0096) This update also fixes the following bugs: * The patch that resolved the CVE-2014-0050 issue contained redundant code. This update removes the redundant code. * The patch that resolved the CVE-2013-4322 issue contained an invalid check that triggered a java.io.EOFException while reading trailer headersfor chunked requests. This update fixes the check and the aforementioned exception is no longer triggered in the described scenario. Tomcat must be restarted for this update to take effect. -- SL6 x86_64 tomcat6-javadoc-6.0.24-72.el6_5.noarch.rpm tomcat6-6.0.24-72.el6_5.noarch.rpm tomcat6-webapps-6.0.24-72.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-72.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-72.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-72.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-72.el6_5.noarch.rpm tomcat6-lib-6.0.24-72.el6_5.noarch.rpm tomcat6-admin-webapps-6.0.24-72.el6_5.noarch.rpm i386 tomcat6-javadoc-6.0.24-72.el6_5.noarch.rpm tomcat6-6.0.24-72.el6_5.noarch.rpm tomcat6-webapps-6.0.24-72.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-72.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-72.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-72.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-72.el6_5.noarch.rpm tomcat6-lib-6.0.24-72.el6_5.noarch.rpm tomcat6-admin-webapps-6.0.24-72.el6_5.noarch.rpm srpm tomcat6-6.0.24-72.el6_5.src.rpm noarch tomcat6-6.0.24-72.el6_5.noarch.rpm tomcat6-admin-webapps-6.0.24-72.el6_5.noarch.rpm tomcat6-docs-webapp-6.0.24-72.el6_5.noarch.rpm tomcat6-el-2.1-api-6.0.24-72.el6_5.noarch.rpm tomcat6-javadoc-6.0.24-72.el6_5.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-72.el6_5.noarch.rpm tomcat6-lib-6.0.24-72.el6_5.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-72.el6_5.noarch.rpm tomcat6-webapps-6.0.24-72.el6_5.noarch.rpm - Scientific Linux Development Team