Date:         Tue, 7 Jul 2015 09:22:39 -0500
Reply-To:     Pat Riehecky 
Sender:       Security Errata for Scientific Linux
              
From:         Pat Riehecky 
Subject:      FASTBUGS for SL 6x i386, x86_64 now available
MIME-Version: 1.0
Message-ID:  <559BE0AF.3050002@fnal.gov>

The following FASTBUGS have been uploaded to



i386:
cairo-1.8.8-6.el6_6.i686.rpm
cairo-devel-1.8.8-6.el6_6.i686.rpm
clusterlib-3.0.12.1-68.el6_6.1.i686.rpm
clusterlib-devel-3.0.12.1-68.el6_6.1.i686.rpm
cman-3.0.12.1-68.el6_6.1.i686.rpm
dmidecode-2.12-5.el6_6.1.i686.rpm
gfs2-utils-3.0.12.1-68.el6_6.1.i686.rpm
kdebase-workspace-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-akonadi-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-devel-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-libs-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-python-applet-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-wallpapers-4.3.4-30.el6_6.noarch.rpm
kdm-4.3.4-30.el6_6.i686.rpm
ksysguardd-4.3.4-30.el6_6.i686.rpm
mysql-5.1.73-5.el6_6.i686.rpm
mysql-bench-5.1.73-5.el6_6.i686.rpm
mysql-devel-5.1.73-5.el6_6.i686.rpm
mysql-embedded-5.1.73-5.el6_6.i686.rpm
mysql-embedded-devel-5.1.73-5.el6_6.i686.rpm
mysql-libs-5.1.73-5.el6_6.i686.rpm
mysql-server-5.1.73-5.el6_6.i686.rpm
mysql-test-5.1.73-5.el6_6.i686.rpm
nfs-utils-lib-1.1.5-9.el6_6.i686.rpm
nfs-utils-lib-devel-1.1.5-9.el6_6.i686.rpm
oxygen-cursor-themes-4.3.4-30.el6_6.noarch.rpm
pki-ca-9.0.3-39.el6_6.noarch.rpm
pki-common-9.0.3-39.el6_6.noarch.rpm
pki-common-javadoc-9.0.3-39.el6_6.noarch.rpm
pki-java-tools-9.0.3-39.el6_6.noarch.rpm
pki-java-tools-javadoc-9.0.3-39.el6_6.noarch.rpm
pki-native-tools-9.0.3-39.el6_6.i686.rpm
pki-selinux-9.0.3-39.el6_6.noarch.rpm
pki-setup-9.0.3-39.el6_6.noarch.rpm
pki-silent-9.0.3-39.el6_6.noarch.rpm
pki-symkey-9.0.3-39.el6_6.i686.rpm
pki-util-9.0.3-39.el6_6.noarch.rpm
pki-util-javadoc-9.0.3-39.el6_6.noarch.rpm
resource-agents-3.9.5-12.el6_6.7.i686.rpm
selinux-policy-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-doc-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-minimum-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-mls-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-targeted-3.7.19-260.el6_6.5.noarch.rpm
tzdata-2015e-1.el6.noarch.rpm
tzdata-java-2015e-1.el6.noarch.rpm

x86_64:
cairo-1.8.8-6.el6_6.i686.rpm
cairo-1.8.8-6.el6_6.x86_64.rpm
cairo-devel-1.8.8-6.el6_6.i686.rpm
cairo-devel-1.8.8-6.el6_6.x86_64.rpm
clusterlib-3.0.12.1-68.el6_6.1.i686.rpm
clusterlib-3.0.12.1-68.el6_6.1.x86_64.rpm
clusterlib-devel-3.0.12.1-68.el6_6.1.i686.rpm
clusterlib-devel-3.0.12.1-68.el6_6.1.x86_64.rpm
cman-3.0.12.1-68.el6_6.1.x86_64.rpm
dmidecode-2.12-5.el6_6.1.x86_64.rpm
gfs2-utils-3.0.12.1-68.el6_6.1.x86_64.rpm
kdebase-workspace-4.3.4-30.el6_6.x86_64.rpm
kdebase-workspace-akonadi-4.3.4-30.el6_6.x86_64.rpm
kdebase-workspace-devel-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-devel-4.3.4-30.el6_6.x86_64.rpm
kdebase-workspace-libs-4.3.4-30.el6_6.i686.rpm
kdebase-workspace-libs-4.3.4-30.el6_6.x86_64.rpm
kdebase-workspace-python-applet-4.3.4-30.el6_6.x86_64.rpm
kdebase-workspace-wallpapers-4.3.4-30.el6_6.noarch.rpm
kdm-4.3.4-30.el6_6.x86_64.rpm
ksysguardd-4.3.4-30.el6_6.x86_64.rpm
mysql-5.1.73-5.el6_6.x86_64.rpm
mysql-bench-5.1.73-5.el6_6.x86_64.rpm
mysql-devel-5.1.73-5.el6_6.i686.rpm
mysql-devel-5.1.73-5.el6_6.x86_64.rpm
mysql-embedded-5.1.73-5.el6_6.i686.rpm
mysql-embedded-5.1.73-5.el6_6.x86_64.rpm
mysql-embedded-devel-5.1.73-5.el6_6.i686.rpm
mysql-embedded-devel-5.1.73-5.el6_6.x86_64.rpm
mysql-libs-5.1.73-5.el6_6.i686.rpm
mysql-libs-5.1.73-5.el6_6.x86_64.rpm
mysql-server-5.1.73-5.el6_6.x86_64.rpm
mysql-test-5.1.73-5.el6_6.x86_64.rpm
nfs-utils-lib-1.1.5-9.el6_6.i686.rpm
nfs-utils-lib-1.1.5-9.el6_6.x86_64.rpm
nfs-utils-lib-devel-1.1.5-9.el6_6.i686.rpm
nfs-utils-lib-devel-1.1.5-9.el6_6.x86_64.rpm
oxygen-cursor-themes-4.3.4-30.el6_6.noarch.rpm
pki-ca-9.0.3-39.el6_6.noarch.rpm
pki-common-9.0.3-39.el6_6.noarch.rpm
pki-common-javadoc-9.0.3-39.el6_6.noarch.rpm
pki-java-tools-9.0.3-39.el6_6.noarch.rpm
pki-java-tools-javadoc-9.0.3-39.el6_6.noarch.rpm
pki-native-tools-9.0.3-39.el6_6.x86_64.rpm
pki-selinux-9.0.3-39.el6_6.noarch.rpm
pki-setup-9.0.3-39.el6_6.noarch.rpm
pki-silent-9.0.3-39.el6_6.noarch.rpm
pki-symkey-9.0.3-39.el6_6.x86_64.rpm
pki-util-9.0.3-39.el6_6.noarch.rpm
pki-util-javadoc-9.0.3-39.el6_6.noarch.rpm
resource-agents-3.9.5-12.el6_6.7.x86_64.rpm
selinux-policy-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-doc-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-minimum-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-mls-3.7.19-260.el6_6.5.noarch.rpm
selinux-policy-targeted-3.7.19-260.el6_6.5.noarch.rpm
tzdata-2015e-1.el6.noarch.rpm
tzdata-java-2015e-1.el6.noarch.rpm
Date:         Tue, 7 Jul 2015 16:13:10 +0000
Reply-To:     scientific-linux-users@listserv.fnal.gov
Sender:       Security Errata for Scientific Linux
              
From:         Pat Riehecky 
Subject:      Security ERRATA Moderate: abrt on SL6.x i386/x86_64
MIME-Version: 1.0
Message-ID:  <20150707161310.14719.36748@slpackages.fnal.gov>

Synopsis:          Moderate: abrt security update
Advisory ID:       SLSA-2015:1210-1
Issue Date:        2015-07-07
CVE Numbers:       CVE-2015-3315
                   CVE-2015-3142
                   CVE-2015-1869
                   CVE-2015-1870
                   CVE-2015-3147
                   CVE-2015-3159
--

It was found that ABRT was vulnerable to multiple race condition and
symbolic link flaws. A local attacker could use these flaws to potentially
escalate their privileges on the system. (CVE-2015-3315)

It was discovered that the kernel-invoked coredump processor provided by
ABRT wrote core dumps to files owned by other system users. This could
result in information disclosure if an application crashed while its
current directory was a directory writable to by other users (such as
/tmp). (CVE-2015-3142)

It was discovered that the default event handling scripts installed by
ABRT did not handle symbolic links correctly. A local attacker with write
access to an ABRT problem directory could use this flaw to escalate their
privileges. (CVE-2015-1869)

It was found that the ABRT event scripts created a user-readable copy of
an sosreport file in ABRT problem directories, and included excerpts of
/var/log/messages selected by the user-controlled process name, leading to
an information disclosure. (CVE-2015-1870)

It was discovered that, when moving problem reports between certain
directories, abrt-handle-upload did not verify that the new problem
directory had appropriate permissions and did not contain symbolic links.
An attacker able to create a crafted problem report could use this flaw to
expose other parts of ABRT, or to overwrite arbitrary files on the system.
(CVE-2015-3147)

It was discovered that the abrt-action-install-debuginfo-to-abrt-cache
helper program did not properly filter the process environment before
invoking abrt-action-install-debuginfo. A local attacker could use this
flaw to escalate their privileges on the system. (CVE-2015-3159)
--

SL6
  x86_64
    abrt-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-addon-ccpp-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-addon-kerneloops-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-addon-python-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-cli-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-debuginfo-2.0.8-26.el6_6.1.i686.rpm
    abrt-debuginfo-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-desktop-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-gui-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-libs-2.0.8-26.el6_6.1.i686.rpm
    abrt-libs-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-tui-2.0.8-26.el6_6.1.x86_64.rpm
    libreport-2.0.9-21.el6_6.1.i686.rpm
    libreport-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-cli-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-compat-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-debuginfo-2.0.9-21.el6_6.1.i686.rpm
    libreport-debuginfo-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-gtk-2.0.9-21.el6_6.1.i686.rpm
    libreport-gtk-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-newt-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-plugin-kerneloops-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-plugin-logger-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-plugin-mailx-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-plugin-reportuploader-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-plugin-rhtsupport-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-python-2.0.9-21.el6_6.1.x86_64.rpm
    abrt-addon-vmcore-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-console-notification-2.0.8-26.el6_6.1.x86_64.rpm
    abrt-devel-2.0.8-26.el6_6.1.i686.rpm
    abrt-devel-2.0.8-26.el6_6.1.x86_64.rpm
    libreport-devel-2.0.9-21.el6_6.1.i686.rpm
    libreport-devel-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-filesystem-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-gtk-devel-2.0.9-21.el6_6.1.i686.rpm
    libreport-gtk-devel-2.0.9-21.el6_6.1.x86_64.rpm
    libreport-plugin-bugzilla-2.0.9-21.el6_6.1.x86_64.rpm
  i386
    abrt-2.0.8-26.el6_6.1.i686.rpm
    abrt-addon-ccpp-2.0.8-26.el6_6.1.i686.rpm
    abrt-addon-kerneloops-2.0.8-26.el6_6.1.i686.rpm
    abrt-addon-python-2.0.8-26.el6_6.1.i686.rpm
    abrt-cli-2.0.8-26.el6_6.1.i686.rpm
    abrt-debuginfo-2.0.8-26.el6_6.1.i686.rpm
    abrt-desktop-2.0.8-26.el6_6.1.i686.rpm
    abrt-gui-2.0.8-26.el6_6.1.i686.rpm
    abrt-libs-2.0.8-26.el6_6.1.i686.rpm
    abrt-tui-2.0.8-26.el6_6.1.i686.rpm
    libreport-2.0.9-21.el6_6.1.i686.rpm
    libreport-cli-2.0.9-21.el6_6.1.i686.rpm
    libreport-compat-2.0.9-21.el6_6.1.i686.rpm
    libreport-debuginfo-2.0.9-21.el6_6.1.i686.rpm
    libreport-gtk-2.0.9-21.el6_6.1.i686.rpm
    libreport-newt-2.0.9-21.el6_6.1.i686.rpm
    libreport-plugin-kerneloops-2.0.9-21.el6_6.1.i686.rpm
    libreport-plugin-logger-2.0.9-21.el6_6.1.i686.rpm
    libreport-plugin-mailx-2.0.9-21.el6_6.1.i686.rpm
    libreport-plugin-reportuploader-2.0.9-21.el6_6.1.i686.rpm
    libreport-plugin-rhtsupport-2.0.9-21.el6_6.1.i686.rpm
    libreport-python-2.0.9-21.el6_6.1.i686.rpm
    abrt-addon-vmcore-2.0.8-26.el6_6.1.i686.rpm
    abrt-console-notification-2.0.8-26.el6_6.1.i686.rpm
    abrt-devel-2.0.8-26.el6_6.1.i686.rpm
    libreport-devel-2.0.9-21.el6_6.1.i686.rpm
    libreport-filesystem-2.0.9-21.el6_6.1.i686.rpm
    libreport-gtk-devel-2.0.9-21.el6_6.1.i686.rpm
    libreport-plugin-bugzilla-2.0.9-21.el6_6.1.i686.rpm
  noarch
    abrt-python-2.0.8-26.el6_6.1.noarch.rpm

- Scientific Linux Development Team

SciLinux: CVE-2015-3315 Moderate: abrt SL6.x i386/x86_64

Moderate: abrt security update

Summary

Moderate: abrt security update



Security Fixes

Severity
Advisory ID: SLSA-2015:1210-1
Issued Date: : 2015-07-07
CVE Numbers: CVE-2015-3315
CVE-2015-3142
CVE-2015-1869