<?xml-stylesheet type="text/xsl" href="updateinfo.xsl"?>
<updates><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG000000006261</id><title>Enhancement: Krb5-Fermi-Addons</title><description /><release>Scientific Linux Fermi</release><issued date="2015-09-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i386" name="krb5-fermi-addons" release="1.slf6" src="krb5-fermi-addons-1.5-1.slf6.src.rpm" version="1.5"><filename>krb5-fermi-addons-1.5-1.slf6.i386.rpm</filename><sum type="sha256">e72165da6c4930a8b967c81a22ab20ee650b2d48074e0f25047c84bc505005a8</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG000000008632</id><title>Update Krb5.Conf To V5.1</title><description>None of the applications understand these lines, they are left from the Fermi Kerberos (modified code) days.   Now the OpenAFS aklog is called via scripts (distributed in krb5-fermi-base/addons RPM packages) and in the PAM system.

* Add these lines to the pam definitions in the [appdefaults] section to disable any use of the obsolete krb524 service (no longer provided): krb4_convert_524 = false              krb4_use_as_req = false The absence of these parameters has caused slow logins (or returns from screen locks) on some systems.

* Add the SLAC Kerberos definitions to the [realms] section: SLAC.STANFORD.EDU = {                 kdc = k5auth1.slac.stanford.edu:88 k5auth2.slac.stanford.edu:88 k5auth3.slac.stanford.edu:88 CHG000000008632 master_kdc = k5auth1.slac.stanford.edu:88                 admin_server = k5admin.slac.stanford.edu                 kpasswd_server = k5passwd.slac.stanford.edu                 default_domain = slac.stanford.edu         }</description><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-krb5.conf" release="1" src="krb5-fermi-krb5.conf-5.1-1.src.rpm" version="5.1"><filename>krb5-fermi-krb5.conf-5.1-1.noarch.rpm</filename><sum type="sha256">b4478e9643655bd43ff47cc0c48725573e592d6d6c247229a321eee6ca0c962e</sum></package><package arch="i386" name="krb5-fermi-getcert" release="1" src="krb5-fermi-getcert-2.2-1.src.rpm" version="2.2"><filename>krb5-fermi-getcert-2.2-1.i386.rpm</filename><sum type="sha256">f4022c907a87d6026cf74fd5796da8a136d800b19f8679f2c416eebfac254f6c</sum></package><package arch="noarch" name="krb5-fermi-config" release="1" src="krb5-fermi-config-5.1-1.src.rpm" version="5.1"><filename>krb5-fermi-config-5.1-1.noarch.rpm</filename><sum type="sha256">d524b242736554b2bb51657f990b8441ac2eda04a1f1d9f1ca60adcfec6125a3</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG000000013739</id><title>Update Krb5.Conf</title><description>[domain_realm] section will be updated. The [domain_realm] section provides a translation from a domain name or hostname to a Kerberos realm name. We need to map pingdev.fnal.gov to FERMI domain. Additionally 38 translations will be removed since these hostnames no longer exist in DNS.

[instancemapping] section will be removed, since there is no AFS at Fermilab anymore.</description><release>Scientific Linux Fermi</release><issued date="2018-02-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-config" release="1.6.1" src="krb5-fermi-krb5.conf-5.3-1.6.1.src.rpm" version="5.3"><filename>krb5-fermi-config-5.3-1.6.1.noarch.rpm</filename><sum type="sha256">45bf513697d573439f9e8ed99d0694b28f5f31104632c906a676455407d1245c</sum></package><package arch="noarch" name="krb5-fermi-krb5.conf" release="1.6.1" src="krb5-fermi-krb5.conf-5.3-1.6.1.src.rpm" version="5.3"><filename>krb5-fermi-krb5.conf-5.3-1.6.1.noarch.rpm</filename><sum type="sha256">3af1836760ceade7f97ed616cd7257e89af81eeb96934a08123fd0a61525cdf8</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG000000016873</id><title>Enhancement: Krb5.Conf</title><description>Currently the krb5.conf file has SULLY as the first DC and this machine is located in Accelerator Division's server room. 
As a group, we have decided to move the servers around so that the first server is ELMO, which is located in FCC.</description><release>Scientific Linux Fermi</release><issued date="2020-01-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-krb5.conf" release="1.1" src="krb5-fermi-krb5.conf-5.4-1.1.src.rpm" version="5.4"><filename>krb5-fermi-krb5.conf-5.4-1.1.noarch.rpm</filename><sum type="sha256">a420dcdb61417cddafa7d52d5a1eb994aaa078f316097e7cf5a915cbdac021b7</sum></package><package arch="noarch" name="krb5-fermi-config" release="1.1" src="krb5-fermi-krb5.conf-5.4-1.1.src.rpm" version="5.4"><filename>krb5-fermi-config-5.4-1.1.noarch.rpm</filename><sum type="sha256">cac2ce2dc2a325cbac8afd178276cd2c745e67ad81f30b85d9219bca9efebe98</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG000000016874</id><title>Update Fermilab-Conf_Kerberos</title><description /><release>Scientific Linux Fermi</release><issued date="2020-03-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-config" release="1" src="krb5-fermi-krb5.conf-5.5-1.src.rpm" version="5.5"><filename>krb5-fermi-config-5.5-1.noarch.rpm</filename><sum type="sha256">9014eb7ad74684ebabf09a8464db9989bb561139cd497b9b825e0dd9ff0bae75</sum></package><package arch="noarch" name="krb5-fermi-krb5.conf" release="1" src="krb5-fermi-krb5.conf-5.5-1.src.rpm" version="5.5"><filename>krb5-fermi-krb5.conf-5.5-1.noarch.rpm</filename><sum type="sha256">4de82f88966cb22d714c6ea7bc248a21bd883b788f657fcbdd1b8d6d60b33594</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG000000017316</id><title>Resolve A Scripting Issue With Deployment Of /Etc/Kdc.List Entries.</title><description>In some instances the /etc/kdc.list entries were not automatically inserted into the correct place within /etc/krb5.conf</description><release>Scientific Linux Fermi</release><issued date="2020-03-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-config" release="2" src="krb5-fermi-krb5.conf-5.5-2.src.rpm" version="5.5"><filename>krb5-fermi-config-5.5-2.noarch.rpm</filename><sum type="sha256">f5131ccf50fd9828d170160783a92079c52ffc2a2b0c5c133219d8dd0718dfbc</sum></package><package arch="noarch" name="krb5-fermi-krb5.conf" release="2" src="krb5-fermi-krb5.conf-5.5-2.src.rpm" version="5.5"><filename>krb5-fermi-krb5.conf-5.5-2.noarch.rpm</filename><sum type="sha256">e30f6238343a490bf2298e9295c9de2a56b85cc897f37b92f8db4ff7819c6740</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>CHG6243</id><title>Bugfix: Krb5-Fermi-Config</title><description /><release>Scientific Linux Fermi</release><issued date="2013-08-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-krb5.conf" release="1" src="krb5-fermi-krb5.conf-4.7-1.src.rpm" version="4.7"><filename>krb5-fermi-krb5.conf-4.7-1.noarch.rpm</filename><sum type="sha256">814ca61273522a43526ed01f0bd7dab2f3b90bbf149c39471538f29bc9bfbf82</sum></package><package arch="noarch" name="krb5-fermi-config" release="1" src="krb5-fermi-config-4.7-1.src.rpm" version="4.7"><filename>krb5-fermi-config-4.7-1.noarch.rpm</filename><sum type="sha256">4310a3a3cefcdd42bcc3ae8242ed187947c321d285df2c859cde0df0b65aa3ae</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0001404</id><title>Create "Managed Print Service" Assignment Group In Snow</title><description /><release>Scientific Linux Fermi</release><issued date="2019-04-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="python-cups" release="22.el6" src="python-cups-1.9.72-22.el6.src.rpm" version="1.9.72"><filename>python-cups-1.9.72-22.el6.i686.rpm</filename><sum type="sha256">3397bca8296bd39cb5d0847faeba2ad58763fd841769b07da41894a157b0bd7e</sum></package><package arch="x86_64" name="python-cups" release="22.el6" src="python-cups-1.9.72-22.el6.src.rpm" version="1.9.72"><filename>python-cups-1.9.72-22.el6.x86_64.rpm</filename><sum type="sha256">451b309c7de34fe012e4cb4661bd3ee08e090c0b6df2bd86078ab1592ad0794b</sum></package><package arch="noarch" name="python-cups-doc" release="22.el6" src="python-cups-1.9.72-22.el6.src.rpm" version="1.9.72"><filename>python-cups-doc-1.9.72-22.el6.noarch.rpm</filename><sum type="sha256">630dc10acd979646404830d81d8fdf6dd893b434772dfbc47f35af43d26c0a5b</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0001587</id><title>Krb5-Fermi Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-krb5.conf" release="1" src="krb5-fermi-krb5.conf-5.0a-1.src.rpm" version="5.0a"><filename>krb5-fermi-krb5.conf-5.0a-1.noarch.rpm</filename><sum type="sha256">6d9007d5f24f8b2fef896fae64e21e77f71158a18855aa86f6eb710b45fded8d</sum></package><package arch="noarch" name="krb5-fermi-base" release="2" src="krb5-fermi-base-2.2-2.src.rpm" version="2.2"><filename>krb5-fermi-base-2.2-2.noarch.rpm</filename><sum type="sha256">9fb69b0bf7f8bc3c13c55cd83859f9c08d1c9fe4f1280bb2f4efcecc9849cd8a</sum></package><package arch="noarch" name="krb5-fermi-config" release="1" src="krb5-fermi-config-5.0a-1.src.rpm" version="5.0a"><filename>krb5-fermi-config-5.0a-1.noarch.rpm</filename><sum type="sha256">e4128edefc6db8db670bf54a0ce8078fcef1c109b98190253e1f06be076d6e97</sum></package><package arch="i386" name="krb5-fermi-addons" release="1.slf6" src="krb5-fermi-addons-1.4-1.slf6.src.rpm" version="1.4"><filename>krb5-fermi-addons-1.4-1.slf6.i386.rpm</filename><sum type="sha256">7cab2644ed9981a3ab6fad57514d5622c98b5b666d2fed8a4daef6efe0d326f7</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0001977</id><title>Ocs Inventory Fermi Client Enhancement</title><description>This enhancement includes: - Compatibility with EL7 - Proxy support for client reporting - Matlab detection</description><release>Scientific Linux Fermi</release><issued date="2015-10-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ocsinventory-fermi" release="22" src="ocsinventory-fermi-0.9.9-22.src.rpm" version="0.9.9"><filename>ocsinventory-fermi-0.9.9-22.noarch.rpm</filename><sum type="sha256">089e71f56eed346279bcfb565cdc7083f532c6113823dda49c077fa9dd202908</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0002013</id><title>New Package: Fermilab-Conf_Kerberos</title><description>Provides the Fermilab krb5.conf</description><release>Scientific Linux Fermi</release><issued date="2016-04-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="krb5-fermi-krb5.conf" release="1" src="krb5-fermi-krb5.conf-5.2-1.src.rpm" version="5.2"><filename>krb5-fermi-krb5.conf-5.2-1.noarch.rpm</filename><sum type="sha256">8e188bb4bb4f30b450a60b8a71f70996277538c2b0f9d228f143968f87923d73</sum></package><package arch="noarch" name="krb5-fermi-config" release="1" src="krb5-fermi-config-5.2-1.src.rpm" version="5.2"><filename>krb5-fermi-config-5.2-1.noarch.rpm</filename><sum type="sha256">3a56b95a976fcf5a608fa94352dfdba81acdc1bc7c900dcdcc65b2724fae6f3f</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0002481</id><title>New Package: Fermilab-Util_Kx509</title><description>fermilab-util_kx509 contains a kx509 command which gets an X.509 certificate for Fermilab using cigetcert with kerberos authentication.</description><release>Scientific Linux Fermi</release><issued date="2016-04-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="cigetcert" release="1.el6" src="cigetcert-1.0-1.el6.src.rpm" version="1.0"><filename>cigetcert-1.0-1.el6.noarch.rpm</filename><sum type="sha256">03ceb4615ca20bc0620221e14b8f94db6f3715171e50fe738b60134853768661</sum></package><package arch="noarch" name="fermilab-util_kx509" release="1.el6" src="fermilab-util_kx509-3.1-1.el6.src.rpm" version="3.1"><filename>fermilab-util_kx509-3.1-1.el6.noarch.rpm</filename><sum type="sha256">142204fb01f6271b15224bc0a71e2c98a0f38a5006692229ff70c211f487cf08</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0002659</id><title>Update Version Of Cigetcert For Sl7 Fermi Context</title><description>Update cigetcert to version 1.2</description><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="cigetcert" release="1.el6" src="cigetcert-1.2-1.el6.src.rpm" version="1.2"><filename>cigetcert-1.2-1.el6.noarch.rpm</filename><sum type="sha256">ee75f5521d601f067de7f182fd994e0c775b76bd61cb2b1d839ebdccc821fec7</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0002852</id><title>Update Version Of Cigetcert For Sl7 Fermi Context</title><description /><release>Scientific Linux Fermi</release><issued date="2016-12-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="cigetcert" release="1.el6" src="cigetcert-1.16-1.el6.src.rpm" version="1.16"><filename>cigetcert-1.16-1.el6.noarch.rpm</filename><sum type="sha256">423334be9e3e512dd23864310a2da825177e464584119b34e8f9249152b85526</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0002973</id><title>Update Cigetcert</title><description>The wrapper script of cigetcert to unsets more variables such as PYTHONHOME, in response to a user bug report.</description><release>Scientific Linux Fermi</release><issued date="2016-04-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="cigetcert" release="2.el6" src="cigetcert-1.16-2.el6.src.rpm" version="1.16"><filename>cigetcert-1.16-2.el6.noarch.rpm</filename><sum type="sha256">be82c4e090f65882fb35d8d138968e1335fed049e5fe941e8458f9ebf3244611</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0003766</id><title>Update Openafs To 1.6.22.3</title><description /><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kmod-openafs" release="1.SL610.el6" src="kmod-openafs-1.6.22.3-1.SL610.el6.src.rpm" version="1.6.22.3"><filename>kmod-openafs-1.6.22.3-1.SL610.el6.noarch.rpm</filename><sum type="sha256">2acf39e723919085e97abdd00b5c8c8a6b67fffa13ca88b7d78f549ab6ce3dbc</sum></package><package arch="x86_64" name="kmod-openafs-754" release="286.sl6.754" src="openafs.SLx-1.6.22.3-286.src.rpm" version="1.6.22.3"><filename>kmod-openafs-754-1.6.22.3-286.sl6.754.x86_64.rpm</filename><sum type="sha256">23550de9023d881436c96c76fdeebf78d2ea10f1a5aeb1f921aea3e2ebe53797</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0004153</id><title>Fermi Context Package For Fnal Ca(S)</title><description>Authentication Services operates a non-accredited CA that is integrated with the FERMI and SERVICES domains.</description><release>Scientific Linux Fermi</release><issued date="2019-02-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="fermilab-conf_ca-certs" release="2.sl6" src="fermilab-conf_ca-certs-2019.01-2.sl6.src.rpm" version="2019.01"><filename>fermilab-conf_ca-certs-2019.01-2.sl6.noarch.rpm</filename><sum type="sha256">c08eac2053aaaa2ce047f54b41c6615bfbb67247fd0251000eaac3a90d66121c</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2015-007</id><title>Security Errata Critical: Openafs</title><description>This release fixes the high impact security vulnerability named "Tattletale"

The packet paylod of Rx ACK packets is not fully initialized, leaking plaintext from packets previously processed.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-10-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-kpasswd" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-kpasswd-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">11682b9597df664cc1e78dd37f96805cd37cba3fa9d49767793b7a7755c2ba73</sum></package><package arch="x86_64" name="openafs-devel" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-devel-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">2c8a89c72147ad26c0b47102210d41a2a614d1a89880dd764c2441a946f7eb62</sum></package><package arch="x86_64" name="openafs-authlibs" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-authlibs-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">c025b63ea5baa648265bb4dedc33bb7ea7086db3d45d592192a570d32b49d683</sum></package><package arch="x86_64" name="openafs-compat" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-compat-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">c806aadbe1d6f7e9732b666da830a8c4dfa14c72fb1a1126c880536f58929a14</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-authlibs-devel-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">2875224ca610104c7e0f45517b8278310a4ac0cfb48c57c8e9561b81708050ff</sum></package><package arch="x86_64" name="kmod-openafs-573" release="219.sl6.573.3.1" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>kmod-openafs-573-1.6.14-219.sl6.573.3.1.x86_64.rpm</filename><sum type="sha256">7f857230ae126f10c7cb0481438b78e0e7674d26bd1d4a661ef88dfa2a809598</sum></package><package arch="x86_64" name="openafs-krb5" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-krb5-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">7bd42ca79dbabe0cef716f1ae2d450ed162114760cff8c7383266c803c2a540f</sum></package><package arch="x86_64" name="openafs" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">cf783495bcb98f0e5e2dcc0c0e9b809d281237744e2d4310545e5038166d22a1</sum></package><package arch="x86_64" name="openafs-client" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-client-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">1f53a3c79392aae9a713d6ab11a110e46c15f7b8f5b27f5adac4558552bfa93e</sum></package><package arch="x86_64" name="openafs-kernel-source" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-kernel-source-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">9aeb59b04958edb134629c5717bb764564fbd774cdbf1ade98baebdfcc309604</sum></package><package arch="x86_64" name="openafs-server" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-server-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">7b17d729a12ba5080365318c1c8e1d0dac5d5d12772c9e61637b5ccef7822858</sum></package><package arch="x86_64" name="openafs-module-tools" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-module-tools-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">78912d7d4144f29884222de9e4fff4d4423d3db44922c975c7b9a77fe79b733d</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="219.sl6" src="openafs.SLx-1.6.14-219.src.rpm" version="1.6.14"><filename>openafs-plumbing-tools-1.6.14-219.sl6.x86_64.rpm</filename><sum type="sha256">1f6905c37e573e947ada7c74d7b862468d1af419df453b82900a625ca111523f</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2016-001-002</id><title>Security Errata Critical: Openafs</title><description>This release fixes the vulnerabilities tracked as OPENAFS-SA-2016-001 and OPENAFS-SA-2016-002.

OPENAFS-SA-2016-001 (CVE-2016-2860): Users from foreign Kerberos realms can create groups as if they were administrators.

OPENAFS-SA-2016-002: Information leakage over the network due to uninitialized memory.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-kernel-source" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-kernel-source-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">61bbf96d61d24db860eb784012329726a73d442e2099b8794a7bcaf6ae4ec455</sum></package><package arch="x86_64" name="openafs-kpasswd" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-kpasswd-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">d651490fe6a2514babe4adbadcd83c354fd88d279685496aa52e480c58a5e717</sum></package><package arch="x86_64" name="openafs-krb5" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-krb5-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">aa23007ffcb7d429e0def06089539c0be7158c4bd391a25c0dffaa77c8ec4ae8</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-plumbing-tools-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">de14263fb8948389302d35274f03c9ba18598eaba063f378aecff2617f8e5106</sum></package><package arch="x86_64" name="kmod-openafs-642" release="234.sl6.642" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>kmod-openafs-642-1.6.17-234.sl6.642.x86_64.rpm</filename><sum type="sha256">df0108b2570d5bae0e48f5a70555b7b6cae5f0a5fc067b1e38f6857421e0550c</sum></package><package arch="x86_64" name="kmod-openafs-573" release="234.sl6.573.12.1" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>kmod-openafs-573-1.6.17-234.sl6.573.12.1.x86_64.rpm</filename><sum type="sha256">2e55b1e1ba54b3bf27e4eec058333e0201c188399614c656e6da984aa69a5b67</sum></package><package arch="x86_64" name="openafs-server" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-server-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">2c66e6a09faa6655e21368749679447f69517bae4a42241101d4d420596ac06b</sum></package><package arch="x86_64" name="openafs" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">f53962017bb93cf6bbb5b8e96648ad52a36eaac075e5d77c7f47e995beb7dfbd</sum></package><package arch="x86_64" name="openafs-client" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-client-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">9796ee9fc3aec383acefb8c5fdb7f500e2213252452df58ad8583efce6b51a80</sum></package><package arch="x86_64" name="openafs-authlibs" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-authlibs-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">8912a0924c7baf99f19d19c2fb6efe03b2a3b1753d8524bee5e6f2602e3a9026</sum></package><package arch="x86_64" name="openafs-compat" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-compat-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">5512445702926351840ae3efb8f9526c071ee3d47a04d658619556252c16fcae</sum></package><package arch="x86_64" name="openafs-devel" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-devel-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">2eccfc6a15276d220f59a2b4df840561149745668a52f9451d57767379f6b237</sum></package><package arch="x86_64" name="openafs-module-tools" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-module-tools-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">38070e03cdf1e70307ce4f15d96cba9073796ad8bda6123d5237a90cefe5b5bb</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="234.sl6" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-authlibs-devel-1.6.17-234.sl6.x86_64.rpm</filename><sum type="sha256">ef28471f3515c9fd22a9c20bd2956683998913b16eced94f18a6eae420a4b039</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2016-003</id><title>Security Errata Moderate: Openafs</title><description>Security Fix(es):

There are three different kinds of &#8220;dead&#8221; residual directory entry leaks, each with a different cause:

1. There may be partial name data after the null terminator in a live directory entry. This happens when a previously used directory entry becomes free, then is reused for a directory entry with a shorter name.

2. &#8220;Dead&#8221; directory entries are left uncleared after an object is deleted or renamed.

3. Residual directory entries may be inadvertently picked up when a new directory is created or an existing directory is extended by a 2kiB page.

This happens because the fileserver shares a buffer pool for directories of all AFS users, but does not clear each buffer upon reuse. This is the most severe problem because the leaked information may be from other directories or volumes for which the AFS user is not authorized.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-compat" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-compat-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">e108410df761b21a2c969d71d734b1716380cf7a9e81707afb2ec7d296a2b14a</sum></package><package arch="x86_64" name="openafs-devel" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-devel-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">82dea60acec742b92007a6446be12f22902bf493382793fbb64bd605dcfc7bb5</sum></package><package arch="x86_64" name="openafs-authlibs" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-authlibs-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">40f39753e489f7978d5d904163febbe82167bf05d5aa604fd66ca4166acdd58b</sum></package><package arch="x86_64" name="openafs-server" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-server-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">fddeaa657f511cb0d2d157b336f42ac762a7b4b2ca0d46056bda073a9e23dc82</sum></package><package arch="x86_64" name="openafs" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">3ac7b5248b58723cd87dcecc6c2975ed0ed0dd57a5c315c0f48a07758c23fc3a</sum></package><package arch="x86_64" name="openafs-client" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-client-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">6d5065413ccbec328321dcc629cc673c3fa2334b108cdc995934917f32baf890</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-plumbing-tools-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">8b1d199ad4c5df91fe80e30a8a92ab384a83eea0bb635027ca8deaeff6be03c8</sum></package><package arch="x86_64" name="openafs-kernel-source" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-kernel-source-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">5ecb1dd88248884cbb97f34949de37da61777ed4bbdc02f5766f177508b2cd82</sum></package><package arch="x86_64" name="openafs-module-tools" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-module-tools-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">aadc97f578c2d6e52ad4dd1f60743cc83f66ceb102a31f6e3156859531c3d221</sum></package><package arch="x86_64" name="openafs-kpasswd" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-kpasswd-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">8dc9bd2b5fa6f2366cf312e3eb62d1e5dc959ec81ecf38d3407e9471af17ca7a</sum></package><package arch="x86_64" name="openafs-krb5" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-krb5-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">4847a1d641b1617af77803f297efb54c09c25d6b3421d2a2738345dc159fd245</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="256.sl6" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-authlibs-devel-1.6.20-256.sl6.x86_64.rpm</filename><sum type="sha256">f788c57a557cd97ef06d2b7a79eeab3ef6a354f8bb8cc4441f970aba4a4dd1f2</sum></package><package arch="x86_64" name="kmod-openafs-642" release="256.sl6.642.6.2" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>kmod-openafs-642-1.6.20-256.sl6.642.6.2.x86_64.rpm</filename><sum type="sha256">9e1e6b0beb5b7e37427a217ec1623716bebd3526558cde6dd8963c23aee1e5ca</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2017-001</id><title>Important: Openafs Security Update</title><description>Security Fix(es): * Certain values transmitted in RX ACK packets were not sanity checked by OpenAFS receiving peers, which could lead to an assertion being triggered during construction of outgoing packets on the same connection, resulting in server process crashes or client kernel panics.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-12-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-module-tools" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-module-tools-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">af715561b346bd2a7c685ec9813582cab89b6afd76bc984bec55b91c8aca61ac</sum></package><package arch="x86_64" name="openafs-kpasswd" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-kpasswd-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">94e1f12822e9ec2d737b057903169c70747b8d97c8fe39702cf0543090a415a1</sum></package><package arch="x86_64" name="openafs-client" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-client-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">1b31d1e5aab3e0da0bd2f27f018a98f4d30e7b719ea182dfc28941456f64c066</sum></package><package arch="x86_64" name="openafs" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">9036f9f4899423dcb82a670540117df70237d041d939ca47a0bc93dd23ff2a38</sum></package><package arch="x86_64" name="openafs-krb5" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-krb5-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">9988c4f84218d3a1db15ec22d7b19c096f40cf2ca962bafb84bba2656fd93ee0</sum></package><package arch="x86_64" name="openafs-devel" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-devel-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">11ca4ccc9d3d844841720cc5a2b0b6c1dc7c617d576734c08d989bd76b625be1</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-plumbing-tools-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">fd69ab4eb539c7d455ebd46b4dc96dcae820203b267627d0aac3fa0ab738e849</sum></package><package arch="x86_64" name="openafs-server" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-server-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">5743132722200f9ee74344f9166892ac1c3214ff11b4dd7c94fa49f1cab01a71</sum></package><package arch="x86_64" name="openafs-authlibs" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-authlibs-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">3d3f4824e88a68f9a83d6cf762082658c85c841c6d3de254e4d5a2083ffc35ab</sum></package><package arch="x86_64" name="openafs-compat" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-compat-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">d3356a30d19dba87efff88a4af30f5cb64233570b3c64b95b6ac3be9c11f5c84</sum></package><package arch="x86_64" name="kmod-openafs-696" release="257.sl6.696" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>kmod-openafs-696-1.6.20-257.sl6.696.x86_64.rpm</filename><sum type="sha256">0a9e26c61c5729ffb7fbde672fb005f9b19bc377bd93592f62e04fd6068c1505</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-authlibs-devel-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">0f72d1954e79d472a98300261c13502a1d1f315e04b109a9bc0a66145fa340c9</sum></package><package arch="x86_64" name="openafs-kernel-source" release="257.sl6" src="openafs.SLx-1.6.20-257.src.rpm" version="1.6.20"><filename>openafs-kernel-source-1.6.20-257.sl6.x86_64.rpm</filename><sum type="sha256">94c33766578b5cc5c6d0754fbca9c13e51c98d52447b05552008f28da0faf500</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2018-001:2:3</id><title>Moderate: Openafs</title><description>These releases include fixes for three security advisories, OPENAFS-SA-2018-001, OPENAFS-SA-2018-002, and OPENAFS-SA-2018-003. 
OPENAFS-SA-2018-001 only affects deployments that run the 'butc' utility as part of the in-tree backup system, but is of high severity for those sites which are affected -- an anonymous attacker could replace entire volumes with attacker-controlled contents. 
OPENAFS-SA-2018-002 is for information leakage over the network via uninitialized RPC output variables.  A number of RPCs are affected, some of which require the caller to be authenticated, but in some cases hundreds of bytes of data can be leaked per call.  Of note is that cache managers are also subject to (kernel) memory leakage via AFSCB_ RPCs. 
OPENAFS-SA-2018-003 is a denial of service whereby anonymous attackers can cause server processes to consume large quantities of memory for a sustained period of time. 
The changes to fix OPENAFS-SA-2018-001 require behavior change in both butc(8) and backup(8) to use authenticated connections; old and new versions of these utilities will not interoperate absent specific configuration of the new tool to use the old (insecure) behavior. These changes also are expected to cause backup(8)'s interactive mode to be limited to only butc connections requiring (or not requiring) authentication within a given interactive session, based on the initial arguments selected.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-09-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-kernel-source" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-kernel-source-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">f82d22b80619a8a1c46043755c9082ea746aed969eabce6d32701bf81341e5c4</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-authlibs-devel-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">45d80b2acddccb161ef91a76a9a855a5763082555476e066963ab987f715480d</sum></package><package arch="x86_64" name="openafs-krb5" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-krb5-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">8fc8d281d910add9d1a30b7f07a93a6594371a7a5e449457a25b6c3fec8ec34c</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-plumbing-tools-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">d583324395d84d5a9ce3864cde95ddce86171c513df0858f15cbc0d63ac041cc</sum></package><package arch="x86_64" name="openafs-kpasswd" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-kpasswd-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">2a508e3a04813969ce738f78648b989db591bc99604be2e21decb5fc021ca65d</sum></package><package arch="x86_64" name="openafs-devel" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-devel-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">6d5d2065894c13e83993c745cd005f0b6022f28e4fffe14e7818ae88e6b6e285</sum></package><package arch="x86_64" name="openafs-client" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-client-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">3917b71fe72c3248bbc22e100e4beb3ad4af60dc4a10d3fdee084f42bc3fb2f4</sum></package><package arch="x86_64" name="openafs" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">bcb9f337543ca2d584ea90c7f60a5dee261fad54c0a5cf07fdfd295f27417a68</sum></package><package arch="x86_64" name="openafs-compat" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-compat-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">2d8c83efea6f9a377dcda3f329e2e4f631cb04d196eff5bf947bf831ec156d08</sum></package><package arch="x86_64" name="openafs-authlibs" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-authlibs-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">9f3fd90cd2f87b3dd59962ab71edeba71728218a9a30a254a68652fa923cda22</sum></package><package arch="x86_64" name="kmod-openafs-754" release="289.sl6.754.3.5" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>kmod-openafs-754-1.6.23-289.sl6.754.3.5.x86_64.rpm</filename><sum type="sha256">84391800d7faa2a01f9e03a59ae8b2e08129b6f8289bbc457e6d6ee70e66f632</sum></package><package arch="x86_64" name="openafs-server" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-server-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">44766130fe57be33233914d4f12ed74ab395db49906c8a1d1f7be89b661277a4</sum></package><package arch="x86_64" name="openafs-module-tools" release="289.sl6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-module-tools-1.6.23-289.sl6.x86_64.rpm</filename><sum type="sha256">63f30a73657fbf18b40529617cc1e57ae793c3800f378cd22f88d1518d7d30b0</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>RITM0088723</id><title>Zz_Ntp_Configure Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2014-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="zz_ntp_configure" release="6.slf" src="zz_ntp_configure-4.2.6-6.slf.src.rpm" version="4.2.6"><filename>zz_ntp_configure-4.2.6-6.slf.noarch.rpm</filename><sum type="sha256">95ffe61cafe03991932a13161cf856fe3cd50c2fca7e8133a3a11591536bc622</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>RITM0096493</id><title>Zz_Ntp_Configure Bugfix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="zz_ntp_configure" release="7.slf6" src="zz_ntp_configure-4.2.6-7.slf6.src.rpm" version="4.2.6"><filename>zz_ntp_configure-4.2.6-7.slf6.noarch.rpm</filename><sum type="sha256">dd38bd3ac37b276e3e9d9428bb58d9ed9e588df548e2e30a96c31839cba28d41</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>RITM0891205</id><title>Important: Openafs</title><description>Security Fixes: * Fix OPENAFS-SA-2019-001: information leakage in failed RPC output Generated RPC handler routines ran output variables through XDR encoding even when the call had failed and would shortly be aborted (and for which uninitialized output variables is common); any complete packets assembled in the process would be sent to the peer, leaking the contents of the uninitialized memory in question. 
* Fix OPENAFS-SA-2019-002: information leakage from uninitialized scalars Generated RPC handler routines did not initialize output variables of scalar (fixed-length) type, since they did not require dedicated logic to free.  Such variables allocated on the stack could remain uninitialized in some cases (including those affected by OPENAFS-SA-2019-001), and the contents of uninitialized memory would be returned to the peer.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-10-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-authlibs" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-authlibs-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">fea8bab1cc1ed15e72e75626848f6cfb235c06e84a4a1fb4d3749f6878182718</sum></package><package arch="x86_64" name="openafs" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">d86fa3aaaa802a7acbd190fbf1aa1b04e72b461316e463f886e97e379f247518</sum></package><package arch="x86_64" name="openafs-compat" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-compat-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">d29e961a4b682f46ce7d6ae987670b635504ec7fdbf63cbd45abe0f9d12531e3</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-plumbing-tools-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">63a97c4102da6966c889dc23b6fa7a560821e165ea78f8c614c21cc9b11eab53</sum></package><package arch="x86_64" name="kmod-openafs-754" release="290.sl6.754.23.1" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>kmod-openafs-754-1.6.24-290.sl6.754.23.1.x86_64.rpm</filename><sum type="sha256">66d3ee336d466a82277ed22b07b1644a4c2fb57cbe07f5c2956ca80ee945ce64</sum></package><package arch="x86_64" name="openafs-kernel-source" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-kernel-source-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">8984c8a53a4938801ee8b5bf26253e36f7a3487c7f58df91636cab89cb1b1851</sum></package><package arch="x86_64" name="openafs-devel" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-devel-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">99a3bde197baa412919fc3759af351839cf33e542745b188cc5392e2d55957b7</sum></package><package arch="x86_64" name="openafs-client" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-client-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">acf60321282eda222115ce0493f624a3f843a479bbcf7478e3a43b93adb00b42</sum></package><package arch="x86_64" name="openafs-krb5" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-krb5-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">d65d3305f2ed0ed024c392b8183102afd100912f20e85f614b6d5f8fd253f4aa</sum></package><package arch="x86_64" name="openafs-server" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-server-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">14c2c84e8ee8c1548758eb2be1dd02e69593514aacbf30606df5a4e89b90ed04</sum></package><package arch="x86_64" name="openafs-module-tools" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-module-tools-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">c53dd789208489a3fde9a3fd0a266e9b3f99850b6b72c3e745317ea0c1fd0a9b</sum></package><package arch="x86_64" name="openafs-kpasswd" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-kpasswd-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">7af9a098ed37e1d92cbf79f789c50c94a09f70ad4d4c07945a5773f30f86de42</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="290.sl6" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-authlibs-devel-1.6.24-290.sl6.x86_64.rpm</filename><sum type="sha256">369ef7fafc626d25e7e9d3407157d31fbae8ab6bd31c26be38bbef0b24d0870c</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SL6.5:openafs:security</id><title>Moderate: Openafs On Sl6.X I386/X86_64</title><description>An attacker with the ability to connect to an OpenAFS fileserver can trigger a buffer overflow, crashing the server.

The GetStatistics64 remote procedure call (RPC) was introduced in OpenAFS 1.4.8 as part of the support for fileserver partitions larger than 2 TiB. The GetStatistics64 RPC is used by remote administrative programs to retrieve statistical information about fileservers. The GetStatistics64 RPC requests do not require authentication.

A bug has been discovered in the GetStatistics64 RPC which can trigger a fileserver crash.  The version argument of the GetStatistics64 RPC is used to determine how much memory is allocated for the RPC reply.  However the range of this argument is not validated, allowing an attacker to cause insufficient memory to be allocated for the statistical information reply buffer.

Clients are not affected.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-server" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-server-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">3fecfb99d8f38e7a25581e706291e258881eb2dce8f36279d89946a9e0505f28</sum></package><package arch="x86_64" name="openafs-kernel-source" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-kernel-source-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">0c4d4fc56165347aa3f5baf1e0f0ab47fceb74c09335bb5e1e9b2450683c3924</sum></package><package arch="x86_64" name="openafs-devel" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-devel-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">0525a453bf93f11a9fc6370de12b1d0601a3ca151aff0fa9266f2b6bba2847d8</sum></package><package arch="x86_64" name="openafs-authlibs" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-authlibs-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">192f7e30ac010a3fa050fb7ee20cf04db69d1d854ea7851f5f87ad8329025a14</sum></package><package arch="x86_64" name="openafs" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">ea8ddf4745a4b4d81f3c922300f47f5711003c7099b5eec2151131bf3bb6b356</sum></package><package arch="x86_64" name="openafs-kpasswd" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-kpasswd-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">e72debb6cab09e1976700cd2ba53d35b273553af10cdfa862990e21786f69a46</sum></package><package arch="x86_64" name="kmod-openafs-431" release="149.sl6.431.11.2" src="openafs.SLx-1.6.5.1-149.src.rpm" version="1.6.5.1"><filename>kmod-openafs-431-1.6.5.1-149.sl6.431.11.2.x86_64.rpm</filename><sum type="sha256">ad5c6b194696495ec3668a765bf0c5e675f179ceba982f2489ca3827750236f0</sum></package><package arch="x86_64" name="openafs-module-tools" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-module-tools-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">2e670792385ca405c691e00a6c3f4496fbd3ea6a013bdd3cb9d4d5a11049747f</sum></package><package arch="x86_64" name="openafs-compat" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-compat-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">ed2705cd0b24bd2643a26344eca931d52e6bb006779430180cd1f6fc215098df</sum></package><package arch="x86_64" name="openafs-krb5" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-krb5-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">c2675ac6902fedf3ce8dac7c47884049ae3d0968c9a94a96ff07fee1e543436b</sum></package><package arch="x86_64" name="kmod-openafs-431" release="148.sl6.431.11.2" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>kmod-openafs-431-1.6.5.1-148.sl6.431.11.2.x86_64.rpm</filename><sum type="sha256">62cb0bf25815b6a5280f00e1ad579fdaa9191dc78d421c089020e271e71b3cdb</sum></package><package arch="x86_64" name="openafs-client" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-client-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">64653fa698efc67019665f4cb2b949378ea593eee382dbdb73ad36a1141a5fc0</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-authlibs-devel-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">2bacd9844f163cf7c6e71b64125d335165430048907d579d8d7d9eab950dc1a6</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="148.sl6" src="openafs.SLx-1.6.5.1-148.src.rpm" version="1.6.5.1"><filename>openafs-plumbing-tools-1.6.5.1-148.sl6.x86_64.rpm</filename><sum type="sha256">e14575d19d262092123f56db384cb97a33b3fe2c59aa62c32187d2c9b8f45287</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SL6.5:sl-indexhtml-1</id><title>Bugfix: Sl-Indexhtml</title><description /><release>Scientific Linux Fermi</release><issued date="2014-02-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="sl-indexhtml" release="6.5.sl6.1" src="sl-indexhtml-6-6.5.sl6.1.src.rpm" version="6"><filename>sl-indexhtml-6-6.5.sl6.1.noarch.rpm</filename><sum type="sha256">220c02529557ddbbf5a571381c9157e1ee985ce7f1ae03f4ab91332162325df9</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SL6.6:openafs</id><title>Enhancement: Openafs</title><description /><release>Scientific Linux Fermi</release><issued date="2014-10-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-kpasswd" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-kpasswd-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">e7e849ac08373157af1ff0fa38b12bbf76f422aa06ea2eb0404d5096b0abe6b1</sum></package><package arch="x86_64" name="openafs-module-tools" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-module-tools-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">d7918759952bc6b31fed1a3aada1d69e86e8c821c00c03992efdc0d8a24d9df6</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-authlibs-devel-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">79a97753f339555caa6361e597b3cc27cc6a1fadd2f70c54de902b85e7bf3ce9</sum></package><package arch="x86_64" name="kmod-openafs-504" release="153.sl6.504" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>kmod-openafs-504-1.6.10-153.sl6.504.x86_64.rpm</filename><sum type="sha256">180473c5ac7bf11c50ce95735c6e7702aee199784bbb1ab4a209e219247a0914</sum></package><package arch="x86_64" name="openafs-devel" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-devel-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">0f4492bc837de2bd25306f31b2f483f87f07e5693d6c794481adff01aa8e772b</sum></package><package arch="x86_64" name="openafs" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">73e2e23d8973637ad669734c91702a1827303984e0dfb9c2a4b87809b80df1f0</sum></package><package arch="noarch" name="kmod-openafs" release="1.SL66.el6" src="kmod-openafs-1.6.10-1.SL66.el6.src.rpm" version="1.6.10"><filename>kmod-openafs-1.6.10-1.SL66.el6.noarch.rpm</filename><sum type="sha256">5fa61d5604017748ba203bf1d4ec1fe46a29194190ff8411a1aafed894b24457</sum></package><package arch="x86_64" name="openafs-kernel-source" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-kernel-source-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">7d07139a4b5007b5b100aed66ab419705281b8e06e729cd2dda79fc6047bd7e8</sum></package><package arch="x86_64" name="openafs-compat" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-compat-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">88f50d473ad9ec3532ed5dcce5682f8a7a418c58eaa33c6ad4bbe7975deb611f</sum></package><package arch="x86_64" name="openafs-client" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-client-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">1257031d73c482f94bd92f805c888f252bb853f0c378c29475c7d91c8075a618</sum></package><package arch="x86_64" name="openafs-authlibs" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-authlibs-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">16ce56a63e177c387b1b70a4d36b5314625d8bad7afda70926226d2c2296d40c</sum></package><package arch="x86_64" name="openafs-krb5" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-krb5-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">1455bc4cfbddf2214b794db823480407162833213df9ede0ca28a7a2494417fc</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-plumbing-tools-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">6f597b9909e912024535f2289509a0252b3243a8d060a8b204ba4920bf3d89a0</sum></package><package arch="x86_64" name="openafs-server" release="153.sl6" src="openafs.SLx-1.6.10-153.src.rpm" version="1.6.10"><filename>openafs-server-1.6.10-153.sl6.x86_64.rpm</filename><sum type="sha256">1e6cfcf2985b2ce5422a132164a36b3b227082dcc56fac37ef5d4adaf71b1fce</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SL:openafs-1.6.13:security</id><title>Important: Openafs On Sl6.X, Sl7.X</title><description>All server platforms

* Fix for CVE-2015-3282: vos leaks stack data onto the wire in the clear when creating vldb entries

* Workaround for CVE-2015-3283: bos commands can be spoofed, including some which alter server state

* Disabled searching the VLDB by volume name regular expression to avoid possible buffer overruns in the volume location server

All client platforms

* Fix for CVE-2015-3284: pioctls leak kernel memory

* Fix for CVE-2015-3285: kernel pioctl support for OSD command passing can trigger a panic</description><release>Scientific Linux Fermi</release><issued date="2015-07-30 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openafs-authlibs" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-authlibs-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">d08142601c7b14ed6db28e984a7ed172e24f816fb4ef90ccfd2f4441d6eab13d</sum></package><package arch="x86_64" name="openafs-compat" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-compat-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">4d3b1ed21abfbffc87f51e2a597844df6496dc32aa5621cebafd013cee52ec3d</sum></package><package arch="x86_64" name="openafs-kpasswd" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-kpasswd-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">69af21c7306eb156c63663ac67dfdf613e313506332a4c7cd0bedc52e6c78aea</sum></package><package arch="x86_64" name="openafs-module-tools" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-module-tools-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">46f55f2c666a1553b6b1c80c2ec035162fe2e01246f3d7605896413cd78d34e6</sum></package><package arch="x86_64" name="openafs-authlibs-devel" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-authlibs-devel-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">1c559f6a345a67033963d2fe5da1060ebb5370d66ad28f9a14c5ad777bec66b8</sum></package><package arch="x86_64" name="openafs-krb5" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-krb5-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">88f5af183f3d19715e0d4d256a7e11072830e6e054df47994ea0e297d62dafdc</sum></package><package arch="x86_64" name="openafs-client" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-client-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">c404771901b4a6eecd0aa85cfa1d1bf6b8ea2a2993f8ac3e60ec2341146950ec</sum></package><package arch="x86_64" name="openafs-server" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-server-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">bd31cedea612b09efae874c77262ec4a12613ea99ff680daa54ee8435cb5c418</sum></package><package arch="x86_64" name="openafs-devel" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-devel-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">d117b8ed208bcb21608e80ed49c7a8176032572013a5a4cc141d6d24161d98fb</sum></package><package arch="x86_64" name="kmod-openafs-504" release="215.sl6.504" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>kmod-openafs-504-1.6.13-215.sl6.504.x86_64.rpm</filename><sum type="sha256">9fdc52aaa0dfec65f7bdf39fd381bf672ad0be6a7c0106d95dd304fe92b950a3</sum></package><package arch="x86_64" name="openafs-plumbing-tools" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-plumbing-tools-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">f04233644216c60c9696b58728285fc4de64e7c862cf393ec9689565a67d69e1</sum></package><package arch="x86_64" name="openafs" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">14e3a29fe561a610a0d39d813bfc7154ba15a54f4c284ca1a1dbae44827ab7f2</sum></package><package arch="x86_64" name="openafs-kernel-source" release="215.sl6" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>openafs-kernel-source-1.6.13-215.sl6.x86_64.rpm</filename><sum type="sha256">72dc862815e695103e2cd230dbf00f4094ac85ea718313109a4b353996d403a4</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SL:sl-index:ff38-1</id><title>Bugfix Sl-Indexhtml For Sl6.X Sl7.X</title><description /><release>Scientific Linux Fermi</release><issued date="2015-08-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="sl-indexhtml" release="6.6.sl6" src="sl-indexhtml-6-6.6.sl6.src.rpm" version="6"><filename>sl-indexhtml-6-6.6.sl6.noarch.rpm</filename><sum type="sha256">991fea511ad5e7aa6379fef7bf2b9e612c67797aec2927fcbdb3491f4678d1fa</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2012:0550-1</id><title>Krb5-Appl Bug Fix Update</title><description>This update fixes the following bug:

* When executing either the "mdir" or "mls" command, the FTP client stores results returned by the server in a specified local file. Previously, when opening the file, the client did not ensure that the mode value it passed to the fopen() function was properly null-terminated. This could cause unpredictable failures. This update ensures that the value is properly null- terminated so that the failures no longer occur in this scenario.</description><release>Scientific Linux Fermi</release><issued date="2012-05-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="krb5-appl-clients" release="7.el6_2.1" src="krb5-appl-1.0.1-7.el6_2.1.src.rpm" version="1.0.1"><filename>krb5-appl-clients-1.0.1-7.el6_2.1.x86_64.rpm</filename><sum type="sha256">72665fc0cb9b0dada4e8b4406e3ff4c6d2bb390d0d5ff74d86da4f1654ad1cc0</sum></package><package arch="x86_64" name="krb5-appl-servers" release="7.el6_2.1" src="krb5-appl-1.0.1-7.el6_2.1.src.rpm" version="1.0.1"><filename>krb5-appl-servers-1.0.1-7.el6_2.1.x86_64.rpm</filename><sum type="sha256">de3c6f6edec053ab0ddffe3a2919388cc0b7cf21cd406e4ede804291fb78d982</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2012:0550" id="RHBA-2012:0550-1" title="Rhba-2012:0550-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=816689" id="816689" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2013:0344-1</id><title>Mesa Bug Fix And Enhancement Update</title><description>The mesa packages have been upgraded to upstream version 9.0, which provides a number of bug fixes and enhancements over the previous version.

This update also fixes the following bugs:

* If the user logged in from Scientific Linux 5 to a Scientific Linux 6 machine by using the "ssh" command with the "-Y" option, an attempt to run an application that uses GLX failed with the "Error: couldn't find RGB GLX visual or fbconfig" error message. This bug has been fixed and the remote login now works as expected.

* Due to an error in the mesa packages, using the multisample anti-aliasing (MSAA) technique with the KWin window manager caused errors in the desktop compositing. This update provides a patch that fixes this bug and MSAA now works correctly with the KWin window manager.

* Previously, when connecting to a remote machine using SSH with the X11 forwarding enabled caused a "failed to load driver: i965" error in the libGL library. With this update, a patch has been provided to fix this bug and drivers are now loaded as expected.

In addition, this update adds the following enhancements:

* An accelerated driver for Intel Core i5 and i7 processors has been added to the mesa packages.

* This update adds the new mesa-dril-drivers package to mesa. This package implements support for the DRI1 drivers.</description><release>Scientific Linux Fermi</release><issued date="2013-03-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mesa-dri1-drivers" release="8.el6" src="mesa-dri1-drivers-7.11-8.el6.src.rpm" version="7.11"><filename>mesa-dri1-drivers-7.11-8.el6.x86_64.rpm</filename><sum type="sha256">bc675fea14d75f0410fa89abf14e1f18c6b49c9e000ecea4c18367b60f665b3e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2013:0344" id="RHBA-2013:0344-1" title="Rhba-2013:0344-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=786508" id="786508" title="In Rhel6, Ssh Forwarded &amp;#39;Glxinfo&amp;#39; Returns &amp;Quot;Error: Couldn&amp;#39;T Find Rgb Glx Visual Or Fbconfig&amp;Quot; Against Old Rhel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=816661" id="816661" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=820746" id="820746" title="Opengl On Remote Rhel6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=835200" id="835200" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=835201" id="835201" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=885882" id="885882" title="Xorg Issues W/ Intel I915 Driver On Rhel 6.4 Beta" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=901627" id="901627" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2013:1716-1</id><title>Rsyslog Bug Fix Update</title><description>This update fixes the following bugs:

* The imgssapi module is initialized as soon as the configuration file reader encounters the $InputGSSServerRun directive in the /etc/rsyslog.conf configuration file. The supplementary options configured after $InputGSSServerRun are therefore ignored. For configuration to take effect, all imgssapi configuration options must be placed before $InputGSSServerRun. Previously, when this order was reversed, the rsyslogd daemon terminated unexpectedly with a segmentation fault. This bug has been fixed, and rsyslogd no longer crashes in the described scenario.

* Rsyslog directives used for controlling the file owner or group (FileOwner, FileGroup, DirOwner, DirGroup) translate names to numerical IDs only during rsyslogs's initialization. Previously, when user data were not available at rsyslogs's startup, IDs where not assigned to these log files. With this update, new directives that do not depend on the translation process have been added (FileOwnerId, FileGroupId, DirOwnerId, DirGroupId). As a result, log files are assigned the correct user or group ID even when user information is not available during rsyslog's startup.

* Due to a bug in the source code, the host name was replaced by an empty string if the $RepeatedMsgReduction directive was enabled. This bug has been fixed, and the host name is now stored correctly when $RepeatedMsgReduction is on.

* Prior to this update, the $FileGroup directive did not process groups larger than a certain size. Consequently, when this size was reached, the rsyslogd daemon failed to set the requested group and the root user was left as the owner of a file. This bug has been fixed and $FileGroup now creates groups properly in the described case.

* An erroneous patch in a previous release, which changed the implementation of the configuration file parser, caused the rsyslogd daemon to terminate unexpectedly with a segmentation fault for certain configurations. With this update, the patch has been removed, and file crashes no longer occur with the default configuration. However, the $IncludeConfig directive must be placed at the beginning of the /etc/rsyslog.conf configuration file before other directives. If there is need to use $IncludeConfig further in the file, users are advised to prepend it with a dummy action such as "syslog.debug /dev/null".

* Prior to this update, a numerical value of the PRI property was appended to the pri-text variable. The resulting pri-text value looked for example like "local0.info". With this update the suffix has been removed. Now, the variable only contains textual facility and severity values.

* Previously, an incorrect data type was set for the variable holding the spool file size limit. Consequently, the intended size limit was not accepted and a message loss could occur. With this update, the data type of the aforementioned variable has been corrected. As a result, spool files are set correctly with the user-defined size limit.</description><release>Scientific Linux Fermi</release><issued date="2014-02-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="rsyslog-gssapi" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-gssapi-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">5d71800ed9d6f1f67e96c4de421f341e703a93cfdaeaa2f3f17ec9b1ab5dfb2d</sum></package><package arch="x86_64" name="rsyslog-snmp" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-snmp-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">0fe238e67613eb8e122e62d771cd328d9d4579cec2abbe980cbde8ce05cdae15</sum></package><package arch="x86_64" name="rsyslog-relp" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-relp-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">29f4970012503ef815809165d01033cba1636da426144f07faa6c8c4af0d6c04</sum></package><package arch="x86_64" name="rsyslog-gnutls" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-gnutls-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">7130a1f882ca14ae1bc90281acb2cfdcc963b7596092e1e153bf1d1068db0260</sum></package><package arch="x86_64" name="rsyslog-mysql" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-mysql-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">325c8f3fe6281ddb47429363cc3a525a8e1700bb00033d543490e2f722f089ea</sum></package><package arch="x86_64" name="rsyslog" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">a6b92deca624b81680b3a0f5377e6d331d97654183a5e4af1be475ed41d360a1</sum></package><package arch="x86_64" name="rsyslog-pgsql" release="8.el6" src="rsyslog-5.8.10-8.el6.src.rpm" version="5.8.10"><filename>rsyslog-pgsql-5.8.10-8.el6.x86_64.rpm</filename><sum type="sha256">ce23b7a7dcc8ecb9bfc1a15c1b7b66e8bb42b95fee82e90522efa63f8d68af22</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=862517" id="862517" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=886117" id="886117" title="Add Support For Numeric Ids For Logfile Ownership" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=893197" id="893197" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=924754" id="924754" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=927405" id="927405" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=951727" id="951727" title="Untill Ver 6.2.0 Of Rsyslog, The %Pri-Text% Property Includes The Numeric String" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=963942" id="963942" title="Rsyslog Doesn&amp;#39;T Clear $Workdirectory For Disk-Assisted Queue When Remote Rsyslog Server Comes Back Online." type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2013-1716.html" id="RHBA-2013:1716-1" title="Rhba-2013:1716-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2013:1751-1</id><title>Openssl Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the OpenSSL code incorrectly used RDRAND instruction when running on Cyrix CPU, which does not support it. Consequently, the applications that use the OpenSSL utility terminated unexpectedly on startup. The detection of CPU features on Cyrix CPU has been fixed, and the applications using OpenSSL no longer crash in the described scenario.

* Prior to this update, the Transport Layer Security (TLS) client advertised support for some elliptic curves that are not supported by it. As a consequence, server could choose unsupported elliptic curve and client would not be able to communicate with the server over the TLS. With this update, OpenSSL TLS client advertises only the curves that are supported by it, and TLS communication with server (using also curves not supported by the Scientific Linux OpenSSL TLS client) can now be established.

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl" release="16.el6_5" src="openssl-1.0.1e-16.el6_5.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.i686.rpm</filename><sum type="sha256">8e6da949a6e62ac2fb353c6df307cfc86059bd3ae930271c975fea758d19149f</sum></package><package arch="i686" name="openssl-devel" release="16.el6_5" src="openssl-1.0.1e-16.el6_5.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.i686.rpm</filename><sum type="sha256">68cd7f2c1c5956122f32a1ebb0a7114e763b1ca9d9679477d3c9f40e37c7bc57</sum></package><package arch="x86_64" name="openssl-devel" release="16.el6_5" src="openssl-1.0.1e-16.el6_5.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.x86_64.rpm</filename><sum type="sha256">aa18483441f6c780e47e034921009c67184b5d404fbac92f39783a1788fbe138</sum></package><package arch="x86_64" name="openssl" release="16.el6_5" src="openssl-1.0.1e-16.el6_5.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.x86_64.rpm</filename><sum type="sha256">769c2fbc01906f55f0f9027ebc9c0c71663fc51df40dd0656f35793bed6e0e6a</sum></package><package arch="x86_64" name="openssl-static" release="16.el6_5" src="openssl-1.0.1e-16.el6_5.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-16.el6_5.x86_64.rpm</filename><sum type="sha256">f430c92a0f24f30c74facd2deffdbf6b8887019c16ad25822ad4bed97d4b7968</sum></package><package arch="x86_64" name="openssl-perl" release="16.el6_5" src="openssl-1.0.1e-16.el6_5.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-16.el6_5.x86_64.rpm</filename><sum type="sha256">9ece5e808d62429dedd377b8300a816895dcd021dd750c7f666ae12bb5ce7d0f</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025597" id="1025597" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025598" id="1025598" title="Openssl Advertises Support For Curves It Doesn&amp;#39;T Actually Support In Client Hello" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2013-1751.html" id="RHBA-2013:1751-1" title="Rhba-2013:1751-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:0101-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancement:

* This update retroactively changes the Daylight Saving Time (DST) rules for Fiji, which entered DST at 2:00 a.m. on Sunday, 19th of January, 2014 instead of the previously-scheduled 3:00 a.m.</description><release>Scientific Linux Fermi</release><issued date="2014-02-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2013i-2.el6.src.rpm" version="2013i"><filename>tzdata-java-2013i-2.el6.noarch.rpm</filename><sum type="sha256">98754c267522cbf45356e5a3aac5da6fa18ffbe3da6a4639cff29a2e82e24d1d</sum></package><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2013i-2.el6.src.rpm" version="2013i"><filename>tzdata-2013i-2.el6.noarch.rpm</filename><sum type="sha256">34e238df0312b5bde6ad6bb8e3444a81dcd42792268803a5d98e875193b577aa</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054919" id="1054919" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054921" id="1054921" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054922" id="1054922" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054923" id="1054923" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-0101.html" id="RHBA-2014:0101-1" title="Rhba-2014:0101-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:0295-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancement:

* The Turkish government decided to delay the start of daylight saving time (DST) in Turkey this year. DST will begin at 3 a.m. on Monday, March 31 instead of 3 a.m. on Sunday, March 30. The respective tzdata rules have been updated to reflect this change.</description><release>Scientific Linux Fermi</release><issued date="2014-03-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2014a-1.el6.src.rpm" version="2014a"><filename>tzdata-java-2014a-1.el6.noarch.rpm</filename><sum type="sha256">5227998dfd793415054f8fa4aca4047013325dbebd4f8c8d8fc69a472a03a1f2</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2014a-1.el6.src.rpm" version="2014a"><filename>tzdata-2014a-1.el6.noarch.rpm</filename><sum type="sha256">8e09786936ce5094909c0585450aa047e8b572c735166564156dc29276b305cb</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065926" id="1065926" title="Turkey Delays Dst Start By One Day" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065928" id="1065928" title="Turkey Delays Dst Start By One Day" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065930" id="1065930" title="Turkey Delays Dst Start By One Day" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-0295.html" id="RHBA-2014:0295-1" title="Rhba-2014:0295-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:0324-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the newly implemented functionality in the snmpd daemon did not work as it required the update of selinux-policy. To fix this bug, the net-snmp packages have been updated along with the selinux-policy update, and snmpd no longer fails.</description><release>Scientific Linux Fermi</release><issued date="2014-03-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-minimum" release="231.el6_5.1" src="selinux-policy-3.7.19-231.el6_5.1.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-231.el6_5.1.noarch.rpm</filename><sum type="sha256">212cef6f0fedd54815c27db7dc1d36af4bf34612df96465844e9713d2dcebfcd</sum></package><package arch="noarch" name="selinux-policy-doc" release="231.el6_5.1" src="selinux-policy-3.7.19-231.el6_5.1.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-231.el6_5.1.noarch.rpm</filename><sum type="sha256">8d637b31e3ed6147187425c4cf4b7d6b4bb8d1bcd1a475263402a5aca7876641</sum></package><package arch="noarch" name="selinux-policy-targeted" release="231.el6_5.1" src="selinux-policy-3.7.19-231.el6_5.1.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-231.el6_5.1.noarch.rpm</filename><sum type="sha256">d2dc4c70209887d0f19082c71093932237f2b0e4d1317882370669ef21fc2cd6</sum></package><package arch="noarch" name="selinux-policy-mls" release="231.el6_5.1" src="selinux-policy-3.7.19-231.el6_5.1.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-231.el6_5.1.noarch.rpm</filename><sum type="sha256">143b82e96cc75189788f448d51eb2875e9e9aa176aaa438e3eb98f5773cbb058</sum></package><package arch="noarch" name="selinux-policy" release="231.el6_5.1" src="selinux-policy-3.7.19-231.el6_5.1.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-231.el6_5.1.noarch.rpm</filename><sum type="sha256">65ca0e29e626b4b1a61f6466ca08e104c28ddbc24778c0ea7536975935e12d9c</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078275" id="1078275" title="Snmpd_T Needs To Be Able To Getattr On Disk Device Types" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-0324.html" id="RHBA-2014:0324-1" title="Rhba-2014:0324-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:0766-1</id><title>Libxml2 Bug Fix Update</title><description>This update fixes the following bug:

* The CVE-2014-0191 security fix for libxml2 changed the condition for loading external parameter entities. Additionally, after this fix, some patterns of validation, such as the "xmllint --postvalid" command, failed to execute, and KDE documents could not be generated correctly. This update fixes the aforementioned regression and allows "xmllint --postvalid" to work as expected.

The desktop must be restarted (log out, then log back in) for this update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2014-06-24 00:00:00" /><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libxml2" release="14.el6_5.2" src="libxml2-2.7.6-14.el6_5.2.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-14.el6_5.2.i686.rpm</filename><sum type="sha256">3087086c97102fafe6c77edf1f087ab9620758dbe9d8f8a2f4e62a0267889b15</sum></package><package arch="x86_64" name="libxml2" release="14.el6_5.2" src="libxml2-2.7.6-14.el6_5.2.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-14.el6_5.2.x86_64.rpm</filename><sum type="sha256">7cbc43bee26b5fdb4288172a446699aa2ef70f9f2bf8a3b27c43e0ca46766a90</sum></package><package arch="x86_64" name="libxml2-static" release="14.el6_5.2" src="libxml2-2.7.6-14.el6_5.2.src.rpm" version="2.7.6"><filename>libxml2-static-2.7.6-14.el6_5.2.x86_64.rpm</filename><sum type="sha256">4bdda249fdb5fc3f1a286b8946b49674c273c512e67ad5c68cb842ea001ab62a</sum></package><package arch="i686" name="libxml2-devel" release="14.el6_5.2" src="libxml2-2.7.6-14.el6_5.2.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-14.el6_5.2.i686.rpm</filename><sum type="sha256">33b7d95b26c6eabdb860ddac1afea274c7ff5f7b8abc083908879bf3ca49fcd7</sum></package><package arch="x86_64" name="libxml2-python" release="14.el6_5.2" src="libxml2-2.7.6-14.el6_5.2.src.rpm" version="2.7.6"><filename>libxml2-python-2.7.6-14.el6_5.2.x86_64.rpm</filename><sum type="sha256">df72b5dcda8b20cffc7ce49d25e973d2ea4caf1bd926a7ba135f06b9c49dab5f</sum></package><package arch="x86_64" name="libxml2-devel" release="14.el6_5.2" src="libxml2-2.7.6-14.el6_5.2.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-14.el6_5.2.x86_64.rpm</filename><sum type="sha256">3238e5d42aa0c7a191ded1c9b28d569a905b32372750e1642002743c02605fee</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1108161" id="1108161" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-0766.html" id="RHBA-2014:0766-1" title="Rhba-2014:0766-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:0777-1</id><title>Ql2500-Firmware Bug Fix And Enhancement Update</title><description>The ql2500-firmware packages have been upgraded to upstream version 7.03.00, which provides a number of bug fixes and enhancements over the previous version.</description><release>Scientific Linux Fermi</release><issued date="2014-06-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ql2500-firmware" release="1.el6_5" src="ql2500-firmware-7.03.00-1.el6_5.src.rpm" version="7.03.00"><filename>ql2500-firmware-7.03.00-1.el6_5.noarch.rpm</filename><sum type="sha256">64abe3d0099e73667379c8d1a1b2352bdc52f23a8ab10b672f13dff7f3de8295</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096071" id="1096071" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-0777.html" id="RHBA-2014:0777-1" title="Rhba-2014:0777-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:0778-1</id><title>Ql2400-Firmware Bug Fix And Enhancement Update</title><description>The ql2400-firmware packages have been upgraded to upstream version 7.03.00, which provides a number of bug fixes and enhancements over the previous version.</description><release>Scientific Linux Fermi</release><issued date="2014-06-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ql2400-firmware" release="1.el6_5" src="ql2400-firmware-7.03.00-1.el6_5.src.rpm" version="7.03.00"><filename>ql2400-firmware-7.03.00-1.el6_5.noarch.rpm</filename><sum type="sha256">cc5327ff81954cd17ced361360c6821684addf500dc80cb73a295c9e724c635f</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096070" id="1096070" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-0778.html" id="RHBA-2014:0778-1" title="Rhba-2014:0778-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1249-1</id><title>Firefox Bug Fix And Enhancement Update</title><description>The firefox packages have been upgraded to upstream version 31.1.0, which provides a number of bug fixes and enhancements over the previous version.

After installing the update, Firefox must be restarted for the changes to take effect.</description><release>Scientific Linux Fermi</release><issued date="2014-09-16 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="5.el6_5" src="firefox-31.1.0-5.el6_5.src.rpm" version="31.1.0"><filename>firefox-31.1.0-5.el6_5.i686.rpm</filename><sum type="sha256">aeaa3555f72896ec512cdca7cddcd22941e8f44b4c333adcec836e29125afaad</sum></package><package arch="x86_64" name="firefox" release="5.el6_5" src="firefox-31.1.0-5.el6_5.src.rpm" version="31.1.0"><filename>firefox-31.1.0-5.el6_5.x86_64.rpm</filename><sum type="sha256">66e50bffc990cba6eecf93851f23fdf1eb90a861a132c4a9d30f05ddbc85c28e</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1140689" id="1140689" title="[Rhel6] Rebase Mozilla Firefox/Thunderbird To 31-Esr After 24-Esr Is Eol" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1249.html" id="RHBA-2014:1249-1" title="Rhba-2014:1249-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1376-1</id><title>Xcb-Util, Xorg-X11-Drivers, And Mesa Bug Fix And Enhancement Update</title><description>The individual X.Org drivers, previously provided by the xorg-x11-drivers package, are included to allow installation of all drivers at once, without having to track which individual drivers are present on each architecture.

This package also provides Mesa 3D graphics API that is compatible with Open Graphics Library (OpenGL), as well as hardware-accelerated drivers for many popular graphics chips.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-server-Xephyr" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xephyr-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">103db71b01262883d9975ff0317f9933502a486b5113f7e5bf2fb6cac2b86b98</sum></package><package arch="i686" name="xorg-x11-drv-evdev-devel" release="4.el6" src="xorg-x11-drv-evdev-2.8.2-4.el6.src.rpm" version="2.8.2"><filename>xorg-x11-drv-evdev-devel-2.8.2-4.el6.i686.rpm</filename><sum type="sha256">766f8bdd420c6d5ae9cd0ea6a4329009092b9f61454ae828742ea3de26dc10ea</sum></package><package arch="x86_64" name="xorg-x11-drv-fbdev" release="16.el6" src="xorg-x11-drv-fbdev-0.4.3-16.el6.src.rpm" version="0.4.3"><filename>xorg-x11-drv-fbdev-0.4.3-16.el6.x86_64.rpm</filename><sum type="sha256">362b0fb42f41aa4e5e05fa0894cdbfbb8f9e1011419c76d64a70c3d285f6b62f</sum></package><package arch="i686" name="xcb-util-keysyms" release="5.el6" src="xcb-util-keysyms-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-keysyms-0.3.9-5.el6.i686.rpm</filename><sum type="sha256">b5b2a76d15df1b039f7be1bc8b063be1923d0b666a36f885465b8dd9a3741485</sum></package><package arch="i686" name="mesa-private-llvm" release="3.el6" src="mesa-private-llvm-3.4-3.el6.src.rpm" version="3.4"><filename>mesa-private-llvm-3.4-3.el6.i686.rpm</filename><sum type="sha256">29313f091759b8eadb3b50485daa1cb4dfb320939a9b4a739efb095c33293fb2</sum></package><package arch="x86_64" name="xorg-x11-drv-sis" release="10.el6" src="xorg-x11-drv-sis-0.10.7-10.el6.src.rpm" version="0.10.7"><filename>xorg-x11-drv-sis-0.10.7-10.el6.x86_64.rpm</filename><sum type="sha256">0c34236e9a2dfda336a4a995e6ccb7f40fa9af199d11dbaae25a2247f3c00b7b</sum></package><package arch="i686" name="mesa-libgbm" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libgbm-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">a64fbf719f6de97fcffa86883525ef7c612c5db20942f21262d6a00bcae421c0</sum></package><package arch="x86_64" name="xorg-x11-drv-tdfx" release="10.el6" src="xorg-x11-drv-tdfx-1.4.5-10.el6.src.rpm" version="1.4.5"><filename>xorg-x11-drv-tdfx-1.4.5-10.el6.x86_64.rpm</filename><sum type="sha256">e09869eb41c544c9f6dcfd77a175aae47b05472428298cf79720c32f3c99ec64</sum></package><package arch="x86_64" name="xorg-x11-drv-savage" release="2.el6" src="xorg-x11-drv-savage-2.3.7-2.el6.src.rpm" version="2.3.7"><filename>xorg-x11-drv-savage-2.3.7-2.el6.x86_64.rpm</filename><sum type="sha256">71f696d634e21e50e5312bd8f561d6fe6271f2042f6c1cbc7e2e1e10ee785ce6</sum></package><package arch="x86_64" name="mesa-dri-filesystem" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-dri-filesystem-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">ed50f835386ec159113c15f7937c0cb2840332693cfd1bac61c8fadc5a114052</sum></package><package arch="x86_64" name="mesa-private-llvm" release="3.el6" src="mesa-private-llvm-3.4-3.el6.src.rpm" version="3.4"><filename>mesa-private-llvm-3.4-3.el6.x86_64.rpm</filename><sum type="sha256">d45c5f918aa1aa7ef70b85acf83e086c9b0c0658f2b647c013083fb305a53135</sum></package><package arch="i686" name="mesa-private-llvm-devel" release="3.el6" src="mesa-private-llvm-3.4-3.el6.src.rpm" version="3.4"><filename>mesa-private-llvm-devel-3.4-3.el6.i686.rpm</filename><sum type="sha256">5e2869e42acf96bce0c3e730eda137bc17573503779bbb4c7916983ca54876bd</sum></package><package arch="x86_64" name="xorg-x11-drv-penmount" release="5.el6" src="xorg-x11-drv-penmount-1.5.0-5.el6.src.rpm" version="1.5.0"><filename>xorg-x11-drv-penmount-1.5.0-5.el6.x86_64.rpm</filename><sum type="sha256">12fb164a6f1862792592bae1df3f33b41de953822cf1796ae63c934b98929ee4</sum></package><package arch="x86_64" name="pixman-devel" release="4.el6" src="pixman-0.32.4-4.el6.src.rpm" version="0.32.4"><filename>pixman-devel-0.32.4-4.el6.x86_64.rpm</filename><sum type="sha256">a34542773fadb5fa1108533184bd21d8f22f3553286f7cdb78d301d709c0d86d</sum></package><package arch="x86_64" name="xorg-x11-apps" release="6.el6" src="xorg-x11-apps-7.7-6.el6.src.rpm" version="7.7"><filename>xorg-x11-apps-7.7-6.el6.x86_64.rpm</filename><sum type="sha256">23bfe674e3e7fda3b10d3fe737040091005a543eff4d3f6d586994c65b933ac0</sum></package><package arch="x86_64" name="mesa-libEGL" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libEGL-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">e254c0fd246e76b1d4c7427bc7191675a4c27bcec081b96935743c9e88164424</sum></package><package arch="x86_64" name="xorg-x11-drv-trident" release="10.el6" src="xorg-x11-drv-trident-1.3.6-10.el6.src.rpm" version="1.3.6"><filename>xorg-x11-drv-trident-1.3.6-10.el6.x86_64.rpm</filename><sum type="sha256">a40dd0c7ae11e6cf0ab59f5559ee2225dfbfcd3793772754aeb6c89ad1611d7d</sum></package><package arch="i686" name="mesa-libOSMesa" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libOSMesa-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">6155382cd61c67b0fc8c6e50652514b0419c0139469835c9db76598a583a3dd0</sum></package><package arch="x86_64" name="xorg-x11-drv-vesa" release="15.el6" src="xorg-x11-drv-vesa-2.3.2-15.el6.src.rpm" version="2.3.2"><filename>xorg-x11-drv-vesa-2.3.2-15.el6.x86_64.rpm</filename><sum type="sha256">6e1e28b6e422a428a193d0c7d971a3e43b08337fb1228ebddf4ec3e45e13a6c9</sum></package><package arch="x86_64" name="xorg-x11-drv-i740" release="11.el6" src="xorg-x11-drv-i740-1.3.4-11.el6.src.rpm" version="1.3.4"><filename>xorg-x11-drv-i740-1.3.4-11.el6.x86_64.rpm</filename><sum type="sha256">0c1ead0a765c8bfc9f4bda5faaaa28afdc594e308aa23809ace75e8d2062bea4</sum></package><package arch="i686" name="xcb-util" release="5.el6" src="xcb-util-0.3.6-5.el6.src.rpm" version="0.3.6"><filename>xcb-util-0.3.6-5.el6.i686.rpm</filename><sum type="sha256">efd4b98749d0c4b49a60be0e655e76a735216f6d5e51f786125367b2f2bb5ea7</sum></package><package arch="x86_64" name="xorg-x11-drv-acecad" release="7.el6" src="xorg-x11-drv-acecad-1.5.0-7.el6.src.rpm" version="1.5.0"><filename>xorg-x11-drv-acecad-1.5.0-7.el6.x86_64.rpm</filename><sum type="sha256">57ac255483242eef1bb57c5826e5b30929d455f6675dd9d90ce2028deaae2801</sum></package><package arch="i686" name="mesa-libEGL-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libEGL-devel-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">c49deb8108f5503a1ef0e4e3457da3811b565477b5fe2dfa5945a7a308309906</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev" release="4.el6" src="xorg-x11-drv-evdev-2.8.2-4.el6.src.rpm" version="2.8.2"><filename>xorg-x11-drv-evdev-2.8.2-4.el6.x86_64.rpm</filename><sum type="sha256">32d8949339d7c2b2b3bc39c61c6f23a0cd2ec8894df2f5ad10c5d1cafd792c36</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-devel-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">b543ff8c56bd66c823a4bde5032de8cf7d8cb88564ace0bc265638aac4b91f70</sum></package><package arch="x86_64" name="libdrm" release="4.el6" src="libdrm-2.4.52-4.el6.src.rpm" version="2.4.52"><filename>libdrm-2.4.52-4.el6.x86_64.rpm</filename><sum type="sha256">e0afcd0b66870e86483abd2c1d6ffe7820cea0bf129265f17b4bcc8f7806fb5a</sum></package><package arch="noarch" name="xorg-x11-drv-ati-firmware" release="2.el6" src="xorg-x11-drv-ati-7.3.99-2.el6.src.rpm" version="7.3.99"><filename>xorg-x11-drv-ati-firmware-7.3.99-2.el6.noarch.rpm</filename><sum type="sha256">1b1b28f3dd27383cd751d8231766ab851ce7d2250abfd70456619f8eb59458fa</sum></package><package arch="x86_64" name="xorg-x11-server-utils" release="2.el6" src="xorg-x11-server-utils-7.7-2.el6.src.rpm" version="7.7"><filename>xorg-x11-server-utils-7.7-2.el6.x86_64.rpm</filename><sum type="sha256">1a6ac81c63acabaa01ce79c3d88aa25fdc1a2cb85b791f11a1b87a65311552e0</sum></package><package arch="x86_64" name="xorg-x11-drv-mutouch" release="5.el6" src="xorg-x11-drv-mutouch-1.3.0-5.el6.src.rpm" version="1.3.0"><filename>xorg-x11-drv-mutouch-1.3.0-5.el6.x86_64.rpm</filename><sum type="sha256">b3693c83c8450207860a546cc57f6fadd5872fb56bce4ad49019ff9df1d9ae49</sum></package><package arch="i686" name="xcb-util-image-devel" release="4.el6" src="xcb-util-image-0.3.9-4.el6.src.rpm" version="0.3.9"><filename>xcb-util-image-devel-0.3.9-4.el6.i686.rpm</filename><sum type="sha256">77e51073a75616a87b981a5cdbf74624aa4d6afbe45ac7e72d397a198afa43bc</sum></package><package arch="x86_64" name="xorg-x11-drv-elographics" release="3.el6" src="xorg-x11-drv-elographics-1.4.1-3.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-elographics-1.4.1-3.el6.x86_64.rpm</filename><sum type="sha256">3b16ed08c59b78b96fb48e921f188cf99dc78eaff29360eb1bd1e9c0301f9ee9</sum></package><package arch="x86_64" name="xorg-x11-drv-mach64" release="8.el6" src="xorg-x11-drv-mach64-6.9.4-8.el6.src.rpm" version="6.9.4"><filename>xorg-x11-drv-mach64-6.9.4-8.el6.x86_64.rpm</filename><sum type="sha256">b34ab37b78f6c5777e248bc82da745b6e869cea48f29d57aff99b0528839b79f</sum></package><package arch="x86_64" name="xorg-x11-drv-v4l" release="36.el6" src="xorg-x11-drv-v4l-0.2.0-36.el6.src.rpm" version="0.2.0"><filename>xorg-x11-drv-v4l-0.2.0-36.el6.x86_64.rpm</filename><sum type="sha256">238e138a7b4e60ad1f43f038df27385e9d4ee5ad5e31899220ef4499e1dec898</sum></package><package arch="x86_64" name="xorg-x11-drv-qxl" release="15.el6" src="xorg-x11-drv-qxl-0.1.1-15.el6.src.rpm" version="0.1.1"><filename>xorg-x11-drv-qxl-0.1.1-15.el6.x86_64.rpm</filename><sum type="sha256">0d59cdd23ec61c553c00708719bad53b8a137cabf6848a178f1eb8c9e17969fc</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libOSMesa-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">fe5c3f7b12a8060e1de32a711a9a6360bf7f18b05a75d0d7a03e777d4eb9a9e5</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev-devel" release="4.el6" src="xorg-x11-drv-evdev-2.8.2-4.el6.src.rpm" version="2.8.2"><filename>xorg-x11-drv-evdev-devel-2.8.2-4.el6.x86_64.rpm</filename><sum type="sha256">c0f261fa86cc71c824273d3b77cb84ce1bff8942a65bc24af8fc41db4e569842</sum></package><package arch="x86_64" name="xcb-util-devel" release="5.el6" src="xcb-util-0.3.6-5.el6.src.rpm" version="0.3.6"><filename>xcb-util-devel-0.3.6-5.el6.x86_64.rpm</filename><sum type="sha256">094e411754430f093e46d7a83155cf3795565880ead433a0bd34452c979111ed</sum></package><package arch="x86_64" name="xorg-x11-drv-modesetting" release="14.el6" src="xorg-x11-drv-modesetting-0.8.0-14.el6.src.rpm" version="0.8.0"><filename>xorg-x11-drv-modesetting-0.8.0-14.el6.x86_64.rpm</filename><sum type="sha256">635a17e02e6eb6ae2aef43793731ccd4d49f38ed8bc3901d1c6844898a6eda8d</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome-devel" release="6.el6" src="xorg-x11-drv-openchrome-0.3.3-6.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-devel-0.3.3-6.el6.x86_64.rpm</filename><sum type="sha256">c20afb4c1536b47fe4e5cdf5ebc885b8c26432de7130eae0a88fdd2e1bafd6bd</sum></package><package arch="i686" name="xcb-util-image" release="4.el6" src="xcb-util-image-0.3.9-4.el6.src.rpm" version="0.3.9"><filename>xcb-util-image-0.3.9-4.el6.i686.rpm</filename><sum type="sha256">28f2f83fc96f40f9a69e0a37bc07e153acf26a0c88a10428ba422a98a717f699</sum></package><package arch="x86_64" name="xcb-util-image-devel" release="4.el6" src="xcb-util-image-0.3.9-4.el6.src.rpm" version="0.3.9"><filename>xcb-util-image-devel-0.3.9-4.el6.x86_64.rpm</filename><sum type="sha256">fea29958d88b3d64ee2257881336802595463048a081bd3a30c3d9aa1ca01862</sum></package><package arch="i686" name="xorg-x11-drv-mouse-devel" release="1.el6" src="xorg-x11-drv-mouse-1.9.0-1.el6.src.rpm" version="1.9.0"><filename>xorg-x11-drv-mouse-devel-1.9.0-1.el6.i686.rpm</filename><sum type="sha256">26b830a6dc2f0e713b97c4f5672864e198e09b498457c02e18eced070a91f391</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom" release="4.el6" src="xorg-x11-drv-wacom-0.23.0-4.el6.src.rpm" version="0.23.0"><filename>xorg-x11-drv-wacom-0.23.0-4.el6.x86_64.rpm</filename><sum type="sha256">64692ba461e746dec31ede2c08cacfc7416aa2653b639fcdb5a4e7a0aeb73c3e</sum></package><package arch="x86_64" name="xorg-x11-drv-cirrus" release="2.el6" src="xorg-x11-drv-cirrus-1.5.2-2.el6.src.rpm" version="1.5.2"><filename>xorg-x11-drv-cirrus-1.5.2-2.el6.x86_64.rpm</filename><sum type="sha256">4fe68f6c3cd377e64670c333d7a72073e77b50c4343d89d9e2a3ae99b2608b0d</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics-devel" release="1.el6" src="xorg-x11-drv-synaptics-1.7.6-1.el6.src.rpm" version="1.7.6"><filename>xorg-x11-drv-synaptics-devel-1.7.6-1.el6.x86_64.rpm</filename><sum type="sha256">ad963fa1bfa3048756b5fa33f21d951de09c12c878a3fcec35428799dbdbd5f1</sum></package><package arch="x86_64" name="xorg-x11-drv-intel-devel" release="6.el6" src="xorg-x11-drv-intel-2.99.911-6.el6.src.rpm" version="2.99.911"><filename>xorg-x11-drv-intel-devel-2.99.911-6.el6.x86_64.rpm</filename><sum type="sha256">16c142002b1fc0fb2b5e525c4f0fa8de44854885d5d802a510ec3b0cf1221159</sum></package><package arch="i686" name="pixman" release="4.el6" src="pixman-0.32.4-4.el6.src.rpm" version="0.32.4"><filename>pixman-0.32.4-4.el6.i686.rpm</filename><sum type="sha256">f173514407e82be1ce1e9cd63989f26ba7db9eda6ffd4d9406f45b63c97d63c9</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-dri-drivers-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">fbc13786eb47b0a8509dedbeb2b44858aeb845200afd4df376b21821afb19118</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xdmx-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">27cd8d55bb5d341dc0701e7671a25fa4d7be658af7f5eb5b7ef1453e07b2e353</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics" release="1.el6" src="xorg-x11-drv-synaptics-1.7.6-1.el6.src.rpm" version="1.7.6"><filename>xorg-x11-drv-synaptics-1.7.6-1.el6.x86_64.rpm</filename><sum type="sha256">a440a4f7f47c4c1ef9b91666218ca958798458cc149953e5a8430944b2ee7ab1</sum></package><package arch="i686" name="xorg-x11-drv-openchrome-devel" release="6.el6" src="xorg-x11-drv-openchrome-0.3.3-6.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-devel-0.3.3-6.el6.i686.rpm</filename><sum type="sha256">9d6b01c6e3637cf01683c40479537d907d062ef06eed09d45bf0f7132fcc65b3</sum></package><package arch="x86_64" name="xorg-x11-drv-ast" release="1.el6" src="xorg-x11-drv-ast-0.98.0-1.el6.src.rpm" version="0.98.0"><filename>xorg-x11-drv-ast-0.98.0-1.el6.x86_64.rpm</filename><sum type="sha256">f8ecbaa340d5ef3ae2db9c6e77a65839342d37e5384957c900c304191e0670f6</sum></package><package arch="x86_64" name="xorg-x11-drv-apm" release="10.el6" src="xorg-x11-drv-apm-1.2.5-10.el6.src.rpm" version="1.2.5"><filename>xorg-x11-drv-apm-1.2.5-10.el6.x86_64.rpm</filename><sum type="sha256">30cab3efd2b34e9fcfc226a6e9e5ea1f5f3e5ada5edcfcbdd69e14c90113ac77</sum></package><package arch="x86_64" name="xorg-x11-drv-voodoo" release="10.el6" src="xorg-x11-drv-voodoo-1.2.5-10.el6.src.rpm" version="1.2.5"><filename>xorg-x11-drv-voodoo-1.2.5-10.el6.x86_64.rpm</filename><sum type="sha256">d533272b4b1345dc5717282b7bff718c4e130d77c23eeb513e2064eb9ebde079</sum></package><package arch="x86_64" name="xorg-x11-drv-aiptek" release="5.el6" src="xorg-x11-drv-aiptek-1.4.1-5.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-aiptek-1.4.1-5.el6.x86_64.rpm</filename><sum type="sha256">bb816bf921541fdae5c3ac0e3575c9a12371a13f0bf7d76b287367ff6f645368</sum></package><package arch="x86_64" name="xorg-x11-drv-r128" release="8.el6" src="xorg-x11-drv-r128-6.9.1-8.el6.src.rpm" version="6.9.1"><filename>xorg-x11-drv-r128-6.9.1-8.el6.x86_64.rpm</filename><sum type="sha256">eb8d6f3d6d0ad5695e4864cf74f33b3d35f1bac1d4f4a637a833b6a5ca10cf28</sum></package><package arch="x86_64" name="xorg-x11-drv-siliconmotion" release="9.el6" src="xorg-x11-drv-siliconmotion-1.7.7-9.el6.src.rpm" version="1.7.7"><filename>xorg-x11-drv-siliconmotion-1.7.7-9.el6.x86_64.rpm</filename><sum type="sha256">e5e70d080121f4b4cc6a0667cd9d3dd69efbaffcab86e7b76551c272c73193df</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGL-devel-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">99e7ee94a8ee1846f0a54f420524382a9a0c8c88fe935f146698ae3047463d85</sum></package><package arch="x86_64" name="xorg-x11-drv-xgi" release="20.20121114git.el6" src="xorg-x11-drv-xgi-1.6.0-20.20121114git.el6.src.rpm" version="1.6.0"><filename>xorg-x11-drv-xgi-1.6.0-20.20121114git.el6.x86_64.rpm</filename><sum type="sha256">69a9703fcc001768feed8ffe7c487bc6621827e02b5f0b2b00135600d043afa0</sum></package><package arch="x86_64" name="xorg-x11-drv-i128" release="10.el6" src="xorg-x11-drv-i128-1.3.6-10.el6.src.rpm" version="1.3.6"><filename>xorg-x11-drv-i128-1.3.6-10.el6.x86_64.rpm</filename><sum type="sha256">e06f89d3ed31ebbc67ea8c10d31ec90c418cc9fa00714c5d5d996da884703a31</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xvfb-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">c452e93aa97093e60ef8a04fef4c49e839dab520978bea54f0105948f893aac8</sum></package><package arch="i686" name="xcb-util-wm-devel" release="5.el6" src="xcb-util-wm-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-wm-devel-0.3.9-5.el6.i686.rpm</filename><sum type="sha256">e17365c0aadb02dbf45627db3f35481d66659e392e14e8dd7bb083c93dd4c67a</sum></package><package arch="x86_64" name="xorg-x11-drv-void" release="23.el6" src="xorg-x11-drv-void-1.4.0-23.el6.src.rpm" version="1.4.0"><filename>xorg-x11-drv-void-1.4.0-23.el6.x86_64.rpm</filename><sum type="sha256">647463498c0ee8a465c0050dd052fdb289139ad62136e0fa1f6aa9bff982736d</sum></package><package arch="x86_64" name="xorg-x11-drv-hyperpen" release="5.el6" src="xorg-x11-drv-hyperpen-1.4.1-5.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-hyperpen-1.4.1-5.el6.x86_64.rpm</filename><sum type="sha256">45a2906d5f20c3dff4e01d64ab3ff2d21baea599fa161a22cd3b32952f323fc0</sum></package><package arch="x86_64" name="mesa-demos" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-demos-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">47af8851d1b29bd23815d85d8673fb78fd7ecc46686fdbd3acc4c21dc5b3bce4</sum></package><package arch="x86_64" name="mesa-libGLU-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGLU-devel-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">4b1bc0d8defd953346db59a500a24bd7eccdef9f5bb102b624dbca42207b355c</sum></package><package arch="i686" name="mesa-libEGL" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libEGL-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">9a66af454eb6757f26a479ea5fda3b73ff86365f56f6cb5bf8545f2ac25de7bc</sum></package><package arch="i686" name="xorg-x11-drv-synaptics-devel" release="1.el6" src="xorg-x11-drv-synaptics-1.7.6-1.el6.src.rpm" version="1.7.6"><filename>xorg-x11-drv-synaptics-devel-1.7.6-1.el6.i686.rpm</filename><sum type="sha256">7c84d6e6c105bc3458a02f5189c0836a23ed1c88a4333a5b3356744fc2ecf69c</sum></package><package arch="i686" name="xcb-util-wm" release="5.el6" src="xcb-util-wm-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-wm-0.3.9-5.el6.i686.rpm</filename><sum type="sha256">9760a7df3ddd5c84d02c9a758aa06f781ac011d099b42f4478bb6cb8a6fe741e</sum></package><package arch="x86_64" name="xorg-x11-drv-ati" release="2.el6" src="xorg-x11-drv-ati-7.3.99-2.el6.src.rpm" version="7.3.99"><filename>xorg-x11-drv-ati-7.3.99-2.el6.x86_64.rpm</filename><sum type="sha256">050c352ba80f092b4eacf05fae3a225fc018f54703ea39752438d5d369dbc6e3</sum></package><package arch="x86_64" name="xorg-x11-glamor" release="5.20140506gitf78901e.el6" src="xorg-x11-glamor-0.6.0-5.20140506gitf78901e.el6.src.rpm" version="0.6.0"><filename>xorg-x11-glamor-0.6.0-5.20140506gitf78901e.el6.x86_64.rpm</filename><sum type="sha256">d448dffeb5195b4e0fee6c7248e811cd09f1b5347d9d85b7acc18b47cd62df49</sum></package><package arch="x86_64" name="xorg-x11-drv-glint" release="10.el6" src="xorg-x11-drv-glint-1.2.8-10.el6.src.rpm" version="1.2.8"><filename>xorg-x11-drv-glint-1.2.8-10.el6.x86_64.rpm</filename><sum type="sha256">5a3cda4f0e7b608436f4e0b4c1bbfd78e12d365243f362b8e24f2eb287624594</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome" release="6.el6" src="xorg-x11-drv-openchrome-0.3.3-6.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-0.3.3-6.el6.x86_64.rpm</filename><sum type="sha256">2671bdd185aefc7af07787ede439e84b1bfb1487ae14832c3ca6979398dc5e17</sum></package><package arch="i686" name="xorg-x11-drv-intel" release="6.el6" src="xorg-x11-drv-intel-2.99.911-6.el6.src.rpm" version="2.99.911"><filename>xorg-x11-drv-intel-2.99.911-6.el6.i686.rpm</filename><sum type="sha256">901f4d45627c48d199374c335989e3ce309aac4ff281568c742b4296eacd46a3</sum></package><package arch="x86_64" name="xorg-x11-drv-sisusb" release="10.el6" src="xorg-x11-drv-sisusb-0.9.6-10.el6.src.rpm" version="0.9.6"><filename>xorg-x11-drv-sisusb-0.9.6-10.el6.x86_64.rpm</filename><sum type="sha256">b4b46407f583ab16660bff2a2664fb74647ad2803e4b5d6c5a30245b055e5f48</sum></package><package arch="x86_64" name="xorg-x11-drv-mga" release="5.el6" src="xorg-x11-drv-mga-1.6.3-5.el6.src.rpm" version="1.6.3"><filename>xorg-x11-drv-mga-1.6.3-5.el6.x86_64.rpm</filename><sum type="sha256">2cb2b8bd04ec9c4a8cb27b920656000c3a1d028aeb622ef787e552075f921d4d</sum></package><package arch="x86_64" name="xorg-x11-drv-vmmouse" release="2.el6" src="xorg-x11-drv-vmmouse-13.0.0-2.el6.src.rpm" version="13.0.0"><filename>xorg-x11-drv-vmmouse-13.0.0-2.el6.x86_64.rpm</filename><sum type="sha256">eb1a9d0498942d7d5d0f20071dd0c86c1359d3a2a20b5e416f36be1fce16d851</sum></package><package arch="i686" name="mesa-libGL" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGL-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">7b3d61b0cb9d537bf5b72a2e6b6e737a95bee3356b33a53d6c6bcd3e815395f0</sum></package><package arch="i686" name="mesa-libGLU" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGLU-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">d611c1787b4be661ac097ecaec77f225e0a35a5fd7c47244d271a5aff712b873</sum></package><package arch="x86_64" name="xorg-x11-drv-vmware" release="9.el6" src="xorg-x11-drv-vmware-13.0.1-9.el6.src.rpm" version="13.0.1"><filename>xorg-x11-drv-vmware-13.0.1-9.el6.x86_64.rpm</filename><sum type="sha256">553df586f35ac9d3399d04e48072fc563fa9a1bfb1a4a0f11a2b27457b821d80</sum></package><package arch="i686" name="libdrm-devel" release="4.el6" src="libdrm-2.4.52-4.el6.src.rpm" version="2.4.52"><filename>libdrm-devel-2.4.52-4.el6.i686.rpm</filename><sum type="sha256">a1fdcf47e5658e4f571924798ace95cd8c2397d376b7dc3357b25c0fe37a2119</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libOSMesa-devel-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">9743f9b99816939b3c00eb1db3d76da70e100352a7efe45124936f7b02d97629</sum></package><package arch="x86_64" name="xorg-x11-drv-s3virge" release="10.el6" src="xorg-x11-drv-s3virge-1.10.6-10.el6.src.rpm" version="1.10.6"><filename>xorg-x11-drv-s3virge-1.10.6-10.el6.x86_64.rpm</filename><sum type="sha256">5b987d141aeaabc85a2e64696d26273714de8f9105f81553a86ec31de2cb17b3</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-common-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">933f211a5f0edd1afeecad9c0ca2494859c4986aacb66b310020726bacb29421</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xnest-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">aa25373863c08a779b24604f92887bcbaa4bb8cbd991285503cf3f28649d14a1</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse" release="1.el6" src="xorg-x11-drv-mouse-1.9.0-1.el6.src.rpm" version="1.9.0"><filename>xorg-x11-drv-mouse-1.9.0-1.el6.x86_64.rpm</filename><sum type="sha256">9e4eb2e09bf42f83046322ab6f23d72e4d43e15e95c6f053a17a14961c5c4a56</sum></package><package arch="i686" name="xcb-util-keysyms-devel" release="5.el6" src="xcb-util-keysyms-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-keysyms-devel-0.3.9-5.el6.i686.rpm</filename><sum type="sha256">8c98496725f77b3cdbcb205ee237a6b5d5e7dec570d05ed61f1e66d2e581d60d</sum></package><package arch="i686" name="mesa-dri-filesystem" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-dri-filesystem-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">06999caa8af471a2f16974b261aadf63a34304ca730abe3de2821baea4e06478</sum></package><package arch="x86_64" name="xcb-util-wm" release="5.el6" src="xcb-util-wm-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-wm-0.3.9-5.el6.x86_64.rpm</filename><sum type="sha256">a71142fc23d6b3d365547dcc81c5d71e686ebccc4757dbba607bd85a7b3072da</sum></package><package arch="i686" name="mesa-libGL-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGL-devel-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">2e04a8306d62519426805c520ca2b14bc635d44f3607b34df7c14c42691ab596</sum></package><package arch="x86_64" name="xorg-x11-drv-intel" release="6.el6" src="xorg-x11-drv-intel-2.99.911-6.el6.src.rpm" version="2.99.911"><filename>xorg-x11-drv-intel-2.99.911-6.el6.x86_64.rpm</filename><sum type="sha256">970f427106616dff962c307f254d686403e4f8879c45dc7b0bd1beb6515c287f</sum></package><package arch="x86_64" name="xorg-x11-drv-keyboard" release="1.el6" src="xorg-x11-drv-keyboard-1.8.0-1.el6.src.rpm" version="1.8.0"><filename>xorg-x11-drv-keyboard-1.8.0-1.el6.x86_64.rpm</filename><sum type="sha256">94e93bde5b24f93e2b6733461b7c3804df746fee0f34a5ea19b11fa58f5dbde4</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xorg-1.15.0-22.sl6.x86_64.rpm</filename><sum type="sha256">92034262e89f40a4321b457a30f5a436accced5defe66491ff40733e5abbddf6</sum></package><package arch="i686" name="pixman-devel" release="4.el6" src="pixman-0.32.4-4.el6.src.rpm" version="0.32.4"><filename>pixman-devel-0.32.4-4.el6.i686.rpm</filename><sum type="sha256">be432d4dba2fe35cb07ec0c0ee575184126201cb2f0fd6e2b09b1c95d63dde6d</sum></package><package arch="i686" name="libdrm" release="4.el6" src="libdrm-2.4.52-4.el6.src.rpm" version="2.4.52"><filename>libdrm-2.4.52-4.el6.i686.rpm</filename><sum type="sha256">c6a39c35601c3921c2148e14436ce3d226f6058e1bbd15cdef0c6041791c8c2d</sum></package><package arch="x86_64" name="mesa-libGL" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGL-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">518dc4dfd8c8d1d4e7002646a8f4fc96c6ad8f2de83fab4ed42f5de84dcae20c</sum></package><package arch="x86_64" name="mesa-private-llvm-devel" release="3.el6" src="mesa-private-llvm-3.4-3.el6.src.rpm" version="3.4"><filename>mesa-private-llvm-devel-3.4-3.el6.x86_64.rpm</filename><sum type="sha256">1f6f9960f14749889831de79387c44c3185702e04497a9d3de1d8794076cad1f</sum></package><package arch="x86_64" name="libdrm-devel" release="4.el6" src="libdrm-2.4.52-4.el6.src.rpm" version="2.4.52"><filename>libdrm-devel-2.4.52-4.el6.x86_64.rpm</filename><sum type="sha256">62837ea307f8e564ab701bffc06138bc7c6759de0fc8d25c483d52ba42c23294</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse-devel" release="1.el6" src="xorg-x11-drv-mouse-1.9.0-1.el6.src.rpm" version="1.9.0"><filename>xorg-x11-drv-mouse-devel-1.9.0-1.el6.x86_64.rpm</filename><sum type="sha256">8b5a3a842bf69b2d2061c0cad9be97b0c44ee300eae9c75344563bc1e458da58</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom-devel" release="4.el6" src="xorg-x11-drv-wacom-0.23.0-4.el6.src.rpm" version="0.23.0"><filename>xorg-x11-drv-wacom-devel-0.23.0-4.el6.x86_64.rpm</filename><sum type="sha256">4fda7484263f90a90a55b213a91ed473ec102b5f1bd88f209ac4952714f67f4e</sum></package><package arch="i686" name="xorg-x11-server-devel" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-devel-1.15.0-22.sl6.i686.rpm</filename><sum type="sha256">38751224fb74e24d4ea6e11926a65d0091df8bc6e29795504b0cc3eafaac2464</sum></package><package arch="i686" name="xcb-util-devel" release="5.el6" src="xcb-util-0.3.6-5.el6.src.rpm" version="0.3.6"><filename>xcb-util-devel-0.3.6-5.el6.i686.rpm</filename><sum type="sha256">24125b84889ce51b40ae356854c025d84d457b05bf8e0bd676612bdf7e7d83d1</sum></package><package arch="i686" name="mesa-libgbm-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libgbm-devel-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">af48197dbe9ca31661426acc7f400e3aa272b39ac3cef1ebfdfc22b2ba392eaa</sum></package><package arch="x86_64" name="mesa-libgbm" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libgbm-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">963d3d666e4898e9d3e608be06456ea35fed673b58aa12011d901e4a2c36a72f</sum></package><package arch="x86_64" name="xcb-util" release="5.el6" src="xcb-util-0.3.6-5.el6.src.rpm" version="0.3.6"><filename>xcb-util-0.3.6-5.el6.x86_64.rpm</filename><sum type="sha256">6396cbf76209d6378c5afc67a84ba9bea96d59ca52683629f33474f5d6db78d5</sum></package><package arch="x86_64" name="xorg-x11-drv-nv" release="5.el6" src="xorg-x11-drv-nv-2.1.20-5.el6.src.rpm" version="2.1.20"><filename>xorg-x11-drv-nv-2.1.20-5.el6.x86_64.rpm</filename><sum type="sha256">5be04258727747228ebf4f2058156aee8f6e4d3ff05fa2a6b71fa856a1d24f40</sum></package><package arch="i686" name="xorg-x11-drv-intel-devel" release="6.el6" src="xorg-x11-drv-intel-2.99.911-6.el6.src.rpm" version="2.99.911"><filename>xorg-x11-drv-intel-devel-2.99.911-6.el6.i686.rpm</filename><sum type="sha256">9f1facde401631f122c646a18734a14145b44128c4254dd78f0670645fb1fc73</sum></package><package arch="i686" name="mesa-libGLU-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGLU-devel-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">0e5c6d3704f2cd0e8500474c3fa8bb485b5630d7c79bf1351490c9ffe7ee8b8f</sum></package><package arch="x86_64" name="xcb-util-image" release="4.el6" src="xcb-util-image-0.3.9-4.el6.src.rpm" version="0.3.9"><filename>xcb-util-image-0.3.9-4.el6.x86_64.rpm</filename><sum type="sha256">249722c713ca6464f899de7c5edf0448e23fe7d33008279f5dd5b295c0bdd54b</sum></package><package arch="x86_64" name="mesa-libGLU" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libGLU-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">2d2cbbf6d4482ea8089a1315489975413baccf8c96d54048c920c26e7de5a034</sum></package><package arch="x86_64" name="xorg-x11-drv-rendition" release="10.el6" src="xorg-x11-drv-rendition-4.2.5-10.el6.src.rpm" version="4.2.5"><filename>xorg-x11-drv-rendition-4.2.5-10.el6.x86_64.rpm</filename><sum type="sha256">f66b2a21acbde5524a6590bab5e650c9b504674e4fe0e535cfac125895e3fb18</sum></package><package arch="x86_64" name="xcb-util-keysyms" release="5.el6" src="xcb-util-keysyms-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-keysyms-0.3.9-5.el6.x86_64.rpm</filename><sum type="sha256">afacfbb9bbd233bbef6b6c05834e3bfe5ee7eb72e2dd5686e4145300d2f66b2d</sum></package><package arch="x86_64" name="xorg-x11-glamor-devel" release="5.20140506gitf78901e.el6" src="xorg-x11-glamor-0.6.0-5.20140506gitf78901e.el6.src.rpm" version="0.6.0"><filename>xorg-x11-glamor-devel-0.6.0-5.20140506gitf78901e.el6.x86_64.rpm</filename><sum type="sha256">a4da1a77fff1f5b3ae56a6fc17a60e1847860fecdc21cb0e076ec6e0df685603</sum></package><package arch="i686" name="xorg-x11-glamor" release="5.20140506gitf78901e.el6" src="xorg-x11-glamor-0.6.0-5.20140506gitf78901e.el6.src.rpm" version="0.6.0"><filename>xorg-x11-glamor-0.6.0-5.20140506gitf78901e.el6.i686.rpm</filename><sum type="sha256">7d378f58de5d640b3ea4c0493c1dd9effa9d29cac93a49eaa0e197ecfc3d3803</sum></package><package arch="x86_64" name="xcb-util-wm-devel" release="5.el6" src="xcb-util-wm-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-wm-devel-0.3.9-5.el6.x86_64.rpm</filename><sum type="sha256">653930708ac0cf64733887d66dee1244c91f74f7f23e1608da736ccf42516bc4</sum></package><package arch="i686" name="xorg-x11-drv-wacom-devel" release="4.el6" src="xorg-x11-drv-wacom-0.23.0-4.el6.src.rpm" version="0.23.0"><filename>xorg-x11-drv-wacom-devel-0.23.0-4.el6.i686.rpm</filename><sum type="sha256">c424c481d93a013a3f70bd074fd82556a3107ad28805c70a3e61f44cdcbd04f6</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libOSMesa-devel-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">d442805f1ffb97a87ddb34daf4a7092553f03a61353e39d12065794b529d4a29</sum></package><package arch="i686" name="xorg-x11-glamor-devel" release="5.20140506gitf78901e.el6" src="xorg-x11-glamor-0.6.0-5.20140506gitf78901e.el6.src.rpm" version="0.6.0"><filename>xorg-x11-glamor-devel-0.6.0-5.20140506gitf78901e.el6.i686.rpm</filename><sum type="sha256">4d940f037d748f0663f62d1d4de2c3b3bdd0ce7569397ede2d9100f8df06d467</sum></package><package arch="x86_64" name="pixman" release="4.el6" src="pixman-0.32.4-4.el6.src.rpm" version="0.32.4"><filename>pixman-0.32.4-4.el6.x86_64.rpm</filename><sum type="sha256">9d7f9990fe1d4b5416c80e535679692d30e54dd46532def0e12ecbcce138d9b4</sum></package><package arch="noarch" name="xorg-x11-server-source" release="22.sl6" src="xorg-x11-server-1.15.0-22.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-source-1.15.0-22.sl6.noarch.rpm</filename><sum type="sha256">8c680e5bbc2b7ca04922efba17dd8599941d89821ad3dcb15f310093792d376c</sum></package><package arch="x86_64" epoch="1" name="xorg-x11-drv-nouveau" release="1.el6" src="xorg-x11-drv-nouveau-1.0.10-1.el6.src.rpm" version="1.0.10"><filename>xorg-x11-drv-nouveau-1.0.10-1.el6.x86_64.rpm</filename><sum type="sha256">857ef2b6968741300bc41150a91588db7aae2564a20b4b049a8fcaef386797cd</sum></package><package arch="i686" name="xorg-x11-drv-openchrome" release="6.el6" src="xorg-x11-drv-openchrome-0.3.3-6.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-0.3.3-6.el6.i686.rpm</filename><sum type="sha256">c5517ec9af63cc3fb24e0e37f10cd4f9e62add717e66281aeb6553ebae18d9c2</sum></package><package arch="x86_64" name="xorg-x11-drv-dummy" release="15.el6" src="xorg-x11-drv-dummy-0.3.6-15.el6.src.rpm" version="0.3.6"><filename>xorg-x11-drv-dummy-0.3.6-15.el6.x86_64.rpm</filename><sum type="sha256">6a36e8e96c9c85ef57405967dadcbaa9a3d90afc99769d1caee9c1231d3f2eac</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libEGL-devel-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">45ccbbbb1815ee9d205c91a8a3182ba9ba049ff6b046891f32d2215b642607d1</sum></package><package arch="i686" name="mesa-dri-drivers" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-dri-drivers-10.1.2-2.el6.i686.rpm</filename><sum type="sha256">ea290a609bae27d40723c6ba5c5846df5e181b8691924a8ef991d3d81c1fcd52</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="2.el6" src="mesa-10.1.2-2.el6.src.rpm" version="10.1.2"><filename>mesa-libgbm-devel-10.1.2-2.el6.x86_64.rpm</filename><sum type="sha256">e64e53de55d34109d169473a46ce8fa282c626571298c290c11b5f54fd46e1ce</sum></package><package arch="x86_64" name="xorg-x11-drv-fpit" release="6.el6" src="xorg-x11-drv-fpit-1.4.0-6.el6.src.rpm" version="1.4.0"><filename>xorg-x11-drv-fpit-1.4.0-6.el6.x86_64.rpm</filename><sum type="sha256">73825da0b43862abd04235ec487e221378bf00a112b620d1638ee7870cec987a</sum></package><package arch="x86_64" name="xcb-util-keysyms-devel" release="5.el6" src="xcb-util-keysyms-0.3.9-5.el6.src.rpm" version="0.3.9"><filename>xcb-util-keysyms-devel-0.3.9-5.el6.x86_64.rpm</filename><sum type="sha256">6f2efc169599b9e2080caf82051247e85d67da8f57c3c00c86b7210414a43856</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1001757" id="1001757" title="Regression: Xorg -Configure Stopped Working" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026577" id="1026577" title="Unexpected Touchpad Behaviour On Lenovo T440" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1038082" id="1038082" title="Xorg-X11-Server 1.13.0-11.1.El6_4.2 Freezes Up Intermittently (Happens Usually Using Mozilla Firefox)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056011" id="1056011" title="Libglamoregl Causes Some 3Rd Party Drivers To Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1061543" id="1061543" title="Out-Of-Bounds Access In Xsetdevicebuttonmapping" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1071697" id="1071697" title="Synaptics Mt Axes Are Initialized With The Wrong Axis Number" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078370" id="1078370" title="Rebase Apm Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078372" id="1078372" title="Rebase Ast Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078373" id="1078373" title="Rebase Ati Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078374" id="1078374" title="Rebase Cirrus Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078375" id="1078375" title="Rebase Dummy Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078376" id="1078376" title="Rebase Fbdev Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078377" id="1078377" title="Rebase Geode Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078378" id="1078378" title="Rebase Glint Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078379" id="1078379" title="Rebase I128 Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078380" id="1078380" title="Rebase I740 Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078381" id="1078381" title="Rebase Intel Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078382" id="1078382" title="Rebase Mach64 Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078383" id="1078383" title="Rebase Mga Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078384" id="1078384" title="Rebase Modesetting Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078386" id="1078386" title="Rebase Neomagic Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078387" id="1078387" title="Rebase Nouveau Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078388" id="1078388" title="Rebase Nv Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078389" id="1078389" title="Rebase Openchrome Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078390" id="1078390" title="Rebase Qxl Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078391" id="1078391" title="Rebase R128 Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078392" id="1078392" title="Rebase Rendition Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078394" id="1078394" title="Rebase S3Virge Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078395" id="1078395" title="Rebase Savage Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078396" id="1078396" title="Rebase Siliconmotion Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078397" id="1078397" title="Rebase Sis Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078398" id="1078398" title="Rebase Sisusb Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078399" id="1078399" title="Rebase Tdfx Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078400" id="1078400" title="Rebase Trident Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078401" id="1078401" title="Rebase V4L Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078402" id="1078402" title="Rebase Vesa Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078403" id="1078403" title="Rebase Vmware Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078404" id="1078404" title="Rebase Voodoo Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078405" id="1078405" title="Rebase Xgi Driver In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078410" id="1078410" title="Rebase Xorg-X11-Apps In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078412" id="1078412" title="Rebase Xorg-X11-Glamor In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078413" id="1078413" title="Rebase Xorg-X11-Proto-Devel In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078414" id="1078414" title="Rebase Xorg-X11-Xtrans-Devel In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078415" id="1078415" title="Rebase Xcb-Proto In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078416" id="1078416" title="Rebase Xcb-Util In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078417" id="1078417" title="Rebase Libpciaccess In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078418" id="1078418" title="Rebase Pixman In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078419" id="1078419" title="Rebase Mesa In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078420" id="1078420" title="Rebase Mesa-Private-Llvm In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078422" id="1078422" title="Rebase Libdrm In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1084244" id="1084244" title="Processing An Event From A Disabled Device Causes Null-Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1086356" id="1086356" title="On Rhel6.6, Libdrm Update Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1088988" id="1088988" title="Rebase Xorg-X11-Server-Utils In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1115989" id="1115989" title="Unable To Set Sandbox Window Size And Text Too Small" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122000" id="1122000" title="%{Dist} Found Instead Of %{?Dist} In: Xorg-X11-Drv-R128-6.9.1-7.El6.Src.Rpm.Spec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122002" id="1122002" title="%{Dist} Found Instead Of %{?Dist} In: Xorg-X11-Drv-Tdfx-1.4.5-9.El6.Src.Rpm.Spec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1124637" id="1124637" title="Evdev: Xen Virtual Pointer: Failed To Initialize Pointer Feedback Class Device." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126225" id="1126225" title="Xorg-X11-Drv-Vmmouse Installed (But Unpackaged) File(S) Found" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126230" id="1126230" title="Xorg-X11-Drv-Intel Installed (But Unpackaged) File(S) Found" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126995" id="1126995" title="I740 Module Load Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127104" id="1127104" title="Fbdev Refusing To Touch /Dev/Fb0 On Legacy Probe Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1129947" id="1129947" title="Regression: Xen Virtual Pointer Does Not Initialize The Scroll Wheel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1134860" id="1134860" title="[Hyperv] [Rhel6.6] Failed To Load Fbdev On Hyper-V" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=972647" id="972647" title="Evince Crashed In Pixman Library" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=987701" id="987701" title="Various Mesa Examples Are Rendered Upside Down" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1376.html" id="RHBA-2014:1376-1" title="Rhba-2014:1376-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1486-1</id><title>Bfa-Firmware Bug Fix And Enhancement Update</title><description>The bfa-firmware package has been upgraded to upstream version 3.2.23, which provides a number of bug fixes and enhancements over the previous version.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="bfa-firmware" release="2.el6" src="bfa-firmware-3.2.23.0-2.el6.src.rpm" version="3.2.23.0"><filename>bfa-firmware-3.2.23.0-2.el6.noarch.rpm</filename><sum type="sha256">5bd3db3f11525db80697a43931faa73616090377a3ea43f9d6bd37912863b326</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054467" id="1054467" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1486.html" id="RHBA-2014:1486-1" title="Rhba-2014:1486-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1496-1</id><title>Ding-Libs Bug Fix And Enhancement Update</title><description>The ding-libs packages have been upgraded to upstream version 0.3.0, which provides a number of bug fixes and enhancements over the previous version.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libdhash" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-11.el6.i686.rpm</filename><sum type="sha256">035681d0dc8bf501d3269f551226d0e79b1460c9625077ea5868d1fd462afbe9</sum></package><package arch="i686" name="libdhash-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-11.el6.i686.rpm</filename><sum type="sha256">3195b37984ff5f8d19d9dc9e3c817edcd2b0afec9567bae572eb07832c9ea144</sum></package><package arch="x86_64" name="libref_array" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.4"><filename>libref_array-0.1.4-11.el6.x86_64.rpm</filename><sum type="sha256">9c3b677cfd932c22b98531ab556c609408574fd81e6532c45e2b8342fc21f9c1</sum></package><package arch="x86_64" name="libbasicobjects" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-11.el6.x86_64.rpm</filename><sum type="sha256">f9dce0ca0ca2d4cfcd8268c643b1e385699dac53a05452f41409b437b93f9ac9</sum></package><package arch="x86_64" name="libdhash-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-11.el6.x86_64.rpm</filename><sum type="sha256">bf90b2e1a37c2148031d184b7028dc73102db5c0bae3c64dc542aa87ecb74718</sum></package><package arch="i686" name="libbasicobjects-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-11.el6.i686.rpm</filename><sum type="sha256">260f6b11c7fcf954a6ea8e714e490738dcbc637bc7eb752ca5fa45b5d09606c5</sum></package><package arch="x86_64" name="libpath_utils" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-11.el6.x86_64.rpm</filename><sum type="sha256">0a27b3e8a56a07d0d60eb79c57d45f01a768b35d0808edfb494bcf8eae8dbebd</sum></package><package arch="i686" name="libcollection" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-11.el6.i686.rpm</filename><sum type="sha256">8927b1c1c134a665d7da713ab48783f8bac8be071228d0a92b2afc420e0b3eb9</sum></package><package arch="x86_64" name="libpath_utils-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-11.el6.x86_64.rpm</filename><sum type="sha256">24e07120a2414f551dea6ca4df24c33579a06e5646281d36091df61f73f5c1ae</sum></package><package arch="i686" name="libbasicobjects" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-11.el6.i686.rpm</filename><sum type="sha256">26b3763383845986eb62bc64a9e6bdb3aef737cf7ca2b4c9b8ab65d5c53df22d</sum></package><package arch="x86_64" name="libini_config" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="1.1.0"><filename>libini_config-1.1.0-11.el6.x86_64.rpm</filename><sum type="sha256">379f94edfde304ead3dfc7e159472b146c06f0947deb131ea7d4ff9744198862</sum></package><package arch="i686" name="libpath_utils-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-11.el6.i686.rpm</filename><sum type="sha256">748b095c55bfb38ff6126facb86a84440dff32b8939c81dace654a88791852e9</sum></package><package arch="i686" name="libref_array-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.4"><filename>libref_array-devel-0.1.4-11.el6.i686.rpm</filename><sum type="sha256">60eb23bca79adc0161cad61bd30d267d1703b44993b2afd7584a85d0596274e3</sum></package><package arch="x86_64" name="libref_array-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.4"><filename>libref_array-devel-0.1.4-11.el6.x86_64.rpm</filename><sum type="sha256">eada2cae17a0ea0b322e5236a37d0c56857f7ba011e5aba2ceecded734d91916</sum></package><package arch="i686" name="libcollection-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-11.el6.i686.rpm</filename><sum type="sha256">6a76ab268fdccbf3d6a98d8fc1799f66f2fa9355eb38fc87f9e04fce53b2953b</sum></package><package arch="x86_64" name="libbasicobjects-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-11.el6.x86_64.rpm</filename><sum type="sha256">3e172de9e1820090921f883813b8909b30f013e05973cf7c17494491cdb4681d</sum></package><package arch="i686" name="libini_config-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="1.1.0"><filename>libini_config-devel-1.1.0-11.el6.i686.rpm</filename><sum type="sha256">0cd09b6b85909e1e9bb267969d8be9a96ae0200b85d216cdaa3a0d30447c9595</sum></package><package arch="i686" name="libini_config" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="1.1.0"><filename>libini_config-1.1.0-11.el6.i686.rpm</filename><sum type="sha256">33b6206f77e0c79dc1cfe5bc1876d835badefffa210066caf8c41ed6b64ddda3</sum></package><package arch="x86_64" name="libcollection" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-11.el6.x86_64.rpm</filename><sum type="sha256">77e7401d7a4d02c2a9dfed3cd39a57c9eb5a5530f8818ce9a780f00add2c11ee</sum></package><package arch="x86_64" name="libdhash" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-11.el6.x86_64.rpm</filename><sum type="sha256">c9ebd53501eb64a080055ac67d2b21e532b612e55d89f54a81e5dff17b3e4be3</sum></package><package arch="i686" name="libpath_utils" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-11.el6.i686.rpm</filename><sum type="sha256">8276fc22cd564cf6d84d18a0b1cc893538c873ffda41e07cfe62cb06fe5d612f</sum></package><package arch="x86_64" name="libini_config-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="1.1.0"><filename>libini_config-devel-1.1.0-11.el6.x86_64.rpm</filename><sum type="sha256">b0fe1b5af4fbd12ef2293a1abf43eab9226030d0f552b08a6cc87cf7fd1df754</sum></package><package arch="i686" name="libref_array" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.1.4"><filename>libref_array-0.1.4-11.el6.i686.rpm</filename><sum type="sha256">eed7d44771834988450799101e9bb09e55d3e986e3e17fd4f586e066aca2a850</sum></package><package arch="x86_64" name="libcollection-devel" release="11.el6" src="ding-libs-0.4.0-11.el6.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-11.el6.x86_64.rpm</filename><sum type="sha256">313d2465f2ecf765b4a90cd3400ec65b838a3faf52c64e67114d92008ffbb17b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2014:1496" id="RHBA-2014:1496-1" title="Rhba-2014:1496-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069287" id="1069287" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1498-1</id><title>New Packages: Gdisk</title><description>The gdisk packages provide a fdisk-like partitioning tool for GPT disks. GPT fdisk features a command-line interface, fairly direct manipulation of partition table structures, recovery tools fort dealing with corrupt partition tables, and the ability to convert MBR disks to GPT format.

This enhancement update adds the gdisk packages to Scientific Linux 6.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="gdisk" release="1.el6" src="gdisk-0.8.10-1.el6.src.rpm" version="0.8.10"><filename>gdisk-0.8.10-1.el6.x86_64.rpm</filename><sum type="sha256">7ed89f27b42efeb899f94c9130fee6533e0e14b2f257405a83b58b0acd4c1efb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2014:1498" id="RHBA-2014:1498-1" title="Rhba-2014:1498-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1015157" id="1015157" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1527-1</id><title>Java-1.6.0-Openjdk Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* A bug previously caused the LineBreakMeasurer class to produce the ArrayIndexOutOfBoundsException error when Java attempted to display certain characters in certain fonts. This update fixes the bug and Java now displays the affected characters correctly.

* Prior to this update, an application accessing an unsynchronized HashMap could potentially enter an infinite loop and consume an excessive amount of CPU resources. As a consequence, the OpenJDK server became unresponsive. This update prevents unsynchronized HashMap access from causing an infinite loop and as a result, the OpenJDK server no longer hangs in the described scenario.

In addition, this update adds the following enhancement:

* Shared Java libraries have been modified to allow users to run Java with the cap_net_bind_service, cap_net_admin, and cap_net_raw capabilities granted.

All running instances of OpenJDK Java must be restarted for the update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2014-10-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="11.1.13.4.el6" src="java-1.6.0-openjdk-1.6.0.0-11.1.13.4.el6.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-1.6.0.0-11.1.13.4.el6.x86_64.rpm</filename><sum type="sha256">55f8166da26c918b8d692ba3a81a05bd920346c6a790c767058058e0369d8a5e</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="11.1.13.4.el6" src="java-1.6.0-openjdk-1.6.0.0-11.1.13.4.el6.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-javadoc-1.6.0.0-11.1.13.4.el6.x86_64.rpm</filename><sum type="sha256">e585b2fa0c581bb01f5df62654f6977826ba3fb0e88f05bf8b747ebcf8c956de</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="11.1.13.4.el6" src="java-1.6.0-openjdk-1.6.0.0-11.1.13.4.el6.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-demo-1.6.0.0-11.1.13.4.el6.x86_64.rpm</filename><sum type="sha256">6dba82206dbdacfe063714bcca7ee541c06e603c5dca292c0c99ac7ce951a01d</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="11.1.13.4.el6" src="java-1.6.0-openjdk-1.6.0.0-11.1.13.4.el6.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-devel-1.6.0.0-11.1.13.4.el6.x86_64.rpm</filename><sum type="sha256">567c3bc42035e188c9899d00330c67f22e323c39cbe95d44350a9965e59cee79</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="11.1.13.4.el6" src="java-1.6.0-openjdk-1.6.0.0-11.1.13.4.el6.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-src-1.6.0.0-11.1.13.4.el6.x86_64.rpm</filename><sum type="sha256">056b1882cb21c8864caf56bed151eca7a07d4a6bac07ce8e11a089a5e72351b8</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1059925" id="1059925" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098399" id="1098399" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1112806" id="1112806" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1527.html" id="RHBA-2014:1527-1" title="Rhba-2014:1527-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1538-1</id><title>Glib2 Bug Fix And Enhancement Update</title><description>The glib2 packages have been upgraded to upstream version 2.28.8, which provides a number of bug fixes and enhancements over the previous version.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glib2-static" release="4.el6" src="glib2-2.28.8-4.el6.src.rpm" version="2.28.8"><filename>glib2-static-2.28.8-4.el6.x86_64.rpm</filename><sum type="sha256">f2a07bbb4d55c932d9a6c88b18cf439a7e9e0d13840df9a72fbdafa861ac15de</sum></package><package arch="x86_64" name="glib2" release="4.el6" src="glib2-2.28.8-4.el6.src.rpm" version="2.28.8"><filename>glib2-2.28.8-4.el6.x86_64.rpm</filename><sum type="sha256">fdd69f0c95ab40ee485b7117c70e6ebf33332fb2abb88b543b8346c75fafc03b</sum></package><package arch="x86_64" name="glib2-devel" release="4.el6" src="glib2-2.28.8-4.el6.src.rpm" version="2.28.8"><filename>glib2-devel-2.28.8-4.el6.x86_64.rpm</filename><sum type="sha256">82d320386c57034aea957757a0f6eb785db408c6634a0adb7782bf5cffbaa0ca</sum></package><package arch="i686" name="glib2" release="4.el6" src="glib2-2.28.8-4.el6.src.rpm" version="2.28.8"><filename>glib2-2.28.8-4.el6.i686.rpm</filename><sum type="sha256">c683b4760512c3eff47d8135e61bf702920e246080b3e09b5c61fe0fdfff7d99</sum></package><package arch="noarch" name="glib2-doc" release="4.el6" src="glib2-2.28.8-4.el6.src.rpm" version="2.28.8"><filename>glib2-doc-2.28.8-4.el6.noarch.rpm</filename><sum type="sha256">5a46c255b6bc2fb31401b27a8a41a4545cda30aeb03d3782b4cead9375b30fdf</sum></package><package arch="i686" name="glib2-devel" release="4.el6" src="glib2-2.28.8-4.el6.src.rpm" version="2.28.8"><filename>glib2-devel-2.28.8-4.el6.i686.rpm</filename><sum type="sha256">d3a376e55df6fa0c2cfd954fe6df8634c0408602c208d48357ec781f5a3655c0</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1101398" id="1101398" title="Rebase Glib2 To 2.28" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120611" id="1120611" title="Help Urls Launched From Application Help Buttons And Other Url Handlers Don&amp;#39;T Work After Glib2 Rebase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128848" id="1128848" title="[Abrt] Evolution-2.32.3-33.El6: Process /Usr/Bin/Evolution Was Killed By Signal 11 (Sigsegv)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1139274" id="1139274" title="Glib2 Rebase Leads To Crashers After Packages Are Rebuilt Against It" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1538.html" id="RHBA-2014:1538-1" title="Rhba-2014:1538-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1554-1</id><title>Gtk2, Gdk-Pixbuf2, Librsvg2, And Libwmf Bug Fix And Enhancement Update</title><description>The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.

The librsvg2 packages provide an SVG (Scalable Vector Graphics) library based on the libart library.

The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.

The gtk2 packages have been upgraded to upstream version 2.24.23, which provides a number of bug fixes and enhancements over the previous version.

In addition, this update fixes the following bugs:

* The gtk_cups_connection_test_new() function used the default IPP port instead of the real one. Consequently, the GTK print dialog failed to get printer information from remote CUPS servers with a non-standard port number. With this update, the correct port number is used and GTK no longer fails.

* The rsvg-convert utility of the librsvg2 library did not respect the width and height specified with the viewBox attribute in SVG files. As a consequence, avatar icons were smaller than they were supposed to be. With this update, the utility uses the correct width and height.

* The gdk-pixbuf loaders were moved to a separate directory as part of the separation of the gdk-pixbuf2 library to its own package. This update moves the loaders present in the librsvg2 and libwmf libraries to the new directory.

* The newly-added GtkComboBoxText widget could cause applications that used it to terminate unexpectedly due to the incorrect initialization of one of the widget's properties. With this update, the initialization has been fixed and the applications no longer crash in the described scenario.

* Missing forward declarations for various functions caused the compiler to assume an implicit 32-bit integer return type. Consequently, the compiler terminated unexpectedly because the string pointer was truncated to 32-bits and then extended back to 64-bits. With this update, the "#include" lines for the appropriate headers have been added at the top of the affected source files. As a result, the compiler no longer crashes.

* Previously, the GTK+ print dialog failed to print to a file in the default directory due to an incorrect path generation of the file. The generation of the path has been fixed, and GTK+ prints to a file as intended.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="gtk2-immodule-xim" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-immodule-xim-2.24.23-6.el6.x86_64.rpm</filename><sum type="sha256">984ef8a8eab8d66add0bd42ced8bb95b38e7dcc201e3273a03c7d05188df853a</sum></package><package arch="x86_64" name="gtk2" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-2.24.23-6.el6.x86_64.rpm</filename><sum type="sha256">e70bbc15f66f071431b5e74f04b7cc2bcb0b3eb86136cc34640a208e1e73fa20</sum></package><package arch="x86_64" name="gdk-pixbuf2-devel" release="5.el6" src="gdk-pixbuf2-2.24.1-5.el6.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-devel-2.24.1-5.el6.x86_64.rpm</filename><sum type="sha256">fb8d30c83633053f77846f8245f3b7baf88f7e551c6229628a9ab9e7848b1b7e</sum></package><package arch="x86_64" name="gdk-pixbuf2" release="5.el6" src="gdk-pixbuf2-2.24.1-5.el6.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-2.24.1-5.el6.x86_64.rpm</filename><sum type="sha256">79b7e44ccf856933ea65e2be734952f3112653d8507e864f97d79ff66e4a5fc5</sum></package><package arch="i686" name="gtk2" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-2.24.23-6.el6.i686.rpm</filename><sum type="sha256">e7fcf0ab1e65873359c305cc4e28462c8deb699cc01bd42421a27c621664366b</sum></package><package arch="x86_64" name="librsvg2-devel" release="14.el6" src="librsvg2-2.26.0-14.el6.src.rpm" version="2.26.0"><filename>librsvg2-devel-2.26.0-14.el6.x86_64.rpm</filename><sum type="sha256">d67fdd4b3b17b5e4e47ba4c30d55a4c73624e4b7ced7b4bef7ddfa149be97908</sum></package><package arch="i686" name="librsvg2-devel" release="14.el6" src="librsvg2-2.26.0-14.el6.src.rpm" version="2.26.0"><filename>librsvg2-devel-2.26.0-14.el6.i686.rpm</filename><sum type="sha256">e1d631dd71235d4a34235f6e5746af0694bdd29f515cb6f309405c2ddf3902f1</sum></package><package arch="x86_64" name="librsvg2" release="14.el6" src="librsvg2-2.26.0-14.el6.src.rpm" version="2.26.0"><filename>librsvg2-2.26.0-14.el6.x86_64.rpm</filename><sum type="sha256">5ad60afb876baa1b01b504013b7bd1bd63f801ef33290b80e65e9384cb5c4a12</sum></package><package arch="x86_64" name="libwmf" release="23.el6" src="libwmf-0.2.8.4-23.el6.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-23.el6.x86_64.rpm</filename><sum type="sha256">2297d7f1ae05c38b32abf17ac69a59beb8702eafb196397155097ec6ce1c87d2</sum></package><package arch="x86_64" name="libwmf-devel" release="23.el6" src="libwmf-0.2.8.4-23.el6.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-23.el6.x86_64.rpm</filename><sum type="sha256">fa9c27dfa428b6fa4e88134b0ed826f8994833e0ca759276f27aae0261d9e7b2</sum></package><package arch="x86_64" name="gtk2-devel-docs" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-devel-docs-2.24.23-6.el6.x86_64.rpm</filename><sum type="sha256">de2fbb4e587bcbd5d5904be34472bfe21cf9a4e659335086f2ce995b251c75ce</sum></package><package arch="i686" name="gtk2-devel" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-devel-2.24.23-6.el6.i686.rpm</filename><sum type="sha256">56b58a04940edc66b6f161bbff42bff1f509f1e14425c0ae1c5d80dfbd59348a</sum></package><package arch="i686" name="libwmf" release="23.el6" src="libwmf-0.2.8.4-23.el6.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-23.el6.i686.rpm</filename><sum type="sha256">9a8e4ca17a0aa1b4bc190b4ea941ffc4d9fa930d9619e9441d28b7e13f3d8bbb</sum></package><package arch="i686" name="gdk-pixbuf2-devel" release="5.el6" src="gdk-pixbuf2-2.24.1-5.el6.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-devel-2.24.1-5.el6.i686.rpm</filename><sum type="sha256">5dd44bdf9bcb9070691fcf6778b7fa52bd75bf862fb0aebfca325f460ee9cc9c</sum></package><package arch="i686" name="librsvg2" release="14.el6" src="librsvg2-2.26.0-14.el6.src.rpm" version="2.26.0"><filename>librsvg2-2.26.0-14.el6.i686.rpm</filename><sum type="sha256">8d7682ba28eebe4744930192990723350f33e496e8909b574c6ee1ff79f58f26</sum></package><package arch="x86_64" name="gtk2-devel" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-devel-2.24.23-6.el6.x86_64.rpm</filename><sum type="sha256">d940b8ca0ff51518e40cd6b7e8c7fc5d72b2c912493f52fb0206250d606775b4</sum></package><package arch="i686" name="gtk2-immodule-xim" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-immodule-xim-2.24.23-6.el6.i686.rpm</filename><sum type="sha256">eed264dde535fb8b8341f4b6d1e3c6e4208694883c700e96cadcb8fb67cdf47e</sum></package><package arch="i686" name="libwmf-lite" release="23.el6" src="libwmf-0.2.8.4-23.el6.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-23.el6.i686.rpm</filename><sum type="sha256">fe4f28cceae96542fa57274c5b0fa7d8cef1da7f11f5b455684bf68afd358efb</sum></package><package arch="i686" name="gtk2-immodules" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-immodules-2.24.23-6.el6.i686.rpm</filename><sum type="sha256">a43ed6248e11bd14e24e54aa9f88f7c19db2b86be7ae46a0df232fef8c17fb83</sum></package><package arch="i686" name="libwmf-devel" release="23.el6" src="libwmf-0.2.8.4-23.el6.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-23.el6.i686.rpm</filename><sum type="sha256">1fd26e2ee62e98376e5e35fa6aea0bc21b6e17951d1507bfed7da2439ebc1eb0</sum></package><package arch="x86_64" name="libwmf-lite" release="23.el6" src="libwmf-0.2.8.4-23.el6.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-23.el6.x86_64.rpm</filename><sum type="sha256">44bda8b51f16eb81c57be8c085cf85a578fe719ea670fe4bce108a2bfd106d91</sum></package><package arch="x86_64" name="gtk2-immodules" release="6.el6" src="gtk2-2.24.23-6.el6.src.rpm" version="2.24.23"><filename>gtk2-immodules-2.24.23-6.el6.x86_64.rpm</filename><sum type="sha256">bb8e5e0a07256c6f54baf442b76388c1cc30ba10bb696ea89a96086fdc1ace18</sum></package><package arch="i686" name="gdk-pixbuf2" release="5.el6" src="gdk-pixbuf2-2.24.1-5.el6.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-2.24.1-5.el6.i686.rpm</filename><sum type="sha256">f8eb166724df7c3a05c1a853be97d6270e992dfc7afa2d4f8cc990e29818078d</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1015044" id="1015044" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1100886" id="1100886" title="Rebase Gtk2 To The Current 2.24.X Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104681" id="1104681" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104684" id="1104684" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119199" id="1119199" title="Failed To Build From Source Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126916" id="1126916" title="Gtkcomboboxtext Issues After Rebase Of Gtk2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127719" id="1127719" title="Rsvg-Convert Returns Segfault On S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128798" id="1128798" title="Error Printing: Operation Not Supported" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1129605" id="1129605" title="[Abrt] Libreoffice-Core-4.0.4.2-13.El6: Enumerator_Files_Callback: Process /Usr/Lib64/Libreoffice/Program/Soffice.Bin Was Killed By Signal 11 (Sigsegv)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=909454" id="909454" title="Gtk Printer Widget Gives &amp;Quot;Getting Printer Information Failed&amp;Quot; For Cups Printer" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1554.html" id="RHBA-2014:1554-1" title="Rhba-2014:1554-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1672-1</id><title>Libipathverbs Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the ib_qib kernel module initialized certain mezzanine cards using a kernel module parameter. However, the support for this method of initialization has been deprecated and removed upstream, and was therefore removed from the Red Hat kernel in a prior update. As a consequence, the initialization of some mezzanine cards no longer succeeded. With this update, a modprobe configuration file is provided by the libipathverbs program that enables the proper configuration of the ib_qib module from user space. As a result, the affected mezzanine cards now initialize as expected.

Users of Intel/Qlogic InfiniBand mezzanine-based hardware are advised to upgrade to these updated packages, which fix this bug.</description><release>Scientific Linux Fermi</release><issued date="2014-10-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libipathverbs-static" release="3.el6_5" src="libipathverbs-1.3-3.el6_5.src.rpm" version="1.3"><filename>libipathverbs-static-1.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">4012cc2ed979b02faacf5174142eadba5bcf5e137a4a2bb9bad648812f80c7bd</sum></package><package arch="x86_64" name="libipathverbs" release="3.el6_5" src="libipathverbs-1.3-3.el6_5.src.rpm" version="1.3"><filename>libipathverbs-1.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">fb706ea0fe3c434a2bc80cb79042757f2da329dc9bbb519056dcc57c4c1a9d8a</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122720" id="1122720" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1672.html" id="RHBA-2014:1672-1" title="Rhba-2014:1672-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2014:1867-1</id><title>Nss-Softokn Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the nss-softokn-freebl library under certain circumstances called the prelink program, which in turn sent the SIGCHLD signal. However, the "ps" command was not compatible with SIGCHLD and failed. With this update, the signal handler prevents SIGCHLD from affecting "ps" and the command thus executes as intended.

In addition, this update adds the following enhancement:

* The NSS support for Elliptic Curve Cryptography (ECC) has been enhanced to enable the OpenJDK SunEC provider to use the nss-softokn implementation.</description><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-softokn-devel" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-18.el6_6.i686.rpm</filename><sum type="sha256">8e6c972b62f235d3364dfab5989649cc6cd10b75d6a83b79879ce110bb283e6d</sum></package><package arch="x86_64" name="nss-softokn-devel" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-18.el6_6.x86_64.rpm</filename><sum type="sha256">4836de2a29f17cdc8822d4b8226bd779f6d610f867429a06ef66d9ca901a13db</sum></package><package arch="x86_64" name="nss-softokn" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-18.el6_6.x86_64.rpm</filename><sum type="sha256">5f04e65d6357e56816766da4dbfb7ce9a36c3e83a99d95308c042776f19fe6d5</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-18.el6_6.x86_64.rpm</filename><sum type="sha256">5e2e0d0a75ff29b6f1a9c9622d095b2ace8f87df9b17ebd7ba927eb8c90cb50c</sum></package><package arch="i686" name="nss-softokn" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-18.el6_6.i686.rpm</filename><sum type="sha256">5e2dcce93b744876bfd52ebc4b5ae1386a33db7e0ddaa70770687dbab602dca9</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-18.el6_6.x86_64.rpm</filename><sum type="sha256">01d3d21d61b833238351d10f7b90f489c24f773396eeed865dbba411ae4c91d8</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-18.el6_6.i686.rpm</filename><sum type="sha256">e7c429caa774bc87f6693c42c6d85ab0c3240aa404aff8e3fcd6c34e194b97f4</sum></package><package arch="i686" name="nss-softokn-freebl" release="18.el6_6" src="nss-softokn-3.14.3-18.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-18.el6_6.i686.rpm</filename><sum type="sha256">4f9a3ae697e352ee660e0fb6ea4fb6a3674591abf3bcacf047285f55399c91e6</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1157396" id="1157396" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1160716" id="1160716" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2014-1867.html" id="RHBA-2014:1867-1" title="Rhba-2014:1867-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0048-1</id><title>Nss-Softokn Bug Fix Update</title><description>This update fixes the following bug:

* When updating the nss-softokn packages to SLBA-2014-1867 advisory, some programs terminated unexpectedly with segmentation faults. With this update, the softoken and freebl libraries have been modified and a new auxiliary private freebl library has been introduced to properly handle FIPS-140 requirement, and the segmentation faults no longer occur in this situation.</description><release>Scientific Linux Fermi</release><issued date="2015-01-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-softokn-freebl-devel" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-19.el6_6.x86_64.rpm</filename><sum type="sha256">78cf603b34f340970cd538b9350d30a68dfc28cfbea635316cde0a9b056aa699</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-19.el6_6.x86_64.rpm</filename><sum type="sha256">dfcaba85d24943d017221b478a516a45089ce355678b4263ebb4bf722479369e</sum></package><package arch="i686" name="nss-softokn-freebl" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-19.el6_6.i686.rpm</filename><sum type="sha256">4e0e7b008c3e4493ad64094d862c9e17b001a2c9b9cd06e2ccf24aa6892a2017</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-19.el6_6.i686.rpm</filename><sum type="sha256">6a743a6f6ab27efc8acbef775b8203a5adedbdfd7db087335877d41f4aefa408</sum></package><package arch="i686" name="nss-softokn-devel" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-19.el6_6.i686.rpm</filename><sum type="sha256">999c59ada1a1e35c51cdc43f7a10f664785c3f843b0a9fd1ff5de60eb62b8465</sum></package><package arch="x86_64" name="nss-softokn" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-19.el6_6.x86_64.rpm</filename><sum type="sha256">589d7aa9be4ff6d66ea23ba138ab63280fecea03f08b1435e4e3ad0d52e9fe8d</sum></package><package arch="x86_64" name="nss-softokn-devel" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-19.el6_6.x86_64.rpm</filename><sum type="sha256">489c3836760d7ccdf91401a317f53288c59633fbd6c7a94cb8a4ba2b87fab0c6</sum></package><package arch="i686" name="nss-softokn" release="19.el6_6" src="nss-softokn-3.14.3-19.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-19.el6_6.i686.rpm</filename><sum type="sha256">7aa019685ef595054bc3aa1ff022e7f712066f10f0784111d3ec9b95f502b8dc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0048" id="RHBA-2015:0048-1" title="Rhba-2015:0048-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173187" id="1173187" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0089-1</id><title>Gdbm Bug Fix Update</title><description>This update fixes the following bug:

* The previous release of gdbm introduced a regression in the way file handlers were used. Consequently, gdbm failed to write to a database opened for reading and writing. With this update, the file handlers have been fixed to use the right flags, and as a result, gdbm works with such databases as expected.</description><release>Scientific Linux Fermi</release><issued date="2015-02-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gdbm" release="38.el6" src="gdbm-1.8.0-38.el6.src.rpm" version="1.8.0"><filename>gdbm-1.8.0-38.el6.i686.rpm</filename><sum type="sha256">5d838c7bb019ceda7e68341f45e1dfe747a3e20928b553c63e16c316caa528a2</sum></package><package arch="i686" name="gdbm-devel" release="38.el6" src="gdbm-1.8.0-38.el6.src.rpm" version="1.8.0"><filename>gdbm-devel-1.8.0-38.el6.i686.rpm</filename><sum type="sha256">4ac621ec4af46e5f02ce0115cd6683029d40618bb64c2702ba6665fa74016681</sum></package><package arch="x86_64" name="gdbm-devel" release="38.el6" src="gdbm-1.8.0-38.el6.src.rpm" version="1.8.0"><filename>gdbm-devel-1.8.0-38.el6.x86_64.rpm</filename><sum type="sha256">3ab7aeb1a66583e71ac4b02476cf67bb107d384f2f4d75a1e18b35506202e5f2</sum></package><package arch="x86_64" name="gdbm" release="38.el6" src="gdbm-1.8.0-38.el6.src.rpm" version="1.8.0"><filename>gdbm-1.8.0-38.el6.x86_64.rpm</filename><sum type="sha256">44697b5873e8b9cd1c709272821f8ea08b884f7c507296044dd989e36405dae9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0089" id="RHBA-2015:0089-1" title="Rhba-2015:0089-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180392" id="1180392" title="Gdbm-1.8.0-37.El6 Refuses To Store Into A Database Opened For Reading And Writing" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0110-2</id><title>Nss-Softokn Bug Fix Update</title><description>This update fixes the following bug:

* Previously, changes in the spec file were introduced to meet FIPS requirements where a new libfreeblpriv3.so library was added along with its corresponding .chk file. However, the libreebl3.chk file was dropped which caused problems in dracut. As a consequence, when updating the nss- softokn packages to SLBA-2015:0048-02 advisory, brew failed to create a livecd process because nss-softokn was missing the aforementioned file. With this update, the nss-softoken.spec file has been modified to keep a dummy libfreebl3.chk, which ensures that dracut now works properly.

* A bug introduced in a previous update caused the rpm and yum comands to fail. To fix this bug, a dependency on nss-softokn-freebl has been added to nss-softokn. As a result, yum and rpm now work correctly.</description><release>Scientific Linux Fermi</release><issued date="2015-02-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-softokn-freebl-devel" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-22.el6_6.x86_64.rpm</filename><sum type="sha256">014d58c94ecafc3b4bbe6f128f4b6745ef114161b8d3dd6a7d4bdd5e6ab9b513</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-22.el6_6.i686.rpm</filename><sum type="sha256">1fa4e1b9d1d151e67333bd5af3630924f6894014826e4297665538afc1dc55de</sum></package><package arch="i686" name="nss-softokn-devel" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-22.el6_6.i686.rpm</filename><sum type="sha256">0428e9950b5ec0efb13c2567666d8cc56763b3d165e98da597cc58253170ffc9</sum></package><package arch="i686" name="nss-softokn-freebl" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-22.el6_6.i686.rpm</filename><sum type="sha256">08904d4bdf215657365a34ad4c3229bb969e7d3f4a95a442d3c7ff66d36f75b2</sum></package><package arch="i686" name="nss-softokn" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-22.el6_6.i686.rpm</filename><sum type="sha256">c3e5736b180addace85669e894dc9f98a75fea16a1333ebb7cbdea740da3d2b6</sum></package><package arch="x86_64" name="nss-softokn-devel" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-22.el6_6.x86_64.rpm</filename><sum type="sha256">077797149d3d3599cdd35ea5dc007059df3a5a6d37e683c9eeed7d56c74ea7a0</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-22.el6_6.x86_64.rpm</filename><sum type="sha256">423c74c5e718e1b589a0b80803f4a734beba2afdcf4b88a490a991deb7e74550</sum></package><package arch="x86_64" name="nss-softokn" release="22.el6_6" src="nss-softokn-3.14.3-22.el6_6.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-22.el6_6.x86_64.rpm</filename><sum type="sha256">d657dd1b941d148b4b5eeacb1188be585cd8acafe52e69a1122ad73bc3dca461</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0110" id="RHBA-2015:0110-2" title="Rhba-2015:0110-2" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1182725" id="1182725" title="Nss-Softokn Prevents Dracut From Building The Initrd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183448" id="1183448" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0693-1</id><title>Nss-Pam-Ldapd Bug Fix Update</title><description>This update fixes the following bugs:

* When parsing the "tls_cacertdir" configuration option, the nss-pam-ldapd utility terminated unexpectedly with a segmentation fault when the nslcd daemon started. This bug has been fixed and nslcd no longer causes nss- pam-ldapd to crash.

* Prior to this update, the nss-pam-ldapd utility did not fail over properly on certain SSL-enabled LDAP server implementations. This caused the queries processed by the original LDAP server to be aborted and not resumed on an alternate LDAP server. The nss-pam-ldapd failover capabilities have been updated to prevent this problem from occurring.</description><release>Scientific Linux Fermi</release><issued date="2015-03-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-pam-ldapd" release="20.el6_6.3" src="nss-pam-ldapd-0.7.5-20.el6_6.3.src.rpm" version="0.7.5"><filename>nss-pam-ldapd-0.7.5-20.el6_6.3.i686.rpm</filename><sum type="sha256">5c59fafb3bf0c9d8191fc02084b20c60fb8a7c5419dd20978cd6e1c6bbf2836a</sum></package><package arch="x86_64" name="nss-pam-ldapd" release="20.el6_6.3" src="nss-pam-ldapd-0.7.5-20.el6_6.3.src.rpm" version="0.7.5"><filename>nss-pam-ldapd-0.7.5-20.el6_6.3.x86_64.rpm</filename><sum type="sha256">3d8812e3867bab8755d81f9503cafd890cfb3794428403443e1133085df7c865</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0693" id="RHBA-2015:0693-1" title="Rhba-2015:0693-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1192450" id="1192450" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1192451" id="1192451" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0705-1</id><title>Ricci Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the luci application server and the ccs cluster configuration command in some cases displayed incorrect information about certain aspects of the cluster, such as the daemon status or specific management tasks. With this update, replies to clients' requests against service modules included with the ricci daemon are composed correctly again. As a result, luci and ccs now provide correct information about the cluster.</description><release>Scientific Linux Fermi</release><issued date="2015-03-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ccs" release="75.el6_6.1" src="ricci-0.16.2-75.el6_6.1.src.rpm" version="0.16.2"><filename>ccs-0.16.2-75.el6_6.1.x86_64.rpm</filename><sum type="sha256">da6d781e96e52835b109903033e241ac527365acbb74a00452cd7e7cd51eab2e</sum></package><package arch="x86_64" name="ricci" release="75.el6_6.1" src="ricci-0.16.2-75.el6_6.1.src.rpm" version="0.16.2"><filename>ricci-0.16.2-75.el6_6.1.x86_64.rpm</filename><sum type="sha256">044a8991f155774f3a2d1bd20b07ef810a4463e79fbfe47474c9ab946e327acb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0705" id="RHBA-2015:0705-1" title="Rhba-2015:0705-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199561" id="1199561" title="Regression Caused By [Bug 1044122] Fix: Modules Cannot Return Values Due To Bug In Module::Empty_Response" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0926-1</id><title>Nss, Nss-Util, And Nspr Bug Fix And Enhancement Update</title><description>The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release.

This update also fixes the following bugs:

* Previously, a race condition in NSS in some cases caused heavily threaded applications, such as the ns-slapd daemon, to terminate unexpectedly when under load. This update fixes the underlying cause, and the described crash no longer occurs.

* When using version 3.16.1-4 of the nss packages, NSS returned different cipher suites than the prior versions of NSS. This caused certain applications that add external constraints to the cipher suites, such as the Lightweight Directory Access Protocol server (LDAPS), to fail. With this update, the cipher suites table in the /nss/lib/ssl/ssl3con.c file has been adjusted to be compatible with the previous version of NSS, and the affected applications now work as expected.</description><release>Scientific Linux Fermi</release><issued date="2015-05-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-3.18.0-5.3.el6_6.x86_64.rpm</filename><sum type="sha256">4a3c6328f36eaa8defcf6993beb5f17ade0e49c444a55ca43be3fe28fe8b578f</sum></package><package arch="x86_64" name="nspr" release="1.el6_6" src="nspr-4.10.8-1.el6_6.src.rpm" version="4.10.8"><filename>nspr-4.10.8-1.el6_6.x86_64.rpm</filename><sum type="sha256">0473505c5f0896396c8e5c568e105eb8b69cc4bfe0df34701e29f3ac72f04f2b</sum></package><package arch="i686" name="nss-pkcs11-devel" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-pkcs11-devel-3.18.0-5.3.el6_6.i686.rpm</filename><sum type="sha256">21cb2f05f8fe20e7e3f7e6c319de542f2d13445068628c3a83b5645aeddf623d</sum></package><package arch="i686" name="nspr-devel" release="1.el6_6" src="nspr-4.10.8-1.el6_6.src.rpm" version="4.10.8"><filename>nspr-devel-4.10.8-1.el6_6.i686.rpm</filename><sum type="sha256">30f72a9483f61a1281340ab1eb6ae877c325303cc39dbafb455f6eb3b566a139</sum></package><package arch="x86_64" name="nspr-devel" release="1.el6_6" src="nspr-4.10.8-1.el6_6.src.rpm" version="4.10.8"><filename>nspr-devel-4.10.8-1.el6_6.x86_64.rpm</filename><sum type="sha256">84d038e443a33ae8a72c57df97233040ee602c778839bda37c14c1b6657002d4</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_6" src="nss-util-3.18.0-1.el6_6.src.rpm" version="3.18.0"><filename>nss-util-devel-3.18.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">7227c98f5143023c78d3014b0f38d606ca7d167983f23876ca9e34d437d8f5e6</sum></package><package arch="x86_64" name="nss-devel" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-devel-3.18.0-5.3.el6_6.x86_64.rpm</filename><sum type="sha256">96d67b64b53e3fc4318adcde48a3995031c3ef38cb4383b23e08f4d0eb5c517c</sum></package><package arch="i686" name="nss" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-3.18.0-5.3.el6_6.i686.rpm</filename><sum type="sha256">0a24527c25938db902100cfdef5eac806fa92ebf6fc771073d35d984ed8ebc86</sum></package><package arch="x86_64" name="nss-tools" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-tools-3.18.0-5.3.el6_6.x86_64.rpm</filename><sum type="sha256">93b87cb47ecef4e6e11c54993bfe2c9bf2cf88d87d1502cb43bab9a38f3671fe</sum></package><package arch="x86_64" name="nss-sysinit" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-sysinit-3.18.0-5.3.el6_6.x86_64.rpm</filename><sum type="sha256">ec384bbf5af6942710d1685a477881184ca3bd5d6c7ebf484d121c56f941e293</sum></package><package arch="i686" name="nss-devel" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-devel-3.18.0-5.3.el6_6.i686.rpm</filename><sum type="sha256">ebd42efd43c755400bdf93d67fc91b4efcc0fe68796b11799c60e9b2f18746e5</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="5.3.el6_6" src="nss-3.18.0-5.3.el6_6.src.rpm" version="3.18.0"><filename>nss-pkcs11-devel-3.18.0-5.3.el6_6.x86_64.rpm</filename><sum type="sha256">0b0dc678b15aa6b070548c5fe716f291ff33a8a9d64febfd313687cc96ef0f27</sum></package><package arch="i686" name="nss-util" release="1.el6_6" src="nss-util-3.18.0-1.el6_6.src.rpm" version="3.18.0"><filename>nss-util-3.18.0-1.el6_6.i686.rpm</filename><sum type="sha256">1e2013665db61c5f421bfad97181b417f284e4a9e3e95d79f0f1a851a3a9a3d5</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_6" src="nss-util-3.18.0-1.el6_6.src.rpm" version="3.18.0"><filename>nss-util-devel-3.18.0-1.el6_6.i686.rpm</filename><sum type="sha256">8cc7dc378da71799dbde9e17bc79efa8e8fa8b7d49a7f8929ea805dc388aad59</sum></package><package arch="x86_64" name="nss-util" release="1.el6_6" src="nss-util-3.18.0-1.el6_6.src.rpm" version="3.18.0"><filename>nss-util-3.18.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">c031697ce2638a0823aa4336b2bb4a036490c22710b5d1c594d7552c0827466d</sum></package><package arch="i686" name="nspr" release="1.el6_6" src="nspr-4.10.8-1.el6_6.src.rpm" version="4.10.8"><filename>nspr-4.10.8-1.el6_6.i686.rpm</filename><sum type="sha256">89cd254f0a44ff7051aec8d8af610168af88a2cb19843ea0f09ca94e49585682</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0926" id="RHBA-2015:0926-1" title="Rhba-2015:0926-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1182902" id="1182902" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202488" id="1202488" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1205064" id="1205064" title="[Rhel6.6] Nss-Util 3.18 Rebase Required For Firefox 38 Esr" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1205065" id="1205065" title="Rebase Nspr To 4.10.8 For Firefox 38 Esr [Rhel-6.6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207052" id="1207052" title="Rebase Nss To 3.18 For Firefox 38 Esr [Rhel-6.6]" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:0953-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, when the rh-passenger40 and httpd24 Software Collections were used together in SELinux enforcing mode, running the PassengerWatchd process was not able to connect to the httpd service. With this update, SELinux policy rules have been updated to prevent this problem, and PassengerWatchd can now access the httpd service as expected.

* Prior to this update, the SELinux context for the /var/log/mariadb(/.*) path was not defined. As a consequence, the mariadb service running in the mysqld_t SELinux process domain was not able to access its own logging files with the aforementioned location. This update adds the missing SELinux context and thus allows mariadb service to access its logging files.

* The /etc/my.cnf.d/ directory previously had only the default etc_t SELinux context defined, which was not sufficient. The undefined specific context for the /etc/my.cnf.d/*cnf configuration files has been added to the mysql SELinux policy, thus fixing this bug.

* When a MariaDB plug-in was was added to the server.cnf or my.cnf files and the user was created to authenticate using Pluggable Authentication Module (PAM) in the mysqld service, the plug-in could not be loaded. To fix this bug, SELinux policy rules have been updated, and the plugin is now loaded successfully.

* Prior to this update, the mongos binary and the mongos SysV init scripts did not have the SELinux context defined. This update fixes the bug by adding the respective SELinux context.</description><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-minimum" release="260.el6_6.3" src="selinux-policy-3.7.19-260.el6_6.3.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-260.el6_6.3.noarch.rpm</filename><sum type="sha256">e89e263bb3e9e473ede70201e1e53ff8d6bd1e5675e4c5f4bfbc2fc42c03cc65</sum></package><package arch="noarch" name="selinux-policy-doc" release="260.el6_6.3" src="selinux-policy-3.7.19-260.el6_6.3.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-260.el6_6.3.noarch.rpm</filename><sum type="sha256">449ef2af2a24254eb998bc96fb9f169c680847243dee39a87c72b42432ba1cb1</sum></package><package arch="noarch" name="selinux-policy-targeted" release="260.el6_6.3" src="selinux-policy-3.7.19-260.el6_6.3.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-260.el6_6.3.noarch.rpm</filename><sum type="sha256">a7d6be3bdcc17a72461b57def918266e540da046d19f0046052889009a595823</sum></package><package arch="noarch" name="selinux-policy" release="260.el6_6.3" src="selinux-policy-3.7.19-260.el6_6.3.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-260.el6_6.3.noarch.rpm</filename><sum type="sha256">d1da773868d3d4fc87165be9d14c560af99bc63685636ef877f9db28d112642e</sum></package><package arch="noarch" name="selinux-policy-mls" release="260.el6_6.3" src="selinux-policy-3.7.19-260.el6_6.3.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-260.el6_6.3.noarch.rpm</filename><sum type="sha256">c38f022e05ac52f79bf038cb4f5f61c0525120aded3651a198deaa43bf6ce2c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0953" id="RHBA-2015:0953-1" title="Rhba-2015:0953-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211706" id="1211706" title="Avc In Mod_Passenger" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212846" id="1212846" title="Undefined Context For /Var/Log/Mariadb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212972" id="1212972" title="No Context Defined For Mongos Binary And Initscript" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212976" id="1212976" title="Undefined Context For /Etc/My.Cnf.D/*Cnf Configuration Files In Mysql/Mariadb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1214023" id="1214023" title="Mariadb Auth_Pam.So Plugin Or Other Auth Plugins Cannot Be Used" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1085-1</id><title>Db4 Bug Fix Update</title><description>This update fixes the following bug:

* Previously, querying memory pool file statistics in some cases caused the calling process to terminate unexpectedly. This update fixes the way the statistics are queried, and the query thus no longer crashes the calling process.</description><release>Scientific Linux Fermi</release><issued date="2015-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="db4-devel-static" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-devel-static-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">1c1ca264e38cccb6c38d4b9aaedd74960b74f6f5e5bc71a7ce2abff169753a68</sum></package><package arch="i686" name="db4-cxx" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-cxx-4.7.25-19.el6_6.i686.rpm</filename><sum type="sha256">2ed16208f57fdafade0518af8068953a6f90ad80d9ddec9a5b48168b49dd1471</sum></package><package arch="i686" name="db4" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-4.7.25-19.el6_6.i686.rpm</filename><sum type="sha256">9bc402c81b3e95bdd7468ae55569cb7bf791467181e900c44c31d219e69caddd</sum></package><package arch="x86_64" name="db4" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">cb2d99550a21b7542a17bf83841f7d8b9a994eb7f9db89c1939a4ed1d43701dc</sum></package><package arch="x86_64" name="db4-devel" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-devel-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">8762092f208f0afe643781ab6417b78481e01bc7a1c3b43c455ebf0491df8e95</sum></package><package arch="x86_64" name="db4-cxx" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-cxx-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">77d6ba64116a2284f29eb09c82142f7abf40ebce1d532227092336001f79f0c8</sum></package><package arch="x86_64" name="db4-java" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-java-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">357b8e44b15ab5385734a144314fead0e22ab0945e7647292a34c85de717becb</sum></package><package arch="x86_64" name="db4-tcl" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-tcl-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">4f929fa36f54093a2da8bb1d41edaaa973075cca8bf47d987cc05eeb732f6527</sum></package><package arch="i686" name="db4-devel" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-devel-4.7.25-19.el6_6.i686.rpm</filename><sum type="sha256">97be6b298f20b035b9849067552cadcc56f44551fc4c8c1eca05b5efbd74ca0f</sum></package><package arch="x86_64" name="db4-utils" release="19.el6_6" src="db4-4.7.25-19.el6_6.src.rpm" version="4.7.25"><filename>db4-utils-4.7.25-19.el6_6.x86_64.rpm</filename><sum type="sha256">799e9c52ca2020deb9402597c03d53da145ab94e3c1af46dac283bb856c9120c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1085" id="RHBA-2015:1085-1" title="Rhba-2015:1085-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227236" id="1227236" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1222-1</id><title>Dracut Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, the drbg kernel module was not a mandatory component of the initramfs packages, which caused encrypted hard disk drives to be impossible to decrypt. This update includes drbg in initramfs, and all hard disk drives can now be decrypted as expected.
</description><issued date="2015-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="dracut-fips-aesni" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-fips-aesni-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">1afa54053a3d32d05d9b0e791cf86fa5c9ca5a6c83b180c43a1fb4ec7051bb92</sum></package><package arch="noarch" name="dracut-fips" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-fips-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">c56ed200e4008e28aba4effbb67b75a0eceb89d62ada5c4a8d508dac05a65e00</sum></package><package arch="noarch" name="dracut-generic" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-generic-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">e8caee9775a77697e73f3056f2d065c3924447637a47d4763f6589e3a3ef701b</sum></package><package arch="noarch" name="dracut-tools" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-tools-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">28a430386813e7fde2d221b2d8c26b0a4d60ee87b0dce8cc77af830d5cae3564</sum></package><package arch="noarch" name="dracut" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">c4b8ae276d6be342ecea6a85c845b9a6b739d15df57107fc1742f0c6b5062280</sum></package><package arch="noarch" name="dracut-network" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-network-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">72e6a5fd78300a8cd68840577cb7c0ff9939fe2195568c263973905c178642a3</sum></package><package arch="noarch" name="dracut-kernel" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-kernel-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">fd435c4dffa5136abefb0764a6e505eb18c391bdef4d0c4040277063a6892270</sum></package><package arch="noarch" name="dracut-caps" release="356.el6_6.3" src="dracut-004-356.el6_6.3.src.rpm" version="004"><filename>dracut-caps-004-356.el6_6.3.noarch.rpm</filename><sum type="sha256">5e9aaa8a08d10af6b312c84885e96ccf898d56a4df46b5b703ae8ac575dd73d7</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1241174" id="1241174" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHBA-2015-1222.html" id="RHBA-2015:1222-1" title="Dracut Bug Fix Update" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1256-1</id><title>Augeas Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* Previously, some cgroup controller types used in the /etc/cgconfig.conf file were not recognized. As a consequence, parsing error occurred in Augeas and an error message was returned. With this update, the Augeas module can parse files containing these controller names as expected.

* Entries in the /etc/services file containing colons in the service name prevented Augeas from parsing the file. This update makes sure that the "service_name" field in the services.aug file is able to support the colon character, and the aforementioned entries can now be parsed successfully.

* When entries in /etc/rsyslog.conf were configured for remote logging over Transmission Control Protocol (TCP), Augeas was unable to parse the file. The underlying source code has been fixed, and files containing this configuration are now parsed successfully.

* By default, the /etc/sysconfig/iptables.save file was parsed by the wrong module, which led to a parsing failure and an error reported by Augeas. The wrong module has been substituted with a correct one, and /etc/sysconfig/iptables.save is now parsed correctly by default.

* Previously, the Augeas utility did not correctly parse the "ssh" and "fence_kdump_*" parameters in the /etc/kdump.conf file. As a consequence, using Augeas to edit these parameters in kdump configuration failed. With this update, Augeas has been updated to parse "ssh" and "fence_kdump_*" as intended, and the described problem no longer occurs.

* Previously, the aug_match API returned paths of files and nodes with special characters unescaped, unsuitable for use in further API calls. Consequently, specially constructed file names could cause programs built on Augeas to function incorrectly, and implementing escaping in such programs was impossible. With this update, Augeas escapes paths returned from aug_match correctly, and paths returned from aug_match can be used safely and reliably in further API calls.

* Prior to this update, Augeas was unable to parse the /etc/krb5.conf configuration files containing values with curly brackets ("{}"). To Augeas lens (parser) has been fixed to handle these characters in krb5.conf setting values, and Augeas can now parse these krb5.conf files as expected.

* Previously. Augeas was unable to parse the .properties (Java-style) files containing a multi-line value that begins with a blank line. Augeas lens (parser) has been fixed to accept an empty starting line, thus fixing this bug.

In addition, this update adds the following enhancement:

* A lens for the /etc/shadow file format has been added to Augeas to parse the shadow password file.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="augeas-libs" release="10.el6" src="augeas-1.0.0-10.el6.src.rpm" version="1.0.0"><filename>augeas-libs-1.0.0-10.el6.i686.rpm</filename><sum type="sha256">689d43586b5686131839113eee4fb235c2080790c121647298679dfdf2cc9e7c</sum></package><package arch="i686" name="augeas-devel" release="10.el6" src="augeas-1.0.0-10.el6.src.rpm" version="1.0.0"><filename>augeas-devel-1.0.0-10.el6.i686.rpm</filename><sum type="sha256">d90443d900faf973001728bc7a6821b6800658064d03f40b521143f15f19c9ad</sum></package><package arch="x86_64" name="augeas" release="10.el6" src="augeas-1.0.0-10.el6.src.rpm" version="1.0.0"><filename>augeas-1.0.0-10.el6.x86_64.rpm</filename><sum type="sha256">bd73dd99dde497908fdaafd562465cc39bac5c463f432ed85124e463d20b205e</sum></package><package arch="x86_64" name="augeas-devel" release="10.el6" src="augeas-1.0.0-10.el6.src.rpm" version="1.0.0"><filename>augeas-devel-1.0.0-10.el6.x86_64.rpm</filename><sum type="sha256">3beb1dff4d2ab29956fe41c390e06ea40e7b1ac6b61cab0fc651f69c4e711db8</sum></package><package arch="x86_64" name="augeas-libs" release="10.el6" src="augeas-1.0.0-10.el6.src.rpm" version="1.0.0"><filename>augeas-libs-1.0.0-10.el6.x86_64.rpm</filename><sum type="sha256">cb89444b252cdeefe30b6003075b177db10ca3ea947667329b6b5df6611fca47</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1256" id="RHBA-2015:1256-1" title="Rhba-2015:1256-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1112388" id="1112388" title="Augeas Cgconfig Lens Fails If Blkio Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121263" id="1121263" title="Augeas Aug Lens Bug For /Etc/Services Currently Doesn'T Handle Colon In Service_Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1129508" id="1129508" title="Augeas Cannot Parse /Etc/Rsyslog.Conf With Tcp Hosts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144652" id="1144652" title="Using The Wrong Lens To Parse /Etc/Sysconfig/Iptables.Save" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1160261" id="1160261" title="Please Backport The Upstream Shadow.Aug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1175854" id="1175854" title="Augeas Does Not Support Fence_Kdump* Options In Kdump.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1186318" id="1186318" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203597" id="1203597" title="Augeas Fails To Parse /Etc/Krb5.Conf With '{}' In The Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1209885" id="1209885" title="Properties Lens Doesn'T Like Multi-Line Where First Line Has No Value" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1281-1</id><title>Libqb Bug Fix And Enhancement Update</title><description>The libqb packages have been upgraded to upstream version 0.17.1, which provides a number of bug fixes and enhancements over the previous version. One of the notable changes gives components consuming inter-process communication (IPC) API of libqb more control over IPC buffer sizes. The ability to utilize larger buffer sizes in a consistent way between the IPC client and server allows pacemaker to scale much further in the number of resources the cluster can manage.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libqb" release="1.el6" src="libqb-0.17.1-1.el6.src.rpm" version="0.17.1"><filename>libqb-0.17.1-1.el6.x86_64.rpm</filename><sum type="sha256">03a2c12f1e629f6cb7d6e373bdb58e49b58d5a78ffa7056ed017b42e9d5b5960</sum></package><package arch="i686" name="libqb" release="1.el6" src="libqb-0.17.1-1.el6.src.rpm" version="0.17.1"><filename>libqb-0.17.1-1.el6.i686.rpm</filename><sum type="sha256">5f8c777a1406ca991c6449cb773f86f5458c0b7e1afa231ab06ff1671e5f64e6</sum></package><package arch="i686" name="libqb-devel" release="1.el6" src="libqb-0.17.1-1.el6.src.rpm" version="0.17.1"><filename>libqb-devel-0.17.1-1.el6.i686.rpm</filename><sum type="sha256">86510d3e6c1b5a451a86b786dfd31edbe2620b7be4e04400384ba9e105997135</sum></package><package arch="x86_64" name="libqb-devel" release="1.el6" src="libqb-0.17.1-1.el6.src.rpm" version="0.17.1"><filename>libqb-devel-0.17.1-1.el6.x86_64.rpm</filename><sum type="sha256">9464a75796335da61edd7bbae0bd721a0b44ee2dcc832165f5cc049005c11496</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1281" id="RHBA-2015:1281-1" title="Rhba-2015:1281-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1110042" id="1110042" title="Libqb Server Side Buffer Enhancements" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1284-1</id><title>Mod_Nss Bug Fix And Enhancement Update</title><description>The mod_nss packages have been upgraded to upstream version 1.0.10, which provides a number of bug fixes and enhancements over the previous version. Most notably, this update adds support for TLS version 1.2 to mod_nss.

The httpd service must be restarted for this update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mod_nss" release="1.el6" src="mod_nss-1.0.10-1.el6.src.rpm" version="1.0.10"><filename>mod_nss-1.0.10-1.el6.x86_64.rpm</filename><sum type="sha256">432127f64dbf7652b75df15350938885c7bb2b4aad74486d567baed799bba770</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1284" id="RHBA-2015:1284-1" title="Rhba-2015:1284-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166316" id="1166316" title="Rebase Mod_Nss To Support Tlsv1.2" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1288-1</id><title>Libpcap Bug Fix Update</title><description>This update fixes the following bug:

* Previously, running the "tcpdump" command with the filter expression containing the keyword "vlan" produced unexpected output, as the filter generated by the libpcap Berkeley Packet Filter (BPF) compiler did not employ BPF extensions. To  libpcap has been amended and now generates filters that use BPF extensions when appropriate. As a result, running "tcpdump" with filters containing "vlan" produces correct results.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="14" name="libpcap" release="4.20130826git2dbcaa1.el6" src="libpcap-1.4.0-4.20130826git2dbcaa1.el6.src.rpm" version="1.4.0"><filename>libpcap-1.4.0-4.20130826git2dbcaa1.el6.x86_64.rpm</filename><sum type="sha256">8b9a7e6627edc7225ce84a0226454244bfad9e5194a47a0da6372dadbf19f5ad</sum></package><package arch="i686" epoch="14" name="libpcap" release="4.20130826git2dbcaa1.el6" src="libpcap-1.4.0-4.20130826git2dbcaa1.el6.src.rpm" version="1.4.0"><filename>libpcap-1.4.0-4.20130826git2dbcaa1.el6.i686.rpm</filename><sum type="sha256">35e112acc246bab9e2defdbe91174245efe5635a654e54bf67572057772591a2</sum></package><package arch="i686" epoch="14" name="libpcap-devel" release="4.20130826git2dbcaa1.el6" src="libpcap-1.4.0-4.20130826git2dbcaa1.el6.src.rpm" version="1.4.0"><filename>libpcap-devel-1.4.0-4.20130826git2dbcaa1.el6.i686.rpm</filename><sum type="sha256">76e018efe2b2f53ef6689df49cb38e7bbfee1444cffd7bb44269f18bb3dc1a47</sum></package><package arch="x86_64" epoch="14" name="libpcap-devel" release="4.20130826git2dbcaa1.el6" src="libpcap-1.4.0-4.20130826git2dbcaa1.el6.src.rpm" version="1.4.0"><filename>libpcap-devel-1.4.0-4.20130826git2dbcaa1.el6.x86_64.rpm</filename><sum type="sha256">949bfa7c466f433cd0477a66b64c9073b49a33cd371d84c32bb1a4f517360e25</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1288" id="RHBA-2015:1288-1" title="Rhba-2015:1288-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025841" id="1025841" title="Unable To Filter Packets By Vlan Tag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1063328" id="1063328" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1315-1</id><title>Jss Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* Previously, the HASH_ALGORITHM constant was defined incorrectly. As a consequence, object identifiers (OIDs) for SHA-256, SHA-384, and SHA-512 hash functions were incorrect. With this update, the underlying source code has been modified, and the mentioned OIDs are now correct.

* Prior to this update, the source code for JSS was missing a condition for validating the key strength for the RC4 software stream cipher. As a consequence, JSS did not validate the key strength properly. A patch has been applied to  and JSS now performs key strength validation checks as expected.

In addition, this update adds the following enhancement:

* The Tomcat service has been updated to support the Transport Layer Security cryptographic protocol version 1.1 (TLSv1.1) and the Transport Layer Security cryptographic protocol version 1.2 (TLSv1.2) using JSS.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="jss" release="35.el6" src="jss-4.2.6-35.el6.src.rpm" version="4.2.6"><filename>jss-4.2.6-35.el6.x86_64.rpm</filename><sum type="sha256">d7d54288b5d0701305820a2e4cf0cdccef0548dd02855805f67e5f5ae3e918fe</sum></package><package arch="x86_64" name="jss-javadoc" release="35.el6" src="jss-4.2.6-35.el6.src.rpm" version="4.2.6"><filename>jss-javadoc-4.2.6-35.el6.x86_64.rpm</filename><sum type="sha256">999bc7baa5d03b8adaf12d674998a6da35763f8c535e08b61eef8fc43c4c9995</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1315" id="RHBA-2015:1315-1" title="Rhba-2015:1315-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167470" id="1167470" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190302" id="1190302" title="Incorrect Oids For Sha2 Algorithms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190303" id="1190303" title="Key Strength Validation Is Not Performed For Rc4 Algorithm" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1316-1</id><title>Tomcatjss Bug Fix And Enhancement Update</title><description>This update fixes the following bug:

* Previously, the init() function in tomcatjss looked for the clientauth attribute which was not present. As a consequence, Tomcat returned NullPointerException in init() on startup, and in addition, some properties, such as enableOSCP and properties for enabling certain SSL ciphers, were not called. A patch has been applied to fix this problem. As a result, NullPointerException no longer occurs in the described situation, and the mentioned properties are called as expected.

In addition, this update adds the following enhancement:

* The Tomcat service has been updated to support the Transport Layer Security cryptographic protocol version 1.1 (TLSv1.1) and the Transport Layer Security cryptographic protocol version 1.2 (TLSv1.2) using JSS.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcatjss" release="4.el6" src="tomcatjss-2.1.0-4.el6.src.rpm" version="2.1.0"><filename>tomcatjss-2.1.0-4.el6.noarch.rpm</filename><sum type="sha256">e0861cc40a43a1f929466f43f21389246046d3c08ab1943f17b4927b6e31e73b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1316" id="RHBA-2015:1316-1" title="Rhba-2015:1316-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167471" id="1167471" title="[Rfe] Provide Tomcat Support For Tls V1.1 And Tls V1.2 (Tomcatjss)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190911" id="1190911" title="Nullpointerexception In Tomcatjss Searching For Attribute 'Clientauth'" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1324-1</id><title>Python-Nss Bug Fix And Enhancement Update</title><description>The python-nss packages have been upgraded to upstream version 0.16.0, which provides a number of bug fixes and enhancements over the previous version, including:

* Added support for setting trust attributes on a certificate. * Added support for the SSL version range API, information on the SSL cipher suites, and information on the SSL connection.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-nss" release="1.el6" src="python-nss-0.16.0-1.el6.src.rpm" version="0.16.0"><filename>python-nss-0.16.0-1.el6.x86_64.rpm</filename><sum type="sha256">5718aae5fe44a0f45a07ffb00c5f50673b52b8d5a12c60834c61ce7532b5a440</sum></package><package arch="x86_64" name="python-nss-doc" release="1.el6" src="python-nss-0.16.0-1.el6.src.rpm" version="0.16.0"><filename>python-nss-doc-0.16.0-1.el6.x86_64.rpm</filename><sum type="sha256">cc1ab8168d5deb49800baba2e8c9a3b611c4d998def087153cb959a9decd7a9e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1324" id="RHBA-2015:1324-1" title="Rhba-2015:1324-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154776" id="1154776" title="Add Api Call For Ssl_Versionrangeset (Rebase)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1326-1</id><title>389-Ds-Base Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* When a suffix-mapping tree entry was created without the corresponding back-end database, the server failed to start. This bug has been fixed.

* If a value of a password policy attribute was deleted, it caused a null reference and an unexpected termination of the server. These crashes no longer occur.

* This update fixes a memory leak caused by a previous patch for BZ#1080185.

* If a Virtual List View search fails with the timelimit or adminlimit parameters exceeded, the allocated memory of the IDL no longer leaks.

* If a search for "passwordAdminDN" in a "cn=config" entry returns a non- existing value, a memory leak no longer occurs.

* Rebuilding the Class of Service (CoS) cache no longer causes a memory leak.

* A bug in the nested CoS, when the closest above password policy was sometimes not selected as expected, has been fixed.

* When a SASL bind operation fails and Account Lockout is enabled, the Root DSE entry no longer gets incorrectly updated with passwordRetryCount.

* Password restrictions and syntax checks for Directory Manager and password administrators are now properly applied so that these roles are not affected by them.

* Performance degradation with searches in large groups has been fixed by introducing normalized DN cache.

* Due to a known vulnerability in SSLv3, this protocol is now disabled by default.

* This update adds the flow control so that unbalanced process speed between a supplier and a consumer does not cause replication to become unresponsive.

* A bug to replicate an "add: userPassword" operation has been fixed.

* A bug in the Windows Sync plug-in code caused AD-only member values to be accidentally removed. Now, local and remote entries are handled properly, preventing data loss.

* Performing a schema reload sometimes caused a running search to fail to return results. Now, the old schema is not removed until the reload is complete. The search results are no longer corrupted.

* The Berkeley DB library terminated unexpectedly when the Directory Server simultaneously opened an index file and performed a search on the "cn=monitor" subtree. The two operations are now mutually exclusive, which prevents the crash.

* When simple paged results requests were sent to the Directory Server asynchronously and then abandoned immediately, the search results could leak. Also, the implementation of simple paged results was not thread- safe. This update fixes the leak and modifies the code to be thread-safe.

In addition, this update adds the following enhancements:

* A new memberOf plug-in configuration attribute memberOfSkipNested has been added. This attribute allows you to skip the nested group check, which improves performance of delete operations.

* The Directory Server now supports TLS versions supported by the NSS library.

* The logconv.pl utility has been updated to include information about the SSL/TLS versions in the access log.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base-devel" release="60.el6" src="389-ds-base-1.2.11.15-60.el6.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-60.el6.x86_64.rpm</filename><sum type="sha256">26b65d8d45e11d0bd38e402aa96d7bacd31ba645ae92e76b4626ec33dcf94585</sum></package><package arch="x86_64" name="389-ds-base-libs" release="60.el6" src="389-ds-base-1.2.11.15-60.el6.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-60.el6.x86_64.rpm</filename><sum type="sha256">b3d2d1a67c0155797bd19685d6a6d4175891708995664337350dadbcc687b924</sum></package><package arch="i686" name="389-ds-base-devel" release="60.el6" src="389-ds-base-1.2.11.15-60.el6.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-60.el6.i686.rpm</filename><sum type="sha256">b3530e933736efb55f6ee8b0c3467518cd718523cffa96a55e5d7385ea60aed8</sum></package><package arch="i686" name="389-ds-base-libs" release="60.el6" src="389-ds-base-1.2.11.15-60.el6.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-60.el6.i686.rpm</filename><sum type="sha256">676855959f61308cad7d59ec2341ae1f4e00651d61e4e1d145786e43c5cac293</sum></package><package arch="x86_64" name="389-ds-base" release="60.el6" src="389-ds-base-1.2.11.15-60.el6.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-60.el6.x86_64.rpm</filename><sum type="sha256">96c521e31dafeabec59eb4ed78b33f241b799e8d1f3dd3d8e361c781c678a778</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1326" id="RHBA-2015:1326-1" title="Rhba-2015:1326-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1048987" id="1048987" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1080185" id="1080185" title="Creating A Glue Fails If One Above Level Is A Conflict Or Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1115960" id="1115960" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1118285" id="1118285" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1138745" id="1138745" title="Memory Leak During Reliab15 Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144092" id="1144092" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145072" id="1145072" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145374" id="1145374" title="Winsync - Manual Replica Refresh Removes Ad-Only Member Values From Ds And Ad In Groups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145379" id="1145379" title="Adding An Entry With An Invalid Password As Rootdn Is Incorrectly Rejected" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153739" id="1153739" title="Disable Ssl V3, By Default." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1162704" id="1162704" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166313" id="1166313" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167976" id="1167976" title="[Rfe] Memberof - Add Option To Skip Nested Group Lookups During Delete Operations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169974" id="1169974" title="Account Lockout Attributes Incorrectly Updated After Failed Sasl Bind" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169975" id="1169975" title="Cos Memory Leak When Rebuilding The Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171308" id="1171308" title="Replication Not Working For 'Add: Userpassword' Ldap Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1175868" id="1175868" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183820" id="1183820" title="Windows Sync Accidentally Cleared Raw_Entry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193241" id="1193241" title="Logconv.Pl -- Support  Parsing/Showing/Reporting Different Protocol Versions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193243" id="1193243" title="Ldbm_Usn_Init: Valgrind Reports Invalid Read / Sigsegv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203338" id="1203338" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207024" id="1207024" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223068" id="1223068" title="Regression Introduced By The Simple Paged Results Fixes." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228402" id="1228402" title="Individual Abandoned Simple Paged Results Request Has No Chance To Be Cleaned Up" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1328-1</id><title>Dracut Bug Fix And Enhancement Update</title><description>Bugs:

* Previously, the dracut utility incorrectly printed an error message if the /tmp/net.$netif.override file did not exist. With this update, dracut verifies whether /tmp/net.$netif.override exists before it attempts to read it, which prevents the described error from occurring.

* Prior to this update, the dracut logrotate configuration determined that the "time" option had priority over the "size" option. Consequently, the dracut logs were rotated only yearly regardless of their size. This update removes the "time" option of the logrotate configuration, and the dracut logs now rotate when the size exceeds 1 MB.

* If "ip=ibft" was specified as a kernel command-line argument, but the "ifname=&amp;lt;iface&amp;gt;:&amp;lt;mac&amp;gt;" parameter was not, dracut did not handle network interfaces correctly. As a consequence, iSCSI disks were not connected to the system, and thus the system failed to boot. With this update, dracut handles "ip=ibft" as a kernel command-line argument, even without "ifname=&amp;lt;iface&amp;gt;:&amp;lt;mac&amp;gt;", and iSCSI disks are now connected to the system successfully resulting in successful system boot.

* If the /etc/crypttab file did not contain a new line as the last character, dracut failed to parse the last line of the file, and the encrypted disk could not be unlocked. This update fixes dracut to handle /etc/crypttab without a new line at the end, and the encrypted disk specified on the last line is now handled as expected, requesting a password and unlocking the disk.

* If the /etc/lvm/lvm.conf file had host tags defined, the initramfs virtual file system did not insert the /etc/lvm/lvm_hostname.conf file during kernel upgrade, which previously led to a boot failure. This update adds /etc/lvm/lvm_hostname.conf along with /etc/lvm/lvm.conf, and the system now boots with host tags as intended.

* Previously, dracut did not parse the kernel command line correctly for some iSCSI parameters, which led to iSCSI disks not being connected.  With this update, dracut parses the kernel command-line parameters for iSCSI correctly, and iSCSI disks are now connected successfully.

* Due to an internal change in the nss-softokn-freebl package,  dracut could not build an initramfs file in FIPS mode. To  nss-softokn-freebl delivers its own dracut module and dracut now requires nss-softokn-freebl as a dependency. As a result, dracut can build FIPS-enabled initramfs with all files.

* When network parameters were specified on the kernel command line, dracut only attempted to connect to iSCSI targets provided the network could be brought up. Consequently, for misconfigured networks, iSCSI firmware settings or iSCSI offload connections were not explored. To dracut now attempts to connect to the iSCSI targets even if after a certain timeout no network connection can be brought up. As a result, iSCSI targets can be connected even for misconfigured kernel command-line network parameters.

* Due to changes in FIPS requirements, a new deterministic random-byte generator (drbg) was added to the kernel for FIPS purposes. With this update, dracut loads drbg as other kernel modules in FIPS mode.

Enhancements:

* With this update, dracut can boot from iSCSI on a network with VLANs configured, where the VLAN settings are stored in the iBFT BIOS.

* LVM thin volumes are now supported in initramfs.</description><release>Scientific Linux Fermi</release><issued date="2015-08-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="dracut" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-004-388.el6.noarch.rpm</filename><sum type="sha256">58061aa06807005ff940695c115d5bd86fc2c249ae2282a18a08634cc0fe63ca</sum></package><package arch="noarch" name="dracut-network" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-network-004-388.el6.noarch.rpm</filename><sum type="sha256">8e46411b94068d4c8945d353b5b8a46c9f23134a77c7646d3ef4717d9be6d4d9</sum></package><package arch="noarch" name="dracut-caps" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-caps-004-388.el6.noarch.rpm</filename><sum type="sha256">466d8879b12214a7855f39b0c8fb80a29858a5d1669c5c192dcb294467186056</sum></package><package arch="noarch" name="dracut-fips" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-fips-004-388.el6.noarch.rpm</filename><sum type="sha256">7c1f311fb15842d6775fef9d96ce2a3e6d26cea4c0a8d9608a997a41e51992bf</sum></package><package arch="noarch" name="dracut-kernel" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-kernel-004-388.el6.noarch.rpm</filename><sum type="sha256">e7b4f6836575075ef4f3c24036402e7fe590c6b0cd8975be6e6cfbf65e06b878</sum></package><package arch="noarch" name="dracut-generic" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-generic-004-388.el6.noarch.rpm</filename><sum type="sha256">77facae5c4edcf17e71a279659208cf19308417c689a10a45a3a77ae87300a03</sum></package><package arch="noarch" name="dracut-tools" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-tools-004-388.el6.noarch.rpm</filename><sum type="sha256">ec956b540e760a490c6636ea78d1611577d4166e8cdba5c35a61fad58cce9e98</sum></package><package arch="noarch" name="dracut-fips-aesni" release="388.el6" src="dracut-004-388.el6.src.rpm" version="004"><filename>dracut-fips-aesni-004-388.el6.noarch.rpm</filename><sum type="sha256">4616c080c7d1e02a6b8ef64b83021a17f5a67606278aee1d2c91215bd5251ef0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1328" id="RHBA-2015:1328-1" title="Rhba-2015:1328-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1005886" id="1005886" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069275" id="1069275" title="Dracut-004-336 Issues When Ifname Is Not Specified As Kernel Parameter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1085562" id="1085562" title="Dracut Is Unable To Read Crypttab If Last Line Does Not Contain A Newline" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1111358" id="1111358" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1130565" id="1130565" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176671" id="1176671" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184142" id="1184142" title="Rhel 6.6 Kernel Will Not Boot With Fips Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191721" id="1191721" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193528" id="1193528" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198117" id="1198117" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1226905" id="1226905" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1345-1</id><title>Subscription-Manager And Python-Rhsm Bug Fix And Enhancement Update</title><description>The subscription-manager-migration-data package provides certificates for migrating a system from the legacy Red Hat Network Classic (RHN) to Red Hat Subscription Management (RHSM).

The python-rhsm packages provide a library for communicating with the representational state transfer (REST) interface of a Red Hat Unified Entitlement Platform. The Subscription Management tools use this interface to manage system entitlements, certificates, and access to content.

The subscription-manager packages have been upgraded to upstream version 1.14.10, which provides numerous bug fixes and enhancements over the previous version.

The subscription-manager-migration-data package has been upgraded to upstream version 2.0.22, which provides a number of bug fixes and enhancements over the previous version.

The python-rhsm packages have been upgraded to upstream version 1.14.3, which provides a number of bug fixes and enhancements over the previous version.

This update also fixes the following bugs:

* Previously, the "yum update --disablerepo" command removed a product certificate. As a consequence, the product was no longer installed on the client and it was impossible to retrieve the content. This bug has been fixed, certificates are no longer removed when the "--disablerepo" option is used, and repositories can now be enabled or disabled as expected.

* When the .pem certificate file failed to be located, an exit status of 1 was always returned. As a consequence, an error was indicated also in case no products were installed on the system. With this update, when no products are installed and the "--auto-attach" option is used for registering a system, the message "No products installed" is returned to inform the user that there is no need to attach any subscriptions and the system status is "Current" (green). Also, a zero return code indicates that the registration was successful.

* When configuration options in camelCase are removed from the /etc/rhsm/rhsm.conf file and then restored with the "subscription-manager config" command, they are restored in lowercase. For example, the "subscription-manager config --rhsmcertd.autoattachinterval" command fails to restore the "autoAttachInterval" option in camelCase and, as a consequence, the entry is ignored by the rhsmcertd daemon. However, an existing value can be successfully changed by using such a command. With this update, the "subscription-manager config --remove" command no longer deletes the option from the configuration file but restores its default value instead. As a result, the described problem occurs only when configuration options are manually deleted from /etc/rhsm/rhsm.conf and not reset with the "--remove" option, which is recommended.

In addition, this update adds the following enhancements:

* Subscription Manager now includes certificates and maps for Advanced Mission Critical Update Support (AUS). This enables migration from RHN Classic to RHSM for AUS subscriptions.

* The rhn-migrate-classic-to-rhsm tool now supports Activation Keys when registering to RHSM. This simplifies automated migration.

* The rhn-migrate-classic-to-rhsm tool no longer requires RHN Classic credentials if the new "--keep" option is used. This functionality can help simplify automated migration.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="subscription-manager" release="1.el6" src="subscription-manager-1.14.10-1.el6.src.rpm" version="1.14.10"><filename>subscription-manager-1.14.10-1.el6.x86_64.rpm</filename><sum type="sha256">3e1176101f2bc661bcbcefb9fd66866b97fc51c6896a3f3a207855e78f59e729</sum></package><package arch="x86_64" name="python-rhsm" release="1.el6" src="python-rhsm-1.14.3-1.el6.src.rpm" version="1.14.3"><filename>python-rhsm-1.14.3-1.el6.x86_64.rpm</filename><sum type="sha256">d28b62c5d3689a08d61949f998cce7ef6e369f5f5ebea5343d7b3615e7943f2c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1345" id="RHBA-2015:1345-1" title="Rhba-2015:1345-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123014" id="1123014" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154375" id="1154375" title="[Rfe] Rhn-Migrate-Classic-To-Rhsm Should Support Activation Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1159163" id="1159163" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180273" id="1180273" title="[Rfe] Rhn-Migrate-Classic-To-Rhsm Should Allow The User To Migrate A System Without Requiring Credentials On Rhn Classic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195369" id="1195369" title="Upgrade Rhsm Components To The Latest Tagged Commits From Upstream Master For Rhel 6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223860" id="1223860" title="Subscription-Manager Config --Rhsmcertd.Autoattachinterval Adds Configuration With Incorrect Case." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=825089" id="825089" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1359-1</id><title>Imagemagick Bug Fix And Enhancement Update</title><description>The ImageMagick packages have been upgraded to upstream version 6.7.2.7, which provides a number of bug fixes and enhancements over the previous version. Notably, it addresses a problem with conversion of Portable Network Graphics (PNG) images that caused the size of the converted file to be much larger than that of the original file.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="autotrace-devel" release="28.el6" src="autotrace-0.31.1-28.el6.src.rpm" version="0.31.1"><filename>autotrace-devel-0.31.1-28.el6.x86_64.rpm</filename><sum type="sha256">0cbc5eceda30163b75c8f21df50a7b97aaa66c1e3405b86f9daaf9409c7dbabf</sum></package><package arch="i686" name="autotrace" release="28.el6" src="autotrace-0.31.1-28.el6.src.rpm" version="0.31.1"><filename>autotrace-0.31.1-28.el6.i686.rpm</filename><sum type="sha256">abe492c51a039d4dcf45ab2bdd889f854fba35571f0bec656bee69ce2f3d3296</sum></package><package arch="x86_64" name="inkscape" release="10.el6" src="inkscape-0.47-10.el6.src.rpm" version="0.47"><filename>inkscape-0.47-10.el6.x86_64.rpm</filename><sum type="sha256">e1fb617746674ecd69b92eccf4a484741f43200a633eb14cd689c0ba90ec8b11</sum></package><package arch="x86_64" name="inkscape-view" release="10.el6" src="inkscape-0.47-10.el6.src.rpm" version="0.47"><filename>inkscape-view-0.47-10.el6.x86_64.rpm</filename><sum type="sha256">1c2b7ba08012685474d238be90e83652b14f6a7f8675f464eae5ba9bd48ad40c</sum></package><package arch="x86_64" name="autotrace" release="28.el6" src="autotrace-0.31.1-28.el6.src.rpm" version="0.31.1"><filename>autotrace-0.31.1-28.el6.x86_64.rpm</filename><sum type="sha256">487b527561d2b6f42007d4ba7fe2e8bb2f4770ec68f732fe93b6824256e06a60</sum></package><package arch="i686" name="autotrace-devel" release="28.el6" src="autotrace-0.31.1-28.el6.src.rpm" version="0.31.1"><filename>autotrace-devel-0.31.1-28.el6.i686.rpm</filename><sum type="sha256">1b51417055a9eca0d64e3908924cf30a35b06f01c5fc273f1b9f7947a2f66df4</sum></package><package arch="x86_64" name="inkscape-docs" release="10.el6" src="inkscape-0.47-10.el6.src.rpm" version="0.47"><filename>inkscape-docs-0.47-10.el6.x86_64.rpm</filename><sum type="sha256">5b9d81a74339ac49c7191c513e74ccb719b3195ff5e0aa160181a088033c0095</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1359" id="RHBA-2015:1359-1" title="Rhba-2015:1359-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1158865" id="1158865" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1375-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* When the /etc/nsswitch.conf file was modified so that the SSSD service was used for various lookups, certain services were not able to communicate with SSSD due to insufficient SELinux policy rules. With this update, the SELinux policy has been modified to allow the services to work as expected in this situation.

* With this update, SELinux policy rules for the glusterd, ctdbd, samba, and nagios services have been fixed to allow the Gluster layer product to work with SELinux properly.

In addition, this update adds the following enhancement:

* When writing SELinux policy rules that allow random services to read or execute general files located, for example, in the /etc/ or /usr/ directories, policy writers had to add additional rules for each service. These updated selinux-policy packages introduce the new "base_ro_file_type" and "base_file_type" SELinux attributes, which policy writers can use to declare global rules against a rule per service.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-targeted" release="279.el6" src="selinux-policy-3.7.19-279.el6.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6.noarch.rpm</filename><sum type="sha256">15fcaf071819b1785df805e879bf058987149ae4f68b4edf58a39524de7261d6</sum></package><package arch="noarch" name="selinux-policy" release="279.el6" src="selinux-policy-3.7.19-279.el6.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6.noarch.rpm</filename><sum type="sha256">bf46f9c59069059addfa0324ffc60d4a5cdbb9e1f7a726cdc97eaed77631c9e4</sum></package><package arch="noarch" name="selinux-policy-mls" release="279.el6" src="selinux-policy-3.7.19-279.el6.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6.noarch.rpm</filename><sum type="sha256">1a4b7768dea179da8575b447a7fe7734b498bfb78c74a680c398ddcdf984f3d1</sum></package><package arch="noarch" name="selinux-policy-minimum" release="279.el6" src="selinux-policy-3.7.19-279.el6.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6.noarch.rpm</filename><sum type="sha256">963ee23631fa915403b144ba8a721b920f7677069294de708a080915ee0448a0</sum></package><package arch="noarch" name="selinux-policy-doc" release="279.el6" src="selinux-policy-3.7.19-279.el6.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6.noarch.rpm</filename><sum type="sha256">9e48e943da467c55572b6178771477dfd23bbba6900e18aabffd4076ad9df8ba</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1375" id="RHBA-2015:1375-1" title="Rhba-2015:1375-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153712" id="1153712" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198047" id="1198047" title="Selinux Prevents Portreserve From Communicating With Sssd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198057" id="1198057" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198060" id="1198060" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198064" id="1198064" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198071" id="1198071" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198077" id="1198077" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198165" id="1198165" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198436" id="1198436" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202935" id="1202935" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203756" id="1203756" title="Selinux Prevents Conman From Communicating With Sssd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207140" id="1207140" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212729" id="1212729" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1215632" id="1215632" title="[Selinux] [Rhgs] Update The Labelling For All The Executable Hooks Under /Var/Lib/Glusterd/Hooks/ On Rhel-6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1219317" id="1219317" title="Update Selinux Policies For Samba And Ctdb In Rhel 6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221929" id="1221929" title="[Selinux] Update Selinux Policies For Samba (Connect And Read Access)In Rhel6.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228197" id="1228197" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1396-1</id><title>Redhat-Rpm-Config Bug Fix Update</title><description>This update fixes the following bugs:

* Prior to this update, the find-requires.ksyms script provided by the redhat-rpm-config package could not locate the kernel Application Binary Interface (ABI) reference files provided by the kabi-whitelists package. As a consequence, building an RPM that contained a kernel module (*.ko) resulted in the "KERNEL ABI COMPATIBILITY WARNING" error message, and no compatibility check was performed. With this update, the kernel ABI reference files can be successfully located, and ABI compatibility of kernel object files can now be verified in the described situation.

* RPM scans files during the build process for dependencies, and if a file is accidentally detected as a script by libmagic, RPM parses the first line for the "#!" string to get the interpreter. Previously, RPM could pick up random data if the "#!" string was not included at the beginning of the file. With this update, the RPM verification process is more thorough, and incorrect requirements are no longer picked up.

* With this update, the redhat-rpm-config package has been added as a dependency of the rpm-build package. A new RPM virtual provide has been added to the system-rpm-config package, which allows system-rpm-config to be required by rpm-build while still being able to be replaced by a third party package.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="redhat-rpm-config" release="44.sl6" src="redhat-rpm-config-9.0.3-44.sl6.src.rpm" version="9.0.3"><filename>redhat-rpm-config-9.0.3-44.sl6.noarch.rpm</filename><sum type="sha256">3a39ae6fc2f834054114c0ef4c1bd07e65ae5f81f28dbd8eca0b24824ef72798</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1396" id="RHBA-2015:1396-1" title="Rhba-2015:1396-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179521" id="1179521" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199983" id="1199983" title="Redhat-Rpm-Config Should Provide System-Rpm-Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=842761" id="842761" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1448-1</id><title>Sssd Bug Fix And Enhancement Update</title><description>The sssd packages have been upgraded to upstream version 1.12.4, which provides a number of bug fixes and enhancements over the previous version.

* The "domains=" option for the pam_sss module * The UPN (User Principal Name) attribute to identify users and user logins * Password expiration warnings for non-password authentication * The ID views feature * Transferring the user shell attribute from an Active Directory (AD) server to an Identity Management (IdM) client * Updating cached entries out-of- band in the background * The ad_site option can be used to override the AD site discovered from DNS * A new Kerberos plug-in maps Kerberos principals to local SSSD user names * Groups for AD trusted users are displayed without logging in * The case_sensitive option accepts the "preserve" value. * The ldap_access_order option accepts the "ppolicy" value. * SSSD can use GPOs on an AD server

Bug fixes:

* Applications leveraging identities from SSSD could terminate unexpectedly while invalidating the memory cache using the sss_cache utility. This bug has been fixed, and using sss_cache is safe.

* SSSD properly recognizes Windows 2012R2 as an AD server and applies the correct AD-specific performance optimizations.

* SSSD failed to connect to servers that only allowed authenticated connections to read the rootDSE entry, such as IBM Tivoli LDAP servers. SSSD now retries an authenticated connection after a non-authenticated connection fails while reading rootDSE. As a result, SSSD works as expected with these servers.

* When the simple_allow_groups and simple_allow_users options contained non-existent and existing entries, SSSD denied access to the existing users or groups. Now, SSSD logs and skips the non-existent entries and correctly handles the existing ones.

* This update fixes bugs that caused SSSD to terminate unexpectedly due to memory errors or when trying to access callback data.

* The sssd-ldap(5) and sssd.conf(5) man pages have been modified.

* SSSD downloaded an unnecessary amount of data when obtaining information about groups from an AD provider when using POSIX attributes on the server. With this update, SSSD downloads only the information about the group object, not the contents of the group.

* SSSD did not properly handle the "objectGUID" AD LDAP attribute. Now, SSSD considers "objectGUID" a binary value as expected, and the attribute is stored correctly.

* If a multi-process program requested the initgroups data immediately after SSSD startup, before the SSSD cache was ready, the NSS responder could incorrectly return an empty group list. With this update, the initgroups requests from a multi-process program with an empty cache work correctly, and the described problem no longer occurs.

* Setups with "subdomains_provider=none" set for AD domains did not sometimes work as expected. Now, the ldap_idmap_default_domain_sid option value is used for the SSSD main domain, thus fixing the bug. Note that ldap_idmap_default_domain_sid must be set for SSSD to function correctly in this situation.

Enhancement:

* SRV queries now honor the time to live (TTL) values from DNS.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sssd-dbus" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-dbus-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">a6905080cd0e84447b45939a5e59465108ee2cafb8dd0368b81f88a96ffbac91</sum></package><package arch="i686" name="libsss_idmap-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">050357acb39411c2e753319f81b018a1760e6c5a87446293e607f69fff060104</sum></package><package arch="x86_64" name="sssd-client" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">30468f67a77b5270af1d0eeb13d8c948c045d485db5da0fe0b38b5c0469215e2</sum></package><package arch="x86_64" name="sssd-common-pac" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-common-pac-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">bf1e5fed8b1824668970041960530d17caced910446c8edc12447afeb5512cff</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">0a0768664ababc4ba354fcf28a93bb34f7024eb93b652ee1d87eafd5351930c7</sum></package><package arch="i686" name="sssd-client" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">ba10a9cb3f57ef92b655f885d7659788abe7b7fa0bb8fc7fbdad80bf6a6fb2f0</sum></package><package arch="i686" name="libsss_idmap" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">b47c270773f8ae8bc115d8e1c2b1929add3be37fa51fa23f4dff1c217a06b250</sum></package><package arch="x86_64" name="sssd" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">68520b898c63f9cb96a00227cb193fec5f45f1677754547a12a3e71f2375c740</sum></package><package arch="x86_64" name="sssd-proxy" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-proxy-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">2c78783644c7836a05757e0b10b3a71a55956e75fa6f913832a19b6cffa81826</sum></package><package arch="i686" name="libsss_nss_idmap" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">bc68f18ce284c48655f8301a79cc2234d90d45c25e051219b619141a23868061</sum></package><package arch="noarch" name="python-sssdconfig" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>python-sssdconfig-1.12.4-47.el6.noarch.rpm</filename><sum type="sha256">527420455931d013a996b48a2e9b3b2de25cde89bb8d50746c9a925d422b5c63</sum></package><package arch="x86_64" name="libsss_nss_idmap-python" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-python-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">fc0a540676757796c97f9e205b8b0a6d9d25f8ebd0595592d6a4d75a1cbe037a</sum></package><package arch="x86_64" name="libipa_hbac" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">b3a4b2d6d7e4b2782393c2347eec111ba2636d40236193164c3b0d3d16b59fe0</sum></package><package arch="x86_64" name="sssd-common" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-common-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">b65ceef5788f6fe3f012c9dbf80346c0170aa6c1a8738d52f1214c837f3c688d</sum></package><package arch="x86_64" name="sssd-ipa" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-ipa-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">3343d716a06c99b6565442bccb0602d4b21b8a25c41d1eae955d523c3693c2d5</sum></package><package arch="x86_64" name="libsss_simpleifp" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">5329c9135425e31c9d0d7214f56135446f3c87bb432b38b9b5d45c4b36ea15e9</sum></package><package arch="x86_64" name="sssd-tools" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-tools-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">339c587a44178f6c65a647fcdd60f4f638580d2beae3170e06b4faef3e4970c3</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">90ca92cb82b13c4b1a4dd78db5b91e6c5f6bf3475577159d4157e31db29223f5</sum></package><package arch="x86_64" name="sssd-krb5-common" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-krb5-common-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">23cf91d80f2f6d4922a940237d0be688c17175a6749ba37e016421e291de64f2</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">fd5973e8e57af424f484ff005da39bfdf719f36a74ecaf32a562a0f853f2aa37</sum></package><package arch="x86_64" name="libsss_idmap" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">1b674a3efcd5399f116d5cbe3eb1471c119c67cc4500841b28b9c97b1a75da9b</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">ceb9924da9300df048f9d4c3a100ec15ee37f1f7f2ba6f411d7ece181999e598</sum></package><package arch="i686" name="libipa_hbac-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">5216d8800944c5b55f91448b6ed8d580bc98fac927c2db3f249ebf48cc2f39cd</sum></package><package arch="i686" name="libipa_hbac" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6.i686.rpm</filename><sum type="sha256">23d57047561ce5d4552d7c178de0fd795d057afb63b93890bde4f03542413508</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">9a5dbb482f71fce210205cee9c4c9217b140d5b663a2d070df38fc8dd1e78834</sum></package><package arch="x86_64" name="sssd-ad" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-ad-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">96c8e394956d8b8ed5f17268cd7b14f5bd9498068552600801c863600c20156e</sum></package><package arch="x86_64" name="sssd-krb5" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-krb5-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">0ae1a2b094a418efbff4b12446dd8ad3cf62b117e9d21f95641c2e0d501204a0</sum></package><package arch="x86_64" name="sssd-ldap" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>sssd-ldap-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">5fa004aa31cb3632a9d6fa79ab0af61b58352ab7b831e2e40d9710fe174c5499</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">47d6d11822c33a4852a83a085b634a0d9d4a06d7a64e4e6d12854e00520beae3</sum></package><package arch="x86_64" name="libipa_hbac-python" release="47.el6" src="sssd-1.12.4-47.el6.src.rpm" version="1.12.4"><filename>libipa_hbac-python-1.12.4-47.el6.x86_64.rpm</filename><sum type="sha256">5abaf2e59477c4146f1ff496f32132b36420c3a9cbae38c9d18865e60069d63d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1448" id="RHBA-2015:1448-1" title="Rhba-2015:1448-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036745" id="1036745" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1088402" id="1088402" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098147" id="1098147" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123291" id="1123291" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1134942" id="1134942" title="Sssd Does Not Recognize Windows Server 2012 R2'S Ldap As Ad" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135838" id="1135838" title="Man Sssd-Ldap Shows Parameter Ldap_Purge_Cache_Timeout With 'Default: 10800 (12 Hours)'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1139878" id="1139878" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1161564" id="1161564" title="[Rfe]Ad Provider Dns_Discovery_Domain Option: Kerberos Discovery Is Not Using This Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168344" id="1168344" title="[Rfe] Id Views: Support Migration From The Sync Solution To The Trust Solution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168347" id="1168347" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168357" id="1168357" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168363" id="1168363" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168377" id="1168377" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168378" id="1168378" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1170910" id="1170910" title="Sssd Should Not Fail Authentication When Only Allow Rules Are Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171378" id="1171378" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171782" id="1171782" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1172865" id="1172865" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173198" id="1173198" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173738" id="1173738" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1187642" id="1187642" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1194367" id="1194367" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201847" id="1201847" title="Sssd Downloads Too Much Information When Fetching Information About Groups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1205382" id="1205382" title="Properly Handle Ad'S Binary Objectguid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1215765" id="1215765" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221358" id="1221358" title="Sssd Doesn'T Work With Id Mapping And Disabled Subdomains" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1452-1</id><title>Rpm Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* The output of the %posttrans scriptlet was not correctly displayed to the user, which could lead to important errors being ignored. This update introduces a new API that collects the output from the %posttrans scriptlet. As a result, the yum utility can now access the %posttrans output, and displays it to the user.

* Although the RPM Package Manager does not support packages with files larger than 4 GB, the rpm utility allowed creating source packages where individual files exceeded 4 GB. The installation of such packages then failed with a "Digest mismatch" error. Now, rpm no longer allows the creation of such packages, which in turn prevents the described installation failure.

* On certain architectures, the value of the "LONGSIZE" tag was displayed incorrectly. This update ensures that on these architectures, the value of "LONGSIZE" is converted to the native byte order correctly, and that it is therefore displayed correctly.

* The behavior of the file mode and directory mode parameters for the %defattr directive was changed in a prior update, which caused building packages that still expected the previous behavior to fail or to experience problems. The directive has been reverted to the previous behavior, and a warning about the potential problems with %defattr has been added to the "rpmbuild" command.

* If the standard output of the rpm utility was redirected to a file and the file system was full, rpm failed without writing any error messages. Now, rpm prints an error message as a standard error output if the described scenario occurs.

* The rpm utility was unable to download and install packages the remote locations of which were specified with an IPv6 address and a specific path format. Now, rpm automatically uses the "--globoff" option with IPv6 addresses, which turns off cURL globbing, and allows packages to be properly downloaded and installed in the described scenario.

* If a Perl script in a package contained a string declared as a here- document that included the "use" or "require" words, or a multiline string with these words, the package in some cases had incorrect dependencies when it was created using the "rpmbuild" command. Now, the "use" and "require" strings are ignored as keywords in here-documents and multiline strings, which prevents the problem from occurring.

* Previously, build scriptlets using the pipe character ("|") in some cases failed. This update properly sets the default handling of the SIGPIPE signal in build scriptlets, thus fixing the bug.

In addition, this update adds the following enhancements:

* The OrderWithRequires feature has been added to the RPM Package Manager, which provides the new OrderWithRequires package tag. If a package specified in OrderWithRequires is present in a package transaction, it is installed before the package with the corresponding OrderWithRequires tag is installed. However, unlike the Requires package tag, OrderWithRequires does not generate additional dependencies, so if the package specified in the tag is not present in the transaction, it is not downloaded.

* The %power64 macro has been added to the rpm packages. This macro can be used to specify any or all 64-bit PowerPC architectures in RPM spec files by using the "%{power64}" string.

All running applications linked against the RPM library must be restarted for this update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="rpm-cron" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-cron-4.8.0-47.el6.noarch.rpm</filename><sum type="sha256">71cdaf2d4c47791ab75d761110ba7d5523fabfc609757b6b031832244e0673dd</sum></package><package arch="x86_64" name="rpm" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-4.8.0-47.el6.x86_64.rpm</filename><sum type="sha256">6555a9ec258183d73d5eabaf3b6a2a1c1112fe119084c2ec499e1ec21e260349</sum></package><package arch="i686" name="rpm-libs" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-libs-4.8.0-47.el6.i686.rpm</filename><sum type="sha256">979a868c981e117f2a9d7f10661ef26d1838ba608805986386d846c052e24673</sum></package><package arch="noarch" name="rpm-apidocs" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-apidocs-4.8.0-47.el6.noarch.rpm</filename><sum type="sha256">878b981ea1a580ad46e60d0c72af8e91a67568438b4ca6f71678e08c0c742278</sum></package><package arch="i686" name="rpm-devel" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-devel-4.8.0-47.el6.i686.rpm</filename><sum type="sha256">91ad6159b2643c1269e8128800ebf3d6dc3545dea51a2c1b1e2c67c015c052f4</sum></package><package arch="x86_64" name="rpm-build" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-build-4.8.0-47.el6.x86_64.rpm</filename><sum type="sha256">fc575d22512cae902435e9eea3bf5671d69cfe2da94bd7e7016c8e105fb3e1d4</sum></package><package arch="x86_64" name="rpm-libs" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-libs-4.8.0-47.el6.x86_64.rpm</filename><sum type="sha256">97fbbe8206bfbd2b93e94246c9a96df050c54a50a1520e160470dc98f0997235</sum></package><package arch="x86_64" name="rpm-devel" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-devel-4.8.0-47.el6.x86_64.rpm</filename><sum type="sha256">0e6a71d2644ebf7087b9855ee688d47ee3a750ab8bbbfd8467789a5996ee8631</sum></package><package arch="x86_64" name="rpm-python" release="47.el6" src="rpm-4.8.0-47.el6.src.rpm" version="4.8.0"><filename>rpm-python-4.8.0-47.el6.x86_64.rpm</filename><sum type="sha256">4cddbe721326ffc0b95f11e9078cc817f2b5de4826a97a6e445854a6ae9b5b57</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1452" id="RHBA-2015:1452-1" title="Rhba-2015:1452-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1024517" id="1024517" title="Perl.Req Returns Wrong Set Of Required Modules Due Parsing Bug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1040318" id="1040318" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1076277" id="1076277" title="Rpm Do Not Support Ipv6 On Rhel6.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1139805" id="1139805" title="Rpm Badly Handles Failed Write() To Stdout" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1178083" id="1178083" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=606239" id="606239" title="Need Rpm Api To Collect Scriptlet Output From %Posttrans" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=760793" id="760793" title="Backport The Orderwithrequires Feature To Rpm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=833427" id="833427" title="Error: Unpacking Of Archive Failed On File ... Cpio: Digest Mismatch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921969" id="921969" title="Rpmbuild Should Leave Pkg_Config_Path Alone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=993868" id="993868" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=997774" id="997774" title="%Defattr(755,Root,Root) No Longer Applies To Directories" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1453-1</id><title>Abrt, Libreport, And Satyr Bug Fix And Enhancement Update</title><description>The libreport libraries provide APIs for reporting different problems in applications to different bug targets like Bugzilla, FTP, or Trac.

The satyr packages provide a library that is used for creating and processing ABRT micro-reports.

This update fixes the following bugs:

* The abrt-addon-ccpp process logs messages using the rsyslog daemon. When rsyslog terminated unexpectedly, abrt-addon-ccpp could enter a deadlock state, because the /dev/log socket was not freed. The underlying source code has been modified to  and the deadlock no longer occurs in the described situation.

* The "bootloader" plug-in was renamed to "boot". However, ABRT still used the old name when generating SOS reports. As a consequence, ABRT did not include SOS report data in its crash reports. With this update, ABRT now uses the correct name and generates SOS reports as expected.

* The libreport library could previously change mode of any file or mode of the dump directory because it followed symbolic links. Also, libreport could change ownership of a new dump directory. This behavior could lead to security issues. With this update, this bug has been fixed, and libreport no longer changes modes or ownership.

In addition, this update adds the following enhancement:

* This update introduces ABRT micro-reporting. When a crash occurs, users can now send authenticated reports about the problem called micro-reports. These reports contain non-sensitive data describing the problem and optionally host name, machine ID, and RHN account number. Micro-reports help Red Hat to track bug occurrences and to provide instant solutions to crashes. See  for more information about micro-reporting.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="satyr" release="2.el6" src="satyr-0.16-2.el6.src.rpm" version="0.16"><filename>satyr-0.16-2.el6.x86_64.rpm</filename><sum type="sha256">d7d1342fd4abf50e8b4106350376ef14fbb659a481d150f2537f1af97c6fe2e1</sum></package><package arch="x86_64" name="satyr-python" release="2.el6" src="satyr-0.16-2.el6.src.rpm" version="0.16"><filename>satyr-python-0.16-2.el6.x86_64.rpm</filename><sum type="sha256">f2f0de0132269aa2fde0706f380c428f07ce38b50c857860eca2e8d40599ddb6</sum></package><package arch="i686" name="satyr" release="2.el6" src="satyr-0.16-2.el6.src.rpm" version="0.16"><filename>satyr-0.16-2.el6.i686.rpm</filename><sum type="sha256">aa7ef294161d72849ee56db2b96140572064ac965a1b65a75db0e64d5c5c9a36</sum></package><package arch="i686" name="satyr-devel" release="2.el6" src="satyr-0.16-2.el6.src.rpm" version="0.16"><filename>satyr-devel-0.16-2.el6.i686.rpm</filename><sum type="sha256">f0d2fbc89fc506d9459302c4c5917c22f4265bbaa63cfef9029a0e091344e135</sum></package><package arch="x86_64" name="satyr-devel" release="2.el6" src="satyr-0.16-2.el6.src.rpm" version="0.16"><filename>satyr-devel-0.16-2.el6.x86_64.rpm</filename><sum type="sha256">fe0ad31a7366021e5eb0552038800096b3b88abcb12e5e88f6a2211d2d8d5c95</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1453" id="RHBA-2015:1453-1" title="Rhba-2015:1453-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150197" id="1150197" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152222" id="1152222" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153311" id="1153311" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199261" id="1199261" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1208154" id="1208154" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212095" id="1212095" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:1616-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bugs:

* Prior to this update, SELinux unintentionally prevented Gluster from connecting to remote procedure call (RPC) services on NFS clients. This update modifies the relevant SELinux policies, and Gluster now connects to RPC services successfully.

* Due to insufficient SELinux policy rules for the glusterd service, gluster monitored nodes failed with an Access Vector Cache (AVC) denial error. With this update, SELinux policy rules for glusterd have been fixed to allow the Gluster layer product to work with SELinux properly.

* Attempting to set up the Gluster storage on an NFS-Ganesha cluster previously failed with an Access Vector Cache (AVC) denial error. The responsible SELinux policy has been adjusted to allow handling of volumes mounted by NFS-Ganesha, and the described failure no longer occurs.

* Previously, due to an Access Vector Cache (AVC) denial error, CTDB failed to start the smb service and remained in the UNHEALTHY state. This update modifies the relevant SELinux policies, and CTDB is now able to start smb service as expected.

* Previously, for the winbind and nmbd processes, improper SELinux rules were set. Consequently, when SELinux was set to enforcing mode with Windows Active Directory setup for Samba and Gluster, the domain user failed to access the Samba share. This update provides the missing SELinux policies, and the share access now proceeds successfully.</description><release>Scientific Linux Fermi</release><issued date="2015-08-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-minimum" release="279.el6_7.4" src="selinux-policy-3.7.19-279.el6_7.4.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6_7.4.noarch.rpm</filename><sum type="sha256">3344a3387db091868b0eb2986797bd497598a49384cce7389bb1ebc821d88bbd</sum></package><package arch="noarch" name="selinux-policy" release="279.el6_7.4" src="selinux-policy-3.7.19-279.el6_7.4.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6_7.4.noarch.rpm</filename><sum type="sha256">55b46710f27a6502c6e2f19faf3310c2ea235267c5f1c5fb368fa82199516f62</sum></package><package arch="noarch" name="selinux-policy-mls" release="279.el6_7.4" src="selinux-policy-3.7.19-279.el6_7.4.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6_7.4.noarch.rpm</filename><sum type="sha256">1a17dfd7753e7f9ce70a7e69ab5d143353d351eb4efdf03207a9d37f0e800e9d</sum></package><package arch="noarch" name="selinux-policy-targeted" release="279.el6_7.4" src="selinux-policy-3.7.19-279.el6_7.4.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6_7.4.noarch.rpm</filename><sum type="sha256">d05c5c759a201041f213584a54dd012f62bb4a12a7115854069581795482f90d</sum></package><package arch="noarch" name="selinux-policy-doc" release="279.el6_7.4" src="selinux-policy-3.7.19-279.el6_7.4.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6_7.4.noarch.rpm</filename><sum type="sha256">2dbae1e0e941fb8f2b3f1735b47b4b5b5895f9082f1535de4601171970685ebb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1616" id="RHBA-2015:1616-1" title="Rhba-2015:1616-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248515" id="1248515" title="[Selinux] Selinux Prevents Gluster/Nfs From Connecting To Rpc Services On Nfs-Clients (Rhel-6)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248517" id="1248517" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248520" id="1248520" title="[Selinux] [Nfs-Ganesha]: Seeing Avc Denied Error Message For Showmount, While Doing A Volume Start - Rhel6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248525" id="1248525" title="[Selinux] Nfs-Ganesha: Avc Denied For Nfs-Ganesha.Service , Ganesha Cluster Setup Fails In Rhel6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248526" id="1248526" title="[Selinux] Smb: Selinux Policy To Be Set For /Usr/Sbin/Ctdbd_Wrapper - Rhel-6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249033" id="1249033" title="[Selinux]: Issues In Setting Up Windows Active Directory With Samba And Access Of Share Denied Using Domain Users (Rhel-6.7)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:2006-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* Due to insufficient SELinux policy rules, the libreswan utility was not able to access the /sys/fs/ directory and requested the kernel to load a module. With this update, SELinux policy rules have been updated and libreswan, running as the ipsec_mgmt_t SELinux type, works as expected.</description><release>Scientific Linux Fermi</release><issued date="2015-11-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-minimum" release="279.el6_7.7" src="selinux-policy-3.7.19-279.el6_7.7.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6_7.7.noarch.rpm</filename><sum type="sha256">2de35811cd86edc54ac609e900f06580452a37e18717087d0f96f26bd4fa3d4f</sum></package><package arch="noarch" name="selinux-policy-doc" release="279.el6_7.7" src="selinux-policy-3.7.19-279.el6_7.7.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6_7.7.noarch.rpm</filename><sum type="sha256">d24cd0bf4f3d401f5846986c07d7e62d116a94ed66336e1be1ad5805c9daf64b</sum></package><package arch="noarch" name="selinux-policy-targeted" release="279.el6_7.7" src="selinux-policy-3.7.19-279.el6_7.7.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6_7.7.noarch.rpm</filename><sum type="sha256">cfcb2a163e6fc15c2505391cda10b60cf0b3ce2f4b6f7d5b29af302a2e182151</sum></package><package arch="noarch" name="selinux-policy-mls" release="279.el6_7.7" src="selinux-policy-3.7.19-279.el6_7.7.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6_7.7.noarch.rpm</filename><sum type="sha256">ec033934fffd1c694553bcb2abbc81b3ab810a81316e47412c818c449f0ca11a</sum></package><package arch="noarch" name="selinux-policy" release="279.el6_7.7" src="selinux-policy-3.7.19-279.el6_7.7.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6_7.7.noarch.rpm</filename><sum type="sha256">f45b1edb4a1279083a2bea8c2880268c0db6411b157ba222f49e667ca401e9db</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2006" id="RHBA-2015:2006-1" title="Rhba-2015:2006-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272437" id="1272437" title="Selinux Policy (Daemons) Changes Required For Package: Libreswan" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2015:2644-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* Due to insufficient SELinux policy rules, the NetworkManager-openswan plug-in was not able to access Linux IPv4 routing sockets to establish a connection. With this update, SELinux policy rules have been updated, and NetworkManager-openswan, running as the ipsec_mgmt_t SELinux type, can establish a connection as expected.</description><release>Scientific Linux Fermi</release><issued date="2015-12-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-targeted" release="279.el6_7.8" src="selinux-policy-3.7.19-279.el6_7.8.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6_7.8.noarch.rpm</filename><sum type="sha256">d86a9affe16127871450edeff36973502bf9b5fe3815bf4e8240b48b3be1fde2</sum></package><package arch="noarch" name="selinux-policy-doc" release="279.el6_7.8" src="selinux-policy-3.7.19-279.el6_7.8.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6_7.8.noarch.rpm</filename><sum type="sha256">5191dfa2356a55eb0e449b5a19adac5b786276c423930717666388b9691ade32</sum></package><package arch="noarch" name="selinux-policy-minimum" release="279.el6_7.8" src="selinux-policy-3.7.19-279.el6_7.8.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6_7.8.noarch.rpm</filename><sum type="sha256">80107f8cd3d6e4123e5f60878afa39aa4e22c01578137eee879bf97dcd6b9e25</sum></package><package arch="noarch" name="selinux-policy" release="279.el6_7.8" src="selinux-policy-3.7.19-279.el6_7.8.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6_7.8.noarch.rpm</filename><sum type="sha256">1dfe63b421a7fcc01fd6d92ec2ebcba90ca933b82276f04d64a3fbbed4a89720</sum></package><package arch="noarch" name="selinux-policy-mls" release="279.el6_7.8" src="selinux-policy-3.7.19-279.el6_7.8.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6_7.8.noarch.rpm</filename><sum type="sha256">8d22cc81d5890d48b08d72d6f2ff6b6ca408c33e5c67af57f3ef619e05ecea6b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2644" id="RHBA-2015:2644-1" title="Rhba-2015:2644-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289019" id="1289019" title="Selinux Policy (Daemons) Changes Required For Package: Libreswan" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0193-1</id><title>Gluster Storage 3.1 Update 2</title><description>Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.

Red Hat Gluster Storage's Unified File and Object Storage is built on OpenStack's Object Storage (swift).

This advisory introduces the following new features:

* Writable Snapshots Red Hat Gluster Storage snapshots can now be cloned and made writable by creating a new volume based on an existing snapshot. Clones are space efficient, as the cloned volume and original snapshot share the same logical volume back end, only consuming additional space as the clone diverges from the snapshot. For more information, see the Red Hat Gluster Storage 3.1 Administration Guide:

* RESTful Volume Management with Heketi [Technology Preview] Heketi provides a RESTful management interface for managing Red Hat Gluster Storage volume lifecycles. This interface allows cloud services like OpenStack Manila, Kubernetes, and OpenShift to dynamically provision Red Hat Gluster Storage volumes. For details about this technology preview, see the Red Hat Gluster Storage 3.1 Administration Guide:

*Red Hat Gluster Storage for Containers With the Red Hat Gluster Storage 3.1 update 2 release a Red Hat Gluster Storage environment can be set up in a container. Containers use shared operating systems and are much more efficient than hypervisors in system resource terms. Containers rest on top of a single Linux instance and allows applications to use the same Linux kernel as the system that they're running on. This improves the overall efficiency and reduces the space consumption considerably. For more information, see the Red Hat Gluster Storage 3.1 Administration Guide:

* BitRot scrubber status The BitRot scrubber command (gluster volume bitrot VOLNAME scrub status) can now display scrub progress and list identified corrupted files, allowing administrators to locate and repair corrupted files more easily. See the Red Hat Gluster Storage 3.1 Administration Guide for details:  nistration_Guide/.

* Samba Asynchronous I/O With this release, asynchronous I/O from Samba to Red Hat Gluster Storage is supported. The aio read size option is now enabled and set to 4096 by default. This increases the throughput when the client is multithreaded or there are multiple programs accessing the same share. If you have Linux clients using SMB 2.0 or higher, Red Hat recommends disabling asynchronous I/O (setting aio read size to 0).</description><release>Scientific Linux Fermi</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nfs-ganesha-gluster" release="12.el6" src="nfs-ganesha-2.2.0-12.el6.src.rpm" version="2.2.0"><filename>nfs-ganesha-gluster-2.2.0-12.el6.x86_64.rpm</filename><sum type="sha256">e1d17d43c03d4a597103222fc869d823e2bad925673b022db47e8953cbaaa447</sum></package><package arch="x86_64" name="nfs-ganesha" release="12.el6" src="nfs-ganesha-2.2.0-12.el6.src.rpm" version="2.2.0"><filename>nfs-ganesha-2.2.0-12.el6.x86_64.rpm</filename><sum type="sha256">3d158310e1ed23822c807d847d3527eec23f7fb2465a3d023e047c7d17e8f84f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0193" id="RHBA-2016:0193-1" title="Rhba-2016:0193-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0736-1</id><title>X.Org Client Libraries Bug Fix And Enhancement Update</title><description>The X.Org video driver packages provide video drivers needed for various graphics cards to work properly in the X.Org implementation of the X Window System.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="xcb-util-renderutil-devel" release="3.el6" src="xcb-util-renderutil-0.3.9-3.el6.src.rpm" version="0.3.9"><filename>xcb-util-renderutil-devel-0.3.9-3.el6.i686.rpm</filename><sum type="sha256">81516f396dd26f5a00f38b2d8af0d6ca1ba66dcaea810b0e6e53f840864b7ab4</sum></package><package arch="i686" name="libepoxy-devel" release="3.el6" src="libepoxy-1.2-3.el6.src.rpm" version="1.2"><filename>libepoxy-devel-1.2-3.el6.i686.rpm</filename><sum type="sha256">6b93f9aa48711920a991339f8a125534638754bdb9c6c8e756c618f7fdb9959e</sum></package><package arch="x86_64" name="compat-xcb-util" release="2.2.el6" src="xcb-util-0.4.0-2.2.el6.src.rpm" version="0.4.0"><filename>compat-xcb-util-0.4.0-2.2.el6.x86_64.rpm</filename><sum type="sha256">1a49d9e2fd6d9050693be20e73ca0cc05c1ff442a7083ea907708e99dc93e255</sum></package><package arch="x86_64" name="xcb-util-devel" release="2.2.el6" src="xcb-util-0.4.0-2.2.el6.src.rpm" version="0.4.0"><filename>xcb-util-devel-0.4.0-2.2.el6.x86_64.rpm</filename><sum type="sha256">4f63856152be2b41382d9b74b2f0eecec938d499619821faff16589a319a7e5c</sum></package><package arch="i686" name="xcb-util" release="2.2.el6" src="xcb-util-0.4.0-2.2.el6.src.rpm" version="0.4.0"><filename>xcb-util-0.4.0-2.2.el6.i686.rpm</filename><sum type="sha256">b424bc106f262f26a6b95d2516d78912779153b680bc48fbf8b76dbb66e018c2</sum></package><package arch="x86_64" name="libepoxy-devel" release="3.el6" src="libepoxy-1.2-3.el6.src.rpm" version="1.2"><filename>libepoxy-devel-1.2-3.el6.x86_64.rpm</filename><sum type="sha256">922b516f62348d49a1f9e02d73f01a0056ae0825a013561b5caea9afd318f945</sum></package><package arch="x86_64" name="libxshmfence" release="1.el6" src="libxshmfence-1.2-1.el6.src.rpm" version="1.2"><filename>libxshmfence-1.2-1.el6.x86_64.rpm</filename><sum type="sha256">05e6c417920959879d7b1f6bce5fa5702a698a634eef4e37dae43a5a7a256aaa</sum></package><package arch="i686" name="libxshmfence" release="1.el6" src="libxshmfence-1.2-1.el6.src.rpm" version="1.2"><filename>libxshmfence-1.2-1.el6.i686.rpm</filename><sum type="sha256">bd2303fe6c7aac220ef0e53cdb38d650b5dba47641994d73f8b52b5804f6ef57</sum></package><package arch="i686" name="libxshmfence-devel" release="1.el6" src="libxshmfence-1.2-1.el6.src.rpm" version="1.2"><filename>libxshmfence-devel-1.2-1.el6.i686.rpm</filename><sum type="sha256">add430edd131a4b33fbb1030c9e6fe2c28aff270cc08fa060dc965f05b005dca</sum></package><package arch="x86_64" name="xcb-util" release="2.2.el6" src="xcb-util-0.4.0-2.2.el6.src.rpm" version="0.4.0"><filename>xcb-util-0.4.0-2.2.el6.x86_64.rpm</filename><sum type="sha256">9361b39d9c67493dd1902dc1d6c11b244564de67a341467987b40a6ea6f0e1c1</sum></package><package arch="x86_64" name="xcb-util-renderutil" release="3.el6" src="xcb-util-renderutil-0.3.9-3.el6.src.rpm" version="0.3.9"><filename>xcb-util-renderutil-0.3.9-3.el6.x86_64.rpm</filename><sum type="sha256">c5f29021fc796765a3531ee0d65ad4aef0eb6a4aee7ad292f1d445afdb8a8f65</sum></package><package arch="i686" name="compat-xcb-util" release="2.2.el6" src="xcb-util-0.4.0-2.2.el6.src.rpm" version="0.4.0"><filename>compat-xcb-util-0.4.0-2.2.el6.i686.rpm</filename><sum type="sha256">a5eeced49d68a2fbe0448ec6690c26ebbf10491d5d8f80542d4225205b75eef1</sum></package><package arch="x86_64" name="libepoxy" release="3.el6" src="libepoxy-1.2-3.el6.src.rpm" version="1.2"><filename>libepoxy-1.2-3.el6.x86_64.rpm</filename><sum type="sha256">06ddd262b75e8ac356dbebe2272d399c541a22e03ed5d73be9736a0c9a29909e</sum></package><package arch="x86_64" name="xcb-util-renderutil-devel" release="3.el6" src="xcb-util-renderutil-0.3.9-3.el6.src.rpm" version="0.3.9"><filename>xcb-util-renderutil-devel-0.3.9-3.el6.x86_64.rpm</filename><sum type="sha256">ad86e0f94f4c10aa4cd1dc278cde63537b04f077a52904c2cda126e58a9967a5</sum></package><package arch="i686" name="xcb-util-devel" release="2.2.el6" src="xcb-util-0.4.0-2.2.el6.src.rpm" version="0.4.0"><filename>xcb-util-devel-0.4.0-2.2.el6.i686.rpm</filename><sum type="sha256">643f1641b023ef21bda59f176be56d569d3be52d9eb2fea2657db83dba2a838a</sum></package><package arch="x86_64" name="libxshmfence-devel" release="1.el6" src="libxshmfence-1.2-1.el6.src.rpm" version="1.2"><filename>libxshmfence-devel-1.2-1.el6.x86_64.rpm</filename><sum type="sha256">9ce7355e9673822516cb09e9a33be238df849687cc058f7c2ecfe35f978cc737</sum></package><package arch="i686" name="libepoxy" release="3.el6" src="libepoxy-1.2-3.el6.src.rpm" version="1.2"><filename>libepoxy-1.2-3.el6.i686.rpm</filename><sum type="sha256">b16d1dc786ac3609059f48d5009bcdf26ce4ec148e07fd8c40fbcc90ffc4bd7f</sum></package><package arch="i686" name="xcb-util-renderutil" release="3.el6" src="xcb-util-renderutil-0.3.9-3.el6.src.rpm" version="0.3.9"><filename>xcb-util-renderutil-0.3.9-3.el6.i686.rpm</filename><sum type="sha256">8409fcfe81bc516c440242b78a0c00ff51ad905009be079ef2781c4dfae4be20</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0736" id="RHBA-2016:0736-1" title="Rhba-2016:0736-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1044964" id="1044964" title="Xvfb-Run Segfault When Xvfb Killed By Sigterm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1158613" id="1158613" title="Virt-Manager Crash After Libx11 Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1246430" id="1246430" title="Rebase Xorg-X11-Xauth In 6.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298305" id="1298305" title="Increase The Number Of File Descriptors For The Xserver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=909790" id="909790" title="Ssh -Y Fails From Remote Gdm Session" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0747-1</id><title>Glusterfs Bug Fix And Enhancement Update</title><description>GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.</description><release>Scientific Linux Fermi</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="userspace-rcu" release="2.el6rhs" src="userspace-rcu-0.7.9-2.el6rhs.src.rpm" version="0.7.9"><filename>userspace-rcu-0.7.9-2.el6rhs.x86_64.rpm</filename><sum type="sha256">e75f5964a008b23ebf15b9367a96a59056f24160f651122aa4b24c206e3dea62</sum></package><package arch="x86_64" name="glusterfs-rdma" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-rdma-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">9187a3a42c0c75332c514f0abfd6da97b3a44cef21e74428891f246c35f05cc0</sum></package><package arch="x86_64" name="glusterfs-server" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-server-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">131b92714f67aa9cbdc59b0ab1567ba21f4d53aefc6e772cdec252843a02e119</sum></package><package arch="x86_64" name="glusterfs-libs" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-libs-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">40f35ce8f990ee569079437c225625bccf1f91c94978d51495920e05a74bd145</sum></package><package arch="x86_64" name="glusterfs-api" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-api-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">95fd8e1b611dece0c176e6731664fd1fd5eb3f227007facea3598affc3363a2a</sum></package><package arch="x86_64" name="userspace-rcu-devel" release="2.el6rhs" src="userspace-rcu-0.7.9-2.el6rhs.src.rpm" version="0.7.9"><filename>userspace-rcu-devel-0.7.9-2.el6rhs.x86_64.rpm</filename><sum type="sha256">3bc16807f6150ea966e0e2ae664a72467c3d14927a52379d65caa723532b15a5</sum></package><package arch="x86_64" name="glusterfs-ganesha" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-ganesha-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">f2dd7bb7db7cdeeb3b42a78c97d51320716c23fd744bd003d4861a28c2e5a897</sum></package><package arch="x86_64" name="glusterfs-fuse" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-fuse-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">b50b22e4580dc9daee8ec19df2a0f14e14f882db99a2397e347a15f9066a27ca</sum></package><package arch="noarch" name="glusterfs-resource-agents" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-resource-agents-3.7.5-19.el6.noarch.rpm</filename><sum type="sha256">564f0eee80f22ddf0904987c99f5c4e0baeff501f895dd1fd07756f86f42f243</sum></package><package arch="x86_64" name="glusterfs-client-xlators" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-client-xlators-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">997b740842433778806aac6ba0f557e9d76d289c26955d3a46069c65a47baf6e</sum></package><package arch="x86_64" name="glusterfs-cli" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-cli-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">1214abdb953ef79ae6c13e0a5e90b1f952ecabd3cb364bf376325ed03aff8a3c</sum></package><package arch="x86_64" name="glusterfs-devel" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-devel-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">113d132cf97dac25fbe0bf8cf0568cefc9e6648928442f3c49269ccaf3f12f53</sum></package><package arch="x86_64" name="glusterfs-api-devel" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-api-devel-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">b76d6519ac0d9e4076caad529a88bf210b8949086c17e441c2b0422ff9c13db4</sum></package><package arch="x86_64" name="glusterfs" release="19.el6" src="glusterfs-3.7.5-19.el6.src.rpm" version="3.7.5"><filename>glusterfs-3.7.5-19.el6.x86_64.rpm</filename><sum type="sha256">c78b45c4bdeb9d9945761b0a6b4f86f117cd1eadff430098a1daa201f659b255</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0747" id="RHBA-2016:0747-1" title="Rhba-2016:0747-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171865" id="1171865" title="Glusterfs Logrotate Config File Clobbers Defaults [Rhel-6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1194503" id="1194503" title="Dependency Problem Due To Glusterfs-Api Depending On Glusterfs Instead Of Only Glusterfs-Libs [Rhel-6]" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0761-1</id><title>X.Org X11 Server And Drivers Bug Fix And Enhancement Update</title><description>The X.Org video driver packages provide video drivers needed for various graphics cards to work properly in the X.Org implementation of the X Window System.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="xorg-x11-drv-wacom-devel" release="1.el6" src="xorg-x11-drv-wacom-0.32.0-1.el6.src.rpm" version="0.32.0"><filename>xorg-x11-drv-wacom-devel-0.32.0-1.el6.i686.rpm</filename><sum type="sha256">a18e5e42644517f6a5d36e08741914ff006fd99e2fa688aa1ae2848572add178</sum></package><package arch="x86_64" name="xorg-x11-drv-penmount" release="6.el6" src="xorg-x11-drv-penmount-1.5.0-6.el6.src.rpm" version="1.5.0"><filename>xorg-x11-drv-penmount-1.5.0-6.el6.x86_64.rpm</filename><sum type="sha256">5504dca48a61d6701ea863a2a2dc5e478cdae973024380ff484bf85f03158fb7</sum></package><package arch="x86_64" name="xorg-x11-drv-i740" release="12.el6" src="xorg-x11-drv-i740-1.3.4-12.el6.src.rpm" version="1.3.4"><filename>xorg-x11-drv-i740-1.3.4-12.el6.x86_64.rpm</filename><sum type="sha256">06b1c5c8e7599f30b1f51127df59f46f28df3d3311d06d3d617229d1a6a19109</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse" release="1.el6" src="xorg-x11-drv-mouse-1.9.1-1.el6.src.rpm" version="1.9.1"><filename>xorg-x11-drv-mouse-1.9.1-1.el6.x86_64.rpm</filename><sum type="sha256">c0c975fb4a3c1f3a90190ff693332a649e0a0c7abcf8b0fcd15ceaa5d2a27a87</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom" release="1.el6" src="xorg-x11-drv-wacom-0.32.0-1.el6.src.rpm" version="0.32.0"><filename>xorg-x11-drv-wacom-0.32.0-1.el6.x86_64.rpm</filename><sum type="sha256">67361f5670d6df0d96e2f7b1a53faf6b3bf82af942753e2ebbf281407cbc17f3</sum></package><package arch="x86_64" name="xorg-x11-drv-qxl" release="19.el6" src="xorg-x11-drv-qxl-0.1.1-19.el6.src.rpm" version="0.1.1"><filename>xorg-x11-drv-qxl-0.1.1-19.el6.x86_64.rpm</filename><sum type="sha256">d1dbf7255006d6b6a191fe81a3de685c7a032b1abf8cbe5d6da230f97a0a0ec9</sum></package><package arch="x86_64" name="xorg-x11-drv-tdfx" release="1.el6" src="xorg-x11-drv-tdfx-1.4.6-1.el6.src.rpm" version="1.4.6"><filename>xorg-x11-drv-tdfx-1.4.6-1.el6.x86_64.rpm</filename><sum type="sha256">c8e6502e2a56ad9ccbf16de52880a82bc7b04fdfa2ef72951dd4e046f74fab24</sum></package><package arch="x86_64" name="xorg-x11-drv-fpit" release="7.el6" src="xorg-x11-drv-fpit-1.4.0-7.el6.src.rpm" version="1.4.0"><filename>xorg-x11-drv-fpit-1.4.0-7.el6.x86_64.rpm</filename><sum type="sha256">61e2e35813c2e8a7a8ea17bbbd0b0539c836a0e162ee8fc25740898599d4425c</sum></package><package arch="x86_64" name="xorg-x11-drv-acecad" release="8.el6" src="xorg-x11-drv-acecad-1.5.0-8.el6.src.rpm" version="1.5.0"><filename>xorg-x11-drv-acecad-1.5.0-8.el6.x86_64.rpm</filename><sum type="sha256">5d68c54617ac582dc5ffb47d7c462e9c4102dfbadccfa38c829d000273d3c2a8</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics" release="1.el6" src="xorg-x11-drv-synaptics-1.8.3-1.el6.src.rpm" version="1.8.3"><filename>xorg-x11-drv-synaptics-1.8.3-1.el6.x86_64.rpm</filename><sum type="sha256">f970da36c6063fa5d7ac5b85bf67f90ed845fc75344978bcdd86314ee7ae3ceb</sum></package><package arch="x86_64" name="xorg-x11-drv-voodoo" release="11.el6" src="xorg-x11-drv-voodoo-1.2.5-11.el6.src.rpm" version="1.2.5"><filename>xorg-x11-drv-voodoo-1.2.5-11.el6.x86_64.rpm</filename><sum type="sha256">a93e0736266d08e213dbcc8037fee4780f4cc143f9b51e78ede3193473a83dd8</sum></package><package arch="i686" name="xorg-x11-drv-openchrome-devel" release="7.el6" src="xorg-x11-drv-openchrome-0.3.3-7.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-devel-0.3.3-7.el6.i686.rpm</filename><sum type="sha256">c12cdbcd4a47084f8eecc936f5f07cbf4add766a7bb817bea46ea65264e6c0ec</sum></package><package arch="x86_64" name="xorg-x11-drv-savage" release="3.el6" src="xorg-x11-drv-savage-2.3.7-3.el6.src.rpm" version="2.3.7"><filename>xorg-x11-drv-savage-2.3.7-3.el6.x86_64.rpm</filename><sum type="sha256">a6369267a240b17051cc501c251eb48486e1dc60c13958673e7d0069b813695e</sum></package><package arch="x86_64" name="xorg-x11-drv-void" release="1.el6" src="xorg-x11-drv-void-1.4.1-1.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-void-1.4.1-1.el6.x86_64.rpm</filename><sum type="sha256">7cb99aeb178da72d40f3c8067074ed9b002da3dd451706795f47ce21d0e85233</sum></package><package arch="x86_64" name="xorg-x11-drv-glint" release="11.el6" src="xorg-x11-drv-glint-1.2.8-11.el6.src.rpm" version="1.2.8"><filename>xorg-x11-drv-glint-1.2.8-11.el6.x86_64.rpm</filename><sum type="sha256">169a3a14e73c055445713698758d8c37d88038f667bfa4efe7ff1990a986ba78</sum></package><package arch="x86_64" name="xorg-x11-drv-fbdev" release="17.el6" src="xorg-x11-drv-fbdev-0.4.3-17.el6.src.rpm" version="0.4.3"><filename>xorg-x11-drv-fbdev-0.4.3-17.el6.x86_64.rpm</filename><sum type="sha256">ad66ee5de312007e4281b12269730a9f2d9a210e85deb33cdabe63abcd74fd37</sum></package><package arch="x86_64" name="xorg-x11-drv-elographics" release="4.el6" src="xorg-x11-drv-elographics-1.4.1-4.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-elographics-1.4.1-4.el6.x86_64.rpm</filename><sum type="sha256">6b431df1abef90e19643ea9df4314e2f11c87fd203823aa37c554a079c740c76</sum></package><package arch="i686" name="xorg-x11-drv-evdev-devel" release="1.el6" src="xorg-x11-drv-evdev-2.9.2-1.el6.src.rpm" version="2.9.2"><filename>xorg-x11-drv-evdev-devel-2.9.2-1.el6.i686.rpm</filename><sum type="sha256">a77234dd8f968691ab127941980a1a299660e48b7cd8d8b82ee363ad51c01c66</sum></package><package arch="i686" name="xorg-x11-drv-openchrome" release="7.el6" src="xorg-x11-drv-openchrome-0.3.3-7.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-0.3.3-7.el6.i686.rpm</filename><sum type="sha256">7dbcc8cf72511cee6d2cdaad270a8f2a7f926537c2715e0813caf662d53bf6ae</sum></package><package arch="x86_64" name="xorg-x11-drv-rendition" release="1.el6" src="xorg-x11-drv-rendition-4.2.6-1.el6.src.rpm" version="4.2.6"><filename>xorg-x11-drv-rendition-4.2.6-1.el6.x86_64.rpm</filename><sum type="sha256">271bfb48e58a73958ee9d3cd35e1e98e998a6aa10d621c1db726f6fabb843104</sum></package><package arch="x86_64" name="xorg-x11-drv-keyboard" release="1.el6" src="xorg-x11-drv-keyboard-1.8.1-1.el6.src.rpm" version="1.8.1"><filename>xorg-x11-drv-keyboard-1.8.1-1.el6.x86_64.rpm</filename><sum type="sha256">cd41689d9f7095b50925efbad795b3a04e02b462b44dc3ad39b2f64b9ea089fe</sum></package><package arch="x86_64" name="xorg-x11-drv-sisusb" release="11.el6" src="xorg-x11-drv-sisusb-0.9.6-11.el6.src.rpm" version="0.9.6"><filename>xorg-x11-drv-sisusb-0.9.6-11.el6.x86_64.rpm</filename><sum type="sha256">6206701e0b7483e579e87cf343dde140bea58416ff2e760d211b38032d6c1f25</sum></package><package arch="x86_64" name="xorg-x11-drv-dummy" release="16.el6" src="xorg-x11-drv-dummy-0.3.6-16.el6.src.rpm" version="0.3.6"><filename>xorg-x11-drv-dummy-0.3.6-16.el6.x86_64.rpm</filename><sum type="sha256">cc771a0b1fa4325a4d07982e9504cf717a4e4fe0308f0593742f6ba73707e73e</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse-devel" release="1.el6" src="xorg-x11-drv-mouse-1.9.1-1.el6.src.rpm" version="1.9.1"><filename>xorg-x11-drv-mouse-devel-1.9.1-1.el6.x86_64.rpm</filename><sum type="sha256">809e9b4eb2fe6c268cb5922287fa027af90728ce18193a04dfaf9c3da3be0c7c</sum></package><package arch="x86_64" name="xorg-x11-drv-trident" release="11.el6" src="xorg-x11-drv-trident-1.3.6-11.el6.src.rpm" version="1.3.6"><filename>xorg-x11-drv-trident-1.3.6-11.el6.x86_64.rpm</filename><sum type="sha256">def27900059124c5be184dc57ce8423718ae51049ad4308a29966350a4236490</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev-devel" release="1.el6" src="xorg-x11-drv-evdev-2.9.2-1.el6.src.rpm" version="2.9.2"><filename>xorg-x11-drv-evdev-devel-2.9.2-1.el6.x86_64.rpm</filename><sum type="sha256">e9d59a270c0cd8e28313d7cda8b0c087a5056df8be1f9570a47299bcb88cb04d</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome" release="7.el6" src="xorg-x11-drv-openchrome-0.3.3-7.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-0.3.3-7.el6.x86_64.rpm</filename><sum type="sha256">5d28fae2c75b0e17eca28fcb8f8c20eb6679f7ff1dfe47821d3314ad1737bc27</sum></package><package arch="i686" name="xorg-x11-drv-intel-devel" release="0.4.20151111.el6" src="xorg-x11-drv-intel-2.99.917-0.4.20151111.el6.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-0.4.20151111.el6.i686.rpm</filename><sum type="sha256">a671a67bc00a071bfd386f4534ad6e6c6a82c700d716f009e863f9b5adbf4edb</sum></package><package arch="x86_64" name="xorg-x11-drv-nv" release="6.el6" src="xorg-x11-drv-nv-2.1.20-6.el6.src.rpm" version="2.1.20"><filename>xorg-x11-drv-nv-2.1.20-6.el6.x86_64.rpm</filename><sum type="sha256">4532cf0548837971d4df22c8ca458917f04a35c356556fac4c6b0165cb92bf2d</sum></package><package arch="x86_64" epoch="1" name="xorg-x11-drv-nouveau" release="1.el6" src="xorg-x11-drv-nouveau-1.0.12-1.el6.src.rpm" version="1.0.12"><filename>xorg-x11-drv-nouveau-1.0.12-1.el6.x86_64.rpm</filename><sum type="sha256">b521025b7da2407d571f96fb6f3653ba5d969eac0d76b151e32f905110f32b30</sum></package><package arch="x86_64" name="xorg-x11-drv-vmware" release="2.el6" src="xorg-x11-drv-vmware-13.1.0-2.el6.src.rpm" version="13.1.0"><filename>xorg-x11-drv-vmware-13.1.0-2.el6.x86_64.rpm</filename><sum type="sha256">bebd147a728d7b3cc5dd8759bc356b7c302ad5af7887e10c5119ff50d43a946f</sum></package><package arch="x86_64" name="xorg-x11-drv-ati" release="2.el6" src="xorg-x11-drv-ati-7.6.1-2.el6.src.rpm" version="7.6.1"><filename>xorg-x11-drv-ati-7.6.1-2.el6.x86_64.rpm</filename><sum type="sha256">aab40b11c2a7b8bc04a5e99521c21cfabc5a601c1cfae1afd38b163dc6e322a5</sum></package><package arch="i686" name="xorg-x11-drv-intel" release="0.4.20151111.el6" src="xorg-x11-drv-intel-2.99.917-0.4.20151111.el6.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-0.4.20151111.el6.i686.rpm</filename><sum type="sha256">5b50ccbedd6effe4fa5f1ed8c2deae4871721092a69cb8e7cdc788817069005d</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom-devel" release="1.el6" src="xorg-x11-drv-wacom-0.32.0-1.el6.src.rpm" version="0.32.0"><filename>xorg-x11-drv-wacom-devel-0.32.0-1.el6.x86_64.rpm</filename><sum type="sha256">7618dd3e2b8f310818d95eb715a27d1cf633b4636446d216679710ae99cde34d</sum></package><package arch="i686" name="xorg-x11-drv-synaptics-devel" release="1.el6" src="xorg-x11-drv-synaptics-1.8.3-1.el6.src.rpm" version="1.8.3"><filename>xorg-x11-drv-synaptics-devel-1.8.3-1.el6.i686.rpm</filename><sum type="sha256">73c1a6acdf8903f1be62798a22d6388e8a464d7c1a36b6394d1887b5ca8f7012</sum></package><package arch="x86_64" name="xorg-x11-drv-apm" release="11.el6" src="xorg-x11-drv-apm-1.2.5-11.el6.src.rpm" version="1.2.5"><filename>xorg-x11-drv-apm-1.2.5-11.el6.x86_64.rpm</filename><sum type="sha256">5c58465a5c7da92fe57c28140e752297754f7e04e695c0d45302bdb40365eb99</sum></package><package arch="noarch" name="xorg-x11-drv-ati-firmware" release="2.el6" src="xorg-x11-drv-ati-7.6.1-2.el6.src.rpm" version="7.6.1"><filename>xorg-x11-drv-ati-firmware-7.6.1-2.el6.noarch.rpm</filename><sum type="sha256">c205cf9a7027f299f0c38245b99d9a7d62189b4e871c1244c6a2f33ea212d3b0</sum></package><package arch="x86_64" name="xorg-x11-drv-xgi" release="1.el6" src="xorg-x11-drv-xgi-1.6.1-1.el6.src.rpm" version="1.6.1"><filename>xorg-x11-drv-xgi-1.6.1-1.el6.x86_64.rpm</filename><sum type="sha256">3f70fa5689d55174668deaf3bf49b6e61e0288d9f629274362c188fa5d5ac10e</sum></package><package arch="x86_64" name="xorg-x11-drv-siliconmotion" release="1.el6" src="xorg-x11-drv-siliconmotion-1.7.8-1.el6.src.rpm" version="1.7.8"><filename>xorg-x11-drv-siliconmotion-1.7.8-1.el6.x86_64.rpm</filename><sum type="sha256">a4789c27ba82cc15fe80be88c6beb52f23ab25f50f3c95472011f890ec1ff275</sum></package><package arch="x86_64" name="xorg-x11-drv-intel" release="0.4.20151111.el6" src="xorg-x11-drv-intel-2.99.917-0.4.20151111.el6.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-0.4.20151111.el6.x86_64.rpm</filename><sum type="sha256">978cd4174b747a6999b3124be134ea5390c4ab62339fac4c6fc72d80b73fbb25</sum></package><package arch="x86_64" name="xorg-x11-drv-hyperpen" release="6.el6" src="xorg-x11-drv-hyperpen-1.4.1-6.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-hyperpen-1.4.1-6.el6.x86_64.rpm</filename><sum type="sha256">7885983bbcfa757ec463576fd8ab370a8022e9547f4854a863eec9ae2dd27c5d</sum></package><package arch="x86_64" name="xorg-x11-drv-vmmouse" release="1.el6" src="xorg-x11-drv-vmmouse-13.1.0-1.el6.src.rpm" version="13.1.0"><filename>xorg-x11-drv-vmmouse-13.1.0-1.el6.x86_64.rpm</filename><sum type="sha256">c78dfc006b591b9c25d4c66f08abe955e8b9734e7bf7ad03824a23723a61e890</sum></package><package arch="i686" name="xorg-x11-drv-mouse-devel" release="1.el6" src="xorg-x11-drv-mouse-1.9.1-1.el6.src.rpm" version="1.9.1"><filename>xorg-x11-drv-mouse-devel-1.9.1-1.el6.i686.rpm</filename><sum type="sha256">b69c887867e1aa7f322855c8e39580b630cedcde75db52edaee12bc3c1582cf1</sum></package><package arch="x86_64" name="xorg-x11-drv-intel-devel" release="0.4.20151111.el6" src="xorg-x11-drv-intel-2.99.917-0.4.20151111.el6.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-0.4.20151111.el6.x86_64.rpm</filename><sum type="sha256">0490e7390dcccd6072ec36d517bedfa16cdf9599392a3e00e9147d3f42d4a636</sum></package><package arch="x86_64" name="xorg-x11-drv-ast" release="1.el6" src="xorg-x11-drv-ast-1.1.5-1.el6.src.rpm" version="1.1.5"><filename>xorg-x11-drv-ast-1.1.5-1.el6.x86_64.rpm</filename><sum type="sha256">e5ec1cce8ea0865537a89e8aa6cfd93242a48f6b9c274d2d88d7248124dee5a3</sum></package><package arch="x86_64" name="xorg-x11-drv-r128" release="1.el6" src="xorg-x11-drv-r128-6.10.0-1.el6.src.rpm" version="6.10.0"><filename>xorg-x11-drv-r128-6.10.0-1.el6.x86_64.rpm</filename><sum type="sha256">4717dd02617d6bb8487e4fc14ce3a3d1315ec98515d932c872382a09d68ab9f0</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev" release="1.el6" src="xorg-x11-drv-evdev-2.9.2-1.el6.src.rpm" version="2.9.2"><filename>xorg-x11-drv-evdev-2.9.2-1.el6.x86_64.rpm</filename><sum type="sha256">9af1614ebd495b8fe541318dc7cd0a667471c91b376c1a13007e8d9ecdf0b158</sum></package><package arch="x86_64" name="xorg-x11-drv-mutouch" release="6.el6" src="xorg-x11-drv-mutouch-1.3.0-6.el6.src.rpm" version="1.3.0"><filename>xorg-x11-drv-mutouch-1.3.0-6.el6.x86_64.rpm</filename><sum type="sha256">6884b4b6c084e52d0448553167b0b958d36153037d3234810f67133bb6a8b364</sum></package><package arch="x86_64" name="xorg-x11-drv-sis" release="1.el6" src="xorg-x11-drv-sis-0.10.8-1.el6.src.rpm" version="0.10.8"><filename>xorg-x11-drv-sis-0.10.8-1.el6.x86_64.rpm</filename><sum type="sha256">c314c04d1c0420a416f1d61a962715aed1b2c365adcdfac92f6b1bd9c11d63d0</sum></package><package arch="x86_64" name="xorg-x11-drv-cirrus" release="1.el6" src="xorg-x11-drv-cirrus-1.5.3-1.el6.src.rpm" version="1.5.3"><filename>xorg-x11-drv-cirrus-1.5.3-1.el6.x86_64.rpm</filename><sum type="sha256">e438ef724b1647db46cfea3df68a435ea3c502f1c50acc41f24f077962949fda</sum></package><package arch="x86_64" name="xorg-x11-drv-aiptek" release="6.el6" src="xorg-x11-drv-aiptek-1.4.1-6.el6.src.rpm" version="1.4.1"><filename>xorg-x11-drv-aiptek-1.4.1-6.el6.x86_64.rpm</filename><sum type="sha256">e33d3c705c8b53e6b408f395e3b85cd1fc14c14a7e8eae7d5ef9753c038d135b</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics-devel" release="1.el6" src="xorg-x11-drv-synaptics-1.8.3-1.el6.src.rpm" version="1.8.3"><filename>xorg-x11-drv-synaptics-devel-1.8.3-1.el6.x86_64.rpm</filename><sum type="sha256">8765f1879d3c05bc314ba61e40e3240c4b971817e7a0a24f49c6516b3a8ccb94</sum></package><package arch="x86_64" name="xorg-x11-drv-i128" release="11.el6" src="xorg-x11-drv-i128-1.3.6-11.el6.src.rpm" version="1.3.6"><filename>xorg-x11-drv-i128-1.3.6-11.el6.x86_64.rpm</filename><sum type="sha256">192050cb304bb08d904ca27e16c2dced934abc22ac86eec6ce21202d63e8bebd</sum></package><package arch="x86_64" name="xorg-x11-drv-vesa" release="1.el6" src="xorg-x11-drv-vesa-2.3.4-1.el6.src.rpm" version="2.3.4"><filename>xorg-x11-drv-vesa-2.3.4-1.el6.x86_64.rpm</filename><sum type="sha256">4a6fbe001823ddfacd3c33def5fcc0f2b0d37f641846a81d365abe1b6dc82949</sum></package><package arch="x86_64" name="xorg-x11-drv-s3virge" release="1.el6" src="xorg-x11-drv-s3virge-1.10.7-1.el6.src.rpm" version="1.10.7"><filename>xorg-x11-drv-s3virge-1.10.7-1.el6.x86_64.rpm</filename><sum type="sha256">b0716281dea50ad6a07fabeba14ea873a7d5b920f7fe1f98241c83683c63c9f9</sum></package><package arch="x86_64" name="xorg-x11-drv-v4l" release="37.el6" src="xorg-x11-drv-v4l-0.2.0-37.el6.src.rpm" version="0.2.0"><filename>xorg-x11-drv-v4l-0.2.0-37.el6.x86_64.rpm</filename><sum type="sha256">e9c949e504e36f2d4f86535ab7173b643700b5b03a5f43da8b37b94b8919524b</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome-devel" release="7.el6" src="xorg-x11-drv-openchrome-0.3.3-7.el6.src.rpm" version="0.3.3"><filename>xorg-x11-drv-openchrome-devel-0.3.3-7.el6.x86_64.rpm</filename><sum type="sha256">82be9d34f0b0704b3db46d5f74a4ca72a1e8087a888a56f817fa3d090b3da66a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0761" id="RHBA-2016:0761-1" title="Rhba-2016:0761-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136697" id="1136697" title="Test Case Failure: Log In On [1002:682D]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218180" id="1218180" title="Xorg Server Fails To Come Up On Rhel 6.3 System After Applying Security Updates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221010" id="1221010" title="Rhel6 As Guest Os Lead To Xorg Process Memory Leak(Spice+Screensaver)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1226723" id="1226723" title="Remove Rhel7-Specific Hack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1250105" id="1250105" title="Older Backingstore Fine On El6.0 To El6.6 But Broken By El6.7 Update." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254166" id="1254166" title="Xorg-X11-Server Freezes Using R Function X11() After Updating To Centos 6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254749" id="1254749" title="Add Support For The New G200Ew3 Product For Xorg Mga Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1258541" id="1258541" title="Add Support For The New G200E Chipset For Xorg Mga Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271398" id="1271398" title="Tool Stopped Working After Update To Version 6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318352" id="1318352" title="Test Case Failure: Panning With Xrandr" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322319" id="1322319" title="Test Case Failure: First Startx Test On Most Amd/Ati Video Cards" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0811-1</id><title>Libnl3 Bug Fix Update</title><description>The libnl3 packages contain a convenience library that simplifies using the Linux kernel's Netlink sockets interface for network manipulation.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libnl3-cli" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-cli-3.2.21-8.el6.i686.rpm</filename><sum type="sha256">7a26d52442ffc746114c34525099543456633de02702d9dedd5573e8e2767c5d</sum></package><package arch="x86_64" name="libnl3-doc" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-doc-3.2.21-8.el6.x86_64.rpm</filename><sum type="sha256">f2893a801b0600c825ed114c2f58308891c7ca921c9fdc3a43c6ba38c3883fc0</sum></package><package arch="x86_64" name="libnl3" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-3.2.21-8.el6.x86_64.rpm</filename><sum type="sha256">5332d3f95c31207db210dcbf277d5fc66cf0ac6fbb2ce89b9c57d95940c82492</sum></package><package arch="x86_64" name="libnl3-cli" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-cli-3.2.21-8.el6.x86_64.rpm</filename><sum type="sha256">8b9cd993393ec0cdb0d22f13e235a7113ac7ab13d3681c72196260b9b3aa1d27</sum></package><package arch="i686" name="libnl3" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-3.2.21-8.el6.i686.rpm</filename><sum type="sha256">f635c88959ef8d0aaaa62809764178398025409a2ec98264f8faa4afbe63fa90</sum></package><package arch="i686" name="libnl3-devel" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-devel-3.2.21-8.el6.i686.rpm</filename><sum type="sha256">74d44d151bae34939111c896eef2902edb8b79748fe659ec14c1fadc969f43dc</sum></package><package arch="x86_64" name="libnl3-devel" release="8.el6" src="libnl3-3.2.21-8.el6.src.rpm" version="3.2.21"><filename>libnl3-devel-3.2.21-8.el6.x86_64.rpm</filename><sum type="sha256">26876ecda27dba702b5928260beec7355b8ea51655fcfd9dee11cb3a8e1d51ff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0811" id="RHBA-2016:0811-1" title="Rhba-2016:0811-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168915" id="1168915" title="Need Backport To Rhel6 For Libnl: Opnotsupp Error Code Patch" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0820-1</id><title>Nss Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nspr-devel" release="1.el6" src="nspr-4.11.0-1.el6.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-1.el6.x86_64.rpm</filename><sum type="sha256">4fd1134d7dac144a2ca3db66adaca5492b1549c43d47b513853c7f043a1ccc95</sum></package><package arch="i686" name="nspr" release="1.el6" src="nspr-4.11.0-1.el6.src.rpm" version="4.11.0"><filename>nspr-4.11.0-1.el6.i686.rpm</filename><sum type="sha256">c8282437ee45e103a38ba6914fc2c814f2036cb35d719a98e3fdfc06a6dcab06</sum></package><package arch="i686" name="nspr-devel" release="1.el6" src="nspr-4.11.0-1.el6.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-1.el6.i686.rpm</filename><sum type="sha256">f976e3d1fddc45108777a0ed3addc27da81dacb73d83386ea796999664f461f1</sum></package><package arch="x86_64" name="nspr" release="1.el6" src="nspr-4.11.0-1.el6.src.rpm" version="4.11.0"><filename>nspr-4.11.0-1.el6.x86_64.rpm</filename><sum type="sha256">f0de120809b64d387b625b07410aae0a4600250f3d4ddc144ea51304fe0f654a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0820" id="RHBA-2016:0820-1" title="Rhba-2016:0820-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1059682" id="1059682" title="Default Cipher Ordering Doesn&amp;#39;T Include Ecdsa Ciphers And Doesn&amp;#39;T Follow Current Best Practice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272504" id="1272504" title="Enable Tls 1.2 As The Default In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283655" id="1283655" title="Compile Nss/Cmd/Listsuites/Listsuites.C Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297888" id="1297888" title="Rebase Rhel 6.8 To Nss 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297890" id="1297890" title="Rebase Rhel 6.8 To Nss-Util 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297891" id="1297891" title="Rebase Rhel 6.8 To Nspr 4.11 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304812" id="1304812" title="Disable Support For Sslv2 Completely." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0832-1</id><title>Libgovirt, Spice-Gtk, Usbredir, And Virt-Viewer Bug Fix Update</title><description>The libgovirt packages contain a library that allows applications to use the oVirt Representational State Transfer (REST) API to list virtual machines (VMs) managed by an oVirt instance. The library is also used to get the connection parameters needed to establish a connection to the VMs using Simple Protocol For Computing Environments (SPICE) or Virtual Network Computing (VNC).

The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol.

The usbredir packages provide a network protocol for sending USB device traffic over a network connection and a number of libraries to help implement support for this protocol.

The virt-viewer packages provide Virtual Machine Viewer, which is a lightweight interface for interacting with the graphical display of a virtualized guest.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="usbredir-devel" release="3.el6" src="usbredir-0.5.1-3.el6.src.rpm" version="0.5.1"><filename>usbredir-devel-0.5.1-3.el6.i686.rpm</filename><sum type="sha256">b8f720a29aa858851bb3e935d80ab9df19554e70a3af19bb26a87fc9ffaa93ba</sum></package><package arch="x86_64" name="usbredir-server" release="3.el6" src="usbredir-0.5.1-3.el6.src.rpm" version="0.5.1"><filename>usbredir-server-0.5.1-3.el6.x86_64.rpm</filename><sum type="sha256">167826cc3b102660bf1ed873a81e92e9d520caaab71968f172253e7491a0ac88</sum></package><package arch="i686" name="usbredir" release="3.el6" src="usbredir-0.5.1-3.el6.src.rpm" version="0.5.1"><filename>usbredir-0.5.1-3.el6.i686.rpm</filename><sum type="sha256">2b638ae1698b71984ced858f580130900d401612c3ef03b97ce615d641c473b0</sum></package><package arch="x86_64" name="usbredir-devel" release="3.el6" src="usbredir-0.5.1-3.el6.src.rpm" version="0.5.1"><filename>usbredir-devel-0.5.1-3.el6.x86_64.rpm</filename><sum type="sha256">564e65a0e2aac1dfa348ca87c2afaef834f9431d2be2c9c73460234efe7ee8a8</sum></package><package arch="x86_64" name="usbredir" release="3.el6" src="usbredir-0.5.1-3.el6.src.rpm" version="0.5.1"><filename>usbredir-0.5.1-3.el6.x86_64.rpm</filename><sum type="sha256">787435eaa6a8bf9d8abfb358e04787146cd9d73f7befa48aacce70761985ecb7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0832" id="RHBA-2016:0832-1" title="Rhba-2016:0832-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212802" id="1212802" title="Virt-Viewer -F Option Doesn&amp;#39;T Work Well After Last Leaving With Enable Dispaly1,3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221501" id="1221501" title="Virt-Viewer &amp;Quot;Normal Size&amp;Quot; Doesn&amp;#39;T Take Effect When Opened Guest With Zoom Level &amp;Ge; 130" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223285" id="1223285" title="Choose Vm Dialog Not Visible In Taskbar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1230603" id="1230603" title="Shortcuts Missing From &amp;Quot;Send Key&amp;Quot; Menu When Started Using Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242605" id="1242605" title="Connecting To Vm Changes Its Resolution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1246395" id="1246395" title="Virt-Viewer Window Crashes After Restart Libvirtd In Remote Host" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247749" id="1247749" title="High Resolution Multi-Monitor Windows Guest Freeze" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247920" id="1247920" title="Cannot Enable Display 1 When It Was Disabled In Previous Session" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265359" id="1265359" title="Add Client Capability For Windows Monitor_Config Messsage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265361" id="1265361" title="Windows Needs To Send Complete Monitors_Config Message To Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274355" id="1274355" title="Remote-Viewer Crash After Login To Vm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276707" id="1276707" title="Usbredir/100Mb/S Memory Leak Redirecting A Camera" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277447" id="1277447" title="Libgovirt Needs To Access /Ovirt-Engine/Api/ Rather Than /Api/" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285163" id="1285163" title="Error Massage Pop Up &amp;Quot;Unable To Connect To Libvirt With Uri: [None].&amp;Quot; Continuously When Stop Libvirtd Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287462" id="1287462" title="Virt-Viewer Will Core Dump With -R Option Via Ssh When Destroy The Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289969" id="1289969" title="Add &amp;#39;Admin&amp;#39; Key To [Ovirt] .Vv File Section" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289971" id="1289971" title="Virt-Viewer Cannot Reconnect Libvirtd Connection Via Ssh After Libvirtd Restart" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289972" id="1289972" title="After Resizing Virt-Viewer Window Bigger Than Screen Size, Window Gets Resized Back To Screen Size, And Content Scaled Down" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290749" id="1290749" title="Usbredir/100Mb/S Memory Leak Redirecting A Camera" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291159" id="1291159" title="Virt-Viewer/Spice-Gtk Miss Dependency Of Usbredir" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292754" id="1292754" title="Add Support For &amp;Quot;Proxy-Url&amp;Quot; Property" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292765" id="1292765" title="Add Support For Proxy-Url Libgovirt Property" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293878" id="1293878" title="The Vnc Guest Name Shows Incorrect When Connected By Remote-Viewer A Connection File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294937" id="1294937" title="Virt-Viewer Will Core Dump When Close The Console Window By Selecting View-&amp;Gt;Displays-&amp;Gt;Display 1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1295944" id="1295944" title="Add Minimum Version Check To Rhev Spice-Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296878" id="1296878" title="Virt-Viewer Console Will Restore A Larger Window When Use Mouse To Drag The Window To Minimum" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300639" id="1300639" title="The Format Of Program Version Number Is Different Between Rhel6 And Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304648" id="1304648" title="Can&amp;#39;T Connect To Any Display If Specifying Nothing To Monitor-Mapping" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309234" id="1309234" title="Monitor Mapping Doesn&amp;#39;T Properly Adjust Resolutions" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0960-1</id><title>Device-Mapper-Persistent-Data Bug Fix Update</title><description>The device-mapper-persistent-data packages provide device-mapper thin provisioning utilities.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="device-mapper-persistent-data" release="0.1.rc7.el6" src="device-mapper-persistent-data-0.6.2-0.1.rc7.el6.src.rpm" version="0.6.2"><filename>device-mapper-persistent-data-0.6.2-0.1.rc7.el6.x86_64.rpm</filename><sum type="sha256">404f3bf5d1d21e8e5c4ebaa86d3270ffb72f47a9a8eed27681b1e774c0cbfd87</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0960" id="RHBA-2016:0960-1" title="Rhba-2016:0960-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1100640" id="1100640" title="Package Starts To Be Using Too Much Space For Its Binaries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221372" id="1221372" title="Thinp Tools Do Not Handle Over Large Metadata Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302454" id="1302454" title="Thin Pool Meta Device Can Only Be Corrupted And Repaired Once" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319937" id="1319937" title="Pool Created Without Zeroing The First 4Kib (--Zero N) Can Not Have Meta Corrupted And Then Repaired" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:0995-1</id><title>Dracut Bug Fix Update</title><description>This update fixes the following bug:

* A previous regression in dracut caused systems with iSCSI offloading or iSCSI Boot Firmware Table (iBFT) to stop booting in some cases. Consequently, freshly installed Scientific Linux 6.8 systems with "iscsi_firmware" on the kernel command line could be unable to boot. This update fixes the bug, and systems in the described scenario are able to boot.</description><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="dracut-kernel" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-kernel-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">17642998741daee2d9092d04400c27d97877a6a44df6502edbe97f21a76836a4</sum></package><package arch="noarch" name="dracut-tools" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-tools-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">013a84a8fcfa3cc0e14eea50929788adfeaf218409e5b0d962480af8e36a895b</sum></package><package arch="noarch" name="dracut-fips-aesni" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-fips-aesni-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">7e9f6bf09d401fe1120a23cd6e5ec1278761dc942a9f4add2f03c0ccd6a95dee</sum></package><package arch="noarch" name="dracut-generic" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-generic-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">41f165ab4da51641d88966489c7708879c496ca78180d90ec1f160f378976423</sum></package><package arch="noarch" name="dracut-network" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-network-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">0cd1fb15b22fd47d2c990b1dc95a7f855ff48c09937f1e80bd68dce010bfb6e9</sum></package><package arch="noarch" name="dracut-fips" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-fips-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">3efbb0877197e7eae1e59764d2d892198af29edb030bf3cfd58a925d0b32535a</sum></package><package arch="noarch" name="dracut-caps" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-caps-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">11a7c1c68f94c27b5bcd72bc378984f30f459ef92caf03b4b87bbb24d30c6591</sum></package><package arch="noarch" name="dracut" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">755b97ea8f38cbb6f4a76b85eac4a2b5c117de343e15bc7270a2e28e17a14b03</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0995" id="RHBA-2016:0995-1" title="Rhba-2016:0995-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331811" id="1331811" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:1266-1</id><title>Tzdata Bug Fix Update</title><description>This update fixes the following bugs:

* In 2015, Egypt did not observe Daylight Savings Time (DST). However, in 2016, Egypt observes DST from July 7 at 24:00 to October 27 at 24:00. As a consequence of this change, the tzdata package had incorrect data regarding DST in Egypt in 2016. This has been fixed, and tzdata now has the correct data.</description><release>Scientific Linux Fermi</release><issued date="2016-06-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016e-1.el6.src.rpm" version="2016e"><filename>tzdata-java-2016e-1.el6.noarch.rpm</filename><sum type="sha256">e1a4af31a55615a2cecd4cfeecaf097374c0d5126930ca32cf81efaad4c3fe52</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016e-1.el6.src.rpm" version="2016e"><filename>tzdata-2016e-1.el6.noarch.rpm</filename><sum type="sha256">42427f93789cbf7a712c2b2842f7dde1645f624692e2fb9005af7381c487a2df</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1266" id="RHBA-2016:1266-1" title="Rhba-2016:1266-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334677" id="1334677" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342553" id="1342553" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346423" id="1346423" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346424" id="1346424" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2096-1</id><title>Tzdata Bug Fix Update</title><description>This update fixes the following bug:

* This update fixes the daylight saving time (DST) date for Palestine. The correct date and time is October 29, 2016 at 01:00.</description><release>Scientific Linux Fermi</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016h-1.el6.src.rpm" version="2016h"><filename>tzdata-2016h-1.el6.noarch.rpm</filename><sum type="sha256">1bc56b0f7e90fbb151f43b8bb2b9c2fd0c7deb65bd51677c9dd4c871c197313e</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016h-1.el6.src.rpm" version="2016h"><filename>tzdata-java-2016h-1.el6.noarch.rpm</filename><sum type="sha256">73c6299e358cfd72cf152a348f74e0ab88b3015b4c98f8582e62b998a349941d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2096" id="RHBA-2016:2096-1" title="Rhba-2016:2096-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387368" id="1387368" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387374" id="1387374" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387416" id="1387416" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387419" id="1387419" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2660-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* A new time zone Asia/Famagusta has been created, which is a UTC+03 year round time zone. As of 2016-10-30, Cyprus split into two time zones. Northern Cyprus is now in the Asia/Famagusta time zone.

* The Pacific/Tongatapu time zone will reintroduce Daylight Saving Time (DST) on 2016-11-06.

* The Antarctica/Casey time zone has changed from UTC+08 to UTC+11 on 2016-10-22.</description><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016i-1.el6.src.rpm" version="2016i"><filename>tzdata-2016i-1.el6.noarch.rpm</filename><sum type="sha256">51021abb88fb7552df1aab8739fda3e647e061ba41105586ecbe3d2c54f00fb1</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016i-1.el6.src.rpm" version="2016i"><filename>tzdata-java-2016i-1.el6.noarch.rpm</filename><sum type="sha256">2f08cb4c79bd12bb6a620f876c3f7a85bf63acb38600d963445dd700d51e5f3b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2660" id="RHBA-2016:2660-1" title="Rhba-2016:2660-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391304" id="1391304" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391306" id="1391306" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391483" id="1391483" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391486" id="1391486" title="Tzdata-2016I Is Available" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0306-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* A missing SELinux rule was previously causing errors when adding a webhook using the gluster-eventsapi command. The rule to allow "glusterd_t" domain binds on glusterd UDP port has been added, and adding a webhook using gluster- eventsapi now works properly.</description><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-mls" release="292.el6_8.3" src="selinux-policy-3.7.19-292.el6_8.3.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-292.el6_8.3.noarch.rpm</filename><sum type="sha256">612d47d59c1414ad2dab622512531fc48e444dbe9b89c3bbaaef17d2eb13f5d7</sum></package><package arch="noarch" name="selinux-policy" release="292.el6_8.3" src="selinux-policy-3.7.19-292.el6_8.3.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-292.el6_8.3.noarch.rpm</filename><sum type="sha256">178817e226d6baee9e2bd8dc6e9849cd45584de2f4f769df15d65f5036d1b8ae</sum></package><package arch="noarch" name="selinux-policy-targeted" release="292.el6_8.3" src="selinux-policy-3.7.19-292.el6_8.3.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-292.el6_8.3.noarch.rpm</filename><sum type="sha256">090b200629aa18495f20ad5c09c87f49406de35f299b8526622f75b24c509950</sum></package><package arch="noarch" name="selinux-policy-doc" release="292.el6_8.3" src="selinux-policy-3.7.19-292.el6_8.3.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-292.el6_8.3.noarch.rpm</filename><sum type="sha256">29bed18b6b655579a0bc075ad893aade17383368c279c0e5e92435d8fcc71a72</sum></package><package arch="noarch" name="selinux-policy-minimum" release="292.el6_8.3" src="selinux-policy-3.7.19-292.el6_8.3.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-292.el6_8.3.noarch.rpm</filename><sum type="sha256">e4caba6c9f79680f567b42fc7966dd63b8a764d32c9338df69d3af089d859fe8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0306" id="RHBA-2017:0306-1" title="Rhba-2017:0306-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1409482" id="1409482" title="[Selinux] [Eventing]: Gluster-Eventsapi Shows A Traceback While Adding A Webhook" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0472-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* Mongolia no longer observes DST.

* The Magallanes Region of Chile has moved from a UTC-04/-03 scheme to UTC-03 all year. Starting 2017-05-13 at 23:00, the clocks for the Magallanes Region will differ from America/Santiago. To accommodate for this change, the new America/Punta_Arenas zone has been created.

* The zone1970.tab file has been added to the list of files to be installed with the tzdata packages installation.</description><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2017a-1.el6.src.rpm" version="2017a"><filename>tzdata-java-2017a-1.el6.noarch.rpm</filename><sum type="sha256">4e39b931c86e93566fdc97b5ce2e2e7c5b6ff388496f9aae52700decf5ea553e</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2017a-1.el6.src.rpm" version="2017a"><filename>tzdata-2017a-1.el6.noarch.rpm</filename><sum type="sha256">037c2782146fb0c464bac96539845bbbeb830ec1963d607cafdb822c5d5f73d0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0472" id="RHBA-2017:0472-1" title="Rhba-2017:0472-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0602-1</id><title>Resource-Agents Bug Fix Update</title><description>The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.</description><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="resource-agents" release="46.el6" src="resource-agents-3.9.5-46.el6.src.rpm" version="3.9.5"><filename>resource-agents-3.9.5-46.el6.x86_64.rpm</filename><sum type="sha256">0e8a5a5365c86c0b19cd4c6dcc04882fa4b9237cc66a4c7b4dbd711892963e25</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0602" id="RHBA-2017:0602-1" title="Rhba-2017:0602-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0627-1</id><title>Selinux-Policy Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-doc" release="307.el6" src="selinux-policy-3.7.19-307.el6.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-307.el6.noarch.rpm</filename><sum type="sha256">e6e6a8aae1b5ebd860ba507ed772c8a4f3dfbab02de689ad2403fc332e2ffbee</sum></package><package arch="noarch" name="selinux-policy-targeted" release="307.el6" src="selinux-policy-3.7.19-307.el6.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-307.el6.noarch.rpm</filename><sum type="sha256">25bbb3278f4b0c6135dfce27cbe743f284e113c8630656a837c2f23cba4335a2</sum></package><package arch="noarch" name="selinux-policy" release="307.el6" src="selinux-policy-3.7.19-307.el6.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-307.el6.noarch.rpm</filename><sum type="sha256">29c83cb6cddf1f8e710306aaea2c8cad138959cfd9833ae5fb7e9a6d2709374d</sum></package><package arch="noarch" name="selinux-policy-mls" release="307.el6" src="selinux-policy-3.7.19-307.el6.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-307.el6.noarch.rpm</filename><sum type="sha256">398b732bd2bdc10ddf3edff04b24e8b453af1d8468e2671933b4343d70065032</sum></package><package arch="noarch" name="selinux-policy-minimum" release="307.el6" src="selinux-policy-3.7.19-307.el6.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-307.el6.noarch.rpm</filename><sum type="sha256">0d73d4de3058dc63bd1b9d95c04d88601da4348e981355d87a562fe8053e49b3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0627" id="RHBA-2017:0627-1" title="Rhba-2017:0627-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264977" id="1264977" title="Bug: /Selinux/Checkreqprot Should Be Set To 0 At Boot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286994" id="1286994" title="The Start Of Roundup Service Triggers Selinux Denials" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299306" id="1299306" title="Avc:  Denied  { Recvfrom } ..." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299552" id="1299552" title="Selinux Prevents Lighttpd From Fstat()-Ing Inotifyfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310077" id="1310077" title="Vsftpd Can Access Nfs Even If Allow_Ftpd_Use_Nfs Is Off Under Specific Conditions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326718" id="1326718" title="[Selinux]: Avc Denying Read To &quot;/Var/Lib/Pcsd/Pcsd.Key&quot; Observed During Gluster Nfs-Ganesha Disable." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331585" id="1331585" title="[Selinux]: Cases In Pynfs Test Suite Fails Because Of Selinux Errors." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334606" id="1334606" title="Avc Found During Running Python Unit Tests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334756" id="1334756" title="Selinux Is Preventing /Usr/Sbin/Asterisk From 'Name_Connect' Accesses On The Tcp_Socket Port 5222" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335733" id="1335733" title="[Hyper-V][Rhel6.9]Hypervvssd And Selinux Denials" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336394" id="1336394" title="Avc Denial When Winbind Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336590" id="1336590" title="Libstoragemgmt: Selinux Preventing Hpsa Plugin From Running (Avc:  Denial)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337895" id="1337895" title="Selinux Prevents Kpropd From Communicating With Sssd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340150" id="1340150" title="Avc Denial When Assigning Usb Sound Device To Qemu-Kvm Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365501" id="1365501" title="Avc Error On Isnsd When Initiator Tries To Connect To It" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369699" id="1369699" title="[Qemu-Geust-Agent] Cmd: Guest-Set-User-Password: Child Process Has Failed To Set User Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377644" id="1377644" title="Missing Type Enforcement (Te) Allow Rule." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378463" id="1378463" title="Guest_T Can Run Sudo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384487" id="1384487" title="[Rhel6] Selinux Prevents Fuse Mounting Of Rdma Transport Type Volumes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386181" id="1386181" title="Puppet 4 Aio Packages Aren'T Supported By The Targeted Selinux Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389982" id="1389982" title="Selinux Avc Failures About Nvme" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390657" id="1390657" title="Selinux Policy Breaks Rotation Of Chronyd Logs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390810" id="1390810" title="Selinux Policy Bans Fail2Ban Access To Shorewall" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391525" id="1391525" title="Mysql Context For /Var/Lib/Mysql-Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392525" id="1392525" title="Selinux Prevents Ftpdctl From Unlinking Its Socket" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393938" id="1393938" title="Rfc: Ls -Z /Usr/Lib/Jvm/Jre-*-Openjdk*/Bin/Java - Java_Exec_T Vs Bin_T - Ps Java Process As Xguest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397117" id="1397117" title="/Usr/Share/Conman/Exec/Ipmitool.Exp Needs A New Selinux Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397703" id="1397703" title="Sepgsql_Contexts File Contains Errors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397802" id="1397802" title="Selinux Prevents Console-Kit-Daemon From Creating /Var/Log/Consolekit Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400234" id="1400234" title="Avc When Hostname As Ksh Cmd Subs In Cluster Env" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401611" id="1401611" title="Selinux Prevents Ipsec To Read /Etc/Pki/Nss-Legacy/Nss-Rhel6.Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404562" id="1404562" title="[Selinux] [Eventing]: Gluster-Eventsapi Shows A Traceback While Adding A Webhook" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0696-1</id><title>Yum-Utils Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="yum-plugin-list-data" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-list-data-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">3dfe726b496c9708e3343cf27f634238b16a9bbbf99d1a7da11390c24a3022c5</sum></package><package arch="noarch" name="yum-plugin-filter-data" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-filter-data-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">812eaeb03a9491ea38484649f94fa57c5d3ee5becd6fdb3174339f562622a22e</sum></package><package arch="noarch" name="yum-plugin-ovl" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-ovl-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">5906127a1c9834bc244fe9fa27441ea6669c4cd2a4b43fd8703f0776cebd5cca</sum></package><package arch="noarch" name="yum-plugin-fs-snapshot" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-fs-snapshot-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">e2d32bfed08416c85737a4ca63f927bd1efb2ec098312358a3c15dfa838c9798</sum></package><package arch="noarch" name="yum-plugin-changelog" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-changelog-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">ea0ccae84995abb5a8c493fcfbc903356d745d2955721e46f04c359f3eecec6b</sum></package><package arch="noarch" name="yum-plugin-rpm-warm-cache" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-rpm-warm-cache-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">e5876ceb9d4c492b3b06ac9a95e69735fd6a0d4911425706ec465730e8c60b5d</sum></package><package arch="noarch" name="yum-NetworkManager-dispatcher" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-NetworkManager-dispatcher-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">2901e3552256f245091d2f14bd1c7b1a074834fa049824cc5ba73a1cea3a1074</sum></package><package arch="noarch" name="yum-plugin-tsflags" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-tsflags-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">90f155f4730e9d0d7f39229fd7d1323ccbc67b69b4a5d4dafec949fb26b7fbca</sum></package><package arch="noarch" name="yum-plugin-protectbase" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-protectbase-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">1257e21a8695cb60ceceaebc398b7b1fe43e6cc7ab13d55e713b9026d13b34db</sum></package><package arch="noarch" name="yum-plugin-local" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-local-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">b50610b99ff61f8a61a2f67f3b0dd3aa75520acb12a5f173676ae00f44663eef</sum></package><package arch="noarch" name="yum-plugin-security" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-security-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">7c21edc2fd60d5ede4bb736747ecd2cc11aff43db83bf952e9ee5e58c41a4543</sum></package><package arch="noarch" name="yum-updateonboot" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-updateonboot-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">ce06c2224c44ec217aacdcd501d5135d6352a8320cc5310e2bbc30e9f297236b</sum></package><package arch="noarch" name="yum-plugin-remove-with-leaves" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-remove-with-leaves-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">bf7035a0917efbfa6ff19052c92b25102fb5bdad56208fa4c59936a0c14c96b7</sum></package><package arch="noarch" name="yum-plugin-tmprepo" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-tmprepo-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">c79f1c61c480f12d8263c6181e86ec1b093f32b0846d65e3009896ef89e996d6</sum></package><package arch="noarch" name="yum-plugin-versionlock" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-versionlock-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">bf5271c0fecf727e2596e67f8baa40db7eaef57e52d80a25704c6c1108472457</sum></package><package arch="noarch" name="yum-plugin-upgrade-helper" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-upgrade-helper-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">d854e40894470026231e7a9b9735e7893b0a7350fe94a5e5b3c4a8dd5a2c38b1</sum></package><package arch="noarch" name="yum-plugin-priorities" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-priorities-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">9945db5a7a156612aa1bd5045d1a5f81ca788fe642a30ef0ad9c5a147662b2a6</sum></package><package arch="noarch" name="yum-plugin-show-leaves" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-show-leaves-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">13d55d17c68373a1876a87c09d90f168ccbcda6e13ac05a3412527ec4083c601</sum></package><package arch="noarch" name="yum-plugin-auto-update-debug-info" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-auto-update-debug-info-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">36277616bd554cd3fdbc5ba2875380e5c021c995a172ca25398073cae67b9c04</sum></package><package arch="noarch" name="yum-plugin-verify" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-verify-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">aea09613189f98d4807ac75c3afdbc7547ea783b444d1ded8385200020c246c5</sum></package><package arch="noarch" name="yum-plugin-fastestmirror" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-fastestmirror-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">7e8632abde998147ced6ce6adad0980c61845027bd9e895c8c26883eb5180c4a</sum></package><package arch="noarch" name="yum-plugin-merge-conf" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-merge-conf-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">2a7a8b8bd4300d269d7f3ddf708bc5f1bf1ed107f8bf2c554fd13756f6003960</sum></package><package arch="noarch" name="yum-plugin-keys" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-keys-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">ba270aed752c12e9e6fc9590e2a020906f5d5ffe59279ffac8bc83fe0e868a38</sum></package><package arch="noarch" name="yum-utils" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-utils-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">f72ab989deed3d75d479b11b37ba658964df14ddd1db78e682707a447916c558</sum></package><package arch="noarch" name="yum-plugin-ps" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-ps-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">fc4c6fc7cc3761cc1496e64079ee670444b9357b11c89afeb3aa34a2ce7f8fb4</sum></package><package arch="noarch" name="yum-plugin-post-transaction-actions" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-post-transaction-actions-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">64169819e4dd38e1243e52d7b9993d5bd8cc9e1b3fa04c5eac396259b381af3c</sum></package><package arch="noarch" name="yum-plugin-aliases" release="40.el6" src="yum-utils-1.1.30-40.el6.src.rpm" version="1.1.30"><filename>yum-plugin-aliases-1.1.30-40.el6.noarch.rpm</filename><sum type="sha256">b4b9e99616afbfbc23ab310d1c30fb418849d957206b94e7e0565e729890fe51</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0696" id="RHBA-2017:0696-1" title="Rhba-2017:0696-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293982" id="1293982" title="Yum-Plugin-Auto-Update-Debug-Info Still Raises Exception From Bz676525" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347813" id="1347813" title="Incorrect Available Package Count With Yum --Security" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0697-1</id><title>Device-Mapper-Multipath Bug Fix And Enhancement Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="device-mapper-multipath-libs" release="100.el6" src="device-mapper-multipath-0.4.9-100.el6.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-100.el6.x86_64.rpm</filename><sum type="sha256">9e0b615ee35635d1ce605c9183c9e272a62b1a686f5b54c53d848392810b5def</sum></package><package arch="x86_64" name="device-mapper-multipath" release="100.el6" src="device-mapper-multipath-0.4.9-100.el6.src.rpm" version="0.4.9"><filename>device-mapper-multipath-0.4.9-100.el6.x86_64.rpm</filename><sum type="sha256">cba4300fcb88bb31eed1866455776a62a6ddb56e8833594cde9a6336404c882f</sum></package><package arch="i686" name="device-mapper-multipath-libs" release="100.el6" src="device-mapper-multipath-0.4.9-100.el6.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-100.el6.i686.rpm</filename><sum type="sha256">9f90a63fd7d8f13ac275293abd44a12ff9323e1761d9f59b53d4d37c1111e319</sum></package><package arch="x86_64" name="kpartx" release="100.el6" src="device-mapper-multipath-0.4.9-100.el6.src.rpm" version="0.4.9"><filename>kpartx-0.4.9-100.el6.x86_64.rpm</filename><sum type="sha256">3a0b1cb9941797619390bc291a333e8c6752885dcc459a8afe98e1c391ae66fd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0697" id="RHBA-2017:0697-1" title="Rhba-2017:0697-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299644" id="1299644" title="Typo In Multipath .Spec File (Reload_Rewrite)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300414" id="1300414" title="Pull Patch From Upstream To Support Pure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305589" id="1305589" title="Rfe: Request For Warning If Multipathd Is Not Running/Active" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310320" id="1310320" title="Add Multipath Option To Disable Kpartx Partition Creation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322532" id="1322532" title="[Nimble Storage] No_Path_Retry Not Working As Expected With Active/Passive Arrays When Tur Path Checker Is Used." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1324764" id="1324764" title="A Typo In Manual Of Multipath.Conf(5)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328077" id="1328077" title="Multipath Reports Successful Resize Of Math On Second Attempt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343747" id="1343747" title="Individual Errors During Multipath Discovery Invalidate The Entire Discovery." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349376" id="1349376" title="Multipath -Ll Crashes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365710" id="1365710" title="Multipath Daemon Crashes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377532" id="1377532" title="/Sbin/Multipathd Segfaults" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401391" id="1401391" title="Dynamic Linking Error Occurred When Executing &quot;Multipath -R&quot; After Offline One Disk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401769" id="1401769" title="&quot;Chk_St Dev_St&quot; Stays &quot;Ready  Running&quot; After Offline The Device" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0700-1</id><title>Xorg-X11-Drv-Mga Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-drv-mga" release="11.el6" src="xorg-x11-drv-mga-1.6.3-11.el6.src.rpm" version="1.6.3"><filename>xorg-x11-drv-mga-1.6.3-11.el6.x86_64.rpm</filename><sum type="sha256">2cc47b232acd907f8b07480b2b9f88f3218abdfc6a9a34b15306f702ccc6e9ff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0700" id="RHBA-2017:0700-1" title="Rhba-2017:0700-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1192865" id="1192865" title="A Higher Resolution Can Not Use With Mga G200E In Uefi Mode." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0702-1</id><title>Yum Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="yum" release="81.el6" src="yum-3.2.29-81.el6.src.rpm" version="3.2.29"><filename>yum-3.2.29-81.el6.noarch.rpm</filename><sum type="sha256">beb8bb3f68320f47172369b4711c479aaba35a4bb257b30b3d3a3d4ef7a17883</sum></package><package arch="noarch" name="yum-cron" release="81.el6" src="yum-3.2.29-81.el6.src.rpm" version="3.2.29"><filename>yum-cron-3.2.29-81.el6.noarch.rpm</filename><sum type="sha256">af29d4249148b45a35581e4dc12835848cc10821ad6b4fd62b6bec6a376ba290</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0702" id="RHBA-2017:0702-1" title="Rhba-2017:0702-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269659" id="1269659" title="Error: An Update Notice Is Broken, Or Duplicate, Skipping" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1307098" id="1307098" title="Yum Downloadonly Does Not Reliably Remove Lock Files" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0713-1</id><title>Python-Requests Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-requests" release="4.el6" src="python-requests-2.6.0-4.el6.src.rpm" version="2.6.0"><filename>python-requests-2.6.0-4.el6.noarch.rpm</filename><sum type="sha256">76b4f822c128b5254bd72cd5233cfe4009682597064836c728ae81a4c35199fb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0713" id="RHBA-2017:0713-1" title="Rhba-2017:0713-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382682" id="1382682" title="Python-Requests Module Cannot Communicate With Https Servers That Require Sni Support Even If Python2-Ndg_Httpsclient Is Installed" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0729-1</id><title>Xorg-X11-Server Bug Fix And Enhancement Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="xorg-x11-server-source" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-source-1.17.4-16.sl6.noarch.rpm</filename><sum type="sha256">8f9c3f754b88bd417364a0726fb9af996043d94a396977caa66f9b370f183805</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-devel-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">20b3ec39b691fcd7adbc24eb3eb8caf76255757aaa6fa50a5e13dde0947b6be8</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xnest-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">b7706125bf83ff8ef505fc0e28b885e7a995e8a5dab56d4b0e88bff0025fee16</sum></package><package arch="i686" name="xorg-x11-server-devel" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-devel-1.17.4-16.sl6.i686.rpm</filename><sum type="sha256">762920a817e8ad177aa60b188ef689285f2fd8770385214b6de5f0b9e002ae30</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xdmx-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">a8748a05f421338d05013cb69c26c04c0fabd6692a9a3b59a9283c07a37f3e39</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xephyr-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">779b174f0b6d8d467cde7411c57bf44061356e66441d3b7a77088d1257bfe44f</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xvfb-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">517af86de8bc811eb322162c733e09bd9455a5970bc38b754b58c90fb3a5ed32</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xorg-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">ed12b8afa285bf9fd30e60840c52055df02b1d3d387c97e451eaa6c0785487e6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="16.sl6" src="xorg-x11-server-1.17.4-16.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-common-1.17.4-16.sl6.x86_64.rpm</filename><sum type="sha256">251c331467acc4b1fc0fbb5f9bfcd02be2c64ea20fe3914d3403acef27b425ac</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0729" id="RHBA-2017:0729-1" title="Rhba-2017:0729-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335218" id="1335218" title="Revert Behavior Change '-Nolisten Tcp' Made In 1.17" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336014" id="1336014" title="Indirect Rendering Has Been Disabled By Default In 1.17" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344137" id="1344137" title="New Version Of Tigervnc-Server Disconnects Xsession When Initiated From Xinetd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1381718" id="1381718" title="X Crashes When Exiting Application Using Backing Store In Crushtree" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0730-1</id><title>Xorg-X11-Drv-Mach64 Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-drv-mach64" release="1.el6" src="xorg-x11-drv-mach64-6.9.5-1.el6.src.rpm" version="6.9.5"><filename>xorg-x11-drv-mach64-6.9.5-1.el6.x86_64.rpm</filename><sum type="sha256">6347a556ab5ce796a99aedba7769ca41761f017e208b5f81a48353e1ccecd931</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0730" id="RHBA-2017:0730-1" title="Rhba-2017:0730-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380745" id="1380745" title="Upgrade Mach64 To 6.9.5" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0748-1</id><title>Virt-What Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="virt-what" release="1.3.el6" src="virt-what-1.11-1.3.el6.src.rpm" version="1.11"><filename>virt-what-1.11-1.3.el6.x86_64.rpm</filename><sum type="sha256">4cb23d954c7b65c879643c93701585c19373af19a28e27e1dcaa9694e6c1e347</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0748" id="RHBA-2017:0748-1" title="Rhba-2017:0748-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249439" id="1249439" title="Virt-What Does Not Identify Rhev/Ovirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312431" id="1312431" title="Add Support For Detecting Ppc64 Lpar As Virt Guests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346571" id="1346571" title="Virt-What Doesn'T Display Xen-Domu For A Rhel6.8 Paravirtualized Guest Domain On Rhel5.11 Xen Host." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0757-1</id><title>Systemtap Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="systemtap-sdt-devel" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-sdt-devel-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">42a6e067912ad3f363e15c0f5418d23c86953110fef3033387e8f03f0a62356b</sum></package><package arch="x86_64" name="systemtap-server" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-server-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">84fef294b5f574135e409a1ce29fa0ab2719df46be63abe72e8a7eb92fa9b106</sum></package><package arch="i686" name="systemtap-sdt-devel" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-sdt-devel-2.9-7.el6.i686.rpm</filename><sum type="sha256">bc726c5936be4bf267d3de5b2ef431a2a059e0a5b6c8b922f9f250b599df0190</sum></package><package arch="x86_64" name="systemtap-runtime-virtguest" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-runtime-virtguest-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">65784f17e20d254b904cf7f124ad0894850d5c07ff960f6bccce595cc1765fe6</sum></package><package arch="x86_64" name="systemtap" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">00a78428e7d27f6ad2a2db9b97ec23d492e141553059859c7820c6df5af6988f</sum></package><package arch="x86_64" name="systemtap-initscript" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-initscript-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">9746de7e3488c51c0c6f2e3df8cbab70d7d39478e73b669a38baa53b20234508</sum></package><package arch="x86_64" name="systemtap-runtime" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-runtime-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">aa885fc0972f5aff1025e72766453b0ec940d255ec2d3367e1f21b1329ae44d5</sum></package><package arch="x86_64" name="systemtap-client" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-client-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">4f6fe91e3ab3ca1e066b10fd941a9ba43e71f3d4a1147094979bcb7f832a965c</sum></package><package arch="x86_64" name="systemtap-devel" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-devel-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">01c9dd136cc37e280cf05802a0a00f334eaa19a64333576c218fbc7bcb2e49b8</sum></package><package arch="x86_64" name="systemtap-testsuite" release="7.el6" src="systemtap-2.9-7.el6.src.rpm" version="2.9"><filename>systemtap-testsuite-2.9-7.el6.x86_64.rpm</filename><sum type="sha256">823e81a19be147d7d7011549fb3889c331b3bd234f618000eb4aed2ea1b41c5e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0757" id="RHBA-2017:0757-1" title="Rhba-2017:0757-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0775-1</id><title>Plymouth Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="plymouth-core-libs" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-core-libs-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">36708f25f021d1f5fce5996481f4d49dfcc0f9c36193128528ea5c6ebeb57236</sum></package><package arch="noarch" name="plymouth-theme-fade-in" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-theme-fade-in-0.8.3-29.sl6.noarch.rpm</filename><sum type="sha256">860754d239945c9f7c6897c1ce09314566bcc9040701b83f0979ec60ba8a1d82</sum></package><package arch="i686" name="plymouth-core-libs" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-core-libs-0.8.3-29.sl6.i686.rpm</filename><sum type="sha256">e3e2034b2d00342bdfc8aa78f8770ad55b704622a6e31363af5d728b5840159f</sum></package><package arch="x86_64" name="plymouth-scripts" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-scripts-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">c677bf2dbdde7edc2c1affebcbf3f43e2a83e24c5c61ddae73b265f13523c9ab</sum></package><package arch="x86_64" name="plymouth-plugin-two-step" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-plugin-two-step-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">96b348f04813d5f047a4838d586f8319ce387ed1d3a5076736d01ba875ffa3c2</sum></package><package arch="noarch" name="plymouth-theme-rings" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-theme-rings-0.8.3-29.sl6.noarch.rpm</filename><sum type="sha256">6fe03e8fae79c27fdeecbee33b27f1a43cbb0ce8338af72b547ead44dba128f7</sum></package><package arch="x86_64" name="plymouth-utils" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-utils-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">15701d492a3d2e3e6b4c320a5d5bf634b3d80c4fb34197a7d2a4702f7beadd0f</sum></package><package arch="x86_64" name="plymouth-plugin-fade-throbber" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-plugin-fade-throbber-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">ddcca169f199f1ba8b01662fd59dca834ea4d2c7837f47fd968371fa3d625604</sum></package><package arch="x86_64" name="plymouth-plugin-space-flares" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-plugin-space-flares-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">f79aa0e451d213e30a97eff2d5553f016fb28d195e555f7911f5b4df9bdaf0a6</sum></package><package arch="x86_64" name="plymouth-plugin-throbgress" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-plugin-throbgress-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">474b61cd1f7f6f3672a7fe56913c65b5dfa8502ca54e760eb235ed0a7c513a50</sum></package><package arch="x86_64" name="plymouth" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">744be69b8ad7836541fabc367012ecba899cc52ecb8e9984ccd210a68aa605d8</sum></package><package arch="x86_64" name="plymouth-gdm-hooks" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-gdm-hooks-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">d703f27de3a7e1dea5eb1c9ff0a0b2416f6d687619d5d12f7b78871143aed0af</sum></package><package arch="noarch" name="plymouth-theme-solar" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-theme-solar-0.8.3-29.sl6.noarch.rpm</filename><sum type="sha256">d854e20abe915ba44bce1408187090a2f60199d1ef5cf1237df9d82ee9249018</sum></package><package arch="x86_64" name="plymouth-plugin-label" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-plugin-label-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">7c19c95c03776b7bd41c64a25b3522cd3c11d2867a5420a07b7e87871587c3b4</sum></package><package arch="noarch" name="plymouth-theme-script" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-theme-script-0.8.3-29.sl6.noarch.rpm</filename><sum type="sha256">238129117581837b4047e6fae9ffc34741ca0145db8526735830f64fcf3a2b61</sum></package><package arch="i686" name="plymouth-devel" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-devel-0.8.3-29.sl6.i686.rpm</filename><sum type="sha256">798450604f7698a9869abf2869b29b47dc91d24e50f29b61767e22bc8bb4b422</sum></package><package arch="x86_64" name="plymouth-graphics-libs" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-graphics-libs-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">c06a722e809fba0b0c628db6f84e87793726010450d20968d9a1ea59f2f05d4b</sum></package><package arch="x86_64" name="plymouth-plugin-script" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-plugin-script-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">6ec7988f086548ae105e5bd90ba91646423715e9e58b3d4d1a4a80f4c4eb5036</sum></package><package arch="noarch" name="plymouth-theme-spinfinity" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-theme-spinfinity-0.8.3-29.sl6.noarch.rpm</filename><sum type="sha256">93b4dc724ee71e888203e3118f0deab45f2d822cb745db30bac22122ad8df87c</sum></package><package arch="noarch" name="plymouth-system-theme" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-system-theme-0.8.3-29.sl6.noarch.rpm</filename><sum type="sha256">f3cd59bd54664b36ec92a0217d26623c7ccd842993f001c8e69daa7bdbb2978d</sum></package><package arch="i686" name="plymouth-graphics-libs" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-graphics-libs-0.8.3-29.sl6.i686.rpm</filename><sum type="sha256">3d9f961321fb1e06414f2463327a4eca0b3e7637498d437e33c50e971cf3b7c7</sum></package><package arch="x86_64" name="plymouth-devel" release="29.sl6" src="plymouth-0.8.3-29.sl6.src.rpm" version="0.8.3"><filename>plymouth-devel-0.8.3-29.sl6.x86_64.rpm</filename><sum type="sha256">6500cb281b68239cbabec52ae23bc1bc177b7810c724d3ce674868a5d893577b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0775" id="RHBA-2017:0775-1" title="Rhba-2017:0775-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0798-1</id><title>Lvm2 Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="lvm2-libs" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>lvm2-libs-2.02.143-12.el6.x86_64.rpm</filename><sum type="sha256">d4fb84ff3fb65ed1a9fb48af2b0e3d05edee6a25c9247485deccaa300c5120b7</sum></package><package arch="i686" name="lvm2-devel" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>lvm2-devel-2.02.143-12.el6.i686.rpm</filename><sum type="sha256">1721bdbb6cd733281fab1fe13cbe67846a4db3f3cb0d63ba7ee3efbecd42be38</sum></package><package arch="i686" name="device-mapper-libs" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-libs-1.02.117-12.el6.i686.rpm</filename><sum type="sha256">93b57aa74d31392916a07f908a1b2577fffcb5eb40116f5e438a82ce6b016f7f</sum></package><package arch="i686" name="device-mapper-event-libs" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-event-libs-1.02.117-12.el6.i686.rpm</filename><sum type="sha256">730968f38c4325f1cc2d22969275a6033d268dd841155b002c043ba0fa09b3db</sum></package><package arch="x86_64" name="lvm2" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>lvm2-2.02.143-12.el6.x86_64.rpm</filename><sum type="sha256">d3ef02dfd53ca984d2f5deea573c5421795b0124d6a26c80a66a7b4d467ce9a4</sum></package><package arch="i686" name="device-mapper-event-devel" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-event-devel-1.02.117-12.el6.i686.rpm</filename><sum type="sha256">0f41bddfc35c496fdca97189598195ee38300315211371d4c8ee806c64bec32b</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-event-devel-1.02.117-12.el6.x86_64.rpm</filename><sum type="sha256">4da859cd3f0a8ed1f2e55c47492e2a6f101d7ee4345ce826a311eff824febf4e</sum></package><package arch="x86_64" name="lvm2-devel" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>lvm2-devel-2.02.143-12.el6.x86_64.rpm</filename><sum type="sha256">b55de2c5cf0052b2f99b3218c8f1235c9c92cf1b1f60de3ce073331ba1f0aceb</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-event-libs-1.02.117-12.el6.x86_64.rpm</filename><sum type="sha256">919013537c0e65433b94f3decf8d2a454377edf817b3f6d8a69da44864905ed8</sum></package><package arch="i686" name="lvm2-libs" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>lvm2-libs-2.02.143-12.el6.i686.rpm</filename><sum type="sha256">78d40aeee2b883fb970bd23854a5b365d0ad5c50cf8cd648860c09eef4acf597</sum></package><package arch="x86_64" name="lvm2-cluster" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>lvm2-cluster-2.02.143-12.el6.x86_64.rpm</filename><sum type="sha256">7d8c7b54f04d422b5afcbbd62bea3012ded3d2e853772d46aaac0f8893122867</sum></package><package arch="x86_64" name="device-mapper-libs" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-libs-1.02.117-12.el6.x86_64.rpm</filename><sum type="sha256">c2d5e1e3c7d83a60a72b3a0eb565cfad5d549a1a949838978ea64f7151445b94</sum></package><package arch="x86_64" name="device-mapper-event" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-event-1.02.117-12.el6.x86_64.rpm</filename><sum type="sha256">d1a113f510c0d6409703112edb24a98d54a821204cc3f975089d2a1c6e64f026</sum></package><package arch="x86_64" name="device-mapper-devel" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-devel-1.02.117-12.el6.x86_64.rpm</filename><sum type="sha256">60cb8de6365c3837755ed822821638c8a738deb4b03302349c7dca9024e6d1fb</sum></package><package arch="i686" name="device-mapper-devel" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-devel-1.02.117-12.el6.i686.rpm</filename><sum type="sha256">beefab6ad730d20a7bda0dff837db7d3d1f0a0d4de811f737a85390cbfc26db8</sum></package><package arch="x86_64" name="cmirror" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="2.02.143"><filename>cmirror-2.02.143-12.el6.x86_64.rpm</filename><sum type="sha256">520512b23bfd8597c3d0b724207fd114d8d941a71b419f248fd90db09ce6b278</sum></package><package arch="x86_64" name="device-mapper" release="12.el6" src="lvm2-2.02.143-12.el6.src.rpm" version="1.02.117"><filename>device-mapper-1.02.117-12.el6.x86_64.rpm</filename><sum type="sha256">1d9db39d9180b771c07a33ae66b38be92742610a0bc3d1bac9f110b1741b8b55</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0798" id="RHBA-2017:0798-1" title="Rhba-2017:0798-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025322" id="1025322" title="Device Mapper Keeps Missing_0_0 Devices Listed Even After The Lv/Vg Containing Raid Is Removed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311765" id="1311765" title="Non Synced Primary Leg Raid1 Recovery Allocation Unable To Take Place" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328245" id="1328245" title="Lvchange --Zero  Fails To Update The State Of Active Thin Pools" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330933" id="1330933" title="Mirror Creation With Tag Fails During Zeroing When Activation Volume_List Has Corresponding Tag Restriction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337977" id="1337977" title="When /Var Is A Separate Filesystem, File-Based Locking Initialization Fails Due To Inability To Create /Var/Lock/Lvm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384418" id="1384418" title="Move Blkdeactivate Script And Blk-Availability.Service From Lvm2 To Device-Mapper Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397589" id="1397589" title="Raid 1/4/5/6 Device Failure Repair Regression (Unable To Extract Raid Image While Raid Array Is Not In-Sync)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0807-1</id><title>X.Org X11 Libraries Bug Fix Update</title><description>The libpciaccess library provides portable PCI access routines across multiple operating systems.

The Direct Rendering Manager runtime library (libdrm) provides a user- space interface library for direct rendering clients.

The xorg-x11-font-utils package provides X.Org X11 font utilities required for font installation, conversion and generation.

The xorg-x11-util-macros package provides X.Org X11 autotools macros required for building various packages that comprise the X Window System.

The xorg-x11-proto-devel package provides X.Org X11 protocol headers.</description><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libXrandr-devel" release="1.el6" src="libXrandr-1.5.1-1.el6.src.rpm" version="1.5.1"><filename>libXrandr-devel-1.5.1-1.el6.i686.rpm</filename><sum type="sha256">e1540e0fa118695364b4cc74097de8682f0064e7b15dacafc055a6ffb3e4d008</sum></package><package arch="noarch" name="xorg-x11-proto-devel" release="14.el6" src="xorg-x11-proto-devel-7.7-14.el6.src.rpm" version="7.7"><filename>xorg-x11-proto-devel-7.7-14.el6.noarch.rpm</filename><sum type="sha256">f4982fcdc51011d964f5e6154fc7c6bf9ca6eb1a901c52b2f34d37bc4fa5c357</sum></package><package arch="x86_64" name="libxcb-devel" release="4.el6" src="libxcb-1.12-4.el6.src.rpm" version="1.12"><filename>libxcb-devel-1.12-4.el6.x86_64.rpm</filename><sum type="sha256">a050a13bb79fbc070122d111268220c929648c4e295fcca5bf215bd07a0f43cc</sum></package><package arch="i686" name="libxcb" release="4.el6" src="libxcb-1.12-4.el6.src.rpm" version="1.12"><filename>libxcb-1.12-4.el6.i686.rpm</filename><sum type="sha256">0e27055dc89be4776c9b28440fd8812b24a0398c06142eeee3462c3d7e52b71e</sum></package><package arch="i686" name="libXtst-devel" release="1.el6" src="libXtst-1.2.3-1.el6.src.rpm" version="1.2.3"><filename>libXtst-devel-1.2.3-1.el6.i686.rpm</filename><sum type="sha256">5645f74f95374ab11e0097ff505f05014f56d22cba41105730370f0995e58442</sum></package><package arch="i686" name="libX11-devel" release="3.el6" src="libX11-1.6.4-3.el6.src.rpm" version="1.6.4"><filename>libX11-devel-1.6.4-3.el6.i686.rpm</filename><sum type="sha256">da0cc100ca39054fcb327e7575c400d1f90c059ef61e577e78e83df429ede433</sum></package><package arch="x86_64" name="libXfixes" release="1.el6" src="libXfixes-5.0.3-1.el6.src.rpm" version="5.0.3"><filename>libXfixes-5.0.3-1.el6.x86_64.rpm</filename><sum type="sha256">9971b778a55375ce583c0d17f5ddea9867ff6896d7469fbdf5dc705e7a502eb1</sum></package><package arch="x86_64" name="libXrender" release="1.el6" src="libXrender-0.9.10-1.el6.src.rpm" version="0.9.10"><filename>libXrender-0.9.10-1.el6.x86_64.rpm</filename><sum type="sha256">4f441041f1d6f93ea37f2e45926e92f9397941cfe2455f2db8f4053ea963f1e1</sum></package><package arch="i686" name="libX11" release="3.el6" src="libX11-1.6.4-3.el6.src.rpm" version="1.6.4"><filename>libX11-1.6.4-3.el6.i686.rpm</filename><sum type="sha256">7323a0f1a8a3b6c32d9adb3517cdddc916e3ef6e1f3e9bc3f8fe5b01d83e4b77</sum></package><package arch="x86_64" name="libX11" release="3.el6" src="libX11-1.6.4-3.el6.src.rpm" version="1.6.4"><filename>libX11-1.6.4-3.el6.x86_64.rpm</filename><sum type="sha256">0a5e26ffa2076960e066a526c1d9df7355a20c64c07744153ffce271db243317</sum></package><package arch="i686" name="libXv-devel" release="1.el6" src="libXv-1.0.11-1.el6.src.rpm" version="1.0.11"><filename>libXv-devel-1.0.11-1.el6.i686.rpm</filename><sum type="sha256">e95fbfa14fb734fbf440582a4a07c1c6de0cd1621dec8b285edc1af8e8219617</sum></package><package arch="i686" name="libXfixes-devel" release="1.el6" src="libXfixes-5.0.3-1.el6.src.rpm" version="5.0.3"><filename>libXfixes-devel-5.0.3-1.el6.i686.rpm</filename><sum type="sha256">077f398bfd8f98348243518d5a2f2582272089a2fe8faf3440a40038997a4833</sum></package><package arch="x86_64" name="libXi" release="1.el6" src="libXi-1.7.8-1.el6.src.rpm" version="1.7.8"><filename>libXi-1.7.8-1.el6.x86_64.rpm</filename><sum type="sha256">d5669bf5065f14aea0a8f1a637611f55f871916f9a9279eb5de55ba4cb2cc9b5</sum></package><package arch="x86_64" name="libXtst-devel" release="1.el6" src="libXtst-1.2.3-1.el6.src.rpm" version="1.2.3"><filename>libXtst-devel-1.2.3-1.el6.x86_64.rpm</filename><sum type="sha256">b2df1bc676db3f8d985f383073a8830ce3123424ae9f3563c92e2642226d8620</sum></package><package arch="x86_64" name="libXrandr-devel" release="1.el6" src="libXrandr-1.5.1-1.el6.src.rpm" version="1.5.1"><filename>libXrandr-devel-1.5.1-1.el6.x86_64.rpm</filename><sum type="sha256">efb6a83e82af6fc114598b0a2639df6e92f1ca241eec4ea65c15afdf82c1c3fa</sum></package><package arch="noarch" name="libxcb-doc" release="4.el6" src="libxcb-1.12-4.el6.src.rpm" version="1.12"><filename>libxcb-doc-1.12-4.el6.noarch.rpm</filename><sum type="sha256">d4f228f0ecf8c6cc63ffe0a95ab390c5892b1eb3bdfb321ca9bb7c5c60f651ad</sum></package><package arch="x86_64" name="libXvMC" release="1.el6" src="libXvMC-1.0.10-1.el6.src.rpm" version="1.0.10"><filename>libXvMC-1.0.10-1.el6.x86_64.rpm</filename><sum type="sha256">623af00bd9f134df52d74737a3c3e3cf679b51f87daf5991de01fc00c58402d2</sum></package><package arch="x86_64" name="libX11-devel" release="3.el6" src="libX11-1.6.4-3.el6.src.rpm" version="1.6.4"><filename>libX11-devel-1.6.4-3.el6.x86_64.rpm</filename><sum type="sha256">13621f32e1ae912f820cc4b774ae1853c43645c1241fbd45200970683a98d1b4</sum></package><package arch="noarch" name="xcb-proto" release="1.el6" src="xcb-proto-1.12-1.el6.src.rpm" version="1.12"><filename>xcb-proto-1.12-1.el6.noarch.rpm</filename><sum type="sha256">1dcfc4ec6f180a230736873837f5fa11f4dc91715264cba26f1813253dd496aa</sum></package><package arch="x86_64" name="libxcb" release="4.el6" src="libxcb-1.12-4.el6.src.rpm" version="1.12"><filename>libxcb-1.12-4.el6.x86_64.rpm</filename><sum type="sha256">f84fc6041aec31fd0683f0f04bae488b82f4e37af38780ce896fcd6deaaeaaf9</sum></package><package arch="noarch" name="libX11-common" release="3.el6" src="libX11-1.6.4-3.el6.src.rpm" version="1.6.4"><filename>libX11-common-1.6.4-3.el6.noarch.rpm</filename><sum type="sha256">e150e172456ecdfa04b94d1b51e87bf9734f157aba000ba3aea0b07265faf1b6</sum></package><package arch="x86_64" name="libXfixes-devel" release="1.el6" src="libXfixes-5.0.3-1.el6.src.rpm" version="5.0.3"><filename>libXfixes-devel-5.0.3-1.el6.x86_64.rpm</filename><sum type="sha256">a48c8aac41440a79a9c37c74e95f754dcb08b72c7a20a51d20fdae1e54112a56</sum></package><package arch="x86_64" name="libXrender-devel" release="1.el6" src="libXrender-0.9.10-1.el6.src.rpm" version="0.9.10"><filename>libXrender-devel-0.9.10-1.el6.x86_64.rpm</filename><sum type="sha256">f0f3f5178304e1be5b6edcd6e7fae8d5d069b95d31a69a0c19293aa40b4ddaae</sum></package><package arch="i686" name="libXi-devel" release="1.el6" src="libXi-1.7.8-1.el6.src.rpm" version="1.7.8"><filename>libXi-devel-1.7.8-1.el6.i686.rpm</filename><sum type="sha256">4662323d61500018ec5d818f0e06ddbb667fcfec6bdbc7df3b16ae63674ae5f3</sum></package><package arch="i686" name="libXvMC" release="1.el6" src="libXvMC-1.0.10-1.el6.src.rpm" version="1.0.10"><filename>libXvMC-1.0.10-1.el6.i686.rpm</filename><sum type="sha256">90449fb358b2dfa50d7385ea0e9b4e8cfc0246500034ac4f10b44e9ac8cd6b93</sum></package><package arch="x86_64" name="libXi-devel" release="1.el6" src="libXi-1.7.8-1.el6.src.rpm" version="1.7.8"><filename>libXi-devel-1.7.8-1.el6.x86_64.rpm</filename><sum type="sha256">3c479cb52c8dc6c6b93ee8add49ad9fbf5e5dc5d65949bd0b455dd87c4e1e7e6</sum></package><package arch="i686" name="libXfixes" release="1.el6" src="libXfixes-5.0.3-1.el6.src.rpm" version="5.0.3"><filename>libXfixes-5.0.3-1.el6.i686.rpm</filename><sum type="sha256">1dfddfac566a877e0216d0c141b413cf05d4b27ed772e5d06e9dbf53bb2f1006</sum></package><package arch="x86_64" name="libXtst" release="1.el6" src="libXtst-1.2.3-1.el6.src.rpm" version="1.2.3"><filename>libXtst-1.2.3-1.el6.x86_64.rpm</filename><sum type="sha256">f3348acd487f37dd2dc597ef2c79b553ecfe3517a8f6a829f9529b4effb50fb6</sum></package><package arch="i686" name="libxcb-devel" release="4.el6" src="libxcb-1.12-4.el6.src.rpm" version="1.12"><filename>libxcb-devel-1.12-4.el6.i686.rpm</filename><sum type="sha256">8ffd90bf1e11a21ac34b9a9bd426f7e2b2deca946dfd375ab0fc2a4d79fae8e6</sum></package><package arch="x86_64" name="libxcb-python" release="4.el6" src="libxcb-1.12-4.el6.src.rpm" version="1.12"><filename>libxcb-python-1.12-4.el6.x86_64.rpm</filename><sum type="sha256">80c6bd5a18850ab9bc02dc60439de8638a676c40569d037f6cdb4623ca1bd4ef</sum></package><package arch="i686" name="libXvMC-devel" release="1.el6" src="libXvMC-1.0.10-1.el6.src.rpm" version="1.0.10"><filename>libXvMC-devel-1.0.10-1.el6.i686.rpm</filename><sum type="sha256">8d0fe522b9e0b1bd527d4bdeed7ec48210d1d7a49942b8ef3579171c0f8a2ce9</sum></package><package arch="i686" name="libXrandr" release="1.el6" src="libXrandr-1.5.1-1.el6.src.rpm" version="1.5.1"><filename>libXrandr-1.5.1-1.el6.i686.rpm</filename><sum type="sha256">c13506bb3318f1e900ec69804f86cbfb543c061347dc092e2824540a91e44863</sum></package><package arch="x86_64" name="libXv" release="1.el6" src="libXv-1.0.11-1.el6.src.rpm" version="1.0.11"><filename>libXv-1.0.11-1.el6.x86_64.rpm</filename><sum type="sha256">8f7b2eb195e4d706ff1db19ef3988fbac146f04d9c2740b440b73c41c7355341</sum></package><package arch="i686" name="libXtst" release="1.el6" src="libXtst-1.2.3-1.el6.src.rpm" version="1.2.3"><filename>libXtst-1.2.3-1.el6.i686.rpm</filename><sum type="sha256">71d5d8f07dbd1d8f9708c6bf5841c746255c898be9f54d303c40e6caa724e2d5</sum></package><package arch="x86_64" name="libXv-devel" release="1.el6" src="libXv-1.0.11-1.el6.src.rpm" version="1.0.11"><filename>libXv-devel-1.0.11-1.el6.x86_64.rpm</filename><sum type="sha256">f2d68ba4f7a9fb5b751866ebc735ae37699d1b7b98d7b8ffc7183cdc870a3ea3</sum></package><package arch="i686" name="libXrender-devel" release="1.el6" src="libXrender-0.9.10-1.el6.src.rpm" version="0.9.10"><filename>libXrender-devel-0.9.10-1.el6.i686.rpm</filename><sum type="sha256">27c9f398a6550afdfffaf221977485bdcb7fecde5fd6122a44c080c83035db12</sum></package><package arch="x86_64" name="libXvMC-devel" release="1.el6" src="libXvMC-1.0.10-1.el6.src.rpm" version="1.0.10"><filename>libXvMC-devel-1.0.10-1.el6.x86_64.rpm</filename><sum type="sha256">f0adae961c3ca719609b69dc088c340f0deb266eac9a11b89f6f44d55c2ecb46</sum></package><package arch="i686" name="libXi" release="1.el6" src="libXi-1.7.8-1.el6.src.rpm" version="1.7.8"><filename>libXi-1.7.8-1.el6.i686.rpm</filename><sum type="sha256">19b2eb4d9eff88f1eac56bafbdbb8be9fb9db25adccd72b2171a88feeee11650</sum></package><package arch="i686" name="libXv" release="1.el6" src="libXv-1.0.11-1.el6.src.rpm" version="1.0.11"><filename>libXv-1.0.11-1.el6.i686.rpm</filename><sum type="sha256">4e241d4d9f3d3583c88155cf27a2e3c4b8bb0be3b99d5c38e8c0f92fc4385b26</sum></package><package arch="x86_64" name="libXrandr" release="1.el6" src="libXrandr-1.5.1-1.el6.src.rpm" version="1.5.1"><filename>libXrandr-1.5.1-1.el6.x86_64.rpm</filename><sum type="sha256">8d18a34a38b64ed530454af5d497c13eb29d59e68ff1b2d83e8e341325d4aff4</sum></package><package arch="i686" name="libXrender" release="1.el6" src="libXrender-0.9.10-1.el6.src.rpm" version="0.9.10"><filename>libXrender-0.9.10-1.el6.i686.rpm</filename><sum type="sha256">97162c4b07565ec4e168f868c1cccd813239b4d0fe5f0574eb2722070a499ebd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0807" id="RHBA-2017:0807-1" title="Rhba-2017:0807-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328578" id="1328578" title="Fix Request Length Calculation For Xrendercompositetext32. Causing Hang In Java Apps Utilizing Libxrender" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0812-1</id><title>New Packages: Python-Prettytable</title><description /><release>Scientific Linux Fermi</release><issued date="2017-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-prettytable" release="11.el6" src="python-prettytable-0.7.2-11.el6.src.rpm" version="0.7.2"><filename>python-prettytable-0.7.2-11.el6.noarch.rpm</filename><sum type="sha256">b0f94eab5125347f1765762bd9f4c10129cb6745968d4ff2bbc51162b2def377</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0812" id="RHBA-2017:0812-1" title="Rhba-2017:0812-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0839-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancement:

* Haiti began daylight saving time (DST) on March 12, 2017.</description><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2017b-1.el6.src.rpm" version="2017b"><filename>tzdata-java-2017b-1.el6.noarch.rpm</filename><sum type="sha256">fcabb622dd0627a7a9e21b60a0071e1dfc013e636757ff0520bb8f2a245bd980</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2017b-1.el6.src.rpm" version="2017b"><filename>tzdata-2017b-1.el6.noarch.rpm</filename><sum type="sha256">cce8e6fb65711f66a670c1045de4110a65bfc0f3d4b85442afe6bac36dedac8c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0839" id="RHBA-2017:0839-1" title="Rhba-2017:0839-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434144" id="1434144" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434145" id="1434145" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434427" id="1434427" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434433" id="1434433" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1434-1</id><title>Nfs-Ganesha Bug Fix Update</title><description>* An updated version of libntirpc (1.4.3-4) that contains changes to the transport independent RPC (TI-RPC) library for NFS-Ganesha is included in this package. Since NFS-Ganesha consumes those functions, it is now recompiled against libntirpc-1.4.3.4.</description><release>Scientific Linux Fermi</release><issued date="2018-10-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libntirpc-devel" release="4.el6" src="libntirpc-1.4.3-4.el6.src.rpm" version="1.4.3"><filename>libntirpc-devel-1.4.3-4.el6.x86_64.rpm</filename><sum type="sha256">f15706da9676aa2008cd74f028f768cc0063631d6f87f4885036d43c1c67971b</sum></package><package arch="i686" name="libntirpc" release="4.el6" src="libntirpc-1.4.3-4.el6.src.rpm" version="1.4.3"><filename>libntirpc-1.4.3-4.el6.i686.rpm</filename><sum type="sha256">aa739173de0c89da88042f870e535b085b38898fc0e87138cdd7f015fe626a91</sum></package><package arch="x86_64" name="nfs-ganesha" release="11.el6" src="nfs-ganesha-2.4.1-11.el6.src.rpm" version="2.4.1"><filename>nfs-ganesha-2.4.1-11.el6.x86_64.rpm</filename><sum type="sha256">a0b8ee4f4e85170551b472e0a3b10b181e95c567a0ccc07e348a9e4b2f8ff203</sum></package><package arch="i686" name="libntirpc-devel" release="4.el6" src="libntirpc-1.4.3-4.el6.src.rpm" version="1.4.3"><filename>libntirpc-devel-1.4.3-4.el6.i686.rpm</filename><sum type="sha256">61b1482b67b4bc65c3ec6eedac7610335172b4369167a3636d4f120fc3b1e089</sum></package><package arch="x86_64" name="nfs-ganesha-gluster" release="11.el6" src="nfs-ganesha-2.4.1-11.el6.src.rpm" version="2.4.1"><filename>nfs-ganesha-gluster-2.4.1-11.el6.x86_64.rpm</filename><sum type="sha256">8d1d58815c14b5b22261855e392bc40e0ba5fc8b70a2beef2185478294c8090b</sum></package><package arch="x86_64" name="libntirpc" release="4.el6" src="libntirpc-1.4.3-4.el6.src.rpm" version="1.4.3"><filename>libntirpc-1.4.3-4.el6.x86_64.rpm</filename><sum type="sha256">267398c6f4f82f1e4dc12e499972508a9811c66798cfa56f2302ad19599d6feb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1434" id="RHBA-2017:1434-1" title="Rhba-2017:1434-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456342" id="1456342" title="Nfs-Ganesha: Rebuild With Latest Libntirpc Available [Rhel6]" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1435-1</id><title>Rpcbind Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, the rpcbind utility terminated unexpectedly on start. A patch has been applied, and rpcbind now starts as expected.</description><release>Scientific Linux Fermi</release><issued date="2017-06-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="rpcbind" release="13.el6_9.1" src="rpcbind-0.2.0-13.el6_9.1.src.rpm" version="0.2.0"><filename>rpcbind-0.2.0-13.el6_9.1.x86_64.rpm</filename><sum type="sha256">9a8fcfa50f5b9d9bef59d1af2266af4952ad8956f644b56068f07362144e06e6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1435" id="RHBA-2017:1435-1" title="Rhba-2017:1435-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1458240" id="1458240" title="Rpcbind Crash On Start [Rhel-6.9.Z]" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0176-1</id><title>Selinux-Policy Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2018-02-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-targeted" release="307.el6_9.3" src="selinux-policy-3.7.19-307.el6_9.3.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-307.el6_9.3.noarch.rpm</filename><sum type="sha256">95423e3b58cc925b5a358890bedd91f31454e27b968fabca5fd8f091373254e2</sum></package><package arch="noarch" name="selinux-policy-doc" release="307.el6_9.3" src="selinux-policy-3.7.19-307.el6_9.3.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-307.el6_9.3.noarch.rpm</filename><sum type="sha256">ba63efd959353ba6c550f8dd623aee421da76cd9b93e18df71bca5760d199e12</sum></package><package arch="noarch" name="selinux-policy" release="307.el6_9.3" src="selinux-policy-3.7.19-307.el6_9.3.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-307.el6_9.3.noarch.rpm</filename><sum type="sha256">cdbf6e7669e5d5f1a21068eb68125c559ff0b471ba26d51256027df7950db09b</sum></package><package arch="noarch" name="selinux-policy-minimum" release="307.el6_9.3" src="selinux-policy-3.7.19-307.el6_9.3.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-307.el6_9.3.noarch.rpm</filename><sum type="sha256">0a01da2f03e640243879ffe83610ca1da8bb70bda284221db154eb9de7754c1b</sum></package><package arch="noarch" name="selinux-policy-mls" release="307.el6_9.3" src="selinux-policy-3.7.19-307.el6_9.3.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-307.el6_9.3.noarch.rpm</filename><sum type="sha256">91ad7b260c80b7cef0ba31e3922f18eb53e022b02fa8bbdaa6c5a8ff1f0e3948</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0176" id="RHBA-2018:0176-1" title="Rhba-2018:0176-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0597-1</id><title>Tzdata Enhancement Update</title><description>* The Antarctica/Casey time zone has been changed from UTC+11 to UTC+8.</description><release>Scientific Linux Fermi</release><issued date="2018-04-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2018d-1.el6.src.rpm" version="2018d"><filename>tzdata-2018d-1.el6.noarch.rpm</filename><sum type="sha256">b0311e8b6f5dc1b3944f1de7961e85bd237abc109eebda3fa51c40dc8e33d4d7</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2018d-1.el6.src.rpm" version="2018d"><filename>tzdata-java-2018d-1.el6.noarch.rpm</filename><sum type="sha256">155eef77fc54cb05c666c1b5a742488d2aab7adbe2c7d486c4d61e8f5d6ca01b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0597" id="RHBA-2018:0597-1" title="Rhba-2018:0597-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558700" id="1558700" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559037" id="1559037" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559039" id="1559039" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1339-1</id><title>Tzdata Enhancement Update</title><description>* In this update, the upstream project now defaults to using the "vanguard" data implementation which includes negative DST offsets. However, we are continuing to provide the "rearguard" format for data which does not use negative DST offsets to provide better compatibility with existing tools.  We intend to transition to the "vanguard" data implementation in the future.</description><release>Scientific Linux Fermi</release><issued date="2018-05-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="3.el6" src="tzdata-2018e-3.el6.src.rpm" version="2018e"><filename>tzdata-java-2018e-3.el6.noarch.rpm</filename><sum type="sha256">40fb5cb634cedda909a94696ce1f83da58b67dafc599b8ec342db293b9871368</sum></package><package arch="noarch" name="tzdata" release="3.el6" src="tzdata-2018e-3.el6.src.rpm" version="2018e"><filename>tzdata-2018e-3.el6.noarch.rpm</filename><sum type="sha256">f7e03d38a6de62a054de45a2db10340f06a9a4e30d9d1c80314fbe6cfc0bb050</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1339" id="RHBA-2018:1339-1" title="Rhba-2018:1339-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573295" id="1573295" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574925" id="1574925" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574928" id="1574928" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1857-1</id><title>Copy-Jdk-Configs Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="copy-jdk-configs" release="9.el6" src="copy-jdk-configs-3.3-9.el6.src.rpm" version="3.3"><filename>copy-jdk-configs-3.3-9.el6.noarch.rpm</filename><sum type="sha256">3265471cef84f21333bce8cf101268b52cc7f6fa5fdc136ecbf9de61dd9d02e9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1857" id="RHBA-2018:1857-1" title="Rhba-2018:1857-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1449315" id="1449315" title="Please Update C-J-C To 3.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503666" id="1503666" title="New Policy Files Are Not Copied By C-J-C Older Then 3.3" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1923-1</id><title>Clufter Bug Fix And Enhancement Update</title><description /><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="clufter-common" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>clufter-common-0.77.1-1.el6.noarch.rpm</filename><sum type="sha256">389e5b2cce8fb7ab6ba9b39c28b18bd0644221daf28822e7d7e088644eb22558</sum></package><package arch="noarch" name="clufter-lib-pcs" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>clufter-lib-pcs-0.77.1-1.el6.noarch.rpm</filename><sum type="sha256">4a497cae3fab4d2d531668a02d125f74c4e1a983b45980bc46308606deda709c</sum></package><package arch="noarch" name="python-clufter" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>python-clufter-0.77.1-1.el6.noarch.rpm</filename><sum type="sha256">3fcabeebdbf603bb3eafcba40097095d9d7a5ea062e4835ff5bd2b6255724ce3</sum></package><package arch="x86_64" name="clufter-bin" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>clufter-bin-0.77.1-1.el6.x86_64.rpm</filename><sum type="sha256">fd243027eee983fb2f0162e70a89bcbd5abec6eb141373ec79f3109f7c5e63c9</sum></package><package arch="noarch" name="clufter-lib-general" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>clufter-lib-general-0.77.1-1.el6.noarch.rpm</filename><sum type="sha256">5857472ac34d33a8e087f4da84d34ed4d4d2607a59075bb0df81446e66511cf3</sum></package><package arch="noarch" name="clufter-cli" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>clufter-cli-0.77.1-1.el6.noarch.rpm</filename><sum type="sha256">2250b16cc8a423dd2304b30d5fa3c8deac5917ed6557626bc5506af9880f31ad</sum></package><package arch="noarch" name="clufter-lib-ccs" release="1.el6" src="clufter-0.77.1-1.el6.src.rpm" version="0.77.1"><filename>clufter-lib-ccs-0.77.1-1.el6.noarch.rpm</filename><sum type="sha256">e633dbc982b69031eab0027926cf39eea7e53abb357441b0f881625fa0529399</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1923" id="RHBA-2018:1923-1" title="Rhba-2018:1923-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3013-1</id><title>Tzdata Enhancement Update</title><description>* The Pacific/Fiji time zone will end Daylight Saving Time (DST) on January 13, 2019 rather than January 20, 2019.

* Most regions in Chile will end Daylight Saving Time (DST) on the first Sunday in April, 2019.</description><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2018f-1.el6.src.rpm" version="2018f"><filename>tzdata-java-2018f-1.el6.noarch.rpm</filename><sum type="sha256">92b0d5fce4699b908a80d999f188607d82d1e284ec4e219ca1a1e840b31d4c00</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2018f-1.el6.src.rpm" version="2018f"><filename>tzdata-2018f-1.el6.noarch.rpm</filename><sum type="sha256">f0da448a10ba632c51d202b7889cd86ee06d2fe891e30282e2b31d44c2b4fd7a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3013" id="RHBA-2018:3013-1" title="Rhba-2018:3013-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639921" id="1639921" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639922" id="1639922" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640902" id="1640902" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3454-1</id><title>Tzdata Enhancement Update</title><description /><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2018g-1.el6.src.rpm" version="2018g"><filename>tzdata-java-2018g-1.el6.noarch.rpm</filename><sum type="sha256">2fb8cb6851408affdaafa8881f9fdb109c22d10226edaa8bdae769523c025bae</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2018g-1.el6.src.rpm" version="2018g"><filename>tzdata-2018g-1.el6.noarch.rpm</filename><sum type="sha256">dd6914d95ecc991db1d1a76a6d8c6d831e1c6ca386ccc5189abe9e2399a5660a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3454" id="RHBA-2018:3454-1" title="Rhba-2018:3454-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643788" id="1643788" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643789" id="1643789" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644183" id="1644183" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:0037-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2018i, which addresses recent time zone changes. Notably:

* Africa/S&#227;o Tom&#233; and Pr&#237;ncipe changed from UTC+01 to UTC+00 on January 01, 2019. * Asia/Qyzylorda, Kazakhstan changed from UTC+06 to UTC+05 on December 21, 2018. * A new time zone, Asia/Qostanay, has been created because Qostanay, Kazakhstan did not transition with the Asia/Qyzylorda change. * America/Metlakatla, Alaska will observe Pacific Standard Time (PST) for this winter only. * Updates to Asia/Casablanca have been implemented based on a prediction that Morocco will continue to adjust clocks around Ramadan. * Changes to Asia/Tehran have been made based on predictions for Iran from 2038 through 2090.</description><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2018i-1.el6.src.rpm" version="2018i"><filename>tzdata-2018i-1.el6.noarch.rpm</filename><sum type="sha256">60e2001038dfb303134d64a9068f1544d239b0ddca9c382a09982fa4cbdf3775</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2018i-1.el6.src.rpm" version="2018i"><filename>tzdata-java-2018i-1.el6.noarch.rpm</filename><sum type="sha256">5a741f8213fd65ad537f949d2006bf2878358e743726a8e5844316a62c35b0a9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:0037" id="RHBA-2019:0037-1" title="Rhba-2019:0037-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:0689-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2019a, which addresses recent time zone changes. Notably:

* The Asia/Hebron and Asia/Gaza zones will start DST on 2019-03-30, rather than 2019-03-23 as previously predicted. * Metlakatla rejoined Alaska time on 2019-01-20, ending its observances of Pacific standard time.</description><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2019a-1.el6.src.rpm" version="2019a"><filename>tzdata-java-2019a-1.el6.noarch.rpm</filename><sum type="sha256">09657e7344eb2c6f84d4f463481576d59b7a5dc54c76f86057c8edbb3615ccd5</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2019a-1.el6.src.rpm" version="2019a"><filename>tzdata-2019a-1.el6.noarch.rpm</filename><sum type="sha256">988fc743347abada03a088728a3e751d7e0577ef016442fdb16bda5480454228</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:0689" id="RHBA-2019:0689-1" title="Rhba-2019:0689-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:1227-1</id><title>Spice-Vdagent Bug Fix Update</title><description>This update fixes the following bug:

* The spice-vdagent is not starting and spice is opening thousands of unix sockets.</description><release>Scientific Linux Fermi</release><issued date="2020-05-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-vdagent" release="13.el6_10.1" src="spice-vdagent-0.14.0-13.el6_10.1.src.rpm" version="0.14.0"><filename>spice-vdagent-0.14.0-13.el6_10.1.x86_64.rpm</filename><sum type="sha256">d4e0eca00617843037c8723de659f94c0a6243e9c14013150e504cbfebfcacaf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:1227" id="RHBA-2019:1227-1" title="Rhba-2019:1227-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687628" id="1687628" title="[Rhel6] The Spice-Vdagent Is Not Starting And Spice Is Opening Thousands Of Unix Sockets." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:1651-1</id><title>Kernel Bug Fix Update</title><description>* dentry with DCACHE_SHRINKING set but no task shrinking dcache</description><release>Scientific Linux Fermi</release><issued date="2019-07-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-headers" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">779d46ae0df85342bb368f7a2c121fb85791d03e2d38e6f22c97df7016e2bd76</sum></package><package arch="noarch" name="kernel-firmware" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.17.1.el6.noarch.rpm</filename><sum type="sha256">d6eb649785de43e9eaabcc5b18bd4c9405cfd2ff40524467703ba5d63eb615f9</sum></package><package arch="x86_64" name="kernel" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">fe3fc89db662155457a5ce9bc11ac57a874bf6f4423d12ec386a604a3ba01725</sum></package><package arch="i686" name="kernel-debug-devel" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.17.1.el6.i686.rpm</filename><sum type="sha256">6d04b7de6f99a043663bf889f4f4a1f108bd72960e6ae60a25eb40a8ce5021a3</sum></package><package arch="noarch" name="kernel-doc" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.17.1.el6.noarch.rpm</filename><sum type="sha256">d93f41a04c12482def9428979c1111bbd32d3366de833f6af0269ee8e77d1f6b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">4eb851b6f5ae742860efff1e8fb2c2b61cd062251d929ad8c17a829a20f5c975</sum></package><package arch="x86_64" name="perf" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">5b265e92aba4ec9d70ce8a25e47045b7609e6cf8a01af7e9279d36a5673bf831</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.17.1.el6.noarch.rpm</filename><sum type="sha256">6c25ef94a9ebc45d194d41b66918917019c5f3d25e72eae9d72243f4ff902a38</sum></package><package arch="x86_64" name="kernel-debug" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">7f59f6e0bbaee275a463847d773b7e560c102e35299d18019de513d84c237849</sum></package><package arch="x86_64" name="kernel-devel" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">01c5df3b945b468d025615c432794faa9d432006bcba62fa0e3dbe0c66166bcd</sum></package><package arch="x86_64" name="python-perf" release="754.17.1.el6" src="kernel-2.6.32-754.17.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.17.1.el6.x86_64.rpm</filename><sum type="sha256">1919f274b8cf4b298dd049c61cb68f84eceff2011c04e76305d145aec2e9c72f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:1651" id="RHBA-2019:1651-1" title="Rhba-2019:1651-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661666" id="1661666" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672269" id="1672269" title="Bug Access Denied" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:1703-1</id><title>Tzdata Enhancement Update</title><description>* The 2019 spring DST transition for Palestine occurred on March 29, not March 30.</description><release>Scientific Linux Fermi</release><issued date="2019-07-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2019b-2.el6.src.rpm" version="2019b"><filename>tzdata-java-2019b-2.el6.noarch.rpm</filename><sum type="sha256">7008f8ae57c82cb201946f2fc12167249b4373a78bd8ffe548f9d63fb1099037</sum></package><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2019b-2.el6.src.rpm" version="2019b"><filename>tzdata-2019b-2.el6.noarch.rpm</filename><sum type="sha256">6f36b7d2cf5955cf97d56e2a64c64941cf74133b2f4425a9c97afdc037794563</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:1703" id="RHBA-2019:1703-1" title="Rhba-2019:1703-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726276" id="1726276" title="1726276 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726278" id="1726278" title="1726278 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726349" id="1726349" title="1726349 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil [Rhel-8.0.0.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726619" id="1726619" title="1726619 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil [Rhel-7.6.Z]" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2871-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2019c, which addresses recent time zone changes. Notably:

* Fiji will observe the daylight saving time (DST) from November 10, 2019 to January 12, 2020.

* Norfolk Island will start to observe Australian-style DST on November 06, 2019.</description><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2019c-1.el6.src.rpm" version="2019c"><filename>tzdata-2019c-1.el6.noarch.rpm</filename><sum type="sha256">a39f2001bf8cfc0be237ccf50a9ace47f164e735c182ab8b5d999c2e637764ea</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2019c-1.el6.src.rpm" version="2019c"><filename>tzdata-java-2019c-1.el6.noarch.rpm</filename><sum type="sha256">6674b8c0d3301c748fe7b73ebfe17a14974cde36deb4d81ed6fa2742f85b868a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2871" id="RHBA-2019:2871-1" title="Rhba-2019:2871-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1982-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020a, which addresses recent time zone changes. Notably:

In Morocco (the Africa/Casablanca time zone), daylight saving time starts on 2020-05-31 instead of on 2020-05-24.     Canada's Yukon region (the America/Whitehorse and America/Dawson time zones) changed to a year-round UTC-07 time on 2020-03-08.     The America/Godthab time zone has been renamed to America/Nuuk.</description><release>Scientific Linux Fermi</release><issued date="2020-05-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2020a-1.el6.src.rpm" version="2020a"><filename>tzdata-java-2020a-1.el6.noarch.rpm</filename><sum type="sha256">acc38f1677f866ea1fd1f115ecb9a4ed831d7a5b7ccda6b6effaf7a314659c4d</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2020a-1.el6.src.rpm" version="2020a"><filename>tzdata-2020a-1.el6.noarch.rpm</filename><sum type="sha256">8b0c71c5689666a060de7b991d6d8c7ac2f5a903d8b42af4da0bef2812bcfe63</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1982" id="RHBA-2020:1982-1" title="Rhba-2020:1982-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4282-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020b, which addresses recent time zone changes. Notably:

* Yukon timezones represented by America/Whitehorse and America/Dawson will change time zone rules from -08/-07 to permanent -07 on November 01, 2020, not on August 03, 2020, contrary to what was in the version 2020a.

* The most recent winter(+08)/summer(+11) transition for Casey Station, Antarctica was on April 04, 2020 at 00:01.

* Obsolete pacificnew, systemv, and yearistype.sh files have been removed from the distribution.</description><release>Scientific Linux Fermi</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2020b-2.el6.src.rpm" version="2020b"><filename>tzdata-java-2020b-2.el6.noarch.rpm</filename><sum type="sha256">3c911a314eea6f7ab5633bbb68684d444288a2b595d69b2ff0bae0f9bf45fd34</sum></package><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2020b-2.el6.src.rpm" version="2020b"><filename>tzdata-2020b-2.el6.noarch.rpm</filename><sum type="sha256">45de9b5c05f500bb9f37ce3cf655437c91f107403bc843fe9ee441a5d2140d7e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4282" id="RHBA-2020:4282-1" title="Rhba-2020:4282-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4329-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020d, which addresses recent time zone changes. Notably:

* Fiji starts the daylight saving time (DST) later than usual on December 20, 2020, rather than the predicted November O8, 2020.

* Palestine will end summer time on October 24, 2020 rather than the predicted October 31, 2020.</description><release>Scientific Linux Fermi</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2020d-1.el6.src.rpm" version="2020d"><filename>tzdata-2020d-1.el6.noarch.rpm</filename><sum type="sha256">32d9a91f4702285b3295efd420d69823bbeeefa05251da72f3fbae6a61771a7c</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2020d-1.el6.src.rpm" version="2020d"><filename>tzdata-java-2020d-1.el6.noarch.rpm</filename><sum type="sha256">4d2f476832375f815cf1b39ef3c4e03c526f6b188af7f71d12a3d7e94f222e3c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4329" id="RHBA-2020:4329-1" title="Rhba-2020:4329-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="newpackage" version="2.0"><id>SLEA-2011:1714-2</id><title>New Packages: Mesa-Libglw </title><description>The mesa-libGLw packages provide an Xt/Motif OpenGL Drawing Area Widget.

This enhancement update adds the esa-libGLw package to Scientific Linux 6.</description><release>Scientific Linux Fermi</release><issued date="2012-05-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mesa-libGLw-devel" release="10.el6" src="mesa-libGLw-6.5.1-10.el6.src.rpm" version="6.5.1"><filename>mesa-libGLw-devel-6.5.1-10.el6.x86_64.rpm</filename><sum type="sha256">2ae5e9775e3152f9525dd040d6d15f1f8da4a59347d304d3fff99e31cbc91330</sum></package><package arch="i686" name="mesa-libGLw" release="10.el6" src="mesa-libGLw-6.5.1-10.el6.src.rpm" version="6.5.1"><filename>mesa-libGLw-6.5.1-10.el6.i686.rpm</filename><sum type="sha256">cff529d393532e2029c0d5a839f383ece3956473aa236c341e46334ab8e4d4fd</sum></package><package arch="i686" name="mesa-libGLw-devel" release="10.el6" src="mesa-libGLw-6.5.1-10.el6.src.rpm" version="6.5.1"><filename>mesa-libGLw-devel-6.5.1-10.el6.i686.rpm</filename><sum type="sha256">36fb7c659d930f395d296640a1cbe503ea20ec7da8e15d0e424e39b2be5042c8</sum></package><package arch="x86_64" name="mesa-libGLw" release="10.el6" src="mesa-libGLw-6.5.1-10.el6.src.rpm" version="6.5.1"><filename>mesa-libGLw-6.5.1-10.el6.x86_64.rpm</filename><sum type="sha256">d9b2fdaa3472262c7767a5552400a6e074fefdeff6140bfe5c2924339a2b4173</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=729243" id="729243" title="Mesa-Libglw (Libglw.So) Is Available For Rhel5, But Same Is Not Available For Rhel6" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2011-1714.html" id="RHEA-2011:1714-2" title="Rhea-2011:1714-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2012:1464-1</id><title>Openstack 2012.2 Folsom Preview</title><description>The openstack-nova, openstack-glance, openstack-keystone, openstack-quantum, openstack-utils and python-django-horizon packages have been upgraded to upstream version 2012.2 (Folsom) which provide a number of bug fixes and enhancements over the previous version.

The openstack-swift packages have been upgraded to upstream version 1.7.4 which provide a number of bug fixes and enhancements over the previous version.

The novnc packages have been upgraded to upstream version 0.4 which provide a number of bug fixes and enhancements over the previous version.

New openstack-cinder, python-cinderclient, python-glanceclient and python- swiftclient packages are now available for Red Hat OpenStack Folsom Preview.

After installing the updated packages, the Nova running services will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pyxattr" release="1.el6" src="pyxattr-0.5.0-1.el6.src.rpm" version="0.5.0"><filename>pyxattr-0.5.0-1.el6.x86_64.rpm</filename><sum type="sha256">c68cf69abf349d260daa87f83ceae80d21013a2be25f046415ea1a23e8a2fc48</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2012:1464" id="RHEA-2012:1464-1" title="Rhea-2012:1464-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2012:1473-1</id><title>Gstreamer-Plugins-Base</title><description>The gstreamer-plugins-base packages provide a collection of base plug-ins for the GStreamer streaming media framework.

This update adds the following enhancement:

* This update adds color-matrix support for color conversions to the ffmpegcolorspace plugin.</description><release>Scientific Linux Fermi</release><issued date="2012-11-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gstreamer-plugins-base-devel" release="2.el6" src="gstreamer-plugins-base-0.10.29-2.el6.src.rpm" version="0.10.29"><filename>gstreamer-plugins-base-devel-0.10.29-2.el6.i686.rpm</filename><sum type="sha256">02e4972eb72dde047252306a293636a315df4e34d8865aa1a4928464d958aca8</sum></package><package arch="x86_64" name="gstreamer-plugins-base" release="2.el6" src="gstreamer-plugins-base-0.10.29-2.el6.src.rpm" version="0.10.29"><filename>gstreamer-plugins-base-0.10.29-2.el6.x86_64.rpm</filename><sum type="sha256">3a027277c36abba2c2c530b2b6b1a3b30e7d0ae2e51dd717c0d8e5d8a43dc29a</sum></package><package arch="i686" name="gstreamer-plugins-base" release="2.el6" src="gstreamer-plugins-base-0.10.29-2.el6.src.rpm" version="0.10.29"><filename>gstreamer-plugins-base-0.10.29-2.el6.i686.rpm</filename><sum type="sha256">e3705f2fd103691627e2a3d03955c994cea6af89f98bd83fe7aa1db157055ba4</sum></package><package arch="x86_64" name="gstreamer-plugins-base-devel" release="2.el6" src="gstreamer-plugins-base-0.10.29-2.el6.src.rpm" version="0.10.29"><filename>gstreamer-plugins-base-devel-0.10.29-2.el6.x86_64.rpm</filename><sum type="sha256">a3959b40ef2bcf24d7f484f0c1440a56303cddd56335f7e9ae7cabf98dec7856</sum></package><package arch="noarch" name="gstreamer-plugins-base-devel-docs" release="2.el6" src="gstreamer-plugins-base-0.10.29-2.el6.src.rpm" version="0.10.29"><filename>gstreamer-plugins-base-devel-docs-0.10.29-2.el6.noarch.rpm</filename><sum type="sha256">d8ee7484a49190928c06e61fa0decba24c5349ea174ea042fa0283191a8769e2</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=755777" id="755777" title="Submit Patch Upstream And In Red Hat For Adding Color-Matrix For Color Conversions To Ffmpegcolorspace Gstreamer Plugin" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2012-1473.html" id="RHEA-2012:1473-1" title="Rhea-2012:1473-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2013:0301-1</id><title>Xorg-X11 Drivers</title><description>This update provides new drivers compatible with the new Xorg driver ABI.</description><release>Scientific Linux Fermi</release><issued date="2013-03-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-drivers" release="13.4.el6" src="xorg-x11-drivers-7.3-13.4.el6.src.rpm" version="7.3"><filename>xorg-x11-drivers-7.3-13.4.el6.x86_64.rpm</filename><sum type="sha256">dfa565efc745a9d04d2da496d325b4574e4c34d4883155a1ad982cc867c34a0a</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=795685" id="795685" title="Disable X Acceleration By Default For Kvm Guests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=795686" id="795686" title="Disable Shadowfb By Default For Virtual Guests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=889124" id="889124" title="Trident Module Failed To Load - Undefined Symbol: Trident_Sync" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2013-0301.html" id="RHEA-2013:0301-1" title="Rhea-2013:0301-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2013:0535-1</id><title>New Package: Cloud-Init</title><description /><release>Scientific Linux Fermi</release><issued date="2015-08-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-argparse" release="2.1.el6" src="python-argparse-1.2.1-2.1.el6.src.rpm" version="1.2.1"><filename>python-argparse-1.2.1-2.1.el6.noarch.rpm</filename><sum type="sha256">2923bedee7fc63a3ef0a88bbd32b20cbe36c002995c8e65f69fba9b4456e4e32</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2013:0535" id="RHEA-2013:0535-1" title="Rhea-2013:0535-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=838659" id="838659" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2013:1867-1</id><title>Tzdata</title><description>This update adds the following enhancement:

* The Jordanian government has reversed its decision to observe daylight saving time (DST) all year and in the year 2014, Jordan is going to resume to the transition schedule from the years 2006 - 2011. This year, Jordan will switch back to Arabia Standard Time (AST) at 00:00 on December the 20th.</description><release>Scientific Linux Fermi</release><issued date="2013-12-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2013i-1.el6.src.rpm" version="2013i"><filename>tzdata-2013i-1.el6.noarch.rpm</filename><sum type="sha256">8d55bb056778b7a83b08c9cf4d09f199f4bf1093dd51c89b57e1e527715858a1</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2013i-1.el6.src.rpm" version="2013i"><filename>tzdata-java-2013i-1.el6.noarch.rpm</filename><sum type="sha256">2a9f6269252007b92189e67bdd38a707e64d9971d53cef86d5904da0df8e1ed0</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1043502" id="1043502" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1043508" id="1043508" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1043511" id="1043511" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1043512" id="1043512" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2013-1867.html" id="RHEA-2013:1867-1" title="Rhea-2013:1867-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:0338-1</id><title>Tzdata</title><description>This update adds the following enhancement:

* Crimea is switching to the Moscow time zone on March 30, 2014 at 2 a.m. local time. The respective tzdata rules have been updated to reflect this change.</description><release>Scientific Linux Fermi</release><issued date="2014-04-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2014b-1.el6.src.rpm" version="2014b"><filename>tzdata-2014b-1.el6.noarch.rpm</filename><sum type="sha256">62c967a22c99218e9d2a1f6ed134d34e31545e48ccfaf4ef3bfbd9696b488780</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2014b-1.el6.src.rpm" version="2014b"><filename>tzdata-java-2014b-1.el6.noarch.rpm</filename><sum type="sha256">a5f17cd6dbfbb30019ba96d9e5ecc3e4f09b4fa845cbd06c02042822b56c0da4</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1080526" id="1080526" title="Tzdata: Crimea Will Switch To Moscow Time On 2014-03-30" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1080527" id="1080527" title="Tzdata: Crimea Will Switch To Moscow Time On 2014-03-30" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1080528" id="1080528" title="Tzdata: Crimea Will Switch To Moscow Time On 2014-03-30" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-0338.html" id="RHEA-2014:0338-1" title="Rhea-2014:0338-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:1105-1</id><title>Libvpx</title><description>The libvpx packages have been upgraded to upstream version 1.3.0, which provides new functions for Mozilla Firefox 31 on Scientific Linux 6, as well as a number of other enhancements over the previous version.

After installing the update, all applications using libvpx must be restarted for the changes to take effect.</description><release>Scientific Linux Fermi</release><issued date="2014-09-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libvpx" release="5.el6_5" src="libvpx-1.3.0-5.el6_5.src.rpm" version="1.3.0"><filename>libvpx-1.3.0-5.el6_5.i686.rpm</filename><sum type="sha256">c9b19db5d18f5a5c3acae1fdb5b1f45739be4a2afd903e3ceb2befbb4f311f8a</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-extras" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.x86_64.rpm</filename><sum type="sha256">e73d59f0da2283086e01db36e50d84a576c77da4278a50759c1682e07c915244</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel-docs" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-devel-docs-0.10.19-3.el6_5.x86_64.rpm</filename><sum type="sha256">f0731322b0194014ed6660bbae781979f503c12f4dbd6799e016f7c571c34f64</sum></package><package arch="i686" name="libvpx-devel" release="5.el6_5" src="libvpx-1.3.0-5.el6_5.src.rpm" version="1.3.0"><filename>libvpx-devel-1.3.0-5.el6_5.i686.rpm</filename><sum type="sha256">bb07f70f65fa12ab35ef2a25d2583e86a69230d862c686aa6ec8515c04985eb3</sum></package><package arch="x86_64" name="libvpx-devel" release="5.el6_5" src="libvpx-1.3.0-5.el6_5.src.rpm" version="1.3.0"><filename>libvpx-devel-1.3.0-5.el6_5.x86_64.rpm</filename><sum type="sha256">6511b5d7901763dcab20ae96b64f7efaab7b2feecc1552848f185f2e593bcbb2</sum></package><package arch="i686" name="gstreamer-plugins-bad-free" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-0.10.19-3.el6_5.i686.rpm</filename><sum type="sha256">6ab41fd5ec163988745112d08befdc6ce92b499673002be5d191f9da283efcdb</sum></package><package arch="x86_64" name="libvpx-utils" release="5.el6_5" src="libvpx-1.3.0-5.el6_5.src.rpm" version="1.3.0"><filename>libvpx-utils-1.3.0-5.el6_5.x86_64.rpm</filename><sum type="sha256">81e0bf757bd5b0a644fa0a0064f61ec4ead10fc01372fe81abdcdb0f963c799d</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-extras" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-extras-0.10.19-3.el6_5.i686.rpm</filename><sum type="sha256">3d4e2007487606676f678ea967761d479287805bdcfad8e12068a8a896684d5b</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-0.10.19-3.el6_5.x86_64.rpm</filename><sum type="sha256">a33aeea82aed6ecd46403af53f2abaf766c394bb254c1e8cf9a41e69d3ceba6b</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm</filename><sum type="sha256">3e8d39c79dc647e558ecf3161d733c587f496df7c47711ab98a2064c354ceac6</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-devel" release="3.el6_5" src="gstreamer-plugins-bad-free-0.10.19-3.el6_5.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.i686.rpm</filename><sum type="sha256">dc670fbd0659c2fccb8e1198657e86a50499451fee547ee585bab3fbec8ab803</sum></package><package arch="x86_64" name="libvpx" release="5.el6_5" src="libvpx-1.3.0-5.el6_5.src.rpm" version="1.3.0"><filename>libvpx-1.3.0-5.el6_5.x86_64.rpm</filename><sum type="sha256">97222bdc4a8294aab45aad27e5a4c19db4adf2072105f15002e799421cb6bf0b</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1125221" id="1125221" title="[Rhel6] Update Libvpx To Support Webm In Firefox" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1105.html" id="RHEA-2014:1105-1" title="Rhea-2014:1105-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:1242-1</id><title>Tzdata</title><description>This update adds the following enhancements:

* The tzdata-java sub-package now includes time zone data in format compatible with OpenJDK 8. It is available in the /usr/share/javazi-1.8/tzdb.dat file. This data is used by OpenJDK 8 packages to keep up-to-date with the system time zone data updates.

Note that the new format requires OpenJDK 7 to be installed for the rebuild of the tzdata package, otherwise the rebuild will fail. To workaround this problem, a new build option '--without java7' has been introduced to the rpmbuild command. This option can be used to rebuild tzdata on systems without OpenJDK 7 support. However, the tzdata packages rebuilt with the 'rpmbuild --without java7' command will not include OpenJDK-8-compatible data that is present in the original RPM packages.

* Effective from October 26, 2014, 2 a.m., Russia returns to using the standard "winter" time. Also, Russia will now be divided to 11 time zones. The tzdata database and rules have been updated to reflect these changes.</description><release>Scientific Linux Fermi</release><issued date="2014-09-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2014f-1.el6.src.rpm" version="2014f"><filename>tzdata-2014f-1.el6.noarch.rpm</filename><sum type="sha256">dae9841ce72a8f5b7adfe134e072245019fd35250c44917e9572eda9bed84754</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2014f-1.el6.src.rpm" version="2014f"><filename>tzdata-java-2014f-1.el6.noarch.rpm</filename><sum type="sha256">9355c290af67e036eeab66d4298b2bcef6f568a81f168dd931be3344d677322b</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097329" id="1097329" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122487" id="1122487" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127827" id="1127827" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127980" id="1127980" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127981" id="1127981" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1242.html" id="RHEA-2014:1242-1" title="Rhea-2014:1242-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:1253-1</id><title> Tzdata</title><description>This update contains all the changes implemented in tzdata-2014g, including the following enhancement:

* Effective from November 02, 2014, 2 a.m., Turks and Caicos Islands are switching from US Eastern time to UTC-4 year-round, modeled as a switch from EST/EDT to AST.</description><release>Scientific Linux Fermi</release><issued date="2014-09-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2014g-1.el6.src.rpm" version="2014g"><filename>tzdata-java-2014g-1.el6.noarch.rpm</filename><sum type="sha256">600026470990f2cbd5530c25484203b15b1042af3706dcb1af4572a5c819c012</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2014g-1.el6.src.rpm" version="2014g"><filename>tzdata-2014g-1.el6.noarch.rpm</filename><sum type="sha256">39fe9e08ead7f7b8f2f320bb1a82792271dc212768683fb985e0565b83353a34</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136459" id="1136459" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136461" id="1136461" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136462" id="1136462" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136465" id="1136465" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1253.html" id="RHEA-2014:1253-1" title="Rhea-2014:1253-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:1431-1</id><title>New Package: Tagsoup</title><description>TagSoup is a SAX-compliant HTML parser written in Java.

This enhancement update adds the tagsoup package to Scientific Linux 6.

All users who require tagsoup are advised to install this new package.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tagsoup-javadoc" release="8.el6" src="tagsoup-1.2.1-8.el6.src.rpm" version="1.2.1"><filename>tagsoup-javadoc-1.2.1-8.el6.noarch.rpm</filename><sum type="sha256">e7bc98b4178c5f0965bc4dd6a907d9117e08a0d29c320166a0a057d3e846a506</sum></package><package arch="noarch" name="tagsoup" release="8.el6" src="tagsoup-1.2.1-8.el6.src.rpm" version="1.2.1"><filename>tagsoup-1.2.1-8.el6.noarch.rpm</filename><sum type="sha256">207e815defc8fdbcf31469362f1f18b38473c817a4a23e3254fec4b40af4ea6b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2014:1431" id="RHEA-2014:1431-1" title="Rhea-2014:1431-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1088492" id="1088492" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:1433-1</id><title>New Package: Google-Crosextra-Caladea-Fonts </title><description>The Caladea font family is metric-compatible with the Cambria font. Caladea is a serif typeface family based on the Lato font.

This enhancement update adds the google-crosextra-caladea-fonts package to Scientific Linux 6.

All users who require google-crosextra-caladea-fonts are advised to install this new package.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="google-crosextra-caladea-fonts" release="0.3.20130214.el6.1" src="google-crosextra-caladea-fonts-1.002-0.3.20130214.el6.1.src.rpm" version="1.002"><filename>google-crosextra-caladea-fonts-1.002-0.3.20130214.el6.1.noarch.rpm</filename><sum type="sha256">2869b4ed46ab75500882e9d975c9f4865199801532f81d976ed728927319a521</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2014:1433" id="RHEA-2014:1433-1" title="Rhea-2014:1433-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025629" id="1025629" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2014:1434-1</id><title>New Package: Google-Crosextra-Carlito-Fonts</title><description>The google-crosextra-carlito-fonts package provides the Carlito font family. Carlito is metric-compatible with Calibri font. Carlito comes in regular, bold, italic, and bold italic faces. The family covers Latin- Greek-Cyrillic (not a complete set, though) with about 2,000 glyphs. It has the same character coverage as Calibri. This font is sans-serif typeface family based on Lato.

This enhancement update adds the google-crosextra-carlito-fonts package to Scientific Linux 6.

All users who require google-crosextra-carlito-fonts are advised to install this new package.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="google-crosextra-carlito-fonts" release="0.1.20130920.el6.1" src="google-crosextra-carlito-fonts-1.103-0.1.20130920.el6.1.src.rpm" version="1.103"><filename>google-crosextra-carlito-fonts-1.103-0.1.20130920.el6.1.noarch.rpm</filename><sum type="sha256">610abafa8d733af13cbf196d6da992663bfe995334dec069269656d0402204f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2014:1434" id="RHEA-2014:1434-1" title="Rhea-2014:1434-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025628" id="1025628" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="newpackage" version="2.0"><id>SLEA-2014:1501-1</id><title>New Package: Libestr</title><description>The libestr packages contain the string handling essentials library used by the Rsyslog daemon, and is required by the rsyslog7 package.

This enhancement update adds the libestr packages to Scientific Linux 6.</description><release>Scientific Linux Fermi</release><issued date="2014-10-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libestr" release="2.el6" src="libestr-0.1.9-2.el6.src.rpm" version="0.1.9"><filename>libestr-0.1.9-2.el6.x86_64.rpm</filename><sum type="sha256">0ac13e40857b1db7649751e9820bd8b9aa7beee1ba5fd01dfddfa8d17eed5b59</sum></package><package arch="x86_64" name="libestr-devel" release="2.el6" src="libestr-0.1.9-2.el6.src.rpm" version="0.1.9"><filename>libestr-devel-0.1.9-2.el6.x86_64.rpm</filename><sum type="sha256">fc93ad688fac8e4fdc67acfbb2e6ccec2b46403ae6ec90158b9ded449382707a</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=966966" id="966966" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1501.html" id="RHEA-2014:1501-1" title="Rhea-2014:1501-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="newpackage" version="2.0"><id>SLEA-2014:1514-1</id><title>New Packages: Xmlsec1, Lasso, Mod_Auth_Mellon</title><description>The mod_auth_mellon packages provide the mod_auth_mellon module that is an authentication service implementing the Security Assertion Markup Language (SAML) federation protocol version 2.0. It grants access based on the attributes received in assertions generated by an IDP server.

The lasso packages provide the Lasso library that implements the Liberty Alliance Single Sign On standards, including the SAML and SAML2 specifications. It allows handling of the whole life-cycle of SAML-based federations, and provides bindings for multiple languages.

The xmlsec1 packages provide XML Security Library, a C library based on LibXML2 and OpenSSL. The library was created with a goal to support major XML security standards "XML Digital Signature" and "XML Encryption".

This enhancement update adds the xmlsec1, lasso, and mod_auth_mellon packages to Scientific Linux 6 in order to provide SAML Service Provider support in the Apache HTTP server.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="xmlsec1-openssl-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-devel-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">bcf2a25efcc0e1c571600baecce3d437f983987e636f8cd82ae1f8bedc6a9b54</sum></package><package arch="i686" name="xmlsec1-openssl" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">00e11d21d781b705e381773aaaaaa2781159bcd12949a5e1fee7bcdaed867ac9</sum></package><package arch="i686" name="lasso" release="5.el6" src="lasso-2.4.0-5.el6.src.rpm" version="2.4.0"><filename>lasso-2.4.0-5.el6.i686.rpm</filename><sum type="sha256">fba5a4ed20cabc38febf83493688e9b7ec07da75a79c1c3d6377d67dab530723</sum></package><package arch="x86_64" name="lasso-devel" release="5.el6" src="lasso-2.4.0-5.el6.src.rpm" version="2.4.0"><filename>lasso-devel-2.4.0-5.el6.x86_64.rpm</filename><sum type="sha256">575a28df463f0282a8eb5446b5c26c386e50ef779d0a0f4d154941cbd60bb513</sum></package><package arch="i686" name="xmlsec1-nss-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-nss-devel-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">2f15ef81667cf852ee15813883d09354af7e9c2513d35d64cf1cc3e04845b4b4</sum></package><package arch="x86_64" name="xmlsec1-gcrypt-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-devel-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">62e4e6b7156a515505903db754e6f3e80aafb9c141e6ba3b5a30fb07fd16b89b</sum></package><package arch="i686" name="xmlsec1-gnutls-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-devel-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">8744a3bc77f1a30c87e764901d6098cfe15b615e616f968b46d573e9603ec15b</sum></package><package arch="i686" name="xmlsec1-gcrypt" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">3bbeca27d36e4c3d73da790dd4d6f34b36dc2b7ba6764aa1fbf626465a8749e9</sum></package><package arch="i686" name="xmlsec1-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-devel-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">b3a40e2c872e207c43d39f8c1655bcbfbd419e9a51999da009620d07f990988a</sum></package><package arch="i686" name="xmlsec1-nss" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-nss-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">259753ba0a38fdd7f85c0041d904fd85eeff3d21962a16b0e9018c79009813fd</sum></package><package arch="i686" name="lasso-devel" release="5.el6" src="lasso-2.4.0-5.el6.src.rpm" version="2.4.0"><filename>lasso-devel-2.4.0-5.el6.i686.rpm</filename><sum type="sha256">9b4d042cfa3fa315e02d76b5c20d94c30f829857a2e0e39bb1cf6f3443e91fcc</sum></package><package arch="x86_64" name="xmlsec1-nss" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-nss-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">9133d7b6fbbe301a301c863048453bacccaae546e3a4f35fa7b0dbbc045ccac9</sum></package><package arch="x86_64" name="lasso-python" release="5.el6" src="lasso-2.4.0-5.el6.src.rpm" version="2.4.0"><filename>lasso-python-2.4.0-5.el6.x86_64.rpm</filename><sum type="sha256">6315a1f10e2fc10867a3fa5a3201ad3ac62680f5cc9dd12b9fdcb4284e946f18</sum></package><package arch="x86_64" name="xmlsec1-gnutls" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">1577b16edde5c554102953365e776c24b8d0561ddee55d5c53b5656c8fc9b60e</sum></package><package arch="i686" name="xmlsec1" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">834bfdb2411ed3ccfcf6aef5d6db771eb9999c451ee8cc1207c4f586ba8e3f15</sum></package><package arch="x86_64" name="xmlsec1-openssl-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-devel-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">29789a9d5fc69c24e506fcd0fc602d25c766c66f10275b069d5ad5eb7441033d</sum></package><package arch="x86_64" name="xmlsec1-gnutls-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-devel-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">2153b2717234a2257bbefa36dde3ea237e5f8fbf8fbc5c44d69ad6fce8cdd613</sum></package><package arch="i686" name="xmlsec1-gnutls" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">ff12aadb6787aa024fede6a9b7ce37c10cbe35a9463dfd0c0ac61afc03282f19</sum></package><package arch="x86_64" name="lasso" release="5.el6" src="lasso-2.4.0-5.el6.src.rpm" version="2.4.0"><filename>lasso-2.4.0-5.el6.x86_64.rpm</filename><sum type="sha256">c2bd03914f398b7b1adfd7e9df398384690711bd45aa2993f8281e865c92d71c</sum></package><package arch="x86_64" name="xmlsec1-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-devel-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">7f16adbe4706c4c9973fcd2680eb4a76090dee85af4c2b088c44011c83b54e14</sum></package><package arch="x86_64" name="xmlsec1-nss-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-nss-devel-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">648a60344749366206d742b7dad294584a3969b71c690ea975f20926cc12b947</sum></package><package arch="i686" name="xmlsec1-gcrypt-devel" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-devel-1.2.20-4.el6.i686.rpm</filename><sum type="sha256">127f13fad840cc802dbe575a43330dc830742111013241f17e68d2e83ee31333</sum></package><package arch="x86_64" name="xmlsec1" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">e6b0a8db18a20d290f062fc304dea448ff6d61fc236bd713f4fff47fdc98fd0e</sum></package><package arch="x86_64" name="xmlsec1-gcrypt" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">63c50f01e2def81bf0662d1b224d84e4b74dda76a1ca93c5227963dbae127c12</sum></package><package arch="x86_64" name="xmlsec1-openssl" release="4.el6" src="xmlsec1-1.2.20-4.el6.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-1.2.20-4.el6.x86_64.rpm</filename><sum type="sha256">6f2e233e109ec4781a780fc06df4635f4a3daa3195f756287fbe55e2e714842a</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1083605" id="1083605" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087555" id="1087555" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1090812" id="1090812" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1130604" id="1130604" title="Mod_Auth_Mellon Should Send Assertionconsumerserviceurls In Authns For Compatibility With Jboss Picketlink-Based Idps" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1514.html" id="RHEA-2014:1514-1" title="Rhea-2014:1514-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="newpackage" version="2.0"><id>SLEA-2014:1530-1</id><title>New Packages: Json-C</title><description>JSON-C implements a reference counting object model that allows users to easily construct JavaScript Object Notation (JSON) objects in C, output them as JSON formatted strings and parse JSON formatted strings back into the C representation of JSON objects.

This enhancement update adds the json-c packages to Scientific Linux 6.</description><release>Scientific Linux Fermi</release><issued date="2014-10-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="json-c-doc" release="11.el6" src="json-c-0.11-11.el6.src.rpm" version="0.11"><filename>json-c-doc-0.11-11.el6.noarch.rpm</filename><sum type="sha256">c43908ad5b7a495c3cb64a5f0df4d6570e37df132df079946acc6337d401067b</sum></package><package arch="i686" name="json-c-devel" release="11.el6" src="json-c-0.11-11.el6.src.rpm" version="0.11"><filename>json-c-devel-0.11-11.el6.i686.rpm</filename><sum type="sha256">60ecd049532156cfec424e11e63ee7ea2bfea5d3a142520ae03243ba30362f8f</sum></package><package arch="x86_64" name="json-c" release="11.el6" src="json-c-0.11-11.el6.src.rpm" version="0.11"><filename>json-c-0.11-11.el6.x86_64.rpm</filename><sum type="sha256">796bcdefdfa9de065d248a9f49324a753994f214be528580cdee6a939c4e51a0</sum></package><package arch="x86_64" name="json-c-devel" release="11.el6" src="json-c-0.11-11.el6.src.rpm" version="0.11"><filename>json-c-devel-0.11-11.el6.x86_64.rpm</filename><sum type="sha256">29602b7d2eec17de6544c8b33a5b6c4af4f6effd5118041daf2866bece363a88</sum></package><package arch="i686" name="json-c" release="11.el6" src="json-c-0.11-11.el6.src.rpm" version="0.11"><filename>json-c-0.11-11.el6.i686.rpm</filename><sum type="sha256">ce93c23b563cc66b23e5504203aa523add381992b3f6cedc55fa7aa30b94e094</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2014:1530" id="RHEA-2014:1530-1" title="Rhea-2014:1530-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=966964" id="966964" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1530.html" id="RHEA-2014:1530-1" title="Rhea-2014:1530-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="newpackage" version="2.0"><id>SLEA-2014:1673-1</id><title>New Packages: Pyyaml</title><description>YAML is a data serialization format designed for human readability and interaction with scripting languages. PyYAML is a YAML parser and emitter for Python.

This enhancement update adds the PyYAML packages to Scientific Linux 6 to resolve an upgrade dependency problem with libyaml.</description><release>Scientific Linux Fermi</release><issued date="2014-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="PyYAML" release="3.1.el6" src="PyYAML-3.10-3.1.el6.src.rpm" version="3.10"><filename>PyYAML-3.10-3.1.el6.x86_64.rpm</filename><sum type="sha256">d5ff92a169c6dbde0d544e317f18dd0fcc7b7324bd627fdd5edee02dd8c3b9b2</sum></package><package arch="i686" name="PyYAML" release="3.1.el6" src="PyYAML-3.10-3.1.el6.src.rpm" version="3.10"><filename>PyYAML-3.10-3.1.el6.i686.rpm</filename><sum type="sha256">f455c34b82dd311b43427873851087aca7ec98124348b41f132f27a607e7c62e</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153371" id="1153371" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2014-1673.html" id="RHEA-2014:1673-1" title="Rhea-2014:1673-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:0141-1</id><title>Tzdata Enhancement Update</title><description>* Time reckoned by Earth's rotation drifts away from atomic time because of irregularities in the Earth's rate of rotation. For this reason, on 30 June 2015 at precisely 23:59:59, a leap second will be inserted (23:59:60), which will be followed by 00:00:00 the next day.</description><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2015a-1.el6.src.rpm" version="2015a"><filename>tzdata-2015a-1.el6.noarch.rpm</filename><sum type="sha256">bc6099b0b187aa37ef92ecaf0ba9828061d3db2bb26e36d544c3b436cbf2428a</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2015a-1.el6.src.rpm" version="2015a"><filename>tzdata-java-2015a-1.el6.noarch.rpm</filename><sum type="sha256">5419f538519617cb58a4540a31c74b39a756811eec93e1635c4dadaabb3438ff</sum></package></collection></pkglist><references><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180536" id="1180536" title="Extra Leap Second On 30Th Of June 2015 [6.6.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181933" id="1181933" title="Extra Leap Second On 30Th Of June 2015 [5.11]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181970" id="1181970" title="Extra Leap Second On 30Th Of June 2015" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181975" id="1181975" title="Extra Leap Second On 30Th Of June 2015" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHEA-2015-0141.html" id="RHEA-2015:0141-1" title="Rhea-2015:0141-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:0717-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancements:

*  With this update, several changes have been made to the scheduling of Daylight Saving Time (DST) in the tzdata packages:

- Mongolia will start observing DST again this year, from the last Saturday in March at 02:00 to the last Saturday in September at 00:00. - Palestine will start DST on March 28, not March 27.  - The fall 2014 transition has been corrected from September 26 to October 24.</description><release>Scientific Linux Fermi</release><issued date="2015-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2015b-1.el6.src.rpm" version="2015b"><filename>tzdata-java-2015b-1.el6.noarch.rpm</filename><sum type="sha256">22757909ebe7ac306e01680275d941b85c7ffc4281bb3284b7269fd396754730</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2015b-1.el6.src.rpm" version="2015b"><filename>tzdata-2015b-1.el6.noarch.rpm</filename><sum type="sha256">e9e4b26ca2f93db349664b7d52d360ec774ca260c589236b56c83bc62693e275</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:0717" id="RHEA-2015:0717-1" title="Rhea-2015:0717-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203327" id="1203327" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203329" id="1203329" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203331" id="1203331" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203333" id="1203333" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:0855-1</id><title> Tzdata</title><description>This update adds the following enhancements:

* Egypt will start observing Daylight Saving Time (DST) at 24:00 on the last Thursday in April instead of 00:00 on the last Friday in April. In 2015, the transition will therefore take place on Thursday, April 30 at 24:00. Similar changes apply to years 2026, 2037, 2043, and subsequent years in which April 30 falls on a Thursday.</description><release>Scientific Linux Fermi</release><issued date="2015-04-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2015c-2.el6.src.rpm" version="2015c"><filename>tzdata-2015c-2.el6.noarch.rpm</filename><sum type="sha256">abc6fe5f8539cbb3f85602d1d20b118e6afc840ec83ea9eae202828a73b55b77</sum></package><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2015c-2.el6.src.rpm" version="2015c"><filename>tzdata-java-2015c-2.el6.noarch.rpm</filename><sum type="sha256">7d5a2105c6568553a0f6d0949f09ef30f87fd451d23403bde7b23590545e8e97</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:0855" id="RHEA-2015:0855-1" title="Rhea-2015:0855-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211448" id="1211448" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=121145" id="121145" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211451" id="1211451" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211452" id="1211452" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:0913-1</id><title> Tzdata</title><description>This update adds the following enhancement:

* Egypt will not observe daylight saving time (DST) in 2015. Potential suspension of the daylight saving system in Egypt for the following years is under consideration.</description><release>Scientific Linux Fermi</release><issued date="2015-05-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2015d-1.el6.src.rpm" version="2015d"><filename>tzdata-java-2015d-1.el6.noarch.rpm</filename><sum type="sha256">dd500c12f353504c1d2b2666b4231b738025136ac0d353e3e457a6981623a16f</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2015d-1.el6.src.rpm" version="2015d"><filename>tzdata-2015d-1.el6.noarch.rpm</filename><sum type="sha256">55eeec584e0fd8fc1c55f0a5d172167effda68b837c8773ff93066b63cec158d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:0913" id="RHEA-2015:0913-1" title="Rhea-2015:0913-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213913" id="1213913" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213916" id="1213916" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213922" id="1213922" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213925" id="1213925" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:1302-1</id><title>Elfutils Bug Fix And Enhancement Update</title><description>The elfutils packages have been upgraded to upstream version 0.161, which provides a number of bug fixes and enhancements over the previous version. The most notable new features are:

* The eu-stack utility supports showing inlined frames and it is now able to produce backtraces even for processes that might have some of their on- disk libraries updated or deleted.

* Improved DWZ compressed DWARF multi-file support with new functions, "dwarf_getalt" and "dwarf_setalt", has been introduced.

* Support for ARM 64-bit architecture and Scientific Linux for POWER, little endian has been added.

* The libdw library now supports LZMA-compressed (.ko.xz) kernel modules.

* Support for ".debug_macro" has been added; new functions has been introduced: "dwarf_getmacros_off", "dwarf_macro_getsrcfiles", "dwarf_macro_getparamcnt", and "dwarf_macro_param".

* New GNU extensions to the DWARF format are now recognized.

* New functions have been added to the libdw library: "dwarf_peel_type", "dwarf_cu_getdwarf", "dwarf_cu_die", "dwelf_elf_gnu_debuglink", "dwelf_dwarf_gnu_debugaltlink", "dwelf_elf_gnu_build_id".</description><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="elfutils" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">3175b2df25c9ba7b0d6703f871f7e3f37c7500098ffe8bc22a425f982a310e89</sum></package><package arch="i686" name="elfutils-libs" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libs-0.161-3.el6.i686.rpm</filename><sum type="sha256">0b851fcd6c65ed78d601e818d27f22505c3950756ce7bc3e0f70028d85c5d949</sum></package><package arch="i686" name="elfutils-libelf" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libelf-0.161-3.el6.i686.rpm</filename><sum type="sha256">68189d3c40de550e24593956a2d9ede39d3803b00a56314a8399ea962b36d8b2</sum></package><package arch="x86_64" name="elfutils-devel" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-devel-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">182ad5784d6d8bd490225ca35c429530c633a95b62bf0fa3eafe37536d191b17</sum></package><package arch="x86_64" name="elfutils-libelf" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libelf-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">ac141b51040c5be787a1e3994896fc15f40e28001469157d091f7330ff5a5988</sum></package><package arch="i686" name="elfutils-devel" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-devel-0.161-3.el6.i686.rpm</filename><sum type="sha256">8bf9bc4f121cadeb9563b5f7cb61664f65f1ff8b22a9841ba46619d7a80f4785</sum></package><package arch="i686" name="elfutils-libelf-devel" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libelf-devel-0.161-3.el6.i686.rpm</filename><sum type="sha256">682a3779677aedf54cb60ee9f46747a0ecd34508ec2669ee4b560ab06af586fa</sum></package><package arch="x86_64" name="elfutils-libelf-devel" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libelf-devel-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">f004f2007af4081b2b9a224298406df02f2a8ac7be22cb7e7fa88f388ce357d6</sum></package><package arch="x86_64" name="elfutils-libelf-devel-static" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libelf-devel-static-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">829b4e7ea3b7de7525f9b4b43f4d929d02b2bff17a9db2efd66389bbefde4851</sum></package><package arch="x86_64" name="elfutils-libs" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-libs-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">53521fb051fd0aada932576cf6829c066565650e742e27dde62b682ed6e96dd4</sum></package><package arch="x86_64" name="elfutils-devel-static" release="3.el6" src="elfutils-0.161-3.el6.src.rpm" version="0.161"><filename>elfutils-devel-static-0.161-3.el6.x86_64.rpm</filename><sum type="sha256">b81aa856ac781ae51ee99fbc9e02c892a2e0b113c62027d9429587fcc5e89c03</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1302" id="RHEA-2015:1302-1" title="Rhea-2015:1302-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167724" id="1167724" title="Request To Rebase Elfutils Version That Is Higher Than 0.158" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:1418-1</id><title>New Packages: Python-Requests And Dependencies</title><description>The python-requests package contains a library designed to make HTTP requests easy for developers.

This enhancement update adds the python-requests package and its dependencies to Scientific Linux 6. The following packages are now available from the base channels in Red Hat Network: python-requests, python-chardet, python-urllib3, python-six, python-backports, and python- backports-ssl_match_hostname.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-urllib3" release="1.el6" src="python-urllib3-1.10.2-1.el6.src.rpm" version="1.10.2"><filename>python-urllib3-1.10.2-1.el6.noarch.rpm</filename><sum type="sha256">f17d31e9a61a0259095d1128748113362d88800396281cf052b29b8a262caf20</sum></package><package arch="noarch" name="python-chardet" release="1.el6" src="python-chardet-2.2.1-1.el6.src.rpm" version="2.2.1"><filename>python-chardet-2.2.1-1.el6.noarch.rpm</filename><sum type="sha256">e61aed0525cfb5a85559bb96c894a3246deff72a0e88539fc82f2e6743a88540</sum></package><package arch="noarch" name="python-backports-ssl_match_hostname" release="2.el6" src="python-backports-ssl_match_hostname-3.4.0.2-2.el6.src.rpm" version="3.4.0.2"><filename>python-backports-ssl_match_hostname-3.4.0.2-2.el6.noarch.rpm</filename><sum type="sha256">4812a54059a968073f282743c48e2662e007e0f11e2e129eab88b62e7a6ef549</sum></package><package arch="noarch" name="python-six" release="2.el6" src="python-six-1.9.0-2.el6.src.rpm" version="1.9.0"><filename>python-six-1.9.0-2.el6.noarch.rpm</filename><sum type="sha256">408be05e77a6a777b0a95509900bd05beb9ae03a8369a6ddd0ad4da8de1c5972</sum></package><package arch="x86_64" name="python-backports" release="5.el6" src="python-backports-1.0-5.el6.src.rpm" version="1.0"><filename>python-backports-1.0-5.el6.x86_64.rpm</filename><sum type="sha256">97f3cfdaec4ff6508f53188246c5e359bf7532d3d7c0d299c4bdc0150033d1d2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1418" id="RHEA-2015:1418-1" title="Rhea-2015:1418-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176248" id="1176248" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176251" id="1176251" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176257" id="1176257" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176258" id="1176258" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183141" id="1183141" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183146" id="1183146" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2015:1420-1</id><title>New Packages: Clufter</title><description>The clufter packages contain a tool for transforming and analyzing cluster configuration formats. Notably, clufter can be used to assist with migration from an older stack configuration to a newer one that leverages Pacemaker. The packages can be used either as a separate command-line tool or as a Python library.

This enhancement update adds the clufter packages to Scientific Linux 6.</description><release>Scientific Linux Fermi</release><issued date="2015-10-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-clufter" release="1.el6" src="clufter-0.11.2-1.el6.src.rpm" version="0.11.2"><filename>python-clufter-0.11.2-1.el6.x86_64.rpm</filename><sum type="sha256">922cda7aa4efebefc88bf555a6b1e9bfcb1c5bce04e3eac8fc16b7f97b64fc3b</sum></package><package arch="noarch" name="clufter-lib-ccs" release="1.el6" src="clufter-0.11.2-1.el6.src.rpm" version="0.11.2"><filename>clufter-lib-ccs-0.11.2-1.el6.noarch.rpm</filename><sum type="sha256">272f790d0d5e00ec509299c15526d1a1aaf7fa52ea0e928d7adc577fb93c6bf6</sum></package><package arch="noarch" name="clufter-cli" release="1.el6" src="clufter-0.11.2-1.el6.src.rpm" version="0.11.2"><filename>clufter-cli-0.11.2-1.el6.noarch.rpm</filename><sum type="sha256">222280ed3396d2525cf739891638cb183c3fe547c17396406e0e699539c02e13</sum></package><package arch="noarch" name="clufter-lib-pcs" release="1.el6" src="clufter-0.11.2-1.el6.src.rpm" version="0.11.2"><filename>clufter-lib-pcs-0.11.2-1.el6.noarch.rpm</filename><sum type="sha256">9fd13d621a2d38a4b3cc705ebe9ed280e94f1e8b5dc6f51c92a7ea75eab55fe9</sum></package><package arch="noarch" name="clufter-lib-general" release="1.el6" src="clufter-0.11.2-1.el6.src.rpm" version="0.11.2"><filename>clufter-lib-general-0.11.2-1.el6.noarch.rpm</filename><sum type="sha256">be3eace04a8aa87a281f0cfe2f900baee8e68c8dd05552ee8fafdeca4113e6fa</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1420" id="RHEA-2015:1420-1" title="Rhea-2015:1420-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1182358" id="1182358" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0154-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2016a, which provides a number of bug fixes and enhancements over the previous version, notably:

* Prior to this update, an incorrect assumption was made about the daylight saving time (DST) in the America/Cayman time zone this year, which was reflected in the code. The mentioned time zone will not have DST this year. To  the previous change has been reverted.

* The Asia/Chita time zone switches from +0800 to +0900 on 2016-03-27 at 02:00. This change has been implemented.

* The DST predictions for the Asia/Tehran time zone for the year 2038 and later are now March 21 00:00 to September 21 00:00. This premise has been implemented.

This update also fixes the following bug:

* Starting from 2027, the Java timezone generation tool would incorrectly calculate the Africa/Casablanca time transitions. This bug has been fixed, and the tool will calculate these transitions correctly.

In addition, this update adds the following enhancement:

* At present, in Scientific Linux 6, the /etc/localtime file is not preserved across package updates even when it is a symbolic link. This tzdata version contains preparatory work to support preserving /etc/localtime across package upgrades if it is a symbolic link. Currently, this change is inactive, and the time zone must still be configured through /etc/sysconfig/clock. The change will be supported by a future glibc update.</description><release>Scientific Linux Fermi</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2016a-2.el6.src.rpm" version="2016a"><filename>tzdata-java-2016a-2.el6.noarch.rpm</filename><sum type="sha256">bba8d1909e232f74c9cad62d92cb6568455e4a9d045cd4bec3f6ec346eeb2b9a</sum></package><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2016a-2.el6.src.rpm" version="2016a"><filename>tzdata-2016a-2.el6.noarch.rpm</filename><sum type="sha256">e1d39ca6635d12b5aff96c9a3bb54e77e498925f25448ad99d75fae7c93d4b46</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0154" id="RHEA-2016:0154-1" title="Rhea-2016:0154-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292833" id="1292833" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292837" id="1292837" title="S8051641: Africa/Casablanca Transitions Is Incorrectly Calculated Starting From 2027 [6.7.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302733" id="1302733" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302734" id="1302734" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302740" id="1302740" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302741" id="1302741" title="Tzdata-2016A Is Available" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0463-1</id><title>Tzdata</title><description>The tzdata packages have been upgraded to upstream version 2016b, which provides a number of enhancements over the previous version, notably:

* This update introduces a number of new time zones for several regions in the Russian Federation, which will switch time on 2016-03-27 at 02:00 local time: - The Europe/Astrakhan time zone for Astrakhan Oblast, which will switch from UTC +03 to +04. - The Europe/Ulyanovsk time zone for Ulyanovsk Oblast, which will likely switch from UTC +03 to +04. - The Asia/Barnaul time zone for Altai Krai and Altai Republic, which will likely switch from UTC +06 to +07.

* This update takes into account that the Asia/Sakhalin time zone will switch from UTC +10 to +11 on 2016-03-27 at 02:00 local time.

* This update takes into account that Haiti will not observe the Daylight Saving Time (DST) in 2016.

* This update takes into account that Palestine's spring-forward transition will happen on 2016-03-26 at 01:00 local time, not 00:00.</description><release>Scientific Linux Fermi</release><issued date="2016-03-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016b-1.el6.src.rpm" version="2016b"><filename>tzdata-2016b-1.el6.noarch.rpm</filename><sum type="sha256">26296b31c8b0e451708f41b9a3e362571c26063ce3a57633f8d9e150f85c46c3</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016b-1.el6.src.rpm" version="2016b"><filename>tzdata-java-2016b-1.el6.noarch.rpm</filename><sum type="sha256">4abf62bca3d1ebc962b35ca1a598646cce860847193eda4a2007458d072567b4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0463" id="RHEA-2016:0463-1" title="Rhea-2016:0463-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317703" id="1317703" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317704" id="1317704" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317707" id="1317707" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317708" id="1317708" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0517-1</id><title>Tzdata</title><description>This update adds the following enhancement:

* This update takes into account that Azerbaijan will no longer observe Daylight Saving Time (DST), and that Chile changes from permanent DST to seasonal DST.</description><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016c-1.el6.src.rpm" version="2016c"><filename>tzdata-2016c-1.el6.noarch.rpm</filename><sum type="sha256">39d9fd02578d12c1313cda546d1e6c41265b4aa9c28307f85c57c11aaf9af9cb</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016c-1.el6.src.rpm" version="2016c"><filename>tzdata-java-2016c-1.el6.noarch.rpm</filename><sum type="sha256">6d4520750b9862f77c975a3211c1ba52ea2e5c8aa3dc7361aa5ab629231c8f80</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0517" id="RHEA-2016:0517-1" title="Rhea-2016:0517-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319304" id="1319304" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319306" id="1319306" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319310" id="1319310" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319311" id="1319311" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0635-1</id><title>Selinux-Policy</title><description>This update introduces changes to the SELinux Samba policy that are required to make the smbcontrol utility from Samba version 4.2 work correctly. This update should be installed after installing updated samba packages from SLSA-2016:0618 (SL 7.1 EUS) or updated samba4 packages from SLSA-2016:0612 (SL 6) or SLSA-2016:0620 (SL 6.2, 6.4, and 6.5 AUS; SL 6.6 EUS).</description><release>Scientific Linux Fermi</release><issued date="2016-04-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-doc" release="279.el6_7.9" src="selinux-policy-3.7.19-279.el6_7.9.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6_7.9.noarch.rpm</filename><sum type="sha256">327b96686ea5f77a5954cf86a60bdba540bac1d8be5b6e0821bc83f5e73aef62</sum></package><package arch="noarch" name="selinux-policy" release="279.el6_7.9" src="selinux-policy-3.7.19-279.el6_7.9.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6_7.9.noarch.rpm</filename><sum type="sha256">622539abb6ce9b7c0eb86c7d53fb1799a6ca98324aa0dc427f3bc672503c56ef</sum></package><package arch="noarch" name="selinux-policy-minimum" release="279.el6_7.9" src="selinux-policy-3.7.19-279.el6_7.9.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6_7.9.noarch.rpm</filename><sum type="sha256">6bfee119272be3f929c40071c5ec08076bcf60de42a8de02a628863698f0aed1</sum></package><package arch="noarch" name="selinux-policy-mls" release="279.el6_7.9" src="selinux-policy-3.7.19-279.el6_7.9.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6_7.9.noarch.rpm</filename><sum type="sha256">e3af18e6ba7162eb95d256a791ee02707f1d733461aa4caf97378a9e96bf9189</sum></package><package arch="noarch" name="selinux-policy-targeted" release="279.el6_7.9" src="selinux-policy-3.7.19-279.el6_7.9.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6_7.9.noarch.rpm</filename><sum type="sha256">21be5699b0c9781135ce664ec567e6e3cf9cb3f5bdf4b3f1c49091ee48dff4d9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0635" id="RHEA-2016:0635-1" title="Rhea-2016:0635-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0683-1</id><title>Tzdata</title><description>This update adds the following enhancements:

* Asia/Magadan will switch from UTC+10 to UTC+11 on April 24, 2016 at 02:00.

* America/Caracas will switch from UTC-0430 to UTC-04 on May 01, 2016 at 02:30.

* New zone Asia/Tomsk, split off from Asia/Novosibirsk. It covers Tomsk Oblast, Russia, which will switch from UTC+06 to UTC+07 on May 29, 2016 at 02:00.</description><release>Scientific Linux Fermi</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016d-1.el6.src.rpm" version="2016d"><filename>tzdata-java-2016d-1.el6.noarch.rpm</filename><sum type="sha256">b72e66822289ec86634a58254c10abbf736bd689dfa8d4a55f3ec82ff9469230</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016d-1.el6.src.rpm" version="2016d"><filename>tzdata-2016d-1.el6.noarch.rpm</filename><sum type="sha256">3a7d2866fe4e8248ab873f448c080c24a6b72883797e54dd1e772acbd9f53e49</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0683" id="RHEA-2016:0683-1" title="Rhea-2016:0683-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326484" id="1326484" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326486" id="1326486" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326490" id="1326490" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326491" id="1326491" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0812-1</id><title>Mesa Bug Fix And</title><description>Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libdrm-devel" release="2.el6" src="libdrm-2.4.65-2.el6.src.rpm" version="2.4.65"><filename>libdrm-devel-2.4.65-2.el6.i686.rpm</filename><sum type="sha256">1148dc0813a83ac46909b98b22ab780628e2ada944aa769c7e7515e3eaa11a34</sum></package><package arch="x86_64" name="mesa-libgbm" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libgbm-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">a6bb3a83e6a3d1ce51481ada597e90f249953fbc6b571e34cf838765a3a0f085</sum></package><package arch="i686" name="mesa-libgbm" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libgbm-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">683cab64e80872b1dbcf73fec8deb0012e313ea8f554090f87640460424916aa</sum></package><package arch="x86_64" name="glx-utils" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>glx-utils-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">1121d2594c4442db74b2539f5446474a5005f7fe41ab32d43a789f75f9f537e2</sum></package><package arch="i686" name="mesa-libGLU" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGLU-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">26b3f41dd43f0cf64823dc225a42375f7018755f9a7d8620490b7bce31416f4a</sum></package><package arch="x86_64" name="mesa-private-llvm" release="1.el6" src="mesa-private-llvm-3.6.2-1.el6.src.rpm" version="3.6.2"><filename>mesa-private-llvm-3.6.2-1.el6.x86_64.rpm</filename><sum type="sha256">936e8d46b482ead299d4c14e89cca7127cc298cd85c95e53c8348570e9a36fe4</sum></package><package arch="i686" name="libdrm" release="2.el6" src="libdrm-2.4.65-2.el6.src.rpm" version="2.4.65"><filename>libdrm-2.4.65-2.el6.i686.rpm</filename><sum type="sha256">b743e8450c88b270fbba3511486c873722199d4142d196195afd96417c4cc16e</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGL-devel-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">dc197c572446b15db103f82e7ddb53d7aee2af0351a409db5d5ecb9fc8b9a22d</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-dri-drivers-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">aff732529d9adcb026cdead58ac757c4acfdf7cc475e9238d272aa6fb9192d28</sum></package><package arch="i686" name="mesa-dri-filesystem" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-dri-filesystem-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">f4c49e4e3f28664485d921575be3e48697807c8f33be99b5428b34ef57f34100</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libEGL-devel-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">c8ea6ee2b39406bd8a9225084326539d1e42ede785a4831fbd38c61109bb21a7</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libgbm-devel-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">9c64e7f63740912613dc46e93995841b05ea2760262ac8562928e9702f69c80e</sum></package><package arch="i686" name="mesa-libEGL" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libEGL-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">953f58e9b628f0bc46ac7870557f65d9217066680c298ac181060687d4b516d5</sum></package><package arch="i686" name="mesa-private-llvm-devel" release="1.el6" src="mesa-private-llvm-3.6.2-1.el6.src.rpm" version="3.6.2"><filename>mesa-private-llvm-devel-3.6.2-1.el6.i686.rpm</filename><sum type="sha256">4e36f3e61d42b21d019d99a90c870196f1ba26cc49f2505ec6e9f53fa9ce0e40</sum></package><package arch="x86_64" name="mesa-libGLU" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGLU-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">a0df32b47d62612ce908562bfec6dd4aa86f15832f37c782a03b02e685afc0d7</sum></package><package arch="x86_64" name="mesa-libxatracker" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libxatracker-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">8816762b150b9eafc49c8946804c748b168b2e3b456ad7873a01aee7a7100a2b</sum></package><package arch="i686" name="mesa-libgbm-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libgbm-devel-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">a97374b3d10655f6717a8775c43acf5623a37716fd3b4a552c5a4e4259067d08</sum></package><package arch="i686" name="mesa-private-llvm" release="1.el6" src="mesa-private-llvm-3.6.2-1.el6.src.rpm" version="3.6.2"><filename>mesa-private-llvm-3.6.2-1.el6.i686.rpm</filename><sum type="sha256">0d9e98a0430aa7a9767186725d58cdb802159a3eda631fc919167ee963005cde</sum></package><package arch="x86_64" name="mesa-libGL" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGL-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">343837c78ea876dcf05dcfa8bace7e361dadbd26d4ecb72fca11339ae21ae73b</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libOSMesa-devel-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">c857a7e5d587cf8cf231717bda344fad0a9ae943b88ab04d8a4c51f791bf7c64</sum></package><package arch="x86_64" name="mesa-demos" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-demos-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">c2ed865716431534ae1e381721661c314a775f24b433593f26ca30655f502185</sum></package><package arch="i686" name="mesa-libGL" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGL-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">15dc9a4a8b66c187c723a49df2bb82827f5db5e949962ab83ed3dd95113e80a9</sum></package><package arch="i686" name="mesa-libxatracker" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libxatracker-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">70d8a52ed86afe2d61a968536425227fa51c5f3d7d41e946fa311a79b3e73309</sum></package><package arch="i686" name="mesa-dri-drivers" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-dri-drivers-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">c3f6de4cc46d99051366f1010e9ed561c914084eb28e2e67b657d1d744d08a8b</sum></package><package arch="x86_64" name="mesa-libxatracker-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libxatracker-devel-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">2f8c0706acf0b4e7eae1005debd1043dfb16235268b0ec3493353bc4549f7bb3</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libOSMesa-devel-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">914cbee17d4554b5361c52dda775405909c52cc961959c4f2c3ad311fcf8fb2d</sum></package><package arch="x86_64" name="mesa-libEGL" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libEGL-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">f2adbbc737bfc62ed758ca76652e824fe4a2bf4d5959bd37d5595447970d4af8</sum></package><package arch="x86_64" name="libdrm-devel" release="2.el6" src="libdrm-2.4.65-2.el6.src.rpm" version="2.4.65"><filename>libdrm-devel-2.4.65-2.el6.x86_64.rpm</filename><sum type="sha256">452ed1ce3c44991dccff167e6c2702f10be5b3473d61a9e2f92fae363806cdbf</sum></package><package arch="x86_64" name="mesa-dri-filesystem" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-dri-filesystem-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">cbf87562411b7ae8a803dd7df8932714ff9d814f1bed6f7d1b7680d2b40bbb24</sum></package><package arch="i686" name="mesa-libOSMesa" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libOSMesa-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">aa9e24ac6893c70cfd04323daaae225def45ada0f050ab74045ffe679db7ace0</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libOSMesa-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">394636ce7532b18daf59f1d1e49f2585a0f5d348dd6a389fda3e2efcfcfcead3</sum></package><package arch="i686" name="mesa-libEGL-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libEGL-devel-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">8a74ac52ddb93b4b5ed97d30a3b9894de230b2dbd61c8ed0d036807b89711c74</sum></package><package arch="i686" name="mesa-libGLU-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGLU-devel-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">0ecee5f18793088f9ce6321e11c8f3c6a7939f7e0766c52e95548f280f739ee6</sum></package><package arch="x86_64" name="mesa-libGLU-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGLU-devel-11.0.7-4.el6.x86_64.rpm</filename><sum type="sha256">f6309cf396c059a8ac634014b3df0f6e6f3c01dc84a65d8315965c5a8c9d9eec</sum></package><package arch="i686" name="mesa-libxatracker-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libxatracker-devel-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">9c5adf09981c315f0d85d711956eaf7ebbeae1b7bfe09e119e50c3f6b89fc6e4</sum></package><package arch="x86_64" name="mesa-private-llvm-devel" release="1.el6" src="mesa-private-llvm-3.6.2-1.el6.src.rpm" version="3.6.2"><filename>mesa-private-llvm-devel-3.6.2-1.el6.x86_64.rpm</filename><sum type="sha256">b368e8922ec2e163e9e084155026d1219181eb6c7135fdee331d3d536de676d7</sum></package><package arch="i686" name="mesa-libGL-devel" release="4.el6" src="mesa-11.0.7-4.el6.src.rpm" version="11.0.7"><filename>mesa-libGL-devel-11.0.7-4.el6.i686.rpm</filename><sum type="sha256">ca23018c4cb38d518ad8602c202909c19b6aa04802e9ad4ccf44fdc0aa36ae1f</sum></package><package arch="x86_64" name="libdrm" release="2.el6" src="libdrm-2.4.65-2.el6.src.rpm" version="2.4.65"><filename>libdrm-2.4.65-2.el6.x86_64.rpm</filename><sum type="sha256">197d583a432cb258e1d14018ac46c7ffc87279575befdb4c9208c5377ff94995</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0812" id="RHEA-2016:0812-1" title="Rhea-2016:0812-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0839-1</id><title>Python-Urlgrabber Bug Fix Update</title><description>The python-urlgrabber package provides a high-level cross-protocol url- grabber for the Python programming language. The url-grabber allows Python scripts to fetch data using the HTTP and FTP protocols, as well as from a local file system.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-urlgrabber" release="11.el6" src="python-urlgrabber-3.9.1-11.el6.src.rpm" version="3.9.1"><filename>python-urlgrabber-3.9.1-11.el6.noarch.rpm</filename><sum type="sha256">4d05a440e1ca6282252428478bedffed01637d8c0e918734c817aae27ac9dab0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0839" id="RHEA-2016:0839-1" title="Rhea-2016:0839-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=849177" id="849177" title="Python-Urlgrabber Has Timeout Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=970262" id="970262" title="Anaconda 13.21.195 Exception Report" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0871-1</id><title>Libevdev</title><description>The libevdev packages contain a library to wrap kernel evdev devices and provide a proper API to interact with those devices.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libevdev-devel" release="2.el6" src="libevdev-1.4.5-2.el6.src.rpm" version="1.4.5"><filename>libevdev-devel-1.4.5-2.el6.x86_64.rpm</filename><sum type="sha256">8f00cdec5bc6da4bd922d7182d6d877349a05735d7dec8caaecabdc33d5019b5</sum></package><package arch="i686" name="libevdev-devel" release="2.el6" src="libevdev-1.4.5-2.el6.src.rpm" version="1.4.5"><filename>libevdev-devel-1.4.5-2.el6.i686.rpm</filename><sum type="sha256">eb07f6a9e0e3b0e8191f7462ce10218d03c3380706a68d568a5e9d6d64367906</sum></package><package arch="i686" name="libevdev" release="2.el6" src="libevdev-1.4.5-2.el6.src.rpm" version="1.4.5"><filename>libevdev-1.4.5-2.el6.i686.rpm</filename><sum type="sha256">fd97fabaddebacd5760e7459f731528d0c67345d9e8b6017062e2cb3032fcf4b</sum></package><package arch="x86_64" name="libevdev-utils" release="2.el6" src="libevdev-1.4.5-2.el6.src.rpm" version="1.4.5"><filename>libevdev-utils-1.4.5-2.el6.x86_64.rpm</filename><sum type="sha256">9fb0b47835f0612dd47d5b051695d26371e2f8778750892540d770fe56f6c510</sum></package><package arch="x86_64" name="libevdev" release="2.el6" src="libevdev-1.4.5-2.el6.src.rpm" version="1.4.5"><filename>libevdev-1.4.5-2.el6.x86_64.rpm</filename><sum type="sha256">24301d28a03be84df230b448a438214e83f8becf9ade2f3949a9762fedc1fbdd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0871" id="RHEA-2016:0871-1" title="Rhea-2016:0871-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0879-1</id><title>Ldns</title><description>The ldns packages contain a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. A higher level API has been defined which allows a programmer to, for instance, create or sign packets.</description><release>Scientific Linux Fermi</release><issued date="2016-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ldns-doc" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-doc-1.6.16-7.el6.2.noarch.rpm</filename><sum type="sha256">0424b3b5d6649620d3fcda1eeab394b58af1cf2933637246ace4781aa1f41de9</sum></package><package arch="i686" name="ldns" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-1.6.16-7.el6.2.i686.rpm</filename><sum type="sha256">fc1e2c0cb9c8c065f142af15b87a199b3cec252993d2c74dffa8c606bd557d25</sum></package><package arch="x86_64" name="ldns" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-1.6.16-7.el6.2.x86_64.rpm</filename><sum type="sha256">be1a90ec6d087ed40e6753511c1bdcb75c6f953498df83f730b562e2e0fe5472</sum></package><package arch="x86_64" name="ldns-devel" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-devel-1.6.16-7.el6.2.x86_64.rpm</filename><sum type="sha256">10e7b26bf0dc78ed4a6ac627d2ad4a1b40196a1c7e564c7305b49b5260229dd7</sum></package><package arch="i686" name="ldns-python" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-python-1.6.16-7.el6.2.i686.rpm</filename><sum type="sha256">6130d309cb08dc3138414df64de5424de83039e7f96a18d43b1f2d3b3f7bfaf6</sum></package><package arch="x86_64" name="ldns-python" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-python-1.6.16-7.el6.2.x86_64.rpm</filename><sum type="sha256">107ee56213d540dd8238e90919ab5ff39c8697d57e083e70bd3e00e432bb9613</sum></package><package arch="i686" name="ldns-devel" release="7.el6.2" src="ldns-1.6.16-7.el6.2.src.rpm" version="1.6.16"><filename>ldns-devel-1.6.16-7.el6.2.i686.rpm</filename><sum type="sha256">6337f4541d1cf4cb0ea63b653e1eb4989e5fecff1e8aa2c0a196822e70664715</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0879" id="RHEA-2016:0879-1" title="Rhea-2016:0879-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:1388-1</id><title>Tzdata Enhancement Update</title><description>Prior to this update, the data files provided by the tzdata package reflected the Egyptian government's plan to transition to daylight saving time (DST) on July 7, but the Egyptian government canceled the planned transition. This update provides tzdata data files that reflect the change of plans, and will thus provide correct time zone information.

This update also includes a time zone transition for Asia/Novosibirsk from +06 to +07 on 2016-07-24 at 02:00.</description><release>Scientific Linux Fermi</release><issued date="2016-08-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016f-1.el6.src.rpm" version="2016f"><filename>tzdata-2016f-1.el6.noarch.rpm</filename><sum type="sha256">1dcd62e1849aaa713a6810fd035249ee87bbce7699b999c7cd3c191a623160fa</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016f-1.el6.src.rpm" version="2016f"><filename>tzdata-java-2016f-1.el6.noarch.rpm</filename><sum type="sha256">90bafdab03dd8bfc164b11cdab3460f3f871e41ccc991d08e489d1c43048eb06</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:1388" id="RHEA-2016:1388-1" title="Rhea-2016:1388-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:1982-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2016g, which provides a number of enhancements over the previous version, notably:

* This update takes into account that Turkey will not transition out of the DST (+03) time zone on 2016-10-30.

* A new leap second will be added on 2016-12-31 23:59:60 UTC, as specified in the IERS Bulletin C 52.</description><release>Scientific Linux Fermi</release><issued date="2016-10-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2016g-2.el6.src.rpm" version="2016g"><filename>tzdata-java-2016g-2.el6.noarch.rpm</filename><sum type="sha256">f05a0748d6094749a630ee15fb572c95f69131b501c01d55aa2f247778b0899a</sum></package><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2016g-2.el6.src.rpm" version="2016g"><filename>tzdata-2016g-2.el6.noarch.rpm</filename><sum type="sha256">be4a9bed9b24b583eaa5f179d6d2670f34c52244837220e77990c3d9aca354a0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:1982" id="RHEA-2016:1982-1" title="Rhea-2016:1982-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356223" id="1356223" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356224" id="1356224" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377711" id="1377711" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377715" id="1377715" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379602" id="1379602" title="A Positive Leap Second Will Be Added On 31St December 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379621" id="1379621" title="A Positive Leap Second Will Be Added On 31St December 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380476" id="1380476" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380481" id="1380481" title="Daylight Savings Time To Be Permanent In Turkey" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2832-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* The Saratov region of Russia will transition from UTC+03 to UTC+04 on 2016-12-04, resulting in a new time zone Europe/Saratov.</description><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016j-1.el6.src.rpm" version="2016j"><filename>tzdata-2016j-1.el6.noarch.rpm</filename><sum type="sha256">19166b1b76c7f8f8fe6270bc8f4c1cc2240448a3a12f174c5f8b9c2810bf814c</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016j-1.el6.src.rpm" version="2016j"><filename>tzdata-java-2016j-1.el6.noarch.rpm</filename><sum type="sha256">aae05e4f273d56b65a995ee9b66f365e8d131e51137efb4444c2a3bb8368c55f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2832" id="RHEA-2016:2832-1" title="Rhea-2016:2832-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398363" id="1398363" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398364" id="1398364" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398378" id="1398378" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398379" id="1398379" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:0671-1</id><title>Nspr And Nss Bug Fix Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.</description><release>Scientific Linux Fermi</release><issued date="2017-04-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nspr" release="1.el6" src="nspr-4.13.1-1.el6.src.rpm" version="4.13.1"><filename>nspr-4.13.1-1.el6.i686.rpm</filename><sum type="sha256">31ad93d87ec3d49c3aa20d7e249e6f98da687e2be9d77897411065ebb8b29b42</sum></package><package arch="x86_64" name="nspr" release="1.el6" src="nspr-4.13.1-1.el6.src.rpm" version="4.13.1"><filename>nspr-4.13.1-1.el6.x86_64.rpm</filename><sum type="sha256">b2f9b35b83037e478d7fa9414d64ac61657eb4d1aad67693aec28fdcf8e4e6e2</sum></package><package arch="x86_64" name="nspr-devel" release="1.el6" src="nspr-4.13.1-1.el6.src.rpm" version="4.13.1"><filename>nspr-devel-4.13.1-1.el6.x86_64.rpm</filename><sum type="sha256">43063ee9e9cb53bab90ca9a3f4a531e38594aeacd035d92371578997841ae79a</sum></package><package arch="i686" name="nspr-devel" release="1.el6" src="nspr-4.13.1-1.el6.src.rpm" version="4.13.1"><filename>nspr-devel-4.13.1-1.el6.i686.rpm</filename><sum type="sha256">f4f309881bfa4c15f55c075b10b0d60f6f082d5c22d2cde509933553ee3e93cb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:0671" id="RHEA-2017:0671-1" title="Rhea-2017:0671-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260678" id="1260678" title="Certificate Verification Fails With Multiple Https Urls [El6/Nss]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269239" id="1269239" title="Nss Does Not Support All Signature Methods For Certificate Verify [Rhel-6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294606" id="1294606" title="Certutil Fails To Merge Sql Databases After Modifying Trust In A Certificate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334337" id="1334337" title="%Check Rpm Macro Used In %Changelog Needs To Be Escaped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335915" id="1335915" title="Disable The Md5 As A Signing Algorithm In Nss Library" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335919" id="1335919" title="Nss: Disable Tls Connections With Less Than 1023-Bit Dh Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337463" id="1337463" title="Disable/Remove Export Ciphersuites In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368993" id="1368993" title="Rebase Nspr In Rhel 6.9.0, To Minimize March 2017 Z-Stream Rebase (Firefox 52 For Rhel 6.9.Z)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368994" id="1368994" title="Rebase Nss-Util In Rhel 6.9.0, To Minimize March 2017 Z-Stream Rebase (Firefox 52 For Rhel 6.9.Z)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368995" id="1368995" title="Rebase Nss In Rhel 6.9.0, To Minimize March 2017 Z-Stream Rebase (Firefox 52 For Rhel 6.9.Z)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387811" id="1387811" title="Secmod_Openuserdb Will Allow Multiple Opens Of The Same Database. [Rhel-6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397979" id="1397979" title="Policy File Requires Empty Line At The End" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:0890-1</id><title>Nss-Util And Nss Bug Fix And Enhancement Update</title><description>The nss-util and nss packages have been upgraded to upstream version 3.28.3, which provides a number of bug fixes and enhancements over the previous version.</description><release>Scientific Linux Fermi</release><issued date="2017-04-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-util" release="1.el6_9" src="nss-util-3.28.3-1.el6_9.src.rpm" version="3.28.3"><filename>nss-util-3.28.3-1.el6_9.x86_64.rpm</filename><sum type="sha256">a73df1f8525552a09fde4cec06a4a7437f61db90897a76682a5e5ef0cfe8fe43</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-pkcs11-devel-3.28.3-3.el6_9.i686.rpm</filename><sum type="sha256">8697078f567eaa7fc24ca4ceeb358539f0e7f4aa8b677907c8280596d7468b72</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-sysinit-3.28.3-3.el6_9.x86_64.rpm</filename><sum type="sha256">687b09ef5d6f64a09d9102590cc6589690f0df819bb598402113d0d9defbaa53</sum></package><package arch="x86_64" name="nss-devel" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-devel-3.28.3-3.el6_9.x86_64.rpm</filename><sum type="sha256">99a53b9e76944ef265460a9af6923267a6580a244374106496aa51a7bf6f1c81</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-pkcs11-devel-3.28.3-3.el6_9.x86_64.rpm</filename><sum type="sha256">573397cc90a5e7ff9dc9d396b2532043359ef239183943bedd703b0e8e48148a</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_9" src="nss-util-3.28.3-1.el6_9.src.rpm" version="3.28.3"><filename>nss-util-devel-3.28.3-1.el6_9.i686.rpm</filename><sum type="sha256">14d4aa8a9db94e6f7e6d602ca7035bcdc0af923dfdae46ed5ede9c30802f277b</sum></package><package arch="i686" name="nss" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-3.28.3-3.el6_9.i686.rpm</filename><sum type="sha256">7cc5549f4579ec949595a04218a940b1a374e06b548b560adad9a037f3ae00f5</sum></package><package arch="x86_64" name="nss-tools" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-tools-3.28.3-3.el6_9.x86_64.rpm</filename><sum type="sha256">253403606974743f2abc40f8e639f986753e74943e94d51c922b7c9d63dce2b7</sum></package><package arch="i686" name="nss-devel" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-devel-3.28.3-3.el6_9.i686.rpm</filename><sum type="sha256">ae63529e5db2fa9582131bbbb98bc449442e2786a033b39266cab1c9eec334a4</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_9" src="nss-util-3.28.3-1.el6_9.src.rpm" version="3.28.3"><filename>nss-util-devel-3.28.3-1.el6_9.x86_64.rpm</filename><sum type="sha256">f3254c7e1fbfe4eeae07795a2d880ab2081bacda8903f7ac1bd82ebc618574cc</sum></package><package arch="x86_64" name="nss" release="3.el6_9" src="nss-3.28.3-3.el6_9.src.rpm" version="3.28.3"><filename>nss-3.28.3-3.el6_9.x86_64.rpm</filename><sum type="sha256">c39d7226c9b942d3040094d8f821b3be1e6c3bf57e133226ca94ed66b64dd232</sum></package><package arch="i686" name="nss-util" release="1.el6_9" src="nss-util-3.28.3-1.el6_9.src.rpm" version="3.28.3"><filename>nss-util-3.28.3-1.el6_9.i686.rpm</filename><sum type="sha256">960d21d2f16a920a6a6e211873eb94ea1c1f92daf866d3b750b5bf7fcd17f972</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:0890" id="RHEA-2017:0890-1" title="Rhea-2017:0890-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425541" id="1425541" title="Rebase Nss-Util In Rhel 6.9.Z To The Version Required By Firefox 52" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425542" id="1425542" title="Rebase Nss In Rhel 6.9.Z To The Version Required By Firefox 52" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:3052-1</id><title>Tzdata Enhancement Update</title><description>* Sudan will switch from UTC+03 to UTC+02 on November 1, 2017. 
* Tonga will no longer use DST (Daylight Saving Time). This change takes effect on November 5, 2017. 
* Fiji ends DST on January 14, 2018 instead of January 21, 2018. 
* Namibia, on September 3, 2017 will switch from UTC+01 with DST to UTC+02 around the year. This change takes effect on April 1, 2018. 
*  On March 11, 2018, the Turks and Caicos Islands will change from UTC-04 to UTC-05 with US DST starting on March 11, 2018. Effective change date is November 4, 2018. 
* tzdata now includes two text versions of the time zone data: the "tzdata.zi" and "leapseconds" files.</description><release>Scientific Linux Fermi</release><issued date="2017-10-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2017c-1.el6.src.rpm" version="2017c"><filename>tzdata-2017c-1.el6.noarch.rpm</filename><sum type="sha256">c42f3d1defe0ae10931a797df80bbdd7d6973b4b48b586117c7880e683154835</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2017c-1.el6.src.rpm" version="2017c"><filename>tzdata-java-2017c-1.el6.noarch.rpm</filename><sum type="sha256">70d1973c6bed76f1fd8c34e8202bace484f5934e816ff4f9754ceb9936e5ce72</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:3052" id="RHEA-2017:3052-1" title="Rhea-2017:3052-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503823" id="1503823" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505685" id="1505685" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505689" id="1505689" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0232-1</id><title>Tzdata Enhancement Update</title><description>* Brazil's Daylight Saving Time (DST) will start on the first Sunday in November.

* Support has been added for the "-t" option for the zic utility. This enables the user to put the configuration link in the specified file instead of the standard location.</description><release>Scientific Linux Fermi</release><issued date="2018-02-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2018c-1.el6.src.rpm" version="2018c"><filename>tzdata-java-2018c-1.el6.noarch.rpm</filename><sum type="sha256">9de078f2470d37c30f16a4285dc0b5edd1bb5ee3e78ce13131170778cffe62f3</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2018c-1.el6.src.rpm" version="2018c"><filename>tzdata-2018c-1.el6.noarch.rpm</filename><sum type="sha256">1c881e691d7705bc094334b7863df3425281ef8fca91f469635a060f05aca5c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0232" id="RHEA-2018:0232-1" title="Rhea-2018:0232-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536028" id="1536028" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536031" id="1536031" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536040" id="1536040" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:1580-1</id><title>Microcode_Ctl Bug Fix And Enhancement Update</title><description /><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="microcode_ctl" release="25.6.el6_9" src="microcode_ctl-1.17-25.6.el6_9.src.rpm" version="1.17"><filename>microcode_ctl-1.17-25.6.el6_9.x86_64.rpm</filename><sum type="sha256">347bbec26dda08c13b94ab38591eba0f132c01dda4ded9f85a36d9ca4734fc43</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:1580" id="RHEA-2018:1580-1" title="Rhea-2018:1580-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:1865-1</id><title>Nspr, Nss, And Nss-Util Bug Fix Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.</description><release>Scientific Linux Fermi</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-pkcs11-devel" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-8.el6.x86_64.rpm</filename><sum type="sha256">0aee85a49488ff785837a1ed8c0ac179392fe2b7702150c6058b2695b400f039</sum></package><package arch="x86_64" name="nss-sysinit" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-sysinit-3.36.0-8.el6.x86_64.rpm</filename><sum type="sha256">628bcd1b619465858e8d9b8f7dd07f689a0b645ab120a1f4c570a2a6992f0e1b</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6" src="nss-util-3.36.0-1.el6.src.rpm" version="3.36.0"><filename>nss-util-devel-3.36.0-1.el6.x86_64.rpm</filename><sum type="sha256">160b32f280e5d9e7e8d7bd28f2c77f984bc1dabfc67c2f270ea2a970df7b4677</sum></package><package arch="x86_64" name="nspr" release="1.el6" src="nspr-4.19.0-1.el6.src.rpm" version="4.19.0"><filename>nspr-4.19.0-1.el6.x86_64.rpm</filename><sum type="sha256">32e7477bb01f399ad168b50889bbfc146d47efc6d64019f90a0c380691b975d7</sum></package><package arch="x86_64" name="nspr-devel" release="1.el6" src="nspr-4.19.0-1.el6.src.rpm" version="4.19.0"><filename>nspr-devel-4.19.0-1.el6.x86_64.rpm</filename><sum type="sha256">1214b86f9b6c67b2a3e9f61006557193796f0cd3bae9a10764dea3fa3490e5c2</sum></package><package arch="i686" name="nspr" release="1.el6" src="nspr-4.19.0-1.el6.src.rpm" version="4.19.0"><filename>nspr-4.19.0-1.el6.i686.rpm</filename><sum type="sha256">60d40c88c7221813bcec0ceca5f8a07d850f933940c14cd19502685d7b583dc2</sum></package><package arch="x86_64" name="nss-util" release="1.el6" src="nss-util-3.36.0-1.el6.src.rpm" version="3.36.0"><filename>nss-util-3.36.0-1.el6.x86_64.rpm</filename><sum type="sha256">8c5ab3b598a2b2496e49418fc6a34187f4ae6729e51ef77a754fa48216d48583</sum></package><package arch="x86_64" name="nss-devel" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-8.el6.x86_64.rpm</filename><sum type="sha256">a609ef592f8d3c92d037f2fbb1bce69d7e1448b44487501e2c97746cb2e175ee</sum></package><package arch="x86_64" name="nss-tools" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-tools-3.36.0-8.el6.x86_64.rpm</filename><sum type="sha256">d64887bb22a470a609151dea4540c064863a3e2363f810e6df8a7ee530d71369</sum></package><package arch="i686" name="nss" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-3.36.0-8.el6.i686.rpm</filename><sum type="sha256">4a1bc97a7418714dc51bbf0684a5f1b1c6f3a27af7e3c1475d8f0b4c43991606</sum></package><package arch="i686" name="nss-pkcs11-devel" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-8.el6.i686.rpm</filename><sum type="sha256">ee086e9969f44c0e2e751191bfe182ff9da745839d4138f82861392531017a7d</sum></package><package arch="i686" name="nss-util" release="1.el6" src="nss-util-3.36.0-1.el6.src.rpm" version="3.36.0"><filename>nss-util-3.36.0-1.el6.i686.rpm</filename><sum type="sha256">ca0a5ca9aed228b393ee1d2e5fd89c0f40e76f196c210d211cd900c675837d18</sum></package><package arch="x86_64" name="nss" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-3.36.0-8.el6.x86_64.rpm</filename><sum type="sha256">49d95a57783e1a641decdae6953b3930ae5726fd1689f543de8ff152cee67681</sum></package><package arch="i686" name="nss-util-devel" release="1.el6" src="nss-util-3.36.0-1.el6.src.rpm" version="3.36.0"><filename>nss-util-devel-3.36.0-1.el6.i686.rpm</filename><sum type="sha256">3974f0df1ad1e11b76134500efea0088dc5b0287a143b0fbf76cf0865005fb83</sum></package><package arch="i686" name="nss-devel" release="8.el6" src="nss-3.36.0-8.el6.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-8.el6.i686.rpm</filename><sum type="sha256">e7e436d23ae1ecd3e63654c4cdcae3bf954f4ffc11caa84686d0272d3846012e</sum></package><package arch="i686" name="nspr-devel" release="1.el6" src="nspr-4.19.0-1.el6.src.rpm" version="4.19.0"><filename>nspr-devel-4.19.0-1.el6.i686.rpm</filename><sum type="sha256">656406402782c64b31d0d4cd33831a0d4d74ae74e5fcc664116482de27402ddd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:1865" id="RHEA-2018:1865-1" title="Rhea-2018:1865-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384107" id="1384107" title="Pkcs#12 Export Illogically Fails With Some Pbe Algorithms [Rhel-6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397486" id="1397486" title="Strsclnt Gets Stuck During Session Resumption When Using Client Certificates [Rhel-6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1455876" id="1455876" title="Support Ticket Based Session Resumption Using Only Ecdsa Certificate [Rhel-6]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494631" id="1494631" title="Pkcs#12 Files With Aes Encrypted Keys Are Malformed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509401" id="1509401" title="Nss Signs Server Key Exchange Message With Rsa+Sha1 If It Doesn'T Recognize Algorithms In Client Hello" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1516518" id="1516518" title="Update Downstream Patch Nss-3.16-Token-Init-Race.Patch For Nss 3.34+" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559993" id="1559993" title="Pkcs#12 Files Created By Nss Are Incompatible With Microsoft Windows [Rhel-6]" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:1212-1</id><title>Microcode_Ctl Enhancement Update</title><description>This update adds the following enhancement: * The Intel CPU microcode has been updated to the latest upstream version to mitigate CVE-2018-12126, CVE-2018-12126, CVE-2018-12126, and CVE-2019-11091.</description><release>Scientific Linux Fermi</release><issued date="2019-05-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="33.11.el6_10" src="microcode_ctl-1.17-33.11.el6_10.src.rpm" version="1.17"><filename>microcode_ctl-1.17-33.11.el6_10.x86_64.rpm</filename><sum type="sha256">ceeb75fb9b4f646cb4ccb3820dc0e6c3d1088560c5ccf310eb7c88931bd5aa2a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:1212" id="RHEA-2019:1212-1" title="Rhea-2019:1212-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1697960" id="1697960" title="Bug Access Denied" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:3280-1</id><title>Nss, Nss-Softokn, Nss-Util And Nspr Bug Fix And Enhancement Update</title><description>The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release.</description><release>Scientific Linux Fermi</release><issued date="2019-11-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nspr" release="1.el6_10" src="nspr-4.21.0-1.el6_10.src.rpm" version="4.21.0"><filename>nspr-4.21.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">4a84d5e7737013cd6275743c31400f66ca7ffd8a7974681bf9b8c51ee9dcc8b7</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_10" src="nss-util-3.44.0-1.el6_10.src.rpm" version="3.44.0"><filename>nss-util-devel-3.44.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">409c22abd517d4624c6796e0a79289a62a726beba640ecdd078ec0555d7fe8b6</sum></package><package arch="x86_64" name="nss-devel" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-devel-3.44.0-7.el6_10.x86_64.rpm</filename><sum type="sha256">eaeec6525c1491c5a2e07189c092b5f96de29245ab88265323182f267e4a0ab5</sum></package><package arch="i686" name="nss" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-3.44.0-7.el6_10.i686.rpm</filename><sum type="sha256">7cbd70bef055e0a871668e47ae1776c67a1a03bd86da3ff2ed88c5186e374539</sum></package><package arch="x86_64" name="nss-util" release="1.el6_10" src="nss-util-3.44.0-1.el6_10.src.rpm" version="3.44.0"><filename>nss-util-3.44.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">cdf0824fb34f00c118afc642f4498624a2892f92807cbf51dca9fc0a06930578</sum></package><package arch="x86_64" name="nss-softokn-devel" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-5.el6_10.x86_64.rpm</filename><sum type="sha256">56264e297a333d2c4b1945c40d769d651707779eccc2a9d2f6f1bdea718affe1</sum></package><package arch="x86_64" name="nss-tools" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-tools-3.44.0-7.el6_10.x86_64.rpm</filename><sum type="sha256">241b9717428f59d940bc700c49f4157139e8ec6774b53a28b5da84635a8bb7b0</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-5.el6_10.i686.rpm</filename><sum type="sha256">9a5978576dc18065ac5080ce9c925d5ca9cca66e2d67e068daf38cbf70a4eaad</sum></package><package arch="i686" name="nss-util" release="1.el6_10" src="nss-util-3.44.0-1.el6_10.src.rpm" version="3.44.0"><filename>nss-util-3.44.0-1.el6_10.i686.rpm</filename><sum type="sha256">609f04ec4a2525a0d8d9a07b2ee809fea3ca69c1fc8344e4edf085c4eba37769</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-pkcs11-devel-3.44.0-7.el6_10.x86_64.rpm</filename><sum type="sha256">347f89d087fab209c6038d530e186ee540cbd900f18206cb06b1f42c378ea736</sum></package><package arch="i686" name="nss-devel" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-devel-3.44.0-7.el6_10.i686.rpm</filename><sum type="sha256">f5cc0e653315b63ed8f33b022a23930206be9436d42ad2a4c3afe9bcc5bfe820</sum></package><package arch="i686" name="nspr" release="1.el6_10" src="nspr-4.21.0-1.el6_10.src.rpm" version="4.21.0"><filename>nspr-4.21.0-1.el6_10.i686.rpm</filename><sum type="sha256">3ec55d700846f9f7e59f2203aed75413c3393a4518541e28d30eae1594d03b98</sum></package><package arch="x86_64" name="nss" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-3.44.0-7.el6_10.x86_64.rpm</filename><sum type="sha256">d6cc947dbb89aef1e0b654d81e9dfd2da66e428a7ee56640b7087471788c8dd1</sum></package><package arch="i686" name="nss-softokn-freebl" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-5.el6_10.i686.rpm</filename><sum type="sha256">3ef47aa10369ef5e10b78e6e4d6871c8992140b3876acf2e67fda9822f68b021</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_10" src="nss-util-3.44.0-1.el6_10.src.rpm" version="3.44.0"><filename>nss-util-devel-3.44.0-1.el6_10.i686.rpm</filename><sum type="sha256">63024af655b77fc6ac02b9548d5808451204a6226a1c702118ed8dcf1ce701a6</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-5.el6_10.x86_64.rpm</filename><sum type="sha256">3c935efd6af55e816e2c6e3f33452b389e2cc44b0e2a7db2f51be6d43b0541d0</sum></package><package arch="i686" name="nspr-devel" release="1.el6_10" src="nspr-4.21.0-1.el6_10.src.rpm" version="4.21.0"><filename>nspr-devel-4.21.0-1.el6_10.i686.rpm</filename><sum type="sha256">371c05559f0ebb77332c15478ef85f3febc3ab84a5cf77f08f1f3a6325985f33</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-5.el6_10.x86_64.rpm</filename><sum type="sha256">8599d4352d0f052d5a3dc9f3215d8a56ff149c661c2ed421ce887d7db4edbdad</sum></package><package arch="i686" name="nss-softokn" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-5.el6_10.i686.rpm</filename><sum type="sha256">5f346059c0b817e31dd71c56b780c8c08f6d501a5bf6c5177eb8b72d91b7c83a</sum></package><package arch="i686" name="nss-softokn-devel" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-5.el6_10.i686.rpm</filename><sum type="sha256">7cd6baf9f77fe0889bd3df37ba0b69d1a8098718c9adda2cf6ab1d95f721602c</sum></package><package arch="i686" name="nss-pkcs11-devel" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-pkcs11-devel-3.44.0-7.el6_10.i686.rpm</filename><sum type="sha256">c9ec26643fab67c23805dacaeceab64d9677edd959e2876ca109ec12a6265ec7</sum></package><package arch="x86_64" name="nspr-devel" release="1.el6_10" src="nspr-4.21.0-1.el6_10.src.rpm" version="4.21.0"><filename>nspr-devel-4.21.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">276317affc7ec5db3dd23ab75ca247950401ca7cb7007c29edc7760fb14c6c4f</sum></package><package arch="x86_64" name="nss-sysinit" release="7.el6_10" src="nss-3.44.0-7.el6_10.src.rpm" version="3.44.0"><filename>nss-sysinit-3.44.0-7.el6_10.x86_64.rpm</filename><sum type="sha256">0428f3a5ae8f97960b4293aa0a2de1960689be608a7012fe62e86e2424a24bd6</sum></package><package arch="x86_64" name="nss-softokn" release="5.el6_10" src="nss-softokn-3.44.0-5.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-5.el6_10.x86_64.rpm</filename><sum type="sha256">eddfa7f812a495fbc5ab980e6f2f41cfb26888bdd4f1f4eeec86036b6a525dd3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:3280" id="RHEA-2019:3280-1" title="Rhea-2019:3280-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLF6.5:ocsinventory-fermi</id><title>Ocsinventory-Fermi Enhancement Update</title><description>- On SLF 6 some systems now use a name other than ethx for ethernet
- On Dell systems in particular  em1 is used 
- Symptom of this was no "NETWORKS" entry sent to server</description><release>Scientific Linux Fermi</release><issued date="2014-04-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ocsinventory-fermi" release="17" src="ocsinventory-fermi-0.9.9-17.src.rpm" version="0.9.9"><filename>ocsinventory-fermi-0.9.9-17.noarch.rpm</filename><sum type="sha256">eef48610268f621d75ed894f3026f777013fccd25a63a9932dc6ac09db420505</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1752-1</id><title>Important: 389-Ds-Base Security Update</title><description>It was discovered that the 389 Directory Server did not properly handle certain Get Effective Rights (GER) search queries when the attribute list, which is a part of the query, included several names using the '@' character. An attacker able to submit search queries to the 389 Directory Server could cause it to crash. (CVE-2013-4485) 
After installing this update, the 389 server service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="389-ds-base-libs" release="30.el6_5" src="389-ds-base-1.2.11.15-30.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-30.el6_5.i686.rpm</filename><sum type="sha256">b8db8663d002536a15dbbe7e96abdddca83761a7ac18581bd6842892aeb2e31a</sum></package><package arch="i686" name="389-ds-base-devel" release="30.el6_5" src="389-ds-base-1.2.11.15-30.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-30.el6_5.i686.rpm</filename><sum type="sha256">146d263e9b06af0f4994250e57a942f0ba94f4b996cecc8798170ff56e2870c8</sum></package><package arch="x86_64" name="389-ds-base-libs" release="30.el6_5" src="389-ds-base-1.2.11.15-30.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-30.el6_5.x86_64.rpm</filename><sum type="sha256">65d1d12b67e1eee00d13b278b0e628ac2fc0ed7e7a8769730403c73e315d204e</sum></package><package arch="x86_64" name="389-ds-base" release="30.el6_5" src="389-ds-base-1.2.11.15-30.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-30.el6_5.x86_64.rpm</filename><sum type="sha256">e9a3f8e80d85ea115a7b563a87fe284d25ef21cd5228a3c8ea259cb42f30a189</sum></package><package arch="x86_64" name="389-ds-base-devel" release="30.el6_5" src="389-ds-base-1.2.11.15-30.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-30.el6_5.x86_64.rpm</filename><sum type="sha256">7a68a046b7156b68453d1a3e89828000f651aa76253c78f8448cf78ec38610ba</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4485" id="CVE-2013-4485" title="389-Ds-Base: Dos Due To Improper Handling Of Ger Attr Searches" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1024552" id="1024552" title="389-Ds-Base: Dos Due To Improper Handling Of Ger Attr Searches" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1752.html" id="RHSA-2013:1752-1" title="Rhsa-2013:1752-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1764-1</id><title>Critical: Ruby Security Update</title><description>A buffer overflow flaw was found in the way Ruby parsed floating point numbers from their text representation. If an application using Ruby accepted untrusted input strings and converted them to floating point numbers, an attacker able to provide such input could cause the application to crash or, possibly, execute arbitrary code with the privileges of the application. (CVE-2013-4164)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ruby-ri" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-ri-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">afdd7cd06b1d44cb6f91236079adf9c888a6e9e306368b076c7f16528c308b8e</sum></package><package arch="x86_64" name="ruby-rdoc" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-rdoc-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">6ab6235dd1f70dbd355301b9aedd465fbeb1ef550ad04b0f1d5a1bab3725ddc1</sum></package><package arch="x86_64" name="ruby-docs" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-docs-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">daa8e42c9e656b8a5cae80df5d1106c744c9bf8f11ff3a9a3b6e585db6f1f77c</sum></package><package arch="x86_64" name="ruby-tcltk" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-tcltk-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">1e968efd6fe5e125bceae4636a36c5809783c2ba6ee4f2a3a736da39e905a2eb</sum></package><package arch="x86_64" name="ruby" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">c333db5937b3dcf35d349c54b35867c5d885805d8dd14910a3c3b5e4ae9ee7a9</sum></package><package arch="i686" name="ruby-libs" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-libs-1.8.7.352-13.el6.i686.rpm</filename><sum type="sha256">da3ef964f8df3e5658118dda6b8d7ea9b41b673b021d1df320fe16ac6268766b</sum></package><package arch="x86_64" name="ruby-irb" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-irb-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">899c0b29c9d654848629363110a8b6c24bc3f8b0920e9213ac1edee0375ce8e0</sum></package><package arch="x86_64" name="ruby-devel" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-devel-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">4934124f57eff67105a1c2c1561f43fdfe4b82f2a6840f5aabbe0d02f885abb4</sum></package><package arch="x86_64" name="ruby-static" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-static-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">0411e5b0e7f7c49b7df79a20d2d99c175b1987de53e79ceaf4b0d6f841533282</sum></package><package arch="i686" name="ruby-devel" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-devel-1.8.7.352-13.el6.i686.rpm</filename><sum type="sha256">3ea6790c80a8c8de8c55ae7711b546663a3adf417e800bce6ebe4e1fdf3a376d</sum></package><package arch="x86_64" name="ruby-libs" release="13.el6" src="ruby-1.8.7.352-13.el6.src.rpm" version="1.8.7.352"><filename>ruby-libs-1.8.7.352-13.el6.x86_64.rpm</filename><sum type="sha256">97aa77c4aa72b471162d6d4f2706cbd0127e16e1d7cf5ce129ae8c34b8823968</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164" id="CVE-2013-4164" title="Ruby: Heap Overflow In Floating Point Parsing" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1033460" id="1033460" title="Ruby: Heap Overflow In Floating Point Parsing" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1764.html" id="RHSA-2013:1764-1" title="Rhsa-2013:1764-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1778-1</id><title>Moderate: Gimp Security Update</title><description>A stack-based buffer overflow flaw, a heap-based buffer overflow, and an integer overflow flaw were found in the way GIMP loaded certain X Window System (XWD) image dump files. A remote attacker could provide a specially crafted XWD image file that, when processed, would cause the XWD plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-5576, CVE-2013-1913, CVE-2013-1978) 
The GIMP must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="gimp" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-2.6.9-6.el6_5.x86_64.rpm</filename><sum type="sha256">9fc3a57360a5d4df9ca36537cb55a6a09b773e9fab717eaf4ecd2fe28c91d231</sum></package><package arch="x86_64" epoch="2" name="gimp-help-browser" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-help-browser-2.6.9-6.el6_5.x86_64.rpm</filename><sum type="sha256">35acd49d7278ad625835931303dab20f18e28f08904f6c996f4b7f8662b81d76</sum></package><package arch="x86_64" epoch="2" name="gimp-devel-tools" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-devel-tools-2.6.9-6.el6_5.x86_64.rpm</filename><sum type="sha256">e6d9ca9da9d1cf778c809c8d6b508674da5f2d36915f031fc93c42e0bbe19e66</sum></package><package arch="x86_64" epoch="2" name="gimp-devel" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-devel-2.6.9-6.el6_5.x86_64.rpm</filename><sum type="sha256">144ac80638909cc26ea5b1f571c10bb2816e5372433e36c029d3c03eb7e114ac</sum></package><package arch="x86_64" epoch="2" name="gimp-libs" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-libs-2.6.9-6.el6_5.x86_64.rpm</filename><sum type="sha256">85106bbcef427a14e984945e56677f74f98441a8244972d1189cc58abe0160b8</sum></package><package arch="i686" epoch="2" name="gimp-devel" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-devel-2.6.9-6.el6_5.i686.rpm</filename><sum type="sha256">9598ad03013a52a71fb0d29331f4e927d4aadf6321a1abd731c4e3a9b724e87e</sum></package><package arch="i686" epoch="2" name="gimp-libs" release="6.el6_5" src="gimp-2.6.9-6.el6_5.src.rpm" version="2.6.9"><filename>gimp-libs-2.6.9-6.el6_5.i686.rpm</filename><sum type="sha256">20cf22907fe1cedd00cf4f4b8e8edc7f3e5bedf99a549d8fee01399117c9fa60</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576" id="CVE-2012-5576" title="Gimp (Xwd Plug-In): Stack-Based Buffer Overflow When Loading Xwd File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913" id="CVE-2013-1913" title="Gimp: Xwd Plugin G_New() Integer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978" id="CVE-2013-1978" title="Gimp: Xwd Plugin Color Map Heap-Based Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=879302" id="879302" title="Gimp (Xwd Plug-In): Stack-Based Buffer Overflow When Loading Xwd File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=947868" id="947868" title="Gimp: Xwd Plugin G_New() Integer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=953902" id="953902" title="Gimp: Xwd Plugin Color Map Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1778.html" id="RHSA-2013:1778-1" title="Rhsa-2013:1778-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1779-1</id><title>Moderate: Mod_Nss Security Update</title><description>A flaw was found in the way mod_nss handled the NSSVerifyClient setting for the per-directory context. When configured to not require a client certificate for the initial connection and only require it for a specific directory, mod_nss failed to enforce this requirement and allowed a client to access the directory when no valid client certificate was provided. (CVE-2013-4566) 
The httpd service must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mod_nss" release="19.el6_5" src="mod_nss-1.0.8-19.el6_5.src.rpm" version="1.0.8"><filename>mod_nss-1.0.8-19.el6_5.x86_64.rpm</filename><sum type="sha256">87eba69348253943f3240bdd1041460bf0ef9f3a4e85e9192729f0e8a7aad296</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566" id="CVE-2013-4566" title="Mod_Nss: Incorrect Handling Of Nssverifyclient In Directory Context" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1016832" id="1016832" title="Mod_Nss: Incorrect Handling Of Nssverifyclient In Directory Context" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1779.html" id="RHSA-2013:1779-1" title="Rhsa-2013:1779-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1801-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the Linux kernel's TCP/IP protocol suite implementation handled sending of certain UDP packets over sockets that used the UDP_CORK option when the UDP Fragmentation Offload (UFO) feature was enabled on the output device. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges on the system. (CVE-2013-4470, Important) 
* A divide-by-zero flaw was found in the apic_get_tmcct() function in KVM's Local Advanced Programmable Interrupt Controller (LAPIC) implementation. A privileged guest user could use this flaw to crash the host. (CVE-2013-6367, Important) 
* A memory corruption flaw was discovered in the way KVM handled virtual APIC accesses that crossed a page boundary. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2013-6368, Important) 
* An information leak flaw in the Linux kernel could allow a local, unprivileged user to leak kernel memory to user space. (CVE-2013-2141, Low) 
This update also fixes several bugs and adds two enhancements. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-perf" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">74f6c24ba3c5ff6c5066ae89f3ad42b669e68f3e1d5fc0e73f588f4cc050ca0b</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.1.2.el6.noarch.rpm</filename><sum type="sha256">5327f84d598f803eed6186b82710bfe1fe3de5ff9282df77cb2def49ba1bf900</sum></package><package arch="x86_64" name="perf" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">f90a6aa5513a69d7d288a2b450c240f78399c225bf3945e64f40f3e56440809a</sum></package><package arch="x86_64" name="kernel-headers" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">c88118ad761e6a770ddeeaaef9533076eb8fcf5714b90ce98d8c8d53f8ec1f7e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">0fcf43c8348fbc569799143643a1712e48df3d03a3fe9fe25757565a157e84ec</sum></package><package arch="x86_64" name="kernel-debug" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">389be726f0bbb4b0fd3b23b4ec4d3dd69b27d7cfb3387ddddb13089043252bac</sum></package><package arch="noarch" name="kernel-firmware" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.1.2.el6.noarch.rpm</filename><sum type="sha256">b2a5c26da9eabef4433b8060f1c68d9aba5494b1595777cff077bfce94586553</sum></package><package arch="x86_64" name="kernel-devel" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">b88ac4cda7b16c99ffce120c62e871cb5d006973ceea6db93a5290ea23c618ab</sum></package><package arch="x86_64" name="kernel" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.1.2.el6.x86_64.rpm</filename><sum type="sha256">37e69c4fd5999be3b7ab7bd2e15282992f91b47898812b65ffb8f8d715d091eb</sum></package><package arch="noarch" name="kernel-doc" release="431.1.2.el6" src="kernel-2.6.32-431.1.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.1.2.el6.noarch.rpm</filename><sum type="sha256">a8fbc30d95ef2755714d2e6182c28fd7825fd3f477b35cddc29768aa5d8153d1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141" id="CVE-2013-2141" title="Kernel: Signal: Information Leak In Tkill/Tgkill" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470" id="CVE-2013-4470" title="Kernel: Net: Memory Corruption With Udp_Cork And Ufo" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367" id="CVE-2013-6367" title="Kvm: Division By Zero In Apic_Get_Tmcct()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368" id="CVE-2013-6368" title="Kvm: Cross Page Vapic_Addr Access" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1023477" id="1023477" title="Kernel: Net: Memory Corruption With Udp_Cork And Ufo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1032207" id="1032207" title="Kvm: Division By Zero In Apic_Get_Tmcct()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1032210" id="1032210" title="Kvm: Cross Page Vapic_Addr Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=970873" id="970873" title="Kernel: Signal: Information Leak In Tkill/Tgkill" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1801.html" id="RHSA-2013:1801-1" title="Rhsa-2013:1801-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1803-1</id><title>Moderate: Libjpeg-Turbo Security Update</title><description>An uninitialized memory read issue was found in the way libjpeg-turbo decoded images with missing Start Of Scan (SOS) JPEG markers or Define Huffman Table (DHT) JPEG markers. A remote attacker could create a specially crafted JPEG image that, when decoded, could possibly lead to a disclosure of potentially sensitive information. (CVE-2013-6629, CVE-2013-6630)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libjpeg-turbo-static" release="3.el6_5" src="libjpeg-turbo-1.2.1-3.el6_5.src.rpm" version="1.2.1"><filename>libjpeg-turbo-static-1.2.1-3.el6_5.x86_64.rpm</filename><sum type="sha256">f7fc1e17e6f5ac30d3c31997b4b97e98a5f41dd3c1fe8701954db9e2815368a6</sum></package><package arch="x86_64" name="libjpeg-turbo-devel" release="3.el6_5" src="libjpeg-turbo-1.2.1-3.el6_5.src.rpm" version="1.2.1"><filename>libjpeg-turbo-devel-1.2.1-3.el6_5.x86_64.rpm</filename><sum type="sha256">e2b0c56727a5728613f0860b067d32fdf8b114409c1a7497135cc77c94cfff6f</sum></package><package arch="i686" name="libjpeg-turbo" release="3.el6_5" src="libjpeg-turbo-1.2.1-3.el6_5.src.rpm" version="1.2.1"><filename>libjpeg-turbo-1.2.1-3.el6_5.i686.rpm</filename><sum type="sha256">f113e84dc072be22bdae2be21b504c6623ce36be4c777f5fd6ff9bba354e2efd</sum></package><package arch="i686" name="libjpeg-turbo-devel" release="3.el6_5" src="libjpeg-turbo-1.2.1-3.el6_5.src.rpm" version="1.2.1"><filename>libjpeg-turbo-devel-1.2.1-3.el6_5.i686.rpm</filename><sum type="sha256">6000fe3a5c9c60a1edeb39bb30a566bfc2a75be7c354b2843971387dc20765a5</sum></package><package arch="x86_64" name="libjpeg-turbo" release="3.el6_5" src="libjpeg-turbo-1.2.1-3.el6_5.src.rpm" version="1.2.1"><filename>libjpeg-turbo-1.2.1-3.el6_5.x86_64.rpm</filename><sum type="sha256">42134c183b5ff840e9002f8e230e1a690a544cacebabac4e0ac1d751b724d0a5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" id="CVE-2013-6629" title="Libjpeg: Information Leak (Read Of Uninitialized Memory)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" id="CVE-2013-6630" title="Libjpeg: Information Leak (Read Of Uninitialized Memory)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031734" id="1031734" title="Libjpeg: Information Leak (Read Of Uninitialized Memory)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031749" id="1031749" title="Libjpeg: Information Leak (Read Of Uninitialized Memory)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1803.html" id="RHSA-2013:1803-1" title="Rhsa-2013:1803-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1805-1</id><title>Important: Samba4 Security Update</title><description>A heap-based buffer overflow flaw was found in the DCE-RPC client code in Samba. A specially crafted DCE-RPC packet could cause various Samba programs to crash or, possibly, execute arbitrary code when parsed. A malicious or compromised Active Directory Domain Controller could use this flaw to compromise the winbindd daemon running with root privileges. (CVE-2013-4408) 
After installing this update, the smb service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-common" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-common-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">e8202def81385d8fc0854a4a23556a9ae9f5cf9641fb4722ec6eb3535396a473</sum></package><package arch="x86_64" name="samba4-winbind" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">d6f0ba87401454784ac1631c6c887849cd7061821a07841addac47745047c798</sum></package><package arch="x86_64" name="samba4-swat" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-swat-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">b1be3394054b4afeaa47c9ad3c349a1d844f58d09d290c315f6cd10c4d61ec62</sum></package><package arch="x86_64" name="samba4-devel" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-devel-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">941ccc01372aea14799f6ee48dfa29a1ef8b1ef9b0ca434ff8f3ec3f68214a9f</sum></package><package arch="x86_64" name="samba4-dc" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">6b5d6ba2048039c3868c71aace46a94469a72982994120271f5154d58ea07ed5</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-clients-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">7a2b4f3e790efa342ef9146352828dd7ed1ce45a2df5e7b1af0cacffc37576df</sum></package><package arch="x86_64" name="samba4-libs" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-libs-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">d3093808c061f5f0043ade478761af051f7dab677091b71fd290574ffc0b9f14</sum></package><package arch="x86_64" name="samba4-client" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-client-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">e51ffc57af8f01dc5aa8f4987f171bca8fbba61471db6525ae8f01ca4b3db6ca</sum></package><package arch="x86_64" name="samba4-python" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-python-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">4b382d0a9a0316dfc18f0280450455727d9f39a0c1f2a7ce59b42e4751743600</sum></package><package arch="x86_64" name="samba4-test" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-test-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">213680ef91e57403147461c596a80b8b62c217f187a866243d076b54a5a68014</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-krb5-locator-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">d317d0c1e1d91d72660ce2a4e9b7a1cebb869f5c7e145de7a1db4f4731e14aac</sum></package><package arch="x86_64" name="samba4-pidl" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-pidl-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">dc3079a374b12daed5b0ed6bcb0d564c224ad34ed792f6e4d927795aefdc6b70</sum></package><package arch="x86_64" name="samba4" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">a7f11e76ea7c7e3e9a4d48425cad101721665e083b14816ded634b20dc84bb06</sum></package><package arch="x86_64" name="samba4-dc-libs" release="60.el6_5.rc4" src="samba4-4.0.0-60.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-libs-4.0.0-60.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">50c1d3a758511513961a189b81987494f499f4fae3d888bb5fc8a7a790c5863f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" id="CVE-2013-4408" title="Samba: Heap-Based Buffer Overflow Due To Incorrect Dce-Rpc Fragment Length Field Check" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1018032" id="1018032" title="Samba: Heap-Based Buffer Overflow Due To Incorrect Dce-Rpc Fragment Length Field Check" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1805.html" id="RHSA-2013:1805-1" title="Rhsa-2013:1805-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1806-1</id><title>Important: Samba And Samba3X Security Update</title><description>A heap-based buffer overflow flaw was found in the DCE-RPC client code in Samba. A specially crafted DCE-RPC packet could cause various Samba programs to crash or, possibly, execute arbitrary code when parsed. A malicious or compromised Active Directory Domain Controller could use this flaw to compromise the winbindd daemon running with root privileges. (CVE-2013-4408) 
A flaw was found in the way Samba performed ACL checks on alternate file and directory data streams. An attacker able to access a CIFS share with alternate stream support enabled could access alternate data streams regardless of the underlying file or directory ACL permissions. (CVE-2013-4475) 
After installing this update, the smb service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-swat" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-swat-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">82cd98efe45ea91a93de1907e0d3701016545544c9e939e36bdbe1e57622e6da</sum></package><package arch="x86_64" name="samba-winbind-devel" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-devel-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">9a2bf92eb1adcc1c676f153425239a65955b7ac090219044164b7768aae1fd12</sum></package><package arch="x86_64" name="samba-doc" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-doc-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">1c081fa79cf686536515bd2c2ff302a67217c31c4d1e0623434a4ef46329f0c3</sum></package><package arch="i686" name="libsmbclient-devel" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-devel-3.6.9-167.el6_5.i686.rpm</filename><sum type="sha256">6f1be68276278f9bbcf2c5ae02719e1d06a58cf7fbc16dcfbab52ac032861557</sum></package><package arch="x86_64" name="libsmbclient" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">b080b04b3da1c9c73a7f8d35614f5f57df920b56339cc9550ef1be34988297a6</sum></package><package arch="x86_64" name="samba-winbind" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">61ff060bde7889707526f5be9370fb2a2e5855880263efb39d8ad08192e9593a</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-domainjoin-gui-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">297cfcb1756213ed0e85d95de9983d9b37dfe4f889004939677a8248c2e0af5c</sum></package><package arch="i686" name="samba-winbind-clients" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-clients-3.6.9-167.el6_5.i686.rpm</filename><sum type="sha256">c1fef84708c7128c6b642c0f8b36ee4a78a584cbd1a2c877e89e6a7fe2496da4</sum></package><package arch="i686" name="samba-winbind-devel" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-devel-3.6.9-167.el6_5.i686.rpm</filename><sum type="sha256">5d653af465e50c1e4ef00d7dbceb68ede29ae4ccab702ec6b8e6872d570bf2ef</sum></package><package arch="x86_64" name="samba-common" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-common-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">d57d910b7bbb8a83425e42518941e2653817c3fb1ba79d6ceaf75a81a52ee8f3</sum></package><package arch="x86_64" name="libsmbclient-devel" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-devel-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">4868a463fefd172ee6f7eb1b6a7e449c726bafac7c1ac702d53e4ed3fe2ee12a</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-krb5-locator-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">553e3e8e9277d53f56145462d1bd0d28a69c37944ec91b5f3cbcff0d2273fc53</sum></package><package arch="i686" name="samba-common" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-common-3.6.9-167.el6_5.i686.rpm</filename><sum type="sha256">2e4251b145882212c1bbd990a6b30b0462986f27bba59f96b23f8b6d4471e492</sum></package><package arch="x86_64" name="samba-winbind-clients" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-clients-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">29fbeba011ab6ab2f63e879996d298716655a6f058f89a8c1bb9d1bff6729c16</sum></package><package arch="i686" name="libsmbclient" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-3.6.9-167.el6_5.i686.rpm</filename><sum type="sha256">71275b160d5745cac3ab9de2a1faaac03fce63128b04c72c4c5ce2a13aca5fe9</sum></package><package arch="x86_64" name="samba-client" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-client-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">c8548f7bffde259d5b434518421c85dd7e4bcad72b56d909d6568964104f70e0</sum></package><package arch="x86_64" name="samba" release="167.el6_5" src="samba-3.6.9-167.el6_5.src.rpm" version="3.6.9"><filename>samba-3.6.9-167.el6_5.x86_64.rpm</filename><sum type="sha256">a40aad81b4c9b3f66cc49916a2fbb54c73445faf3c3cb2ef583568fbc0fbddc9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" id="CVE-2013-4408" title="Samba: Heap-Based Buffer Overflow Due To Incorrect Dce-Rpc Fragment Length Field Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" id="CVE-2013-4475" title="Samba: No Access Check Verification On Stream Files" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1018032" id="1018032" title="Samba: Heap-Based Buffer Overflow Due To Incorrect Dce-Rpc Fragment Length Field Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1024542" id="1024542" title="Samba: No Access Check Verification On Stream Files" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1806.html" id="RHSA-2013:1806-1" title="Rhsa-2013:1806-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1812-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to terminate unexpectedly or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2013-5609, CVE-2013-5616, CVE-2013-5618, CVE-2013-6671, CVE-2013-5613) 
A flaw was found in the way Firefox rendered web content with missing character encoding information. An attacker could use this flaw to possibly bypass same-origin inheritance and perform cross-site scripting (XSS) attacks. (CVE-2013-5612) 
It was found that certain malicious web content could bypass restrictions applied by sandboxed iframes. An attacker could combine this flaw with other vulnerabilities to execute arbitrary code with the privileges of the user running Firefox. (CVE-2013-5614) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_5" src="firefox-24.2.0-1.el6_5.src.rpm" version="24.2.0"><filename>firefox-24.2.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">2d46f164c2c46a88ba5b7a3368f8b903e9e2f8e56dc5d91143c42378d286a1b9</sum></package><package arch="i686" name="firefox" release="1.el6_5" src="firefox-24.2.0-1.el6_5.src.rpm" version="24.2.0"><filename>firefox-24.2.0-1.el6_5.i686.rpm</filename><sum type="sha256">3ffbba2e46b290627559f62b541c60e808539afded6e4c552da8eeedb1a59e29</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" id="CVE-2013-5609" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.2) (Mfsa 2013-104)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" id="CVE-2013-5612" title="Mozilla: Character Encoding Cross-Origin Xss Attack (Mfsa 2013-106)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" id="CVE-2013-5613" title="Mozilla: Use-After-Free In Synthetic Mouse Movement (Mfsa 2013-114)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" id="CVE-2013-5614" title="Mozilla: Sandbox Restrictions Not Applied To Nested Object Elements (Mfsa 2013-107)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" id="CVE-2013-5616" title="Mozilla: Use-After-Free In Event Listeners (Mfsa 2013-108)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" id="CVE-2013-5618" title="Mozilla: Use-After-Free During Table Editing (Mfsa 2013-109)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" id="CVE-2013-6671" title="Mozilla: Segmentation Violation When Replacing Ordered List Elements (Mfsa 2013-111)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039417" id="1039417" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.2) (Mfsa 2013-104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039420" id="1039420" title="Mozilla: Character Encoding Cross-Origin Xss Attack (Mfsa 2013-106)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039421" id="1039421" title="Mozilla: Sandbox Restrictions Not Applied To Nested Object Elements (Mfsa 2013-107)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039422" id="1039422" title="Mozilla: Use-After-Free In Event Listeners (Mfsa 2013-108)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039423" id="1039423" title="Mozilla: Use-After-Free During Table Editing (Mfsa 2013-109)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039426" id="1039426" title="Mozilla: Segmentation Violation When Replacing Ordered List Elements (Mfsa 2013-111)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039429" id="1039429" title="Mozilla: Use-After-Free In Synthetic Mouse Movement (Mfsa 2013-114)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1812.html" id="RHSA-2013:1812-1" title="Rhsa-2013:1812-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1813-1</id><title>Critical: Php53 And Php Security Update</title><description>A memory corruption flaw was found in the way the openssl_x509_parse() function of the PHP openssl extension parsed X.509 certificates. A remote attacker could use this flaw to provide a malicious self-signed certificate or a certificate signed by a trusted authority to a PHP application using the aforementioned function, causing the application to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the user running the PHP interpreter. (CVE-2013-6420) 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-embedded" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">7c2a4dd43bb46e89244b1108262fcd51cb2ecb1b38bdf98952c4c576dbd3fefd</sum></package><package arch="x86_64" name="php-enchant" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">b5988413b22560ca9f6a01e54d746d6984df2ed84ced15cb3ff6437eb2d9e541</sum></package><package arch="x86_64" name="php-xml" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">1e2666080ed4caa49a899e6ead79cb9b450d5f8f6204b8e4b0181b2e0751a6cc</sum></package><package arch="x86_64" name="php-process" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-process-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">a6a1c2162d8e3906f973800f154929df30b20fac111647b26275aee6f9e5e99f</sum></package><package arch="x86_64" name="php-fpm" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">1a8b59423720546df8b1e49ab058f8818c5f0807d9f4350653c820713a1429b1</sum></package><package arch="x86_64" name="php-xmlrpc" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">5a761e7c134ae3bb8a81992e113b1e7807b3e5b309aabd02ee8df213793d5d25</sum></package><package arch="x86_64" name="php-snmp" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">c16e793e9453e402daeee4023742caf0d4004ef41e9ec65ff0151687d0d90c19</sum></package><package arch="x86_64" name="php-gd" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">bf138b68954f98853f60795ce1a261d87b1d06a1d2b8a177e6ce41519fa8bcee</sum></package><package arch="x86_64" name="php-mysql" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">0ba1512b3d90eff05d4279566951bfbf3f1f2ad3da0847f9eec8dd404753f7c1</sum></package><package arch="x86_64" name="php-odbc" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">2e8e1b5b881ac1214b12c10335ab9fef54a5f2c49068550b6419fc448766b399</sum></package><package arch="x86_64" name="php" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">7d9bf20d2c46cd9bd265224399fcf574e773f147a14ce2c9c40e88365a656201</sum></package><package arch="x86_64" name="php-zts" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">67d3046e86428f4ff65d30ee611f9ca0ab2d06b3d613425a2524a3b489942854</sum></package><package arch="x86_64" name="php-bcmath" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">9345490f2cce40a88f314d5069df546eccc8a74a652169f6175e6b1ba3aa7126</sum></package><package arch="x86_64" name="php-soap" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">b24ee7d83dc341e58a49f8a09d5b3acec5a91a1f3472f63e6cdb3cb842a64c61</sum></package><package arch="x86_64" name="php-mbstring" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">51c55652b655d3f1ced8c7186aa7aca23ea99c93200a2b778c0978dcdeed038d</sum></package><package arch="x86_64" name="php-tidy" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">dc3d54d508e5eb9e348106a55ffd30f83c5ad9ad3782aaf1b2d5fd44d352dba2</sum></package><package arch="x86_64" name="php-pspell" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">760a9a8e85281ffed441f428cc2f3e15811def8345946b1d1552e7d7e2a41a9b</sum></package><package arch="x86_64" name="php-pgsql" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">d0b02cb7fc1254a4dd3c2f610ae9864737403c94919438ee446eb4e5c674f9ff</sum></package><package arch="x86_64" name="php-common" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-common-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">6903f12dc8cbacf76674970cbda7951cd1759b629dea9c7c92a7a9dabbb0cdbd</sum></package><package arch="x86_64" name="php-recode" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">424c6f220cce33a0ed7c215a7dadef39b3db2e6db0655904478e83b32434210e</sum></package><package arch="x86_64" name="php-intl" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">19626430f3434a2bf7240da7693962d6db92f45e477491178d009ddb88f077eb</sum></package><package arch="x86_64" name="php-ldap" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">f43f605b97475a6d8400e1ed92125893425ba2cc27c61b3f617b96fd6b071a03</sum></package><package arch="x86_64" name="php-imap" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">a7e74e111ef3fa8c26ee5b56b6d6659a98661345e8ab77f1e2f5b95200af97f4</sum></package><package arch="x86_64" name="php-cli" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">d0d030a51d18e21ab2e8fdfa31d25255bdedb259bc280f774be5e4b4cc2f84f9</sum></package><package arch="x86_64" name="php-dba" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">68083c2bcabc23154c8f36393728d221391485ea7927e3e41aeee1b0ffe7e97c</sum></package><package arch="x86_64" name="php-devel" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">f45f644263b5033164559a1d8f8701b57504de54c0b5893d7ff2d27e5d08e50c</sum></package><package arch="x86_64" name="php-pdo" release="27.el6_5" src="php-5.3.3-27.el6_5.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-27.el6_5.x86_64.rpm</filename><sum type="sha256">44bf867431113bc0f5348cf4a14f9e364b31e55d7519ddee0d2432aa9f055ea2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" id="CVE-2013-6420" title="Php: Memory Corruption In Openssl_X509_Parse()" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036830" id="1036830" title="Php: Memory Corruption In Openssl_X509_Parse()" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1813.html" id="RHSA-2013:1813-1" title="Rhsa-2013:1813-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1823-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2013-5609, CVE-2013-5616, CVE-2013-5618, CVE-2013-6671, CVE-2013-5613) 
A flaw was found in the way Thunderbird rendered web content with missing character encoding information. An attacker could use this flaw to possibly bypass same-origin inheritance and perform cross site-scripting (XSS) attacks. (CVE-2013-5612) 
It was found that certain malicious web content could bypass restrictions applied by sandboxed iframes. An attacker could combine this flaw with other vulnerabilities to execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2013-5614) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_5" src="thunderbird-24.2.0-1.el6_5.src.rpm" version="24.2.0"><filename>thunderbird-24.2.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">1f2481f66d47f270ae7eb379bf4b4199fde48eada9dd3c68fe0c636436f4c115</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" id="CVE-2013-5609" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.2) (Mfsa 2013-104)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" id="CVE-2013-5612" title="Mozilla: Character Encoding Cross-Origin Xss Attack (Mfsa 2013-106)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" id="CVE-2013-5613" title="Mozilla: Use-After-Free In Synthetic Mouse Movement (Mfsa 2013-114)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" id="CVE-2013-5614" title="Mozilla: Sandbox Restrictions Not Applied To Nested Object Elements (Mfsa 2013-107)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" id="CVE-2013-5616" title="Mozilla: Use-After-Free In Event Listeners (Mfsa 2013-108)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" id="CVE-2013-5618" title="Mozilla: Use-After-Free During Table Editing (Mfsa 2013-109)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" id="CVE-2013-6671" title="Mozilla: Segmentation Violation When Replacing Ordered List Elements (Mfsa 2013-111)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039417" id="1039417" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.2) (Mfsa 2013-104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039420" id="1039420" title="Mozilla: Character Encoding Cross-Origin Xss Attack (Mfsa 2013-106)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039421" id="1039421" title="Mozilla: Sandbox Restrictions Not Applied To Nested Object Elements (Mfsa 2013-107)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039422" id="1039422" title="Mozilla: Use-After-Free In Event Listeners (Mfsa 2013-108)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039423" id="1039423" title="Mozilla: Use-After-Free During Table Editing (Mfsa 2013-109)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039426" id="1039426" title="Mozilla: Segmentation Violation When Replacing Ordered List Elements (Mfsa 2013-111)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039429" id="1039429" title="Mozilla: Use-After-Free In Synthetic Mouse Movement (Mfsa 2013-114)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1823.html" id="RHSA-2013:1823-1" title="Rhsa-2013:1823-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1829-1</id><title>Important: Nss, Nspr, And Nss-Util Security Update</title><description>A flaw was found in the way NSS handled invalid handshake packets. A remote attacker could use this flaw to cause a TLS/SSL client using NSS to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2013-5605) 
It was found that the fix for CVE-2013-1620 released via SLSA-2013:1135 introduced a regression causing NSS to read uninitialized data when a decryption failure occurred. A remote attacker could use this flaw to cause a TLS/SSL server using NSS to crash. (CVE-2013-1739) 
An integer overflow flaw was discovered in both NSS and NSPR's implementation of certification parsing on 64-bit systems. A remote attacker could use these flaws to cause an application using NSS or NSPR to crash. (CVE-2013-1741, CVE-2013-5607) 
It was discovered that NSS did not reject certificates with incompatible key usage constraints when validating them while the verifyLog feature was enabled. An application using the NSS certificate validation API could accept an invalid certificate. (CVE-2013-5606) 
After installing this update, applications using NSS, NSPR, or nss-util must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-sysinit" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-sysinit-3.15.3-2.el6_5.x86_64.rpm</filename><sum type="sha256">2f386d05b519f19d241103c23bb98b06a6681035687ff383c793172d03901aaa</sum></package><package arch="x86_64" name="nss-util" release="1.el6_5" src="nss-util-3.15.3-1.el6_5.src.rpm" version="3.15.3"><filename>nss-util-3.15.3-1.el6_5.x86_64.rpm</filename><sum type="sha256">5a3403261981f2d476da3cfe5638e761ad4e35454912f30fd02228b093b11cc5</sum></package><package arch="i686" name="nss-pkcs11-devel" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-pkcs11-devel-3.15.3-2.el6_5.i686.rpm</filename><sum type="sha256">74b2169cbfb658aee98064e3c2c8adb8635fb5d9c5a6bfa487559d579ef92fac</sum></package><package arch="x86_64" name="nss" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-3.15.3-2.el6_5.x86_64.rpm</filename><sum type="sha256">5a592f964fa683a35feac91dc03963e175e1853496534e4e84a6f9acb4c443e3</sum></package><package arch="i686" name="nspr-devel" release="1.el6_5" src="nspr-4.10.2-1.el6_5.src.rpm" version="4.10.2"><filename>nspr-devel-4.10.2-1.el6_5.i686.rpm</filename><sum type="sha256">163106f66941948ede39898cd252266a486c66b085eceee45954a4d0c5f28cec</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_5" src="nss-util-3.15.3-1.el6_5.src.rpm" version="3.15.3"><filename>nss-util-devel-3.15.3-1.el6_5.x86_64.rpm</filename><sum type="sha256">676a1843a10072db15498c08bc27650089c936f69ac11f401bf61b008fe0e32a</sum></package><package arch="i686" name="nss-util" release="1.el6_5" src="nss-util-3.15.3-1.el6_5.src.rpm" version="3.15.3"><filename>nss-util-3.15.3-1.el6_5.i686.rpm</filename><sum type="sha256">d999dfb3b076e0d0b8f14c1ccd01ef3ac8f8607d676d5380848bc3998e85784f</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-pkcs11-devel-3.15.3-2.el6_5.x86_64.rpm</filename><sum type="sha256">1c8a76f6fe12a16f4a05d0bbef88ed550cba239753488c0aaa1a4a5e7c055a17</sum></package><package arch="x86_64" name="nspr-devel" release="1.el6_5" src="nspr-4.10.2-1.el6_5.src.rpm" version="4.10.2"><filename>nspr-devel-4.10.2-1.el6_5.x86_64.rpm</filename><sum type="sha256">d6e257ff2268465158a9723adb22a2ea3e1100ab4e8c2e55cee7aa88d2e5946a</sum></package><package arch="x86_64" name="nspr" release="1.el6_5" src="nspr-4.10.2-1.el6_5.src.rpm" version="4.10.2"><filename>nspr-4.10.2-1.el6_5.x86_64.rpm</filename><sum type="sha256">cc1580579d03ead2132c327fec06fd54800e28542a7631bbef4b7e0885eece6f</sum></package><package arch="i686" name="nss-devel" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-devel-3.15.3-2.el6_5.i686.rpm</filename><sum type="sha256">e772566445a0f1f98d39eb0e9ad960d5e90e88295f2c1e446154bafed4f45334</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_5" src="nss-util-3.15.3-1.el6_5.src.rpm" version="3.15.3"><filename>nss-util-devel-3.15.3-1.el6_5.i686.rpm</filename><sum type="sha256">db72c681bea8ded4ca9b096700929a8f20943702fe3e4cf3a7651c97cbbce61f</sum></package><package arch="i686" name="nspr" release="1.el6_5" src="nspr-4.10.2-1.el6_5.src.rpm" version="4.10.2"><filename>nspr-4.10.2-1.el6_5.i686.rpm</filename><sum type="sha256">6223f571f556f2c8fc09239561c635d3b5e31704882996d22bdf683d1736b652</sum></package><package arch="i686" name="nss" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-3.15.3-2.el6_5.i686.rpm</filename><sum type="sha256">57e02044fa19ebd45ff650fc3a6a7153ad236b308f6c883059b5d0581bb85516</sum></package><package arch="x86_64" name="nss-tools" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-tools-3.15.3-2.el6_5.x86_64.rpm</filename><sum type="sha256">058b402ccbf003df156b9fd38c8398d0d0b9e60bb8df6f0ba914d06627c30b38</sum></package><package arch="x86_64" name="nss-devel" release="2.el6_5" src="nss-3.15.3-2.el6_5.src.rpm" version="3.15.3"><filename>nss-devel-3.15.3-2.el6_5.x86_64.rpm</filename><sum type="sha256">02a74588861926e39f3f9143422d8b5c81ce19ccbf5f24cce29791b5ba827f13</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" id="CVE-2013-1739" title="Nss: Avoid Uninitialized Data Read In The Event Of A Decryption Failure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" id="CVE-2013-1741" title="Nss: Integer Truncation In Certificate Parsing (Mfsa 2013-103)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" id="CVE-2013-5605" title="Nss: Null_Cipher() Does Not Respect Maxoutputlen  (Mfsa 2013-103)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" id="CVE-2013-5606" title="Nss: Cert_Verifycert Returns Secsuccess (Saying Certificate Is Good) Even For Bad Certificates (Mfsa 2013-103)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607" id="CVE-2013-5607" title="Nspr: Avoid Unsigned Integer Wrapping In Pl_Arenaallocate (Mfsa 2013-103)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1012740" id="1012740" title="Nss: Avoid Uninitialized Data Read In The Event Of A Decryption Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1030807" id="1030807" title="Nss: Null_Cipher() Does Not Respect Maxoutputlen  (Mfsa 2013-103)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031457" id="1031457" title="Nss: Cert_Verifycert Returns Secsuccess (Saying Certificate Is Good) Even For Bad Certificates (Mfsa 2013-103)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031458" id="1031458" title="Nss: Integer Truncation In Certificate Parsing (Mfsa 2013-103)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031461" id="1031461" title="Nspr: Avoid Unsigned Integer Wrapping In Pl_Arenaallocate (Mfsa 2013-103)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1829.html" id="RHSA-2013:1829-1" title="Rhsa-2013:1829-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1850-1</id><title>Important: Openjpeg Security Update</title><description>Multiple heap-based buffer overflow flaws were found in OpenJPEG. An attacker could create a specially crafted OpenJPEG image that, when opened, could cause an application using openjpeg to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6045, CVE-2013-6054) 
Multiple denial of service flaws were found in OpenJPEG. An attacker could create a specially crafted OpenJPEG image that, when opened, could cause an application using openjpeg to crash (CVE-2013-1447, CVE-2013-6052) 
All running applications using OpenJPEG must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openjpeg" release="10.el6_5" src="openjpeg-1.3-10.el6_5.src.rpm" version="1.3"><filename>openjpeg-1.3-10.el6_5.x86_64.rpm</filename><sum type="sha256">d878ca3740bf989fef1c837d66a8e4b5fb100223e8a2fff29dfd9024c3e80760</sum></package><package arch="x86_64" name="openjpeg-libs" release="10.el6_5" src="openjpeg-1.3-10.el6_5.src.rpm" version="1.3"><filename>openjpeg-libs-1.3-10.el6_5.x86_64.rpm</filename><sum type="sha256">12dad19cb8c3187aace8364f658477de15663c1a6230f796c952b0748990dba3</sum></package><package arch="i686" name="openjpeg-libs" release="10.el6_5" src="openjpeg-1.3-10.el6_5.src.rpm" version="1.3"><filename>openjpeg-libs-1.3-10.el6_5.i686.rpm</filename><sum type="sha256">9a0097a750a415b30be1251c59b8e97f404f25334aa1fef2c0c6bfe91c601145</sum></package><package arch="x86_64" name="openjpeg-devel" release="10.el6_5" src="openjpeg-1.3-10.el6_5.src.rpm" version="1.3"><filename>openjpeg-devel-1.3-10.el6_5.x86_64.rpm</filename><sum type="sha256">831e27417a8e183eb0e82e95cc3f27e48ab184a0768abae9a17a542014492165</sum></package><package arch="i686" name="openjpeg-devel" release="10.el6_5" src="openjpeg-1.3-10.el6_5.src.rpm" version="1.3"><filename>openjpeg-devel-1.3-10.el6_5.i686.rpm</filename><sum type="sha256">931e3ba2e84dc9f7d8f4f66d948ddef0a42c584e05ee851e7a118b37c9b5174c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1447" id="CVE-2013-1447" title="Openjpeg: Multiple Denial Of Service Flaws" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6045" id="CVE-2013-6045" title="Openjpeg: Heap-Based Buffer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6052" id="CVE-2013-6052" title="Openjpeg: Out-Of-Bounds Memory Read Flaws" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6054" id="CVE-2013-6054" title="Openjpeg: Heap-Based Buffer Overflows In Version 1.3" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036491" id="1036491" title="Openjpeg: Out-Of-Bounds Memory Read Flaws" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036495" id="1036495" title="Openjpeg: Heap-Based Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036499" id="1036499" title="Openjpeg: Heap-Based Buffer Overflows In Version 1.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1037945" id="1037945" title="Openjpeg: Multiple Denial Of Service Flaws" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1850.html" id="RHSA-2013:1850-1" title="Rhsa-2013:1850-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1861-1</id><title>Moderate: Nss Security Update</title><description>It was found that a subordinate Certificate Authority (CA) mis-issued an intermediate certificate, which could be used to conduct man-in-the-middle attacks. This update renders that particular intermediate certificate as untrusted. 
Note: This fix only applies to applications using the NSS Builtin Object Token. It does not render the certificates untrusted for applications that use the NSS library, but do not use the NSS Builtin Object Token. 
After installing the update, applications using NSS must be restarted for the changes to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-3.15.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">c00b9e4c340e17d7da2d3cbe8a414e195282d763710f8d4931990a99de8e133e</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-sysinit-3.15.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">2c87259724297b6f17173ea16109f07a6733a84a1e44506f572cd51134c71b48</sum></package><package arch="i686" name="nss" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-3.15.3-3.el6_5.i686.rpm</filename><sum type="sha256">0e8d1708bbb65de22bf953f0fcd40484913f92e208d5d19554dadc73b1cee24c</sum></package><package arch="i686" name="nss-devel" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-devel-3.15.3-3.el6_5.i686.rpm</filename><sum type="sha256">23fbf45900e87a2b9d2090cd15172699455b35a706aca563c5d252cdedf55d5d</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-pkcs11-devel-3.15.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">e4d9476c99ff40ac8cdb0fd7517efc18ede4d0401b6f5da40766e6bc8bad8b27</sum></package><package arch="x86_64" name="nss-tools" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-tools-3.15.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">dad15632203d77e6897db31138a8ba9f5cb65fcfb3ce53f75ed5c9d998f8b4a2</sum></package><package arch="x86_64" name="nss-devel" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-devel-3.15.3-3.el6_5.x86_64.rpm</filename><sum type="sha256">9f4e99b408be97c1d4ef67e3b1bdb73bace1839513e6c1771c3e51e66a8eb51e</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el6_5" src="nss-3.15.3-3.el6_5.src.rpm" version="3.15.3"><filename>nss-pkcs11-devel-3.15.3-3.el6_5.i686.rpm</filename><sum type="sha256">d130fdf19ef1d6a1ffea64e732ebfb4dd50c4d576296b46d1e37dfe8e1bdf633</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1038894" id="1038894" title="Nss: Mis-Issued Anssi/Dcssi Certificate (Mfsa 2013-117)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1861.html" id="RHSA-2013:1861-1" title="Rhsa-2013:1861-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1866-1</id><title>Moderate: Ca-Certificates Security Update</title><description>It was found that a subordinate Certificate Authority (CA) mis-issued an intermediate certificate, which could be used to conduct man-in-the-middle attacks. This update renders that particular intermediate certificate as untrusted. 
After installing the update, all applications using the ca-certificates package must be restarted for the changes to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ca-certificates" release="65.1.el6_5" src="ca-certificates-2013.1.95-65.1.el6_5.src.rpm" version="2013.1.95"><filename>ca-certificates-2013.1.95-65.1.el6_5.noarch.rpm</filename><sum type="sha256">8179c30dfc5ab29f6a16b4ef4eeec3c9f8bf85d2ccb32305dc83ade95b3fa0d7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1038894" id="1038894" title="Nss: Mis-Issued Anssi/Dcssi Certificate (Mfsa 2013-117)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1866.html" id="RHSA-2013:1866-1" title="Rhsa-2013:1866-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1868-1</id><title>Important: Xorg-X11-Server Security Update</title><description>An integer overflow, which led to a heap-based buffer overflow, was found in the way X.Org server handled trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2013-6424)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-server-common" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-common-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">7ff3d011e2d85d0461a3e42a99d4bef07d3361867c110563a711062474ec25f6</sum></package><package arch="noarch" name="xorg-x11-server-source" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-source-1.13.0-23.1.sl6.noarch.rpm</filename><sum type="sha256">08352eb5283a87d96c59366431c014bb6340749e466c44d1d473ceebd2e42b95</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-Xdmx-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">a5e3ea2161375672fb2c566f54c5454b01cb9b710841a9b606cb965a61a6a2c8</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-devel-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">f2d1f3db0c7aa8dec553823e825b6133c0b2fb8924d6656561b38aac00f9f67d</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-Xvfb-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">64fee2fc3c7d5db2c9f7cf73597441603989d8a61451eee65fe77b8f0077c835</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-Xnest-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">c5999a7741ac90942efb81527b25e7a6ad88268588bcc326ba79af426d401381</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-Xephyr-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">004b6b3c37d5ac5aabac9ed03272a11e90f26b6957c9dfe861daa57d66bf3263</sum></package><package arch="i686" name="xorg-x11-server-devel" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-devel-1.13.0-23.1.sl6.i686.rpm</filename><sum type="sha256">61548060d92f60b8f61de312be14c9c7b2c7c3ef981a1a8c87f102a13e6e13fe</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="23.1.sl6" src="xorg-x11-server-1.13.0-23.1.sl6.src.rpm" version="1.13.0"><filename>xorg-x11-server-Xorg-1.13.0-23.1.sl6.x86_64.rpm</filename><sum type="sha256">5ce7cebd8cbeff06116cf68efe4d881346e085a2fce3bb0d74dc58484c1cc5da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" id="CVE-2013-6424" title="Xorg-X11-Server: Integer Underflow When Handling Trapezoids" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1037984" id="1037984" title="Xorg-X11-Server: Integer Underflow When Handling Trapezoids" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1868.html" id="RHSA-2013:1868-1" title="Rhsa-2013:1868-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2013:1869-1</id><title>Important: Pixman Security Update</title><description>An integer overflow, which led to a heap-based buffer overflow, was found in the way pixman handled trapezoids. If a remote attacker could trick an application using pixman into rendering a trapezoid shape with specially crafted coordinates, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2013-6425) 
All applications using pixman  must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="pixman" release="5.1.el6_5" src="pixman-0.26.2-5.1.el6_5.src.rpm" version="0.26.2"><filename>pixman-0.26.2-5.1.el6_5.i686.rpm</filename><sum type="sha256">e168f3e8da9365938aadc182d5a980a7268d86ae7f15f5bb73d2abc9f59df4ab</sum></package><package arch="x86_64" name="pixman-devel" release="5.1.el6_5" src="pixman-0.26.2-5.1.el6_5.src.rpm" version="0.26.2"><filename>pixman-devel-0.26.2-5.1.el6_5.x86_64.rpm</filename><sum type="sha256">ab3dd682d8dafee20d0b90d09874f49520121eab3448aecc2bb6374eee517227</sum></package><package arch="x86_64" name="pixman" release="5.1.el6_5" src="pixman-0.26.2-5.1.el6_5.src.rpm" version="0.26.2"><filename>pixman-0.26.2-5.1.el6_5.x86_64.rpm</filename><sum type="sha256">1fcdd7a4da97a3c95b6b027dab4c2b0c38818e803c86913e5a6c08e1bdca5149</sum></package><package arch="i686" name="pixman-devel" release="5.1.el6_5" src="pixman-0.26.2-5.1.el6_5.src.rpm" version="0.26.2"><filename>pixman-devel-0.26.2-5.1.el6_5.i686.rpm</filename><sum type="sha256">6f97acbdc1744a6897dfc60b5c655609007286467fca1974b5f9abaeb2671bb5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425" id="CVE-2013-6425" title="Pixman: Integer Underflow When Handling Trapezoids" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1037975" id="1037975" title="Pixman: Integer Underflow When Handling Trapezoids" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2013-1869.html" id="RHSA-2013:1869-1" title="Rhsa-2013:1869-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0015-1</id><title>Important: Openssl Security Update</title><description>A flaw was found in the way OpenSSL determined which hashing algorithm to use when TLS protocol version 1.2 was enabled. This could possibly cause OpenSSL to use an incorrect hashing algorithm, leading to a crash of an application using the library. (CVE-2013-6449) 
It was discovered that the Datagram Transport Layer Security (DTLS) protocol implementation in OpenSSL did not properly maintain encryption and digest contexts during renegotiation. A lost or discarded renegotiation handshake packet could cause a DTLS client or server using OpenSSL to crash. (CVE-2013-6450) 
A NULL pointer dereference flaw was found in the way OpenSSL handled TLS/SSL protocol handshake packets. A specially crafted handshake packet could cause a TLS/SSL client using OpenSSL to crash. (CVE-2013-4353) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-14 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl" release="16.el6_5.4" src="openssl-1.0.1e-16.el6_5.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.4.i686.rpm</filename><sum type="sha256">f86efaef713121854592574cb49461e598f663ba19dd5b91aa7864069904367b</sum></package><package arch="x86_64" name="openssl-devel" release="16.el6_5.4" src="openssl-1.0.1e-16.el6_5.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm</filename><sum type="sha256">85fd0666834d2d92dddbf26bbaafe9d1d240911fd7bbc9963d2b79fe7606e845</sum></package><package arch="i686" name="openssl-devel" release="16.el6_5.4" src="openssl-1.0.1e-16.el6_5.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.4.i686.rpm</filename><sum type="sha256">ee2aee057103bb84e0f940e533bcae48247c25b60e0d5e5bb52ba21a462ef6b8</sum></package><package arch="x86_64" name="openssl-perl" release="16.el6_5.4" src="openssl-1.0.1e-16.el6_5.4.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm</filename><sum type="sha256">f2341df10ab24c6230af226f240682495712f92ed0966910e9a39957ae6d407e</sum></package><package arch="x86_64" name="openssl" release="16.el6_5.4" src="openssl-1.0.1e-16.el6_5.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.4.x86_64.rpm</filename><sum type="sha256">35eaedd9382ebc1df47223f42482ed2fac621112477a8c29fda84507d56f0845</sum></package><package arch="x86_64" name="openssl-static" release="16.el6_5.4" src="openssl-1.0.1e-16.el6_5.4.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-16.el6_5.4.x86_64.rpm</filename><sum type="sha256">51445b3087eb66d5b90396af7dcd96bd93e4ba47c3f861742a75966361e56938</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" id="CVE-2013-4353" title="Openssl: Client Null Dereference Crash On Malformed Handshake Packets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" id="CVE-2013-6449" title="Openssl: Crash When Using Tls 1.2 Caused By Use Of Incorrect Hash Algorithm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" id="CVE-2013-6450" title="Openssl: Crash In Dtls Renegotiation After Packet Loss" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1045363" id="1045363" title="Openssl: Crash When Using Tls 1.2 Caused By Use Of Incorrect Hash Algorithm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1047840" id="1047840" title="Openssl: Crash In Dtls Renegotiation After Packet Loss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1049058" id="1049058" title="Openssl: Client Null Dereference Crash On Malformed Handshake Packets" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0015.html" id="RHSA-2014:0015-1" title="Rhsa-2014:0015-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0018-1</id><title>Important: Libxfont Security Update</title><description>A stack-based buffer overflow flaw was found in the way the libXfont library parsed Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server. (CVE-2013-6462) 
All running X.Org server instances must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-01-14 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libXfont-devel" release="3.el6_5" src="libXfont-1.4.5-3.el6_5.src.rpm" version="1.4.5"><filename>libXfont-devel-1.4.5-3.el6_5.i686.rpm</filename><sum type="sha256">e88cf92ebaf45fe9453932093617af5f5ed7b48be5c096cd6b342418047311b1</sum></package><package arch="i686" name="libXfont" release="3.el6_5" src="libXfont-1.4.5-3.el6_5.src.rpm" version="1.4.5"><filename>libXfont-1.4.5-3.el6_5.i686.rpm</filename><sum type="sha256">e4813d495e5c572817c8969d8e76024a43bb5d31add88312f72595dbb5ba157c</sum></package><package arch="x86_64" name="libXfont" release="3.el6_5" src="libXfont-1.4.5-3.el6_5.src.rpm" version="1.4.5"><filename>libXfont-1.4.5-3.el6_5.x86_64.rpm</filename><sum type="sha256">df6e59d2d3cef3e60d0c2d5a30262b70b58d45ab337c3cf5c0c94feace5f3480</sum></package><package arch="x86_64" name="libXfont-devel" release="3.el6_5" src="libXfont-1.4.5-3.el6_5.src.rpm" version="1.4.5"><filename>libXfont-devel-1.4.5-3.el6_5.x86_64.rpm</filename><sum type="sha256">18abd6afef7b4a21a4250f0c3206606362880203802de60ac7be2f954bc3c243</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" id="CVE-2013-6462" title="Libxfont: Stack-Based Buffer Overflow Flaw When Parsing Glyph Bitmap Distribution Format (Bdf) Fonts" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1048044" id="1048044" title="Libxfont: Stack-Based Buffer Overflow Flaw When Parsing Glyph Bitmap Distribution Format (Bdf) Fonts" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0018.html" id="RHSA-2014:0018-1" title="Rhsa-2014:0018-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0026-1</id><title>Critical: Java-1.7.0-Openjdk Security Update</title><description>An input validation flaw was discovered in the font layout engine in the 2D component. A specially crafted font file could trigger Java Virtual Machine memory corruption when processed. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. (CVE-2013-5907) 
Multiple improper permission check issues were discovered in the CORBA, JNDI, and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0428, CVE-2014-0422, CVE-2013-5893) 
Multiple improper permission check issues were discovered in the Serviceability, Security, CORBA, JAAS, JAXP, and Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-0373, CVE-2013-5878, CVE-2013-5910, CVE-2013-5896, CVE-2013-5884, CVE-2014-0416, CVE-2014-0376, CVE-2014-0368) 
It was discovered that the Beans component did not restrict processing of XML external entities. This flaw could cause a Java application using Beans to leak sensitive information, or affect application availability. (CVE-2014-0423) 
It was discovered that the JSSE component could leak timing information during the TLS/SSL handshake. This could possibly lead to disclosure of information about the used encryption keys. (CVE-2014-0411) 
Note: The java-1.7.0-openjdk package shipped with Scientific Linux 6.5 via SLBA-2013:1611 replaced "java7" with "java" in the provides list. This update re-adds "java7" to the provides list to maintain backwards compatibility with releases prior to Scientific Linux 6.5. 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-01-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.4.4.1.el6_5" src="java-1.7.0-openjdk-1.7.0.51-2.4.4.1.el6_5.src.rpm" version="1.7.0.51"><filename>java-1.7.0-openjdk-demo-1.7.0.51-2.4.4.1.el6_5.x86_64.rpm</filename><sum type="sha256">ff7c366105eeb0d0a9fb24e7402c64dda98d64a728055be68fb305b0c2ee2c25</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.4.4.1.el6_5" src="java-1.7.0-openjdk-1.7.0.51-2.4.4.1.el6_5.src.rpm" version="1.7.0.51"><filename>java-1.7.0-openjdk-devel-1.7.0.51-2.4.4.1.el6_5.x86_64.rpm</filename><sum type="sha256">e1de0d8611812305a6a866331e767777c4345b04fcd01b2a620fb4d480825f27</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.4.4.1.el6_5" src="java-1.7.0-openjdk-1.7.0.51-2.4.4.1.el6_5.src.rpm" version="1.7.0.51"><filename>java-1.7.0-openjdk-1.7.0.51-2.4.4.1.el6_5.x86_64.rpm</filename><sum type="sha256">a50662c84e3eebb1bff02b3a47da258041699977f2654f95bfd65d94f512cc65</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.4.4.1.el6_5" src="java-1.7.0-openjdk-1.7.0.51-2.4.4.1.el6_5.src.rpm" version="1.7.0.51"><filename>java-1.7.0-openjdk-javadoc-1.7.0.51-2.4.4.1.el6_5.noarch.rpm</filename><sum type="sha256">dd3b77bd6dbf8f63650d13a260a9f011bf924d06e90f5ce94ae687cf88ee97c2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.4.4.1.el6_5" src="java-1.7.0-openjdk-1.7.0.51-2.4.4.1.el6_5.src.rpm" version="1.7.0.51"><filename>java-1.7.0-openjdk-src-1.7.0.51-2.4.4.1.el6_5.x86_64.rpm</filename><sum type="sha256">81f45b08d42303803caba651323d6c2bbc76be6adbcf1a4688fd06bfbca458f0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" id="CVE-2013-5878" title="Openjdk: Null Xmlns Handling Issue (Security, 8025026)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" id="CVE-2013-5884" title="Openjdk: Insufficient Security Checks In Corba Stub Factories (Corba, 8026193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893" id="CVE-2013-5893" title="Openjdk: Jvm Method Processing Issues (Libraries, 8029507)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" id="CVE-2013-5896" title="Openjdk: Com.Sun.Corba.Se. Should Be Restricted Package (Corba, 8025022)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" id="CVE-2013-5907" title="Icu: Layout Engine Lookupprocessor Insufficient Input Checks (Jdk 2D, 8025034)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" id="CVE-2013-5910" title="Openjdk: Xml Canonicalizer Mutable Strings Passed To Untrusted Code (Security, 8026417)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" id="CVE-2014-0368" title="Openjdk: Insufficient Socket Checklisten Checks (Networking, 8011786)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" id="CVE-2014-0373" title="Openjdk: Snmpstatusexception Handling Issues (Serviceability, 7068126)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" id="CVE-2014-0376" title="Openjdk: Document Builder Missing Security Checks (Jaxp, 8027201, 8025018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" id="CVE-2014-0411" title="Openjdk: Tls/Ssl Handshake Timing Issues (Jsse, 8023069)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" id="CVE-2014-0416" title="Openjdk: Insecure Subject Principals Set Handling (Jaas, 8024306)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" id="CVE-2014-0422" title="Openjdk: Insufficient Package Access Checks In The Naming Component (Jndi, 8025758)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" id="CVE-2014-0423" title="Openjdk: Xxe Issue In Decoder (Beans, 8023245)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" id="CVE-2014-0428" title="Openjdk: Insufficient Security Checks In Iiop Streams (Corba, 8025767)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051519" id="1051519" title="Openjdk: Insufficient Security Checks In Iiop Streams (Corba, 8025767)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051528" id="1051528" title="Openjdk: Insufficient Package Access Checks In The Naming Component (Jndi, 8025758)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051549" id="1051549" title="Openjdk: Jvm Method Processing Issues (Libraries, 8029507)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051699" id="1051699" title="Openjdk: Snmpstatusexception Handling Issues (Serviceability, 7068126)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051823" id="1051823" title="Openjdk: Null Xmlns Handling Issue (Security, 8025026)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051911" id="1051911" title="Openjdk: Insufficient Security Checks In Corba Stub Factories (Corba, 8026193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051912" id="1051912" title="Openjdk: Insecure Subject Principals Set Handling (Jaas, 8024306)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051923" id="1051923" title="Openjdk: Document Builder Missing Security Checks (Jaxp, 8027201, 8025018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052915" id="1052915" title="Icu: Layout Engine Lookupprocessor Insufficient Input Checks (Jdk 2D, 8025034)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052919" id="1052919" title="Openjdk: Insufficient Socket Checklisten Checks (Networking, 8011786)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052942" id="1052942" title="Openjdk: Xml Canonicalizer Mutable Strings Passed To Untrusted Code (Security, 8026417)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053010" id="1053010" title="Openjdk: Tls/Ssl Handshake Timing Issues (Jsse, 8023069)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053066" id="1053066" title="Openjdk: Xxe Issue In Decoder (Beans, 8023245)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053266" id="1053266" title="Openjdk: Com.Sun.Corba.Se. Should Be Restricted Package (Corba, 8025022)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0026.html" id="RHSA-2014:0026-1" title="Rhsa-2014:0026-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0043-1</id><title>Moderate: Bind Security Update</title><description>A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. (CVE-2014-0591) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-devel" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.23.rc1.el6_5.1.x86_64.rpm</filename><sum type="sha256">cb8fdb4d1617db5046b1e76930dda8a161fc6808853a920e7c57980beee70a0a</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.23.rc1.el6_5.1.x86_64.rpm</filename><sum type="sha256">cd0fbf34b724f2f554512ad0f48971baa52e12ec116d058a3c0d5331eee972b8</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.23.rc1.el6_5.1.i686.rpm</filename><sum type="sha256">2677609b0a7f4dc129e2013d6f6f3b79b580332690740bd15dde8a0f54874ef5</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.23.rc1.el6_5.1.x86_64.rpm</filename><sum type="sha256">c65bf4c628ce558c8a022f2b04b5e7ac11b8beb50323c026da03639f00ddcf10</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.23.rc1.el6_5.1.x86_64.rpm</filename><sum type="sha256">d9740bcf124af39585029ef014e96820dd84122d090f64e180009e53ebf47c01</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.23.rc1.el6_5.1.x86_64.rpm</filename><sum type="sha256">5ded25e54fde4dd21cc0d1199c5b13e7ae83dc1bca5bf5458ae89edd06063590</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.23.rc1.el6_5.1.i686.rpm</filename><sum type="sha256">67cd5ccc9f4cefa3ae488cd882e2911f63c20c9590e2b0d9853fe39357106c9a</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.23.rc1.el6_5.1" src="bind-9.8.2-0.23.rc1.el6_5.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.23.rc1.el6_5.1.x86_64.rpm</filename><sum type="sha256">3ef60196ace125f719462d1010dfd01a6bd921da83693e849ff34a7bfc59f15e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" id="CVE-2014-0591" title="Bind: Named Crash When Handling Malformed Nsec3-Signed Zones" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051717" id="1051717" title="Bind: Named Crash When Handling Malformed Nsec3-Signed Zones" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0043.html" id="RHSA-2014:0043-1" title="Rhsa-2014:0043-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0044-1</id><title>Moderate: Augeas Security Update</title><description>A flaw was found in the way Augeas handled certain umask settings when creating new configuration files. This flaw could result in configuration files being created as world writable, allowing unprivileged local users to modify their content. (CVE-2013-6412) 
All running applications using augeas must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-01-28 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="augeas-devel" release="5.el6_5.1" src="augeas-1.0.0-5.el6_5.1.src.rpm" version="1.0.0"><filename>augeas-devel-1.0.0-5.el6_5.1.x86_64.rpm</filename><sum type="sha256">a209b11d7d9cc7c4098c605dcbdf28eaeeaf3e10292311cf7659b6e2b5864225</sum></package><package arch="x86_64" name="augeas-libs" release="5.el6_5.1" src="augeas-1.0.0-5.el6_5.1.src.rpm" version="1.0.0"><filename>augeas-libs-1.0.0-5.el6_5.1.x86_64.rpm</filename><sum type="sha256">be99beeb5d2f327783fd3301f2fc82ce0203fe61b3e63ceae81043ebeeb80eaf</sum></package><package arch="i686" name="augeas-devel" release="5.el6_5.1" src="augeas-1.0.0-5.el6_5.1.src.rpm" version="1.0.0"><filename>augeas-devel-1.0.0-5.el6_5.1.i686.rpm</filename><sum type="sha256">b58787fbdeecb2003ed4f7e4427523bead19fdb545bce43c60b7c555f035f04c</sum></package><package arch="i686" name="augeas-libs" release="5.el6_5.1" src="augeas-1.0.0-5.el6_5.1.src.rpm" version="1.0.0"><filename>augeas-libs-1.0.0-5.el6_5.1.i686.rpm</filename><sum type="sha256">2348685563f9868ac83c8dfc74227155620d05c8adab584b52c497f88ab75567</sum></package><package arch="x86_64" name="augeas" release="5.el6_5.1" src="augeas-1.0.0-5.el6_5.1.src.rpm" version="1.0.0"><filename>augeas-1.0.0-5.el6_5.1.x86_64.rpm</filename><sum type="sha256">cd4549db3247200565d0a2999acec65a6b3f5e3494aac9fde6fe16a11bdb3224</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412" id="CVE-2013-6412" title="Augeas: Incorrect Permissions Set On Newly Created Files" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1034261" id="1034261" title="Augeas: Incorrect Permissions Set On Newly Created Files" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0044.html" id="RHSA-2014:0044-1" title="Rhsa-2014:0044-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0097-1</id><title>Important: Java-1.6.0-Openjdk Security Update</title><description>An input validation flaw was discovered in the font layout engine in the 2D component. A specially crafted font file could trigger a Java Virtual Machine memory corruption when processed. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. (CVE-2013-5907) 
Multiple improper permission check issues were discovered in the CORBA and JNDI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0428, CVE-2014-0422) 
Multiple improper permission check issues were discovered in the Serviceability, Security, CORBA, JAAS, JAXP, and Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-0373, CVE-2013-5878, CVE-2013-5910, CVE-2013-5896, CVE-2013-5884, CVE-2014-0416, CVE-2014-0376, CVE-2014-0368) 
It was discovered that the Beans component did not restrict processing of XML external entities. This flaw could cause a Java application using Beans to leak sensitive information, or affect application availability. (CVE-2014-0423) 
It was discovered that the JSSE component could leak timing information during the TLS/SSL handshake. This could possibly lead to a disclosure of information about the used encryption keys. (CVE-2014-0411) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-02-04 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="3.1.13.1.el6_5" src="java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-javadoc-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm</filename><sum type="sha256">e27d7f678bfcde19eb6c315d1b3bc8f5c363fad6087e05b9ed63fd92b34c85ea</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="3.1.13.1.el6_5" src="java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm</filename><sum type="sha256">7a09654dfff5d81051598525f443b40345072714e1982b8858b3fee065c05ea3</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="3.1.13.1.el6_5" src="java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-devel-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm</filename><sum type="sha256">33e128d354ba28524a924ef3561c2fdf4835e16b7a9c726ee0c3e2e79fc61dc6</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="3.1.13.1.el6_5" src="java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-demo-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm</filename><sum type="sha256">29e05e86c3f9617780ad723b46022ced907d828df0b1790c82f3ade1f05fa31b</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="3.1.13.1.el6_5" src="java-1.6.0-openjdk-1.6.0.0-3.1.13.1.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-src-1.6.0.0-3.1.13.1.el6_5.x86_64.rpm</filename><sum type="sha256">89234993b9b69a8a2c88859a9d53cb93735e507fc40f9540e9a38db3efbb6164</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" id="CVE-2013-5878" title="Openjdk: Null Xmlns Handling Issue (Security, 8025026)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" id="CVE-2013-5884" title="Openjdk: Insufficient Security Checks In Corba Stub Factories (Corba, 8026193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" id="CVE-2013-5896" title="Openjdk: Com.Sun.Corba.Se. Should Be Restricted Package (Corba, 8025022)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" id="CVE-2013-5907" title="Icu: Layout Engine Lookupprocessor Insufficient Input Checks (Jdk 2D, 8025034)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" id="CVE-2013-5910" title="Openjdk: Xml Canonicalizer Mutable Strings Passed To Untrusted Code (Security, 8026417)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" id="CVE-2014-0368" title="Openjdk: Insufficient Socket Checklisten Checks (Networking, 8011786)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" id="CVE-2014-0373" title="Openjdk: Snmpstatusexception Handling Issues (Serviceability, 7068126)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" id="CVE-2014-0376" title="Openjdk: Document Builder Missing Security Checks (Jaxp, 8027201, 8025018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" id="CVE-2014-0411" title="Openjdk: Tls/Ssl Handshake Timing Issues (Jsse, 8023069)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" id="CVE-2014-0416" title="Openjdk: Insecure Subject Principals Set Handling (Jaas, 8024306)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" id="CVE-2014-0422" title="Openjdk: Insufficient Package Access Checks In The Naming Component (Jndi, 8025758)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" id="CVE-2014-0423" title="Openjdk: Xxe Issue In Decoder (Beans, 8023245)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" id="CVE-2014-0428" title="Openjdk: Insufficient Security Checks In Iiop Streams (Corba, 8025767)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051519" id="1051519" title="Openjdk: Insufficient Security Checks In Iiop Streams (Corba, 8025767)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051528" id="1051528" title="Openjdk: Insufficient Package Access Checks In The Naming Component (Jndi, 8025758)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051699" id="1051699" title="Openjdk: Snmpstatusexception Handling Issues (Serviceability, 7068126)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051823" id="1051823" title="Openjdk: Null Xmlns Handling Issue (Security, 8025026)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051911" id="1051911" title="Openjdk: Insufficient Security Checks In Corba Stub Factories (Corba, 8026193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051912" id="1051912" title="Openjdk: Insecure Subject Principals Set Handling (Jaas, 8024306)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051923" id="1051923" title="Openjdk: Document Builder Missing Security Checks (Jaxp, 8027201, 8025018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052915" id="1052915" title="Icu: Layout Engine Lookupprocessor Insufficient Input Checks (Jdk 2D, 8025034)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052919" id="1052919" title="Openjdk: Insufficient Socket Checklisten Checks (Networking, 8011786)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052942" id="1052942" title="Openjdk: Xml Canonicalizer Mutable Strings Passed To Untrusted Code (Security, 8026417)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053010" id="1053010" title="Openjdk: Tls/Ssl Handshake Timing Issues (Jsse, 8023069)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053066" id="1053066" title="Openjdk: Xxe Issue In Decoder (Beans, 8023245)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053266" id="1053266" title="Openjdk: Com.Sun.Corba.Se. Should Be Restricted Package (Corba, 8025022)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0097.html" id="RHSA-2014:0097-1" title="Rhsa-2014:0097-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0103-1</id><title>Moderate: Libvirt Security Update</title><description>A use-after-free flaw was found in the way several libvirt block APIs handled domain jobs. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, execute arbitrary code with the privileges of the libvirtd process (usually root). (CVE-2013-6458) 
A race condition was found in the way libvirtd handled keepalive initialization requests when the connection was closed prior to establishing connection credentials. An attacker able to establish a read- only connection to libvirtd could use this flaw to crash libvirtd, resulting in a denial of service. (CVE-2014-1447) 
This update also fixes the following bug: 
* A race condition was possible between a thread starting a virtual machine with a guest agent configured (regular start-up or while migrating) and a thread that was killing the VM process (or the process crashing). The race could cause the monitor object to be freed by the thread that killed the VM process, which was later accessed by the thread that was attempting to start the VM, resulting in a crash. This issue was fixed by checking the state of the VM after the attempted connection to the guest agent; if the VM in the meantime exited, no other operations are attempted. 
After installing the updated packages, libvirtd will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-29.el6_5.3.x86_64.rpm</filename><sum type="sha256">0ee6bd4ecb1bc576ffa1a7a04e664ef11881978ee7794c8195273589066cb36e</sum></package><package arch="i686" name="libvirt-client" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-29.el6_5.3.i686.rpm</filename><sum type="sha256">c1b2efda97b7ffb157f677675b5472c4e8de35c1355eaaf032c112ac5d2149b7</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-29.el6_5.3.x86_64.rpm</filename><sum type="sha256">93393bdb3fc87195e3d5bd7120137d84c69bb26d70947dfc1ce47a976d01dd27</sum></package><package arch="i686" name="libvirt-devel" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-29.el6_5.3.i686.rpm</filename><sum type="sha256">bfa539ce3595fafc13638e76344421fd5dd28cef8f6ae0564ea96ae21e424698</sum></package><package arch="x86_64" name="libvirt-python" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-29.el6_5.3.x86_64.rpm</filename><sum type="sha256">9ac72daaad5dc13afc9fba202ddb1dc4020044fe405fbe3a279ce64fec105f9a</sum></package><package arch="x86_64" name="libvirt-client" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-29.el6_5.3.x86_64.rpm</filename><sum type="sha256">084769674dd16c1a3c2c7dd4fd7c5dad379e203b661c12ac1d69a83e48036285</sum></package><package arch="x86_64" name="libvirt-devel" release="29.el6_5.3" src="libvirt-0.10.2-29.el6_5.3.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-29.el6_5.3.x86_64.rpm</filename><sum type="sha256">a800b818e2c8fcae52eda51bab6b5c7a821ee6863cf30bcb9c9e0db7bed3dfbc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" id="CVE-2013-6458" title="Qemu: Job Usage Issue In Several Apis Leading To Libvirtd Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" id="CVE-2014-1447" title="Libvirt: Denial Of Service With Keepalive" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1048631" id="1048631" title="Qemu: Job Usage Issue In Several Apis Leading To Libvirtd Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1052957" id="1052957" title="Libvirt: Denial Of Service With Keepalive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1055578" id="1055578" title="Bidirectional Vms Migration Between 2 Hosts Fail On Vm Doesn'T Exist / Fatal Error" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0103.html" id="RHSA-2014:0103-1" title="Rhsa-2014:0103-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0126-1</id><title>Moderate: Openldap Security Update</title><description>A denial of service flaw was found in the way the OpenLDAP server daemon (slapd) performed reference counting when using the rwm (rewrite/remap) overlay. A remote attacker able to query the OpenLDAP server could use this flaw to crash the server by immediately unbinding from the server after sending a search request. (CVE-2013-4449) 
This update also fixes the following bug: 
* Previously, OpenLDAP did not properly handle a number of simultaneous updates. As a consequence, sending a number of parallel update requests to the server could cause a deadlock. With this update, a superfluous locking mechanism causing the deadlock has been removed, thus fixing the bug.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openldap-devel" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-devel-2.4.23-34.el6_5.1.x86_64.rpm</filename><sum type="sha256">8b02a60cdc6b937d7469fd54e4a3bcddad7f1c4340c71d2a4c8afb67009d0e35</sum></package><package arch="i686" name="openldap" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-2.4.23-34.el6_5.1.i686.rpm</filename><sum type="sha256">bf25ba5cc1566b2ce0246b98753b8bee2f91ca47f1559274ccd1b52f41503e5c</sum></package><package arch="i686" name="openldap-devel" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-devel-2.4.23-34.el6_5.1.i686.rpm</filename><sum type="sha256">5da983d9257a989d7ee2bdc7cb0e0ddf4ae5d02a3164f8c7c3f8833b9cca3b9a</sum></package><package arch="x86_64" name="openldap-servers-sql" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-servers-sql-2.4.23-34.el6_5.1.x86_64.rpm</filename><sum type="sha256">0d88fab2b459faa5d7c0e415db86d28b6da14c4ccb34d7f7544bf0d4a42ec891</sum></package><package arch="x86_64" name="openldap" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-2.4.23-34.el6_5.1.x86_64.rpm</filename><sum type="sha256">735055fbdd1fb31c1ac38ea15a41390e1da34d65efba6659833035cb78c665b5</sum></package><package arch="x86_64" name="openldap-clients" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-clients-2.4.23-34.el6_5.1.x86_64.rpm</filename><sum type="sha256">18775ed6959a62ed88ae84722bf77c533292fed57d69c0f32fc6d04458a1c963</sum></package><package arch="x86_64" name="openldap-servers" release="34.el6_5.1" src="openldap-2.4.23-34.el6_5.1.src.rpm" version="2.4.23"><filename>openldap-servers-2.4.23-34.el6_5.1.x86_64.rpm</filename><sum type="sha256">8367f6e1873f9cca51a36372a81b0be436a04dcab91eeb48e46d10ea5807e134</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449" id="CVE-2013-4449" title="Openldap: Segfault On Certain Queries With Rwm Overlay" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1019490" id="1019490" title="Openldap: Segfault On Certain Queries With Rwm Overlay" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0126.html" id="RHSA-2014:0126-1" title="Rhsa-2014:0126-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0127-1</id><title>Moderate: Librsvg2 Security Update</title><description>An XML External Entity expansion flaw was found in the way librsvg2 processed SVG files. If a user were to open a malicious SVG file, a remote attacker could possibly obtain a copy of the local resources that the user had access to. (CVE-2013-1881) 
All running applications that use librsvg2 must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="librsvg2" release="6.el6_5.2" src="librsvg2-2.26.0-6.el6_5.2.src.rpm" version="2.26.0"><filename>librsvg2-2.26.0-6.el6_5.2.x86_64.rpm</filename><sum type="sha256">2a8d7b8effca6a81798d45660e3bda80def23a6cfc1377c55bef4955cf6e486b</sum></package><package arch="x86_64" name="librsvg2-devel" release="6.el6_5.2" src="librsvg2-2.26.0-6.el6_5.2.src.rpm" version="2.26.0"><filename>librsvg2-devel-2.26.0-6.el6_5.2.x86_64.rpm</filename><sum type="sha256">a47ecff4df8b2a765eb28e336032a42d56818e807b11388788915755380115f1</sum></package><package arch="i686" name="librsvg2-devel" release="6.el6_5.2" src="librsvg2-2.26.0-6.el6_5.2.src.rpm" version="2.26.0"><filename>librsvg2-devel-2.26.0-6.el6_5.2.i686.rpm</filename><sum type="sha256">695b4e46fc7e324948131434f72da0f9eaa391fcae9b8708b3bdb0a47b545822</sum></package><package arch="i686" name="librsvg2" release="6.el6_5.2" src="librsvg2-2.26.0-6.el6_5.2.src.rpm" version="2.26.0"><filename>librsvg2-2.26.0-6.el6_5.2.i686.rpm</filename><sum type="sha256">c85cf2065e8f344853ea72cf6f59e9ff52d2712f930c29b00bbc5120513cf8c2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" id="CVE-2013-1881" title="Librsvg2: Local Resource Access Vulnerability Due To Xml External Entity Enablement" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=924414" id="924414" title="Librsvg2: Local Resource Access Vulnerability Due To Xml External Entity Enablement" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0127.html" id="RHSA-2014:0127-1" title="Rhsa-2014:0127-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0127-2</id><title>Moderate: Librsvg2 Security Update</title><description>This update fixes the gtk+ regression introduced in SLSA-2014:0127-1 (see upstream bug 924414). 
We are publishing this alert for completeness.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="librsvg2-devel" release="6.el6_5.3" src="librsvg2-2.26.0-6.el6_5.3.src.rpm" version="2.26.0"><filename>librsvg2-devel-2.26.0-6.el6_5.3.x86_64.rpm</filename><sum type="sha256">9e56f3da09f1b9a266898c82b295ef2140a6df68a6289738ab44e139b6dffe97</sum></package><package arch="i686" name="librsvg2" release="6.el6_5.3" src="librsvg2-2.26.0-6.el6_5.3.src.rpm" version="2.26.0"><filename>librsvg2-2.26.0-6.el6_5.3.i686.rpm</filename><sum type="sha256">1f47dee4ba4f1dcc7bef339c124c191ae890a4dc81bab645af91a3d70fc48691</sum></package><package arch="i686" name="librsvg2-devel" release="6.el6_5.3" src="librsvg2-2.26.0-6.el6_5.3.src.rpm" version="2.26.0"><filename>librsvg2-devel-2.26.0-6.el6_5.3.i686.rpm</filename><sum type="sha256">9014d6b0b2afc6989ef28a0bff516e535fe18712be67ff6c5ee4ba978bb3b9be</sum></package><package arch="x86_64" name="librsvg2" release="6.el6_5.3" src="librsvg2-2.26.0-6.el6_5.3.src.rpm" version="2.26.0"><filename>librsvg2-2.26.0-6.el6_5.3.x86_64.rpm</filename><sum type="sha256">c6ffb0c92c7573fe5782eff9e9cf6227e559f3feca868de141887629e6d02d8e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=924414" id="924414" title="Librsvg2: Local Resource Access Vulnerability Due To Xml External Entity Enablement" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0127.html" id="RHSA-2014:0127-2" title="Rhsa-2014:0127-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0132-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1477, CVE-2014-1482, CVE-2014-1486) 
A flaw was found in the way Firefox handled error messages related to web workers. An attacker could use this flaw to bypass the same-origin policy, which could lead to cross-site scripting (XSS) attacks, or could potentially be used to gather authentication tokens and other data from third-party websites. (CVE-2014-1487) 
A flaw was found in the implementation of System Only Wrappers (SOW). An attacker could use this flaw to crash Firefox. When combined with other vulnerabilities, this flaw could have additional security implications. (CVE-2014-1479) 
It was found that the Firefox JavaScript engine incorrectly handled window objects. A remote attacker could use this flaw to bypass certain security checks and possibly execute arbitrary code. (CVE-2014-1481) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="2.el6_5" src="firefox-24.3.0-2.el6_5.src.rpm" version="24.3.0"><filename>firefox-24.3.0-2.el6_5.x86_64.rpm</filename><sum type="sha256">2023b61727fc90b1ae34da5bfa49b4c7c2945c8acad67f70b23bf337dce44552</sum></package><package arch="i686" name="firefox" release="2.el6_5" src="firefox-24.3.0-2.el6_5.src.rpm" version="24.3.0"><filename>firefox-24.3.0-2.el6_5.i686.rpm</filename><sum type="sha256">2fc5c2e6f34cfc34ed2e9501b7ab6cafb1689451bf1b7da8f7e7db744db37be6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" id="CVE-2014-1477" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.3) (Mfsa 2014-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" id="CVE-2014-1479" title="Mozilla: Clone Protected Content With Xbl Scopes (Mfsa 2014-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" id="CVE-2014-1481" title="Mozilla: Inconsistent Javascript Handling Of Access To Window Objects (Mfsa 2014-13)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" id="CVE-2014-1482" title="Mozilla: Incorrect Use Of Discarded Images By Rasterimage (Mfsa 2014-04)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" id="CVE-2014-1486" title="Mozilla: Use-After-Free With Imgrequestproxy And Image Proccessing (Mfsa 2014-08)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" id="CVE-2014-1487" title="Mozilla: Cross-Origin Information Leak Through Web Workers (Mfsa 2014-09)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060938" id="1060938" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.3) (Mfsa 2014-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060940" id="1060940" title="Mozilla: Clone Protected Content With Xbl Scopes (Mfsa 2014-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060942" id="1060942" title="Mozilla: Incorrect Use Of Discarded Images By Rasterimage (Mfsa 2014-04)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060945" id="1060945" title="Mozilla: Use-After-Free With Imgrequestproxy And Image Proccessing (Mfsa 2014-08)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060947" id="1060947" title="Mozilla: Cross-Origin Information Leak Through Web Workers (Mfsa 2014-09)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060952" id="1060952" title="Mozilla: Inconsistent Javascript Handling Of Access To Window Objects (Mfsa 2014-13)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0132.html" id="RHSA-2014:0132-1" title="Rhsa-2014:0132-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0133-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1477, CVE-2014-1482, CVE-2014-1486) 
A flaw was found in the way Thunderbird handled error messages related to web workers. An attacker could use this flaw to bypass the same-origin policy, which could lead to cross-site scripting (XSS) attacks, or could potentially be used to gather authentication tokens and other data from third-party websites. (CVE-2014-1487) 
A flaw was found in the implementation of System Only Wrappers (SOW). An attacker could use this flaw to crash Thunderbird. When combined with other vulnerabilities, this flaw could have additional security implications. (CVE-2014-1479) 
It was found that the Thunderbird JavaScript engine incorrectly handled window objects. A remote attacker could use this flaw to bypass certain security checks and possibly execute arbitrary code. (CVE-2014-1481) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_5" src="thunderbird-24.3.0-2.el6_5.src.rpm" version="24.3.0"><filename>thunderbird-24.3.0-2.el6_5.x86_64.rpm</filename><sum type="sha256">13344bce3dd5630d1dc9e6dfbdce1c76d6b5f41796c5e43adf89a9b9ccb6fecf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" id="CVE-2014-1477" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.3) (Mfsa 2014-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" id="CVE-2014-1479" title="Mozilla: Clone Protected Content With Xbl Scopes (Mfsa 2014-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" id="CVE-2014-1481" title="Mozilla: Inconsistent Javascript Handling Of Access To Window Objects (Mfsa 2014-13)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" id="CVE-2014-1482" title="Mozilla: Incorrect Use Of Discarded Images By Rasterimage (Mfsa 2014-04)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" id="CVE-2014-1486" title="Mozilla: Use-After-Free With Imgrequestproxy And Image Proccessing (Mfsa 2014-08)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" id="CVE-2014-1487" title="Mozilla: Cross-Origin Information Leak Through Web Workers (Mfsa 2014-09)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1046167" id="1046167" title="Thunderbird 24.2 No Longer Launches Default Browser For Web Links" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060938" id="1060938" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.3) (Mfsa 2014-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060940" id="1060940" title="Mozilla: Clone Protected Content With Xbl Scopes (Mfsa 2014-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060942" id="1060942" title="Mozilla: Incorrect Use Of Discarded Images By Rasterimage (Mfsa 2014-04)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060945" id="1060945" title="Mozilla: Use-After-Free With Imgrequestproxy And Image Proccessing (Mfsa 2014-08)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060947" id="1060947" title="Mozilla: Cross-Origin Information Leak Through Web Workers (Mfsa 2014-09)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060952" id="1060952" title="Mozilla: Inconsistent Javascript Handling Of Access To Window Objects (Mfsa 2014-13)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0133.html" id="RHSA-2014:0133-1" title="Rhsa-2014:0133-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0139-1</id><title>Moderate: Pidgin Security Update</title><description>A heap-based buffer overflow flaw was found in the way Pidgin processed certain HTTP responses. A malicious server could send a specially crafted HTTP response, causing Pidgin to crash or potentially execute arbitrary code with the permissions of the user running Pidgin. (CVE-2013-6485) 
Multiple heap-based buffer overflow flaws were found in several protocol plug-ins in Pidgin (Gadu-Gadu, MXit, SIMPLE). A malicious server could send a specially crafted message, causing Pidgin to crash or potentially execute arbitrary code with the permissions of the user running Pidgin. (CVE-2013-6487, CVE-2013-6489, CVE-2013-6490) 
Multiple denial of service flaws were found in several protocol plug-ins in Pidgin (Yahoo!, XMPP, MSN, stun, IRC). A remote attacker could use these flaws to crash Pidgin by sending a specially crafted message. (CVE-2012-6152, CVE-2013-6477, CVE-2013-6481, CVE-2013-6482, CVE-2013-6484, CVE-2014-0020) 
It was found that the Pidgin XMPP protocol plug-in did not verify the origin of "iq" replies. A remote attacker could use this flaw to spoof an "iq" reply, which could lead to injection of fake data or cause Pidgin to crash via a NULL pointer dereference. (CVE-2013-6483) 
A flaw was found in the way Pidgin parsed certain HTTP response headers. A remote attacker could use this flaw to crash Pidgin via a specially crafted HTTP response header. (CVE-2013-6479) 
It was found that Pidgin crashed when a mouse pointer was hovered over a long URL. A remote attacker could use this flaw to crash Pidgin by sending a message containing a long URL string. (CVE-2013-6478) 
Pidgin must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pidgin-perl" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>pidgin-perl-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">75c7e66e0bdb83db66331d11ffa6879354d33a3a1c63975a0b95dd8d231908ea</sum></package><package arch="x86_64" name="libpurple-perl" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>libpurple-perl-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">9c17ba5cb2a579326b8b36575cc59b3f0d8c8e101b5ebf1b0c2a49acb945ee2c</sum></package><package arch="i686" name="libpurple" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>libpurple-2.7.9-27.el6.i686.rpm</filename><sum type="sha256">cbca88c9f018d20b3f4aea43833e524b8d3d07eeeca5d31c41cacf25e8da0e19</sum></package><package arch="i686" name="finch" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>finch-2.7.9-27.el6.i686.rpm</filename><sum type="sha256">000a6b1a85ccba2c8b01d8dcdb81c2d6fe0d21881a19d92aa417081ec776a4d2</sum></package><package arch="i686" name="finch-devel" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>finch-devel-2.7.9-27.el6.i686.rpm</filename><sum type="sha256">a49a9794832d43ed5912386d56c314607f205d8393df4e6a243cc47e7b37b5b9</sum></package><package arch="x86_64" name="pidgin" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>pidgin-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">78b0564d7ab6fdd1f6aaaf831ab223d7c80c497cfaf84cf7c1de6fbffb630ef3</sum></package><package arch="x86_64" name="libpurple-devel" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>libpurple-devel-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">cef6e375a4d13716519209974c3981d2b25608694b10c303dc323d6d9faa0759</sum></package><package arch="x86_64" name="libpurple-tcl" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>libpurple-tcl-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">aaa1d4059ac848f735d39eea8da6b6ca4165d19459424a7621dda879a9d4f995</sum></package><package arch="x86_64" name="libpurple" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>libpurple-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">18961b063aecd20a9ff99c946c5b9d691503fa5b8e1e8aae19d526ce7d078e22</sum></package><package arch="x86_64" name="pidgin-devel" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>pidgin-devel-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">0de9d08ab9a6e5158805c9e796b93f86ded778e57278d36e5c6ff8dfb911617a</sum></package><package arch="x86_64" name="pidgin-docs" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>pidgin-docs-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">e8dc1b6ca95666cf7fc0ee820fd935a2a2675bf63d2d5eb503f726b016319d19</sum></package><package arch="x86_64" name="finch" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>finch-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">8ae2c5649f9d389e47aad82dc5d29f8e8b1d4512dea1b874ae75b7cfaf17da6f</sum></package><package arch="i686" name="pidgin-devel" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>pidgin-devel-2.7.9-27.el6.i686.rpm</filename><sum type="sha256">7c53e22b11aa5658190148ba4c96edb9335e7d1798c207fe69641c0916b139f6</sum></package><package arch="i686" name="libpurple-devel" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>libpurple-devel-2.7.9-27.el6.i686.rpm</filename><sum type="sha256">0cc68e37f81df494e3030c0fe52cdcb6c23dcb57fc6d56f83397d69d26585b4f</sum></package><package arch="x86_64" name="finch-devel" release="27.el6" src="pidgin-2.7.9-27.el6.src.rpm" version="2.7.9"><filename>finch-devel-2.7.9-27.el6.x86_64.rpm</filename><sum type="sha256">d850fe7e4af54399ab4cbbaaaac05fe83580681f24d456adb362338887659f56</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" id="CVE-2012-6152" title="Pidgin: Dos When Decoding Non-Utf-8 Strings In Yahoo Protocol Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" id="CVE-2013-6477" title="Pidgin: Dos When Handling Timestamps In The Xmpp Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" id="CVE-2013-6478" title="Pidgin: Dos When Rendering Long Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" id="CVE-2013-6479" title="Pidgin: Dos When Parsing Certain Http Response Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" id="CVE-2013-6481" title="Pidgin: Dos Caused Due To Oob Read In Yahoo Protocol Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" id="CVE-2013-6482" title="Pidgin: Dos Via Multiple Null Pointer Dereferences In Msn Protocol Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" id="CVE-2013-6483" title="Pidgin: Possible Spoofing Using Iq Replies In Xmpp Protocol Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" id="CVE-2013-6484" title="Pidgin: Dos Via Specially-Crafted Stun Messages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" id="CVE-2013-6485" title="Pidgin: Heap-Based Buffer Overflow When Parsing Chunked Http Responses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" id="CVE-2013-6487" title="Pidgin: Heap-Based Buffer Overflow In Gadu-Gadu Protocol Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" id="CVE-2013-6489" title="Pidgin: Heap-Based Buffer Overflow In Mxit Emoticon Parsing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" id="CVE-2013-6490" title="Pidgin: Heap-Based Buffer Overflow In Simple Protocol Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" id="CVE-2014-0020" title="Pidgin: Dos In Irc Protocol Plugin Due To Arguement Parsing" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056473" id="1056473" title="Pidgin: Dos When Decoding Non-Utf-8 Strings In Yahoo Protocol Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056479" id="1056479" title="Pidgin: Dos When Handling Timestamps In The Xmpp Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056904" id="1056904" title="Pidgin: Dos When Rendering Long Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056907" id="1056907" title="Pidgin: Dos When Parsing Certain Http Response Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056908" id="1056908" title="Pidgin: Dos Caused Due To Oob Read In Yahoo Protocol Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056913" id="1056913" title="Pidgin: Dos Via Multiple Null Pointer Dereferences In Msn Protocol Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056978" id="1056978" title="Pidgin: Possible Spoofing Using Iq Replies In Xmpp Protocol Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057481" id="1057481" title="Pidgin: Dos Via Specially-Crafted Stun Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057484" id="1057484" title="Pidgin: Heap-Based Buffer Overflow When Parsing Chunked Http Responses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057489" id="1057489" title="Pidgin: Heap-Based Buffer Overflow In Gadu-Gadu Protocol Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057490" id="1057490" title="Pidgin: Heap-Based Buffer Overflow In Mxit Emoticon Parsing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057498" id="1057498" title="Pidgin: Heap-Based Buffer Overflow In Simple Protocol Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057502" id="1057502" title="Pidgin: Dos In Irc Protocol Plugin Due To Arguement Parsing" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0139.html" id="RHSA-2014:0139-1" title="Rhsa-2014:0139-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0151-1</id><title>Low: Wget Security Update</title><description>It was discovered that wget used a file name provided by the server when saving a downloaded file. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client. (CVE-2010-2252) 
Note: With this update, wget always uses the last component of the original URL as the name for the downloaded file. Previous behavior of using the server provided name or the last component of the redirected URL when creating files can be re-enabled by using the '--trust-server-names' command line option, or by setting 'trust_server_names=on' in the wget start-up file. 
This update also fixes the following bugs: 
* Prior to this update, the wget package did not recognize HTTPS SSL certificates with alternative names (subjectAltName) specified in the certificate as valid. As a consequence, running the wget command failed with a certificate error. This update fixes wget to recognize such certificates as valid.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2014-02-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="wget" release="1.11.el6_5" src="wget-1.12-1.11.el6_5.src.rpm" version="1.12"><filename>wget-1.12-1.11.el6_5.x86_64.rpm</filename><sum type="sha256">83ed336ddedf6562ac86dc29e9b720336cd0a8057b0130c8d06642d6abc59440</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/security/updates/classification/#Low" id="Low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=833831" id="833831" title="When Redirected, Wget Should Use The Original Page Name For Saving" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0151.html" id="RHSA-2014:0151-1" title="Rhsa-2014:0151-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0159-1</id><title>Important: Kernel Security Update</title><description>* A buffer overflow flaw was found in the way the qeth_snmp_command() function in the Linux kernel's QETH network device driver implementation handled SNMP IOCTL requests with an out-of-bounds length. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2013-6381, Important) 
* A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information. (CVE-2013-2929, Low) 
* It was found that certain protocol handlers in the Linux kernel's networking implementation could set the addr_len value without initializing the associated data structure. A local, unprivileged user could use this flaw to leak kernel stack memory to user space using the recvmsg, recvfrom, and recvmmsg system calls (CVE-2013-7263, CVE-2013-7265, Low). 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-02-18 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.5.1.el6.noarch.rpm</filename><sum type="sha256">eeb746957cbe95e751699f1ceeaf4bda41a01e8dfea23f4c84a2fae752ac8fee</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">2a88c1d6ea80a0e1ea11f1b8234c502263c72c9a81ff3615f2432b2c183a8dfb</sum></package><package arch="noarch" name="kernel-doc" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.5.1.el6.noarch.rpm</filename><sum type="sha256">b003e341aa658b69e677201bc0a52e3a206b52197af7aa69a9a18bf8159fd60d</sum></package><package arch="x86_64" name="kernel-headers" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">ed02d046abf7a576b3ef3ef075d61a0f5bb9b66a770bbe959f3b69cd6d2e6cac</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.5.1.el6.noarch.rpm</filename><sum type="sha256">e90e0673c7b432271ec9a38a93a430603b03afc585b93a274bd8dabf3cac201c</sum></package><package arch="x86_64" name="perf" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">db7295d59aae8fe372e97818fc26ab72867208712e06837f4825c645727a5246</sum></package><package arch="x86_64" name="kernel-devel" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">f8b926f6c352d33880871731833e9cdffeb66d129156208c9887e0525fa2e7f2</sum></package><package arch="x86_64" name="kernel" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">849f1b5d451872fb910089a4bb0ed3522887f6607fabcded5a3b3ffed9c491e0</sum></package><package arch="x86_64" name="python-perf" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">2ddcf10ea90c269b9c7d21ba0fc31abe0ca136341fe7ca67a8fe284e05e2fec7</sum></package><package arch="x86_64" name="kernel-debug" release="431.5.1.el6" src="kernel-2.6.32-431.5.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.5.1.el6.x86_64.rpm</filename><sum type="sha256">8a8636a4aff17e4770512ffdbdcb9e99e826e06adc8c179169fe65f6d9b7cbc5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929" id="CVE-2013-2929" title="Kernel: Exec/Ptrace: Get_Dumpable() Incorrect Tests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381" id="CVE-2013-6381" title="Kernel: Qeth: Buffer Overflow In Snmp Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" id="CVE-2013-7263" title="Kernel: Net: Leakage Of Uninitialized Memory To User-Space Via Recv Syscalls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265" id="CVE-2013-7265" title="Kernel: Net: Leakage Of Uninitialized Memory To User-Space Via Recv Syscalls" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1028148" id="1028148" title="Kernel: Exec/Ptrace: Get_Dumpable() Incorrect Tests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1033600" id="1033600" title="Kernel: Qeth: Buffer Overflow In Snmp Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1035875" id="1035875" title="Kernel: Net: Leakage Of Uninitialized Memory To User-Space Via Recv Syscalls" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0159.html" id="RHSA-2014:0159-1" title="Rhsa-2014:0159-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0164-1</id><title>Moderate: Mysql Security Update</title><description>(CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0437, CVE-2013-5908) 
A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001) 
This update also fixes the following bug: 
* Prior to this update, MySQL did not check whether a MySQL socket was actually being used by any process before starting the mysqld service. If a particular mysqld service did not exit cleanly while a socket was being used by a process, this socket was considered to be still in use during the next start-up of this service, which resulted in a failure to start the service up. With this update, if a socket exists but is not used by any process, it is ignored during the mysqld service start-up. 
After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mysql-embedded-devel" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-embedded-devel-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">87409ca9f4fa04036a308f235c5d983f692c6fa1b4ae06476a135c3e180ed7f2</sum></package><package arch="x86_64" name="mysql-devel" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-devel-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">eae56b9e7940d00b2d01d450e176cdd288b68e01ece3aca933d6e4faf04ae792</sum></package><package arch="i686" name="mysql-devel" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-devel-5.1.73-3.el6_5.i686.rpm</filename><sum type="sha256">cca4158f8c1c0ff4498e840bbf1d548ffd63ea8754ff61bf1ee5ea5434263ace</sum></package><package arch="x86_64" name="mysql" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">22560896d3393321668a4ca5c04ba22c16efb7932486706f11d887a60c37251a</sum></package><package arch="i686" name="mysql-embedded-devel" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-embedded-devel-5.1.73-3.el6_5.i686.rpm</filename><sum type="sha256">30de830d3882314ff4dee9acb98b46a713e6371edaafacbf521357ed5089192f</sum></package><package arch="x86_64" name="mysql-libs" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-libs-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">c290cdad58b25ca072f379c75462c07b37cd8ccdcf9663694038819704b4dfa1</sum></package><package arch="x86_64" name="mysql-embedded" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-embedded-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">1f8bcb8342746a26bf5beaede7abaf3812ca830b07b396f2ffdc56c235d4be84</sum></package><package arch="x86_64" name="mysql-bench" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-bench-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">f0e84e8327a27cb31c2c35b03b7fbf4b765b39e91507584feb00f83e04a37ee4</sum></package><package arch="i686" name="mysql-embedded" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-embedded-5.1.73-3.el6_5.i686.rpm</filename><sum type="sha256">f7477391da7ec2de17df305306fad87f411ff842b3d709ecc62a515cdcfc56ed</sum></package><package arch="x86_64" name="mysql-server" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-server-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">10c64f58725f411e9676b249c85b7808466a5f95d86d43dc579becc9bc4fc9e1</sum></package><package arch="x86_64" name="mysql-test" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-test-5.1.73-3.el6_5.x86_64.rpm</filename><sum type="sha256">169a87b72474771d2a6aba193a71568c86a0ccb1af2045c63a16525c716c2289</sum></package><package arch="i686" name="mysql-libs" release="3.el6_5" src="mysql-5.1.73-3.el6_5.src.rpm" version="5.1.73"><filename>mysql-libs-5.1.73-3.el6_5.i686.rpm</filename><sum type="sha256">101e89782ecddf43ed5ca4ce0093a0b629780727e7c28e118fac26ed303f7750</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5908" id="CVE-2013-5908" title="Mysql: Unspecified Vulnerability Related To Error Handling Dos (Cpu Jan 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001" id="CVE-2014-0001" title="Mysql: Command-Line Tool Buffer Overflow Via Long Server Version String" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0386" id="CVE-2014-0386" title="Mysql: Unspecified Vulnerability Related To Optimizer Dos (Cpu Jan 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0393" id="CVE-2014-0393" title="Mysql: Unspecified Vulnerability Related To Innodb Affecting Integrity (Cpu Jan 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0401" id="CVE-2014-0401" title="Mysql: Unspecified Dos Vulnerability (Cpu Jan 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0402" id="CVE-2014-0402" title="Mysql: Unspecified Vulnerability Related To Locking Dos (Cpu Jan 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0412" id="CVE-2014-0412" title="Mysql: Unspecified Vulnerability Related To Innodb Dos (Cpu Jan 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0437" id="CVE-2014-0437" title="Mysql: Unspecified Vulnerability Related To Optimizer Dos (Cpu Jan 2014)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053373" id="1053373" title="Mysql: Unspecified Vulnerability Related To Error Handling Dos (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053375" id="1053375" title="Mysql: Unspecified Vulnerability Related To Optimizer Dos (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053377" id="1053377" title="Mysql: Unspecified Vulnerability Related To Innodb Affecting Integrity (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053378" id="1053378" title="Mysql: Unspecified Dos Vulnerability (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053380" id="1053380" title="Mysql: Unspecified Vulnerability Related To Locking Dos (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053381" id="1053381" title="Mysql: Unspecified Vulnerability Related To Innodb Dos (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053390" id="1053390" title="Mysql: Unspecified Vulnerability Related To Optimizer Dos (Cpu Jan 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054592" id="1054592" title="Mysql: Command-Line Tool Buffer Overflow Via Long Server Version String" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1058719" id="1058719" title="Mysql Server Does Not Restart After Unclean Reboot" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0164.html" id="RHSA-2014:0164-1" title="Rhsa-2014:0164-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0175-1</id><title>Important: Piranha Security Update</title><description>It was discovered that the Piranha Configuration Tool did not properly restrict access to its web pages. A remote attacker able to connect to the Piranha Configuration Tool web server port could use this flaw to read or modify the LVS configuration without providing valid administrative credentials. (CVE-2013-6492) 
This update also fixes the following bug: 
* When the lvsd service attempted to start, the sem_timedwait() function received the interrupted function call (EINTR) error and exited, causing the lvsd service to fail to start. With this update, EINTR errors are correctly ignored during the start-up of the lvsd service.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-02-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="piranha" release="4.el6_5.2" src="piranha-0.8.6-4.el6_5.2.src.rpm" version="0.8.6"><filename>piranha-0.8.6-4.el6_5.2.x86_64.rpm</filename><sum type="sha256">39fca60c97d5e873cff92b41ff2325fcfe9c6448c664762e79f227fa7a208bc7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6492" id="CVE-2013-6492" title="Piranha: Web Ui Authentication Bypass Using Post Requests" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1043040" id="1043040" title="Piranha: Web Ui Authentication Bypass Using Post Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1055709" id="1055709" title="Pulse: Ignore Eintr While Waiting For Semaphore" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0175.html" id="RHSA-2014:0175-1" title="Rhsa-2014:0175-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0185-1</id><title>Moderate: Openswan Security Update</title><description>A NULL pointer dereference flaw was discovered in the way Openswan's IKE daemon processed IKEv2 payloads. A remote attacker could send specially crafted IKEv2 payloads that, when processed, would lead to a denial of service (daemon crash), possibly causing existing VPN connections to be dropped. (CVE-2013-6466)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-02-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openswan" release="27.2.el6_5" src="openswan-2.6.32-27.2.el6_5.src.rpm" version="2.6.32"><filename>openswan-2.6.32-27.2.el6_5.x86_64.rpm</filename><sum type="sha256">030978930b0230462ab25db144a7977bb9d6976bb30bd3690b9b8c188ceba1b3</sum></package><package arch="x86_64" name="openswan-doc" release="27.2.el6_5" src="openswan-2.6.32-27.2.el6_5.src.rpm" version="2.6.32"><filename>openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm</filename><sum type="sha256">4c3e5a97eddbfbc1d7ae6d61afd8bd4bcba458118a3ae541c4894a98576cd0fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6466" id="CVE-2013-6466" title="Openswan: Dereferencing Missing Ikev2 Payloads Causes Pluto Daemon To Restart" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1050277" id="1050277" title="Openswan: Dereferencing Missing Ikev2 Payloads Causes Pluto Daemon To Restart" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0185.html" id="RHSA-2014:0185-1" title="Rhsa-2014:0185-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0211-1</id><title>Important: Postgresql84 And Postgresql Security Update</title><description>Multiple stack-based buffer overflow flaws were found in the date/time implementation of PostgreSQL. An authenticated database user could provide a specially crafted date/time value that, when processed, could cause PostgreSQL to crash or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2014-0063) 
Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in various type input functions in PostgreSQL. An authenticated database user could possibly use these flaws to crash PostgreSQL or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2014-0064) 
Multiple potential buffer overflow flaws were found in PostgreSQL. An authenticated database user could possibly use these flaws to crash PostgreSQL or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2014-0065) 
It was found that granting an SQL role to a database user in a PostgreSQL database without specifying the "ADMIN" option allowed the grantee to remove other users from their granted role. An authenticated database user could use this flaw to remove a user from an SQL role which they were granted access to. (CVE-2014-0060) 
A flaw was found in the validator functions provided by PostgreSQL's procedural languages (PLs). An authenticated database user could possibly use this flaw to escalate their privileges. (CVE-2014-0061) 
A race condition was found in the way the CREATE INDEX command performed multiple independent lookups of a table that had to be indexed. An authenticated database user could possibly use this flaw to escalate their privileges. (CVE-2014-0062) 
It was found that the chkpass extension of PostgreSQL did not check the return value of the crypt() function. An authenticated database user could possibly use this flaw to crash PostgreSQL via a null pointer dereference. (CVE-2014-0066) 
These updated packages upgrade PostgreSQL to version 8.4.20, which fixes these issues as well as several non-security issues. Refer to the PostgreSQL Release Notes for a full list of changes: 
http://www.postgresql.org/docs/8.4/static/release-8-4-19.html http://www.postgresql.org/docs/8.4/static/release-8-4-20.html 
If the postgresql service is running, it will be automatically restarted after installing this update.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-03-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="postgresql-devel" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">3785addee36d7f6d41b88463fc255eb1403ba78c7f2e8a81ae3d81bb2ac12db3</sum></package><package arch="x86_64" name="postgresql-docs" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-docs-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">fcb0baf2a5d7a37a29cd92897c52aa121d141f5d8139a2f9c7b00edcaa2ac557</sum></package><package arch="i686" name="postgresql" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-1.el6_5.i686.rpm</filename><sum type="sha256">10bfacfea457c8d42793ed9daa62d3ba2dd405518aab0c787f3aa67ebb7f5d6b</sum></package><package arch="x86_64" name="postgresql" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">200c93ede0e1fef7e7ea4199af02f0d8ee3df13e156608c5405187afc6705403</sum></package><package arch="x86_64" name="postgresql-libs" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">493b3fb2affbdb10d01f348e1ff8db4bcadfa009f44b945d09b9c620f48d7bcf</sum></package><package arch="i686" name="postgresql-devel" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-1.el6_5.i686.rpm</filename><sum type="sha256">372c928132d745c595bc24f1e0082011f2f998b06c6861b420ba43f9ccd62324</sum></package><package arch="i686" name="postgresql-libs" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-1.el6_5.i686.rpm</filename><sum type="sha256">bfb2db59f55563313990d939afc2170ead385b2fb9b7457285f36cda55d0765d</sum></package><package arch="x86_64" name="postgresql-pltcl" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-pltcl-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">243581280ae31f77909cd222ae2364df295cd383c7aba2a9ca230035c876f5c3</sum></package><package arch="x86_64" name="postgresql-plpython" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-plpython-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">1aca17f6990d9f1a0391b5f1681cf3baca9d7e892edb01d51681d08ecd10b271</sum></package><package arch="x86_64" name="postgresql-server" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-server-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">8532a254ac87288186a6cc6fa95a97b5d164b12e0aae9e62d03739f35ebdf841</sum></package><package arch="x86_64" name="postgresql-test" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-test-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">990bc931469223f3785e736eca4a8569b03e3b79d53058965a340dca4a9ba1d2</sum></package><package arch="x86_64" name="postgresql-plperl" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-plperl-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">4e2f9672c24179b321465123aa8ae33a6e8beeab90876d2274dafc9a399d0f73</sum></package><package arch="x86_64" name="postgresql-contrib" release="1.el6_5" src="postgresql-8.4.20-1.el6_5.src.rpm" version="8.4.20"><filename>postgresql-contrib-8.4.20-1.el6_5.x86_64.rpm</filename><sum type="sha256">2984b6ddb5556170498db9937f6342d96b20bff6e2a9a66f184a583ce6f33434</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" id="CVE-2014-0060" title="Postgresql: Set Role Without Admin Option Allows Adding And Removing Group Members" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" id="CVE-2014-0061" title="Postgresql: Privilege Escalation Via Procedural Language Validator Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" id="CVE-2014-0062" title="Postgresql: Create Index Race Condition Possibly Leading To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" id="CVE-2014-0063" title="Postgresql: Stack-Based Buffer Overflow In Datetime Input/Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" id="CVE-2014-0064" title="Postgresql: Integer Overflows Leading To Buffer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" id="CVE-2014-0065" title="Postgresql: Possible Buffer Overflow Flaws" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" id="CVE-2014-0066" title="Postgresql: Null Pointer Dereference" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065219" id="1065219" title="Postgresql: Set Role Without Admin Option Allows Adding And Removing Group Members" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065220" id="1065220" title="Postgresql: Privilege Escalation Via Procedural Language Validator Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065222" id="1065222" title="Postgresql: Create Index Race Condition Possibly Leading To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065226" id="1065226" title="Postgresql: Stack-Based Buffer Overflow In Datetime Input/Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065230" id="1065230" title="Postgresql: Integer Overflows Leading To Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065235" id="1065235" title="Postgresql: Possible Buffer Overflow Flaws" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065236" id="1065236" title="Postgresql: Null Pointer Dereference" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0211.html" id="RHSA-2014:0211-1" title="Rhsa-2014:0211-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0222-1</id><title>Moderate: Libtiff Security Update</title><description>A heap-based buffer overflow and a use-after-free flaw were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. (CVE-2013-1960, CVE-2013-4232) 
Multiple buffer overflow flaws were found in the gif2tiff tool. An attacker could use these flaws to create a specially crafted GIF file that could cause gif2tiff to crash or, possibly, execute arbitrary code. (CVE-2013-4231, CVE-2013-4243, CVE-2013-4244) 
A flaw was found in the way libtiff handled OJPEG-encoded TIFF images. An attacker could use this flaw to create a specially crafted TIFF file that would cause an application using libtiff to crash. (CVE-2010-2596) 
Multiple buffer overflow flaws were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash. (CVE-2013-1961) 
All running applications linked against libtiff must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-03-04 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libtiff" release="10.el6_5" src="libtiff-3.9.4-10.el6_5.src.rpm" version="3.9.4"><filename>libtiff-3.9.4-10.el6_5.x86_64.rpm</filename><sum type="sha256">80af865f704d75f1c0fba592c796f37ce234b776aa446a73f731afaca05e4151</sum></package><package arch="x86_64" name="libtiff-devel" release="10.el6_5" src="libtiff-3.9.4-10.el6_5.src.rpm" version="3.9.4"><filename>libtiff-devel-3.9.4-10.el6_5.x86_64.rpm</filename><sum type="sha256">1b56c6297383ee9f86c6267004af3dbfb5b1cb23550356c008fd31b151f6d6ac</sum></package><package arch="i686" name="libtiff" release="10.el6_5" src="libtiff-3.9.4-10.el6_5.src.rpm" version="3.9.4"><filename>libtiff-3.9.4-10.el6_5.i686.rpm</filename><sum type="sha256">55a9428742b4fbe2cc98db0e8a576a07de267a527b25bdd1bd2e60af7e8b2ead</sum></package><package arch="i686" name="libtiff-devel" release="10.el6_5" src="libtiff-3.9.4-10.el6_5.src.rpm" version="3.9.4"><filename>libtiff-devel-3.9.4-10.el6_5.i686.rpm</filename><sum type="sha256">be9aae8ccf45be1b29c4cf6aa51e1a44a3e2c9a852b9ae1eb4785c4176b24229</sum></package><package arch="x86_64" name="libtiff-static" release="10.el6_5" src="libtiff-3.9.4-10.el6_5.src.rpm" version="3.9.4"><filename>libtiff-static-3.9.4-10.el6_5.x86_64.rpm</filename><sum type="sha256">0eee5c904f149c2750cb951dd5e8a591636cd64842c9c38690b7fe356de9a6bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2596" id="CVE-2010-2596" title="Libtiff: Assertion Failure On Downsampled Ojpeg File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" id="CVE-2013-1960" title="Libtiff (Tiff2Pdf): Heap-Based Buffer Overflow In T2_Process_Jpeg_Strip()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" id="CVE-2013-1961" title="Libtiff (Tiff2Pdf): Stack-Based Buffer Overflow With Malformed Image-Length And Resolution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" id="CVE-2013-4231" title="Libtiff (Gif2Tiff): Gif Lzw Decoder Missing Datasize Value Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" id="CVE-2013-4232" title="Libtiff (Tiff2Pdf): Use-After-Free In T2P_Readwrite_Pdf_Image()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" id="CVE-2013-4243" title="Libtiff (Gif2Tiff): Possible Heap-Based Buffer Overflow In Readgifimage()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" id="CVE-2013-4244" title="Libtiff (Gif2Tiff): Oob Write In Lzw Decompressor" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=610759" id="610759" title="Libtiff: Assertion Failure On Downsampled Ojpeg File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=952131" id="952131" title="Libtiff (Tiff2Pdf): Stack-Based Buffer Overflow With Malformed Image-Length And Resolution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=952158" id="952158" title="Libtiff (Tiff2Pdf): Heap-Based Buffer Overflow In T2_Process_Jpeg_Strip()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=995965" id="995965" title="Libtiff (Gif2Tiff): Gif Lzw Decoder Missing Datasize Value Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=995975" id="995975" title="Libtiff (Tiff2Pdf): Use-After-Free In T2P_Readwrite_Pdf_Image()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=996052" id="996052" title="Libtiff (Gif2Tiff): Possible Heap-Based Buffer Overflow In Readgifimage()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=996468" id="996468" title="Libtiff (Gif2Tiff): Oob Write In Lzw Decompressor" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0222.html" id="RHSA-2014:0222-1" title="Rhsa-2014:0222-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0246-1</id><title>Important: Gnutls Security Update</title><description>It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification. An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092) 
For the update to take effect, all applications linked to the GnuTLS library must be restarted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-03-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gnutls-guile" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-13.el6_5.i686.rpm</filename><sum type="sha256">01d0d772e832da6af0dfa496319ff1b369433c4a62b642f0a8335420e3bb440c</sum></package><package arch="i686" name="gnutls" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-13.el6_5.i686.rpm</filename><sum type="sha256">2769d76ebe114b51f05390d144e92be8f7b100263faa45165543c9d1ad6cc237</sum></package><package arch="i686" name="gnutls-devel" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-13.el6_5.i686.rpm</filename><sum type="sha256">a7f9e1c99e2290bb48bdcb227ae565a888d5c42846784770409f33b2bc41ee79</sum></package><package arch="x86_64" name="gnutls-devel" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-13.el6_5.x86_64.rpm</filename><sum type="sha256">e0f089a77813094d25db652e06d7ec429e42b780401f9e201f3b67a608abf74c</sum></package><package arch="x86_64" name="gnutls-guile" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-13.el6_5.x86_64.rpm</filename><sum type="sha256">6539912d9efa86eb70c5f842fa16fe5a63e7ad4df71aedb76f19cf6125245e94</sum></package><package arch="x86_64" name="gnutls" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-13.el6_5.x86_64.rpm</filename><sum type="sha256">664b5d0d06bbbd261ea550d63893adee99749473519ff026a52fd250f20b42d1</sum></package><package arch="x86_64" name="gnutls-utils" release="13.el6_5" src="gnutls-2.8.5-13.el6_5.src.rpm" version="2.8.5"><filename>gnutls-utils-2.8.5-13.el6_5.x86_64.rpm</filename><sum type="sha256">2e3c506aa67dfb8ce9526c9170106d4ec741b0d7a0ecfe2b81aa61d64cfa46c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" id="CVE-2014-0092" title="Gnutls: Incorrect Error Handling In Certificate Verification (Gnutls-Sa-2014-2)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069865" id="1069865" title="Gnutls: Incorrect Error Handling In Certificate Verification (Gnutls-Sa-2014-2)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0246.html" id="RHSA-2014:0246-1" title="Rhsa-2014:0246-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0255-1</id><title>Moderate: Subversion Security Update</title><description>A flaw was found in the way the mod_dav_svn module handled OPTIONS requests. A remote attacker with read access to an SVN repository served via HTTP could use this flaw to cause the httpd process that handled such a request to crash. (CVE-2014-0032) 
A flaw was found in the way Subversion handled file names with newline characters when the FSFS repository format was used. An attacker with commit access to an SVN repository could corrupt a revision by committing a specially crafted file. (CVE-2013-1968) 
A flaw was found in the way the svnserve tool of Subversion handled remote client network connections. An attacker with read access to an SVN repository served via svnserve could use this flaw to cause the svnserve daemon to exit, leading to a denial of service. (CVE-2013-2112) 
After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-03-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="subversion-javahl" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-javahl-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">0926d5d10626b6c9a1e7e73c5ff79df646f02a7b90bc0afce67c213b031f523b</sum></package><package arch="x86_64" name="subversion-ruby" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-ruby-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">3b3c2c00020b92d57638c3b621cef8f3faf4fc559a0167a1b6b75d4aa70dcad8</sum></package><package arch="x86_64" name="subversion-devel" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-devel-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">855dbdcec5b676772bb23fab47a3b7227bb8bf1dbd19a8177e3fd1d81f8669f5</sum></package><package arch="i686" name="subversion-kde" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-kde-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">b764dffb8da52fc5152ec9d5f0d494cb8558159f345d333c3f9a736a36d42263</sum></package><package arch="x86_64" name="subversion-javahl" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-javahl-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">8fbab47cd6be2eb727f2d8764764ee633ac36344085964933678754fb4cf1b8f</sum></package><package arch="x86_64" name="mod_dav_svn" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>mod_dav_svn-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">fedd2102b4629f0cc4ab6220b9ff510b6466234c43e37649b3170d4f5cb1c856</sum></package><package arch="x86_64" name="subversion-perl" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-perl-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">63f7a1991a684f84111414c8bc0f7ae4fdfd3c0712dd9a00676aa9b0f45cf4c9</sum></package><package arch="i686" name="subversion" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">33e00b00e2ee9105eccc06649f3481e9665bb8710e647d46e223f5b124fa8906</sum></package><package arch="noarch" name="subversion-svn2cl" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-svn2cl-1.6.11-10.el6_5.noarch.rpm</filename><sum type="sha256">3a774b64b1ba544cf4e5e036eb8ffa0020737257664d5682e23ef5aacd4db0c0</sum></package><package arch="x86_64" name="subversion-kde" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-kde-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">1aab58cc8587b7d3e6a30c524ccb82bd76e0e479a076d6790f85d8f4ae5a1891</sum></package><package arch="x86_64" name="subversion" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">1e66196e3957ee388f64145748fada72ce74680edf630475fd38ac1d7256b5a9</sum></package><package arch="i686" name="subversion-ruby" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-ruby-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">8339ae65a5e3d087eb653d2234406bc963228a7b2083dc24d529e3690431ad44</sum></package><package arch="i686" name="subversion-perl" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-perl-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">e54a8556b61022c48123618b875f760f59c258e64c62076d2c4820896911ec3d</sum></package><package arch="x86_64" name="subversion-gnome" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-gnome-1.6.11-10.el6_5.x86_64.rpm</filename><sum type="sha256">60931409dcb8800555467f02db964d9e7941635a4e0a34d9d488e6c8694e13ef</sum></package><package arch="i686" name="subversion-gnome" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-gnome-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">021efb183ae08dd8be8133f3f65ab955230b88023307d06de1fd9c521842226b</sum></package><package arch="i686" name="subversion-devel" release="10.el6_5" src="subversion-1.6.11-10.el6_5.src.rpm" version="1.6.11"><filename>subversion-devel-1.6.11-10.el6_5.i686.rpm</filename><sum type="sha256">9ab59e9178200ce679704e48ab7f9ed17c63f4bf2f886723c219d236ab14932a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968" id="CVE-2013-1968" title="Subversion (Fsfs Format): Filenames With Newline Character Can Lead To Revision Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112" id="CVE-2013-2112" title="Subversion: Remote Dos Due Improper Handling Of Early-Closing Tcp Connections" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032" id="CVE-2014-0032" title="Subversion: Mod_Dav_Svn Crash When Handling Certain Requests With Svnlistparentpath On" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1062042" id="1062042" title="Subversion: Mod_Dav_Svn Crash When Handling Certain Requests With Svnlistparentpath On" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=970014" id="970014" title="Subversion (Fsfs Format): Filenames With Newline Character Can Lead To Revision Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=970037" id="970037" title="Subversion: Remote Dos Due Improper Handling Of Early-Closing Tcp Connections" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0255.html" id="RHSA-2014:0255-1" title="Rhsa-2014:0255-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0292-1</id><title>Important: 389-Ds-Base Security Update</title><description>It was discovered that the 389 Directory Server did not properly handle certain SASL-based authentication mechanisms. A user able to authenticate to the directory using these SASL mechanisms could connect as any other directory user, including the administrative Directory Manager account. This could allow them to modify configuration values, as well as read and write any data the directory holds. (CVE-2014-0132) 
After installing this update, the 389 server service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-03-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base" release="32.el6_5" src="389-ds-base-1.2.11.15-32.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-32.el6_5.x86_64.rpm</filename><sum type="sha256">d98fe314f667976e7e82cd5f3f5944ad47e2dfd1a8d748b1a4ead0f02194f065</sum></package><package arch="i686" name="389-ds-base-libs" release="32.el6_5" src="389-ds-base-1.2.11.15-32.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-32.el6_5.i686.rpm</filename><sum type="sha256">030b193d924ab2f7a05bc96b98e696e92c042bc268711f7bada33156a83835cb</sum></package><package arch="i686" name="389-ds-base-devel" release="32.el6_5" src="389-ds-base-1.2.11.15-32.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-32.el6_5.i686.rpm</filename><sum type="sha256">c1934e6695a0bf69b189b245326cd06d2c2320ce3e316716d48e72e36b89020d</sum></package><package arch="x86_64" name="389-ds-base-libs" release="32.el6_5" src="389-ds-base-1.2.11.15-32.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-32.el6_5.x86_64.rpm</filename><sum type="sha256">fcdbbe61815e499b7cd8934c85039768c3b47ec010722ce809dbf221e352768e</sum></package><package arch="x86_64" name="389-ds-base-devel" release="32.el6_5" src="389-ds-base-1.2.11.15-32.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-32.el6_5.x86_64.rpm</filename><sum type="sha256">e415ed2fed9086ed762775a81bfb552b4c61331810c8a04d18af2301f07dee42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0132" id="CVE-2014-0132" title="389-Ds: Flaw In Parsing Authzid Can Lead To Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1074845" id="1074845" title="389-Ds: Flaw In Parsing Authzid Can Lead To Privilege Escalation" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0292.html" id="RHSA-2014:0292-1" title="Rhsa-2014:0292-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0293-1</id><title>Important: Udisks Security Update</title><description>A stack-based buffer overflow flaw was found in the way udisks handled files with long path names. A malicious, local user could use this flaw to create a specially crafted directory structure that, when processed by the udisks daemon, could lead to arbitrary code execution with the privileges of the udisks daemon (root). (CVE-2014-0004)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-03-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="udisks" release="7.el6_5" src="udisks-1.0.1-7.el6_5.src.rpm" version="1.0.1"><filename>udisks-1.0.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">9f8f221a8120cd16e308d307973b93bb80997e0c671e1b1f31f54e723ae5fce5</sum></package><package arch="i686" name="udisks-devel" release="7.el6_5" src="udisks-1.0.1-7.el6_5.src.rpm" version="1.0.1"><filename>udisks-devel-1.0.1-7.el6_5.i686.rpm</filename><sum type="sha256">2e6ca4f82393fceeecfcd7e6b43f023869e0afd8a1ae54e4366f4a826bc8beb0</sum></package><package arch="noarch" name="udisks-devel-docs" release="7.el6_5" src="udisks-1.0.1-7.el6_5.src.rpm" version="1.0.1"><filename>udisks-devel-docs-1.0.1-7.el6_5.noarch.rpm</filename><sum type="sha256">db2c9987624f55dd3da1a727d8f6e3f880c79b43288d66ce9c9ea30a936dbdfe</sum></package><package arch="x86_64" name="udisks-devel" release="7.el6_5" src="udisks-1.0.1-7.el6_5.src.rpm" version="1.0.1"><filename>udisks-devel-1.0.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">a03e05e92dcc4d6790543e81e084b87e83af0f88cf6590bf07b44c2f2f2887d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004" id="CVE-2014-0004" title="Udisks And Udisks2: Stack-Based Buffer Overflow When Handling Long Path Names" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1049703" id="1049703" title="Udisks And Udisks2: Stack-Based Buffer Overflow When Handling Long Path Names" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1074964" id="1074964" title="Multilib Conflicts For Udisks-Devel" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0293.html" id="RHSA-2014:0293-1" title="Rhsa-2014:0293-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0304-1</id><title>Important: Mutt Security Update</title><description>A heap-based buffer overflow flaw was found in the way mutt processed certain email headers. A remote attacker could use this flaw to send an email with specially crafted headers that, when processed, could cause mutt to crash or, potentially, execute arbitrary code with the permissions of the user running mutt. (CVE-2014-0467) 
All running instances of mutt must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-03-25 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="5" name="mutt" release="4.20091214hg736b6a.el6_5" src="mutt-1.5.20-4.20091214hg736b6a.el6_5.src.rpm" version="1.5.20"><filename>mutt-1.5.20-4.20091214hg736b6a.el6_5.x86_64.rpm</filename><sum type="sha256">9419325169c0d707032e5ebe207ad9ca6ac589447b49f1f2e3c3126292320e80</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" id="CVE-2014-0467" title="Mutt: Heap-Based Buffer Overflow When Parsing Certain Headers" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1075860" id="1075860" title="Mutt: Heap-Based Buffer Overflow When Parsing Certain Headers" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0304.html" id="RHSA-2014:0304-1" title="Rhsa-2014:0304-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0310-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1493, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512, CVE-2014-1513, CVE-2014-1514) 
Several information disclosure flaws were found in the way Firefox processed malformed web content. An attacker could use these flaws to gain access to sensitive information such as cross-domain content or protected memory addresses or, potentially, cause Firefox to crash. (CVE-2014-1497, CVE-2014-1508, CVE-2014-1505) 
A memory corruption flaw was found in the way Firefox rendered certain PDF files. An attacker able to trick a user into installing a malicious extension could use this flaw to crash Firefox or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1509) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-03-25 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_5" src="firefox-24.4.0-1.el6_5.src.rpm" version="24.4.0"><filename>firefox-24.4.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">3a78cfb23f31499ccd14ac3b03fea9f770fa797387cacba4cbd0bd96648df96c</sum></package><package arch="i686" name="firefox" release="1.el6_5" src="firefox-24.4.0-1.el6_5.src.rpm" version="24.4.0"><filename>firefox-24.4.0-1.el6_5.i686.rpm</filename><sum type="sha256">be78eba45e3b52be9409634e3db94666ef7eb917ffedeae13588e7b32d32a292</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" id="CVE-2014-1493" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.4) (Mfsa 2014-15)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" id="CVE-2014-1497" title="Mozilla: Out Of Bounds Read During Wav File Decoding (Mfsa 2014-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" id="CVE-2014-1505" title="Mozilla: Svg Filters Information Disclosure Through Fedisplacementmap (Mfsa 2014-28)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" id="CVE-2014-1508" title="Mozilla: Information Disclosure Through Polygon Rendering In Mathml (Mfsa 2014-26)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" id="CVE-2014-1509" title="Mozilla: Memory Corruption In Cairo During Pdf Font Rendering (Mfsa 2014-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" id="CVE-2014-1510" title="Mozilla: Privilege Escalation Using Webidl-Implemented Apis (Mfsa 2014-29)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" id="CVE-2014-1511" title="Mozilla: Privilege Escalation Using Webidl-Implemented Apis (Mfsa 2014-29)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" id="CVE-2014-1512" title="Mozilla: Use-After-Free In Typeobject (Mfsa 2014-30)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" id="CVE-2014-1513" title="Mozilla: Out-Of-Bounds Read/Write Through Neutering Arraybuffer Objects (Mfsa 2014-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" id="CVE-2014-1514" title="Mozilla: Out-Of-Bounds Write Through Typedarrayobject After Neutering (Mfsa 2014-32)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077013" id="1077013" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.4) (Mfsa 2014-15)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077016" id="1077016" title="Mozilla: Out Of Bounds Read During Wav File Decoding (Mfsa 2014-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077025" id="1077025" title="Mozilla: Information Disclosure Through Polygon Rendering In Mathml (Mfsa 2014-26)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077028" id="1077028" title="Mozilla: Memory Corruption In Cairo During Pdf Font Rendering (Mfsa 2014-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077029" id="1077029" title="Mozilla: Svg Filters Information Disclosure Through Fedisplacementmap (Mfsa 2014-28)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077490" id="1077490" title="Mozilla: Privilege Escalation Using Webidl-Implemented Apis (Mfsa 2014-29)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077491" id="1077491" title="Mozilla: Use-After-Free In Typeobject (Mfsa 2014-30)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077492" id="1077492" title="Mozilla: Out-Of-Bounds Read/Write Through Neutering Arraybuffer Objects (Mfsa 2014-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077494" id="1077494" title="Mozilla: Out-Of-Bounds Write Through Typedarrayobject After Neutering (Mfsa 2014-32)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0310.html" id="RHSA-2014:0310-1" title="Rhsa-2014:0310-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0316-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1493, CVE-2014-1510, CVE-2014-1511, CVE-2014-1512, CVE-2014-1513, CVE-2014-1514) 
Several information disclosure flaws were found in the way Thunderbird processed malformed web content. An attacker could use these flaws to gain access to sensitive information such as cross-domain content or protected memory addresses or, potentially, cause Thunderbird to crash. (CVE-2014-1497, CVE-2014-1508, CVE-2014-1505) 
A memory corruption flaw was found in the way Thunderbird rendered certain PDF files. An attacker able to trick a user into installing a malicious extension could use this flaw to crash Thunderbird or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1509) 
Note: All of the above issues cannot be exploited by a specially-crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-03-25 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_5" src="thunderbird-24.4.0-1.el6_5.src.rpm" version="24.4.0"><filename>thunderbird-24.4.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">131a4b408a4d3d9833fc7e7449ddd5135f3c71e3fd48f778ad12f4b99135c914</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" id="CVE-2014-1493" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.4) (Mfsa 2014-15)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" id="CVE-2014-1497" title="Mozilla: Out Of Bounds Read During Wav File Decoding (Mfsa 2014-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" id="CVE-2014-1505" title="Mozilla: Svg Filters Information Disclosure Through Fedisplacementmap (Mfsa 2014-28)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" id="CVE-2014-1508" title="Mozilla: Information Disclosure Through Polygon Rendering In Mathml (Mfsa 2014-26)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" id="CVE-2014-1509" title="Mozilla: Memory Corruption In Cairo During Pdf Font Rendering (Mfsa 2014-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" id="CVE-2014-1510" title="Mozilla: Privilege Escalation Using Webidl-Implemented Apis (Mfsa 2014-29)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" id="CVE-2014-1511" title="Mozilla: Privilege Escalation Using Webidl-Implemented Apis (Mfsa 2014-29)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" id="CVE-2014-1512" title="Mozilla: Use-After-Free In Typeobject (Mfsa 2014-30)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" id="CVE-2014-1513" title="Mozilla: Out-Of-Bounds Read/Write Through Neutering Arraybuffer Objects (Mfsa 2014-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" id="CVE-2014-1514" title="Mozilla: Out-Of-Bounds Write Through Typedarrayobject After Neutering (Mfsa 2014-32)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077013" id="1077013" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.4) (Mfsa 2014-15)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077016" id="1077016" title="Mozilla: Out Of Bounds Read During Wav File Decoding (Mfsa 2014-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077025" id="1077025" title="Mozilla: Information Disclosure Through Polygon Rendering In Mathml (Mfsa 2014-26)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077028" id="1077028" title="Mozilla: Memory Corruption In Cairo During Pdf Font Rendering (Mfsa 2014-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077029" id="1077029" title="Mozilla: Svg Filters Information Disclosure Through Fedisplacementmap (Mfsa 2014-28)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077490" id="1077490" title="Mozilla: Privilege Escalation Using Webidl-Implemented Apis (Mfsa 2014-29)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077491" id="1077491" title="Mozilla: Use-After-Free In Typeobject (Mfsa 2014-30)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077492" id="1077492" title="Mozilla: Out-Of-Bounds Read/Write Through Neutering Arraybuffer Objects (Mfsa 2014-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077494" id="1077494" title="Mozilla: Out-Of-Bounds Write Through Typedarrayobject After Neutering (Mfsa 2014-32)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0316.html" id="RHSA-2014:0316-1" title="Rhsa-2014:0316-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0321-1</id><title>Moderate: Net-Snmp Security Update</title><description>A buffer overflow flaw was found in the way the decode_icmp_msg() function in the ICMP-MIB implementation processed Internet Control Message Protocol (ICMP) message statistics reported in the /proc/net/snmp file. A remote attacker could send a message for each ICMP message type, which could potentially cause the snmpd service to crash when processing the /proc/net/snmp file. (CVE-2014-2284) 
This update also fixes the following bug: 
* The snmpd service parses the /proc/diskstats file to track disk usage statistics for UCD-DISKIO-MIB::diskIOTable. On systems with a large number of block devices, /proc/diskstats may be large in size and parsing it can take a non-trivial amount of CPU time. With this update, Net-SNMP introduces a new option, 'diskio', in the /etc/snmp/snmpd.conf file, which can be used to explicitly specify devices that should be monitored. Only these whitelisted devices are then reported in UCD-DISKIO- MIB::diskIOTable, thus speeding up snmpd on systems with numerous block devices. 
After installing this update, the snmpd service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-perl-5.5-49.el6_5.1.x86_64.rpm</filename><sum type="sha256">a006e4fbeac4903927a02023dbc1e9e4c8f4607f1242fdc1530b5abd1d462b4a</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-49.el6_5.1.i686.rpm</filename><sum type="sha256">cbd1752a5f6b9638f393bf8a72fa33c04a1a01175b1ec894adbaa266298db31e</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-5.5-49.el6_5.1.x86_64.rpm</filename><sum type="sha256">208ef874bd036e99fb7bac5ccfeea0f3c81c992ad996519678570e6b070ea898</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-49.el6_5.1.x86_64.rpm</filename><sum type="sha256">209935a2d3aee685d05ff51193f4b7c043dc44ea99db17ab57232ec2810d5b3d</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-python-5.5-49.el6_5.1.x86_64.rpm</filename><sum type="sha256">d81b8c7c27db36f13bae18092fadd15de57cd63690050311f6040061dd781a40</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-49.el6_5.1.i686.rpm</filename><sum type="sha256">ac60397d80c7d30a628bf5e264a26c2ec1b6b01eeb7f0117601b5b45b8f1702d</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-49.el6_5.1.x86_64.rpm</filename><sum type="sha256">97f0f8eef98b9909cdb6ca60d2f7a85a7d655b267d21b0e5df20f84110da5a96</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.el6_5.1" src="net-snmp-5.5-49.el6_5.1.src.rpm" version="5.5"><filename>net-snmp-utils-5.5-49.el6_5.1.x86_64.rpm</filename><sum type="sha256">af3c8f80c2f564c4ba110aa41155bd54aee88a1ba94038bc720c7145b93fdf1c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" id="CVE-2014-2284" title="Net-Snmp: Denial Of Service Flaw In Linux Implementation Of Icmp-Mib" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1070396" id="1070396" title="Net-Snmp: Denial Of Service Flaw In Linux Implementation Of Icmp-Mib" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0321.html" id="RHSA-2014:0321-1" title="Rhsa-2014:0321-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0328-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the get_rx_bufs() function in the vhost_net implementation in the Linux kernel handled error conditions reported by the vhost_get_vq_desc() function. A privileged guest user could use this flaw to crash the host. (CVE-2014-0055, Important) 
* A flaw was found in the way the Linux kernel processed an authenticated COOKIE_ECHO chunk during the initialization of an SCTP connection. A remote attacker could use this flaw to crash the system by initiating a specially crafted SCTP handshake in order to trigger a NULL pointer dereference on the system. (CVE-2014-0101, Important) 
* A flaw was found in the way the Linux kernel's CIFS implementation handled uncached write operations with specially crafted iovec structures. An unprivileged local user with access to a CIFS share could use this flaw to crash the system, leak kernel memory, or, potentially, escalate their privileges on the system. Note: the default cache settings for CIFS mounts on Scientific Linux 6 prohibit a successful exploitation of this issue. (CVE-2014-0069, Moderate) 
* A heap-based buffer overflow flaw was found in the Linux kernel's cdc- wdm driver, used for USB CDC WCM device management. An attacker with physical access to a system could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1860, Low) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-04-01 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">9c725ceb6eaa85a27f57c56f18837882a5d3be5bf9199cfc2d00fb7e1fd41a7d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">89f7fe8b2cc0c243eb3e67c20d6d72c5e54ee978571f8664a78ded3e440972c0</sum></package><package arch="x86_64" name="kernel-debug" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">2487e35084a9b268783f1567c93be79898927388520b0ec80c7b80f832f88de9</sum></package><package arch="noarch" name="kernel-firmware" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm</filename><sum type="sha256">ca9281b3d515c7e5dae87be651b06fc3a4f4fe65de3dc6e60d000809b844a2ab</sum></package><package arch="x86_64" name="perf" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">564b824ce5afbb9364e3591d46528980b620487784758d4eae3bd7bcfccf1bd4</sum></package><package arch="x86_64" name="kernel-devel" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">0caff6322358b9ff7b9803fc1b2da4fca4b75ccf54d5df8cbed6dc5a6879da18</sum></package><package arch="noarch" name="kernel-doc" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.11.2.el6.noarch.rpm</filename><sum type="sha256">659889aeaea8cf2acee8f425d047ca63bf1f9fe47ce6978451c37e2a884620f6</sum></package><package arch="x86_64" name="kernel-headers" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">59822e9917a80a9368883aa98d1397d5c0a1acbfadd34c4599860315c4c0b46d</sum></package><package arch="x86_64" name="python-perf" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.11.2.el6.x86_64.rpm</filename><sum type="sha256">1fb78e246c87330f9950f174764d9e6e21e6d2fb582c910c590575c36eb50815</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.11.2.el6" src="kernel-2.6.32-431.11.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm</filename><sum type="sha256">3c7e48c68935aef50bfd5d5fa7fecdcfc0dc10745af70a6041b2c0bef2f9cc89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860" id="CVE-2013-1860" title="Kernel: Usb: Cdc-Wdm Buffer Overflow Triggered By Device" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055" id="CVE-2014-0055" title="Kernel: Vhost-Net: Insufficient Handling Of Error Conditions In Get_Rx_Bufs()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069" id="CVE-2014-0069" title="Kernel: Cifs: Incorrect Handling Of Bogus User Pointers During Uncached Writes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101" id="CVE-2014-0101" title="Kernel: Net: Sctp: Null Pointer Dereference When Processing Authenticated Cookie_Echo Chunk" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1062577" id="1062577" title="Kernel: Vhost-Net: Insufficient Handling Of Error Conditions In Get_Rx_Bufs()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1064253" id="1064253" title="Kernel: Cifs: Incorrect Handling Of Bogus User Pointers During Uncached Writes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1070705" id="1070705" title="Kernel: Net: Sctp: Null Pointer Dereference When Processing Authenticated Cookie_Echo Chunk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921970" id="921970" title="Cve-2013-1860 Kernel: Usb: Cdc-Wdm Buffer Overflow Triggered By Device" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0328.html" id="RHSA-2014:0328-1" title="Rhsa-2014:0328-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0330-1</id><title>Moderate: Samba And Samba3X Security Update</title><description>It was found that certain Samba configurations did not enforce the password lockout mechanism. A remote attacker could use this flaw to perform password guessing attacks on Samba user accounts. Note: this flaw only affected Samba when deployed as a Primary Domain Controller. (CVE-2013-4496) 
A flaw was found in the way the pam_winbind module handled configurations that specified a non-existent group as required. An authenticated user could possibly use this flaw to gain access to a service using pam_winbind in its PAM configuration when group restriction was intended for access to the service. (CVE-2012-6150) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-common" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-common-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">f9ec32e1c091012ef5b7ffd7e72facafd12a101765d430d81ecb006c11e9ac47</sum></package><package arch="x86_64" name="samba" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">9e4dc7a3f6c9402211043f2c1876aaff223dc4333eadf63ea178ebc5a71de241</sum></package><package arch="x86_64" name="samba-winbind-clients" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-clients-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">c1447cc43ea6a82370297a38c066e7c3bfbbe6739358f1f92e056686e8aeb6f1</sum></package><package arch="x86_64" name="samba-client" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-client-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">ac2bb7566810fac019f60c0fb8896a1a2340dbdb2f2a95e060ed10314a36a665</sum></package><package arch="x86_64" name="libsmbclient-devel" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-devel-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">67af82d80a24c19d6803f5f059adc55bd3e81ba4ca0fc190c6e96046a255f942</sum></package><package arch="i686" name="samba-winbind-clients" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-clients-3.6.9-168.el6_5.i686.rpm</filename><sum type="sha256">58c9991b27302915642d6fa26f98194f1931bae8297dca3c5793abf08fb9345b</sum></package><package arch="i686" name="samba-common" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-common-3.6.9-168.el6_5.i686.rpm</filename><sum type="sha256">aa2821b565984a03dd32126f2a1d3c4be2f9fe5f3cdbd010c11f4c8340c9275c</sum></package><package arch="x86_64" name="samba-swat" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-swat-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">3e17934fc3c83838ccefea597594edfe31668ab4ad90aa9c8046d7bbcb58cf82</sum></package><package arch="x86_64" name="libsmbclient" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">dfbe0f3827c3292e5533bfaddda48e9fb43b248a3250c3f6230eeaab841eb912</sum></package><package arch="i686" name="libsmbclient-devel" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-devel-3.6.9-168.el6_5.i686.rpm</filename><sum type="sha256">1abcda541df909f996cd6eeb271a0497369b8c4f59cb2595cd59fd6ecb51f88c</sum></package><package arch="x86_64" name="samba-doc" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-doc-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">7f76a365009dac2b51eb968c8c5fbfa3e4219ad0149ba4136175f2d50f947287</sum></package><package arch="x86_64" name="samba-winbind-devel" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-devel-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">ad8f48c4686ef45810a5ab49da9179ce1f8fdc9e7877ac77ce5a864cd19157f0</sum></package><package arch="x86_64" name="samba-winbind" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">05e4694cd907d671c8a0ae14fb765c7bd1d24109eccffa598fbd11a596d5fdf0</sum></package><package arch="i686" name="samba-winbind-devel" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-devel-3.6.9-168.el6_5.i686.rpm</filename><sum type="sha256">7fd5cbbf06ad6c73b3ba1896c02c95c93c6e90723646317bd30dccebe3122fe0</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-krb5-locator-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">796e7f7bc661603605a155d044346d2920cfdd97ac69d876a7586cc0c4bee509</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>samba-domainjoin-gui-3.6.9-168.el6_5.x86_64.rpm</filename><sum type="sha256">1408fd395fbe0a5419e4b0f69890b03af261b619603a381450001c2d20342a80</sum></package><package arch="i686" name="libsmbclient" release="168.el6_5" src="samba-3.6.9-168.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-3.6.9-168.el6_5.i686.rpm</filename><sum type="sha256">6a303db4ffeaff9842b3bceed4cb27fb1449dd01ab72c796885006e8220eccaa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" id="CVE-2012-6150" title="Samba: Pam_Winbind Fails Open When Non-Existent Group Specified To Require_Membership_Of" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" id="CVE-2013-4496" title="Samba: Password Lockout Not Enforced For Samr Password Changes" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036897" id="1036897" title="Cve-2012-6150 Samba: Pam_Winbind Fails Open When Non-Existent Group Specified To Require_Membership_Of" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1072792" id="1072792" title="Cve-2013-4496 Samba: Password Lockout Not Enforced For Samr Password Changes" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0330.html" id="RHSA-2014:0330-1" title="Rhsa-2014:0330-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0342-1</id><title>Moderate: Wireshark Security Update</title><description>Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-2281, CVE-2014-2299) 
Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2013-6336, CVE-2013-6337, CVE-2013-6338, CVE-2013-6339, CVE-2013-6340, CVE-2014-2283, CVE-2013-7112, CVE-2013-7114) 
All running instances of Wireshark must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-08 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="wireshark-gnome" release="7.el6_5" src="wireshark-1.8.10-7.el6_5.src.rpm" version="1.8.10"><filename>wireshark-gnome-1.8.10-7.el6_5.x86_64.rpm</filename><sum type="sha256">098a531e6a6b1c267f5ba4b42fea8a1fd5e0e09eb59a7c1334d569414e8bad33</sum></package><package arch="x86_64" name="wireshark-devel" release="7.el6_5" src="wireshark-1.8.10-7.el6_5.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-7.el6_5.x86_64.rpm</filename><sum type="sha256">c781703233d4f7d8d48bcb41e5f08efbb414bf131e97fa2baf94a15e6d9bb93b</sum></package><package arch="i686" name="wireshark" release="7.el6_5" src="wireshark-1.8.10-7.el6_5.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-7.el6_5.i686.rpm</filename><sum type="sha256">2dbb4527195b1b1b190799ccb6050d4c3c99f59ac099b9f2e65bd267ff8b3f47</sum></package><package arch="i686" name="wireshark-devel" release="7.el6_5" src="wireshark-1.8.10-7.el6_5.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-7.el6_5.i686.rpm</filename><sum type="sha256">bda85f8b2cd15e7f31dacf09293d75f354993a6ef7f6361b4b9e87bd3e5a804e</sum></package><package arch="x86_64" name="wireshark" release="7.el6_5" src="wireshark-1.8.10-7.el6_5.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-7.el6_5.x86_64.rpm</filename><sum type="sha256">e813670e26e8bdd2fd93eb25300d8c2963e93d5e21694cd99fc0cee46d0fe0da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" id="CVE-2013-6336" title="Wireshark: Ieee 802.15.4 Dissector Crash (Wnpa-Sec-2013-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" id="CVE-2013-6337" title="Wireshark: Nbap Dissector Crash (Wnpa-Sec-2013-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" id="CVE-2013-6338" title="Wireshark: Sip Dissector Crash (Wnpa-Sec-2013-63)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" id="CVE-2013-6339" title="Wireshark: Activemq Openwire Dissector Large Loop (Wnpa-Sec-2013-64)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" id="CVE-2013-6340" title="Wireshark: Tcp Dissector Crash (Wnpa-Sec-2013-65)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" id="CVE-2013-7112" title="Wireshark: Sip Dissector Could Go Into An Infinite Loop (Wnpa-Sec-2013-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" id="CVE-2013-7114" title="Wireshark: Ntlmssp V2 Dissector Could Crash (Wnpa-Sec-2013-68)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" id="CVE-2014-2281" title="Wireshark: Nfs Dissector Crash (Wnpa-Sec-2014-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" id="CVE-2014-2283" title="Wireshark: Rlc Dissector Crash (Wnpa-Sec-2014-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" id="CVE-2014-2299" title="Wireshark: Buffer Overflow In Mpeg File Parser (Wnpa-Sec-2014-04)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026534" id="1026534" title="Wireshark: Ieee 802.15.4 Dissector Crash (Wnpa-Sec-2013-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026538" id="1026538" title="Wireshark: Nbap Dissector Crash (Wnpa-Sec-2013-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026539" id="1026539" title="Wireshark: Sip Dissector Crash (Wnpa-Sec-2013-63)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026540" id="1026540" title="Wireshark: Activemq Openwire Dissector Large Loop (Wnpa-Sec-2013-64)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026541" id="1026541" title="Wireshark: Tcp Dissector Crash (Wnpa-Sec-2013-65)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1044508" id="1044508" title="Wireshark: Sip Dissector Could Go Into An Infinite Loop (Wnpa-Sec-2013-66)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1044510" id="1044510" title="Wireshark: Ntlmssp V2 Dissector Could Crash (Wnpa-Sec-2013-68)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1074109" id="1074109" title="Wireshark: Buffer Overflow In Mpeg File Parser (Wnpa-Sec-2014-04)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1074111" id="1074111" title="Wireshark: Rlc Dissector Crash (Wnpa-Sec-2014-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1074114" id="1074114" title="Wireshark: Nfs Dissector Crash (Wnpa-Sec-2014-01)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0342.html" id="RHSA-2014:0342-1" title="Rhsa-2014:0342-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0348-1</id><title>Important: Xalan-J2 Security Update</title><description>It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations (XSLT) content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan- Java. (CVE-2014-0107)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-04-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="xalan-j2-demo" release="9.9.el6_5" src="xalan-j2-2.7.0-9.9.el6_5.src.rpm" version="2.7.0"><filename>xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm</filename><sum type="sha256">991b76fcf972c93377439d01023ff231f58203fb620707faf99eb7a3fd2a7e3c</sum></package><package arch="noarch" name="xalan-j2-manual" release="9.9.el6_5" src="xalan-j2-2.7.0-9.9.el6_5.src.rpm" version="2.7.0"><filename>xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm</filename><sum type="sha256">d79f6085962939c24d9b16bb5dc0a2bc066cf04e4c1c82310d7e5f37600551b0</sum></package><package arch="noarch" name="xalan-j2-javadoc" release="9.9.el6_5" src="xalan-j2-2.7.0-9.9.el6_5.src.rpm" version="2.7.0"><filename>xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm</filename><sum type="sha256">d3147f2646320c4005fe9cbc91c4930f441b45201e3d147efdda56a788f01fb4</sum></package><package arch="noarch" name="xalan-j2" release="9.9.el6_5" src="xalan-j2-2.7.0-9.9.el6_5.src.rpm" version="2.7.0"><filename>xalan-j2-2.7.0-9.9.el6_5.noarch.rpm</filename><sum type="sha256">16b6a952f29585d4c0324ebde6bf9e578f37f6e531d2212bcb792ae63fd65f58</sum></package><package arch="noarch" name="xalan-j2-xsltc" release="9.9.el6_5" src="xalan-j2-2.7.0-9.9.el6_5.src.rpm" version="2.7.0"><filename>xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm</filename><sum type="sha256">f8440257d1fa7ec32b9aacf638fd1b9fec0dc09d86c1630a243d48ae75f4ba85</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" id="CVE-2014-0107" title="Xalan-Java: Insufficient Constraints In Secure Processing Feature" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1080248" id="1080248" title="Xalan-Java: Insufficient Constraints In Secure Processing Feature" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0348.html" id="RHSA-2014:0348-1" title="Rhsa-2014:0348-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0370-1</id><title>Moderate: Httpd Security Update</title><description>It was found that the mod_dav module did not correctly strip leading white space from certain elements in a parsed XML. In certain httpd configurations that use the mod_dav module (for example when using the mod_dav_svn module), a remote attacker could send a specially crafted DAV request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2013-6438) 
A buffer over-read flaw was found in the httpd mod_log_config module. In configurations where cookie logging is enabled (on Scientific Linux it is disabled by default), a remote attacker could use this flaw to crash the httpd child process via an HTTP request with a malformed cookie header. (CVE-2014-0098) 
After installing the updated packages, the httpd daemon will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="httpd-devel" release="30.sl6" src="httpd-2.2.15-30.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-30.sl6.i686.rpm</filename><sum type="sha256">21a2fe3eb9983b13e1417ce91a9863ef581eddcc0147bdab69ea61aec482f11a</sum></package><package arch="noarch" name="httpd-manual" release="30.sl6" src="httpd-2.2.15-30.sl6.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-30.sl6.noarch.rpm</filename><sum type="sha256">230102c405d273db69436427b9db9d7bcaf11ea0506763cb7e679295fb4f3e5a</sum></package><package arch="x86_64" name="httpd" release="30.sl6" src="httpd-2.2.15-30.sl6.src.rpm" version="2.2.15"><filename>httpd-2.2.15-30.sl6.x86_64.rpm</filename><sum type="sha256">2a84a251cc7601f6e1bc827c4a91e02540bc5f59f097b8548e9e1e4ffe8a2a96</sum></package><package arch="x86_64" name="httpd-devel" release="30.sl6" src="httpd-2.2.15-30.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-30.sl6.x86_64.rpm</filename><sum type="sha256">5e717780e55b683b058a04a6408366391cb7b440090d652b0b8d37c9e5373731</sum></package><package arch="x86_64" name="httpd-tools" release="30.sl6" src="httpd-2.2.15-30.sl6.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-30.sl6.x86_64.rpm</filename><sum type="sha256">755ad705e903bde455eeb6fecab9f36dbb9060b1fa39497c52ad6450e1b1515c</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="30.sl6" src="httpd-2.2.15-30.sl6.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-30.sl6.x86_64.rpm</filename><sum type="sha256">8398ce0ce0b66932e97bb6ba4b8f51ee01ca27cae9d580c8671cfdffc8e8624d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" id="CVE-2013-6438" title="Httpd: Mod_Dav Denial Of Service Via Crafted Dav Write Request" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" id="CVE-2014-0098" title="Httpd: Mod_Log_Config Does Not Properly Handle Logging Certain Cookies Resulting In Dos" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077867" id="1077867" title="Httpd: Mod_Dav Denial Of Service Via Crafted Dav Write Request" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077871" id="1077871" title="Httpd: Mod_Log_Config Does Not Properly Handle Logging Certain Cookies Resulting In Dos" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0370.html" id="RHSA-2014:0370-1" title="Rhsa-2014:0370-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0376-1</id><title>Important: Openssl Security Update</title><description>An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) 
For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-04-08 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl" release="16.el6_5.7" src="openssl-1.0.1e-16.el6_5.7.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.7.i686.rpm</filename><sum type="sha256">f32b128f16f15d7ef76bf89ff96a9616055d919c7c19045fbea0f5b62469ffb2</sum></package><package arch="i686" name="openssl-devel" release="16.el6_5.7" src="openssl-1.0.1e-16.el6_5.7.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.7.i686.rpm</filename><sum type="sha256">5cb72550008552f60733e1a54e39ee4e4d5a1279aff4507d22ce8cd86f770a6c</sum></package><package arch="x86_64" name="openssl" release="16.el6_5.7" src="openssl-1.0.1e-16.el6_5.7.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.7.x86_64.rpm</filename><sum type="sha256">e0c1b34892dbe6aad3cc40a9291d735bc393786f5a6f23b88e64b447a49cc4d7</sum></package><package arch="x86_64" name="openssl-static" release="16.el6_5.7" src="openssl-1.0.1e-16.el6_5.7.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm</filename><sum type="sha256">4ff0c5c23facd8b45de6a08d0c30997739b589388eb0e6b6e2c9447060333f52</sum></package><package arch="x86_64" name="openssl-devel" release="16.el6_5.7" src="openssl-1.0.1e-16.el6_5.7.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm</filename><sum type="sha256">9c142795d19a74e354a3e6a7f19939463c53a2d1231e9fee5610ea5510f183c0</sum></package><package arch="x86_64" name="openssl-perl" release="16.el6_5.7" src="openssl-1.0.1e-16.el6_5.7.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm</filename><sum type="sha256">e1f5711eed6e9b212d3ebe7f164412b5fc41b501e26e8ffc745863acefaee36c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" id="CVE-2014-0160" title="Openssl: Information Disclosure In Handling Of Tls Heartbeat Extension Packets" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1084875" id="1084875" title="Openssl: Information Disclosure In Handling Of Tls Heartbeat Extension Packets" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0376.html" id="RHSA-2014:0376-1" title="Rhsa-2014:0376-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0383-1</id><title>Moderate: Samba4 Security Update</title><description>It was found that certain Samba configurations did not enforce the password lockout mechanism. A remote attacker could use this flaw to perform password guessing attacks on Samba user accounts. Note: this flaw only affected Samba when deployed as a Primary Domain Controller. (CVE-2013-4496) 
A flaw was found in Samba's "smbcacls" command, which is used to set or get ACLs on SMB file shares. Certain command line options of this command would incorrectly remove an ACL previously applied on a file or a directory, leaving the file or directory without the intended ACL. (CVE-2013-6442) 
A flaw was found in the way the pam_winbind module handled configurations that specified a non-existent group as required. An authenticated user could possibly use this flaw to gain access to a service using pam_winbind in its PAM configuration when group restriction was intended for access to the service. (CVE-2012-6150) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-common" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-common-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">0ffafc42016520628ee68300e49868a5472473d932f3a06b26c0ae35283f50d8</sum></package><package arch="x86_64" name="samba4-dc-libs" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-libs-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">390f326921145391f972f1d18d3ca8e53efb1905d6ed1a9b74989fc612563a23</sum></package><package arch="x86_64" name="samba4-pidl" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-pidl-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">86264cbb1013551e347444ef42846fda482e8328c4fb2c8f36de7a2737afb74f</sum></package><package arch="x86_64" name="samba4" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">8e4264dfd61b7d143b4f196448800efc123f98e181b47c2a596d4e8d0751cc37</sum></package><package arch="x86_64" name="samba4-devel" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-devel-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">51015365b860e9ad2e3ef5adeca66483b30ef3536870a02214908af7dd620a79</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-krb5-locator-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">b9cbd56b3373cca013ccf7c28956a6be7862b93bbda980672c430b65a28d5512</sum></package><package arch="x86_64" name="samba4-dc" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">9239fc5bbd45a7a2c4417e10db570c0371555c0a3a7921f5e9c76f4baee3bf85</sum></package><package arch="x86_64" name="samba4-python" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-python-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">167d463f77e3b2c16cb9c746047eafcaa28bb2ee468df24f5b219845ff2a3ff3</sum></package><package arch="x86_64" name="samba4-swat" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-swat-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">cc77a9fb06420f454c6f614b8199fbf5a8e0bd8a6a34bb258293319cb5b0832c</sum></package><package arch="x86_64" name="samba4-libs" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-libs-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">bf56aa3a8a9e732fff9f60faaf3d6d2c7cdae6529674574a52cd0a4029b6fb1b</sum></package><package arch="x86_64" name="samba4-client" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-client-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">db95a80925a599ecddc7d2ad5b6117369255d692813882a9f38374b6de96faaa</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-clients-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">360b08052c58d3f18fdaf3f53ba3d6df60a06eadeec52e7e45d2faf3d7d385a9</sum></package><package arch="x86_64" name="samba4-winbind" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">81564a06bbb5c18e280f6649d99313c14e223767774662f4265d41fe6f6840f5</sum></package><package arch="x86_64" name="samba4-test" release="61.el6_5.rc4" src="samba4-4.0.0-61.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-test-4.0.0-61.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">291dfeaafcd499539adeb4da87aad91e62179a5b236a64af75a28d3a5f55be9a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" id="CVE-2012-6150" title="Samba: Pam_Winbind Fails Open When Non-Existent Group Specified To Require_Membership_Of" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" id="CVE-2013-4496" title="Samba: Password Lockout Not Enforced For Samr Password Changes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442" id="CVE-2013-6442" title="Samba: Smbcacls Will Delete Acl Lists In Certain Circumstances" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036897" id="1036897" title="Cve-2012-6150 Samba: Pam_Winbind Fails Open When Non-Existent Group Specified To Require_Membership_Of" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1044099" id="1044099" title="Samba: Smbcacls Will Delete Acl Lists In Certain Circumstances" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1072792" id="1072792" title="Cve-2013-4496 Samba: Password Lockout Not Enforced For Samr Password Changes" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0383.html" id="RHSA-2014:0383-1" title="Rhsa-2014:0383-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0406-1</id><title>Critical: Java-1.7.0-Openjdk Security Update</title><description>An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) 
Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) 
Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0455, CVE-2014-0461) 
Multiple improper permission check issues were discovered in the AWT, JAX- WS, JAXB, Libraries, Security, Sound, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-2402, CVE-2014-0446, CVE-2014-2413, CVE-2014-0454, CVE-2014-2427, CVE-2014-0459) 
Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) 
It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) 
It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) 
It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) 
An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-04-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.4.7.1.el6_5" src="java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm" version="1.7.0.55"><filename>java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm</filename><sum type="sha256">6e40e4a6864b3363bd9cc5274e842ec985c2469ec409d12e9a2888a3a7577f82</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.4.7.1.el6_5" src="java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm" version="1.7.0.55"><filename>java-1.7.0-openjdk-src-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm</filename><sum type="sha256">8e295df3323be1b5e13807ca20467f76b0f90d874e632c04e4cce63f69c555cf</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.4.7.1.el6_5" src="java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm" version="1.7.0.55"><filename>java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm</filename><sum type="sha256">db576018124bdfa9136525b5c1bf931744ad3c9f19958a3228fa029ddca687ec</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.4.7.1.el6_5" src="java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm" version="1.7.0.55"><filename>java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.1.el6_5.noarch.rpm</filename><sum type="sha256">d4e0087e5a7617143d10c0be4f7a079658e083b8ee62149601b3401592114908</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.4.7.1.el6_5" src="java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.src.rpm" version="1.7.0.55"><filename>java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.1.el6_5.x86_64.rpm</filename><sum type="sha256">b3f8c84bb3e40b9d647006f58a41a2f742167227286efa3cc368871b8342d426</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" id="CVE-2014-0429" title="Openjdk: Incorrect Mlib/Raster Image Validation (2D, 8027841)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" id="CVE-2014-0446" title="Openjdk: Protect Logger Handlers (Libraries, 8029740)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" id="CVE-2014-0451" title="Openjdk: Awt Incorrect Flavormap Seperation (Awt, 8026797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" id="CVE-2014-0452" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026801)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" id="CVE-2014-0453" title="Openjdk: Rsa Unpadding Timing Issues (Security, 8027766)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" id="CVE-2014-0454" title="Openjdk: Prevent Signature_Primitive_Set From Being Modified (Security, 8029745)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" id="CVE-2014-0455" title="Openjdk: Methodhandle Variable Argument Lists Handling (Libraries, 8029844)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" id="CVE-2014-0456" title="Openjdk: System.Arraycopy() Element Race Condition (Hotspot, 8029858)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" id="CVE-2014-0457" title="Openjdk: Serviceloader Exception Handling Security Bypass (Libraries, 8031394)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" id="CVE-2014-0458" title="Openjdk: Activation Framework Default Command Map Caching (Jax-Ws, 8025152)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" id="CVE-2014-0459" title="Lcms: Insufficient Icc Profile Version Validation (Openjdk 2D, 8031335)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" id="CVE-2014-0460" title="Openjdk: Missing Randomization Of Jndi Dns Client Query Ids (Jndi, 8030731)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" id="CVE-2014-0461" title="Openjdk: Better Scriptenginemanager Scriptengine Management (Libraries, 8036794)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" id="CVE-2014-1876" title="Openjdk: Insecure Temporary File Use In Unpack200 (Libraries, 8033618)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" id="CVE-2014-2397" title="Openjdk: Classfile Parser Invalid Bootstrapmethods Attribute Length (Hotspot, 8034926)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" id="CVE-2014-2398" title="Openjdk: Insufficient Escaping Of Window Title String (Javadoc, 8026736)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" id="CVE-2014-2402" title="Openjdk: Incorrect Nio Channel Separation (Libraries, 8026716)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" id="CVE-2014-2403" title="Openjdk: Jaxp Charinfo File Access Restriction (Jaxp, 8029282)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" id="CVE-2014-2412" title="Openjdk: Awt Thread Context Handling (Awt, 8025010)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" id="CVE-2014-2413" title="Openjdk: Method Handle Call Hierachy Bypass (Libraries, 8032686)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" id="CVE-2014-2414" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxb, 8025030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" id="CVE-2014-2421" title="Openjdk: Jpeg Decoder Input Stream Handling (2D, 8029854)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" id="CVE-2014-2423" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026188)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" id="CVE-2014-2427" title="Openjdk: Remove Insecure Java Sound Provider Caching (Sound, 8026163)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060907" id="1060907" title="Openjdk: Insecure Temporary File Use In Unpack200 (Libraries, 8033618)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1086632" id="1086632" title="Openjdk: Insufficient Escaping Of Window Title String (Javadoc, 8026736)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1086645" id="1086645" title="Openjdk: Rsa Unpadding Timing Issues (Security, 8027766)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087409" id="1087409" title="Openjdk: Incorrect Mlib/Raster Image Validation (2D, 8027841)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087411" id="1087411" title="Openjdk: Serviceloader Exception Handling Security Bypass (Libraries, 8031394)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087413" id="1087413" title="Openjdk: System.Arraycopy() Element Race Condition (Hotspot, 8029858)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087417" id="1087417" title="Openjdk: Jpeg Decoder Input Stream Handling (2D, 8029854)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087423" id="1087423" title="Openjdk: Classfile Parser Invalid Bootstrapmethods Attribute Length (Hotspot, 8034926)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087424" id="1087424" title="Openjdk: Methodhandle Variable Argument Lists Handling (Libraries, 8029844)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087426" id="1087426" title="Openjdk: Better Scriptenginemanager Scriptengine Management (Libraries, 8036794)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087427" id="1087427" title="Openjdk: Awt Thread Context Handling (Awt, 8025010)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087428" id="1087428" title="Openjdk: Awt Incorrect Flavormap Seperation (Awt, 8026797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087430" id="1087430" title="Openjdk: Activation Framework Default Command Map Caching (Jax-Ws, 8025152)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087431" id="1087431" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxb, 8025030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087434" id="1087434" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026188)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087436" id="1087436" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026801)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087438" id="1087438" title="Openjdk: Incorrect Nio Channel Separation (Libraries, 8026716)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087439" id="1087439" title="Openjdk: Protect Logger Handlers (Libraries, 8029740)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087440" id="1087440" title="Openjdk: Prevent Signature_Primitive_Set From Being Modified (Security, 8029745)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087441" id="1087441" title="Openjdk: Remove Insecure Java Sound Provider Caching (Sound, 8026163)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087442" id="1087442" title="Openjdk: Missing Randomization Of Jndi Dns Client Query Ids (Jndi, 8030731)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087443" id="1087443" title="Openjdk: Jaxp Charinfo File Access Restriction (Jaxp, 8029282)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087444" id="1087444" title="Lcms: Insufficient Icc Profile Version Validation (Openjdk 2D, 8031335)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087446" id="1087446" title="Openjdk: Method Handle Call Hierachy Bypass (Libraries, 8032686)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0406.html" id="RHSA-2014:0406-1" title="Rhsa-2014:0406-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0408-1</id><title>Important: Java-1.6.0-Openjdk Security Update</title><description>An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. (CVE-2014-0429) 
Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions. (CVE-2014-0456, CVE-2014-2397, CVE-2014-2421) 
Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-0457, CVE-2014-0461) 
Multiple improper permission check issues were discovered in the AWT, JAX- WS, JAXB, Libraries, and Sound components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-2412, CVE-2014-0451, CVE-2014-0458, CVE-2014-2423, CVE-2014-0452, CVE-2014-2414, CVE-2014-0446, CVE-2014-2427) 
Multiple flaws were identified in the Java Naming and Directory Interface (JNDI) DNS client. These flaws could make it easier for a remote attacker to perform DNS spoofing attacks. (CVE-2014-0460) 
It was discovered that the JAXP component did not properly prevent access to arbitrary files when a SecurityManager was present. This flaw could cause a Java application using JAXP to leak sensitive information, or affect application availability. (CVE-2014-2403) 
It was discovered that the Security component in OpenJDK could leak some timing information when performing PKCS#1 unpadding. This could possibly lead to the disclosure of some information that was meant to be protected by encryption. (CVE-2014-0453) 
It was discovered that the fix for CVE-2013-5797 did not properly resolve input sanitization flaws in javadoc. When javadoc documentation was generated from an untrusted Java source code and hosted on a domain not controlled by the code author, these issues could make it easier to perform cross-site scripting (XSS) attacks. (CVE-2014-2398) 
An insecure temporary file use flaw was found in the way the unpack200 utility created log files. A local attacker could possibly use this flaw to perform a symbolic link attack and overwrite arbitrary files with the privileges of the user running unpack200. (CVE-2014-1876) 
This update also fixes the following bug: 
* The OpenJDK update to IcedTea version 1.13 introduced a regression related to the handling of the jdk_version_info variable. This variable was not properly zeroed out before being passed to the Java Virtual Machine, resulting in a memory leak in the java.lang.ref.Finalizer class. This update fixes this issue, and memory leaks no longer occur. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-04-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="5.1.13.3.el6_5" src="java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-devel-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm</filename><sum type="sha256">73c0aa24de31ffa54e9412fcf0489f2be8d538dfd3092d102c585468dc2ae280</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="5.1.13.3.el6_5" src="java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-demo-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm</filename><sum type="sha256">8f663a120e86a5b3f9bff482fefc1c8e32492165b3e78ea3c14442d98a133b62</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="5.1.13.3.el6_5" src="java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm</filename><sum type="sha256">a377f93bbe0352ecd1fd41996939c3d8999631fbabe6928494c339022d3cd88f</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="5.1.13.3.el6_5" src="java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-src-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm</filename><sum type="sha256">f57155b1f182b310dd02e5f91c31e4510bbc48265c4c666bcd22e2727cec3092</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="5.1.13.3.el6_5" src="java-1.6.0-openjdk-1.6.0.0-5.1.13.3.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-javadoc-1.6.0.0-5.1.13.3.el6_5.x86_64.rpm</filename><sum type="sha256">781cbc859b9c9696cd0b9c316fe468d1ba7841cf41ff7ffd82e3ab0430ab7068</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" id="CVE-2014-0429" title="Openjdk: Incorrect Mlib/Raster Image Validation (2D, 8027841)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" id="CVE-2014-0446" title="Openjdk: Protect Logger Handlers (Libraries, 8029740)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" id="CVE-2014-0451" title="Openjdk: Awt Incorrect Flavormap Seperation (Awt, 8026797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" id="CVE-2014-0452" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026801)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" id="CVE-2014-0453" title="Openjdk: Rsa Unpadding Timing Issues (Security, 8027766)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" id="CVE-2014-0456" title="Openjdk: System.Arraycopy() Element Race Condition (Hotspot, 8029858)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" id="CVE-2014-0457" title="Openjdk: Serviceloader Exception Handling Security Bypass (Libraries, 8031394)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" id="CVE-2014-0458" title="Openjdk: Activation Framework Default Command Map Caching (Jax-Ws, 8025152)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" id="CVE-2014-0460" title="Openjdk: Missing Randomization Of Jndi Dns Client Query Ids (Jndi, 8030731)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" id="CVE-2014-0461" title="Openjdk: Better Scriptenginemanager Scriptengine Management (Libraries, 8036794)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" id="CVE-2014-1876" title="Openjdk: Insecure Temporary File Use In Unpack200 (Libraries, 8033618)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" id="CVE-2014-2397" title="Openjdk: Classfile Parser Invalid Bootstrapmethods Attribute Length (Hotspot, 8034926)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" id="CVE-2014-2398" title="Openjdk: Insufficient Escaping Of Window Title String (Javadoc, 8026736)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" id="CVE-2014-2403" title="Openjdk: Jaxp Charinfo File Access Restriction (Jaxp, 8029282)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" id="CVE-2014-2412" title="Openjdk: Awt Thread Context Handling (Awt, 8025010)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" id="CVE-2014-2414" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxb, 8025030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" id="CVE-2014-2421" title="Openjdk: Jpeg Decoder Input Stream Handling (2D, 8029854)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" id="CVE-2014-2423" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026188)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" id="CVE-2014-2427" title="Openjdk: Remove Insecure Java Sound Provider Caching (Sound, 8026163)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060907" id="1060907" title="Openjdk: Insecure Temporary File Use In Unpack200 (Libraries, 8033618)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1085373" id="1085373" title="Java.Lang.Ref.Finalizer Leak When Upgrading From 1.62 To 1.66" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1086632" id="1086632" title="Openjdk: Insufficient Escaping Of Window Title String (Javadoc, 8026736)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1086645" id="1086645" title="Openjdk: Rsa Unpadding Timing Issues (Security, 8027766)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087409" id="1087409" title="Openjdk: Incorrect Mlib/Raster Image Validation (2D, 8027841)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087411" id="1087411" title="Openjdk: Serviceloader Exception Handling Security Bypass (Libraries, 8031394)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087413" id="1087413" title="Openjdk: System.Arraycopy() Element Race Condition (Hotspot, 8029858)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087417" id="1087417" title="Openjdk: Jpeg Decoder Input Stream Handling (2D, 8029854)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087423" id="1087423" title="Openjdk: Classfile Parser Invalid Bootstrapmethods Attribute Length (Hotspot, 8034926)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087426" id="1087426" title="Openjdk: Better Scriptenginemanager Scriptengine Management (Libraries, 8036794)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087427" id="1087427" title="Openjdk: Awt Thread Context Handling (Awt, 8025010)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087428" id="1087428" title="Openjdk: Awt Incorrect Flavormap Seperation (Awt, 8026797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087430" id="1087430" title="Openjdk: Activation Framework Default Command Map Caching (Jax-Ws, 8025152)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087431" id="1087431" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxb, 8025030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087434" id="1087434" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026188)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087436" id="1087436" title="Openjdk: Incorrect Caching Of Data Initialized Via Tccl (Jaxws, 8026801)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087439" id="1087439" title="Openjdk: Protect Logger Handlers (Libraries, 8029740)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087441" id="1087441" title="Openjdk: Remove Insecure Java Sound Provider Caching (Sound, 8026163)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087442" id="1087442" title="Openjdk: Missing Randomization Of Jndi Dns Client Query Ids (Jndi, 8030731)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087443" id="1087443" title="Openjdk: Jaxp Charinfo File Access Restriction (Jaxp, 8029282)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0408.html" id="RHSA-2014:0408-1" title="Rhsa-2014:0408-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0420-1</id><title>Moderate: Qemu-Kvm Security Update</title><description>Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0143, CVE-2014-0144, CVE-2014-0145, CVE-2014-0147) 
A buffer overflow flaw was found in the way the virtio_net_handle_mac() function of QEMU processed guest requests to update the table of MAC addresses. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0150) 
A divide-by-zero flaw was found in the seek_to_sector() function of the parallels block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0142) 
A NULL pointer dereference flaw was found in the QCOW2 block driver in QEMU. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0146) 
It was found that the block driver for Hyper-V VHDX images did not correctly calculate BAT (Block Allocation Table) entries due to a missing bounds check. An attacker able to modify a disk image file loaded by a guest could use this flaw to crash the guest. (CVE-2014-0148) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.415.el6_5.8" src="qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.415.el6_5.8.x86_64.rpm</filename><sum type="sha256">3603c3fc06a03e54261781075fffb90faebd874213bf496b10afa9d1bcf05211</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.415.el6_5.8" src="qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.415.el6_5.8.x86_64.rpm</filename><sum type="sha256">6e1f82205544c6af1367037677743b178f9f5d297a5fc0442d0a75507c513fc4</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.415.el6_5.8" src="qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.415.el6_5.8.x86_64.rpm</filename><sum type="sha256">085ad92261e65b21ca78967b5727ff2a41bd183837c34a423ce9a1ad1d3115d5</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.415.el6_5.8" src="qemu-kvm-0.12.1.2-2.415.el6_5.8.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.415.el6_5.8.x86_64.rpm</filename><sum type="sha256">b8d284a2b70cf2b7a42887b667bdb8b8125ead994bad3ddb27823ecd1a910d94</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" id="CVE-2014-0142" title="Qemu: Crash By Possible Division By Zero" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" id="CVE-2014-0143" title="Qemu: Block: Multiple Integer Overflow Flaws" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" id="CVE-2014-0144" title="Qemu: Block: Missing Input Validation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" id="CVE-2014-0145" title="Qemu: Prevent Possible Buffer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" id="CVE-2014-0146" title="Qemu: Qcow2: Null Dereference In Qcow2_Open() Error Path" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" id="CVE-2014-0147" title="Qemu: Block: Possible Crash Due Signed Types Or Logic Error" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0148" id="CVE-2014-0148" title="Qemu: Vhdx: Bounds Checking For Block_Size And Logical_Sector_Size" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" id="CVE-2014-0150" title="Qemu: Virtio-Net: Buffer Overflow In Virtio_Net_Handle_Mac() Function" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078201" id="1078201" title="Qemu: Crash By Possible Division By Zero" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078212" id="1078212" title="Qemu: Vhdx: Bounds Checking For Block_Size And Logical_Sector_Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078232" id="1078232" title="Qemu: Qcow2: Null Dereference In Qcow2_Open() Error Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078846" id="1078846" title="Qemu: Virtio-Net: Buffer Overflow In Virtio_Net_Handle_Mac() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078848" id="1078848" title="Qemu: Block: Possible Crash Due Signed Types Or Logic Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078885" id="1078885" title="Qemu: Prevent Possible Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1079140" id="1079140" title="Qemu: Block: Multiple Integer Overflow Flaws" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1079240" id="1079240" title="Qemu: Block: Missing Input Validation" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0420.html" id="RHSA-2014:0420-1" title="Rhsa-2014:0420-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0429-1</id><title>Moderate: Tomcat6 Security Update</title><description>It was found that when Tomcat processed a series of HTTP requests in which at least one request contained either multiple content-length headers, or one content-length header with a chunked transfer-encoding header, Tomcat would incorrectly handle the request. A remote attacker could use this flaw to poison a web cache, perform cross-site scripting (XSS) attacks, or obtain sensitive information from other requests. (CVE-2013-4286) 
It was discovered that the fix for CVE-2012-3544 did not properly resolve a denial of service flaw in the way Tomcat processed chunk extensions and trailing headers in chunked requests. A remote attacker could use this flaw to send an excessively long request that, when processed by Tomcat, could consume network bandwidth, CPU, and memory on the Tomcat server. Note that chunked transfer encoding is enabled by default. (CVE-2013-4322) 
A denial of service flaw was found in the way Apache Commons FileUpload handled small-sized buffers used by MultipartStream. A remote attacker could use this flaw to create a malformed Content-Type header for a multipart request, causing JBoss Web to enter an infinite loop when processing such an incoming request. (CVE-2014-0050) 
Tomcat must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-04-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-javadoc" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">b8cd720d070ad55e69da71f61106fde8d49a693cf700f35bdcfe9851df3200b4</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">a3dee69bd078e35b7be538cb243d8348b3f78d2e19d21b3509e71928fbc824aa</sum></package><package arch="noarch" name="tomcat6" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">33d5c89576fc8be236f5674b46525e88dfea2ae81698143ea9ed6a819af7405a</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">53a49899541ed7d50ce5fd8682c5125ccb203bbe39ba4397f789d1c0b80a2a72</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">364f1aa13e9759628f0dc825b426b1c704b1586ed4883d5cfb85e80140527365</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">80e5c5be43c987a823ad7d9d0eb49a81b4051d0489647d6b7664c03efa217393</sum></package><package arch="noarch" name="tomcat6-lib" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">4d4165dbfc60bda00bf428c2b7d202343091313ab2ee9959568aebeddbdfb314</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">6bbfbf6ee08c88b1a52388f439badb146199ca622b5fed6977b10036de4cd917</sum></package><package arch="noarch" name="tomcat6-webapps" release="64.el6_5" src="tomcat6-6.0.24-64.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-64.el6_5.noarch.rpm</filename><sum type="sha256">ba9def21369894f2922f97c7e1c5ef02af937bb47b7599911f74918fcf60e379</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286" id="CVE-2013-4286" title="Tomcat: Multiple Content-Length Header Poisoning Flaws" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322" id="CVE-2013-4322" title="Tomcat: Incomplete Fix For Cve-2012-3544" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050" id="CVE-2014-0050" title="Apache-Commons-Fileupload: Denial Of Service Due To Too-Small Buffer Size Used By Multipartstream" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1062337" id="1062337" title="Apache-Commons-Fileupload: Denial Of Service Due To Too-Small Buffer Size Used By Multipartstream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069905" id="1069905" title="Tomcat: Incomplete Fix For Cve-2012-3544" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069921" id="1069921" title="Tomcat: Multiple Content-Length Header Poisoning Flaws" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0429.html" id="RHSA-2014:0429-1" title="Rhsa-2014:0429-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0448-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1518, CVE-2014-1524, CVE-2014-1529, CVE-2014-1531) 
A use-after-free flaw was found in the way Firefox resolved hosts in certain circumstances. An attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1532) 
An out-of-bounds read flaw was found in the way Firefox decoded JPEG images. Loading a web page containing a specially crafted JPEG image could cause Firefox to crash. (CVE-2014-1523) 
A flaw was found in the way Firefox handled browser navigations through history. An attacker could possibly use this flaw to cause the address bar of the browser to display a web page name while loading content from an entirely different web page, which could allow for cross-site scripting (XSS) attacks. (CVE-2014-1530) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-05-06 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_5" src="firefox-24.5.0-1.el6_5.src.rpm" version="24.5.0"><filename>firefox-24.5.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">671b6f5ad7c6d478d57bea715aeacb3094f73781cd063113be475247494f1c01</sum></package><package arch="i686" name="firefox" release="1.el6_5" src="firefox-24.5.0-1.el6_5.src.rpm" version="24.5.0"><filename>firefox-24.5.0-1.el6_5.i686.rpm</filename><sum type="sha256">fa027daf7e33b8158486ac38dc2b82605a9b52b42040b92eab7bd575bcbaceea</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" id="CVE-2014-1518" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.5) (Mfsa 2014-34)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" id="CVE-2014-1523" title="Mozilla: Out Of Bounds Read While Decoding Jpg Images (Mfsa-2014-37)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" id="CVE-2014-1524" title="Mozilla: Buffer Overflow When Using Non-Xbl Object As Xbl (Mfsa 2014-38)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" id="CVE-2014-1529" title="Mozilla: Privilege Escalation Through Web Notification Api (Mfsa 2014-42)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" id="CVE-2014-1530" title="Mozilla: Cross-Site Scripting (Xss) Using History Navigations (Mfsa 2014-43)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" id="CVE-2014-1531" title="Mozilla: Use-After-Free In Imgloader While Resizing Images (Mfsa 2014-44)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" id="CVE-2014-1532" title="Mozilla: Use-After-Free In Nshostresolver (Mfsa 2014-46)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1054242" id="1054242" title="Rhevm: Extremely High Memory Usage In Firefox 24 Esr On Rhel 6.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092657" id="1092657" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.5) (Mfsa 2014-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092660" id="1092660" title="Mozilla: Out Of Bounds Read While Decoding Jpg Images (Mfsa-2014-37)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092663" id="1092663" title="Mozilla: Buffer Overflow When Using Non-Xbl Object As Xbl (Mfsa 2014-38)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092664" id="1092664" title="Mozilla: Privilege Escalation Through Web Notification Api (Mfsa 2014-42)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092666" id="1092666" title="Mozilla: Cross-Site Scripting (Xss) Using History Navigations (Mfsa 2014-43)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092668" id="1092668" title="Mozilla: Use-After-Free In Imgloader While Resizing Images (Mfsa 2014-44)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092670" id="1092670" title="Mozilla: Use-After-Free In Nshostresolver (Mfsa 2014-46)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0448.html" id="RHSA-2014:0448-1" title="Rhsa-2014:0448-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0449-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1518, CVE-2014-1524, CVE-2014-1529, CVE-2014-1531) 
A use-after-free flaw was found in the way Thunderbird resolved hosts in certain circumstances. An attacker could use this flaw to crash Thunderbird or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1532) 
An out-of-bounds read flaw was found in the way Thunderbird decoded JPEG images. Loading an email or a web page containing a specially crafted JPEG image could cause Thunderbird to crash. (CVE-2014-1523) 
A flaw was found in the way Thunderbird handled browser navigations through history. An attacker could possibly use this flaw to cause the address bar of the browser to display a web page name while loading content from an entirely different web page, which could allow for cross- site scripting (XSS) attacks. (CVE-2014-1530) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-05-06 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_5" src="thunderbird-24.5.0-1.el6_5.src.rpm" version="24.5.0"><filename>thunderbird-24.5.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">d29122ab81a14c8da678ddd379153c29b9028a22879af8aab949831f6ae33c1b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" id="CVE-2014-1518" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.5) (Mfsa 2014-34)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" id="CVE-2014-1523" title="Mozilla: Out Of Bounds Read While Decoding Jpg Images (Mfsa-2014-37)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" id="CVE-2014-1524" title="Mozilla: Buffer Overflow When Using Non-Xbl Object As Xbl (Mfsa 2014-38)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" id="CVE-2014-1529" title="Mozilla: Privilege Escalation Through Web Notification Api (Mfsa 2014-42)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" id="CVE-2014-1530" title="Mozilla: Cross-Site Scripting (Xss) Using History Navigations (Mfsa 2014-43)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" id="CVE-2014-1531" title="Mozilla: Use-After-Free In Imgloader While Resizing Images (Mfsa 2014-44)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" id="CVE-2014-1532" title="Mozilla: Use-After-Free In Nshostresolver (Mfsa 2014-46)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092657" id="1092657" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.5) (Mfsa 2014-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092660" id="1092660" title="Mozilla: Out Of Bounds Read While Decoding Jpg Images (Mfsa-2014-37)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092663" id="1092663" title="Mozilla: Buffer Overflow When Using Non-Xbl Object As Xbl (Mfsa 2014-38)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092664" id="1092664" title="Mozilla: Privilege Escalation Through Web Notification Api (Mfsa 2014-42)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092666" id="1092666" title="Mozilla: Cross-Site Scripting (Xss) Using History Navigations (Mfsa 2014-43)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092668" id="1092668" title="Mozilla: Use-After-Free In Imgloader While Resizing Images (Mfsa 2014-44)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092670" id="1092670" title="Mozilla: Use-After-Free In Nshostresolver (Mfsa 2014-46)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0449.html" id="RHSA-2014:0449-1" title="Rhsa-2014:0449-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0475-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol (DCCP) packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-2523, Important) 
* A flaw was found in the way the Linux kernel's Adaptec RAID controller (aacraid) checked permissions of compat IOCTLs. A local attacker could use this flaw to bypass intended security restrictions. (CVE-2013-6383, Moderate) 
* A flaw was found in the way the handle_rx() function handled large network packets when mergeable buffers were disabled. A privileged guest user could use this flaw to crash the host or corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0077, Moderate) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-05-13 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">f7f5782b1aa875b7155b8cf0622d22ca7971ec83ce1e1b400ea10d076c600567</sum></package><package arch="x86_64" name="kernel-debug" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">933136221d3f6617a1013efc69f15114554933cc784582e1abe57e593a77862a</sum></package><package arch="x86_64" name="kernel-headers" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">97750725fe6f611cc2c17f9dce6b78d13bed92d34e260820efef59c1f27a3f55</sum></package><package arch="noarch" name="kernel-doc" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.17.1.el6.noarch.rpm</filename><sum type="sha256">8053628a4723f25c306d35271f510c92841d4a728ce0adc9ba155db772443595</sum></package><package arch="x86_64" name="kernel" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">bc2ed466be630915038cf08a9a8b1f9dae8635cef5eb73ac4c5cb891adb0672f</sum></package><package arch="x86_64" name="python-perf" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">c3eb58e15509889ff648e5234bb46869e13ec5b99cac0cd477b149df20d3aae5</sum></package><package arch="x86_64" name="perf" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">ff5c29cb686a230ca03b79d65396bdee2e0a799e8c08d077a8798b3a2567b29a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.17.1.el6.noarch.rpm</filename><sum type="sha256">4a23c9ef53f85141717725dc41b3054b17ea4d2826ecf58a4cf23f31917092c9</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.17.1.el6.x86_64.rpm</filename><sum type="sha256">47963ffda51458283c2340b28c03eab92162466378a4cf10805fb8dc6160edf5</sum></package><package arch="noarch" name="kernel-firmware" release="431.17.1.el6" src="kernel-2.6.32-431.17.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.17.1.el6.noarch.rpm</filename><sum type="sha256">e781c970a1cbe8a7affa92d5d39d409b37c76d3b1a1edbd0d358b646f65d59de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383" id="CVE-2013-6383" title="Kernel: Aacraid Driver Compat Ioctl Missing Capability Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" id="CVE-2014-0077" title="Kernel: Vhost-Net: Insufficiency In Handling Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523" id="CVE-2014-2523" title="Kernel: Netfilter: Nf_Conntrack_Dccp: Incorrect Skb_Header_Pointer Api Usages" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1033530" id="1033530" title="Kernel: Aacraid Driver Compat Ioctl Missing Capability Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1064440" id="1064440" title="Kernel: Vhost-Net: Insufficiency In Handling Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077343" id="1077343" title="Kernel: Netfilter: Nf_Conntrack_Dccp: Incorrect Skb_Header_Pointer Api Usages" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0475.html" id="RHSA-2014:0475-1" title="Rhsa-2014:0475-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0513-1</id><title>Moderate: Libxml2 Security Update</title><description>It was discovered that libxml2 loaded external parameter entities even when entity substitution was disabled. A remote attacker able to provide a specially crafted XML file to an application linked against libxml2 could use this flaw to conduct XML External Entity (XXE) attacks, possibly resulting in a denial of service or an information leak on the system. (CVE-2014-0191) 
An out-of-bounds read flaw was found in the way libxml2 detected the end of an XML file. A remote attacker could provide a specially crafted XML file that, when processed by an application linked against libxml2, could cause the application to crash. (CVE-2013-2877) 
The desktop must be restarted (log out, then log back in) for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-05-27 00:00:00" /><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libxml2-devel" release="14.el6_5.1" src="libxml2-2.7.6-14.el6_5.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-14.el6_5.1.x86_64.rpm</filename><sum type="sha256">104d2fcec80d22b488d0e3ac1f619194b7716d7de764128bd3e6266ca241bb11</sum></package><package arch="x86_64" name="libxml2-python" release="14.el6_5.1" src="libxml2-2.7.6-14.el6_5.1.src.rpm" version="2.7.6"><filename>libxml2-python-2.7.6-14.el6_5.1.x86_64.rpm</filename><sum type="sha256">c84aa2e49012d9a74a80ad37dc59041a3241d5d8381e85aed88222676bdaa165</sum></package><package arch="i686" name="libxml2" release="14.el6_5.1" src="libxml2-2.7.6-14.el6_5.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-14.el6_5.1.i686.rpm</filename><sum type="sha256">a9312711c46f77a2a8b2f36b3c61c32d49f8187aadd2e36661aee5ab5dee2b22</sum></package><package arch="i686" name="libxml2-devel" release="14.el6_5.1" src="libxml2-2.7.6-14.el6_5.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-14.el6_5.1.i686.rpm</filename><sum type="sha256">d3699021c5a93ac827ac8a400f00ab69a918be89ac6a0816657ea8aa6235023e</sum></package><package arch="x86_64" name="libxml2" release="14.el6_5.1" src="libxml2-2.7.6-14.el6_5.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-14.el6_5.1.x86_64.rpm</filename><sum type="sha256">9f833c5cd6bb26f87554d0a079a432ca81ea0ef8e263ff9bc8a8f78375020485</sum></package><package arch="x86_64" name="libxml2-static" release="14.el6_5.1" src="libxml2-2.7.6-14.el6_5.1.src.rpm" version="2.7.6"><filename>libxml2-static-2.7.6-14.el6_5.1.x86_64.rpm</filename><sum type="sha256">56ac4cac1910943f2df3f5d2add8a793b68dae3e210b724960961006e59efc76</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" id="CVE-2013-2877" title="Libxml2: Out-Of-Bounds Read Via A Document That Ends Abruptly" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" id="CVE-2014-0191" title="Libxml2: External Parameter Entity Loaded When Entity Substitution Is Disabled" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1090976" id="1090976" title="Libxml2: External Parameter Entity Loaded When Entity Substitution Is Disabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=983204" id="983204" title="Libxml2: Out-Of-Bounds Read Via A Document That Ends Abruptly" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0513.html" id="RHSA-2014:0513-1" title="Rhsa-2014:0513-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0560-1</id><title>Moderate: Libvirt Security Update</title><description>It was found that libvirt passes the XML_PARSE_NOENT flag when parsing XML documents using the libxml2 library, in which case all XML entities in the parsed documents are expanded. A user able to force libvirtd to parse an XML document with an entity pointing to a special file that blocks on read access could use this flaw to cause libvirtd to hang indefinitely, resulting in a denial of service on the system. (CVE-2014-0179) 
This update also fixes the following bugs: 
* When hot unplugging a virtual CPU (vCPU), libvirt kept a pointer to already freed memory if the vCPU was pinned to a host CPU. Consequently, when reading the CPU pinning information, libvirt terminated unexpectedly due to an attempt to access this memory. This update ensures that libvirt releases the pointer to the previously allocated memory when a vCPU is being hot unplugged, and it no longer crashes in this situation. 
* Previously, libvirt passed an incorrect argument to the "tc" command when setting quality of service (QoS) on a network interface controller (NIC). As a consequence, QoS was applied only to IP traffic. With this update, libvirt constructs the "tc" command correctly so that QoS is applied to all traffic as expected. 
* When using the sanlock daemon for managing access to shared storage, libvirt expected all QEMU domains to be registered with sanlock. However, if a QEMU domain was started prior to enabling sanlock, the domain was not registered with sanlock. Consequently, migration of a virtual machine (VM) from such a QEMU domain failed with a libvirt error. With this update, libvirt verifies whether a QEMU domain process is registered with sanlock before it starts working with the domain, ensuring that migration of virtual machines works as expected. 
After installing the updated packages, libvirtd will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-06-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt-client" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-29.el6_5.8.x86_64.rpm</filename><sum type="sha256">4a700ebd90509dbc1e73c6b49fd210bb53942efd9637abed1d5e77ad10944faa</sum></package><package arch="x86_64" name="libvirt-python" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-29.el6_5.8.x86_64.rpm</filename><sum type="sha256">6588d49cb7504730413d6c92dcd5b222f92992c9df98432903858faeec92579f</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-29.el6_5.8.x86_64.rpm</filename><sum type="sha256">2c4e978e0897bc923cc7b2b738db05fe71d060f3040ecd8cf2498d7a3c406cdf</sum></package><package arch="i686" name="libvirt-devel" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-29.el6_5.8.i686.rpm</filename><sum type="sha256">8276494e5c8d3b4091d372fac0740b0fd24631d6a9d4c27d0f63861b6d40d235</sum></package><package arch="i686" name="libvirt-client" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-29.el6_5.8.i686.rpm</filename><sum type="sha256">6bc8bb99a78432b2d3ba3d4687f2c57e84a3da39dd1beafd75a30e8d1dda5d5a</sum></package><package arch="x86_64" name="libvirt" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-29.el6_5.8.x86_64.rpm</filename><sum type="sha256">13e773e0aef88a75dc914390952f3c8e450c3637aae046eb3da822f77e1f88d0</sum></package><package arch="x86_64" name="libvirt-devel" release="29.el6_5.8" src="libvirt-0.10.2-29.el6_5.8.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-29.el6_5.8.x86_64.rpm</filename><sum type="sha256">f4a4067a563c92f17499bcd382f45d50ce32261b684c07e61ed361e9175aa87b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" id="CVE-2014-0179" title="Libvirt: Unsafe Parsing Of Xml Documents Allows Libvirt Dos And/Or Arbitrary File Read" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1088290" id="1088290" title="Libvirt: Unsafe Parsing Of Xml Documents Allows Libvirt Dos And/Or Arbitrary File Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1091206" id="1091206" title="Libvirtd Crashed After Hot-Unplug The Vcpus Which Is Pinned To Host Cpus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096806" id="1096806" title="[Bug] Quality Of Service Does Just Apply To Protocol &quot;Ip&quot; Instead Of The Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097227" id="1097227" title="Vm Migration In Rhev Environment Failed Due To Libvirt Error &quot;Failed To Inquire Lock: No Such Process&quot;" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0560.html" id="RHSA-2014:0560-1" title="Rhsa-2014:0560-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0561-1</id><title>Moderate: Curl Security Update</title><description>It was found that libcurl could incorrectly reuse existing connections for requests that should have used different or no authentication credentials, when using one of the following protocols: HTTP(S) with NTLM authentication, LDAP(S), SCP, or SFTP. If an application using the libcurl library connected to a remote server with certain authentication credentials, this flaw could cause other requests to use those same credentials. (CVE-2014-0015, CVE-2014-0138) 
This update also fixes the following bugs: 
* Previously, the libcurl library was closing a network socket without first terminating the SSL connection using the socket. This resulted in a write after close and consequent leakage of memory dynamically allocated by the SSL library. An upstream patch has been applied on libcurl to fix this bug. As a result, the write after close no longer happens, and the SSL library no longer leaks memory. 
* Previously, the libcurl library did not implement a non-blocking SSL handshake, which negatively affected performance of applications based on libcurl's multi API. To fix this bug, the non-blocking SSL handshake has been implemented by libcurl. With this update, libcurl's multi API immediately returns the control back to the application whenever it cannot read/write data from/to the underlying network socket. 
* Previously, the curl package could not be rebuilt from sources due to an expired cookie in the upstream test-suite, which runs during the build. An upstream patch has been applied to postpone the expiration date of the cookie, which makes it possible to rebuild the package from sources again. 
* Previously, the libcurl library attempted to authenticate using Kerberos whenever such an authentication method was offered by the server. This caused problems when the server offered multiple authentication methods and Kerberos was not the selected one. An upstream patch has been applied on libcurl to fix this bug. Now libcurl no longer uses Kerberos authentication if another authentication method is selected. 
All running applications that use libcurl have to be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-06-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libcurl-devel" release="37.el6_5.3" src="curl-7.19.7-37.el6_5.3.src.rpm" version="7.19.7"><filename>libcurl-devel-7.19.7-37.el6_5.3.x86_64.rpm</filename><sum type="sha256">cd95dc43b191b9c84da128c1249a8990fb4e704e343971c7a235957195e13e08</sum></package><package arch="x86_64" name="curl" release="37.el6_5.3" src="curl-7.19.7-37.el6_5.3.src.rpm" version="7.19.7"><filename>curl-7.19.7-37.el6_5.3.x86_64.rpm</filename><sum type="sha256">8403847aaca48ab55282455957f4271951ad2ba91f55a724d2aa3f3a8ff0adb4</sum></package><package arch="x86_64" name="libcurl" release="37.el6_5.3" src="curl-7.19.7-37.el6_5.3.src.rpm" version="7.19.7"><filename>libcurl-7.19.7-37.el6_5.3.x86_64.rpm</filename><sum type="sha256">d9ebab0446a58baada749fc663fc7a5b4bda205f894a242b84411bbbe55ffd92</sum></package><package arch="i686" name="libcurl-devel" release="37.el6_5.3" src="curl-7.19.7-37.el6_5.3.src.rpm" version="7.19.7"><filename>libcurl-devel-7.19.7-37.el6_5.3.i686.rpm</filename><sum type="sha256">44862121515bc693c9ca0191c435c7057e95f95b490c8179e8215879d9335015</sum></package><package arch="i686" name="libcurl" release="37.el6_5.3" src="curl-7.19.7-37.el6_5.3.src.rpm" version="7.19.7"><filename>libcurl-7.19.7-37.el6_5.3.i686.rpm</filename><sum type="sha256">dc957d6224db6369e3e20fa2518cb32b11be16928ce3d0bcd14e428e5bc70a75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" id="CVE-2014-0015" title="Curl: Re-Use Of Wrong Http Ntlm Connection In Libcurl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" id="CVE-2014-0138" title="Curl: Wrong Re-Use Of Connections In Libcurl" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053903" id="1053903" title="Curl: Re-Use Of Wrong Http Ntlm Connection In Libcurl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1079148" id="1079148" title="Curl: Wrong Re-Use Of Connections In Libcurl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1092486" id="1092486" title="Problem With Building Curl Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096797" id="1096797" title="Rhel-6 Libcurl Fails When Using Digest Auth And Have Multiple Auth Options" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0561.html" id="RHSA-2014:0561-1" title="Rhsa-2014:0561-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0595-1</id><title>Important: Gnutls Security Update</title><description>A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code. (CVE-2014-3466) 
For the update to take effect, all applications linked to the GnuTLS library must be restarted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-06-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gnutls-guile" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-14.el6_5.i686.rpm</filename><sum type="sha256">17957e7ff4880dffb0d5e12b8abe6c3d70604445cdee06d294a3edb171c3afc7</sum></package><package arch="x86_64" name="gnutls-devel" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-14.el6_5.x86_64.rpm</filename><sum type="sha256">26df411188a08f218a11bfb5f18860194bc4f433131c539da5a6b411e29e0966</sum></package><package arch="i686" name="gnutls" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-14.el6_5.i686.rpm</filename><sum type="sha256">c8e66e3ca20687b2729d7ce2e0ff9ec9b7fa24290a42494780795fd65ea54c20</sum></package><package arch="i686" name="gnutls-devel" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-14.el6_5.i686.rpm</filename><sum type="sha256">e880ab64036c76552e65cb3df43ce0455db4d464fb99dbd9788fe06461e8f032</sum></package><package arch="x86_64" name="gnutls-utils" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-utils-2.8.5-14.el6_5.x86_64.rpm</filename><sum type="sha256">9f5c184b6d3d157efcd62d8bc5995c5445fde24e63d14a2d1256b6ed4cb7aa0e</sum></package><package arch="x86_64" name="gnutls" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-14.el6_5.x86_64.rpm</filename><sum type="sha256">43a96e8563affd924f162c19a49c31d7b6c73cfccaccc538e01d6f5014ca9702</sum></package><package arch="x86_64" name="gnutls-guile" release="14.el6_5" src="gnutls-2.8.5-14.el6_5.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-14.el6_5.x86_64.rpm</filename><sum type="sha256">500dce508968877546d42d10f21ac6ff5de92125d561dd7df6e4f5dc8e0f68d6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" id="CVE-2014-3466" title="Gnutls: Insufficient Session Id Length Check In _Gnutls_Read_Server_Hello (Gnutls-Sa-2014-3)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1101932" id="1101932" title="Gnutls: Insufficient Session Id Length Check In _Gnutls_Read_Server_Hello (Gnutls-Sa-2014-3)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0595.html" id="RHSA-2014:0595-1" title="Rhsa-2014:0595-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0596-1</id><title>Moderate: Libtasn1 Security Update</title><description>It was discovered that the asn1_get_bit_der() function of the libtasn1 library incorrectly reported the length of ASN.1-encoded data. Specially crafted ASN.1 input could cause an application using libtasn1 to perform an out-of-bounds access operation, causing the application to crash or, possibly, execute arbitrary code. (CVE-2014-3468) 
Multiple incorrect buffer boundary check issues were discovered in libtasn1. Specially crafted ASN.1 input could cause an application using libtasn1 to crash. (CVE-2014-3467) 
Multiple NULL pointer dereference flaws were found in libtasn1's asn1_read_value() function. Specially crafted ASN.1 input could cause an application using libtasn1 to crash, if the application used the aforementioned function in a certain way. (CVE-2014-3469) 
For the update to take effect, all applications linked to the libtasn1 library must be restarted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-06-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libtasn1" release="6.el6_5" src="libtasn1-2.3-6.el6_5.src.rpm" version="2.3"><filename>libtasn1-2.3-6.el6_5.i686.rpm</filename><sum type="sha256">05e186c692e884e40545aa1c85fb742f78557622253f0bb80fe330b2db4942a2</sum></package><package arch="x86_64" name="libtasn1-devel" release="6.el6_5" src="libtasn1-2.3-6.el6_5.src.rpm" version="2.3"><filename>libtasn1-devel-2.3-6.el6_5.x86_64.rpm</filename><sum type="sha256">2fb4a11861b3ae5ca969b305a744f6ec4a6871d513f2bb43b6d482fa1f446bdd</sum></package><package arch="x86_64" name="libtasn1" release="6.el6_5" src="libtasn1-2.3-6.el6_5.src.rpm" version="2.3"><filename>libtasn1-2.3-6.el6_5.x86_64.rpm</filename><sum type="sha256">b786a6ab72d601c614e93647136200cdd482bef89850f834905d482e03893751</sum></package><package arch="i686" name="libtasn1-devel" release="6.el6_5" src="libtasn1-2.3-6.el6_5.src.rpm" version="2.3"><filename>libtasn1-devel-2.3-6.el6_5.i686.rpm</filename><sum type="sha256">a5d502d5d4c423cefed9bdec312bb21fe11473bc5f8a0e59c2b61488c239b897</sum></package><package arch="x86_64" name="libtasn1-tools" release="6.el6_5" src="libtasn1-2.3-6.el6_5.src.rpm" version="2.3"><filename>libtasn1-tools-2.3-6.el6_5.x86_64.rpm</filename><sum type="sha256">4722e6cea3e5a326ab729a2a1b78215079b006ea6225dba5f469e4d3608cbcf4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" id="CVE-2014-3467" title="Libtasn1: Multiple Boundary Check Issues" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" id="CVE-2014-3468" title="Libtasn1: Asn1_Get_Bit_Der() Can Return Negative Bit Length" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" id="CVE-2014-3469" title="Libtasn1: Asn1_Read_Value_Type() Null Pointer Dereference" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102022" id="1102022" title="Libtasn1: Multiple Boundary Check Issues" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102323" id="1102323" title="Libtasn1: Asn1_Get_Bit_Der() Can Return Negative Bit Length" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102329" id="1102329" title="Libtasn1: Asn1_Read_Value_Type() Null Pointer Dereference" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0596.html" id="RHSA-2014:0596-1" title="Rhsa-2014:0596-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0597-1</id><title>Moderate: Squid Security Update</title><description>A denial of service flaw was found in the way Squid processed certain HTTPS requests when the SSL Bump feature was enabled. A remote attacker could send specially crafted requests that could cause Squid to crash. (CVE-2014-0128) 
After installing this update, the squid service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-06-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid" release="20.el6_5.3" src="squid-3.1.10-20.el6_5.3.src.rpm" version="3.1.10"><filename>squid-3.1.10-20.el6_5.3.x86_64.rpm</filename><sum type="sha256">5adfae49ed4004347aa66167db9f0b6228ce7ebcbbe244af0062f933d25aee43</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0128" id="CVE-2014-0128" title="Squid: Denial Of Service When Using Ssl-Bump" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1074870" id="1074870" title="Squid: Denial Of Service When Using Ssl-Bump" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0597.html" id="RHSA-2014:0597-1" title="Rhsa-2014:0597-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0625-1</id><title>Important: Openssl Security Update</title><description>It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224) 
Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: 
A buffer overflow flaw was found in the way OpenSSL handled invalid DTLS packet fragments. A remote attacker could possibly use this flaw to execute arbitrary code on a DTLS client or server. (CVE-2014-0195) 
Multiple flaws were found in the way OpenSSL handled read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or server using OpenSSL could crash or unexpectedly drop connections when processing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198) 
A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash. (CVE-2014-0221) 
A NULL pointer dereference flaw was found in the way OpenSSL performed anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially crafted handshake packet could cause a TLS/SSL client that has the anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470) 
For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-06-10 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl" release="16.el6_5.14" src="openssl-1.0.1e-16.el6_5.14.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.14.i686.rpm</filename><sum type="sha256">a786be99649c7039b400904b3136594e15f57c4040e95fff6408eadf53326c10</sum></package><package arch="i686" name="openssl-devel" release="16.el6_5.14" src="openssl-1.0.1e-16.el6_5.14.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.14.i686.rpm</filename><sum type="sha256">c877b23acaefc6b65eaeefc8205f9010f16b34c2c1fe4edebff779ab066ea93b</sum></package><package arch="x86_64" name="openssl-perl" release="16.el6_5.14" src="openssl-1.0.1e-16.el6_5.14.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm</filename><sum type="sha256">d6af0408e0d5750f3c0f68e95248f3ca6e7da7889c46df21fd3581818e074ca9</sum></package><package arch="x86_64" name="openssl" release="16.el6_5.14" src="openssl-1.0.1e-16.el6_5.14.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.14.x86_64.rpm</filename><sum type="sha256">2aeade5d1a8aaa9512e459bc0d18e05253240fa5f08900112c329fde5ecd5bba</sum></package><package arch="x86_64" name="openssl-devel" release="16.el6_5.14" src="openssl-1.0.1e-16.el6_5.14.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm</filename><sum type="sha256">90d5d26c334f75f70f1af2a5f12815e90e50ac3509ccd79be3c276e5a482df37</sum></package><package arch="x86_64" name="openssl-static" release="16.el6_5.14" src="openssl-1.0.1e-16.el6_5.14.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm</filename><sum type="sha256">ba188889677c4a868d30a59956a99d04dcdb4accfe4d3707a80d9ec9a19add6a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" id="CVE-2010-5298" title="Openssl: Freelist Misuse Causing A Possible " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" id="CVE-2014-0195" title="Openssl: Buffer Overflow Via Dtls Invalid Fragment" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" id="CVE-2014-0198" title="Openssl: Ssl_Mode_Release_Buffers Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" id="CVE-2014-0221" title="Openssl: Dos When Sending Invalid Dtls Handshake" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" id="CVE-2014-0224" title="Openssl: Ssl/Tls Mitm Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" id="CVE-2014-3470" title="Openssl: Client-Side Denial Of Service When " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087195" id="1087195" title="Openssl: Freelist Misuse Causing A Possible " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1093837" id="1093837" title="Openssl: Ssl_Mode_Release_Buffers Null Pointer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103586" id="1103586" title="Openssl: Ssl/Tls Mitm Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103593" id="1103593" title="Openssl: Dos When Sending Invalid Dtls Handshake" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103598" id="1103598" title="Openssl: Buffer Overflow Via Dtls Invalid Fragment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103600" id="1103600" title="Openssl: Client-Side Denial Of Service When " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0625.html" id="RHSA-2014:0625-1" title="Rhsa-2014:0625-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0626-1</id><title>Important: Openssl097A And Openssl098E Security Update</title><description>It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224) 
Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: 
For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-06-10 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl098e" release="18.el6_5.2" src="openssl098e-0.9.8e-18.el6_5.2.src.rpm" version="0.9.8e"><filename>openssl098e-0.9.8e-18.el6_5.2.i686.rpm</filename><sum type="sha256">128c5c050a215b4d89ea5ae5bb9aa9623c659788c3239e603baeb6cbb02b7102</sum></package><package arch="x86_64" name="openssl098e" release="18.el6_5.2" src="openssl098e-0.9.8e-18.el6_5.2.src.rpm" version="0.9.8e"><filename>openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm</filename><sum type="sha256">1ad62c461a4b30e50c5badfe840ec8a8bb589d41314cb43d4fbee05c6b9e9c8d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" id="CVE-2014-0224" title="Openssl: Ssl/Tls Mitm Vulnerability" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103586" id="1103586" title="Openssl: Ssl/Tls Mitm Vulnerability" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0626.html" id="RHSA-2014:0626-1" title="Rhsa-2014:0626-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0741-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-06-17 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_5" src="firefox-24.6.0-1.el6_5.src.rpm" version="24.6.0"><filename>firefox-24.6.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">b3c6fc180090f57d6e5b0553570fe3cf81198b3f767ea88cf7eb7057379b3665</sum></package><package arch="i686" name="firefox" release="1.el6_5" src="firefox-24.6.0-1.el6_5.src.rpm" version="24.6.0"><filename>firefox-24.6.0-1.el6_5.i686.rpm</filename><sum type="sha256">f4e153ffcab048913d75dd5ff6cd255e132d22ac04e452c6b9a15b8e9e7da329</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" id="CVE-2014-1533" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.6) (Mfsa 2014-48)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" id="CVE-2014-1538" title="Mozilla: Use-After-Free And Out Of Bounds Issues Found Using Address Sanitizer (Mfsa 2014-49)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" id="CVE-2014-1541" title="Mozilla: Use-After-Free With Smil Animation Controller (Mfsa 2014-52)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107399" id="1107399" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.6) (Mfsa 2014-48)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107421" id="1107421" title="Mozilla: Use-After-Free And Out Of Bounds Issues Found Using Address Sanitizer (Mfsa 2014-49)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107424" id="1107424" title="Mozilla: Use-After-Free With Smil Animation Controller (Mfsa 2014-52)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0741.html" id="RHSA-2014:0741-1" title="Rhsa-2014:0741-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0742-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1533, CVE-2014-1538, CVE-2014-1541) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-06-17 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_5" src="thunderbird-24.6.0-1.el6_5.src.rpm" version="24.6.0"><filename>thunderbird-24.6.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">92f731f81cb84c11dd57ec0aaad4c607ca39429ab445a599422fb86d0923ea34</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" id="CVE-2014-1533" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.6) (Mfsa 2014-48)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" id="CVE-2014-1538" title="Mozilla: Use-After-Free And Out Of Bounds Issues Found Using Address Sanitizer (Mfsa 2014-49)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" id="CVE-2014-1541" title="Mozilla: Use-After-Free With Smil Animation Controller (Mfsa 2014-52)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107399" id="1107399" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.6) (Mfsa 2014-48)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107421" id="1107421" title="Mozilla: Use-After-Free And Out Of Bounds Issues Found Using Address Sanitizer (Mfsa 2014-49)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107424" id="1107424" title="Mozilla: Use-After-Free With Smil Animation Controller (Mfsa 2014-52)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0742.html" id="RHSA-2014:0742-1" title="Rhsa-2014:0742-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0743-1</id><title>Moderate: Qemu-Kvm Security Update</title><description>Multiple buffer overflow, input validation, and out-of-bounds write flaws were found in the way the virtio, virtio-net, virtio-scsi, and usb drivers of QEMU handled state loading after migration. A user able to alter the savevm data (either on the disk or over the wire during migration) could use either of these flaws to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2013-4148, CVE-2013-4151, CVE-2013-4535, CVE-2013-4536, CVE-2013-4541, CVE-2013-4542, CVE-2013-6399, CVE-2014-0182, CVE-2014-3461) 
An out-of-bounds memory access flaw was found in the way QEMU's IDE device driver handled the execution of SMART EXECUTE OFFLINE commands. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-2894) 
This update also fixes the following bugs: 
* Previously, under certain circumstances, libvirt failed to start guests which used a non-zero PCI domain and SR-IOV Virtual Functions (VFs), and returned the following error message: 
Can't assign device inside non-zero PCI segment as this KVM module doesn't support it. 
This update fixes this issue and guests using the aforementioned configuration no longer fail to start. 
* Due to an incorrect initialization of the cpus_sts bitmap, which holds the enablement status of a vCPU, libvirt could fail to start a guest with an unusual vCPU topology (for example, a guest with three cores and two sockets). With this update, the initialization of cpus_sts has been corrected, and libvirt no longer fails to start the aforementioned guests. 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-06-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.415.el6_5.10" src="qemu-kvm-0.12.1.2-2.415.el6_5.10.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.415.el6_5.10.x86_64.rpm</filename><sum type="sha256">c2b83364348633ba54cde57447a2080b990a6df4016418b18c4f5d7a02cbf14b</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.415.el6_5.10" src="qemu-kvm-0.12.1.2-2.415.el6_5.10.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.415.el6_5.10.x86_64.rpm</filename><sum type="sha256">1c0fb47bc8fd2bf4316850c9a620af1c5c22b992dda05158c0814d800961a05e</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.415.el6_5.10" src="qemu-kvm-0.12.1.2-2.415.el6_5.10.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.415.el6_5.10.x86_64.rpm</filename><sum type="sha256">832df4b0fe0be061e6dac90db62df1fb5ef8b10ba431ce88df13b695ea72b145</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.415.el6_5.10" src="qemu-kvm-0.12.1.2-2.415.el6_5.10.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.415.el6_5.10.x86_64.rpm</filename><sum type="sha256">19b7a070af58cd3012127b843bea40b2533138ba1639717567223faca007b7c3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148" id="CVE-2013-4148" title="Qemu: Virtio-Net: Buffer Overflow On Invalid State Load" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151" id="CVE-2013-4151" title="Qemu: Virtio: Out-Of-Bounds Buffer Write On Invalid State Load" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535" id="CVE-2013-4535" title="Qemu: Virtio: Insufficient Validation Of Num_Sg When Mapping" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536" id="CVE-2013-4536" title="Qemu: Virtio: Insufficient Validation Of Num_Sg When Mapping" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" id="CVE-2013-4541" title="Qemu: Usb: Insufficient Sanity Checking Of Setup_Index+Setup_Len In Post_Load" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542" id="CVE-2013-4542" title="Qemu: Virtio-Scsi: Buffer Overrun On Invalid State Load" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399" id="CVE-2013-6399" title="Qemu: Virtio: Buffer Overrun On Incoming Migration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182" id="CVE-2014-0182" title="Qemu: Virtio: Out-Of-Bounds Buffer Write On State Load With Invalid Config_Len" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2894" id="CVE-2014-2894" title="Qemu: Out Of Bounds Buffer Accesses, Guest Triggerable Via Ide Smart" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" id="CVE-2014-3461" title="Qemu: Usb: Fix Up Post Load Checks" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066334" id="1066334" title="Qemu: Virtio-Net: Buffer Overflow On Invalid State Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066342" id="1066342" title="Qemu: Virtio: Out-Of-Bounds Buffer Write On Invalid State Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066361" id="1066361" title="Qemu: Virtio: Buffer Overrun On Incoming Migration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066382" id="1066382" title="Qemu: Virtio-Scsi: Buffer Overrun On Invalid State Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066384" id="1066384" title="Qemu: Usb: Insufficient Sanity Checking Of Setup_Index+Setup_Len In Post_Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066401" id="1066401" title="Qemu: Virtio: Insufficient Validation Of Num_Sg When Mapping" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087971" id="1087971" title="Qemu: Out Of Bounds Buffer Accesses, Guest Triggerable Via Ide Smart" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1088986" id="1088986" title="Qemu: Virtio: Out-Of-Bounds Buffer Write On State Load With Invalid Config_Len" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096821" id="1096821" title="Qemu: Usb: Fix Up Post Load Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1100575" id="1100575" title="Some Vcpu Topologies Not Accepted By Libvirt" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0743.html" id="RHSA-2014:0743-1" title="Rhsa-2014:0743-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0747-1</id><title>Moderate: Python-Jinja2 Security Update</title><description>It was discovered that Jinja2 did not properly handle bytecode cache files stored in the system's temporary directory. A local attacker could use this flaw to alter the output of an application using Jinja2 and FileSystemBytecodeCache, and potentially execute arbitrary code with the privileges of that application. (CVE-2014-1402) 
For the update to take effect, all applications using python-jinja2 must be restarted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-06-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-jinja2" release="2.el6_5" src="python-jinja2-2.2.1-2.el6_5.src.rpm" version="2.2.1"><filename>python-jinja2-2.2.1-2.el6_5.x86_64.rpm</filename><sum type="sha256">70bbb644a5147c9c98ecdef63a6f76a3e5afb00999292b49b071a4d2274077ca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1402" id="CVE-2014-1402" title="Python-Jinja2: Filesystembytecodecache Insecure Cache Temporary File Use" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051421" id="1051421" title="Python-Jinja2: Filesystembytecodecache Insecure Cache Temporary File Use" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0747.html" id="RHSA-2014:0747-1" title="Rhsa-2014:0747-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0771-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-3153, Important) 
* A flaw was found in the way the Linux kernel's floppy driver handled user space provided data in certain error code paths while processing FDRAWCMD IOCTL commands. A local user with write access to /dev/fdX could use this flaw to free (using the kfree() function) arbitrary kernel memory. (CVE-2014-1737, Important) 
* It was found that the Linux kernel's floppy driver leaked internal kernel memory addresses to user space during the processing of the FDRAWCMD IOCTL command. A local user with write access to /dev/fdX could use this flaw to obtain information about the kernel heap arrangement. (CVE-2014-1738, Low) 
Note: A local user with write access to /dev/fdX could use these two flaws (CVE-2014-1737 in combination with CVE-2014-1738) to escalate their privileges on the system. 
* It was discovered that the proc_ns_follow_link() function did not properly return the LAST_BIND value in the last pathname component as is expected for procfs symbolic links, which could lead to excessive freeing of memory and consequent slab corruption. A local, unprivileged user could use this flaw to crash the system. (CVE-2014-0203, Moderate) 
* A flaw was found in the way the Linux kernel handled exceptions when user-space applications attempted to use the linkage stack. On IBM S/390 systems, a local, unprivileged user could use this flaw to crash the system. (CVE-2014-2039, Moderate) 
* An invalid pointer dereference flaw was found in the Marvell 8xxx Libertas WLAN (libertas) driver in the Linux kernel. A local user able to write to a file that is provided by the libertas driver and located on the debug file system (debugfs) could use this flaw to crash the system. Note: The debugfs file system must be mounted locally to exploit this issue. It is not mounted by default. (CVE-2013-6378, Low) 
* A denial of service flaw was discovered in the way the Linux kernel's SELinux implementation handled files with an empty SELinux security context. A local user who has the CAP_MAC_ADMIN capability could use this flaw to crash the system. (CVE-2014-1874, Low) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-06-24 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.20.3.el6.noarch.rpm</filename><sum type="sha256">6eaaf81288cbbb7caa9900b425e03dd70d2d981a8ba5a045e0097bcf9374bc45</sum></package><package arch="x86_64" name="kernel" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">17627a71b24d5c924eb8d6c57fe31b0e17779070e43c66bfbafb016d6e0acce0</sum></package><package arch="x86_64" name="perf" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">f4bbfafbf59e3fb5d76abda8ceb57fc3ea8d9ff3be74c12468e3acb27f11bd98</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">e662955f5d7bbf4e0bc1c02045126999f3b82c81d526f6bcb86fbed585623c7b</sum></package><package arch="noarch" name="kernel-firmware" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.20.3.el6.noarch.rpm</filename><sum type="sha256">f19da92c87bcb00e5d85c74183141696912a075f5a8fce8d667f777730726a51</sum></package><package arch="noarch" name="kernel-doc" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.20.3.el6.noarch.rpm</filename><sum type="sha256">80ff88a1383ed7cbfc95b3f8bda5b21085392d8afe1cf0e1dd2d39b0cbbb2d5f</sum></package><package arch="x86_64" name="kernel-debug" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">0c51f905a7943d61375c0ea6355fe4af0986bf331a933ec350da166c332ff262</sum></package><package arch="x86_64" name="kernel-devel" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">6eb1083e8b501269f6ef87d4b6efbd85168567293bc4360ee80435f263e43b33</sum></package><package arch="x86_64" name="python-perf" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">d45a832ce6f65aeb0875112ba82ef0d03865a4a6f62babf47289ae3b707ebf8e</sum></package><package arch="x86_64" name="kernel-headers" release="431.20.3.el6" src="kernel-2.6.32-431.20.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.20.3.el6.x86_64.rpm</filename><sum type="sha256">73634fcdfefe395a9bbbfefb9a41e70dfd675bab869958e1d38e7b58496992d5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378" id="CVE-2013-6378" title="Kernel: Drivers: Libertas: Potential Oops In Debugfs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203" id="CVE-2014-0203" title="Kernel: Fs: Slab Corruption Due To The Invalid Last Component Type During Do_Filp_Open()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" id="CVE-2014-1737" title="Kernel: Block: Floppy: Privilege Escalation Via Fdrawcmd Floppy Ioctl Command" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" id="CVE-2014-1738" title="Kernel: Block: Floppy: Privilege Escalation Via Fdrawcmd Floppy Ioctl Command" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874" id="CVE-2014-1874" title="Kernel: Selinux: Local Denial-Of-Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2039" id="CVE-2014-2039" title="Kernel: S390: Crash Due To Linkage Stack Instructions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" id="CVE-2014-3153" title="Kernel: Futex: Pi Futexes Requeue Issue" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1033578" id="1033578" title="Kernel: Drivers: Libertas: Potential Oops In Debugfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1062356" id="1062356" title="Kernel: Selinux: Local Denial-Of-Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1067558" id="1067558" title="Kernel: S390: Crash Due To Linkage Stack Instructions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1094299" id="1094299" title="Kernel: Block: Floppy: Privilege Escalation Via Fdrawcmd Floppy Ioctl Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1094363" id="1094363" title="Kernel: Fs: Slab Corruption Due To The Invalid Last Component Type During Do_Filp_Open()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103626" id="1103626" title="Kernel: Futex: Pi Futexes Requeue Issue" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0771.html" id="RHSA-2014:0771-1" title="Rhsa-2014:0771-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0788-1</id><title>Important: Mod_Wsgi Security Update</title><description>It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. (CVE-2014-0240) 
Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation. 
It was discovered that mod_wsgi could leak memory of a hosted web application via the "Content-Type" header. A remote attacker could possibly use this flaw to disclose limited portions of the web application's memory. (CVE-2014-0242)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-07-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mod_wsgi" release="6.el6_5" src="mod_wsgi-3.2-6.el6_5.src.rpm" version="3.2"><filename>mod_wsgi-3.2-6.el6_5.x86_64.rpm</filename><sum type="sha256">be3119a8e20cc4d5bff600aab588a929d944c10ce538987e6903af5ebe35c0df</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240" id="CVE-2014-0240" title="Mod_Wsgi: Possible Privilege Escalation In Setuid() Failure Scenarios" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0242" id="CVE-2014-0242" title="Mod_Wsgi: Information Leak" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1101863" id="1101863" title="Cve-2014-0240 Mod_Wsgi: Possible Privilege Escalation In Setuid() Failure Scenarios" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1101873" id="1101873" title="Cve-2014-0242 Mod_Wsgi: Information Leak" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0788.html" id="RHSA-2014:0788-1" title="Rhsa-2014:0788-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0790-1</id><title>Moderate: Dovecot Security Update</title><description>It was discovered that Dovecot did not properly discard connections trapped in the SSL/TLS handshake phase. A remote attacker could use this flaw to cause a denial of service on an IMAP/POP3 server by exhausting the pool of available connections and preventing further, legitimate connections to the IMAP/POP3 server to be made. (CVE-2014-3430) 
After installing the updated packages, the dovecot service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-07-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="1" name="dovecot" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-7.el6_5.1.i686.rpm</filename><sum type="sha256">3b698c33be8b86646a86c91cc1450409ebdd1886bf2108d19a27b263d308c497</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-pigeonhole-2.0.9-7.el6_5.1.x86_64.rpm</filename><sum type="sha256">bf28e5ef87908bc54d230cbcfef93c35811d7c472ca48e8ebeaf6c30f43aabe7</sum></package><package arch="x86_64" epoch="1" name="dovecot-devel" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-7.el6_5.1.x86_64.rpm</filename><sum type="sha256">51c7ff146ee50ef191fc0b81296b2a6139b7af5e7b8adf7ada4c53a7b2901fe6</sum></package><package arch="i686" epoch="1" name="dovecot-devel" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-7.el6_5.1.i686.rpm</filename><sum type="sha256">07bbb9a87400da36acacd5664b1cf36496a3d2bba3cf9e5b7c935a79645be80e</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-7.el6_5.1.x86_64.rpm</filename><sum type="sha256">cda2ed19761af257f8bbc4239497a1294b2bacf5d3831adc9cb2120f61e66ca2</sum></package><package arch="x86_64" epoch="1" name="dovecot-mysql" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-mysql-2.0.9-7.el6_5.1.x86_64.rpm</filename><sum type="sha256">b8cde3927cec1782469e8f9752db1341fea67ef827d76c376660d950189b21e3</sum></package><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="7.el6_5.1" src="dovecot-2.0.9-7.el6_5.1.src.rpm" version="2.0.9"><filename>dovecot-pgsql-2.0.9-7.el6_5.1.x86_64.rpm</filename><sum type="sha256">6e3e6f835c88a288b3f6bac21103bf75634d4c4081e6e4763553c7e882336641</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3430" id="CVE-2014-3430" title="Dovecot: Denial Of Service Through Maxxing Out Ssl Connections" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096402" id="1096402" title="Cve-2014-3430 Dovecot: Denial Of Service Through Maxxing Out Ssl Connections" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0790.html" id="RHSA-2014:0790-1" title="Rhsa-2014:0790-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0861-2</id><title>Moderate: Lzo Security Update</title><description>An integer overflow flaw was found in the way the lzo library decompressed certain archives compressed with the LZO algorithm. An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library, would cause that application to crash or, potentially, execute arbitrary code. (CVE-2014-4607) 
For the update to take effect, all services linked to the lzo library must be restarted or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-07-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="lzo" release="3.1.el6_5.1" src="lzo-2.03-3.1.el6_5.1.src.rpm" version="2.03"><filename>lzo-2.03-3.1.el6_5.1.i686.rpm</filename><sum type="sha256">8c1b3b8cca875d8d68b47b6532766b842ee315238f8afd4cba807a9dca9d3727</sum></package><package arch="i686" name="lzo-devel" release="3.1.el6_5.1" src="lzo-2.03-3.1.el6_5.1.src.rpm" version="2.03"><filename>lzo-devel-2.03-3.1.el6_5.1.i686.rpm</filename><sum type="sha256">491be99a4c2b87f0057c587b313870c9a0ba11d41dcd172eed534a3966e5b3a0</sum></package><package arch="x86_64" name="lzo" release="3.1.el6_5.1" src="lzo-2.03-3.1.el6_5.1.src.rpm" version="2.03"><filename>lzo-2.03-3.1.el6_5.1.x86_64.rpm</filename><sum type="sha256">bea80caebdb7f0e713197080ca0bc28357069a146e555020c487002fb3d57c4c</sum></package><package arch="x86_64" name="lzo-minilzo" release="3.1.el6_5.1" src="lzo-2.03-3.1.el6_5.1.src.rpm" version="2.03"><filename>lzo-minilzo-2.03-3.1.el6_5.1.x86_64.rpm</filename><sum type="sha256">c7512386ac66c93b6bd2b1c5858f26437a12233f9b0f4d80d7fc881f9bd53eb3</sum></package><package arch="x86_64" name="lzo-devel" release="3.1.el6_5.1" src="lzo-2.03-3.1.el6_5.1.src.rpm" version="2.03"><filename>lzo-devel-2.03-3.1.el6_5.1.x86_64.rpm</filename><sum type="sha256">44def3fa22ce0f4c9dbe2ade833d8869aa92ee317c59b20f72b3c962a9ba6d66</sum></package><package arch="i686" name="lzo-minilzo" release="3.1.el6_5.1" src="lzo-2.03-3.1.el6_5.1.src.rpm" version="2.03"><filename>lzo-minilzo-2.03-3.1.el6_5.1.i686.rpm</filename><sum type="sha256">cfc896350b3684d0f7fb8055710ca330bb08738e0a03baaed1ab2c17501a4119</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" id="CVE-2014-4607" title="Lzo: Lzo1X_Decompress_Safe() Integer Overflow" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1112418" id="1112418" title="Cve-2014-4607 Lzo: Lzo1X_Decompress_Safe() Integer Overflow" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0861.html" id="RHSA-2014:0861-2" title="Rhsa-2014:0861-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0865-1</id><title>Moderate: Tomcat6 Security Update</title><description>It was discovered that Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources. (CVE-2014-0075) 
It was found that Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a Tomcat server located behind a reverse proxy that processed the content length header correctly. (CVE-2014-0099) 
It was found that the org.apache.catalina.servlets.DefaultServlet implementation in Apache Tomcat allowed the definition of XML External Entities (XXEs) in provided XSLTs. A malicious application could use this to circumvent intended security restrictions to disclose sensitive information. (CVE-2014-0096) 
This update also fixes the following bugs: 
* The patch that resolved the CVE-2014-0050 issue contained redundant code. This update removes the redundant code. 
* The patch that resolved the CVE-2013-4322 issue contained an invalid check that triggered a java.io.EOFException while reading trailer headers for chunked requests. This update fixes the check and the aforementioned exception is no longer triggered in the described scenario. 
Tomcat must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-07-15 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-javadoc" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">5f6390658c869ee03ad952255b8d56364734bf61b965174b22a186ca886c0d9f</sum></package><package arch="noarch" name="tomcat6" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">8f5ff77ef4b361f6253a38eb58a11e6ca571f8d78d458546dc0b53dc3cf896d7</sum></package><package arch="noarch" name="tomcat6-webapps" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">1550570bea7cb0c8fa872c430c244ae3dc024e94a88a94dd508c3bc0f526f597</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">1bd6017d91e8bdb06f585cb6dc460eeeeed029418e829d61a8e346f0848d9a2c</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">278e810aee0bc45a65371e3494cacef7da7ddc84c3acf45474c08c175f4e335b</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">e1bd9b4c8f6c9908b95c24985b9e962b3ac5458c538803eca3f152e43d4c3baf</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">280fa6432b025f5d0ba737e71e2337fefff83eb08b0fe56695a3ba597bb55b3e</sum></package><package arch="noarch" name="tomcat6-lib" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">e664b93fec85f77642f36e5997f2e125909ed574de1044ec52e511efc6f93f07</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="72.el6_5" src="tomcat6-6.0.24-72.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-72.el6_5.noarch.rpm</filename><sum type="sha256">bc7433743b6cbf8ff8de3f03fb031385410d1d0bbb9d7100f11f1059dc8ecf96</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075" id="CVE-2014-0075" title="Tomcat/Jbossweb: Limited Dos In Chunked Transfer Encoding Input Filter" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096" id="CVE-2014-0096" title="Tomcat/Jbossweb: Xxe Vulnerability Via User Supplied Xslts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099" id="CVE-2014-0099" title="Tomcat/Jbossweb: Request Smuggling Via Malicious Content Length Header" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1072776" id="1072776" title="Tomcat/Jbossweb: Limited Dos In Chunked Transfer Encoding Input Filter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1088342" id="1088342" title="Tomcat/Jbossweb: Xxe Vulnerability Via User Supplied Xslts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1094528" id="1094528" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1095602" id="1095602" title="Tomcat6 Security Patch Tomcat6-6.0.24-Cve-2013-4322 Typo Results In Application Crash With Eofexception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102030" id="1102030" title="Tomcat/Jbossweb: Request Smuggling Via Malicious Content Length Header" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0865.html" id="RHSA-2014:0865-1" title="Rhsa-2014:0865-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0866-1</id><title>Moderate: Samba And Samba3X Security Update</title><description>A denial of service flaw was found in the way the sys_recvfile() function of nmbd, the NetBIOS message block daemon, processed non-blocking sockets. An attacker could send a specially crafted packet that, when processed, would cause nmbd to enter an infinite loop and consume an excessive amount of CPU time. (CVE-2014-0244) 
It was discovered that smbd, the Samba file server daemon, did not properly handle certain files that were stored on the disk and used a valid Unicode character in the file name. An attacker able to send an authenticated non-Unicode request that attempted to read such a file could cause smbd to crash. (CVE-2014-3493) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-07-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="samba-common" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-common-3.6.9-169.el6_5.i686.rpm</filename><sum type="sha256">91a1970a2e9b65b816617abe1285ed9a8f2db9b379f1c572da6a2959c31d8c11</sum></package><package arch="x86_64" name="samba-winbind-clients" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-clients-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">5b3ff162cabac2dcfb094415ee309cd692618af6a2a76c6c757e8081f63b438f</sum></package><package arch="x86_64" name="libsmbclient-devel" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-devel-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">4f58ac5ff5cc71902e36ce52c5d5f953ae86f13cb9b2a290ca8b87c8f86ac4e2</sum></package><package arch="x86_64" name="samba-doc" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-doc-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">7467a7b8c1b1260c01e03d39e16b1e99e4a3bd7e5938e9140149477527a39c25</sum></package><package arch="x86_64" name="samba" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">a27ad9ff984c46a520719546db140b706eb117ac8865f888311b8edb002c73d5</sum></package><package arch="i686" name="libsmbclient-devel" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-devel-3.6.9-169.el6_5.i686.rpm</filename><sum type="sha256">9f08e859ec369275381ddff3184f93224b4058db3829b84380db980834cf8607</sum></package><package arch="x86_64" name="samba-winbind" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">63a4e1dad729ee4b87b1a4caf60085cb4f0dfa622e7928cf03487f4c00dc2cba</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-krb5-locator-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">806518dab54d8f4cb3fd0cdab048d079dde9bc831fa89f2e2450c8219f1b666e</sum></package><package arch="i686" name="libsmbclient" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-3.6.9-169.el6_5.i686.rpm</filename><sum type="sha256">055ff355f30c6ca4be78a5d51c0602c9f25f0cd7cb5f0d508022d8de1d63091c</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-domainjoin-gui-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">e42842a5a70a8b608996805c6f3cefd3ad20447ab5450657e0cb08e0f0ca2eec</sum></package><package arch="x86_64" name="samba-swat" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-swat-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">accd017a64fb511624f0649f729dbc3801c675206d3cda613907620cd02adba7</sum></package><package arch="x86_64" name="samba-client" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-client-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">1d81490b0121c8005a0d52b8948a36c3e843b34afcb825f65bffc91a29462934</sum></package><package arch="x86_64" name="libsmbclient" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>libsmbclient-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">ed058a71a178acd6ebc821bbb8ef82b74a8b66d197bdd335475de591bc14b653</sum></package><package arch="x86_64" name="samba-winbind-devel" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-devel-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">122c9016075f8e6e74c5f8a742c3745a23cce23d38f2e394f655ac02826dff68</sum></package><package arch="i686" name="samba-winbind-clients" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-clients-3.6.9-169.el6_5.i686.rpm</filename><sum type="sha256">6bdf03abbe3dec46fad64f7d61015dd79c9e71ca5c6dc094bc31c29b0cc80618</sum></package><package arch="i686" name="samba-winbind-devel" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-winbind-devel-3.6.9-169.el6_5.i686.rpm</filename><sum type="sha256">15b2c818816d2556446b08e4f7b2f9b1f95698ac406d8c3ae2ff45b12245d9d8</sum></package><package arch="x86_64" name="samba-common" release="169.el6_5" src="samba-3.6.9-169.el6_5.src.rpm" version="3.6.9"><filename>samba-common-3.6.9-169.el6_5.x86_64.rpm</filename><sum type="sha256">b4e5c6cb4b7528d52c538923cdcf167af2268ad1c2c2238ed2db6aeea54a60c5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" id="CVE-2014-0244" title="Samba: Nmbd Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" id="CVE-2014-3493" title="Samba: Smbd Unicode Path Names Denial Of Service" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097815" id="1097815" title="Cve-2014-0244 Samba: Nmbd Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1108748" id="1108748" title="Cve-2014-3493 Samba: Smbd Unicode Path Names Denial Of Service" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0866.html" id="RHSA-2014:0866-1" title="Rhsa-2014:0866-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0889-1</id><title>Critical: Java-1.7.0-Openjdk Security Update</title><description>It was discovered that the Hotspot component in OpenJDK did not properly verify bytecode from the class files. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. (CVE-2014-4216, CVE-2014-4219) 
A format string flaw was discovered in the Hotspot component event logger in OpenJDK. An untrusted Java application or applet could use this flaw to crash the Java Virtual Machine or, potentially, execute arbitrary code with the privileges of the Java Virtual Machine. (CVE-2014-2490) 
Multiple improper permission check issues were discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2014-4223, CVE-2014-4262, CVE-2014-2483) 
Multiple flaws were discovered in the JMX, Libraries, Security, and Serviceability components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-4209, CVE-2014-4218, CVE-2014-4221, CVE-2014-4252, CVE-2014-4266) 
It was discovered that the RSA algorithm in the Security component in OpenJDK did not sufficiently perform blinding while performing operations that were using private keys. An attacker able to measure timing differences of those operations could possibly leak information about the used keys. (CVE-2014-4244) 
The Diffie-Hellman (DH) key exchange algorithm implementation in the Security component in OpenJDK failed to validate public DH parameters properly. This could cause OpenJDK to accept and use weak parameters, allowing an attacker to recover the negotiated key. (CVE-2014-4263) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-07-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.1.2.el6_5" src="java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.src.rpm" version="1.7.0.65"><filename>java-1.7.0-openjdk-src-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm</filename><sum type="sha256">680bf8dc8a10e316b2a6a3de843863549bdbbb940f28eafa03f289521d9e9ab4</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.1.2.el6_5" src="java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.src.rpm" version="1.7.0.65"><filename>java-1.7.0-openjdk-devel-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm</filename><sum type="sha256">2aad4b95f2dcae18000350fe3256fad14b3ceaf1eae9aeb744735b2a314b70dc</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.1.2.el6_5" src="java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.src.rpm" version="1.7.0.65"><filename>java-1.7.0-openjdk-javadoc-1.7.0.65-2.5.1.2.el6_5.noarch.rpm</filename><sum type="sha256">cb007c75c16d40e121590be4822ff698176138e1bbf34271fcf322fd9d52e4b2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.1.2.el6_5" src="java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.src.rpm" version="1.7.0.65"><filename>java-1.7.0-openjdk-demo-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm</filename><sum type="sha256">3ed8ccfde10edd096d4e1bbc56a02fbac557605b595c716e4c9767ad8b965361</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.5.1.2.el6_5" src="java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.src.rpm" version="1.7.0.65"><filename>java-1.7.0-openjdk-1.7.0.65-2.5.1.2.el6_5.x86_64.rpm</filename><sum type="sha256">9248b2810eecd20e3568ec26ecbe58e8f6fde8f6cbce76143ca3102692df8095</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2483" id="CVE-2014-2483" title="Openjdk: Restrict Use Of Privileged Annotations (Libraries, 8034985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" id="CVE-2014-2490" title="Openjdk: Event Logger Format String Vulnerability (Hotspot, 8037076)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" id="CVE-2014-4209" title="Openjdk: Subjectdelegator Protection Insufficient (Jmx, 8029755)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" id="CVE-2014-4216" title="Openjdk: Incorrect Generic Signature Attribute Parsing (Hotspot, 8037076)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" id="CVE-2014-4218" title="Openjdk: Clone Interfaces Passed To Proxy Methods (Libraries, 8035009)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" id="CVE-2014-4219" title="Openjdk: Bytecode Verification Does Not Prevent Ctor Calls To This() And Super() (Hotspot, 8035119)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" id="CVE-2014-4221" title="Openjdk: Methodhandles.Lookup Insufficient Modifiers Checks (Libraries, 8035788)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4223" id="CVE-2014-4223" title="Openjdk: Incorrect Handling Of Invocations With Exhausted Ranks (Libraries, 8035793)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" id="CVE-2014-4244" title="Openjdk: Rsa Blinding Issues (Security, 8031346)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" id="CVE-2014-4252" title="Openjdk: Prevent Instantiation Of Service With Non-Public Constructor (Security, 8035004)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" id="CVE-2014-4262" title="Openjdk: Atomicreferencefieldupdater Missing Primitive Type Check (Libraries, 8039520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" id="CVE-2014-4263" title="Openjdk: Insufficient Diffie-Hellman Public Key Validation (Security, 8037162)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" id="CVE-2014-4266" title="Openjdk: Infobuilder Incorrect Return Values (Serviceability, 8033301)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1075795" id="1075795" title="Openjdk: Atomicreferencefieldupdater Missing Primitive Type Check (Libraries, 8039520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119475" id="1119475" title="Openjdk: Rsa Blinding Issues (Security, 8031346)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119476" id="1119476" title="Openjdk: Insufficient Diffie-Hellman Public Key Validation (Security, 8037162)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119483" id="1119483" title="Openjdk: Methodhandles.Lookup Insufficient Modifiers Checks (Libraries, 8035788)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119596" id="1119596" title="Openjdk: Bytecode Verification Does Not Prevent Ctor Calls To This() And Super() (Hotspot, 8035119)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119597" id="1119597" title="Openjdk: Event Logger Format String Vulnerability (Hotspot, 8037076)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119600" id="1119600" title="Openjdk: Incorrect Generic Signature Attribute Parsing (Hotspot, 8037076)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119602" id="1119602" title="Openjdk: Incorrect Handling Of Invocations With Exhausted Ranks (Libraries, 8035793)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119608" id="1119608" title="Openjdk: Subjectdelegator Protection Insufficient (Jmx, 8029755)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119611" id="1119611" title="Openjdk: Clone Interfaces Passed To Proxy Methods (Libraries, 8035009)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119613" id="1119613" title="Openjdk: Prevent Instantiation Of Service With Non-Public Constructor (Security, 8035004)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119615" id="1119615" title="Openjdk: Infobuilder Incorrect Return Values (Serviceability, 8033301)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119626" id="1119626" title="Openjdk: Restrict Use Of Privileged Annotations (Libraries, 8034985)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0889.html" id="RHSA-2014:0889-1" title="Rhsa-2014:0889-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0907-1</id><title>Important: Java-1.6.0-Openjdk Security Update</title><description>It was discovered that the Hotspot component in OpenJDK did not properly verify bytecode from the class files. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. (CVE-2014-4216, CVE-2014-4219) 
A format string flaw was discovered in the Hotspot component event logger in OpenJDK. An untrusted Java application or applet could use this flaw to crash the Java Virtual Machine or, potentially, execute arbitrary code with the privileges of the Java Virtual Machine. (CVE-2014-2490) 
An improper permission check issue was discovered in the Libraries component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2014-4262) 
Multiple flaws were discovered in the JMX, Libraries, Security, and Serviceability components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-4209, CVE-2014-4218, CVE-2014-4252, CVE-2014-4266) 
It was discovered that the RSA algorithm in the Security component in OpenJDK did not sufficiently perform blinding while performing operations that were using private keys. An attacker able to measure timing differences of those operations could possibly leak information about the used keys. (CVE-2014-4244) 
The Diffie-Hellman (DH) key exchange algorithm implementation in the Security component in OpenJDK failed to validate public DH parameters properly. This could cause OpenJDK to accept and use weak parameters, allowing an attacker to recover the negotiated key. (CVE-2014-4263) 
This update also fixes the following bug: 
* Prior to this update, an application accessing an unsynchronized HashMap could potentially enter an infinite loop and consume an excessive amount of CPU resources. This update resolves this issue. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-07-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="6.1.13.4.el6_5" src="java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm</filename><sum type="sha256">677686976529aaaf0094c7d95eb3a0e8f85a542903e5be74ee6cc29be9136abc</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="6.1.13.4.el6_5" src="java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm</filename><sum type="sha256">efdc33d4ffab42a3bb6ab9a24ecb57392208e98ceabd85ebb51fea3734ad9447</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="6.1.13.4.el6_5" src="java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm</filename><sum type="sha256">707e92808bd4011327e4e7009ed3f56870c2645607eb957bac145f8d03e8d607</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="6.1.13.4.el6_5" src="java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm</filename><sum type="sha256">4b4127f484215c09135a06e77d4df319956b353b625a4aef914e013f55bb2a69</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="6.1.13.4.el6_5" src="java-1.6.0-openjdk-1.6.0.0-6.1.13.4.el6_5.src.rpm" version="1.6.0.0"><filename>java-1.6.0-openjdk-src-1.6.0.0-6.1.13.4.el6_5.x86_64.rpm</filename><sum type="sha256">37cb128830a0ab44f6bc07bc5205080653b78436af29e2fb9363dc46287d500f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" id="CVE-2014-2490" title="Openjdk: Event Logger Format String Vulnerability (Hotspot, 8037076)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" id="CVE-2014-4209" title="Openjdk: Subjectdelegator Protection Insufficient (Jmx, 8029755)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" id="CVE-2014-4216" title="Openjdk: Incorrect Generic Signature Attribute Parsing (Hotspot, 8037076)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" id="CVE-2014-4218" title="Openjdk: Clone Interfaces Passed To Proxy Methods (Libraries, 8035009)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" id="CVE-2014-4219" title="Openjdk: Bytecode Verification Does Not Prevent Ctor Calls To This() And Super() (Hotspot, 8035119)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" id="CVE-2014-4244" title="Openjdk: Rsa Blinding Issues (Security, 8031346)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" id="CVE-2014-4252" title="Openjdk: Prevent Instantiation Of Service With Non-Public Constructor (Security, 8035004)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" id="CVE-2014-4262" title="Openjdk: Atomicreferencefieldupdater Missing Primitive Type Check (Libraries, 8039520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" id="CVE-2014-4263" title="Openjdk: Insufficient Diffie-Hellman Public Key Validation (Security, 8037162)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" id="CVE-2014-4266" title="Openjdk: Infobuilder Incorrect Return Values (Serviceability, 8033301)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1075795" id="1075795" title="Openjdk: Atomicreferencefieldupdater Missing Primitive Type Check (Libraries, 8039520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1115580" id="1115580" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119475" id="1119475" title="Openjdk: Rsa Blinding Issues (Security, 8031346)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119476" id="1119476" title="Openjdk: Insufficient Diffie-Hellman Public Key Validation (Security, 8037162)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119596" id="1119596" title="Openjdk: Bytecode Verification Does Not Prevent Ctor Calls To This() And Super() (Hotspot, 8035119)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119597" id="1119597" title="Openjdk: Event Logger Format String Vulnerability (Hotspot, 8037076)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119600" id="1119600" title="Openjdk: Incorrect Generic Signature Attribute Parsing (Hotspot, 8037076)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119608" id="1119608" title="Openjdk: Subjectdelegator Protection Insufficient (Jmx, 8029755)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119611" id="1119611" title="Openjdk: Clone Interfaces Passed To Proxy Methods (Libraries, 8035009)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119613" id="1119613" title="Openjdk: Prevent Instantiation Of Service With Non-Public Constructor (Security, 8035004)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119615" id="1119615" title="Openjdk: Infobuilder Incorrect Return Values (Serviceability, 8033301)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0907.html" id="RHSA-2014:0907-1" title="Rhsa-2014:0907-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0915-1</id><title>Critical: Nss Security Update</title><description>A race condition was found in the way NSS verified certain certificates. A remote attacker could use this flaw to crash an application using NSS or, possibly, execute arbitrary code with the privileges of the user running that application. (CVE-2014-1544)

After installing this update, applications using NSS must be restarted for this update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-07-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-devel" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-devel-3.14.3-6.el6_4.i686.rpm</filename><sum type="sha256">d30c7ef32de1544d840820881815ab2bfd68d0e5e9d455fb2af7b0543572c607</sum></package><package arch="x86_64" name="nss-tools" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-tools-3.14.3-6.el6_4.x86_64.rpm</filename><sum type="sha256">e59b9868f823963995b95bec03e60241e30246501cb10f2f3a19d486e17a512c</sum></package><package arch="x86_64" name="nss" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-3.14.3-6.el6_4.x86_64.rpm</filename><sum type="sha256">d00fd243cf6d5035080e30a16c5a018fc88fddeea7163bd6038e05bf1662cf6f</sum></package><package arch="i686" name="nss" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-3.14.3-6.el6_4.i686.rpm</filename><sum type="sha256">7d576eba4382258467f45015dd8ee91116b62796bdec557cf73ae35c47cea993</sum></package><package arch="x86_64" name="nss-devel" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-devel-3.14.3-6.el6_4.x86_64.rpm</filename><sum type="sha256">692c82c894282ecb559a065eac3a8f638ff82eca0def467b003a32a585ead503</sum></package><package arch="x86_64" name="nss-sysinit" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-sysinit-3.14.3-6.el6_4.x86_64.rpm</filename><sum type="sha256">d003ac295cb914b6aad0ccd19cc5c595b70e078d256ced69922e935fbb42c6e3</sum></package><package arch="i686" name="nss-pkcs11-devel" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-pkcs11-devel-3.14.3-6.el6_4.i686.rpm</filename><sum type="sha256">2e1d952f4018c44cdced3330ade621c1e6e235c6d4953e6e240631ab760c0974</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="6.el6_4" src="nss-3.14.3-6.el6_4.src.rpm" version="3.14.3"><filename>nss-pkcs11-devel-3.14.3-6.el6_4.x86_64.rpm</filename><sum type="sha256">8f76fa0d0c791e9c848ca3974a80ae33e2207da0027255aa96c78d2ef89b782b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" id="CVE-2014-1544" title="Nss: Race-Condition In Certificate Verification Can Lead To Remote Code Execution (Mfsa 2014-63)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1116198" id="1116198" title="Nss: Race-Condition In Certificate Verification Can Lead To Remote Code Execution (Mfsa 2014-63)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0915.html" id="RHSA-2014:0915-1" title="Rhsa-2014:0915-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0917-1</id><title>Critical: Nss And Nspr Security Update</title><description>A race condition was found in the way NSS verified certain certificates. A remote attacker could use this flaw to crash an application using NSS or, possibly, execute arbitrary code with the privileges of the user running that application. (CVE-2014-1544) 
A flaw was found in the way TLS False Start was implemented in NSS. An attacker could use this flaw to potentially return unencrypted information from the server. (CVE-2013-1740) 
A race condition was found in the way NSS implemented session ticket handling as specified by RFC 5077. An attacker could use this flaw to crash an application using NSS or, in rare cases, execute arbitrary code with the privileges of the user running that application. (CVE-2014-1490) 
It was found that NSS accepted weak Diffie-Hellman Key exchange (DHKE) parameters. This could possibly lead to weak encryption being used in communication between the client and the server. (CVE-2014-1491) 
An out-of-bounds write flaw was found in NSPR. A remote attacker could potentially use this flaw to crash an application using NSPR or, possibly, execute arbitrary code with the privileges of the user running that application. This NSPR flaw was not exposed to web content in any shipped version of Firefox. (CVE-2014-1545) 
It was found that the implementation of Internationalizing Domain Names in Applications (IDNA) hostname matching in NSS did not follow the RFC 6125 recommendations. This could lead to certain invalid certificates with international characters to be accepted as valid. (CVE-2014-1492) 
In addition, the nss package has been upgraded to upstream version 3.16.1, and the nspr package has been upgraded to upstream version 4.10.6. These updated packages provide a number of bug fixes and enhancements over the previous versions. 
After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-07-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-util" release="1.el6_5" src="nss-util-3.16.1-1.el6_5.src.rpm" version="3.16.1"><filename>nss-util-3.16.1-1.el6_5.i686.rpm</filename><sum type="sha256">cf8d1fd6b5ffb67232fd0e3c6655dc4fbe5d5ab13fba9dfe9452bdea3231812e</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-pkcs11-devel-3.16.1-4.el6_5.i686.rpm</filename><sum type="sha256">5926c27c4770804d1f91962da32e0e7a52496412a5a2aa6b74e66ac5296c4135</sum></package><package arch="i686" name="nspr" release="1.el6_5" src="nspr-4.10.6-1.el6_5.src.rpm" version="4.10.6"><filename>nspr-4.10.6-1.el6_5.i686.rpm</filename><sum type="sha256">183a1081ca67ef6d7225d9c370603510b6c8ac5b4b25a63933386cc9f0ea98b0</sum></package><package arch="x86_64" name="nspr-devel" release="1.el6_5" src="nspr-4.10.6-1.el6_5.src.rpm" version="4.10.6"><filename>nspr-devel-4.10.6-1.el6_5.x86_64.rpm</filename><sum type="sha256">1ad89cc4649d78366922e64d25efd547e3a1388bef551e93cb0c0728daf3d831</sum></package><package arch="x86_64" name="nss-sysinit" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-sysinit-3.16.1-4.el6_5.x86_64.rpm</filename><sum type="sha256">da289151e29df8eaf9984394816e3feed39716410761eb5578dfd5a718a3d8c8</sum></package><package arch="x86_64" name="nss-devel" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-devel-3.16.1-4.el6_5.x86_64.rpm</filename><sum type="sha256">9bbd3907e1a363a5db2cd19148227f3532227a926e4f5d60147fc108b77f8a81</sum></package><package arch="x86_64" name="nss-util" release="1.el6_5" src="nss-util-3.16.1-1.el6_5.src.rpm" version="3.16.1"><filename>nss-util-3.16.1-1.el6_5.x86_64.rpm</filename><sum type="sha256">39d3102810ea97cef8336697d25b96efc42d697eaa31ee6eec1660bf8eacad81</sum></package><package arch="x86_64" name="nss-tools" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-tools-3.16.1-4.el6_5.x86_64.rpm</filename><sum type="sha256">9e532def4d390fad85689c9cd3987e9505c73bf58b013c50cfff40b9d45bbc18</sum></package><package arch="i686" name="nss-devel" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-devel-3.16.1-4.el6_5.i686.rpm</filename><sum type="sha256">68e1d518d1d3eaf6aa5c3fc9ff5cb2164e6330a28d13b1369f3001f8de46b6a8</sum></package><package arch="i686" name="nspr-devel" release="1.el6_5" src="nspr-4.10.6-1.el6_5.src.rpm" version="4.10.6"><filename>nspr-devel-4.10.6-1.el6_5.i686.rpm</filename><sum type="sha256">59b980d040ca0d2de279d03fde4bb63f0b164ed9d193ff838d8cfa7ebdd921ef</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-pkcs11-devel-3.16.1-4.el6_5.x86_64.rpm</filename><sum type="sha256">8a1393f879e419fa6794ec18e2fcc2176df5aa4cc2b0e10b77152047cffd2804</sum></package><package arch="i686" name="nss" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-3.16.1-4.el6_5.i686.rpm</filename><sum type="sha256">2a69352255d3b9013f4e1b46f1848bb797a24dbc89ea69ddbb9dc2f14426b3a5</sum></package><package arch="x86_64" name="nspr" release="1.el6_5" src="nspr-4.10.6-1.el6_5.src.rpm" version="4.10.6"><filename>nspr-4.10.6-1.el6_5.x86_64.rpm</filename><sum type="sha256">b0682383470c10d6dc143c814209e9b55239f2cefcda5e3d7bab3ca49cef5fda</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_5" src="nss-util-3.16.1-1.el6_5.src.rpm" version="3.16.1"><filename>nss-util-devel-3.16.1-1.el6_5.i686.rpm</filename><sum type="sha256">ba5b57eb81252f4924b864383e9cceda03bbd947d0c70dda484dee8a67d24f76</sum></package><package arch="x86_64" name="nss" release="4.el6_5" src="nss-3.16.1-4.el6_5.src.rpm" version="3.16.1"><filename>nss-3.16.1-4.el6_5.x86_64.rpm</filename><sum type="sha256">3750a02737e270228d9a0d576de2397b8f1fb41805fe45da4d33eccbd8ae058c</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_5" src="nss-util-3.16.1-1.el6_5.src.rpm" version="3.16.1"><filename>nss-util-devel-3.16.1-1.el6_5.x86_64.rpm</filename><sum type="sha256">aa2073a90a34b90a594e7aa322c02927ab8ffc41b33e610902c1628f175af7a6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740" id="CVE-2013-1740" title="Nss: False Start Pr_Recv Information Disclosure Security Issue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" id="CVE-2014-1490" title="Nss: Toctou, Potential Use-After-Free In Libssl'S Session Ticket Processing (Mfsa 2014-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" id="CVE-2014-1491" title="Nss: Do Not Allow P-1 As A Public Dh Value (Mfsa 2014-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" id="CVE-2014-1492" title="Nss: Idna Hostname Matching Code Does Not Follow Rfc 6125 Recommendation (Mfsa 2014-45)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" id="CVE-2014-1544" title="Nss: Race-Condition In Certificate Verification Can Lead To Remote Code Execution (Mfsa 2014-63)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" id="CVE-2014-1545" title="Mozilla: Out Of Bounds Write In Nspr (Mfsa 2014-55)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053725" id="1053725" title="Nss: False Start Pr_Recv Information Disclosure Security Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060953" id="1060953" title="Nss: Toctou, Potential Use-After-Free In Libssl'S Session Ticket Processing (Mfsa 2014-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060955" id="1060955" title="Nss: Do Not Allow P-1 As A Public Dh Value (Mfsa 2014-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1079851" id="1079851" title="Nss: Idna Hostname Matching Code Does Not Follow Rfc 6125 Recommendation (Mfsa 2014-45)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1107432" id="1107432" title="Mozilla: Out Of Bounds Write In Nspr (Mfsa 2014-55)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1112135" id="1112135" title="Rebase Nspr In Rhel 6.5.Z To Nspr 4.10.6 (Required For Ff31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1112136" id="1112136" title="Rebase Nss In Rhel 6.5.Z To Nss 3.16.1 (Anticipated Minimum Version For Ff 31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1116198" id="1116198" title="Nss: Race-Condition In Certificate Verification Can Lead To Remote Code Execution (Mfsa 2014-63)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0917.html" id="RHSA-2014:0917-1" title="Rhsa-2014:0917-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0918-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1547, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-07-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_5" src="thunderbird-24.7.0-1.el6_5.src.rpm" version="24.7.0"><filename>thunderbird-24.7.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">e7ee18dcf9045e6826c01c8859b3950b8958e7527c6cdf188eac1668fa486a30</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" id="CVE-2014-1547" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.7) (Mfsa 2014-56)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" id="CVE-2014-1555" title="Mozilla: Use-After-Free With Fireonstatechange Event (Mfsa 2014-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" id="CVE-2014-1556" title="Mozilla: Exploitable Webgl Crash With Cesium Javascript Library (Mfsa 2014-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" id="CVE-2014-1557" title="Mozilla: Crash In Skia Library When Scaling High Quality Images (Mfsa 2014-64)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121464" id="1121464" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.7) (Mfsa 2014-56)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121476" id="1121476" title="Mozilla: Use-After-Free With Fireonstatechange Event (Mfsa 2014-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121478" id="1121478" title="Mozilla: Exploitable Webgl Crash With Cesium Javascript Library (Mfsa 2014-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121479" id="1121479" title="Mozilla: Crash In Skia Library When Scaling High Quality Images (Mfsa 2014-64)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0918.html" id="RHSA-2014:0918-1" title="Rhsa-2014:0918-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0919-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1547, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-07-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_5" src="firefox-24.7.0-1.el6_5.src.rpm" version="24.7.0"><filename>firefox-24.7.0-1.el6_5.i686.rpm</filename><sum type="sha256">8ea1a4558768574c08489b57aab6bda98286155edf91ee235ea5e3a02ab3756c</sum></package><package arch="x86_64" name="firefox" release="1.el6_5" src="firefox-24.7.0-1.el6_5.src.rpm" version="24.7.0"><filename>firefox-24.7.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">e9b6f1aebc1106e05159b423dd83c5006e279fe5070b5b22d4bfcb80e0d09f5e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" id="CVE-2014-1547" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.7) (Mfsa 2014-56)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" id="CVE-2014-1555" title="Mozilla: Use-After-Free With Fireonstatechange Event (Mfsa 2014-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" id="CVE-2014-1556" title="Mozilla: Exploitable Webgl Crash With Cesium Javascript Library (Mfsa 2014-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" id="CVE-2014-1557" title="Mozilla: Crash In Skia Library When Scaling High Quality Images (Mfsa 2014-64)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121464" id="1121464" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:24.7) (Mfsa 2014-56)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121476" id="1121476" title="Mozilla: Use-After-Free With Fireonstatechange Event (Mfsa 2014-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121478" id="1121478" title="Mozilla: Exploitable Webgl Crash With Cesium Javascript Library (Mfsa 2014-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121479" id="1121479" title="Mozilla: Crash In Skia Library When Scaling High Quality Images (Mfsa 2014-64)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0919.html" id="RHSA-2014:0919-1" title="Rhsa-2014:0919-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0920-1</id><title>Important: Httpd Security Update</title><description>A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2014-0226) 
A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. (CVE-2014-0118) 
A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. (CVE-2014-0231) 
After installing the updated packages, the httpd daemon will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-07-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="httpd" release="31.sl6" src="httpd-2.2.15-31.sl6.src.rpm" version="2.2.15"><filename>httpd-2.2.15-31.sl6.x86_64.rpm</filename><sum type="sha256">21e94a4c3b6da48252565bcd8f6999c9502be3d431f34053c000f54504f983de</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="31.sl6" src="httpd-2.2.15-31.sl6.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-31.sl6.x86_64.rpm</filename><sum type="sha256">3261ff2c77da1955a0e12464cbc3f64a4f54a02d665f893e7dd1eb7dd03ca6a4</sum></package><package arch="x86_64" name="httpd-tools" release="31.sl6" src="httpd-2.2.15-31.sl6.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-31.sl6.x86_64.rpm</filename><sum type="sha256">7bbfb6c12be48e7abce6984777954ec57a700fbeca5a361a3d281f5be090c9a4</sum></package><package arch="i686" name="httpd-devel" release="31.sl6" src="httpd-2.2.15-31.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-31.sl6.i686.rpm</filename><sum type="sha256">95efe10844d38007f74a739fa355864a06231b23594d207e4c6beb7f650c2fdb</sum></package><package arch="x86_64" name="httpd-devel" release="31.sl6" src="httpd-2.2.15-31.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-31.sl6.x86_64.rpm</filename><sum type="sha256">9b8e4cd0e93e9bebe9f2c33a29fc586149ee2a88aa10504f9197077872032663</sum></package><package arch="noarch" name="httpd-manual" release="31.sl6" src="httpd-2.2.15-31.sl6.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-31.sl6.noarch.rpm</filename><sum type="sha256">1eb2b40b9a812a54cd96a69a3db612b8f4d72dbff123d5a0ea83aaf5925b5173</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118" id="CVE-2014-0118" title="Httpd: Mod_Deflate Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" id="CVE-2014-0226" title="Httpd: Mod_Status Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" id="CVE-2014-0231" title="Httpd: Mod_Cgid Denial Of Service" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120596" id="1120596" title="Httpd: Mod_Cgid Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120601" id="1120601" title="Httpd: Mod_Deflate Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120603" id="1120603" title="Httpd: Mod_Status Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0920.html" id="RHSA-2014:0920-1" title="Rhsa-2014:0920-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0924-1</id><title>Important: Kernel Security Update</title><description>* It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4699, Important) 
Note: The CVE-2014-4699 issue only affected systems using an Intel CPU. 
* A flaw was found in the way the pppol2tp_setsockopt() and pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP implementation handled requests with a non-SOL_PPPOL2TP socket option level. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-4943, Important) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-07-29 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">566cdb56d63fea8f7385bd3c3a5d6d4513c77c8bdd294a2bb41ea313f785dd93</sum></package><package arch="x86_64" name="kernel" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">f65b585b605f65ab9e61b38bace90a7f556384b815a13702d99832f6efd382c9</sum></package><package arch="x86_64" name="perf" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">65029795063674a3f52a10060ae099647a775739079611eda5655dd61ac37005</sum></package><package arch="noarch" name="kernel-firmware" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.20.5.el6.noarch.rpm</filename><sum type="sha256">6deba6c25992cc1116d84c20517304fd6fec03359b7fa9c9deb465e229bf9f32</sum></package><package arch="x86_64" name="kernel-debug" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">c73332c0ebf79a6cf0a3900c71cc8da07433304c2c7bed6f218a2e971d16d8cb</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.20.5.el6.noarch.rpm</filename><sum type="sha256">545d6b6692fa0bcb777a8f3b12dccb475c4c9efe0d931a5e85250f7ddcebf0f9</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">4a41e0094a332b0fcc90be4164d6574c135bb5ebc8fb772c1d32db4eb5482e4b</sum></package><package arch="x86_64" name="kernel-headers" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">9ec98a8b033f4205e4f0a484d9fedc201f3711e1091397f08563fafa3913ab80</sum></package><package arch="x86_64" name="python-perf" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.20.5.el6.x86_64.rpm</filename><sum type="sha256">5a7a6dcb3be04a68e2f120ac40e395b4cef31f9511c019640f82f3d062262a1f</sum></package><package arch="noarch" name="kernel-doc" release="431.20.5.el6" src="kernel-2.6.32-431.20.5.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.20.5.el6.noarch.rpm</filename><sum type="sha256">f3a673ce25ac1ea999246904aff7aee94aea4caefc92c44f42f7ab5a281d53c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" id="CVE-2014-4699" title="Kernel: X86_64: Ptrace: Sysret To Non-Canonical Address" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" id="CVE-2014-4943" title="Kernel: Net: Pppol2Tp: Level Handling In Pppol2Tp_[S,G]Etsockopt()" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1115927" id="1115927" title="Kernel: X86_64: Ptrace: Sysret To Non-Canonical Address" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119458" id="1119458" title="Kernel: Net: Pppol2Tp: Level Handling In Pppol2Tp_[S,G]Etsockopt()" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0924.html" id="RHSA-2014:0924-1" title="Rhsa-2014:0924-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:0981-1</id><title>Important: Kernel Security Update</title><description>* A use-after-free flaw was found in the way the ping_init_sock() function of the Linux kernel handled the group_info reference counter. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-2851, Important) 
* A NULL pointer dereference flaw was found in the way the futex_wait_requeue_pi() function of the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to crash the system. (CVE-2012-6647, Moderate) 
* A NULL pointer dereference flaw was found in the rds_ib_laddr_check() function in the Linux kernel's implementation of Reliable Datagram Sockets (RDS). A local, unprivileged user could use this flaw to crash the system. (CVE-2013-7339, Moderate) 
* It was found that a remote attacker could use a race condition flaw in the ath_tx_aggr_sleep() function to crash the system by creating large network traffic on the system's Atheros 9k wireless network adapter. (CVE-2014-2672, Moderate) 
* A NULL pointer dereference flaw was found in the rds_iw_laddr_check() function in the Linux kernel's implementation of Reliable Datagram Sockets (RDS). A local, unprivileged user could use this flaw to crash the system. (CVE-2014-2678, Moderate) 
* A race condition flaw was found in the way the Linux kernel's mac80211 subsystem implementation handled synchronization between TX and STA wake- up code paths. A remote attacker could use this flaw to crash the system. (CVE-2014-2706, Moderate) 
* An out-of-bounds memory access flaw was found in the Netlink Attribute extension of the Berkeley Packet Filter (BPF) interpreter functionality in the Linux kernel's networking implementation. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space via a specially crafted socket filter. (CVE-2014-3144, CVE-2014-3145, Moderate) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-08-05 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">97e7ffe3964690a3f132adf7c39c677a42ea6e01657e8db662b11930a19839d2</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpm</filename><sum type="sha256">5271e3bd5b4c01a05399454409a2301ae2d89c96c048cd44793f083d359164c4</sum></package><package arch="x86_64" name="kernel" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">464bb4c0183df65ff6abfee8453b1b7168582b10139f405309f96fd02a316067</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">6f4ead7145be1e6f12c0abdd481d243f909863329df8a8db9fa377f51c2a553f</sum></package><package arch="noarch" name="kernel-doc" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.23.3.el6.noarch.rpm</filename><sum type="sha256">a6c954ada6cea37b929a9a060e35b3acd264aefcdbf2a0ddbd0a3c746b70bdfa</sum></package><package arch="x86_64" name="python-perf" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">2d38ee59dd4dd532f790d347391c8b0e4ba3d9a3f8aec0f68375d27cd4373b6c</sum></package><package arch="x86_64" name="kernel-devel" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">f0f9a7873ef16443db7169296cb12e5e49e72d27ab3a89c8372f94e8208e904b</sum></package><package arch="x86_64" name="kernel-headers" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">c93085b58c9870454aa059e2879289d8700a93d334c8319db1c1930939cf14b7</sum></package><package arch="x86_64" name="perf" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.23.3.el6.x86_64.rpm</filename><sum type="sha256">b6d80cf8ab1cca5f1208e6e8aaae4005eb3e5c61310d807a2d7fd05137528aff</sum></package><package arch="noarch" name="kernel-firmware" release="431.23.3.el6" src="kernel-2.6.32-431.23.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm</filename><sum type="sha256">d3252102b7f95df0afc0c9b19044a03a45ba0feedba61daf0d3526ebf082f710</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6647" id="CVE-2012-6647" title="Kernel: Futex: Forbid Uaddr == Uaddr2 In Futex_Wait_Requeue_Pi()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" id="CVE-2013-7339" title="Kernel: Net: Rds: Dereference Of A Null Device In Rds_Ib_Laddr_Check()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" id="CVE-2014-2672" title="Kernel: Ath9K: Tid-&gt;Sched Race In Ath_Tx_Aggr_Sleep()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" id="CVE-2014-2678" title="Kernel: Net: Rds: Dereference Of A Null Device In Rds_Iw_Laddr_Check()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" id="CVE-2014-2706" title="Kernel: Net: Mac80211: Crash Dues To Ap Powersave Tx Vs. Wakeup Race" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851" id="CVE-2014-2851" title="Kernel: Net: Ping: Refcount Issue In Ping_Init_Sock() Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" id="CVE-2014-3144" title="Kernel: Filter: Prevent Nla Extensions To Peek Beyond The End Of The Message" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" id="CVE-2014-3145" title="Kernel: Filter: Prevent Nla Extensions To Peek Beyond The End Of The Message" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1079214" id="1079214" title="Kernel: Net: Rds: Dereference Of A Null Device In Rds_Ib_Laddr_Check()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1083246" id="1083246" title="Kernel: Ath9K: Tid-&gt;Sched Race In Ath_Tx_Aggr_Sleep()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1083274" id="1083274" title="Kernel: Net: Rds: Dereference Of A Null Device In Rds_Iw_Laddr_Check()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1083512" id="1083512" title="Kernel: Net: Mac80211: Crash Dues To Ap Powersave Tx Vs. Wakeup Race" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1086730" id="1086730" title="Kernel: Net: Ping: Refcount Issue In Ping_Init_Sock() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096775" id="1096775" title="Kernel: Filter: Prevent Nla Extensions To Peek Beyond The End Of The Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097746" id="1097746" title="Kernel: Futex: Forbid Uaddr == Uaddr2 In Futex_Wait_Requeue_Pi()" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-0981.html" id="RHSA-2014:0981-1" title="Rhsa-2014:0981-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1009-1</id><title>Important: Samba4 Security Update</title><description>A heap-based buffer overflow flaw was found in Samba's NetBIOS message block daemon (nmbd). An attacker on the local network could use this flaw to send specially crafted packets that, when processed by nmbd, could possibly lead to arbitrary code execution with root privileges. (CVE-2014-3560) 
After installing this update, the smb service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-08-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-winbind-krb5-locator" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-krb5-locator-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">709d8ce3255c14f32d72f332875f6644d695e9250a590dec49c889a81bd9464b</sum></package><package arch="x86_64" name="samba4-common" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-common-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">acf051a39feb918d83c18122b4d255259be7b93fcecad8cd7a7b78d7e7661310</sum></package><package arch="x86_64" name="samba4-dc-libs" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-libs-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">cc254a3e53fb0e0a187b4d360bfe116f397fa393d95da37cbe130587bf26b067</sum></package><package arch="x86_64" name="samba4-pidl" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-pidl-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">0baa593f35ae7ca9370306366b30449929eb980956992bf9d412392ffefdcd17</sum></package><package arch="x86_64" name="samba4" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">154f7d0b2603fa894437b3c63f02a5d92b908dfc695eacf66c155db96da29786</sum></package><package arch="x86_64" name="samba4-devel" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-devel-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">d182dfc27ff260e7edb6cd40dfe09f9ff9b65bc589893e4beed0f527b556b6da</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-clients-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">cb5b1ab10e14cd19b5b375518a18a8853ac35eaca6813a3053bd0cc669f695f4</sum></package><package arch="x86_64" name="samba4-dc" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">021039ae3c3e17b756222d04d934a878b804fa724534c80fa8436f09ad2e7abf</sum></package><package arch="x86_64" name="samba4-libs" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-libs-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">d94eb669261ce6c654161e0e3ec9ae8c545c01ad730eaf18fe8076b2bcf4c371</sum></package><package arch="x86_64" name="samba4-swat" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-swat-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">551431e5eda525d25e762ada98518a322fae26d5a3e9ae8bbf860c7420c77ac1</sum></package><package arch="x86_64" name="samba4-python" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-python-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">692a3d6510fa27222f0f2f48843a46ff4bc26715db40244a2582ed1c69cc2b9b</sum></package><package arch="x86_64" name="samba4-test" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-test-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">bf89ef856487037bae4d6d42979287a12838202f9b055f645fc9f637af9409a2</sum></package><package arch="x86_64" name="samba4-winbind" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">656501fbe5065572311d2e7c8106af2750d9565eef730750dcd03457b96d2d4d</sum></package><package arch="x86_64" name="samba4-client" release="63.el6_5.rc4" src="samba4-4.0.0-63.el6_5.rc4.src.rpm" version="4.0.0"><filename>samba4-client-4.0.0-63.el6_5.rc4.x86_64.rpm</filename><sum type="sha256">275e88bff3f1f9a91f654c616175d848cc3fe6e56a234e8e77e4dd7b94dbdf4e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560" id="CVE-2014-3560" title="Samba: Remote Code Execution In Nmbd" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126010" id="1126010" title="Samba: Remote Code Execution In Nmbd" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1009.html" id="RHSA-2014:1009-1" title="Rhsa-2014:1009-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1012-1</id><title>Moderate: Php53 And Php Security Update</title><description>Multiple denial of service flaws were found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use either of these flaws to crash a PHP application using fileinfo via a specially crafted CDF file. (CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2012-1571) 
Two denial of service flaws were found in the way the File Information (fileinfo) extension handled indirect and search rules. A remote attacker could use either of these flaws to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU. (CVE-2014-1943, CVE-2014-2270) 
A heap-based buffer overflow flaw was found in the way PHP parsed DNS TXT records. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record() function to perform a DNS query. (CVE-2014-4049) 
A type confusion issue was found in PHP's phpinfo() function. A malicious script author could possibly use this flaw to disclose certain portions of server memory. (CVE-2014-4721) 
A buffer over-read flaw was found in the way the DateInterval class parsed interval specifications. An attacker able to make a PHP application parse a specially crafted specification using DateInterval could possibly cause the PHP interpreter to crash. (CVE-2013-6712) 
A type confusion issue was found in the SPL ArrayObject and SPLObjectStorage classes' unserialize() method. A remote attacker able to submit specially crafted input to a PHP application, which would then unserialize this input using one of the aforementioned methods, could use this flaw to execute arbitrary code with the privileges of the user running that PHP application. (CVE-2014-3515)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-08-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-imap" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">8b2a71010da71a70bdc6f97065b6fdd7217ffc51fc4828a76e0237d150329ff0</sum></package><package arch="x86_64" name="php-dba" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">03ed435aadf32223b3b4ce0ce38e2469df01c1431cb92fc487b291d1b3885710</sum></package><package arch="x86_64" name="php-intl" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">c6bacbe2d3b77bf8a00813fd68c9de5e023b1a57b3732e9b179d34a390ab11db</sum></package><package arch="x86_64" name="php-pgsql" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">2ba98138cc7172d0d3f67e03844d3564033427ac89e9e93e20931309ad41a5a7</sum></package><package arch="x86_64" name="php-xmlrpc" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">1c1cec15a335dda87db59ac215893e242eef494ff9fc9e32ab5a3d715014379c</sum></package><package arch="x86_64" name="php-ldap" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">258eddd0aeb0cb9cd0db751628578c77756d7d269d5cbd91b1337a2d8355ac0d</sum></package><package arch="x86_64" name="php-pdo" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">5f91e7519d827ec239af92d48c84af2b7c77b648874fdb097d90d4f2ad817f95</sum></package><package arch="x86_64" name="php-recode" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">f7d25021d89fb2665d12fe3a441b5ae8331a71c9a5036e933f5a5844ebf13fa4</sum></package><package arch="x86_64" name="php-bcmath" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">005e416f8fe6e225d16dd6fdd629514eef7b0f27a897808e8ad87bd0cdd1ee1c</sum></package><package arch="x86_64" name="php-pspell" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">8e73e129d5a7cea11b20d4b0202b6ce52732400b699db9d279e311f61c04e053</sum></package><package arch="x86_64" name="php-embedded" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">1db93c7ca4d7cc03a6e56935bbcfe55d644b2870108932d1353620cc4b6c8f58</sum></package><package arch="x86_64" name="php-mysql" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">fedddb6cd0598e19aaab7d0a4a9806be58c4deb456521ae55a6ac350b2d31355</sum></package><package arch="x86_64" name="php-fpm" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">73d7c934466953dfd1196708883ba1a07b878548098036017c3788d06ee8b4a1</sum></package><package arch="x86_64" name="php-mbstring" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">eb61644b765b6c25df7537e0b8e8b7482bae5729587ec00134b364692b970527</sum></package><package arch="x86_64" name="php-xml" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">c544422838beb0248f4a4c322b5e5be552a3e8885fcf96e82f3faea519451313</sum></package><package arch="x86_64" name="php-zts" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">768edf06a7220df919bad5906adf43c18ed1fcd024339d02e6344dbcf98c9d5a</sum></package><package arch="x86_64" name="php-process" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-process-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">6b77c4662bae56cbda8f390c9fba4a10546e53d652c6171061cc40652f2ed382</sum></package><package arch="x86_64" name="php" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">1875966ee39d79df93ac648ee499ac5f45f97c88b4e51d0ed44e3fbd4054c0b9</sum></package><package arch="x86_64" name="php-odbc" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">eeb62f3ac62b9cd98a3acfe982acba4643a684f2be0bff3890c173f2922adeb3</sum></package><package arch="x86_64" name="php-enchant" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">114859c36aea9c3a4ad5079ce49dc724e9bc37c66811909d9bc0740cc881aca1</sum></package><package arch="x86_64" name="php-cli" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">0babd638a0c83d20f6f88b50f9fabec9f0d20d130cf8f4ef27dabf47dbe85b34</sum></package><package arch="x86_64" name="php-soap" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">d1fc0e25c638cf2b9319464865cbad6d44f3a06920df3201c15b282ac488958a</sum></package><package arch="x86_64" name="php-tidy" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">fcdec48578244401d9652e519c07f5cdd328710326bfe581455dc1de16767059</sum></package><package arch="x86_64" name="php-snmp" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">9eac3e452f9ec7da533d5e02546fa76990d50de00baeb2e56a52f77ffe0e9751</sum></package><package arch="x86_64" name="php-common" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-common-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">639c5f306d9af19b935e51d704af7bb127ad0f3a2e54936f334523195f69b155</sum></package><package arch="x86_64" name="php-devel" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">15c426a80303f8fbbc24ad1444d55d6668a1c3c00251b103c43f01d6c85fa5b6</sum></package><package arch="x86_64" name="php-gd" release="27.el6_5.1" src="php-5.3.3-27.el6_5.1.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-27.el6_5.1.x86_64.rpm</filename><sum type="sha256">df1ac795424533e0d4376aae580f1d36dceb46581ccf0557108db9fcb2a21d15</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1571" id="CVE-2012-1571" title="File: Out Of Bounds Read In Cdf Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712" id="CVE-2013-6712" title="Php: Heap-Based Buffer Over-Read In Dateinterval" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" id="CVE-2014-0237" title="File: Cdf_Unpack_Summary_Info() Excessive Looping Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" id="CVE-2014-0238" title="File: Cdf Property Info Parsing Nelements Infinite Loop" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943" id="CVE-2014-1943" title="File: Unrestricted Recursion In Handling Of Indirect Type Rules" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" id="CVE-2014-2270" title="File: Out-Of-Bounds Access In Search Rules With Offsets From Input File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479" id="CVE-2014-3479" title="File: Cdf_Check_Stream_Offset Insufficient Boundary Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480" id="CVE-2014-3480" title="File: Cdf_Count_Chain Insufficient Boundary Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515" id="CVE-2014-3515" title="Php: Unserialize() Spl Arrayobject / Splobjectstorage Type Confusion Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" id="CVE-2014-4049" title="Php: Heap-Based Buffer Overflow In Dns Txt Record Parsing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4721" id="CVE-2014-4721" title="Php: Type Confusion Issue In Phpinfo() Leading To Information Leak" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1035670" id="1035670" title="Php: Heap-Based Buffer Over-Read In Dateinterval" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065836" id="1065836" title="File: Unrestricted Recursion In Handling Of Indirect Type Rules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1072220" id="1072220" title="File: Out-Of-Bounds Access In Search Rules With Offsets From Input File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098155" id="1098155" title="File: Cdf Property Info Parsing Nelements Infinite Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098193" id="1098193" title="File: Cdf_Unpack_Summary_Info() Excessive Looping Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104858" id="1104858" title="File: Cdf_Count_Chain Insufficient Boundary Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104869" id="1104869" title="File: Cdf_Check_Stream_Offset Insufficient Boundary Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1108447" id="1108447" title="Php: Heap-Based Buffer Overflow In Dns Txt Record Parsing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1112154" id="1112154" title="Php: Unserialize() Spl Arrayobject / Splobjectstorage Type Confusion Flaw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1116662" id="1116662" title="Php: Type Confusion Issue In Phpinfo() Leading To Information Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=805197" id="805197" title="File: Out Of Bounds Read In Cdf Parser" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1012.html" id="RHSA-2014:1012-1" title="Rhsa-2014:1012-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1031-1</id><title>Important: 389-Ds-Base Security Update</title><description>It was found that when replication was enabled for each attribute in 389 Directory Server, which is the default configuration, the server returned replicated metadata when the directory was searched while debugging was enabled. A remote attacker could use this flaw to disclose potentially sensitive information. (CVE-2014-3562) 
After installing this update, the 389 server service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-08-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base-libs" release="34.el6_5" src="389-ds-base-1.2.11.15-34.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-34.el6_5.x86_64.rpm</filename><sum type="sha256">74bfa6af966f8d6e7e363dcfc885be516669b564d50147ba0d51e68ff5b8dd8f</sum></package><package arch="x86_64" name="389-ds-base-devel" release="34.el6_5" src="389-ds-base-1.2.11.15-34.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-34.el6_5.x86_64.rpm</filename><sum type="sha256">de1591df08044580e9cb1f28efe999e9b62b8ff3cb107127174e278897bef434</sum></package><package arch="x86_64" name="389-ds-base" release="34.el6_5" src="389-ds-base-1.2.11.15-34.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-34.el6_5.x86_64.rpm</filename><sum type="sha256">0a7de0838eaf77cd0d28e562676f35ccbd5ca540de07e7330f1aceb91827269a</sum></package><package arch="i686" name="389-ds-base-libs" release="34.el6_5" src="389-ds-base-1.2.11.15-34.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-34.el6_5.i686.rpm</filename><sum type="sha256">875585384de4076770f40184d9d80f526c903cd75e5b63dce1e8f94e58de8ec9</sum></package><package arch="i686" name="389-ds-base-devel" release="34.el6_5" src="389-ds-base-1.2.11.15-34.el6_5.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-34.el6_5.i686.rpm</filename><sum type="sha256">987e203b6e4e9c4426bc957500e1b0d5280da64061a82f6b09399dff422e1653</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3562" id="CVE-2014-3562" title="389-Ds: Unauthenticated Information Disclosure" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123477" id="1123477" title="389-Ds: Unauthenticated Information Disclosure" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1031.html" id="RHSA-2014:1031-1" title="Rhsa-2014:1031-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1038-1</id><title>Low: Tomcat6 Security Update</title><description>It was found that several application-provided XML files, such as web.xml, content.xml, *.tld, *.tagx, and *.jspx, resolved external entities, permitting XML External Entity (XXE) attacks. An attacker able to deploy malicious applications to Tomcat could use this flaw to circumvent security restrictions set by the JSM, and gain access to sensitive information on the system. Note that this flaw only affected deployments in which Tomcat is running applications from untrusted sources, such as in a shared hosting environment. (CVE-2013-4590) 
It was found that, in certain circumstances, it was possible for a malicious web application to replace the XML parsers used by Apache Tomcat to process XSLTs for the default servlet, JSP documents, tag library descriptors (TLDs), and tag plug-in configuration files. The injected XML parser(s) could then bypass the limits imposed on XML external entities and/or gain access to the XML files processed for other web applications deployed on the same Apache Tomcat instance. (CVE-2014-0119) 
Tomcat must be restarted for this update to take effect.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2014-08-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-docs-webapp" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">584abc862c8145c8f69a92e971f5f7cd78913e48c2a0f149fbe680c05fb82b7d</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">00b3514c26801be6e409db816fdf9fd5db63aaa07fb8ba29f0f34f4d5bb6f9df</sum></package><package arch="noarch" name="tomcat6-lib" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">813db1e92efa237085c664a2ee09daf6ed22edbc0e35836b26ca20da848bad72</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">1f5cf26b55c86fa731363b0f94e2ffae605d333018cf0dec9d6e6978672fadbc</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">83aad06c79e3aaa5f004a0a5a7c2f5bdc0618c6e7676b4faf73ef6faa44a57ae</sum></package><package arch="noarch" name="tomcat6-webapps" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">5c2ae2ace79d5eaa92cd96a41f4487e4d617ec7f57fada8c49715ee8f84a9948</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">f051d6bd08ba05c4e9cd82fc2329d7f89420798c1c141d64b4b720198a90cde0</sum></package><package arch="noarch" name="tomcat6" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">807f4f025836d9da7b79de79b01944c5a367b10c80061333d44d6d1c3bf47f7d</sum></package><package arch="noarch" name="tomcat6-javadoc" release="78.el6_5" src="tomcat6-6.0.24-78.el6_5.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-78.el6_5.noarch.rpm</filename><sum type="sha256">9da5af286fdcb5b4b96d5f8e713324bc07748503eb463daa7ec0bd6e2aa134c6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590" id="CVE-2013-4590" title="Tomcat: Information Disclosure Via Xxe When Running Untrusted Web Applications" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119" id="CVE-2014-0119" title="Tomcat/Jbossweb: Xml Parser Hijack By Malicious Web Application" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Low" id="Low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069911" id="1069911" title="Tomcat: Information Disclosure Via Xxe When Running Untrusted Web Applications" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102038" id="1102038" title="Tomcat/Jbossweb: Xml Parser Hijack By Malicious Web Application" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1038.html" id="RHSA-2014:1038-1" title="Rhsa-2014:1038-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1052-1</id><title>Moderate: Openssl Security Update</title><description>A race condition was found in the way OpenSSL handled ServerHello messages with an included Supported EC Point Format extension. A malicious server could possibly use this flaw to cause a multi-threaded TLS/SSL client using OpenSSL to write into freed memory, causing the client to crash or execute arbitrary code. (CVE-2014-3509) 
It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508) 
A flaw was found in the way OpenSSL handled fragmented handshake packets. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions. (CVE-2014-3511) 
Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A remote attacker could use these flaws to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507) 
A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange. A malicious server could cause a DTLS client using OpenSSL to crash if that client had anonymous DH cipher suites enabled. (CVE-2014-3510) 
For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-08-26 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl-devel" release="16.el6_5.15" src="openssl-1.0.1e-16.el6_5.15.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm</filename><sum type="sha256">9151c3de21dd9b253f76247bde1d0cb86c3ff40a1f79a4323ab9d004a845374b</sum></package><package arch="x86_64" name="openssl" release="16.el6_5.15" src="openssl-1.0.1e-16.el6_5.15.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.15.x86_64.rpm</filename><sum type="sha256">49cf357a5224ec7e07d3a0bfe7e4877c057e08f38f0068ce7840191be0a8da18</sum></package><package arch="x86_64" name="openssl-perl" release="16.el6_5.15" src="openssl-1.0.1e-16.el6_5.15.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm</filename><sum type="sha256">ba41d93b08f8013dc2e9ec8130da7bf414a59802e2b222a6430f11b516498025</sum></package><package arch="x86_64" name="openssl-static" release="16.el6_5.15" src="openssl-1.0.1e-16.el6_5.15.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm</filename><sum type="sha256">de2306748f95e4dcabf110886beacf9939b1f292464b4e101a82fb4507fd216f</sum></package><package arch="i686" name="openssl-devel" release="16.el6_5.15" src="openssl-1.0.1e-16.el6_5.15.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-16.el6_5.15.i686.rpm</filename><sum type="sha256">9bf665914e252adf6b2dcd1055d8c5acc1d7d2badf413b73c865fd2156d11243</sum></package><package arch="i686" name="openssl" release="16.el6_5.15" src="openssl-1.0.1e-16.el6_5.15.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-16.el6_5.15.i686.rpm</filename><sum type="sha256">9ccd46499bccb0e18c29830c3d6cce02338cc85e8e9450974aeeaed4320efe59</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" id="CVE-2014-3505" title="Openssl: Dtls Packet Processing Double Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" id="CVE-2014-3506" title="Openssl: Dtls Memory Exhaustion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" id="CVE-2014-3507" title="Openssl: Dtls Memory Leak From Zero-Length Fragments" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" id="CVE-2014-3508" title="Openssl: Information Leak In Pretty Printing Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509" id="CVE-2014-3509" title="Openssl: Race Condition In Ssl_Parse_Serverhello_Tlsext" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" id="CVE-2014-3510" title="Openssl: Dtls Anonymous (Ec)Dh Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511" id="CVE-2014-3511" title="Openssl: Tls Protocol Downgrade Attack" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127490" id="1127490" title="Openssl: Information Leak In Pretty Printing Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127498" id="1127498" title="Openssl: Race Condition In Ssl_Parse_Serverhello_Tlsext" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127499" id="1127499" title="Openssl: Dtls Packet Processing Double Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127500" id="1127500" title="Openssl: Dtls Memory Exhaustion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127502" id="1127502" title="Openssl: Dtls Memory Leak From Zero-Length Fragments" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127503" id="1127503" title="Openssl: Dtls Anonymous (Ec)Dh Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127504" id="1127504" title="Openssl: Tls Protocol Downgrade Attack" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1052.html" id="RHSA-2014:1052-1" title="Rhsa-2014:1052-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1075-1</id><title>Moderate: Qemu-Kvm Security Update</title><description>Two integer overflow flaws were found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use either of these flaws to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0222, CVE-2014-0223) 
This update also fixes the following bugs: 
* In certain scenarios, when performing live incremental migration, the disk size could be expanded considerably due to the transfer of unallocated sectors past the end of the base image. With this update, the bdrv_is_allocated() function has been fixed to no longer return "True" for unallocated sectors, and the disk size no longer changes after performing live incremental migration. 
* This update enables ioeventfd in virtio-scsi-pci. This allows QEMU to process I/O requests outside of the vCPU thread, reducing the latency of submitting requests and improving single task throughput. 
* Prior to this update, vendor-specific SCSI commands issued from a KVM guest did not reach the target device due to QEMU considering such commands as invalid. This update fixes this bug by properly propagating vendor-specific SCSI commands to the target device. 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-08-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.415.el6_5.14" src="qemu-kvm-0.12.1.2-2.415.el6_5.14.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.415.el6_5.14.x86_64.rpm</filename><sum type="sha256">fa1c185b81a90299f9878948c1a7444ee0339703071a8448a94a6db5c0dab988</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.415.el6_5.14" src="qemu-kvm-0.12.1.2-2.415.el6_5.14.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.415.el6_5.14.x86_64.rpm</filename><sum type="sha256">86b97713abb3e928435b8b13db11529293e0757df0b9fc43d5125587c8b7379f</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.415.el6_5.14" src="qemu-kvm-0.12.1.2-2.415.el6_5.14.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.415.el6_5.14.x86_64.rpm</filename><sum type="sha256">e14415d0a68e194fa7427b204787f176f9c3ab1a4605903c1bc8d03cc25db7c1</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.415.el6_5.14" src="qemu-kvm-0.12.1.2-2.415.el6_5.14.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.415.el6_5.14.x86_64.rpm</filename><sum type="sha256">58e9ecdf9b2c4b37c5652ababb8038b93898166d6ffcfcfe124e4d5bb5a94863</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" id="CVE-2014-0222" title="Qemu: Qcow1: Validate L2 Table Size To Avoid Integer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" id="CVE-2014-0223" title="Qemu: Qcow1: Validate Image Size To Avoid Out-Of-Bounds Memory Access" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097216" id="1097216" title="Qemu: Qcow1: Validate L2 Table Size To Avoid Integer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097222" id="1097222" title="Qemu: Qcow1: Validate Image Size To Avoid Out-Of-Bounds Memory Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1109715" id="1109715" title="Live Incremental Migration Of Vm With Common Shared Base, Size(Disk) &gt; Size(Base) Transfers Unallocated Sectors, Explodes Disk On Dest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123271" id="1123271" title="Enable Ioenventfd For Virtio-Scsi-Pci" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1075.html" id="RHSA-2014:1075-1" title="Rhsa-2014:1075-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1110-1</id><title>Important: Glibc Security Update</title><description>An off-by-one heap-based buffer overflow flaw was found in glibc's internal __gconv_translit_find() function. An attacker able to make an application call the iconv_open() function with a specially crafted argument could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-5119) 
A directory traveral flaw was found in the way glibc loaded locale files. An attacker able to make an application use a specially crafted locale name value (for example, specified in an LC_* environment variable) could possibly use this flaw to execute arbitrary code with the privileges of that application. (CVE-2014-0475)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nscd" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>nscd-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">3165111cc4bbca06b7aac6a865206a94cf0ce84fe0b15f0f333e2d9e82fcee49</sum></package><package arch="x86_64" name="glibc-static" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-static-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">e74d50ed818263f05ccfcb64ac197bd646cf76b6af162123f7ed5b0ba5fd83fb</sum></package><package arch="x86_64" name="glibc" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">f35546c21e157bd21b651a208393b470fd920ebf88c169079f841c6047b42f0e</sum></package><package arch="x86_64" name="glibc-devel" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">a0a8da3e0273b921f867c13d740c39c9bde86c607be204cdb792bbd5a65f957b</sum></package><package arch="x86_64" name="glibc-utils" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">5135cc85868b49e2293910ca897a35700dbbad1fb5ca949863e5c2ad6b23f028</sum></package><package arch="x86_64" name="glibc-headers" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">942fb1a7aa4f5de1d429e07355f85674149340bb5a8a993945b0cf12769a330a</sum></package><package arch="i686" name="glibc" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-2.12-1.132.el6_5.4.i686.rpm</filename><sum type="sha256">0f7271a3f97927fdfd08b6e46164a1b72da91e618cf1772244647ce0680d625d</sum></package><package arch="i686" name="glibc-devel" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.132.el6_5.4.i686.rpm</filename><sum type="sha256">55b0ff5374712bb2f1c09cc005c8d50bd0cb6dc1029e31d6d64b7ee75c0bfeed</sum></package><package arch="x86_64" name="glibc-common" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-common-2.12-1.132.el6_5.4.x86_64.rpm</filename><sum type="sha256">d973554e03a1bdcdac3f9473631bbe87983f61a76e76baef27b1a58b1e96de94</sum></package><package arch="i686" name="glibc-static" release="1.132.el6_5.4" src="glibc-2.12-1.132.el6_5.4.src.rpm" version="2.12"><filename>glibc-static-2.12-1.132.el6_5.4.i686.rpm</filename><sum type="sha256">8e92287542d3ec02d217e1abf72c817856ff241eb9db54f817f073835776a05d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" id="CVE-2014-0475" title="Glibc: Directory Traversal In Lc_* Locale Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" id="CVE-2014-5119" title="Glibc: Off-By-One Error Leading To A Heap-Based Buffer Overflow Flaw In __Gconv_Translit_Find()" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102353" id="1102353" title="Glibc: Directory Traversal In Lc_* Locale Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119128" id="1119128" title="Glibc: Off-By-One Error Leading To A Heap-Based Buffer Overflow Flaw In __Gconv_Translit_Find()" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1110.html" id="RHSA-2014:1110-1" title="Rhsa-2014:1110-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1144-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1562, CVE-2014-1567) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-09-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_5" src="firefox-24.8.0-1.el6_5.src.rpm" version="24.8.0"><filename>firefox-24.8.0-1.el6_5.i686.rpm</filename><sum type="sha256">bf4de3c1525cb1d0f8dcf942ef0476c3f75976e1276ee0d0586813e8b93ae3ca</sum></package><package arch="x86_64" name="firefox" release="1.el6_5" src="firefox-24.8.0-1.el6_5.src.rpm" version="24.8.0"><filename>firefox-24.8.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">6ac22cb5f5842fc075c385ad4a5f317ca58abd9d392963b636965fe01b2a7d75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" id="CVE-2014-1562" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:Rv:24.8) (Mfsa 2014-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" id="CVE-2014-1567" title="Mozilla: Use-After-Free Setting Text Directionality (Mfsa 2014-72)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135862" id="1135862" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:Rv:24.8) (Mfsa 2014-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135869" id="1135869" title="Mozilla: Use-After-Free Setting Text Directionality (Mfsa 2014-72)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1144.html" id="RHSA-2014:1144-1" title="Rhsa-2014:1144-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1145-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1562, CVE-2014-1567) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_5" src="thunderbird-24.8.0-1.el6_5.src.rpm" version="24.8.0"><filename>thunderbird-24.8.0-1.el6_5.x86_64.rpm</filename><sum type="sha256">5232b712b7202592c2fc9d8426d0dea061b7d12423fe0897fcf02945a5f454a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" id="CVE-2014-1562" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:Rv:24.8) (Mfsa 2014-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" id="CVE-2014-1567" title="Mozilla: Use-After-Free Setting Text Directionality (Mfsa 2014-72)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135862" id="1135862" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:Rv:24.8) (Mfsa 2014-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135869" id="1135869" title="Mozilla: Use-After-Free Setting Text Directionality (Mfsa 2014-72)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1145.html" id="RHSA-2014:1145-1" title="Rhsa-2014:1145-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1148-1</id><title>Important: Squid Security Update</title><description>A flaw was found in the way Squid handled malformed HTTP Range headers. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2014-3609) 
A buffer overflow flaw was found in Squid's DNS lookup module. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2013-4115) 
After installing this update, the squid service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid" release="22.el6_5" src="squid-3.1.10-22.el6_5.src.rpm" version="3.1.10"><filename>squid-3.1.10-22.el6_5.x86_64.rpm</filename><sum type="sha256">0621b9186d21fca162dd5b841267127312963e27a11573cf241eba3939f7a083</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115" id="CVE-2013-4115" title="Squid: Buffer Overflow When Processing Overly Long Dns Names (Squid-2013:2)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609" id="CVE-2014-3609" title="Squid: Assertion Failure In Range Header Processing (Squid-2014:2)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1134209" id="1134209" title="Squid: Assertion Failure In Range Header Processing (Squid-2014:2)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=983653" id="983653" title="Squid: Buffer Overflow When Processing Overly Long Dns Names (Squid-2013:2)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1148.html" id="RHSA-2014:1148-1" title="Rhsa-2014:1148-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1166-1</id><title>Important: Jakarta-Commons-Httpclient Security Update</title><description>It was discovered that the HTTPClient incorrectly extracted host name from an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3577)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="jakarta-commons-httpclient-manual" release="0.9.el6_5" src="jakarta-commons-httpclient-3.1-0.9.el6_5.src.rpm" version="3.1"><filename>jakarta-commons-httpclient-manual-3.1-0.9.el6_5.x86_64.rpm</filename><sum type="sha256">95d3207270ba577634b300411cdd92926a465eb6af9a7e1640738889423f1754</sum></package><package arch="x86_64" epoch="1" name="jakarta-commons-httpclient-javadoc" release="0.9.el6_5" src="jakarta-commons-httpclient-3.1-0.9.el6_5.src.rpm" version="3.1"><filename>jakarta-commons-httpclient-javadoc-3.1-0.9.el6_5.x86_64.rpm</filename><sum type="sha256">d2673412b78bef9b8ce02ebae3398efc25cb216119c8c69b94aba0e1acd98ad5</sum></package><package arch="x86_64" epoch="1" name="jakarta-commons-httpclient" release="0.9.el6_5" src="jakarta-commons-httpclient-3.1-0.9.el6_5.src.rpm" version="3.1"><filename>jakarta-commons-httpclient-3.1-0.9.el6_5.x86_64.rpm</filename><sum type="sha256">51bf86d93ed591980b6c42458dccb2860eb23520aa24a1ce59d438d51c3419bb</sum></package><package arch="x86_64" epoch="1" name="jakarta-commons-httpclient-demo" release="0.9.el6_5" src="jakarta-commons-httpclient-3.1-0.9.el6_5.src.rpm" version="3.1"><filename>jakarta-commons-httpclient-demo-3.1-0.9.el6_5.x86_64.rpm</filename><sum type="sha256">f212a423f5bacc4884126d5b593cf455f8a395a294db07ee1cd3b5ea2db39c90</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577" id="CVE-2014-3577" title="Apache Httpcomponents Client: Hostname Verification Susceptible To Mitm Attack" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1129074" id="1129074" title="Apache Httpcomponents Client: Hostname Verification Susceptible To Mitm Attack" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1166.html" id="RHSA-2014:1166-1" title="Rhsa-2014:1166-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1167-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the Linux kernel's futex subsystem handled reference counting when requeuing futexes during futex_wait(). A local, unprivileged user could use this flaw to zero out the reference counter of an inode or an mm struct that backs up the memory area of the futex, which could lead to a use-after-free flaw, resulting in a system crash or, potentially, privilege escalation. (CVE-2014-0205, Important) 
* A NULL pointer dereference flaw was found in the way the Linux kernel's networking implementation handled logging while processing certain invalid packets coming in via a VxLAN interface. A remote attacker could use this flaw to crash the system by sending a specially crafted packet to such an interface. (CVE-2014-3535, Important) 
* An out-of-bounds memory access flaw was found in the Linux kernel's system call auditing implementation. On a system with existing audit rules defined, a local, unprivileged user could use this flaw to leak kernel memory to user space or, potentially, crash the system. (CVE-2014-3917, Moderate) 
* An integer underflow flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation processed certain COOKIE_ECHO packets. By sending a specially crafted SCTP packet, a remote attacker could use this flaw to prevent legitimate connections to a particular SCTP server socket to be made. (CVE-2014-4667, Moderate) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-16 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-headers" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">b3eaa494788be410b10ca5fb78a4e7fa03990dda8e45119c3bf166442e3e6d67</sum></package><package arch="noarch" name="kernel-firmware" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-431.29.2.el6.noarch.rpm</filename><sum type="sha256">7572331dee0b953f5476628d69a019b061b9380472edc47ae74bce12876148dc</sum></package><package arch="x86_64" name="kernel-debug" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">d1dc17cc5b1942e3bf994a0254299f0f16676e287ede611ddf35c513266c72bc</sum></package><package arch="x86_64" name="kernel-devel" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">ee2cb3b0dbba813b52b72f630f8f2274692ee9bcdfc40bb2346bc4c1129b3562</sum></package><package arch="x86_64" name="python-perf" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">06b0e82b88f1b229eedfff375a42035e508dc70d878f4ff9a3355e2632f1d10b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">2a7b10e0a6b4ef1af06b76bde8c83f24ae606301462c483419f193c066a80067</sum></package><package arch="noarch" name="kernel-doc" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-431.29.2.el6.noarch.rpm</filename><sum type="sha256">ed307192f9b1c8296bb47a11fb0c47fa8be924da6f9c2ba520dda24e2d4ceee6</sum></package><package arch="x86_64" name="kernel" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">826ebc21cabc72a4997c6b7bad047018ec6659a46f02591ac49f49110e0bd2a9</sum></package><package arch="x86_64" name="perf" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-431.29.2.el6.x86_64.rpm</filename><sum type="sha256">4b79ec5bcda41a95b2963497b658904093f2eeeeb2f141b00866f24588af28b8</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="431.29.2.el6" src="kernel-2.6.32-431.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-431.29.2.el6.noarch.rpm</filename><sum type="sha256">6cf937f6c97f7225d07a3c2958b6c8438be40789b1a820d5a45b30840a01a6af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0205" id="CVE-2014-0205" title="Kernel: Futex: Refcount Issue In Case Of Requeue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3535" id="CVE-2014-3535" title="Kernel: Netdevice.H: Null Pointer Dereference Over Vxlan" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" id="CVE-2014-3917" title="Kernel: Dos With Syscall Auditing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" id="CVE-2014-4667" title="Kernel: Sctp: Sk_Ack_Backlog Wrap-Around Problem" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1094455" id="1094455" title="Kernel: Futex: Refcount Issue In Case Of Requeue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1102571" id="1102571" title="Kernel: Dos With Syscall Auditing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113967" id="1113967" title="Kernel: Sctp: Sk_Ack_Backlog Wrap-Around Problem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1114540" id="1114540" title="Kernel: Netdevice.H: Null Pointer Dereference Over Vxlan" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1167.html" id="RHSA-2014:1167-1" title="Rhsa-2014:1167-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1172-1</id><title>Important: Procmail Security Update</title><description>A heap-based buffer overflow flaw was found in procmail's formail utility. A remote attacker could send an email with specially crafted headers that, when processed by formail, could cause procmail to crash or, possibly, execute arbitrary code as the user running formail. (CVE-2014-3618)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="procmail" release="25.1.el6_5.1" src="procmail-3.22-25.1.el6_5.1.src.rpm" version="3.22"><filename>procmail-3.22-25.1.el6_5.1.x86_64.rpm</filename><sum type="sha256">01154aad6617bf0839c0922c13e3c03d8a2c428357dcd1f291c3b0802524dd1d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" id="CVE-2014-3618" title="Procmail: Heap-Overflow In Procmail'S Formail Utility When Processing Specially-Crafted Email Headers" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1137581" id="1137581" title="Procmail: Heap-Overflow In Procmail'S Formail Utility When Processing Specially-Crafted Email Headers" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1172.html" id="RHSA-2014:1172-1" title="Rhsa-2014:1172-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1193-1</id><title>Important: Axis Security Update</title><description>It was discovered that Axis incorrectly extracted the host name from an X.509 certificate subject's Common Name (CN) field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3596) 
Applications using Apache Axis must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-23 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="axis" release="7.5.el6_5" src="axis-1.2.1-7.5.el6_5.src.rpm" version="1.2.1"><filename>axis-1.2.1-7.5.el6_5.noarch.rpm</filename><sum type="sha256">5b034090a6211329504ef24d4fc2ee069b86463c3f0b348c80d1b7e277f301ac</sum></package><package arch="noarch" name="axis-javadoc" release="7.5.el6_5" src="axis-1.2.1-7.5.el6_5.src.rpm" version="1.2.1"><filename>axis-javadoc-1.2.1-7.5.el6_5.noarch.rpm</filename><sum type="sha256">d5c134ea53139cac221419833042d9f73dab213e7597d66415186e1c73a441a3</sum></package><package arch="noarch" name="axis-manual" release="7.5.el6_5" src="axis-1.2.1-7.5.el6_5.src.rpm" version="1.2.1"><filename>axis-manual-1.2.1-7.5.el6_5.noarch.rpm</filename><sum type="sha256">87b5d52c17e2c2d212d2f891568acc5cf6ed119fb76f5496f118ffcd23718b72</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596" id="CVE-2014-3596" title="Axis: Ssl Hostname Verification Bypass, Incomplete Cve-2012-5784 Fix" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1129935" id="1129935" title="Axis: Ssl Hostname Verification Bypass, Incomplete Cve-2012-5784 Fix" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1193.html" id="RHSA-2014:1193-1" title="Rhsa-2014:1193-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1293-1</id><title>Critical: Bash Security Update</title><description>A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-6271) 
For additional information on the CVE-2014-6271 flaw, refer to https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-09-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="bash" release="15.el6_5.1" src="bash-4.1.2-15.el6_5.1.src.rpm" version="4.1.2"><filename>bash-4.1.2-15.el6_5.1.x86_64.rpm</filename><sum type="sha256">b2ff85149f50aa92a213429a22846728ec0ddd241d93917bee5d691fa568d753</sum></package><package arch="x86_64" name="bash-doc" release="15.el6_5.1" src="bash-4.1.2-15.el6_5.1.src.rpm" version="4.1.2"><filename>bash-doc-4.1.2-15.el6_5.1.x86_64.rpm</filename><sum type="sha256">d06457d3b63124e3de62d6d95787f299a23a6c2686220cc122c6693bbe207ca8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" id="CVE-2014-6271" title="Bash: Specially-Crafted Environment Variables Can Be Used To Inject Shell Commands" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141597" id="1141597" title="Bash: Specially-Crafted Environment Variables Can Be Used To Inject Shell Commands" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1293.html" id="RHSA-2014:1293-1" title="Rhsa-2014:1293-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1306-1</id><title>Important: Bash Security Update</title><description>It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169) 
Applications which directly create bash functions as environment variables need to be made aware of changes to the way names are handled by this update. 
Note: Docker users are advised to use "yum update" within their containers, and to commit the resulting changes. 
For additional information on CVE-2014-6271 and CVE-2014-7169, refer to https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="bash-doc" release="15.el6_5.2" src="bash-4.1.2-15.el6_5.2.src.rpm" version="4.1.2"><filename>bash-doc-4.1.2-15.el6_5.2.x86_64.rpm</filename><sum type="sha256">b3c9982a1410d348da96a8a8d3c4b8804db374b9d539a4beebce0edb049963e3</sum></package><package arch="x86_64" name="bash" release="15.el6_5.2" src="bash-4.1.2-15.el6_5.2.src.rpm" version="4.1.2"><filename>bash-4.1.2-15.el6_5.2.x86_64.rpm</filename><sum type="sha256">444168fb157651b8d53af76d474dac3879684155fc9f2deb2ac6dd265ab97f08</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" id="CVE-2014-7169" title="Bash: Code Execution Via Specially-Crafted Environment (Incomplete Fix For Cve-2014-6271)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1146319" id="1146319" title="Bash: Code Execution Via Specially-Crafted Environment (Incomplete Fix For Cve-2014-6271)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1306.html" id="RHSA-2014:1306-1" title="Rhsa-2014:1306-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1307-1</id><title>Important: Nss Security Update</title><description>A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS. (CVE-2014-1568) 
After installing this update, applications using NSS must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-30 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-pkcs11-devel" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-pkcs11-devel-3.16.1-7.el6_5.i686.rpm</filename><sum type="sha256">bada320c0a27feeb974fa48e52ae2eefc39d78de64005beee817808e46698132</sum></package><package arch="i686" name="nss-util" release="2.el6_5" src="nss-util-3.16.1-2.el6_5.src.rpm" version="3.16.1"><filename>nss-util-3.16.1-2.el6_5.i686.rpm</filename><sum type="sha256">a7f3851e4276ea330c7b3ee1b33bee3d26622ef640ef990b5fee414c66170b85</sum></package><package arch="x86_64" name="nss" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-3.16.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">bbd1537e359acd5fb36e18a908c6078f101fc8cfc9f25dce26e4ffea23cca366</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-12.el6_5.x86_64.rpm</filename><sum type="sha256">e0cc214d858e2211b1e652c9cde3f5ab14babb2f05eb5183763286bef6a89c01</sum></package><package arch="x86_64" name="nss-sysinit" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-sysinit-3.16.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">46b11af22255a3d3dc5dae2c62eec176f54df75557518ab8050aba567bd6cb1d</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-12.el6_5.x86_64.rpm</filename><sum type="sha256">3030c8b7fc5db5b31000df240f70e5ae83f7eee4e0d85661fdfada9797efc100</sum></package><package arch="x86_64" name="nss-util" release="2.el6_5" src="nss-util-3.16.1-2.el6_5.src.rpm" version="3.16.1"><filename>nss-util-3.16.1-2.el6_5.x86_64.rpm</filename><sum type="sha256">02595e46344d1ed19b3e5f80de0e07e582270f441b1579eb2faf4ee07a8a799c</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-12.el6_5.i686.rpm</filename><sum type="sha256">7815b1c0d8e530d7a580e39bc764173e9ce1f03f7dc02b36db40a2f712eb225f</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-pkcs11-devel-3.16.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">24a0746445351863ae5f3232ea622a0e43ac4def78b3ede625834b27ce718d29</sum></package><package arch="i686" name="nss-softokn-devel" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-12.el6_5.i686.rpm</filename><sum type="sha256">bc2225f25dea89094a5b401c9241761ee55b9363ca2e2990676aec02ad1f2362</sum></package><package arch="x86_64" name="nss-util-devel" release="2.el6_5" src="nss-util-3.16.1-2.el6_5.src.rpm" version="3.16.1"><filename>nss-util-devel-3.16.1-2.el6_5.x86_64.rpm</filename><sum type="sha256">f9d7b9c9372171ba8fbfcd205a5a75a59468df1558c2090095edabf9270b8b1b</sum></package><package arch="x86_64" name="nss-devel" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-devel-3.16.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">74b517275f1989ebbbfe8f77c15ae6becd91103635c130f39a9f338b60df4296</sum></package><package arch="x86_64" name="nss-tools" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-tools-3.16.1-7.el6_5.x86_64.rpm</filename><sum type="sha256">00c391d71ac85906e4ebe2e79bd788bfa577e57fc5bd6355fcf9015de33a0587</sum></package><package arch="x86_64" name="nss-softokn-devel" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-12.el6_5.x86_64.rpm</filename><sum type="sha256">92c4322d205d137894267f792e6592b5287eb162df805bc8f11a2b85dd1c704d</sum></package><package arch="i686" name="nss-util-devel" release="2.el6_5" src="nss-util-3.16.1-2.el6_5.src.rpm" version="3.16.1"><filename>nss-util-devel-3.16.1-2.el6_5.i686.rpm</filename><sum type="sha256">c95785c3bd190f739fa7addd3f74f7fcbe30f624f3a1924d526bbf8aeff90567</sum></package><package arch="i686" name="nss-devel" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-devel-3.16.1-7.el6_5.i686.rpm</filename><sum type="sha256">708c8a75b2035af5cd203e202cce85ec39c200ad6c91201e9d8c15ff9a2d2ab9</sum></package><package arch="i686" name="nss-softokn-freebl" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-12.el6_5.i686.rpm</filename><sum type="sha256">7def50c5fcab8d354c1ac40c58b0d545dfff3cdfd63d8eba9be72ed3852b8871</sum></package><package arch="x86_64" name="nss-softokn" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-12.el6_5.x86_64.rpm</filename><sum type="sha256">bd56ff4012b89b8ad7f8f15603bc0b46dc5e85a44955a040655b880ee3739a62</sum></package><package arch="i686" name="nss" release="7.el6_5" src="nss-3.16.1-7.el6_5.src.rpm" version="3.16.1"><filename>nss-3.16.1-7.el6_5.i686.rpm</filename><sum type="sha256">ddabce679d2486a9348a2e4acf513a375dcf84a8a4db70cb450cbe01f35c10ed</sum></package><package arch="i686" name="nss-softokn" release="12.el6_5" src="nss-softokn-3.14.3-12.el6_5.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-12.el6_5.i686.rpm</filename><sum type="sha256">033b8798950835edf69251b0b1b96bea2039a87c09573b57c0f342921f91c3b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" id="CVE-2014-1568" title="Nss: Rsa Pkcs#1 Signature Verification Forgery Flaw (Mfsa 2014-73)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145429" id="1145429" title="Nss: Rsa Pkcs#1 Signature Verification Forgery Flaw (Mfsa 2014-73)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1307.html" id="RHSA-2014:1307-1" title="Rhsa-2014:1307-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1319-1</id><title>Moderate: Xerces-J2 Security Update</title><description>A resource consumption issue was found in the way Xerces-J handled XML declarations. A remote attacker could use an XML document with a specially crafted declaration using a long pseudo-attribute name that, when parsed by an application using Xerces-J, would cause that application to use an excessive amount of CPU. (CVE-2013-4002) 
Applications using the Xerces-J must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xerces-j2-javadoc-apis" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-javadoc-apis-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">95c0a2d3fe8aa0aeec4bf82e0b90caadc3df9c829be4f6374f7b11413c81a999</sum></package><package arch="x86_64" name="xerces-j2-scripts" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-scripts-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">bebc53b37b394a93bc1a47486e47277d83d60387bc4f784937355dcf7a7b130e</sum></package><package arch="x86_64" name="xerces-j2-javadoc-impl" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-javadoc-impl-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">d942eda9c7588523d6291f6cdd94c998aa98c6da4a650f669bcb763cbb1f6c49</sum></package><package arch="x86_64" name="xerces-j2-demo" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-demo-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">19e11aa7b89281009e572f8edc34703eae8d886af67845d2d2ecb39ed443b4fb</sum></package><package arch="x86_64" name="xerces-j2-javadoc-other" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-javadoc-other-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">ca78889b7b873e020392f8b66e9eba70d62fee89b77293cdf5d92019d67e0de6</sum></package><package arch="x86_64" name="xerces-j2-javadoc-xni" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-javadoc-xni-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">fb709eac01ca333310aea6fabd1aabd604f9aaa9bfca6063db1a728cfb894ac7</sum></package><package arch="x86_64" name="xerces-j2" release="12.7.el6_5" src="xerces-j2-2.7.1-12.7.el6_5.src.rpm" version="2.7.1"><filename>xerces-j2-2.7.1-12.7.el6_5.x86_64.rpm</filename><sum type="sha256">afd814205a5f604514cac233d0f7b54fccf750f7ec274d69b22ea3813f0edba0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" id="CVE-2013-4002" title="Openjdk: Xml Parsing Denial Of Service (Jaxp, 8017298)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1019176" id="1019176" title="Openjdk: Xml Parsing Denial Of Service (Jaxp, 8017298)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1319.html" id="RHSA-2014:1319-1" title="Rhsa-2014:1319-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1326-1</id><title>Moderate: Php53 And Php Security Update</title><description>It was found that the fix for CVE-2012-1571 was incomplete; the File Information (fileinfo) extension did not correctly parse certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file. (CVE-2014-3587) 
A NULL pointer dereference flaw was found in the gdImageCreateFromXpm() function of PHP's gd extension. A remote attacker could use this flaw to crash a PHP application using gd via a specially crafted X PixMap (XPM) file. (CVE-2014-2497) 
Multiple buffer over-read flaws were found in the php_parserr() function of PHP. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record() function to perform a DNS query. (CVE-2014-3597) 
Two use-after-free flaws were found in the way PHP handled certain Standard PHP Library (SPL) Iterators and ArrayIterators. A malicious script author could possibly use either of these flaws to disclose certain portions of server memory. (CVE-2014-4670, CVE-2014-4698) 
The CVE-2014-3597 issue was discovered by David Kutlek of the Red Hat BaseOS QE. 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-pdo" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">5848e82a9a38b493ed44b38ac73ab0aa4e1cd2987c6aea89710523fd2c54f8c3</sum></package><package arch="x86_64" name="php-mysql" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">4ea66c86e300b01268ca84a1558dd71ccc803f8dab9104a85f22a8e8c0ec2e55</sum></package><package arch="x86_64" name="php-fpm" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">7a693837ac19ae39cbafb6357804adb9595d8f4ceda0e8e04e4f05874ab45c1d</sum></package><package arch="x86_64" name="php-odbc" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">d5e193182b401933eda2129835721f467a2bd11d6c953722b5686fa27035b598</sum></package><package arch="x86_64" name="php-soap" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">2cafdc80777c346ded0fe765422493ee6d8a633ef717173f8d1acfe52f16a750</sum></package><package arch="x86_64" name="php-enchant" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">e378c085a83ada594644c2009bc77863f2e35a4c5e412744967b1fa00e3b603a</sum></package><package arch="x86_64" name="php-dba" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">e463703b32b5086a1237d52d6536916cbeb1ecb80b197f0fc8e153bcf61d7db4</sum></package><package arch="x86_64" name="php-recode" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">356813eb85d0436a0d2e91237faffd7472b1f99eb9ef76690660d700b32f547b</sum></package><package arch="x86_64" name="php-zts" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">886fe20071d2574e135a42c61303c6c0d43e4818e872b2d520a3760adf00615d</sum></package><package arch="x86_64" name="php-pgsql" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">38ae737e46efc1359fea9008d58fc2399095e7879d07abc6d7c605cd9e616992</sum></package><package arch="x86_64" name="php-tidy" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">8cdd1123b39ab0a24d53e6fb6c95bc5c005ff8af925758656fe584ae3921f774</sum></package><package arch="x86_64" name="php-ldap" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">9f4dd1d1da63cd6d1c825b0372e7c33c232976b0c3b91c045725254b6d2ddb9d</sum></package><package arch="x86_64" name="php-devel" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">693760087e7a7857d21788fd2b596e7f06017051bfcf8545df69fef1b2d98d26</sum></package><package arch="x86_64" name="php-gd" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">8f8de36979a1f7090ca170fba9cabfc01b4122ed075f8fa9499410c55a8975d6</sum></package><package arch="x86_64" name="php-common" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-common-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">0be076d602f2ed62f5d6a4ee7bc47f7b4644ef471bf0de83686aaf31bb14832f</sum></package><package arch="x86_64" name="php-pspell" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">3c0f27c9d09f4dd1c81849f36b2e9e43fca1e4cfccef863f0f4acf2612f08de1</sum></package><package arch="x86_64" name="php-embedded" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">430a92e6d2078d707177da5106513a0884872d4f01b9087bf8eba39bf068a81b</sum></package><package arch="x86_64" name="php-intl" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">4479849f4d73062be03c9f3749ebe8a01725e4f7e66edae786ebbb902f8dd18e</sum></package><package arch="x86_64" name="php" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">3c8349e5fd8d92a86dce4a7a307d8c71394e62e9f4523e49b80123e0ed1c6eca</sum></package><package arch="x86_64" name="php-xmlrpc" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">62501ef93b27ccf03daf4019788fdcf1970dc0fc54a43f80acada446853dbafe</sum></package><package arch="x86_64" name="php-snmp" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">4235e0117495d6c804238270647601ee6536c3d2b63136ca12b61a595d89eaa5</sum></package><package arch="x86_64" name="php-imap" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">eaab66bedca79fc8af855248444848c150962ec07aa0f3f91c5ed88ab8b81a56</sum></package><package arch="x86_64" name="php-bcmath" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">1d6eb1e67d20287192b2a41d84be451abc1bbd8302ebe3711e00a51af43eb79f</sum></package><package arch="x86_64" name="php-process" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-process-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">eb1700d396921dfe280c4bcf463816704f4504d218545ddfad5e1e086a33ea00</sum></package><package arch="x86_64" name="php-xml" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">65df29f0f97fbea596c9a5c0c2485f6b933f904c60302ff287c34de8f1b7b37f</sum></package><package arch="x86_64" name="php-mbstring" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">6bffb9995523e50f188b70a5ca0369f0ee929c04c916bb5dd72bb32320359105</sum></package><package arch="x86_64" name="php-cli" release="27.el6_5.2" src="php-5.3.3-27.el6_5.2.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-27.el6_5.2.x86_64.rpm</filename><sum type="sha256">a05e78ab35c6907c92ae3b7fb856e13150a720be2359fd7a749b5db038b3ff28</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" id="CVE-2014-2497" title="Gd: Null Pointer Dereference In Gdimagecreatefromxpm()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" id="CVE-2014-3587" title="File: Incomplete Fix For Cve-2012-1571 In Cdf_Read_Property_Info" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597" id="CVE-2014-3597" title="Php: Multiple Buffer Over-Reads In Php_Parserr" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" id="CVE-2014-4670" title="Php: Spl Iterators Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" id="CVE-2014-4698" title="Php: Arrayiterator Use-After-Free Due To Object Change During Sorting" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1076676" id="1076676" title="Gd: Null Pointer Dereference In Gdimagecreatefromxpm()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120259" id="1120259" title="Php: Arrayiterator Use-After-Free Due To Object Change During Sorting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120266" id="1120266" title="Php: Spl Iterators Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128587" id="1128587" title="File: Incomplete Fix For Cve-2012-1571 In Cdf_Read_Property_Info" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1132589" id="1132589" title="Php: Multiple Buffer Over-Reads In Php_Parserr" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1326.html" id="RHSA-2014:1326-1" title="Rhsa-2014:1326-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1388-2</id><title>Moderate: Cups Security Update</title><description>A cross-site scripting (XSS) flaw was found in the CUPS web interface. An attacker could use this flaw to perform a cross-site scripting attack against users of the CUPS web interface. (CVE-2014-2856) 
It was discovered that CUPS allowed certain users to create symbolic links in certain directories under /var/cache/cups/. A local user with the 'lp' group privileges could use this flaw to read the contents of arbitrary files on the system or, potentially, escalate their privileges on the system. (CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031) 
After installing this update, the cupsd daemon will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="1" name="cups-devel" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-devel-1.4.2-67.el6.i686.rpm</filename><sum type="sha256">9439ed631ca424ba0bd603c07aeac56235365116e048b1bb3c41e892a038c6cb</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-libs-1.4.2-67.el6.x86_64.rpm</filename><sum type="sha256">6ffc3277b4b23b37bc7dabf9d1ca130b487fdca8043a910e65a8a654289219e3</sum></package><package arch="x86_64" epoch="1" name="cups-php" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-php-1.4.2-67.el6.x86_64.rpm</filename><sum type="sha256">9c1511ba39808a1c97bf61507ae6cb918e22f4ac2af1ef8708d7a41c8c9ba00b</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-lpd-1.4.2-67.el6.x86_64.rpm</filename><sum type="sha256">1e57bcde29686419e42199648b96ef09ec50f7d065c77fa00bc81da70b29c69a</sum></package><package arch="x86_64" epoch="1" name="cups" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-1.4.2-67.el6.x86_64.rpm</filename><sum type="sha256">8b7b5606e8f4eae811ec4fa8dc5c6be60dfa1d8d21d68f004713219c575cc05c</sum></package><package arch="i686" epoch="1" name="cups-libs" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-libs-1.4.2-67.el6.i686.rpm</filename><sum type="sha256">10ec218c0c0eb8fe2c1594d8a153b23350bbc949b4f43508f2125d0c712e3fa7</sum></package><package arch="x86_64" epoch="1" name="cups-devel" release="67.el6" src="cups-1.4.2-67.el6.src.rpm" version="1.4.2"><filename>cups-devel-1.4.2-67.el6.x86_64.rpm</filename><sum type="sha256">1fad096c7d49813e1e1fd6c1b750d96302095927a99ae061dfabbe73fc5447d4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856" id="CVE-2014-2856" title="Cups: Cross-Site Scripting Flaw Fixed In The 1.7.2 Release" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" id="CVE-2014-3537" title="Cups: Insufficient Checking Leads To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" id="CVE-2014-5029" title="Cups: Incomplete Fix For Cve-2014-3537" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" id="CVE-2014-5030" title="Cups: Allows Local Users To Read Arbitrary Files Via A Symlink Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" id="CVE-2014-5031" title="Cups: World-Readable Permissions" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1012482" id="1012482" title="/Etc/Cron.Daily/Cups Breaks Rule Gen003080 In Red Hat Security Guide" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087122" id="1087122" title="Cups: Cross-Site Scripting Flaw Fixed In The 1.7.2 Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1115576" id="1115576" title="Cups: Insufficient Checking Leads To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122600" id="1122600" title="Cups: Incomplete Fix For Cve-2014-3537" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128764" id="1128764" title="Cups: Allows Local Users To Read Arbitrary Files Via A Symlink Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128767" id="1128767" title="Cups: World-Readable Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=978387" id="978387" title="Bad Ipp Responses With Version 2.0 (Collection Handling Bug)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1388.html" id="RHSA-2014:1388-2" title="Rhsa-2014:1388-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1389-2</id><title>Moderate: Krb5 Security Update</title><description>It was found that if a KDC served multiple realms, certain requests could cause the setup_server_realm() function to dereference a NULL pointer. A remote, unauthenticated attacker could use this flaw to crash the KDC using a specially crafted request. (CVE-2013-1418, CVE-2013-6800) 
A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. A remote, unauthenticated attacker could use this flaw to crash a GSSAPI-enabled server application. (CVE-2014-4344) 
A buffer overflow was found in the KADM5 administration server (kadmind) when it was used with an LDAP back end for the KDC database. A remote, authenticated attacker could potentially use this flaw to execute arbitrary code on the system running kadmind. (CVE-2014-4345) 
Two buffer over-read flaws were found in the way MIT Kerberos handled certain requests. A remote, unauthenticated attacker who is able to inject packets into a client or server application's GSSAPI session could use either of these flaws to crash the application. (CVE-2014-4341, CVE-2014-4342) 
A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An attacker able to spoof packets to appear as though they are from an GSSAPI acceptor could use this flaw to crash a client application that uses MIT Kerberos. (CVE-2014-4343)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="krb5-devel" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-devel-1.10.3-33.el6.x86_64.rpm</filename><sum type="sha256">0feb45095195a11163f977926bb4536acafa038ab003d72f0c6de8160fec1ecd</sum></package><package arch="x86_64" name="krb5-workstation" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-workstation-1.10.3-33.el6.x86_64.rpm</filename><sum type="sha256">c1ba03312267a66c8d48c92e77b9c17bd7fddebc49370929bb1a1d66528f9116</sum></package><package arch="i686" name="krb5-libs" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-libs-1.10.3-33.el6.i686.rpm</filename><sum type="sha256">8d17c7296edaa2c28ce004a48b56c71166d283749ff9fbba0966c79777240dd2</sum></package><package arch="x86_64" name="krb5-server" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-server-1.10.3-33.el6.x86_64.rpm</filename><sum type="sha256">9b3430cdd9471c0be10a739683a749e3995bced1ecfc13a9844c64048c1bce5e</sum></package><package arch="x86_64" name="krb5-libs" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-libs-1.10.3-33.el6.x86_64.rpm</filename><sum type="sha256">0614159e5caec3d30130549f9d9e78966d7ad7a6cdf75a281a4358c16b19bd17</sum></package><package arch="x86_64" name="krb5-pkinit-openssl" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-pkinit-openssl-1.10.3-33.el6.x86_64.rpm</filename><sum type="sha256">99354d0e2cd34521f420b6574bb48070a4ebac2903da76a88e7c8d8f3fa73239</sum></package><package arch="i686" name="krb5-server-ldap" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-server-ldap-1.10.3-33.el6.i686.rpm</filename><sum type="sha256">702d99d44e003c3c93acaa9dd11c1da30d78b0462bcb518b3a304bef43cdccd8</sum></package><package arch="i686" name="krb5-devel" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-devel-1.10.3-33.el6.i686.rpm</filename><sum type="sha256">0aaaf3bf175e4fc6c58dcdd36ea88951e0bfbc1814f42049621f1cfd469868c6</sum></package><package arch="x86_64" name="krb5-server-ldap" release="33.el6" src="krb5-1.10.3-33.el6.src.rpm" version="1.10.3"><filename>krb5-server-ldap-1.10.3-33.el6.x86_64.rpm</filename><sum type="sha256">d92bd731eb1cbe1cd69dc37a3eefc4d688f9554c76131952d175bdf0056b5f3e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" id="CVE-2013-1418" title="Krb5: Multi-Realm Kdc Null Dereference Leads To Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6800" id="CVE-2013-6800" title="Krb5: Kdc Remote Dos (Null Pointer Dereference And Daemon Crash)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" id="CVE-2014-4341" title="Krb5: Denial Of Service Flaws When Handling Padding Length Longer Than The Plaintext" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" id="CVE-2014-4342" title="Krb5: Denial Of Service Flaws When Handling Rfc 1964 Tokens" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" id="CVE-2014-4343" title="Krb5: Double-Free Flaw In Spnego Initiators" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" id="CVE-2014-4344" title="Krb5: Null Pointer Dereference Flaw In Spnego Acceptor For Continuation Tokens" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" id="CVE-2014-4345" title="Krb5: Buffer Overrun In Kadmind With Ldap Backend (Mitkrb5-Sa-2014-001)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1001961" id="1001961" title="Wrong Obsoletes In Krb5-Pkinit-Openssl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1009389" id="1009389" title="Service Krb5Kdc Start Unable To Get Default Realm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026942" id="1026942" title="Krb5: Multi-Realm Kdc Null Dereference Leads To Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031499" id="1031499" title="Krb5: Kdc Remote Dos (Null Pointer Dereference And Daemon Crash)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1059730" id="1059730" title="Kerberos Does Not Handle Incorrect Active Directory Dns Srv Entries Correctly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087068" id="1087068" title="0006526: Gss Api Stopped Working Properly After Krb5 Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113652" id="1113652" title="Trusted Domain Logins Cannot Find Kdc For Requested Realm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1116180" id="1116180" title="Krb5: Denial Of Service Flaws When Handling Padding Length Longer Than The Plaintext" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120581" id="1120581" title="Krb5: Denial Of Service Flaws When Handling Rfc 1964 Tokens" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121876" id="1121876" title="Krb5: Double-Free Flaw In Spnego Initiators" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1121877" id="1121877" title="Krb5: Null Pointer Dereference Flaw In Spnego Acceptor For Continuation Tokens" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128157" id="1128157" title="Krb5: Buffer Overrun In Kadmind With Ldap Backend (Mitkrb5-Sa-2014-001)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1389.html" id="RHSA-2014:1389-2" title="Rhsa-2014:1389-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1390-2</id><title>Moderate: Luci Security Update</title><description>It was discovered that luci used eval() on inputs containing strings from the cluster configuration file when generating its web pages. An attacker with privileges to create or edit the cluster configuration could use this flaw to execute arbitrary code as the luci user on a host running luci. (CVE-2014-3593)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="luci" release="63.el6" src="luci-0.26.0-63.el6.src.rpm" version="0.26.0"><filename>luci-0.26.0-63.el6.x86_64.rpm</filename><sum type="sha256">cedef998d8d2b190bb55cfc3401d5b1ef10d2e4ace2863bc1f732e2d5c299889</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3593" id="CVE-2014-3593" title="Luci: Privilege Escalation Through Cluster With Specially Crafted Configuration" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026374" id="1026374" title="Add A Custom Luci Launcher Allowing Sane Python Runtime + Selinux Coexistence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1100817" id="1100817" title="Luci To Cope With Virtual Machine In Both Plain And Service-Like Resource (Incl. Complex Defs In Cluster.Conf)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1117398" id="1117398" title="Sync Luci With Recent Changes In The Schema For Rhel 6.6 (Ras, Fas, Rgmanager, Fenced, ...)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=855112" id="855112" title="Encode Xml-Unsafe Characters From User Input As Xml Entities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=982771" id="982771" title="Luci Vs. Sessions: Check Length Of Secret On Startup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=989005" id="989005" title="Luci: Privilege Escalation Through Cluster With Specially Crafted Configuration" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1390.html" id="RHSA-2014:1390-2" title="Rhsa-2014:1390-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1391-2</id><title>Moderate: Glibc Security Update</title><description>An out-of-bounds write flaw was found in the way the glibc's readdir_r() function handled file system entries longer than the NAME_MAX character constant. A remote attacker could provide a specially crafted NTFS or CIFS file system that, when processed by an application using readdir_r(), would cause that application to crash or, potentially, allow the attacker to execute arbitrary code with the privileges of the user running the application. (CVE-2013-4237) 
It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. (CVE-2013-4458)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="glibc-devel" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6.i686.rpm</filename><sum type="sha256">d4cbe7f514546bfeeefd9fe24de93eca1ed8a948fbc1a006d25055166ca5cc21</sum></package><package arch="x86_64" name="glibc" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">a792c27165ffb988dd02026f9619d889170cd836c7d3cd6d14c88d0e171a5357</sum></package><package arch="i686" name="glibc-static" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6.i686.rpm</filename><sum type="sha256">3a32eb471fc1e95234f6ab140c8cba22ef2309dee8b73927b262a588abb6d077</sum></package><package arch="x86_64" name="glibc-common" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-common-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">b8fa16b3cd9c857109f82e29326ba7f5cc5c138f8f1acdbe5efffb3d1d474e98</sum></package><package arch="i686" name="glibc" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6.i686.rpm</filename><sum type="sha256">12e85d1fef6831349a99a036c40150082f8f6f77eebaccf4458dd7b15421792a</sum></package><package arch="x86_64" name="nscd" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>nscd-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">808733c2992aef8ccadbae14f2b403b79f9d2df123e83e145a19e6a1b39789a1</sum></package><package arch="x86_64" name="glibc-headers" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">316ac5d06e1b63e0433e4bcdd57743e75fe320ebb38dcfa5919f7bcdf4b058bd</sum></package><package arch="x86_64" name="glibc-static" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">efd15ad0614f61fb12d50b7f632c9aa6496c8383d9e55a5afe00bffbb25205e6</sum></package><package arch="x86_64" name="glibc-devel" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">ed0eb4c3fbb222614a8fc2da2bd464c04257f36c3c5020b2f2eb21e0543fb177</sum></package><package arch="x86_64" name="glibc-utils" release="1.149.el6" src="glibc-2.12-1.149.el6.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.149.el6.x86_64.rpm</filename><sum type="sha256">f8c035d09d6489166ccaf77d7dd5ef35a1c38f56dc255f16cbdc3069d4726df4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" id="CVE-2013-4237" title="Glibc: Buffer Overwrite When Using Readdir_R On File Systems Returning File Names Longer Than Name_Max Characters" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" id="CVE-2013-4458" title="Glibc: Stack (Frame) Overflow In Getaddrinfo() When Called With Af_Inet6" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1022280" id="1022280" title="Glibc: Stack (Frame) Overflow In Getaddrinfo() When Called With Af_Inet6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1032628" id="1032628" title="Symbol Lookup In Elf/Dl-Lookup.C Results In Returning Wrong Values" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1043557" id="1043557" title="Nscd Segfaults When Running Sudo With Netgroup Caching Enabled." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1044628" id="1044628" title="Getaddrinfo Return Eai_Noname Instead Of Eai_Again In Case The Dns Query Times Out" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1087833" id="1087833" title="Nscd-2.12-1.132.El6 Enters Busy Loop On Long Netgroup Entry Via Nss_Ldap Of Nslcd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1099025" id="1099025" title="Ftime() Possibly Broken On Ppc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=905941" id="905941" title="Fix Memory Fencing Error In Unwind-Forcedunwind.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=981942" id="981942" title="Ping6 With Idn Causes Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=995839" id="995839" title="Glibc: Buffer Overwrite When Using Readdir_R On File Systems Returning File Names Longer Than Name_Max Characters" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1391.html" id="RHSA-2014:1391-2" title="Rhsa-2014:1391-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1392-1</id><title>Important: Kernel Security Update</title><description>* A NULL pointer dereference flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled simultaneous connections between the same hosts. A remote attacker could use this flaw to crash the system. (CVE-2014-5077, Important) 
* An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. (CVE-2013-2596, Important) 
* A flaw was found in the way the ipc_rcu_putref() function in the Linux kernel's IPC implementation handled reference counter decrementing. A local, unprivileged user could use this flaw to trigger an Out of Memory (OOM) condition and, potentially, crash the system. (CVE-2013-4483, Moderate) 
* It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process. (CVE-2014-0181, Moderate) 
* It was found that the try_to_unmap_cluster() function in the Linux kernel's Memory Managment subsystem did not properly handle page locking in certain cases, which could potentially trigger the BUG_ON() macro in the mlock_vma_page() function. A local, unprivileged user could use this flaw to crash the system. (CVE-2014-3122, Moderate) 
* A flaw was found in the way the Linux kernel's kvm_iommu_map_pages() function handled IOMMU mapping failures. A privileged user in a guest with an assigned host device could use this flaw to crash the host. (CVE-2014-3601, Moderate) 
* Multiple use-after-free flaws were found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use either of these flaws to crash the system. (CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, Moderate) 
* A flaw was found in the way the Linux kernel's VFS subsystem handled reference counting when performing unmount operations on symbolic links. A local, unprivileged user could use this flaw to exhaust all available memory on the system or, potentially, trigger a use-after-free error, resulting in a system crash or privilege escalation. (CVE-2014-5045, Moderate) 
* An integer overflow flaw was found in the way the lzo1x_decompress_safe() function of the Linux kernel's LZO implementation processed Literal Runs. A local attacker could, in extremely rare cases, use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4608, Low) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">3e7d736b3c988fa965fbacb26e8c5c8082ce11bf2d006aa0592d70c1635f424b</sum></package><package arch="noarch" name="kernel-firmware" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.el6.noarch.rpm</filename><sum type="sha256">c4d95bb3fd62a71932b35ac3739ece8585abd979fea0137046f0269a6fbbe5a2</sum></package><package arch="noarch" name="kernel-doc" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.el6.noarch.rpm</filename><sum type="sha256">fed5713b6de19febaa1e1575ea1823e79f4da8420dbef0c3e347b4973b723747</sum></package><package arch="x86_64" name="perf" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">a5106f6628a0683811897a69c34e8e59b76b1daacd83f32dacf789554b4352a7</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm</filename><sum type="sha256">f1dc90780fa17952d577af61a732aba9719320efe61c5f6262806c62e5d6d8ea</sum></package><package arch="x86_64" name="kernel-headers" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">7450610c6a9a1e9ff95abf67b2fde35a0cb1e11b446c7271667467d61a76e73d</sum></package><package arch="x86_64" name="kernel" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">e13c62147d835329952ba13df57d5007c78b9a12dead68e27db4093c73da0588</sum></package><package arch="x86_64" name="python-perf" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">ea4b5af84a0bf9f2619e991e355c33f4bca8f716a307c5e69c55f3974140d289</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">e01410ee4e6f7c12d6fca49e423979129bf47ca21b0fe6f6cc2c6c3380a8bf30</sum></package><package arch="x86_64" name="kernel-devel" release="504.el6" src="kernel-2.6.32-504.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.el6.x86_64.rpm</filename><sum type="sha256">3f43a63d0276b368a1553f0f3bc55758de84d9db426bbf4c3b86076eebc9ca59</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2596" id="CVE-2013-2596" title="Kernel: Integer Overflow In Fb_Mmap" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" id="CVE-2013-4483" title="Kernel: Ipc: Ipc_Rcu_Putref Refcount Races" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" id="CVE-2014-0181" title="Kernel: Net: Insufficient Permision Checks Of Netlink Messages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122" id="CVE-2014-3122" title="Kernel: Mm: Try_To_Unmap_Cluster() Should Lock_Page() Before Mlocking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601" id="CVE-2014-3601" title="Kernel: Kvm: Invalid Parameter Passing In Kvm_Iommu_Map_Pages()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" id="CVE-2014-4608" title="Kernel: Lzo1X_Decompress_Safe() Integer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" id="CVE-2014-4653" title="Kernel: Alsa: Control: Do Not Access Controls Outside Of Protected Regions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" id="CVE-2014-4654" title="Kernel: Alsa: Control: Use-After-Free In Replacing User Controls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" id="CVE-2014-4655" title="Kernel: Alsa: Control: Use-After-Free In Replacing User Controls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045" id="CVE-2014-5045" title="Kernel: Vfs: Refcount Issues During Unmount On Symlink" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" id="CVE-2014-5077" title="Kernel: Net: Sctp: Fix A Null Pointer Dereference During Init Collisions" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1010882" id="1010882" title="Kvm: Backport &quot;Improve Create Vcpu Parameter&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1024854" id="1024854" title="Kernel: Ipc: Ipc_Rcu_Putref Refcount Races" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1027480" id="1027480" title="Alb_Send_Learning_Packets Using An Obsolete Ethertype" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1030411" id="1030411" title="Resizing Thin-Snapshot With External Origin Should Return Zeros Behind Origin'S End" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1031488" id="1031488" title="Restore The Mask Bit Correctly In Eoi_Ioapic_Irq()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1034490" id="1034490" title="Kernel: Integer Overflow In Fb_Mmap" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036972" id="1036972" title="Use After Free In New Nfsd Drc Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1044438" id="1044438" title="Cifs: Unable To Append To An Existing File In Cache=None Mode." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1059496" id="1059496" title="Kvm: X86 Emulator: Implement Jmp Far Opcode Ff/5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1063836" id="1063836" title="Kvm: 23090: Cpu0 Unhandled Wrmsr 0X391 Data 2000000F" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065304" id="1065304" title="Kernel/Sched: Incorrect Setup Of Sched_Group-&gt;Cpu_Power For Numa Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069028" id="1069028" title="Ixgbevf Prematurely Strips Vlan Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1072373" id="1072373" title="Along With The Increase Of Vcpus In Guest, And Guest Os Will Spend More Time To Boot Up In Specified Machine." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077463" id="1077463" title="Gfs2: Quotas Not Refreshed In Gfs2_Adjust_Quota" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1090423" id="1090423" title="Data Integrity Issue On Rebuilding Raid 6 With 100Mb Resync Speed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1093076" id="1093076" title="Kernel: Mm: Try_To_Unmap_Cluster() Should Lock_Page() Before Mlocking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1094265" id="1094265" title="Kernel: Net: Insufficient Permision Checks Of Netlink Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1095627" id="1095627" title="Missing Vhost Schedule Causing Thread Starvation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1100523" id="1100523" title="Ext4 Filesystem Option 'Max_Batch_Time' Actually Displays 'Min_Batch_Time' In /Proc/Mounts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113409" id="1113409" title="Kernel: Alsa: Control: Do Not Access Controls Outside Of Protected Regions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113445" id="1113445" title="Kernel: Alsa: Control: Use-After-Free In Replacing User Controls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113899" id="1113899" title="Kernel: Lzo1X_Decompress_Safe() Integer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1118123" id="1118123" title="[Hyper-V][Rehl 6.6] Fcopy Large File From Host To Guest Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122472" id="1122472" title="Kernel: Vfs: Refcount Issues During Unmount On Symlink" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122982" id="1122982" title="Kernel: Net: Sctp: Fix A Null Pointer Dereference During Init Collisions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1124351" id="1124351" title="Raid1 Data Corruption After Recovery With Bitmap" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1127231" id="1127231" title="Dmeventd Hanging While Handling Lost Leg In Raid1 Lv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1131951" id="1131951" title="Kernel: Kvm: Invalid Parameter Passing In Kvm_Iommu_Map_Pages()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=739866" id="739866" title="Checkpolicy Cannot Parse /Selinux/Policy On Ppc64 And S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=786463" id="786463" title="Nfs Mount Hangs When Kerberos Ticket Expires" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=889471" id="889471" title="[Btrfs] Bug: Unable To Handle Kernel Null Pointer Dereference At (Null)  Btrfs_Get_Sb Should Return Error When Open_Ctree Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=915862" id="915862" title="The Sync Mount Option Does Not Work For Nfsv4 Mounts In Rhel6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=997651" id="997651" title="Possible Recursive Locking Detected" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=998024" id="998024" title="Nfsd Sometimes Grants Delegations Too Soon Following Conflicting Open Requests" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1392.html" id="RHSA-2014:1392-1" title="Rhsa-2014:1392-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1436-2</id><title>Moderate: X11 Client Libraries Security Update</title><description>Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the way various X11 client libraries handled certain protocol data. An attacker able to submit invalid protocol data to an X11 server via a malicious X11 client could use either of these flaws to potentially escalate their privileges on the system. (CVE-2013-1981, CVE-2013-1982, CVE-2013-1983, CVE-2013-1984, CVE-2013-1985, CVE-2013-1986, CVE-2013-1987, CVE-2013-1988, CVE-2013-1989, CVE-2013-1990, CVE-2013-1991, CVE-2013-2003, CVE-2013-2062, CVE-2013-2064) 
Multiple array index errors, leading to heap-based buffer out-of-bounds write flaws, were found in the way various X11 client libraries handled data returned from an X11 server. A malicious X11 server could possibly use this flaw to execute arbitrary code with the privileges of the user running an X11 client. (CVE-2013-1997, CVE-2013-1998, CVE-2013-1999, CVE-2013-2000, CVE-2013-2001, CVE-2013-2002, CVE-2013-2066) 
A buffer overflow flaw was found in the way the XListInputDevices() function of X.Org X11's libXi runtime library handled signed numbers. A malicious X11 server could possibly use this flaw to execute arbitrary code with the privileges of the user running an X11 client. (CVE-2013-1995) 
A flaw was found in the way the X.Org X11 libXt runtime library used uninitialized pointers. A malicious X11 server could possibly use this flaw to execute arbitrary code with the privileges of the user running an X11 client. (CVE-2013-2005) 
Two stack-based buffer overflow flaws were found in the way libX11, the Core X11 protocol client library, processed certain user-specified files. A malicious X11 server could possibly use this flaw to crash an X11 client via a specially crafted file. (CVE-2013-2004) 
The xkeyboard-config package has been upgraded to upstream version 2.11, which provides a number of bug fixes and enhancements over the previous version. 
This update also fixes the following bugs: 
* Previously, updating the mesa-libGL package did not update the libX11 package, although it was listed as a dependency of mesa-libGL. This bug has been fixed and updating mesa-libGL now updates all dependent packages as expected. 
* Previously, closing a customer application could occasionally cause the X Server to terminate unexpectedly. After this update, the X Server no longer hangs when a user closes a customer application. 
NOTE: 3rd party drivers, such as ATI and nVidia may need to be updated for the new API.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libXinerama-devel" release="2.1.el6" src="libXinerama-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXinerama-devel-1.1.3-2.1.el6.i686.rpm</filename><sum type="sha256">f19f3534cdd30b006df444c13e155500e180f7faa9904c4434a9e4bc9ab91902</sum></package><package arch="i686" name="libxcb" release="2.el6" src="libxcb-1.9.1-2.el6.src.rpm" version="1.9.1"><filename>libxcb-1.9.1-2.el6.i686.rpm</filename><sum type="sha256">8f34491284704a2e92a4c9a03c8064f667f2273f6d578d5bd85a73e87a0bb967</sum></package><package arch="i686" name="libdmx" release="3.el6" src="libdmx-1.1.3-3.el6.src.rpm" version="1.1.3"><filename>libdmx-1.1.3-3.el6.i686.rpm</filename><sum type="sha256">d7ffd81eb6c930f23f00e15cabb75432bd6de9effad473153ab4f789b85e31fd</sum></package><package arch="x86_64" name="libX11" release="2.2.el6" src="libX11-1.6.0-2.2.el6.src.rpm" version="1.6.0"><filename>libX11-1.6.0-2.2.el6.x86_64.rpm</filename><sum type="sha256">364ae5710a951e8f7dbbd9cdbdf3c5b13f206fe972122b9d34ee889ca93ff405</sum></package><package arch="noarch" name="xkeyboard-config-devel" release="1.el6" src="xkeyboard-config-2.11-1.el6.src.rpm" version="2.11"><filename>xkeyboard-config-devel-2.11-1.el6.noarch.rpm</filename><sum type="sha256">6c624af2427bb308600fc00dcc96594ea36154e7096271f3e676a09f63cbc4a1</sum></package><package arch="x86_64" name="libXvMC" release="2.1.el6" src="libXvMC-1.0.8-2.1.el6.src.rpm" version="1.0.8"><filename>libXvMC-1.0.8-2.1.el6.x86_64.rpm</filename><sum type="sha256">80a1822bdab7fe59d8b1df57f7bb10341c207db370914707dde731c6a05e774c</sum></package><package arch="x86_64" name="libXinerama-devel" release="2.1.el6" src="libXinerama-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXinerama-devel-1.1.3-2.1.el6.x86_64.rpm</filename><sum type="sha256">2c34849bb778dd166878219226effafc2f361abd202925d3927713bd9194b6a1</sum></package><package arch="x86_64" name="libXres" release="2.1.el6" src="libXres-1.0.7-2.1.el6.src.rpm" version="1.0.7"><filename>libXres-1.0.7-2.1.el6.x86_64.rpm</filename><sum type="sha256">ae4478779f718b7729512c211d85b3ddd8c618ca7b24a392ee8d24f29da07e31</sum></package><package arch="x86_64" name="libXrandr-devel" release="2.1.el6" src="libXrandr-1.4.1-2.1.el6.src.rpm" version="1.4.1"><filename>libXrandr-devel-1.4.1-2.1.el6.x86_64.rpm</filename><sum type="sha256">45bfa3aea6db177eb2a5bcbc39c263f4c964ae99e75144bd20cf5f2eb12b6618</sum></package><package arch="noarch" name="xcb-proto" release="3.el6" src="xcb-proto-1.8-3.el6.src.rpm" version="1.8"><filename>xcb-proto-1.8-3.el6.noarch.rpm</filename><sum type="sha256">b3986c55f809d8f21f17b73cecdddb676c1e95011795a9c7650a92943feeefb7</sum></package><package arch="i686" name="libX11-devel" release="2.2.el6" src="libX11-1.6.0-2.2.el6.src.rpm" version="1.6.0"><filename>libX11-devel-1.6.0-2.2.el6.i686.rpm</filename><sum type="sha256">40918e2c315d147ea1c2358606a81e540751c03aecf0b2ec216e9b6071661831</sum></package><package arch="i686" name="libXi" release="2.2.el6" src="libXi-1.7.2-2.2.el6.src.rpm" version="1.7.2"><filename>libXi-1.7.2-2.2.el6.i686.rpm</filename><sum type="sha256">b33ca6ca59302e949ab3d417bd5cdacce8659da70f77382a50638a66b618cc60</sum></package><package arch="i686" name="libXxf86dga-devel" release="2.1.el6" src="libXxf86dga-1.1.4-2.1.el6.src.rpm" version="1.1.4"><filename>libXxf86dga-devel-1.1.4-2.1.el6.i686.rpm</filename><sum type="sha256">f517347b0815d3e8e5c736d6de27cf6eb823f281bc4581cda7cfc23ea93a10d9</sum></package><package arch="x86_64" name="libXi" release="2.2.el6" src="libXi-1.7.2-2.2.el6.src.rpm" version="1.7.2"><filename>libXi-1.7.2-2.2.el6.x86_64.rpm</filename><sum type="sha256">3c20e48b23ac057dbeb530acc956632543daf82b29fd563cdcffafaf8530696a</sum></package><package arch="i686" name="libXv-devel" release="2.1.el6" src="libXv-1.0.9-2.1.el6.src.rpm" version="1.0.9"><filename>libXv-devel-1.0.9-2.1.el6.i686.rpm</filename><sum type="sha256">b9c75b145273068381e95e5300b29a98bdb7274088f104d9d9a384c966485d34</sum></package><package arch="i686" name="libXext" release="2.1.el6" src="libXext-1.3.2-2.1.el6.src.rpm" version="1.3.2"><filename>libXext-1.3.2-2.1.el6.i686.rpm</filename><sum type="sha256">e13fda0d2202257c78034eea6b85c92dcf16d6074ffa919ba9ebafaf062b2c4f</sum></package><package arch="x86_64" name="libXt-devel" release="6.1.el6" src="libXt-1.1.4-6.1.el6.src.rpm" version="1.1.4"><filename>libXt-devel-1.1.4-6.1.el6.x86_64.rpm</filename><sum type="sha256">ae5b2361ed3337e703743d7551d5b899b7f59a55d1f0c45139a3fbebb8656bd9</sum></package><package arch="x86_64" name="libXxf86vm-devel" release="2.1.el6" src="libXxf86vm-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXxf86vm-devel-1.1.3-2.1.el6.x86_64.rpm</filename><sum type="sha256">fced2ae5f565b73914ee18e72f14b4ab4746c7d2f5762be9e326f14c5bb2bba5</sum></package><package arch="i686" name="libXi-devel" release="2.2.el6" src="libXi-1.7.2-2.2.el6.src.rpm" version="1.7.2"><filename>libXi-devel-1.7.2-2.2.el6.i686.rpm</filename><sum type="sha256">9da9307f7e5c37f8ff82684029ace807c266c9ef8222bf21f523bec1509f7587</sum></package><package arch="x86_64" name="libXxf86vm" release="2.1.el6" src="libXxf86vm-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXxf86vm-1.1.3-2.1.el6.x86_64.rpm</filename><sum type="sha256">6bd96e9e90e358add320aa1ef553af7c48b5f2c56f5a104d7bb0afb97ad5d7a0</sum></package><package arch="i686" name="libXp-devel" release="2.1.el6" src="libXp-1.0.2-2.1.el6.src.rpm" version="1.0.2"><filename>libXp-devel-1.0.2-2.1.el6.i686.rpm</filename><sum type="sha256">e67a70a3939483fd0c2f2c61f652e9dddd0409e2de2ced54081832496bf766c5</sum></package><package arch="x86_64" name="libXcursor-devel" release="2.1.el6" src="libXcursor-1.1.14-2.1.el6.src.rpm" version="1.1.14"><filename>libXcursor-devel-1.1.14-2.1.el6.x86_64.rpm</filename><sum type="sha256">dbb64d482442085cde063569f12e52af2b3d089cef5ca52826096ec715f43d2f</sum></package><package arch="x86_64" name="libXfixes" release="2.1.el6" src="libXfixes-5.0.1-2.1.el6.src.rpm" version="5.0.1"><filename>libXfixes-5.0.1-2.1.el6.x86_64.rpm</filename><sum type="sha256">ae9f7361399449a9d021a8a7f8d19e24be5133aec1a2d3e760f1faead89b60ee</sum></package><package arch="x86_64" name="libXcursor" release="2.1.el6" src="libXcursor-1.1.14-2.1.el6.src.rpm" version="1.1.14"><filename>libXcursor-1.1.14-2.1.el6.x86_64.rpm</filename><sum type="sha256">60420ed5b182e0b6127de274838673c4115c87ad3e5478a8f1632c2d99915434</sum></package><package arch="x86_64" name="libdmx" release="3.el6" src="libdmx-1.1.3-3.el6.src.rpm" version="1.1.3"><filename>libdmx-1.1.3-3.el6.x86_64.rpm</filename><sum type="sha256">5703e8f19be84b845ea803fbed4d209f5aa6b1f4004bb1b5eee4fe6e03b47cfd</sum></package><package arch="x86_64" name="libXp-devel" release="2.1.el6" src="libXp-1.0.2-2.1.el6.src.rpm" version="1.0.2"><filename>libXp-devel-1.0.2-2.1.el6.x86_64.rpm</filename><sum type="sha256">9e048a497bf232c909e6d329056a6825d6a27b1d3af39b968f1cb080f3df3cd8</sum></package><package arch="i686" name="libxcb-devel" release="2.el6" src="libxcb-1.9.1-2.el6.src.rpm" version="1.9.1"><filename>libxcb-devel-1.9.1-2.el6.i686.rpm</filename><sum type="sha256">39680a46dd0668059b362c5a1e9f543d901b85f5ac24d8dcf5cfa7a2e0321e30</sum></package><package arch="i686" name="libXxf86vm-devel" release="2.1.el6" src="libXxf86vm-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXxf86vm-devel-1.1.3-2.1.el6.i686.rpm</filename><sum type="sha256">add7c072d31e017bbb31d67823abbae85b54ac508fd9ca5bbbbf1dd3dfef956a</sum></package><package arch="i686" name="libXrandr-devel" release="2.1.el6" src="libXrandr-1.4.1-2.1.el6.src.rpm" version="1.4.1"><filename>libXrandr-devel-1.4.1-2.1.el6.i686.rpm</filename><sum type="sha256">f4b0cc8bae7bd2b251d51cb49e4da5fb6eae702506f27ca8169a7636a4dec81d</sum></package><package arch="x86_64" name="libX11-devel" release="2.2.el6" src="libX11-1.6.0-2.2.el6.src.rpm" version="1.6.0"><filename>libX11-devel-1.6.0-2.2.el6.x86_64.rpm</filename><sum type="sha256">f2c36981193a25dc66384a48df44447d6f11183041e6de452fb6c0f732d9599c</sum></package><package arch="i686" name="libXext-devel" release="2.1.el6" src="libXext-1.3.2-2.1.el6.src.rpm" version="1.3.2"><filename>libXext-devel-1.3.2-2.1.el6.i686.rpm</filename><sum type="sha256">88d79219593e26751e5397f9f44fbe7896a80f1dd5d69f2dfce701efd60c44d3</sum></package><package arch="i686" name="libXxf86vm" release="2.1.el6" src="libXxf86vm-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXxf86vm-1.1.3-2.1.el6.i686.rpm</filename><sum type="sha256">f2bb040adfd22f4a966e789b2f3fdd81d9f970ce6bf1e90205d9bced81d2c0af</sum></package><package arch="i686" name="libXtst" release="2.1.el6" src="libXtst-1.2.2-2.1.el6.src.rpm" version="1.2.2"><filename>libXtst-1.2.2-2.1.el6.i686.rpm</filename><sum type="sha256">eee54a177992e9a0036bcd2ebbbea71d1a1e80671bd1899ad7f9bd667739588e</sum></package><package arch="x86_64" name="libXres-devel" release="2.1.el6" src="libXres-1.0.7-2.1.el6.src.rpm" version="1.0.7"><filename>libXres-devel-1.0.7-2.1.el6.x86_64.rpm</filename><sum type="sha256">452bc3c32af42a6cc4974d68ebdb5a8fc20fabd7deafbd992f5528efdcc488e1</sum></package><package arch="noarch" name="libX11-common" release="2.2.el6" src="libX11-1.6.0-2.2.el6.src.rpm" version="1.6.0"><filename>libX11-common-1.6.0-2.2.el6.noarch.rpm</filename><sum type="sha256">bc8839d38babae24b3d669b68a6d962f30547d2ab19374a3ba5161d08b1f03aa</sum></package><package arch="x86_64" name="libXt" release="6.1.el6" src="libXt-1.1.4-6.1.el6.src.rpm" version="1.1.4"><filename>libXt-1.1.4-6.1.el6.x86_64.rpm</filename><sum type="sha256">9f647b35a8c37b0991da7f59675aa53244ba39cece66606d01344d96c7e72ade</sum></package><package arch="i686" name="libXt" release="6.1.el6" src="libXt-1.1.4-6.1.el6.src.rpm" version="1.1.4"><filename>libXt-1.1.4-6.1.el6.i686.rpm</filename><sum type="sha256">5a09b9d13c7294529e5964ae2f55a282cacfc93096c6f1c80dc3e2954f0dd6f4</sum></package><package arch="noarch" name="xorg-x11-xtrans-devel" release="1.el6" src="xorg-x11-xtrans-devel-1.3.4-1.el6.src.rpm" version="1.3.4"><filename>xorg-x11-xtrans-devel-1.3.4-1.el6.noarch.rpm</filename><sum type="sha256">a68ea4968ecd4d1032bd8469cb2944f06a2e34f5791b5da1c5d1ffe33814f148</sum></package><package arch="noarch" name="xkeyboard-config" release="1.el6" src="xkeyboard-config-2.11-1.el6.src.rpm" version="2.11"><filename>xkeyboard-config-2.11-1.el6.noarch.rpm</filename><sum type="sha256">3945dd17fcb99d796a5c6ac95b048ef6ed2f07fb70c43dae981ecbafae87c68f</sum></package><package arch="x86_64" name="libXp" release="2.1.el6" src="libXp-1.0.2-2.1.el6.src.rpm" version="1.0.2"><filename>libXp-1.0.2-2.1.el6.x86_64.rpm</filename><sum type="sha256">34bb0c2e3268d89a9e1e7f0d77a6bfd8bf74a5e643eb47167c58498ae5efdabb</sum></package><package arch="x86_64" name="libXv-devel" release="2.1.el6" src="libXv-1.0.9-2.1.el6.src.rpm" version="1.0.9"><filename>libXv-devel-1.0.9-2.1.el6.x86_64.rpm</filename><sum type="sha256">b8b498c5dc3dd0d54116296ead3afb69a985e21ab4c95877e419b11884d0f3c8</sum></package><package arch="i686" name="libX11" release="2.2.el6" src="libX11-1.6.0-2.2.el6.src.rpm" version="1.6.0"><filename>libX11-1.6.0-2.2.el6.i686.rpm</filename><sum type="sha256">ade4f0cffc2a501efcdf2c974808903a52666aff537e45e70eac87881a96a8ae</sum></package><package arch="x86_64" name="libXrandr" release="2.1.el6" src="libXrandr-1.4.1-2.1.el6.src.rpm" version="1.4.1"><filename>libXrandr-1.4.1-2.1.el6.x86_64.rpm</filename><sum type="sha256">f2498ffea7404249d110c2d2d1e46dda4e1fea475734055c9398d81a0307f793</sum></package><package arch="i686" name="libXcursor-devel" release="2.1.el6" src="libXcursor-1.1.14-2.1.el6.src.rpm" version="1.1.14"><filename>libXcursor-devel-1.1.14-2.1.el6.i686.rpm</filename><sum type="sha256">2d644a63e6b4181bbe424870d2920229013e453c14bc76b8b4678ee3efe271c7</sum></package><package arch="i686" name="libXcursor" release="2.1.el6" src="libXcursor-1.1.14-2.1.el6.src.rpm" version="1.1.14"><filename>libXcursor-1.1.14-2.1.el6.i686.rpm</filename><sum type="sha256">07591c6b43dcb6ee1cdb6de40ce41fe1ff43bc3add466b9f53b92860d7469676</sum></package><package arch="i686" name="libXv" release="2.1.el6" src="libXv-1.0.9-2.1.el6.src.rpm" version="1.0.9"><filename>libXv-1.0.9-2.1.el6.i686.rpm</filename><sum type="sha256">b6722c145e6973a10e401c1e2ebd6319ebb1ccd490cfca64c6cd0d3ce11a6829</sum></package><package arch="i686" name="libXrender-devel" release="2.1.el6" src="libXrender-0.9.8-2.1.el6.src.rpm" version="0.9.8"><filename>libXrender-devel-0.9.8-2.1.el6.i686.rpm</filename><sum type="sha256">e6142ecaa2f78ee9fae519d9ce900a93256d34ef067a7adf8b82edae45a21270</sum></package><package arch="x86_64" name="libdmx-devel" release="3.el6" src="libdmx-1.1.3-3.el6.src.rpm" version="1.1.3"><filename>libdmx-devel-1.1.3-3.el6.x86_64.rpm</filename><sum type="sha256">420bb2ba3db2c0f31983d6c867a04733a01113db681653f9587bfc958fc61980</sum></package><package arch="i686" name="libXtst-devel" release="2.1.el6" src="libXtst-1.2.2-2.1.el6.src.rpm" version="1.2.2"><filename>libXtst-devel-1.2.2-2.1.el6.i686.rpm</filename><sum type="sha256">50889cb30a83d840be4eae5d9ab86cdd47b37777ff2547f77809ce9a0a7d465e</sum></package><package arch="noarch" name="xorg-x11-proto-devel" release="9.el6" src="xorg-x11-proto-devel-7.7-9.el6.src.rpm" version="7.7"><filename>xorg-x11-proto-devel-7.7-9.el6.noarch.rpm</filename><sum type="sha256">f93854722c981d8f625000557e69c8d4c35a4102a8d372e1469ed425d4600a3c</sum></package><package arch="x86_64" name="libXvMC-devel" release="2.1.el6" src="libXvMC-1.0.8-2.1.el6.src.rpm" version="1.0.8"><filename>libXvMC-devel-1.0.8-2.1.el6.x86_64.rpm</filename><sum type="sha256">e3bb58d70f875e741fe80c120863d11afe4e3f26cfc86309cb1be12525a537bd</sum></package><package arch="x86_64" name="libXrender-devel" release="2.1.el6" src="libXrender-0.9.8-2.1.el6.src.rpm" version="0.9.8"><filename>libXrender-devel-0.9.8-2.1.el6.x86_64.rpm</filename><sum type="sha256">81bdcd8eefcd2f7b0dcd5ea722a9f310ff306629abf705c1c781f937d5bdc5fb</sum></package><package arch="i686" name="libdmx-devel" release="3.el6" src="libdmx-1.1.3-3.el6.src.rpm" version="1.1.3"><filename>libdmx-devel-1.1.3-3.el6.i686.rpm</filename><sum type="sha256">07e49d14fa10f43c430afae227599937ea2ac22ed388eab2915b65c4a2fdc582</sum></package><package arch="x86_64" name="libXv" release="2.1.el6" src="libXv-1.0.9-2.1.el6.src.rpm" version="1.0.9"><filename>libXv-1.0.9-2.1.el6.x86_64.rpm</filename><sum type="sha256">5a52a3b834f9cfa597e9279457bdf2c2bbe61031cf62e1ff4b467d31e8b560bf</sum></package><package arch="x86_64" name="libxcb-python" release="2.el6" src="libxcb-1.9.1-2.el6.src.rpm" version="1.9.1"><filename>libxcb-python-1.9.1-2.el6.x86_64.rpm</filename><sum type="sha256">ee1b2fd57875242c9b34837ce45a700311729cf05a386ca11c6587403c23f226</sum></package><package arch="i686" name="libXfixes" release="2.1.el6" src="libXfixes-5.0.1-2.1.el6.src.rpm" version="5.0.1"><filename>libXfixes-5.0.1-2.1.el6.i686.rpm</filename><sum type="sha256">0ab6ce8010c7bbd610f1496dc55330e8de871b1b60f10c5904fd948b2712d20f</sum></package><package arch="i686" name="libXxf86dga" release="2.1.el6" src="libXxf86dga-1.1.4-2.1.el6.src.rpm" version="1.1.4"><filename>libXxf86dga-1.1.4-2.1.el6.i686.rpm</filename><sum type="sha256">f2945ce0c9b7080904d4b5860b6572821459971c5c596dcea5352fc72df08803</sum></package><package arch="x86_64" name="libXinerama" release="2.1.el6" src="libXinerama-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXinerama-1.1.3-2.1.el6.x86_64.rpm</filename><sum type="sha256">681aa188b30c90d7935ea731fb874f235301f536b118b82c0f98cfc357a36a8d</sum></package><package arch="x86_64" name="libXi-devel" release="2.2.el6" src="libXi-1.7.2-2.2.el6.src.rpm" version="1.7.2"><filename>libXi-devel-1.7.2-2.2.el6.x86_64.rpm</filename><sum type="sha256">dffbf8080841f277cd19f89a33e8db2e10f19453d5ab66c5cbeda7bf96511a3c</sum></package><package arch="x86_64" name="libXtst" release="2.1.el6" src="libXtst-1.2.2-2.1.el6.src.rpm" version="1.2.2"><filename>libXtst-1.2.2-2.1.el6.x86_64.rpm</filename><sum type="sha256">33bd223b48957043db7346d574a9f52e7018298bcffa52a1a8727bfb1dcdd8f9</sum></package><package arch="x86_64" name="libXext" release="2.1.el6" src="libXext-1.3.2-2.1.el6.src.rpm" version="1.3.2"><filename>libXext-1.3.2-2.1.el6.x86_64.rpm</filename><sum type="sha256">859471cd4be9363bfcf3a2cf51392040c4a9897f3fa239bf18da6e76916a05d3</sum></package><package arch="x86_64" name="libXrender" release="2.1.el6" src="libXrender-0.9.8-2.1.el6.src.rpm" version="0.9.8"><filename>libXrender-0.9.8-2.1.el6.x86_64.rpm</filename><sum type="sha256">3b52b1bc4d5a3c43ee3e8544ca840adace5dc5e5688d45a9642ba38207d23524</sum></package><package arch="i686" name="libXp" release="2.1.el6" src="libXp-1.0.2-2.1.el6.src.rpm" version="1.0.2"><filename>libXp-1.0.2-2.1.el6.i686.rpm</filename><sum type="sha256">5ba7674943071233560c4351f2b833fef9332e5908e88725f2d0252dad4fbfce</sum></package><package arch="x86_64" name="libxcb" release="2.el6" src="libxcb-1.9.1-2.el6.src.rpm" version="1.9.1"><filename>libxcb-1.9.1-2.el6.x86_64.rpm</filename><sum type="sha256">8ac74297529845c3c177fdd05a8ff96ce3b1c3b4531db84ba50ca8ce33b8e655</sum></package><package arch="x86_64" name="libXtst-devel" release="2.1.el6" src="libXtst-1.2.2-2.1.el6.src.rpm" version="1.2.2"><filename>libXtst-devel-1.2.2-2.1.el6.x86_64.rpm</filename><sum type="sha256">d2e3acfc6fafe0d97998e20702b3e5254ab600e23e8bcf7d0b3a39f1ff4098c8</sum></package><package arch="i686" name="libXfixes-devel" release="2.1.el6" src="libXfixes-5.0.1-2.1.el6.src.rpm" version="5.0.1"><filename>libXfixes-devel-5.0.1-2.1.el6.i686.rpm</filename><sum type="sha256">2a60b721597759208690814d752240031ee04147bb33986da9479b6dd77a8905</sum></package><package arch="x86_64" name="libXxf86dga" release="2.1.el6" src="libXxf86dga-1.1.4-2.1.el6.src.rpm" version="1.1.4"><filename>libXxf86dga-1.1.4-2.1.el6.x86_64.rpm</filename><sum type="sha256">3e9b5dd3bab821e8adc6473ffdf4cc657ba2294c5a255d14131dc8a3ddb4380f</sum></package><package arch="i686" name="libXres-devel" release="2.1.el6" src="libXres-1.0.7-2.1.el6.src.rpm" version="1.0.7"><filename>libXres-devel-1.0.7-2.1.el6.i686.rpm</filename><sum type="sha256">bdadcc880c6ed3dd629760fcb901f4b10608ff2416737ef80393039f4fd7d47f</sum></package><package arch="x86_64" name="libXfixes-devel" release="2.1.el6" src="libXfixes-5.0.1-2.1.el6.src.rpm" version="5.0.1"><filename>libXfixes-devel-5.0.1-2.1.el6.x86_64.rpm</filename><sum type="sha256">04ad3dac3f1d82d17a68325ab0f0ca6692c5834a82be77ca36b4d2cd277cdb49</sum></package><package arch="i686" name="libXvMC" release="2.1.el6" src="libXvMC-1.0.8-2.1.el6.src.rpm" version="1.0.8"><filename>libXvMC-1.0.8-2.1.el6.i686.rpm</filename><sum type="sha256">64dd9b34fd2cb8d3c1859f74c7ad56bff024674e6f4316eefcc54924fd3b7190</sum></package><package arch="x86_64" name="libXext-devel" release="2.1.el6" src="libXext-1.3.2-2.1.el6.src.rpm" version="1.3.2"><filename>libXext-devel-1.3.2-2.1.el6.x86_64.rpm</filename><sum type="sha256">b0b32c72234e40c5a1d5a19e7ade5d4f38ee084c715ea61c89e87880b6cec36b</sum></package><package arch="noarch" name="libxcb-doc" release="2.el6" src="libxcb-1.9.1-2.el6.src.rpm" version="1.9.1"><filename>libxcb-doc-1.9.1-2.el6.noarch.rpm</filename><sum type="sha256">40a262c1af15cd7cbf428790fe36d925fa7d8afa52e6ec2bc96cdca002d1bc26</sum></package><package arch="i686" name="libXres" release="2.1.el6" src="libXres-1.0.7-2.1.el6.src.rpm" version="1.0.7"><filename>libXres-1.0.7-2.1.el6.i686.rpm</filename><sum type="sha256">29133eccf51699c10c69c4b9de80180976f0b6c7ade6699cfb339290338e0965</sum></package><package arch="i686" name="libXrandr" release="2.1.el6" src="libXrandr-1.4.1-2.1.el6.src.rpm" version="1.4.1"><filename>libXrandr-1.4.1-2.1.el6.i686.rpm</filename><sum type="sha256">b5b632cc24fe9e33d00ab6a34d4a78276086448a02d93823601d7fb63c83579b</sum></package><package arch="i686" name="libXvMC-devel" release="2.1.el6" src="libXvMC-1.0.8-2.1.el6.src.rpm" version="1.0.8"><filename>libXvMC-devel-1.0.8-2.1.el6.i686.rpm</filename><sum type="sha256">41203899bcb3c7142bcc8e83970d727619d971236fa6e16d582ccc04bbf13cba</sum></package><package arch="i686" name="libXrender" release="2.1.el6" src="libXrender-0.9.8-2.1.el6.src.rpm" version="0.9.8"><filename>libXrender-0.9.8-2.1.el6.i686.rpm</filename><sum type="sha256">91f8e5e3e6be0f978063fff0c8d27f1e07e8813e48010691e95eee4af12039de</sum></package><package arch="x86_64" name="libxcb-devel" release="2.el6" src="libxcb-1.9.1-2.el6.src.rpm" version="1.9.1"><filename>libxcb-devel-1.9.1-2.el6.x86_64.rpm</filename><sum type="sha256">9cda09005443e4084e1d492dd3e95257343f9ea1e9940516bd8db4025206a617</sum></package><package arch="i686" name="libXinerama" release="2.1.el6" src="libXinerama-1.1.3-2.1.el6.src.rpm" version="1.1.3"><filename>libXinerama-1.1.3-2.1.el6.i686.rpm</filename><sum type="sha256">7654a9b45821264780afab35df09bfdfdf8f1169127f8315d189879f7c19b36a</sum></package><package arch="i686" name="libXt-devel" release="6.1.el6" src="libXt-1.1.4-6.1.el6.src.rpm" version="1.1.4"><filename>libXt-devel-1.1.4-6.1.el6.i686.rpm</filename><sum type="sha256">414d24da346f6d93914b00888b0eaec75bd249c2cabc0fa52d3867e7e0919f03</sum></package><package arch="x86_64" name="libXxf86dga-devel" release="2.1.el6" src="libXxf86dga-1.1.4-2.1.el6.src.rpm" version="1.1.4"><filename>libXxf86dga-devel-1.1.4-2.1.el6.x86_64.rpm</filename><sum type="sha256">b43030d14c1d5dc27ec45ff990926d46b8908dc9b0696aad5e5fce8ac26f585b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" id="CVE-2013-1981" title="Libx11: Multiple Integer Overflows Leading To Heap-Based Buffer-Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" id="CVE-2013-1982" title="Libxext: Multiple Integer Overflows Leading To Heap-Based Buffer-Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" id="CVE-2013-1983" title="Libxfixes: Integer Overflow Leading To Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" id="CVE-2013-1984" title="Libxi: Multiple Integer Overflows Leading To Heap-Based Buffer-Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" id="CVE-2013-1985" title="Libxinerama: Integer Overflow Leading To Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" id="CVE-2013-1986" title="Libxrandr: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" id="CVE-2013-1987" title="Libxrender: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" id="CVE-2013-1988" title="Libxres: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" id="CVE-2013-1989" title="Libxv: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" id="CVE-2013-1990" title="Libxvmc: Multiple Integer Overflows Leading To Heap-Based Buffer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" id="CVE-2013-1991" title="Libxxf86Dga: Multiple Integer Overflows Leading To Heap-Based Buffer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" id="CVE-2013-1995" title="Libxi: Sign Extension Issues Resulting In Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" id="CVE-2013-1997" title="Libx11: Multiple Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" id="CVE-2013-1998" title="Libxi: Multiple Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" id="CVE-2013-1999" title="Libxvmc: Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" id="CVE-2013-2000" title="Libxxf86Dga: Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" id="CVE-2013-2001" title="Libxxf86Vm: Multiple Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" id="CVE-2013-2002" title="Libxt: Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" id="CVE-2013-2003" title="Libxcursor: Integer Overflow Leading To Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" id="CVE-2013-2004" title="Libx11: Unbounded Recursion Leading To Stack-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" id="CVE-2013-2005" title="Libxt: Memory Corruption Due To Unchecked Use Of Unchecked Function Pointers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" id="CVE-2013-2062" title="Libxp: Integer Overflow Leading To Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" id="CVE-2013-2064" title="Libxcb: Integer Overflow Leading To Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" id="CVE-2013-2066" title="Libxv: Array Index Error Leading To Heap-Based Oob Write" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119322" id="1119322" title="%{Dist} Found Instead Of %{?Dist} In: Libxi-1.7.2-2.1.El6.Src.Rpm.Spec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959040" id="959040" title="Libx11: Multiple Integer Overflows Leading To Heap-Based Buffer-Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959046" id="959046" title="Libxext: Multiple Integer Overflows Leading To Heap-Based Buffer-Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959048" id="959048" title="Libxfixes: Integer Overflow Leading To Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959049" id="959049" title="Libxi: Multiple Integer Overflows Leading To Heap-Based Buffer-Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959056" id="959056" title="Libxinerama: Integer Overflow Leading To Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959059" id="959059" title="Libxrandr: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959061" id="959061" title="Libxrender: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959066" id="959066" title="Libxres: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959068" id="959068" title="Libxv: Multiple Integer Overflows Leading To Heap-Based Bufer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959070" id="959070" title="Libxvmc: Multiple Integer Overflows Leading To Heap-Based Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959072" id="959072" title="Libxxf86Dga: Multiple Integer Overflows Leading To Heap-Based Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959077" id="959077" title="Libxcursor: Integer Overflow Leading To Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959108" id="959108" title="Libxt: Memory Corruption Due To Unchecked Use Of Unchecked Function Pointers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=959112" id="959112" title="Libx11: Unbounded Recursion Leading To Stack-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960345" id="960345" title="Libx11: Multiple Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960346" id="960346" title="Libxi: Multiple Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960347" id="960347" title="Libxvmc: Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960349" id="960349" title="Libxxf86Dga: Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960350" id="960350" title="Libxxf86Vm: Multiple Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960352" id="960352" title="Libxt: Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960357" id="960357" title="Libxi: Sign Extension Issues Resulting In Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960362" id="960362" title="Libxp: Integer Overflow Leading To Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960367" id="960367" title="Libxcb: Integer Overflow Leading To Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=960369" id="960369" title="Libxv: Array Index Error Leading To Heap-Based Oob Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=971626" id="971626" title="Closing An In-House App Can Occasionally Hang The X Server" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1436.html" id="RHSA-2014:1436-2" title="Rhsa-2014:1436-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1507-2</id><title>Low: Trousers Security Update</title><description>A flaw was found in the way tcsd, the daemon that manages Trusted Computing resources, processed incoming TCP packets. A remote attacker could send a specially crafted TCP packet that, when processed by tcsd, could cause the daemon to crash. Note that by default tcsd accepts requests on localhost only. (CVE-2012-0698) 
The trousers package has been upgraded to upstream version 0.3.13, which provides a number of bug fixes and enhancements over the previous version, including corrected internal symbol names to avoid collisions with other applications, fixed memory leaks, added IPv6 support, fixed buffer handling in tcsd, as well as changed the license to BSD.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="trousers-devel" release="2.el6" src="trousers-0.3.13-2.el6.src.rpm" version="0.3.13"><filename>trousers-devel-0.3.13-2.el6.i686.rpm</filename><sum type="sha256">59383753281bc86170b05dbd98133d4c0a665174de3023da671393527003e46f</sum></package><package arch="x86_64" name="trousers" release="2.el6" src="trousers-0.3.13-2.el6.src.rpm" version="0.3.13"><filename>trousers-0.3.13-2.el6.x86_64.rpm</filename><sum type="sha256">1c3667471503c7be878981705c1c892e45096390a1daa46da902c54f0e8e6fba</sum></package><package arch="x86_64" name="trousers-devel" release="2.el6" src="trousers-0.3.13-2.el6.src.rpm" version="0.3.13"><filename>trousers-devel-0.3.13-2.el6.x86_64.rpm</filename><sum type="sha256">5a6ed5b882b277f6eb83c47075ca2d3431ab5d1fba7eeb7c20dc842cbac9fe76</sum></package><package arch="i686" name="trousers" release="2.el6" src="trousers-0.3.13-2.el6.src.rpm" version="0.3.13"><filename>trousers-0.3.13-2.el6.i686.rpm</filename><sum type="sha256">afd4eec2a3e638489e1c7266efce55e471141b91f5d89d7127dafac4f3969cb1</sum></package><package arch="x86_64" name="trousers-static" release="2.el6" src="trousers-0.3.13-2.el6.src.rpm" version="0.3.13"><filename>trousers-static-0.3.13-2.el6.x86_64.rpm</filename><sum type="sha256">2cf2361ab29a4c191c15ddafb3515f05db011ee2ab4ad763595e0f9d2356ac6b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0698" id="CVE-2012-0698" title="Trousers: Dos Vulnerability In Tcsd" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Low" id="Low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=781648" id="781648" title="Trousers: Dos Vulnerability In Tcsd" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1507.html" id="RHSA-2014:1507-2" title="Rhsa-2014:1507-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1552-2</id><title>Moderate: Openssh Security Update</title><description>It was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record. (CVE-2014-2653) 
It was found that OpenSSH did not properly handle certain AcceptEnv parameter values with wildcard characters. A remote attacker could use this flaw to bypass intended environment variable restrictions. (CVE-2014-2532) 
This update also fixes the following bugs: 
* Based on the SP800-131A information security standard, the generation of a digital signature using the Digital Signature Algorithm (DSA) with the key size of 1024 bits and RSA with the key size of less than 2048 bits is disallowed after the year 2013. After this update, ssh-keygen no longer generates keys with less than 2048 bits in FIPS mode. However, the sshd service accepts keys of size 1024 bits as well as larger keys for compatibility reasons. 
* Previously, the openssh utility incorrectly set the oom_adj value to -17 for all of its children processes. This behavior was incorrect because the children processes were supposed to have this value set to 0. This update applies a patch to fix this bug and oom_adj is now properly set to 0 for all children processes as expected. 
* Previously, if the sshd service failed to verify the checksum of an installed FIPS module using the fipscheck library, the information about this failure was only provided at the standard error output of sshd. As a consequence, the user could not notice this message and be uninformed when a system had not been properly configured for FIPS mode. To fix this bug, this behavior has been changed and sshd now sends such messages via the syslog service. 
* When keys provided by the pkcs11 library were removed from the ssh agent using the "ssh-add -e" command, the user was prompted to enter a PIN. With this update, a patch has been applied to allow the user to remove the keys provided by pkcs11 without the PIN. 
In addition, this update adds the following enhancements: 
* With this update, ControlPersist has been added to OpenSSH. The option in conjunction with the ControlMaster configuration directive specifies that the master connection remains open in the background after the initial client connection has been closed. 
* When the sshd daemon is configured to force the internal SFTP session, and the user attempts to use a connection other than SFTP, the appropriate message is logged to the /var/log/secure file. 
* Support for Elliptic Curve Cryptography modes for key exchange (ECDH) and host user keys (ECDSA) as specified by RFC5656 has been added to the openssh packages. However, they are not enabled by default and the user has to enable them manually.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pam_ssh_agent_auth" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm</filename><sum type="sha256">95d9f50f2fd854a685c9587a208d5afea2497b77d925af1a1d0464970565057e</sum></package><package arch="x86_64" name="openssh-server" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-104.el6.x86_64.rpm</filename><sum type="sha256">cb96b1eb4616a529f7ba4df7f916df7897704fcf67ba1a666c97ed557a6047d4</sum></package><package arch="x86_64" name="openssh-askpass" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-104.el6.x86_64.rpm</filename><sum type="sha256">7bf33cfdcae5ee2a48b7f68b3959e5dddc0ace5c3faec0cf2185ad231951c3ae</sum></package><package arch="x86_64" name="openssh" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="5.3p1"><filename>openssh-5.3p1-104.el6.x86_64.rpm</filename><sum type="sha256">f9655de461f40e136918ef8851d9f3fd68eec01342fb167111bbffee90ad973e</sum></package><package arch="x86_64" name="openssh-clients" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-104.el6.x86_64.rpm</filename><sum type="sha256">3cc9478e7c1a33c83e0b761505839522009105458d74f240ab5efc3d38656520</sum></package><package arch="x86_64" name="openssh-ldap" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-104.el6.x86_64.rpm</filename><sum type="sha256">51c554e7e127c633b225f8fa428270a338e2a48f8663de69228eb7e13968e633</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="104.el6" src="openssh-5.3p1-104.el6.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm</filename><sum type="sha256">c185a135d7cef085defeac298761e88ee9173d0d399595a1827087cb78eeeac3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532" id="CVE-2014-2532" title="Openssh: Acceptenv Environment Restriction Bypass Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653" id="CVE-2014-2653" title="Openssh: Failure To Check Dns Sshfp Records In Certain Scenarios" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1010429" id="1010429" title="Openssh Incorrectly Sets Oom_Adj In All Children After Performing A Reload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1023043" id="1023043" title="Ssh_Config Manual Page Lists Incorrect Default Value Of Kexalgorithms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1023044" id="1023044" title="Fix Man Page For Ssh-Keygen Because Of Certificate Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1027197" id="1027197" title="X11 Forwarding Does Not Work With Default Config - Error: Failed To Allocate Internet-Domain X11 Display Socket" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1028643" id="1028643" title="Connection Remains When Fork() Fails." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077843" id="1077843" title="Openssh: Acceptenv Environment Restriction Bypass Flaw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1081338" id="1081338" title="Openssh: Failure To Check Dns Sshfp Records In Certain Scenarios" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1108836" id="1108836" title="Ssh-Keyscan Should Ignore Sigpipe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1111568" id="1111568" title="Autocreate_Server_Keys=Rsaonly Is Not Supported By Init Script" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=953088" id="953088" title="Openssh Adding Controlpersist Patch To Enable Full Usage Of Ssh Control Options" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1552.html" id="RHSA-2014:1552-2" title="Rhsa-2014:1552-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1606-2</id><title>Moderate: File Security Update</title><description>Multiple denial of service flaws were found in the way file parsed certain Composite Document Format (CDF) files. A remote attacker could use either of these flaws to crash file, or an application using file, via a specially crafted CDF file. (CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2012-1571) 
Two denial of service flaws were found in the way file handled indirect and search rules. A remote attacker could use either of these flaws to cause file, or an application using file, to crash or consume an excessive amount of CPU. (CVE-2014-1943, CVE-2014-2270) 
This update also fixes the following bugs: 
* Previously, the output of the "file" command contained redundant white spaces. With this update, the new STRING_TRIM flag has been introduced to remove the unnecessary white spaces. 
* Due to a bug, the "file" command could incorrectly identify an XML document as a LaTex document. The underlying source code has been modified to fix this bug and the command now works as expected. 
* Previously, the "file" command could not recognize .JPG files and incorrectly labeled them as "Minix filesystem". This bug has been fixed and the command now properly detects .JPG files. 
* Under certain circumstances, the "file" command incorrectly detected NETpbm files as "x86 boot sector". This update applies a patch to fix this bug and the command now detects NETpbm files as expected. 
* Previously, the "file" command incorrectly identified ASCII text files as a .PIC image file. With this update, a patch has been provided to address this bug and the command now correctly recognizes ASCII text files. 
* On 32-bit PowerPC systems, the "from" field was missing from the output of the "file" command. The underlying source code has been modified to fix this bug and "file" output now contains the "from" field as expected. 
* The "file" command incorrectly detected text files as "RRDTool DB version ool - Round Robin Database Tool". This update applies a patch to fix this bug and the command now correctly detects text files. 
* Previously, the "file" command supported only version 1 and 2 of the QCOW format. As a consequence, file was unable to detect a "qcow2 compat=1.1" file created on Scientific Linux 7. With this update, support for QCOW version 3 has been added so that the command now detects such files as expected.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="file-libs" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>file-libs-5.04-21.el6.x86_64.rpm</filename><sum type="sha256">3499d32c14c2de51b2b7cddbbe8f5d5f445d843bf41239b73d83cc162e223959</sum></package><package arch="i686" name="file-devel" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>file-devel-5.04-21.el6.i686.rpm</filename><sum type="sha256">b922f16275bffe0448d59f3089045b382c0606e88f40b3e60da391328d26ee45</sum></package><package arch="x86_64" name="python-magic" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>python-magic-5.04-21.el6.x86_64.rpm</filename><sum type="sha256">0d32111387293922575c705fa86b3440ac368fa2cd064471380e7b1b7b903a37</sum></package><package arch="x86_64" name="file-devel" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>file-devel-5.04-21.el6.x86_64.rpm</filename><sum type="sha256">898e69eccdd68b8dd400a4715cec541326c8a757badff93c65587bc20b4900b6</sum></package><package arch="x86_64" name="file-static" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>file-static-5.04-21.el6.x86_64.rpm</filename><sum type="sha256">8c1714e744a01a2afee244fc430c4265232c0c29bdd87e65ce8e0601775a0ac2</sum></package><package arch="i686" name="file-libs" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>file-libs-5.04-21.el6.i686.rpm</filename><sum type="sha256">4d06797cbbcf25e64a5ce41b6fc19f2bd62ce9b5dc11c886a49061cd60b76533</sum></package><package arch="x86_64" name="file" release="21.el6" src="file-5.04-21.el6.src.rpm" version="5.04"><filename>file-5.04-21.el6.x86_64.rpm</filename><sum type="sha256">e95b51b2f66371ec88d454bd6a080fca0f943924d7ebafbeeb8fdbf0067f9b75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1571" id="CVE-2012-1571" title="File: Out Of Bounds Read In Cdf Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" id="CVE-2014-0237" title="File: Cdf_Unpack_Summary_Info() Excessive Looping Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" id="CVE-2014-0238" title="File: Cdf Property Info Parsing Nelements Infinite Loop" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943" id="CVE-2014-1943" title="File: Unrestricted Recursion In Handling Of Indirect Type Rules" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" id="CVE-2014-2270" title="File: Out-Of-Bounds Access In Search Rules With Offsets From Input File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479" id="CVE-2014-3479" title="File: Cdf_Check_Stream_Offset Insufficient Boundary Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480" id="CVE-2014-3480" title="File: Cdf_Count_Chain Insufficient Boundary Check" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1064463" id="1064463" title="Text File Detected As 'Rrdtool Db Version Ool - Round Robin Database Tool'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1065836" id="1065836" title="File: Unrestricted Recursion In Handling Of Indirect Type Rules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1067771" id="1067771" title="File Unable To Detect Qcow2 Compat=1.1 Img Created By Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1072220" id="1072220" title="File: Out-Of-Bounds Access In Search Rules With Offsets From Input File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098155" id="1098155" title="File: Cdf Property Info Parsing Nelements Infinite Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098193" id="1098193" title="File: Cdf_Unpack_Summary_Info() Excessive Looping Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104858" id="1104858" title="File: Cdf_Count_Chain Insufficient Boundary Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104869" id="1104869" title="File: Cdf_Check_Stream_Offset Insufficient Boundary Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=664513" id="664513" title="Too Many Spaces ..." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=805197" id="805197" title="File: Out Of Bounds Read In Cdf Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=849621" id="849621" title="File Is Coming Back With 'Latex Document Text' Instead Of 'Xml Document Text'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=873997" id="873997" title="File Thinks The Attached Jpg Is &quot;Minix Filesystem, V2, 50968 Zones&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=884396" id="884396" title="File Detects Netpbm Files As X86 Boot Sector Type Sometimes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=980941" id="980941" title="File Reported Wrong File Type (Reported .Pic Image File Instead Of Ascii Text File)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1606.html" id="RHSA-2014:1606-2" title="Rhsa-2014:1606-2" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1620-1</id><title>Important: Java-1.7.0-Openjdk Security Update</title><description>Multiple flaws were discovered in the Libraries, 2D, and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511, CVE-2014-6504, CVE-2014-6519) 
It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents. (CVE-2014-6517) 
It was discovered that the DatagramSocket implementation in OpenJDK failed to perform source address checks for packets received on a connected socket. A remote attacker could use this flaw to have their packets processed as if they were received from the expected source. (CVE-2014-6512) 
It was discovered that the TLS/SSL implementation in the JSSE component in OpenJDK failed to properly verify the server identity during the renegotiation following session resumption, making it possible for malicious TLS/SSL servers to perform a Triple Handshake attack against clients using JSSE and client certificate authentication. (CVE-2014-6457) 
It was discovered that the CipherInputStream class implementation in OpenJDK did not properly handle certain exceptions. This could possibly allow an attacker to affect the integrity of an encrypted stream handled by this class. (CVE-2014-6558) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
This update also fixes the following bug: 
* The TLS/SSL implementation in OpenJDK previously failed to handle Diffie-Hellman (DH) keys with more than 1024 bits. This caused client applications using JSSE to fail to establish TLS/SSL connections to servers using larger DH keys during the connection handshake. This update adds support for DH keys with size up to 2048 bits. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.5.3.1.el6" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el6.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el6.x86_64.rpm</filename><sum type="sha256">921c691d9c289fa99cde23c7981f4d64ebf6a13b9565798fc806aac7ad98e7f4</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.3.1.el6" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el6.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el6.x86_64.rpm</filename><sum type="sha256">810ec4993237c41d50a002f3166765ec6845ba376c34cbdcf482f9b6e17056aa</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.3.1.el6" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el6.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el6.x86_64.rpm</filename><sum type="sha256">1a4fd3cefefaaee647405fbf7f3a75a1d7bd75640345117f344e3580ad848f0d</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.3.1.el6" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el6.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el6.noarch.rpm</filename><sum type="sha256">17778c2d582e11217583b523b3e29c7800d79fa65804502861785ece1e87404f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.3.1.el6" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el6.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el6.x86_64.rpm</filename><sum type="sha256">be5b724ea15b45952f2827801f87cf94c0677dde1ced8cb0c3f2d9dcefecfcf8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" id="CVE-2014-6457" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" id="CVE-2014-6502" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" id="CVE-2014-6504" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" id="CVE-2014-6506" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" id="CVE-2014-6511" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" id="CVE-2014-6512" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" id="CVE-2014-6517" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" id="CVE-2014-6519" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" id="CVE-2014-6531" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" id="CVE-2014-6558" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1071210" id="1071210" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150155" id="1150155" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150182" id="1150182" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150273" id="1150273" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150651" id="1150651" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150669" id="1150669" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151046" id="1151046" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151063" id="1151063" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151364" id="1151364" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151517" id="1151517" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1620.html" id="RHSA-2014:1620-1" title="Rhsa-2014:1620-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1634-1</id><title>Important: Java-1.6.0-Openjdk Security Update</title><description>Multiple flaws were discovered in the Libraries, 2D, and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511, CVE-2014-6504, CVE-2014-6519) 
It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents. (CVE-2014-6517) 
It was discovered that the DatagramSocket implementation in OpenJDK failed to perform source address checks for packets received on a connected socket. A remote attacker could use this flaw to have their packets processed as if they were received from the expected source. (CVE-2014-6512) 
It was discovered that the TLS/SSL implementation in the JSSE component in OpenJDK failed to properly verify the server identity during the renegotiation following session resumption, making it possible for malicious TLS/SSL servers to perform a Triple Handshake attack against clients using JSSE and client certificate authentication. (CVE-2014-6457) 
It was discovered that the CipherInputStream class implementation in OpenJDK did not properly handle certain exceptions. This could possibly allow an attacker to affect the integrity of an encrypted stream handled by this class. (CVE-2014-6558) 
This update also fixes the following bug: 
* The TLS/SSL implementation in OpenJDK previously failed to handle Diffie-Hellman (DH) keys with more than 1024 bits. This caused client applications using JSSE to fail to establish TLS/SSL connections to servers using larger DH keys during the connection handshake. This update adds support for DH keys with size up to 2048 bits. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.5.0.el6_6" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el6_6.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el6_6.x86_64.rpm</filename><sum type="sha256">d2508b6381add2e7c9442aef11fd5767514ffdc20ba195b3002291b73cc614c0</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.5.0.el6_6" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el6_6.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el6_6.x86_64.rpm</filename><sum type="sha256">0ee76925d0e3c2df0cfdb096bd8f1ee660fbfd3020825b4fdebeb7e8412df7d7</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.5.0.el6_6" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el6_6.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el6_6.x86_64.rpm</filename><sum type="sha256">c3f7137ea98608bca4c8e48c28c09bdf205bcacb4a9bd4cb061e62049663c749</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.5.0.el6_6" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el6_6.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el6_6.x86_64.rpm</filename><sum type="sha256">f2be41a8df47d990931b1b95bff0abfbc35b1897e13f837a0299d0884776694a</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.5.0.el6_6" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el6_6.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el6_6.x86_64.rpm</filename><sum type="sha256">c9671b314c77df21718577a24cece642f658033ada3a107e4f3aff2cedd8891b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" id="CVE-2014-6457" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" id="CVE-2014-6502" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" id="CVE-2014-6504" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" id="CVE-2014-6506" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" id="CVE-2014-6511" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" id="CVE-2014-6512" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" id="CVE-2014-6517" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" id="CVE-2014-6519" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" id="CVE-2014-6531" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" id="CVE-2014-6558" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1071210" id="1071210" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150155" id="1150155" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150182" id="1150182" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150273" id="1150273" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150651" id="1150651" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150669" id="1150669" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151046" id="1151046" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151063" id="1151063" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151364" id="1151364" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151517" id="1151517" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1634.html" id="RHSA-2014:1634-1" title="Rhsa-2014:1634-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1635-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1574, CVE-2014-1578, CVE-2014-1581, CVE-2014-1576, CVE-2014-1577) 
A flaw was found in the Alarm API, which allows applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass cross-origin restrictions. (CVE-2014-1583) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="3.el6_6" src="firefox-31.2.0-3.el6_6.src.rpm" version="31.2.0"><filename>firefox-31.2.0-3.el6_6.i686.rpm</filename><sum type="sha256">c3fce09f760cef63846c130540693c367363242fc6e3857d6c131e7751faa82e</sum></package><package arch="x86_64" name="firefox" release="3.el6_6" src="firefox-31.2.0-3.el6_6.src.rpm" version="31.2.0"><filename>firefox-31.2.0-3.el6_6.x86_64.rpm</filename><sum type="sha256">bd09185c4c365048dee88c69038be4699577e32b4c463a968e90317ffdbcbcdd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" id="CVE-2014-1574" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" id="CVE-2014-1576" title="Mozilla: Buffer Overflow During Css Manipulation (Mfsa 2014-75)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" id="CVE-2014-1577" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" id="CVE-2014-1578" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" id="CVE-2014-1581" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" id="CVE-2014-1583" title="Mozilla: Accessing Cross-Origin Objects Via The Alarms Api (Mfsa 2014-82)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152356" id="1152356" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152358" id="1152358" title="Mozilla: Buffer Overflow During Css Manipulation (Mfsa 2014-75)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152359" id="1152359" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152361" id="1152361" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152363" id="1152363" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152683" id="1152683" title="Mozilla: Accessing Cross-Origin Objects Via The Alarms Api (Mfsa 2014-82)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1635.html" id="RHSA-2014:1635-1" title="Rhsa-2014:1635-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1636-1</id><title>Important: Java-1.8.0-Openjdk Security Update</title><description>It was discovered that the Libraries component in OpenJDK failed to properly handle ZIP archives that contain entries with a NUL byte used in the file names. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2014-6562) 
Multiple flaws were discovered in the Libraries, 2D, and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511, CVE-2014-6504, CVE-2014-6519) 
It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents. (CVE-2014-6517) 
It was discovered that the Hotspot component in OpenJDK failed to properly handle malformed Shared Archive files. A local attacker able to modify a Shared Archive file used by a virtual machine of a different user could possibly use this flaw to escalate their privileges. (CVE-2014-6468) 
It was discovered that the DatagramSocket implementation in OpenJDK failed to perform source address checks for packets received on a connected socket. A remote attacker could use this flaw to have their packets processed as if they were received from the expected source. (CVE-2014-6512) 
It was discovered that the TLS/SSL implementation in the JSSE component in OpenJDK failed to properly verify the server identity during the renegotiation following session resumption, making it possible for malicious TLS/SSL servers to perform a Triple Handshake attack against clients using JSSE and client certificate authentication. (CVE-2014-6457) 
It was discovered that the CipherInputStream class implementation in OpenJDK did not properly handle certain exceptions. This could possibly allow an attacker to affect the integrity of an encrypted stream handled by this class. (CVE-2014-6558) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="java-1.8.0-openjdk-demo" release="1.b17.el6" src="java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm" version="1.8.0.25"><filename>java-1.8.0-openjdk-demo-1.8.0.25-1.b17.el6.x86_64.rpm</filename><sum type="sha256">f8eeb68cbb5d1f3edf8bcc1aae2cd7903f11ea89bccaa1591f11f3c6a081569d</sum></package><package arch="x86_64" name="java-1.8.0-openjdk-devel" release="1.b17.el6" src="java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm" version="1.8.0.25"><filename>java-1.8.0-openjdk-devel-1.8.0.25-1.b17.el6.x86_64.rpm</filename><sum type="sha256">be2db91767dafa8e80e795990e532e9241e695f9078414335829d6c0e0fac025</sum></package><package arch="x86_64" name="java-1.8.0-openjdk-headless" release="1.b17.el6" src="java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm" version="1.8.0.25"><filename>java-1.8.0-openjdk-headless-1.8.0.25-1.b17.el6.x86_64.rpm</filename><sum type="sha256">9485446a02d4b60a635db64d797dde280b9836f504bdfe96eed9a494efac9374</sum></package><package arch="noarch" name="java-1.8.0-openjdk-javadoc" release="1.b17.el6" src="java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm" version="1.8.0.25"><filename>java-1.8.0-openjdk-javadoc-1.8.0.25-1.b17.el6.noarch.rpm</filename><sum type="sha256">ff064457500f8713a25f1d14c450e0d3cfa3870a2a484cf769865183e63c3a4e</sum></package><package arch="x86_64" name="java-1.8.0-openjdk" release="1.b17.el6" src="java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm" version="1.8.0.25"><filename>java-1.8.0-openjdk-1.8.0.25-1.b17.el6.x86_64.rpm</filename><sum type="sha256">527e11a91137dcea761ff63eb6a65864c8ae082025097612b144a76adcaca190</sum></package><package arch="x86_64" name="java-1.8.0-openjdk-src" release="1.b17.el6" src="java-1.8.0-openjdk-1.8.0.25-1.b17.el6.src.rpm" version="1.8.0.25"><filename>java-1.8.0-openjdk-src-1.8.0.25-1.b17.el6.x86_64.rpm</filename><sum type="sha256">60eb5df51e1dd5b4af0f25e99493dba67a17f367b46d8cec6ef97a6f40695625</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" id="CVE-2014-6457" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6468" id="CVE-2014-6468" title="Openjdk: Insufficient Sharedarchivefile Checks (Hotspot, 8044269)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" id="CVE-2014-6502" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" id="CVE-2014-6504" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" id="CVE-2014-6506" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" id="CVE-2014-6511" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" id="CVE-2014-6512" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" id="CVE-2014-6517" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" id="CVE-2014-6519" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" id="CVE-2014-6531" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" id="CVE-2014-6558" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6562" id="CVE-2014-6562" title="Openjdk: Incorrect Handling Of Zip Entries With Nul In Name (Libraries, 8048025)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1071210" id="1071210" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150155" id="1150155" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150182" id="1150182" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150273" id="1150273" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150651" id="1150651" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150669" id="1150669" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151046" id="1151046" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151063" id="1151063" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151364" id="1151364" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151517" id="1151517" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151988" id="1151988" title="Openjdk: Incorrect Handling Of Zip Entries With Nul In Name (Libraries, 8048025)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152049" id="1152049" title="Openjdk: Insufficient Sharedarchivefile Checks (Hotspot, 8044269)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1636.html" id="RHSA-2014:1636-1" title="Rhsa-2014:1636-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1647-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1574, CVE-2014-1578, CVE-2014-1581, CVE-2014-1577) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="3.el6_6" src="thunderbird-31.2.0-3.el6_6.src.rpm" version="31.2.0"><filename>thunderbird-31.2.0-3.el6_6.x86_64.rpm</filename><sum type="sha256">244df19690329bed348fce053e0304c273c306910e3a13c09a8f6d8846269dcc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" id="CVE-2014-1574" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" id="CVE-2014-1577" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" id="CVE-2014-1578" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" id="CVE-2014-1581" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152356" id="1152356" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152359" id="1152359" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152361" id="1152361" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152363" id="1152363" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1647.html" id="RHSA-2014:1647-1" title="Rhsa-2014:1647-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1652-1</id><title>Important: Openssl Security Update</title><description>This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. 
This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. 
For additional information about this flaw, see Upstream's Knowledgebase article at https://access.redhat.com/articles/1232123 
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. (CVE-2014-3513) 
A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567) 
CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-10-21 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl-static" release="30.el6_6.2" src="openssl-1.0.1e-30.el6_6.2.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm</filename><sum type="sha256">e1420a07bbf3cc5f06d10bcdcd3b2894d575638e0ea6153e0a669c439b1a2b0e</sum></package><package arch="x86_64" name="openssl" release="30.el6_6.2" src="openssl-1.0.1e-30.el6_6.2.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.2.x86_64.rpm</filename><sum type="sha256">d64871dddfac06fdc3141934f011b153c9eca7c7909e0316c0dd8f67c513f895</sum></package><package arch="i686" name="openssl" release="30.el6_6.2" src="openssl-1.0.1e-30.el6_6.2.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.2.i686.rpm</filename><sum type="sha256">8ce23a0e212a63a0885e9c10595cee8b96018c87fafe6ff387b57af30c0dc86c</sum></package><package arch="i686" name="openssl-devel" release="30.el6_6.2" src="openssl-1.0.1e-30.el6_6.2.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.2.i686.rpm</filename><sum type="sha256">44b84b61661a0e0b9e8833abbc7400ae48ee39399fa22ed98447e16f778b9ce5</sum></package><package arch="x86_64" name="openssl-perl" release="30.el6_6.2" src="openssl-1.0.1e-30.el6_6.2.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm</filename><sum type="sha256">c7a52923e6fdab2f27b5043b74709b961e437a520c594f094a837694923cf9ff</sum></package><package arch="x86_64" name="openssl-devel" release="30.el6_6.2" src="openssl-1.0.1e-30.el6_6.2.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm</filename><sum type="sha256">732eacebf6c7248957eb62fa25ca32d9f8512fe2a8e448e28e9688c48eabf63f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" id="CVE-2014-3513" title="Openssl: Srtp Memory Leak Causes Crash When Using Specially-Crafted Handshake Message" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" id="CVE-2014-3567" title="Openssl: Invalid Tls/Ssl Session Tickets Could Cause Memory Leak Leading To Server Crash" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152953" id="1152953" title="Openssl: Srtp Memory Leak Causes Crash When Using Specially-Crafted Handshake Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152961" id="1152961" title="Openssl: Invalid Tls/Ssl Session Tickets Could Cause Memory Leak Leading To Server Crash" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1652.html" id="RHSA-2014:1652-1" title="Rhsa-2014:1652-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1655-1</id><title>Moderate: Libxml2 Security Update</title><description>A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior. (CVE-2014-3660) 
The desktop must be restarted (log out, then log back in) for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libxml2" release="17.el6_6.1" src="libxml2-2.7.6-17.el6_6.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-17.el6_6.1.x86_64.rpm</filename><sum type="sha256">ea3cbb8f0614d8e85af7bba25a3a2d1c9c92839ae27612324dfb40c2d542f61f</sum></package><package arch="x86_64" name="libxml2-python" release="17.el6_6.1" src="libxml2-2.7.6-17.el6_6.1.src.rpm" version="2.7.6"><filename>libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm</filename><sum type="sha256">a72af7126d3edd83c5cc807131ff3a208593d2776715f0a1c3d918a1b6b1518c</sum></package><package arch="i686" name="libxml2" release="17.el6_6.1" src="libxml2-2.7.6-17.el6_6.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-17.el6_6.1.i686.rpm</filename><sum type="sha256">5472325afc6cb5a1f11ac353af30aa590ebd295d54e3afffd95c0dd71e01667a</sum></package><package arch="x86_64" name="libxml2-static" release="17.el6_6.1" src="libxml2-2.7.6-17.el6_6.1.src.rpm" version="2.7.6"><filename>libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm</filename><sum type="sha256">0dac9ca5fcc93590f0a30b155f219ff91a07bc077ba64b0e4d009f96a0e1f498</sum></package><package arch="x86_64" name="libxml2-devel" release="17.el6_6.1" src="libxml2-2.7.6-17.el6_6.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm</filename><sum type="sha256">8abcd8e157600b3b0e878a8e6a31e8cd095c614e5a813853d70f0682bede2633</sum></package><package arch="i686" name="libxml2-devel" release="17.el6_6.1" src="libxml2-2.7.6-17.el6_6.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-17.el6_6.1.i686.rpm</filename><sum type="sha256">3ae4440616ebaeb636a49548cba9395784ea13cdcd289f4b6fcda69d39f237c2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" id="CVE-2014-3660" title="Libxml2: Denial Of Service Via Recursive Entity Expansion" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1149084" id="1149084" title="Libxml2: Denial Of Service Via Recursive Entity Expansion" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1655.html" id="RHSA-2014:1655-1" title="Rhsa-2014:1655-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1671-1</id><title>Moderate: Rsyslog5 And Rsyslog Security Update</title><description>A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon. (CVE-2014-3634) 
After installing the update, the rsyslog service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="rsyslog-gssapi" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-gssapi-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">006bbbc71afe7305f232a5db60e1b034e7a992cee6b47ff3275b9ebd2e5d88ff</sum></package><package arch="x86_64" name="rsyslog-relp" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-relp-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">633c1264665311ab608623aea49150f1b0ebd6afcd1b4968458718b01e616883</sum></package><package arch="x86_64" name="rsyslog" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">9a1181909e83257c488730339fc84fa24518dfe8e080a3b0203d9fca0853dbb4</sum></package><package arch="x86_64" name="rsyslog-pgsql" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-pgsql-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">0795f29e5ce434648632d5e77fd783d71a47866e4ae142c2a42af32bac8c145f</sum></package><package arch="x86_64" name="rsyslog-gnutls" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-gnutls-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">38227b959d62b96ce5419c35fd7c8d196f6b9c5e39b2790771ceae6d217eab24</sum></package><package arch="x86_64" name="rsyslog-mysql" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-mysql-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">3cd711fbcf04bb0dc32faa1a555d128ae00c5a7be00bccbefc0fd4b31152f234</sum></package><package arch="x86_64" name="rsyslog-snmp" release="9.el6_6" src="rsyslog-5.8.10-9.el6_6.src.rpm" version="5.8.10"><filename>rsyslog-snmp-5.8.10-9.el6_6.x86_64.rpm</filename><sum type="sha256">7ff1842e358f5787672201c2d2435b389e31f6d76ad3711a556a8bec6f5df2de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" id="CVE-2014-3634" title="Rsyslog: Remote Syslog Pri Vulnerability" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142373" id="1142373" title="Rsyslog: Remote Syslog Pri Vulnerability" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1671.html" id="RHSA-2014:1671-1" title="Rhsa-2014:1671-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1676-1</id><title>Moderate: Wireshark Security Update</title><description>Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) 
Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428) 
All running instances of Wireshark must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="wireshark-devel" release="8.el6_6" src="wireshark-1.8.10-8.el6_6.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-8.el6_6.i686.rpm</filename><sum type="sha256">45da8b4b5759aa16eea703c2553a4380794ae0d8aacaccb726d752bd6de7f22b</sum></package><package arch="x86_64" name="wireshark" release="8.el6_6" src="wireshark-1.8.10-8.el6_6.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-8.el6_6.x86_64.rpm</filename><sum type="sha256">e13050f9318a752357446a9c7ab7d62db91d54cbe84239b3865f71d91b8d9c5d</sum></package><package arch="x86_64" name="wireshark-gnome" release="8.el6_6" src="wireshark-1.8.10-8.el6_6.src.rpm" version="1.8.10"><filename>wireshark-gnome-1.8.10-8.el6_6.x86_64.rpm</filename><sum type="sha256">b0df21a760d356a0fb71a6393f00e336ec5d948e83ff7e50b2bfafe8e9df87d7</sum></package><package arch="x86_64" name="wireshark-devel" release="8.el6_6" src="wireshark-1.8.10-8.el6_6.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-8.el6_6.x86_64.rpm</filename><sum type="sha256">52c0349df88da4cf9fb73e35691f4c8cb1d013f10b7f976f4b2821fc64649a59</sum></package><package arch="i686" name="wireshark" release="8.el6_6" src="wireshark-1.8.10-8.el6_6.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-8.el6_6.i686.rpm</filename><sum type="sha256">53c45800bb0b2d3a0ce3332eb79d3f6e834de9748d1ba81387dcb068611b82ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421" id="CVE-2014-6421" title="Wireshark: Rtp Dissector Crash (Wnpa-Sec-2014-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422" id="CVE-2014-6422" title="Wireshark: Rtp Dissector Crash (Wnpa-Sec-2014-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" id="CVE-2014-6423" title="Wireshark: Megaco Dissector Infinite Loop (Wnpa-Sec-2014-13)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" id="CVE-2014-6424" title="Wireshark: Netflow Dissector Crash (Wnpa-Sec-2014-14)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425" id="CVE-2014-6425" title="Wireshark: Cups Dissector Crash (Wnpa-Sec-2014-15)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426" id="CVE-2014-6426" title="Wireshark: Hip Dissector Infinite Loop (Wnpa-Sec-2014-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" id="CVE-2014-6427" title="Wireshark: Rtsp Dissector Crash (Wnpa-Sec-2014-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" id="CVE-2014-6428" title="Wireshark: Ses Dissector Crash (Wnpa-Sec-2014-18)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" id="CVE-2014-6429" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" id="CVE-2014-6430" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" id="CVE-2014-6431" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" id="CVE-2014-6432" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142602" id="1142602" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142603" id="1142603" title="Wireshark: Ses Dissector Crash (Wnpa-Sec-2014-18)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142604" id="1142604" title="Wireshark: Rtsp Dissector Crash (Wnpa-Sec-2014-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142606" id="1142606" title="Wireshark: Hip Dissector Infinite Loop (Wnpa-Sec-2014-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142608" id="1142608" title="Wireshark: Cups Dissector Crash (Wnpa-Sec-2014-15)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142609" id="1142609" title="Wireshark: Netflow Dissector Crash (Wnpa-Sec-2014-14)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142610" id="1142610" title="Wireshark: Megaco Dissector Infinite Loop (Wnpa-Sec-2014-13)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142611" id="1142611" title="Wireshark: Rtp Dissector Crash (Wnpa-Sec-2014-12)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1676.html" id="RHSA-2014:1676-1" title="Rhsa-2014:1676-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1764-1</id><title>Moderate: Wget Security Update</title><description>A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode (using the '-m' command line option) to write an arbitrary file to a location writable to by the user running Wget, possibly leading to code execution. (CVE-2014-4877) 
Note: This update changes the default value of the --retr-symlinks option. The file symbolic links are now traversed by default and pointed-to files are retrieved rather than creating a symbolic link locally.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="wget" release="5.el6_6.1" src="wget-1.12-5.el6_6.1.src.rpm" version="1.12"><filename>wget-1.12-5.el6_6.1.x86_64.rpm</filename><sum type="sha256">0c488dbf789d6dd2425dd1c179e5b23b1fa4d74a916c808a3fb762158ce00d5a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" id="CVE-2014-4877" title="Wget: Ftp Symlink Arbitrary Filesystem Access" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1139181" id="1139181" title="Wget: Ftp Symlink Arbitrary Filesystem Access" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1764.html" id="RHSA-2014:1764-1" title="Rhsa-2014:1764-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1767-1</id><title>Important: Php Security Update</title><description>A buffer overflow flaw was found in the Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_thumbnail() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2014-3670) 
An integer overflow flaw was found in the way custom objects were unserialized. Specially crafted input processed by the unserialize() function could cause a PHP application to crash. (CVE-2014-3669) 
An out-of-bounds read flaw was found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted ELF file. (CVE-2014-3710) 
An out of bounds read flaw was found in the way the xmlrpc extension parsed dates in the ISO 8601 format. A specially crafted XML-RPC request or response could possibly cause a PHP application to crash. (CVE-2014-3668) 
The CVE-2014-3710 issue was discovered by Francisco Alonso of Red Hat Product Security. 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-pgsql" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">4cfa06447596386383178ba92b2926d9f3f6d4873172c87e3cc74ab766a7c5b9</sum></package><package arch="x86_64" name="php-embedded" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">c4c9fbb5ac187ea1ec1856709b201a44d487325b1ef87d70996f323f618dcc4f</sum></package><package arch="x86_64" name="php-pspell" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">b28634b7dc1b093b4761f8e4a5620d1556f9118a931f525de27d4f17417cd093</sum></package><package arch="x86_64" name="php-soap" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">6dd6642a1fa5a170cf3f6b82e755f38e6ac5c86f2d93e4e8a9ba1ac3d6ecc6b5</sum></package><package arch="x86_64" name="php-intl" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">3ad62a5be38c7b779503e9dc7880b912cfa573d81f5bb7d23e88eb558cd1dcda</sum></package><package arch="x86_64" name="php" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">e7c93cfd78a7bf0d1735b00e5ec12eacda0af9337ce3140cbc15e3d6bf71998a</sum></package><package arch="x86_64" name="php-recode" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">cd67086c96b50b4d9d16f5317e939479390f41cd9b70ce417cc4d5e3f2ce48f0</sum></package><package arch="x86_64" name="php-cli" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">313ee9141002a94d23bbc27b564867224a074671d1f021fc58a50983dc1747d8</sum></package><package arch="x86_64" name="php-xmlrpc" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">ae37bc254c4188da1e5dda5b7c036114f01bac6a04d081dcda95173ad737b4ca</sum></package><package arch="x86_64" name="php-dba" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">0d431fab5f25df5b789e35dc467b95d15c5d9255fbf25a6b424997ee3fb812e9</sum></package><package arch="x86_64" name="php-bcmath" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">fee338205f001f013b66e65aee974f5687eeb72c81b85002333b7762be30ceb9</sum></package><package arch="x86_64" name="php-mysql" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">acd37f715ca40cb56f03924ac07f3a0d1a7e8a261b4eb4424e3078b7969c9152</sum></package><package arch="x86_64" name="php-ldap" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">50b86efde2455ec3a5dd759a7c2216ade92030d1178c3b92474f9046ae3a7c5b</sum></package><package arch="x86_64" name="php-imap" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">f39a007872f034f1d859475f90713b8c8528158499869c24fa60340f4937b542</sum></package><package arch="x86_64" name="php-zts" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">83fd2ada41f585c3e638264bbd2ccd2126d5ae2d975151d81837ebb2f01eb7fa</sum></package><package arch="x86_64" name="php-devel" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">740a6d69708fb86a9ca0c089841600891aa4b7e501eac2eddcddc73958854da1</sum></package><package arch="x86_64" name="php-tidy" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">a98212834f1fd9bdf6b7febaf23c2ed70d6c0ad6e272bb8aefaea5f1ace52206</sum></package><package arch="x86_64" name="php-mbstring" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">b15c5e9301abe6ae2f08ee11858555c3753e0d67b66e547969c50f39b7860fde</sum></package><package arch="x86_64" name="php-snmp" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">6aece24fb5d4a75c0f1ea5270f81a43d49ae22e94e24982fa0b82172158d2e6d</sum></package><package arch="x86_64" name="php-pdo" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">8294f97a3c83dbd47b66c53ff8db61bc13c205a9b1f95f5eb0c332bfeadebed2</sum></package><package arch="x86_64" name="php-common" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-common-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">39f890502107b1ec239a5d3fbc24fc26b167fa61c8198be22abf70c981576a1b</sum></package><package arch="x86_64" name="php-enchant" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">9a42fa9793efa62d4260e625647d1e8a4217fa03f5be2f93765201114232ead6</sum></package><package arch="x86_64" name="php-odbc" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">fdacc19dde98ae0db0761f25bc659b6ec5b82a94db8657d57b33678eece15e7b</sum></package><package arch="x86_64" name="php-process" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-process-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">606c0730ca00b002797112035ac99737db404eb8a055df35f3c2738af95951db</sum></package><package arch="x86_64" name="php-xml" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">372c251514baf72d8c3f4ee67b3e43c3d0fefe7f93ae7196b80a44e0bdd5310e</sum></package><package arch="x86_64" name="php-fpm" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">7a786b56acc93ef8b515756e20cbbb68b7c1cddce2cb1327686e8d476734d044</sum></package><package arch="x86_64" name="php-gd" release="40.el6_6" src="php-5.3.3-40.el6_6.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-40.el6_6.x86_64.rpm</filename><sum type="sha256">afeda3d59133cf44628cf64685c6a005f0c9dba7116d13ab65654a01ba94fa4f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" id="CVE-2014-3668" title="Php: Xmlrpc Iso8601 Date Format Parsing Out-Of-Bounds Read In Mkgmtime()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" id="CVE-2014-3669" title="Php: Integer Overflow In Unserialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" id="CVE-2014-3670" title="Php: Heap Corruption Issue In Exif_Thumbnail()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" id="CVE-2014-3710" title="File: Out-Of-Bounds Read In Elf Note Headers" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154500" id="1154500" title="Php: Integer Overflow In Unserialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154502" id="1154502" title="Php: Heap Corruption Issue In Exif_Thumbnail()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154503" id="1154503" title="Php: Xmlrpc Iso8601 Date Format Parsing Out-Of-Bounds Read In Mkgmtime()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155071" id="1155071" title="File: Out-Of-Bounds Read In Elf Note Headers" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1767.html" id="RHSA-2014:1767-1" title="Rhsa-2014:1767-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1803-1</id><title>Important: Mod_Auth_Mellon Security Update</title><description>An information disclosure flaw was found in mod_auth_mellon's session handling that could lead to sessions overlapping in memory. A remote attacker could potentially use this flaw to obtain data from another user's session. (CVE-2014-8566) 
It was found that uninitialized data could be read when processing a user's logout request. By attempting to log out, a user could possibly cause the Apache HTTP Server to crash. (CVE-2014-8567)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mod_auth_mellon" release="3.el6_6" src="mod_auth_mellon-0.8.0-3.el6_6.src.rpm" version="0.8.0"><filename>mod_auth_mellon-0.8.0-3.el6_6.x86_64.rpm</filename><sum type="sha256">df9b461eb19854c4629dd3d1689a1461a14859da2f8aa535b57cab0a8988f564</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8566" id="CVE-2014-8566" title="Mod_Auth_Mellon: Remote Memory Disclosure Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8567" id="CVE-2014-8567" title="Mod_Auth_Mellon: Logout Processing Leads To Denial Of Service" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1157281" id="1157281" title="Mod_Auth_Mellon: Remote Memory Disclosure Flaw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1157954" id="1157954" title="Mod_Auth_Mellon: Logout Processing Leads To Denial Of Service" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1803.html" id="RHSA-2014:1803-1" title="Rhsa-2014:1803-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1826-1</id><title>Moderate: Libvncserver Security Update</title><description>An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way screen sizes were handled by LibVNCServer. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code in the client. (CVE-2014-6051) 
A NULL pointer dereference flaw was found in LibVNCServer's framebuffer setup. A malicious VNC server could use this flaw to cause a VNC client to crash. (CVE-2014-6052) 
A NULL pointer dereference flaw was found in the way LibVNCServer handled certain ClientCutText message. A remote attacker could use this flaw to crash the VNC server by sending a specially crafted ClientCutText message from a VNC client. (CVE-2014-6053) 
A divide-by-zero flaw was found in the way LibVNCServer handled the scaling factor when it was set to "0". A remote attacker could use this flaw to crash the VNC server using a malicious VNC client. (CVE-2014-6054) 
Two stack-based buffer overflow flaws were found in the way LibVNCServer handled file transfers. A remote attacker could use this flaw to crash the VNC server using a malicious VNC client. (CVE-2014-6055) 
All running applications linked against libvncserver must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-18 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvncserver" release="7.el6_6.1" src="libvncserver-0.9.7-7.el6_6.1.src.rpm" version="0.9.7"><filename>libvncserver-0.9.7-7.el6_6.1.x86_64.rpm</filename><sum type="sha256">3b57f90520f040bbd630008a4b8b187a14cd00618953374560086581815be5fe</sum></package><package arch="i686" name="libvncserver" release="7.el6_6.1" src="libvncserver-0.9.7-7.el6_6.1.src.rpm" version="0.9.7"><filename>libvncserver-0.9.7-7.el6_6.1.i686.rpm</filename><sum type="sha256">6154ee3666453bff2f92f85462ed09cf73ae6fc775c46f102fcc7b9aead1ca6c</sum></package><package arch="i686" name="libvncserver-devel" release="7.el6_6.1" src="libvncserver-0.9.7-7.el6_6.1.src.rpm" version="0.9.7"><filename>libvncserver-devel-0.9.7-7.el6_6.1.i686.rpm</filename><sum type="sha256">f6ba45ffd689e265e636842cbe9181c7645c5a696f4388f89936abfc43b5084f</sum></package><package arch="x86_64" name="libvncserver-devel" release="7.el6_6.1" src="libvncserver-0.9.7-7.el6_6.1.src.rpm" version="0.9.7"><filename>libvncserver-devel-0.9.7-7.el6_6.1.x86_64.rpm</filename><sum type="sha256">a2466ba27edda129a6b54c281fc99a9782f5f405c952b19dc8513d40d534d99a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" id="CVE-2014-6051" title="Libvncserver: Integer Overflow Flaw, Leading To A Heap-Based Buffer Overflow In Screen Size Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" id="CVE-2014-6052" title="Libvncserver: Null Pointer Dereference Flaw In Framebuffer Setup" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" id="CVE-2014-6053" title="Libvncserver: Server Null Pointer Dereference Flaw In Clientcuttext Message Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" id="CVE-2014-6054" title="Libvncserver: Server Divide-By-Zero Flaw In Scaling Factor Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" id="CVE-2014-6055" title="Libvncserver: Server Stacked-Based Buffer Overflow Flaws In File Transfer Handling" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144287" id="1144287" title="Libvncserver: Integer Overflow Flaw, Leading To A Heap-Based Buffer Overflow In Screen Size Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144288" id="1144288" title="Libvncserver: Null Pointer Dereference Flaw In Framebuffer Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144289" id="1144289" title="Libvncserver: Server Null Pointer Dereference Flaw In Clientcuttext Message Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144291" id="1144291" title="Libvncserver: Server Divide-By-Zero Flaw In Scaling Factor Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144293" id="1144293" title="Libvncserver: Server Stacked-Based Buffer Overflow Flaws In File Transfer Handling" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1826.html" id="RHSA-2014:1826-1" title="Rhsa-2014:1826-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1843-1</id><title>Important: Kernel Security Update</title><description>NOTE users of CVMFS: this kernel contains a bug within the FUSE filesystem which makes this kernel unsuitable for use on CVMFS servers. 
* A race condition flaw was found in the way the Linux kernel's KVM subsystem handled PIT (Programmable Interval Timer) emulation. A guest user who has access to the PIT I/O ports could use this flaw to crash the host. (CVE-2014-3611, Important) 
* A memory corruption flaw was found in the way the USB ConnectTech WhiteHEAT serial driver processed completion commands sent via USB Request Blocks buffers. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3185, Moderate) 
* It was found that the Linux kernel's KVM subsystem did not handle the VM exits gracefully for the invept (Invalidate Translations Derived from EPT) and invvpid (Invalidate Translations Based on VPID) instructions. On hosts with an Intel processor and invept/invppid VM exit support, an unprivileged guest user could use these instructions to crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate) 
This update also fixes the following bugs: 
* This update fixes several race conditions between PCI error recovery callbacks and potential calls of the ifup and ifdown commands in the tg3 driver. When triggered, these race conditions could cause a kernel crash. 
* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if its parent was also a GFS2 file system. This problem has been fixed by adding the appropriate d_op-&gt;d_hash() routine call for the last component of the mount point path in the path name lookup mechanism code (namei). 
* Due to previous changes in the virtio-net driver, a Scientific Linux 6.6 guest was unable to boot with the "mgr_rxbuf=off" option specified. This was caused by providing the page_to_skb() function with an incorrect packet length in the driver's Rx path. This problem has been fixed and the guest in the described scenario can now boot successfully. 
* When using one of the newer IPSec Authentication Header (AH) algorithms with Openswan, a kernel panic could occur. This happened because the maximum truncated ICV length was too small. To fix this problem, the MAX_AH_AUTH_LEN parameter has been set to 64. 
* A bug in the IPMI driver caused the kernel to panic when an IPMI interface was removed using the hotmod script. The IPMI driver has been fixed to properly clean the relevant data when removing an IPMI interface. 
* Due to a bug in the IPMI driver, the kernel could panic when adding an IPMI interface that was previously removed using the hotmod script. This update fixes this bug by ensuring that the relevant shadow structure is initialized at the right time. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-18 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">e886829755c8a3a77ed1d1d51da028d384588827a670a45ed4fb385735a45f7e</sum></package><package arch="x86_64" name="kernel-devel" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">8fad8d689f681571ab58cc4758bfd196d7823870c9d5eb6009fa7e8534c44247</sum></package><package arch="x86_64" name="python-perf" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">d88a434af8fafc6e0f8d6e33740252b5dfbd36ed4f3ca68148c91697e2809c97</sum></package><package arch="noarch" name="kernel-doc" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.1.3.el6.noarch.rpm</filename><sum type="sha256">6a4a77a9e9b652d63ac2479f3a0ca51b7a2c124f813f75c62fb9c423f0090e6f</sum></package><package arch="x86_64" name="perf" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">a134337d34d8e8d01fb03083d32bb28f23a91bcc0bae1224e7a7130e27eafe6b</sum></package><package arch="x86_64" name="kernel-headers" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">af895c0a62c5d2b19f91c4b98fd83f393065604935ca79444dbf4462f8b162b9</sum></package><package arch="noarch" name="kernel-firmware" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.1.3.el6.noarch.rpm</filename><sum type="sha256">871421f443ea3f8aeac031cf40c0ce4a549764433db74f975b73ff02aae5ff2d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">ac0d997736464607c1f30896423e6624541180b298dd95719fb5f5564289777e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.1.3.el6.noarch.rpm</filename><sum type="sha256">b1cf71ecc885cac4f605b0f8981f39eb43b41dd8ec07a32075b1c1c19f825c3b</sum></package><package arch="x86_64" name="kernel-debug" release="504.1.3.el6" src="kernel-2.6.32-504.1.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.1.3.el6.x86_64.rpm</filename><sum type="sha256">c6d4809f696b1cd237b73db3e4c5f607fc228da0888cb47fd0664a8d640d7123</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" id="CVE-2014-3185" title="Kernel: Usb Serial: Memory Corruption Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3611" id="CVE-2014-3611" title="Kernel: Kvm: Pit Timer Race Condition" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3645" id="CVE-2014-3645" title="Kernel: Kvm: Vmx: Invept Vm Exit Not Handled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" id="CVE-2014-3646" title="Kernel: Kvm: Vmx: Invvpid Vm Exit Not Handled" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141400" id="1141400" title="Kernel: Usb Serial: Memory Corruption Flaw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144825" id="1144825" title="Kernel: Kvm: Vmx: Invvpid Vm Exit Not Handled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144835" id="1144835" title="Kernel: Kvm: Vmx: Invept Vm Exit Not Handled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144878" id="1144878" title="Kernel: Kvm: Pit Timer Race Condition" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1843.html" id="RHSA-2014:1843-1" title="Rhsa-2014:1843-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1870-1</id><title>Important: Libxfont Security Update</title><description>A use-after-free flaw was found in the way libXfont processed certain font files when attempting to add a new directory to the font path. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server. (CVE-2014-0209) 
Multiple out-of-bounds write flaws were found in the way libXfont parsed replies received from an X.org font server. A malicious X.org server could cause an X client to crash or, possibly, execute arbitrary code with the privileges of the X.Org server. (CVE-2014-0210, CVE-2014-0211) 
All running X.Org server instances must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libXfont-devel" release="4.el6_6" src="libXfont-1.4.5-4.el6_6.src.rpm" version="1.4.5"><filename>libXfont-devel-1.4.5-4.el6_6.x86_64.rpm</filename><sum type="sha256">72625744d9c56446b4872550a9f80d2832284ef09d160a3bb53cd07816500354</sum></package><package arch="i686" name="libXfont-devel" release="4.el6_6" src="libXfont-1.4.5-4.el6_6.src.rpm" version="1.4.5"><filename>libXfont-devel-1.4.5-4.el6_6.i686.rpm</filename><sum type="sha256">4c75f547da3f2d96a163c88c100cac14e7987523834fee75ca010b115df56fc5</sum></package><package arch="i686" name="libXfont" release="4.el6_6" src="libXfont-1.4.5-4.el6_6.src.rpm" version="1.4.5"><filename>libXfont-1.4.5-4.el6_6.i686.rpm</filename><sum type="sha256">5fceb6557b2a73aee299a5b81ace5df3f676dfa234a7f21ea79bf6cdafaf0047</sum></package><package arch="x86_64" name="libXfont" release="4.el6_6" src="libXfont-1.4.5-4.el6_6.src.rpm" version="1.4.5"><filename>libXfont-1.4.5-4.el6_6.x86_64.rpm</filename><sum type="sha256">5ff6fbb36fa8bc3c3d96bb58ceff3d80e6066a695ae5b993c0e65bbcadf043ca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" id="CVE-2014-0209" title="Libxfont: Integer Overflow Of Allocations In Font Metadata File Parsing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" id="CVE-2014-0210" title="Libxfont: Unvalidated Length Fields When Parsing Xfs Protocol Replies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" id="CVE-2014-0211" title="Libxfont: Integer Overflows Calculating Memory Needs For Xfs Replies" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096593" id="1096593" title="Cve-2014-0209 Libxfont: Integer Overflow Of Allocations In Font Metadata File Parsing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096597" id="1096597" title="Cve-2014-0210 Libxfont: Unvalidated Length Fields When Parsing Xfs Protocol Replies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096601" id="1096601" title="Cve-2014-0211 Libxfont: Integer Overflows Calculating Memory Needs For Xfs Replies" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1870.html" id="RHSA-2014:1870-1" title="Rhsa-2014:1870-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1873-1</id><title>Moderate: Libvirt Security Update</title><description>An out-of-bounds read flaw was found in the way libvirt's qemuDomainGetBlockIoTune() function looked up the disk index in a non- persistent (live) disk configuration while a persistent disk configuration was being indexed. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, leak memory from the libvirtd process. (CVE-2014-3633) 
A denial of service flaw was found in the way libvirt's virConnectListAllDomains() function computed the number of used domains. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to make any domain operations within libvirt unresponsive. (CVE-2014-3657) 
It was found that when the VIR_DOMAIN_XML_MIGRATABLE flag was used, the QEMU driver implementation of the virDomainGetXMLDesc() function could bypass the restrictions of the VIR_DOMAIN_XML_SECURE flag. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to leak certain limited information from the domain XML data. (CVE-2014-7823) 
This update also fixes the following bug: 
When dumping migratable XML configuration of a domain, libvirt removes some automatically added devices for compatibility with older libvirt releases. If such XML is passed to libvirt as a domain XML that should be used during migration, libvirt checks this XML for compatibility with the internally stored configuration of the domain. However, prior to this update, these checks failed because of devices that were missing (the same devices libvirt removed). As a consequence, migration with user-supplied migratable XML failed. Since this feature is used by OpenStack, migrating QEMU/KVM domains with OpenStack always failed. With this update, before checking domain configurations for compatibility, libvirt transforms both user-supplied and internal configuration into a migratable form (automatically added devices are removed) and checks those instead. Thus, no matter whether the user-supplied configuration was generated as migratable or not, libvirt does not err about missing devices, and migration succeeds as expected. 
After installing the updated packages, libvirtd will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-12-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt-lock-sanlock" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-46.el6_6.2.x86_64.rpm</filename><sum type="sha256">fec474251224e86e6c94a1e9c3f2b85a4ad5c2e64d2cb9843d9c7e15c63f97e8</sum></package><package arch="x86_64" name="libvirt" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-46.el6_6.2.x86_64.rpm</filename><sum type="sha256">fe856cdaf4ab2bf07ab93447caa8c99631442a138d008aa9ec50ac5ce753e8e5</sum></package><package arch="i686" name="libvirt-client" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-46.el6_6.2.i686.rpm</filename><sum type="sha256">7ce72bfb9c20f4a52cf4c03d94402c506b983cecb9df49c6702c2c26390a454d</sum></package><package arch="i686" name="libvirt-devel" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-46.el6_6.2.i686.rpm</filename><sum type="sha256">44198444cbebee514b3097ea6f2774b3feba31f0be67e399902425ce42f4ed58</sum></package><package arch="x86_64" name="libvirt-python" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-46.el6_6.2.x86_64.rpm</filename><sum type="sha256">81de0ea96436d03df2007c4caffa9f8ef1db38809693f8ac5ef1e2af24ef9e93</sum></package><package arch="x86_64" name="libvirt-client" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-46.el6_6.2.x86_64.rpm</filename><sum type="sha256">0d40c6a39eb70ca916406bce1f3bd200653e6aeb0029b58419e4cae96e16e2a8</sum></package><package arch="x86_64" name="libvirt-devel" release="46.el6_6.2" src="libvirt-0.10.2-46.el6_6.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-46.el6_6.2.x86_64.rpm</filename><sum type="sha256">f8fe4ed724b6868fe12ba015345f0862d177c7462699dfa10a2ace4c53ecc760</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" id="CVE-2014-3633" title="Libvirt: Qemu: Out-Of-Bounds Read Access In Qemudomaingetblockiotune() Due To Invalid Index" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" id="CVE-2014-3657" title="Libvirt: Domain_Conf: Domain Deadlock Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" id="CVE-2014-7823" title="Libvirt: Dumpxml: Information Leak With Migratable Flag" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141131" id="1141131" title="Libvirt: Qemu: Out-Of-Bounds Read Access In Qemudomaingetblockiotune() Due To Invalid Index" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145667" id="1145667" title="Libvirt: Domain_Conf: Domain Deadlock Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1160817" id="1160817" title="Libvirt: Dumpxml: Information Leak With Migratable Flag" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1873.html" id="RHSA-2014:1873-1" title="Rhsa-2014:1873-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1911-1</id><title>Moderate: Ruby Security Update</title><description>Multiple denial of service flaws were found in the way the Ruby REXML XML parser performed expansion of parameter entities. A specially crafted XML document could cause REXML to use an excessive amount of CPU and memory. (CVE-2014-8080, CVE-2014-8090) 
All running instances of Ruby need to be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ruby-devel" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-devel-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">e8f642e966abd8d3e353a931273f85b990fdee8daa1a68889f73b76f358ac577</sum></package><package arch="i686" name="ruby-libs" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-libs-1.8.7.374-3.el6_6.i686.rpm</filename><sum type="sha256">9a7bec6a636165015c366ba22942161f1c0dec62f165d3684b21235056955b48</sum></package><package arch="x86_64" name="ruby-libs" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-libs-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">a60da5af9b848dae473a98c2e6da567e1c601f7210830cb72583e1141ed15ad4</sum></package><package arch="x86_64" name="ruby-rdoc" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-rdoc-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">b73d61c750c7d56470ba29fede3736356ce2f3758049073286a0c0c2c2dfd374</sum></package><package arch="x86_64" name="ruby-docs" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-docs-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">d78abb9f32bc49bab12c4307afeca2aeeaabf7aeb5b4404343db088de3609c44</sum></package><package arch="x86_64" name="ruby-static" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-static-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">d8312878b7a21e1173315cb667874419d3bfc430750180f1e55a48a718878d3b</sum></package><package arch="x86_64" name="ruby-ri" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-ri-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">826ad23c9b58b76a1b1dacf0dbe2451bb50ed249f0873664d872c7e94ab2c8d5</sum></package><package arch="x86_64" name="ruby" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">8cb56da48278a26677d85586ae7fc75c83957827c256d306d635e60485e6fb93</sum></package><package arch="x86_64" name="ruby-tcltk" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-tcltk-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">73baa0ca4826b26ba15e34b6bd3a9e376f6eb5d6d15a6b8d109bd47f2d864511</sum></package><package arch="i686" name="ruby-devel" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-devel-1.8.7.374-3.el6_6.i686.rpm</filename><sum type="sha256">63db0542a471bc6ef305918d74440118de7142c4622b9d365386d837fa64b9d9</sum></package><package arch="x86_64" name="ruby-irb" release="3.el6_6" src="ruby-1.8.7.374-3.el6_6.src.rpm" version="1.8.7.374"><filename>ruby-irb-1.8.7.374-3.el6_6.x86_64.rpm</filename><sum type="sha256">c267144a47e2c8b9548adfd4cf42061f63af314e6f02481e52896132028c7563</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" id="CVE-2014-8080" title="Ruby: Rexml Billion Laughs Attack Via Parameter Entity Expansion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" id="CVE-2014-8090" title="Ruby: Rexml Incomplete Fix For Cve-2014-8080" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1157709" id="1157709" title="Ruby: Rexml Billion Laughs Attack Via Parameter Entity Expansion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1159927" id="1159927" title="Ruby: Rexml Incomplete Fix For Cve-2014-8080" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1911.html" id="RHSA-2014:1911-1" title="Rhsa-2014:1911-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1919-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593) 
A flaw was found in the Alarm API, which could allow applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass the same-origin policy. (CVE-2014-1594) 
This update disables SSL 3.0 support by default in Firefox. Details on how to re-enable SSL 3.0 support are available at: 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="3.el6_6" src="firefox-31.3.0-3.el6_6.src.rpm" version="31.3.0"><filename>firefox-31.3.0-3.el6_6.i686.rpm</filename><sum type="sha256">8c71fe96f034de76b752a618a5b85f69406c21892b00e252361bf426b6df0c39</sum></package><package arch="x86_64" name="firefox" release="3.el6_6" src="firefox-31.3.0-3.el6_6.src.rpm" version="31.3.0"><filename>firefox-31.3.0-3.el6_6.x86_64.rpm</filename><sum type="sha256">ba985fc0e129c999e3af1b9950428a0764e0137de1d19cc85cff4902983abb7a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" id="CVE-2014-1587" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" id="CVE-2014-1590" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" id="CVE-2014-1592" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" id="CVE-2014-1593" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" id="CVE-2014-1594" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169201" id="1169201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169206" id="1169206" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169208" id="1169208" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169209" id="1169209" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169210" id="1169210" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1919.html" id="RHSA-2014:1919-1" title="Rhsa-2014:1919-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1924-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593) 
A flaw was found in the Alarm API, which could allow applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass the same-origin policy. (CVE-2014-1594) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
This update disables SSL 3.0 support by default in Thunderbird. Details on how to re-enable SSL 3.0 support are available at: 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_6" src="thunderbird-31.3.0-1.el6_6.src.rpm" version="31.3.0"><filename>thunderbird-31.3.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">d7d6e99161794f5835909fdf6713fab443adfd8d23250ae43c2cb9e71dfa3b46</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" id="CVE-2014-1587" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" id="CVE-2014-1590" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" id="CVE-2014-1592" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" id="CVE-2014-1593" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" id="CVE-2014-1594" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169201" id="1169201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169206" id="1169206" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169208" id="1169208" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169209" id="1169209" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169210" id="1169210" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1924.html" id="RHSA-2014:1924-1" title="Rhsa-2014:1924-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1948-1</id><title>Important: Nss, Nss-Util, And Nss-Softokn Security Update</title><description>This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. 
This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. 
The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. 
After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-devel" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-devel-3.16.2.3-3.el6_6.x86_64.rpm</filename><sum type="sha256">7ffd5752f1356dc7c01aa76e9fbe51cfb2ee5773cd04e7437741ad5add8910a3</sum></package><package arch="i686" name="nss-devel" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-devel-3.16.2.3-3.el6_6.i686.rpm</filename><sum type="sha256">26cdaad8d64b920111c9726341fa9aa106d803ec4e2ab321b813dd1824848c52</sum></package><package arch="i686" name="nss" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-3.16.2.3-3.el6_6.i686.rpm</filename><sum type="sha256">e480c75f5aa91b8f489675d302d48913a6ffd084fe8d963aa13069b810c83ae1</sum></package><package arch="x86_64" name="nss" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-3.16.2.3-3.el6_6.x86_64.rpm</filename><sum type="sha256">d1843262aba4bcbd8b6e70cf1093f0d079c0c646d90eae0a735541563830dc5a</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-pkcs11-devel-3.16.2.3-3.el6_6.i686.rpm</filename><sum type="sha256">29b8b9adcd2bd5a18026f1d0009002a9d8366363a7996f8c2a516a55418224ec</sum></package><package arch="x86_64" name="nss-util" release="2.el6_6" src="nss-util-3.16.2.3-2.el6_6.src.rpm" version="3.16.2.3"><filename>nss-util-3.16.2.3-2.el6_6.x86_64.rpm</filename><sum type="sha256">b7baf6cff488184e47b3b2ada67eb58acb8882af4d08cfb35da3a48a2d02652e</sum></package><package arch="i686" name="nss-util-devel" release="2.el6_6" src="nss-util-3.16.2.3-2.el6_6.src.rpm" version="3.16.2.3"><filename>nss-util-devel-3.16.2.3-2.el6_6.i686.rpm</filename><sum type="sha256">181a894552340d08574c27a075e5e6d5195f5cd44c5ef375f5f2a382cb2af035</sum></package><package arch="x86_64" name="nss-tools" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-tools-3.16.2.3-3.el6_6.x86_64.rpm</filename><sum type="sha256">85cad53fe58bba852aa61ac9838fae66937bb0fa07ce543e81f3b0d9fe9cba8f</sum></package><package arch="i686" name="nss-util" release="2.el6_6" src="nss-util-3.16.2.3-2.el6_6.src.rpm" version="3.16.2.3"><filename>nss-util-3.16.2.3-2.el6_6.i686.rpm</filename><sum type="sha256">a684f38d61c04db23e6d9dd256d8be8c0c011d6fdf685660588159c32c1efabf</sum></package><package arch="x86_64" name="nss-util-devel" release="2.el6_6" src="nss-util-3.16.2.3-2.el6_6.src.rpm" version="3.16.2.3"><filename>nss-util-devel-3.16.2.3-2.el6_6.x86_64.rpm</filename><sum type="sha256">a19be0082c0af1246cfb0446fa2dc6825b90da1a405a18edd419487beb06a466</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-sysinit-3.16.2.3-3.el6_6.x86_64.rpm</filename><sum type="sha256">cdd34f84c71ed996c01024cd77a09a27e77eaccfa70792f194666acb9ce3ee90</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el6_6" src="nss-3.16.2.3-3.el6_6.src.rpm" version="3.16.2.3"><filename>nss-pkcs11-devel-3.16.2.3-3.el6_6.x86_64.rpm</filename><sum type="sha256">c5ab7b92b37f95b8f8a96f34779b840cf0315f93dca16883c324584757c7ae01</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1948.html" id="RHSA-2014:1948-1" title="Rhsa-2014:1948-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1974-1</id><title>Important: Rpm Security Update</title><description>It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) 
All running applications linked against the RPM library must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="rpm-cron" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-cron-4.8.0-38.el6_6.noarch.rpm</filename><sum type="sha256">5e1dc2cd974dd4fd9daeb994576dcfe6850125374e4418944ba481c9d6620d08</sum></package><package arch="x86_64" name="rpm-python" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-python-4.8.0-38.el6_6.x86_64.rpm</filename><sum type="sha256">11ece1c6bea40ed208929a58dcfaf6756cb72053c5c6768f8d699913215cfd20</sum></package><package arch="x86_64" name="rpm-devel" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-devel-4.8.0-38.el6_6.x86_64.rpm</filename><sum type="sha256">2ae20e841830e5edf714cd7f451afabdea1665a10434d3aababd8a61a42e92b0</sum></package><package arch="x86_64" name="rpm" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-4.8.0-38.el6_6.x86_64.rpm</filename><sum type="sha256">801ba9c33bf29cbdc0cd6c36a650d3ee4670e8094adc565a01746a9522fedfc5</sum></package><package arch="x86_64" name="rpm-build" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-build-4.8.0-38.el6_6.x86_64.rpm</filename><sum type="sha256">5deaa63f21d2dd58fda23c8007a4ed499a973926a9b2f1ca3eff9b2b5132efe1</sum></package><package arch="i686" name="rpm-libs" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-libs-4.8.0-38.el6_6.i686.rpm</filename><sum type="sha256">09ce4dd39b287a39a739a616dc35719006c4bd7e831ad70a20b8ef2179569e54</sum></package><package arch="i686" name="rpm-devel" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-devel-4.8.0-38.el6_6.i686.rpm</filename><sum type="sha256">c54189a71c369b97554c580c4e538ba28ec57ad5b7733b0ccda506f36ed27c13</sum></package><package arch="noarch" name="rpm-apidocs" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-apidocs-4.8.0-38.el6_6.noarch.rpm</filename><sum type="sha256">74477f05a5804b1264021aa045a0fdb98edaa12260fa88e945582e1626e45df5</sum></package><package arch="x86_64" name="rpm-libs" release="38.el6_6" src="rpm-4.8.0-38.el6_6.src.rpm" version="4.8.0"><filename>rpm-libs-4.8.0-38.el6_6.x86_64.rpm</filename><sum type="sha256">7ca22ef2c34101931d57883c0d68a998a710ba6be70bec99af87de23e4b9eded</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" id="CVE-2013-6435" title="Rpm: Race Condition During The Installation Process" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039811" id="1039811" title="Rpm: Race Condition During The Installation Process" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1974.html" id="RHSA-2014:1974-1" title="Rhsa-2014:1974-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1983-1</id><title>Important: Xorg-X11-Server Security Update</title><description>Multiple integer overflow flaws and out-of-bounds write flaws were found in the way the X.Org server calculated memory requirements for certain X11 core protocol and GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2014-8092, CVE-2014-8093, CVE-2014-8098) 
It was found that the X.Org server did not properly handle SUN-DES-1 (Secure RPC) authentication credentials. A malicious, unauthenticated client could use this flaw to crash the X.Org server by submitting a specially crafted authentication request. (CVE-2014-8091) 
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server, or leak memory contents to the client. (CVE-2014-8097) 
An integer overflow flaw was found in the way the X.Org server calculated memory requirements for certain DRI2 extension requests. A malicious, authenticated client could use this flaw to crash the X.Org server. (CVE-2014-8094) 
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server. (CVE-2014-8095, CVE-2014-8096, CVE-2014-8099, CVE-2014-8100, CVE-2014-8101, CVE-2014-8102, CVE-2014-8103)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="xorg-x11-server-source" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-source-1.15.0-25.sl6.noarch.rpm</filename><sum type="sha256">dca18a630de35696bfb22c4486c8c475cfdbf5e38a96c4a2d493f7d93e30017b</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xvfb-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">74735a74a39c5f0f2e6dcb4ad0d5bce9a0b88d650bf7c20ff792216e09808800</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xdmx-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">254ffd5c9ca6693b527a4954ee517c7d3f11ccb2573133acf4116766ff90a041</sum></package><package arch="i686" name="xorg-x11-server-devel" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-devel-1.15.0-25.sl6.i686.rpm</filename><sum type="sha256">2bb754480a03b808575fef671115c0867f52dd0a2adf307b766db9c88922568d</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xorg-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">ebdd9a0d936a0a3ffb35df8b23776bd0bbec38e6c6fc562512854d7085d2c02d</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-devel-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">b85387d6fe41608ab5a38ca886c4d2893bbcdb0bb2b31f4344e250bb3a33f592</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-common-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">ec26c309947ac883439c5687fbee8bdf0424dacada07ae38b053a45edc0b6bbc</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xnest-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">57c158301628772005edd7df479ae0814788d4c193ac0799d6ba7ef4169f0cba</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="25.sl6" src="xorg-x11-server-1.15.0-25.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xephyr-1.15.0-25.sl6.x86_64.rpm</filename><sum type="sha256">d77467dea8ffc8f92a5e6406920e4def8847e3c8dbce3fba582bb255fb1f8c76</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" id="CVE-2014-8091" title="Xorg-X11-Server: Denial Of Service Due To Unchecked Malloc In Client Authentication" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" id="CVE-2014-8092" title="Xorg-X11-Server: Integer Overflow In X11 Core Protocol Requests When Calculating Memory Needs For Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" id="CVE-2014-8093" title="Xorg-X11-Server: Integer Overflow In Glx Extension Requests When Calculating Memory Needs For Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" id="CVE-2014-8094" title="Xorg-X11-Server: Integer Overflow In Dri2 Extension Function Procdri2Getbuffers()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" id="CVE-2014-8095" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xinput Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" id="CVE-2014-8096" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xc-Misc Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" id="CVE-2014-8097" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Dbe Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" id="CVE-2014-8098" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Glx Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" id="CVE-2014-8099" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xvideo Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" id="CVE-2014-8100" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Render Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" id="CVE-2014-8101" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Randr Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" id="CVE-2014-8102" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xfixes Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103" id="CVE-2014-8103" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Dri3 &amp; Present Extensions" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168680" id="1168680" title="Xorg-X11-Server: Denial Of Service Due To Unchecked Malloc In Client Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168684" id="1168684" title="Xorg-X11-Server: Integer Overflow In X11 Core Protocol Requests When Calculating Memory Needs For Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168688" id="1168688" title="Xorg-X11-Server: Integer Overflow In Glx Extension Requests When Calculating Memory Needs For Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168691" id="1168691" title="Xorg-X11-Server: Integer Overflow In Dri2 Extension Function Procdri2Getbuffers()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168694" id="1168694" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xinput Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168700" id="1168700" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xc-Misc Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168705" id="1168705" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Dbe Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168707" id="1168707" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Glx Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168710" id="1168710" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xvideo Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168711" id="1168711" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Render Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168713" id="1168713" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Randr Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168714" id="1168714" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xfixes Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168716" id="1168716" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Dri3 &amp; Present Extensions" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1983.html" id="RHSA-2014:1983-1" title="Rhsa-2014:1983-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1984-1</id><title>Important: Bind Security Update</title><description>A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-devel" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.30.rc1.el6_6.1.x86_64.rpm</filename><sum type="sha256">6314d2f9c53a8cc2e7a07052245db7516026bca5744ce451b0483ce59ed510a8</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.30.rc1.el6_6.1.x86_64.rpm</filename><sum type="sha256">6475ec6315d1afa0e225f0f8a7ccfafaef4d147d81410885dedf96daff0dba34</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.30.rc1.el6_6.1.x86_64.rpm</filename><sum type="sha256">b02a04c16c344f03b0bc0b35cb087cda915a2db202f37dc9244c0bf8311d764c</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.30.rc1.el6_6.1.x86_64.rpm</filename><sum type="sha256">43dfbb1c1c747773ab7353b64bb1ec88bda09d8d14e9579d3e5e2a066f430d69</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.30.rc1.el6_6.1.i686.rpm</filename><sum type="sha256">ab287e364f39d08195e471b6fc272eb6334ecc72b29a01cbd04ad8923462f1bf</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.30.rc1.el6_6.1.x86_64.rpm</filename><sum type="sha256">0cb13519d5b250b4d58305701bc466c4b2f5a7e5810b3ce1fa9635cd9ad2886f</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.30.rc1.el6_6.1.i686.rpm</filename><sum type="sha256">130b21424e93083be8f2fc772fc5ab92c26b851565ab2ac2a177ec29b7168119</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.30.rc1.el6_6.1" src="bind-9.8.2-0.30.rc1.el6_6.1.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.30.rc1.el6_6.1.x86_64.rpm</filename><sum type="sha256">60c282330a9079012129bf023817377f36041a836aeb8912e7faf6233ad31f38</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" id="CVE-2014-8500" title="Bind: Delegation Handling Denial Of Service" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171912" id="1171912" title="Bind: Delegation Handling Denial Of Service" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1984.html" id="RHSA-2014:1984-1" title="Rhsa-2014:1984-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1997-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the Linux kernel's SCTP implementation handled malformed or duplicate Address Configuration Change Chunks (ASCONF). A remote attacker could use either of these flaws to crash the system. (CVE-2014-3673, CVE-2014-3687, Important) 
* A flaw was found in the way the Linux kernel's SCTP implementation handled the association's output queue. A remote attacker could send specially crafted packets that would cause the system to use an excessive amount of memory, leading to a denial of service. (CVE-2014-3688, Important) 
* A stack overflow flaw caused by infinite recursion was found in the way the Linux kernel's UDF file system implementation processed indirect ICBs. An attacker with physical access to the system could use a specially crafted UDF image to crash the system. (CVE-2014-6410, Low) 
* It was found that the Linux kernel's networking implementation did not correctly handle the setting of the keepalive socket option on raw sockets. A local user able to create a raw socket could use this flaw to crash the system. (CVE-2012-6657, Low) 
* It was found that the parse_rock_ridge_inode_internal() function of the Linux kernel's ISOFS implementation did not correctly check relocated directories when processing Rock Ridge child link (CL) tags. An attacker with physical access to the system could use a specially crafted ISO image to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-5471, CVE-2014-5472, Low) 
Bug fixes: 
* This update fixes a race condition issue between the sock_queue_err_skb function and sk_forward_alloc handling in the socket error queue (MSG_ERRQUEUE), which could occasionally cause the kernel, for example when using PTP, to incorrectly track allocated memory for the error queue, in which case a traceback would occur in the system log. 
* The zcrypt device driver did not detect certain crypto cards and the related domains for crypto adapters on System z and s390x architectures. Consequently, it was not possible to run the system on new crypto hardware. This update enables toleration mode for such devices so that the system can make use of newer crypto hardware. 
* After mounting and unmounting an XFS file system several times consecutively, the umount command occasionally became unresponsive. This was caused by the xlog_cil_force_lsn() function that was not waiting for completion as expected. With this update, xlog_cil_force_lsn() has been modified to correctly wait for completion, thus fixing this bug. 
* When using the ixgbe adapter with disabled LRO and the tx-usec or rs- usec variables set to 0, transmit interrupts could not be set lower than the default of 8 buffered tx frames. Consequently, a delay of TCP transfer occurred. The restriction of a minimum of 8 buffered frames has been removed, and the TCP delay no longer occurs. 
* The offb driver has been updated for the QEMU standard VGA adapter, fixing an incorrect displaying of colors issue. 
* Under certain circumstances, when a discovered MTU expired, the IPv6 connection became unavailable for a short period of time. This bug has been fixed, and the connection now works as expected. 
* A low throughput occurred when using the dm-thin driver to write to unprovisioned or shared chunks for a thin pool with the chunk size bigger than the max_sectors_kb variable. 
* Large write workloads on thin LVs could cause the iozone and smallfile utilities to terminate unexpectedly.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-23 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">2fce7076b2a5fe03e0c44d9b7eb3c6e96b3634fc967e5d1b834970eb4a75c2f0</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.3.3.el6.noarch.rpm</filename><sum type="sha256">ce7b570f40259b3a8175b9b8b109da8a5c2c2456466c70b6220415ba57f1b51c</sum></package><package arch="x86_64" name="kernel" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">a163b46b4bbdb564d5abe9657a9ec2b370dc333af3947971a4128025ec66f79d</sum></package><package arch="x86_64" name="kernel-headers" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">2f6d2d9a72ad13292b255267c5959fb464e1c195925a2ee3c3a19736df727604</sum></package><package arch="x86_64" name="kernel-devel" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">e2a5c5cb62538d487d6c429e8fcc7ca3a8034ba65591ab5bdbf12240770b854c</sum></package><package arch="noarch" name="kernel-doc" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.3.3.el6.noarch.rpm</filename><sum type="sha256">131d9d7e5ce49b84e75091e3472624f2aad83892cc70de9d8572c36454b7ab09</sum></package><package arch="x86_64" name="python-perf" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">e9061304fe99dde42f40e2b4f44f228aaf6267abd357a16f1f2a96f5a74c9926</sum></package><package arch="noarch" name="kernel-firmware" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.3.3.el6.noarch.rpm</filename><sum type="sha256">e0b927ec5a0f5d8f25959caa6b28bf3bad28d30d694ef4b1a833f2a54429ee61</sum></package><package arch="x86_64" name="perf" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">53829b65e6b766615855ab0e37707c44103eaae169957f973e0622e95d2f57d3</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.3.3.el6" src="kernel-2.6.32-504.3.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.3.3.el6.x86_64.rpm</filename><sum type="sha256">88168ff338f1570c817e0b764b279905e3b24d9d90b0154f34c3cdbf018da8b9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657" id="CVE-2012-6657" title="Kernel: Net: Guard Tcp_Set_Keepalive Against Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" id="CVE-2014-3673" title="Kernel: Sctp: Skb_Over_Panic When Receiving Malformed Asconf Chunks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" id="CVE-2014-3687" title="Kernel: Net: Sctp: Fix Panic On Duplicate Asconf Chunks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" id="CVE-2014-3688" title="Kernel: Net: Sctp: Remote Memory Pressure From Excessive Queueing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" id="CVE-2014-5471" title="Kernel: Isofs: Unbound Recursion When Processing Relocated Directories" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" id="CVE-2014-5472" title="Kernel: Isofs: Unbound Recursion When Processing Relocated Directories" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410" id="CVE-2014-6410" title="Kernel: Udf: Avoid Infinite Loop When Processing Indirect Icbs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" id="CVE-2014-9322" title="Kernel: X86: Local Privesc Due To Bad_Iret And Paranoid Entry Incompatibility" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1134099" id="1134099" title="Kernel: Isofs: Unbound Recursion When Processing Relocated Directories" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141742" id="1141742" title="Kernel: Net: Guard Tcp_Set_Keepalive Against Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141809" id="1141809" title="Kernel: Udf: Avoid Infinite Loop When Processing Indirect Icbs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1147850" id="1147850" title="Kernel: Sctp: Skb_Over_Panic When Receiving Malformed Asconf Chunks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155731" id="1155731" title="Kernel: Net: Sctp: Fix Panic On Duplicate Asconf Chunks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155745" id="1155745" title="Kernel: Net: Sctp: Remote Memory Pressure From Excessive Queueing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1172806" id="1172806" title="Kernel: X86: Local Privesc Due To Bad_Iret And Paranoid Entry Incompatibility" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1997.html" id="RHSA-2014:1997-1" title="Rhsa-2014:1997-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:1999-1</id><title>Moderate: Mailx Security Update</title><description>A flaw was found in the way mailx handled the parsing of email addresses. A syntactically valid email address could allow a local attacker to cause mailx to execute arbitrary shell commands through shell meta-characters and the direct command execution functionality. (CVE-2004-2771, CVE-2014-7844) 
Note: Applications using mailx to send email to addresses obtained from untrusted sources will still remain vulnerable to other attacks if they accept email addresses which start with "-" (so that they can be confused with mailx options). To counteract this issue, this update also introduces the "--" option, which will treat the remaining command line arguments as email addresses.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-12-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mailx" release="8.el6_6" src="mailx-12.4-8.el6_6.src.rpm" version="12.4"><filename>mailx-12.4-8.el6_6.x86_64.rpm</filename><sum type="sha256">c6878efbfb226151e410b3605fa5aa78c67ddd9ffca49a25b297ccbc0ad22f8c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" id="CVE-2004-2771" title="Mailx: Command Execution Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" id="CVE-2014-7844" title="Mailx: Command Execution Flaw" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1162783" id="1162783" title="Mailx: Command Execution Flaw" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-1999.html" id="RHSA-2014:1999-1" title="Rhsa-2014:1999-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:2021-1</id><title>Important: Jasper Security Update</title><description>Multiple off-by-one flaws, leading to heap-based buffer overflows, were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-9029) 
A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8138) 
A double free flaw was found in the way JasPer parsed ICC color profiles in JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8137) 
All applications using the JasPer libraries must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-23 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="jasper-libs" release="16.el6_6.2" src="jasper-1.900.1-16.el6_6.2.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-16.el6_6.2.i686.rpm</filename><sum type="sha256">bf8072102d363d7f123158fd8cf7cfee448a5c3b62ae5498997288b3a6f92b99</sum></package><package arch="x86_64" name="jasper-libs" release="16.el6_6.2" src="jasper-1.900.1-16.el6_6.2.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-16.el6_6.2.x86_64.rpm</filename><sum type="sha256">ef86e7d4fefeee7ca1b9d3dcdfebedaa59e646f6759073c5bc1ca9eff61108c1</sum></package><package arch="x86_64" name="jasper-utils" release="16.el6_6.2" src="jasper-1.900.1-16.el6_6.2.src.rpm" version="1.900.1"><filename>jasper-utils-1.900.1-16.el6_6.2.x86_64.rpm</filename><sum type="sha256">82e8cbd53d5ce5c8251a3c8b4fb8a78954b6088e47ec56f7983678a7f14e6861</sum></package><package arch="x86_64" name="jasper-devel" release="16.el6_6.2" src="jasper-1.900.1-16.el6_6.2.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-16.el6_6.2.x86_64.rpm</filename><sum type="sha256">a150813207bd0a87df75b218a4ae91bf7f5cde64d8dbee42453496fbbf76f8ca</sum></package><package arch="i686" name="jasper-devel" release="16.el6_6.2" src="jasper-1.900.1-16.el6_6.2.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-16.el6_6.2.i686.rpm</filename><sum type="sha256">40cb7c376f1616e38c083ddd0c51b16f78ca7ea2b1f2036d264b18d64a7d05f1</sum></package><package arch="x86_64" name="jasper" release="16.el6_6.2" src="jasper-1.900.1-16.el6_6.2.src.rpm" version="1.900.1"><filename>jasper-1.900.1-16.el6_6.2.x86_64.rpm</filename><sum type="sha256">17799de1880d9d2752073fbe63cadb6f8f39109827c87e7e247266da3d96e8b6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" id="CVE-2014-8137" title="Jasper: Double-Free In In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" id="CVE-2014-8138" title="Jasper: Heap Overflow In Jp2_Decode() " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" id="CVE-2014-9029" title="Jasper: Incorrect Component Number Check In Coc, " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167537" id="1167537" title="Jasper: Incorrect Component Number Check In Coc, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173157" id="1173157" title="Jasper: Double-Free In In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173162" id="1173162" title="Jasper: Heap Overflow In Jp2_Decode() " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-2021.html" id="RHSA-2014:2021-1" title="Rhsa-2014:2021-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2014:2024-1</id><title>Important: Ntp Security Update</title><description>Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(), ctl_putdata(), and configure() functions. A remote attacker could use either of these flaws to send a specially crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the ntp user. Note: the crypto_recv() flaw requires non- default configurations to be active, while the ctl_putdata() flaw, by default, can only be exploited via local attackers, and the configure() flaw requires additional authentication to exploit. (CVE-2014-9295) 
It was found that ntpd automatically generated weak keys for its internal use if no ntpdc request authentication key was specified in the ntp.conf configuration file. A remote attacker able to match the configured IP restrictions could guess the generated key, and possibly use it to send ntpdc query or configuration requests. (CVE-2014-9293) 
It was found that ntp-keygen used a weak method for generating MD5 keys. This could possibly allow an attacker to guess generated MD5 keys that could then be used to spoof an NTP client or server. Note: it is recommended to regenerate any MD5 keys that had explicitly been generated with ntp-keygen; the default installation does not contain such keys). (CVE-2014-9294) 
A missing return statement in the receive() function could potentially allow a remote attacker to bypass NTP's authentication mechanism. (CVE-2014-9296) 
After installing the update, the ntpd daemon will restart automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntp" release="2.el6_6" src="ntp-4.2.6p5-2.el6_6.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-2.el6_6.x86_64.rpm</filename><sum type="sha256">8486b2e335afd1e1d3ee78b57cfe6b3e3d4b58b454663e64c5d42f5e1524ccae</sum></package><package arch="x86_64" name="ntpdate" release="2.el6_6" src="ntp-4.2.6p5-2.el6_6.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-2.el6_6.x86_64.rpm</filename><sum type="sha256">2995a90f8d6a26b2ad06c1ea5b4e1367fda9066e435ab013f1685eaad4230f67</sum></package><package arch="x86_64" name="ntp-perl" release="2.el6_6" src="ntp-4.2.6p5-2.el6_6.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm</filename><sum type="sha256">e5f4cc5dd4e5cdf1930759bde850ffcb89384390518504a744ff40adbb84a902</sum></package><package arch="noarch" name="ntp-doc" release="2.el6_6" src="ntp-4.2.6p5-2.el6_6.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-2.el6_6.noarch.rpm</filename><sum type="sha256">d473e04f9c42c6c54063606f93733f1824262176148fbe30cf81f4e192b9d26e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" id="CVE-2014-9293" title="Ntp: Automatic Generation Of Weak Default Key In Config_Auth()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" id="CVE-2014-9294" title="Ntp: Ntp-Keygen Uses Weak Random Number Generator And Seed When Generating Md5 Keys" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" id="CVE-2014-9295" title="Ntp: Multiple Buffer Overflows Via Specially-Crafted Packets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" id="CVE-2014-9296" title="Ntp: Receive() Missing Return On Error" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176032" id="1176032" title="Ntp: Automatic Generation Of Weak Default Key In Config_Auth()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176035" id="1176035" title="Ntp: Ntp-Keygen Uses Weak Random Number Generator And Seed When Generating Md5 Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176037" id="1176037" title="Ntp: Multiple Buffer Overflows Via Specially-Crafted Packets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176040" id="1176040" title="Ntp: Receive() Missing Return On Error" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2014-2024.html" id="RHSA-2014:2024-1" title="Rhsa-2014:2024-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0016-1</id><title>Moderate: Glibc Security Update</title><description>An out-of-bounds read flaw was found in the way glibc's iconv() function converted certain encoded data to UTF-8. An attacker able to make an application call the iconv() function with a specially crafted argument could use this flaw to crash that application. (CVE-2014-6040) 
It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application. (CVE-2014-7817) 
This update also fixes the following bugs: 
* Previously, when an address lookup using the getaddrinfo() function for the AF_UNSPEC value was performed on a defective DNS server, the server in some cases responded with a valid response for the A record, but a referral response for the AAAA record, which resulted in a lookup failure. A prior update was implemented for getaddrinfo() to return the valid response, but it contained a typographical error, due to which the lookup could under some circumstances still fail. This error has been corrected and getaddrinfo() now returns a valid response in the described circumstances. 
* An error in the dlopen() library function previously caused recursive calls to dlopen() to terminate unexpectedly or to abort with a library assertion. This error has been fixed and recursive calls to dlopen() no longer crash or abort.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-01-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="glibc-devel" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6_6.4.i686.rpm</filename><sum type="sha256">3310e6358138ef9a9b23e21752ed0659d47e4af069c318604b090ab6040d4bd8</sum></package><package arch="i686" name="glibc-static" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6_6.4.i686.rpm</filename><sum type="sha256">3b12d165ba0a2d810118c2874e6cec10fb34c17b3bff17a2ee71bdae4629dc08</sum></package><package arch="i686" name="glibc" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6_6.4.i686.rpm</filename><sum type="sha256">7ac6c822ac1c6ad766fb25732e2563393390992ce4f4cb20c08b4e8bf7f1cc92</sum></package><package arch="x86_64" name="glibc-common" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-common-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">1e779c2124fc5e190cd088a2bfd06a727132e2ecd6b58eaa62b40f116682cb26</sum></package><package arch="x86_64" name="glibc-devel" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">da4a422b84bf3ba116ec1a9b5cb708ba365fdf0e3965d825d19c94475293c7e2</sum></package><package arch="x86_64" name="glibc-static" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">b59927bb5bc3031608ce875930c61bb6f42a18bb2b3ac437b34ed26aca38e8dc</sum></package><package arch="x86_64" name="nscd" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>nscd-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">62b68a878b3b6b9c3380cf4cf4811577bea35ffdcd47d2691a74aab2f3c0f4a9</sum></package><package arch="x86_64" name="glibc-headers" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">b5945cb82a655380a669eb1603ffae6851274d2f9466bfc74e74b83f790834d9</sum></package><package arch="x86_64" name="glibc-utils" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">96cc454c54d158e2e3c79d662df03f4bd80aec0e64720106f67348c220acd82b</sum></package><package arch="x86_64" name="glibc" release="1.149.el6_6.4" src="glibc-2.12-1.149.el6_6.4.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6_6.4.x86_64.rpm</filename><sum type="sha256">5fd92bfc07fe5d28a3faae873bdc5736ca7627ed9682ba21f538ee02e4972cdf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" id="CVE-2014-6040" title="Glibc: Crash In Code Page Decoding Functions (Ibm933, Ibm935, Ibm937, Ibm939, Ibm1364)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" id="CVE-2014-7817" title="Glibc: Command Execution In Wordexp() With Wrde_Nocmd Specified" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135841" id="1135841" title="Glibc: Crash In Code Page Decoding Functions (Ibm933, Ibm935, Ibm937, Ibm939, Ibm1364)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1157689" id="1157689" title="Glibc: Command Execution In Wordexp() With Wrde_Nocmd Specified" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0016.html" id="RHSA-2015:0016-1" title="Rhsa-2015:0016-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0046-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-8634, CVE-2014-8639, CVE-2014-8641) 
It was found that the Beacon interface implementation in Firefox did not follow the Cross-Origin Resource Sharing (CORS) specification. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (XSRF) attack. (CVE-2014-8638) 
This update also fixes the following bug: 
* The default dictionary for Firefox's spell checker is now correctly set to the system's locale language. 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-01-20 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_6" src="firefox-31.4.0-1.el6_6.src.rpm" version="31.4.0"><filename>firefox-31.4.0-1.el6_6.i686.rpm</filename><sum type="sha256">051a23ba6d9137cad1fd960bead07b1c66cce082436d41a89a06c01891368cb2</sum></package><package arch="x86_64" name="firefox" release="1.el6_6" src="firefox-31.4.0-1.el6_6.src.rpm" version="31.4.0"><filename>firefox-31.4.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">8c91a035bd07975da33987653f5b2170702110a8241ba5fc02af97d9e970815a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" id="CVE-2014-8634" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" id="CVE-2014-8638" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" id="CVE-2014-8639" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" id="CVE-2014-8641" title="Mozilla: Read-After-Free In Webrtc (Mfsa 2015-06)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150572" id="1150572" title="Default Spellchecker Dictionary Is Not Correct For Firefox" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180962" id="1180962" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180966" id="1180966" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180967" id="1180967" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180973" id="1180973" title="Mozilla: Read-After-Free In Webrtc (Mfsa 2015-06)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=643954" id="643954" title="Default Spellchecker Dictionary Is Not Correct For Firefox" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0046.html" id="RHSA-2015:0046-1" title="Rhsa-2015:0046-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0047-1</id><title>Important: Thunderbird Security Update</title><description>Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-8634, CVE-2014-8639) 
It was found that the Beacon interface implementation in Thunderbird did not follow the Cross-Origin Resource Sharing (CORS) specification. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (XSRF) attack. (CVE-2014-8638) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-20 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_6" src="thunderbird-31.4.0-1.el6_6.src.rpm" version="31.4.0"><filename>thunderbird-31.4.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">8b9e2893785a1e5e2ebbee80da0d37cdee25fbdf4d48c49524c767d06ea63e15</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" id="CVE-2014-8634" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" id="CVE-2014-8638" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" id="CVE-2014-8639" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180962" id="1180962" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180966" id="1180966" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180967" id="1180967" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0047.html" id="RHSA-2015:0047-1" title="Rhsa-2015:0047-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0066-1</id><title>Moderate: Openssl Security Update</title><description>A NULL pointer dereference flaw was found in the DTLS implementation of OpenSSL. A remote attacker could send a specially crafted DTLS message, which would cause an OpenSSL server to crash. (CVE-2014-3571) 
A memory leak flaw was found in the way the dtls1_buffer_record() function of OpenSSL parsed certain DTLS messages. A remote attacker could send multiple specially crafted DTLS messages to exhaust all available memory of a DTLS server. (CVE-2015-0206) 
It was found that OpenSSL's BigNumber Squaring implementation could produce incorrect results under certain special conditions. This flaw could possibly affect certain OpenSSL library functionality, such as RSA blinding. Note that this issue occurred rarely and with a low probability, and there is currently no known way of exploiting it. (CVE-2014-3570) 
It was discovered that OpenSSL would perform an ECDH key exchange with a non-ephemeral key even when the ephemeral ECDH cipher suite was selected. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method than the one requested by the user. (CVE-2014-3572) 
It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method. (CVE-2015-0204) 
Multiple flaws were found in the way OpenSSL parsed X.509 certificates. An attacker could use these flaws to modify an X.509 certificate to produce a certificate with a different fingerprint without invalidating its signature, and possibly bypass fingerprint-based blacklisting in applications. (CVE-2014-8275) 
It was found that an OpenSSL server would, under certain conditions, accept Diffie-Hellman client certificates without the use of a private key. An attacker could use a user's client certificate to authenticate as that user, without needing the private key. (CVE-2015-0205) 
For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl" release="30.el6_6.5" src="openssl-1.0.1e-30.el6_6.5.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.5.i686.rpm</filename><sum type="sha256">5ed11676d6f001e4796976f0d8c7823cdc44519d12e15ae1983d60283b45a4ca</sum></package><package arch="x86_64" name="openssl-perl" release="30.el6_6.5" src="openssl-1.0.1e-30.el6_6.5.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-30.el6_6.5.x86_64.rpm</filename><sum type="sha256">013ade71c7181d84cd629e572c5ff8a05b5de9003ccd64027036a8017a2e6b5e</sum></package><package arch="x86_64" name="openssl-devel" release="30.el6_6.5" src="openssl-1.0.1e-30.el6_6.5.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.5.x86_64.rpm</filename><sum type="sha256">a5f4cc5e03970b01e985182c99aad9daa49cc7122641006e4b421ed3b7d96005</sum></package><package arch="x86_64" name="openssl-static" release="30.el6_6.5" src="openssl-1.0.1e-30.el6_6.5.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-30.el6_6.5.x86_64.rpm</filename><sum type="sha256">54545245c9be8b3110e73e9153a26fd96df0d1def7c57a0a88ecb1d006a36911</sum></package><package arch="x86_64" name="openssl" release="30.el6_6.5" src="openssl-1.0.1e-30.el6_6.5.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.5.x86_64.rpm</filename><sum type="sha256">34f13082bfdc8d26d0c2e130ad9b1623ebd4458ded9403ad96a6e3e6388897f9</sum></package><package arch="i686" name="openssl-devel" release="30.el6_6.5" src="openssl-1.0.1e-30.el6_6.5.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.5.i686.rpm</filename><sum type="sha256">604112f17978673c96039848991883dfae8f58994f9bb73358c672fd44279252</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" id="CVE-2014-3570" title="Openssl: Bignum Squaring May Produce Incorrect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" id="CVE-2014-3571" title="Openssl: Dtls Segmentation Fault In Dtls1_Get_Record" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" id="CVE-2014-3572" title="Openssl: Ecdh Downgrade Bug Fix" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" id="CVE-2014-8275" title="Openssl: Fix Various Certificate Fingerprint Issues" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" id="CVE-2015-0204" title="Openssl: Only Allow Ephemeral Rsa Keys In Export " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" id="CVE-2015-0205" title="Openssl: Dh Client Certificates Accepted Without " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" id="CVE-2015-0206" title="Openssl: Dtls Memory Leak In Dtls1_Buffer_Record" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180184" id="1180184" title="Openssl: Only Allow Ephemeral Rsa Keys In Export " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180185" id="1180185" title="Openssl: Ecdh Downgrade Bug Fix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180187" id="1180187" title="Openssl: Fix Various Certificate Fingerprint Issues" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180234" id="1180234" title="Openssl: Dtls Segmentation Fault In Dtls1_Get_Record" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180235" id="1180235" title="Openssl: Dtls Memory Leak In Dtls1_Buffer_Record" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180239" id="1180239" title="Openssl: Dh Client Certificates Accepted Without " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180240" id="1180240" title="Openssl: Bignum Squaring May Produce Incorrect " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0066.html" id="RHSA-2015:0066-1" title="Rhsa-2015:0066-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0067-1</id><title>Critical: Java-1.7.0-Openjdk Security Update</title><description>A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. (CVE-2014-6601) 
Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-0412, CVE-2015-0408) 
A flaw was found in the way the Hotspot garbage collector handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0395) 
A flaw was found in the way the DER (Distinguished Encoding Rules) decoder in the Security component in OpenJDK handled negative length values. A specially crafted, DER-encoded input could cause a Java application to enter an infinite loop when decoded. (CVE-2015-0410) 
A flaw was found in the way the SSL 3.0 protocol handled padding bytes when decrypting messages that were encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw could possibly allow a man-in-the- middle (MITM) attacker to decrypt portions of the cipher text using a padding oracle attack. (CVE-2014-3566) 
It was discovered that the SSL/TLS implementation in the JSSE component in OpenJDK failed to properly check whether the ChangeCipherSpec was received during the SSL/TLS connection handshake. An MITM attacker could possibly use this flaw to force a connection to be established without encryption being enabled. (CVE-2014-6593) 
An information leak flaw was found in the Swing component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0407) 
A NULL pointer dereference flaw was found in the MulticastSocket implementation in the Libraries component of OpenJDK. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2014-6587) 
Multiple boundary check flaws were found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could allow an untrusted Java application or applet to disclose portions of the Java Virtual Machine memory. (CVE-2014-6585, CVE-2014-6591) 
Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. (CVE-2015-0383) 
The CVE-2015-0383 issue was discovered by Red Hat. 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.5.4.0.el6_6" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.x86_64.rpm</filename><sum type="sha256">7935051b8ba81885c5e31da13f11df3c80007ef94de4dd35c64dd5e6202ae9c7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.4.0.el6_6" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.0.el6_6.x86_64.rpm</filename><sum type="sha256">e9942e8a765e352187ffeca6ed5c6d20f3708e3316b15772d3246d236e01b639</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.4.0.el6_6" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.0.el6_6.x86_64.rpm</filename><sum type="sha256">113abcfa9834d5826f25703c78a4388710aee61cb2821a9839239b348525fc0f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.4.0.el6_6" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-src-1.7.0.75-2.5.4.0.el6_6.x86_64.rpm</filename><sum type="sha256">7e988f50e0cb6845286a978fc39ffd2647f12d0ce2f5d3c97258b325f969f5b1</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.4.0.el6_6" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.0.el6_6.noarch.rpm</filename><sum type="sha256">d11c9889ac162a717f59e29e0de3570d35f7231d872db7ba80c71f91da154f7c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" id="CVE-2014-6585" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" id="CVE-2014-6587" title="Openjdk: Multicastsocket Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" id="CVE-2014-6591" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" id="CVE-2014-6593" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" id="CVE-2014-6601" title="Openjdk: Class Verifier Insufficient " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" id="CVE-2015-0383" title="Openjdk: Insecure Hsperfdata Temporary File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" id="CVE-2015-0395" title="Openjdk: Phantom References Handling Issue In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" id="CVE-2015-0407" title="Openjdk: Directory Information Leak Via File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" id="CVE-2015-0408" title="Openjdk: Incorrect Context Class Loader Use In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" id="CVE-2015-0410" title="Openjdk: Der Decoder Infinite Loop (Security, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" id="CVE-2015-0412" title="Openjdk: Insufficient Code Privileges Checks " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123870" id="1123870" title="Openjdk: Insecure Hsperfdata Temporary File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183020" id="1183020" title="Openjdk: Class Verifier Insufficient " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183021" id="1183021" title="Openjdk: Insufficient Code Privileges Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183023" id="1183023" title="Openjdk: Incorrect Context Class Loader Use In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183031" id="1183031" title="Openjdk: Phantom References Handling Issue In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183043" id="1183043" title="Openjdk: Directory Information Leak Via File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183044" id="1183044" title="Openjdk: Der Decoder Infinite Loop (Security, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183049" id="1183049" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183645" id="1183645" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183646" id="1183646" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183715" id="1183715" title="Openjdk: Multicastsocket Null Pointer " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0067.html" id="RHSA-2015:0067-1" title="Rhsa-2015:0067-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0069-1</id><title>Important: Java-1.8.0-Openjdk Security Update</title><description>Multiple flaws were found in the way the Hotspot component in OpenJDK verified bytecode from the class files, and in the way this component generated code for bytecode. An untrusted Java application or applet could possibly use these flaws to bypass Java sandbox restrictions. (CVE-2014-6601, CVE-2015-0437) 
Multiple improper permission check issues were discovered in the JAX-WS, Libraries, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-0412, CVE-2014-6549, CVE-2015-0408) 
A flaw was found in the way the Hotspot garbage collector handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0395) 
A flaw was found in the way the DER (Distinguished Encoding Rules) decoder in the Security component in OpenJDK handled negative length values. A specially crafted, DER-encoded input could cause a Java application to enter an infinite loop when decoded. (CVE-2015-0410) 
A flaw was found in the way the SSL 3.0 protocol handled padding bytes when decrypting messages that were encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw could possibly allow a man-in-the- middle (MITM) attacker to decrypt portions of the cipher text using a padding oracle attack. (CVE-2014-3566) 
It was discovered that the SSL/TLS implementation in the JSSE component in OpenJDK failed to properly check whether the ChangeCipherSpec was received during the SSL/TLS connection handshake. An MITM attacker could possibly use this flaw to force a connection to be established without encryption being enabled. (CVE-2014-6593) 
An information leak flaw was found in the Swing component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0407) 
A NULL pointer dereference flaw was found in the MulticastSocket implementation in the Libraries component of OpenJDK. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2014-6587) 
Multiple boundary check flaws were found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could allow an untrusted Java application or applet to disclose portions of the Java Virtual Machine memory. (CVE-2014-6585, CVE-2014-6591) 
Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. (CVE-2015-0383) 
The CVE-2015-0383 issue was discovered by Red Hat. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.src.rpm" version="1.8.0.31"><filename>java-1.8.0-openjdk-javadoc-1.8.0.31-1.b13.el6_6.noarch.rpm</filename><sum type="sha256">b58ef371e95772727d7ff92ad5432a9a32201d1368b5616b638a7c3aa68bd658</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.src.rpm" version="1.8.0.31"><filename>java-1.8.0-openjdk-devel-1.8.0.31-1.b13.el6_6.x86_64.rpm</filename><sum type="sha256">f3ab641be422f2cf3ca366e990b21dc78589b1d4871b567635d5a8d35adb0cbb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.src.rpm" version="1.8.0.31"><filename>java-1.8.0-openjdk-headless-1.8.0.31-1.b13.el6_6.x86_64.rpm</filename><sum type="sha256">6580a919c6c3ca59efd5e71d831a75432833afa21c4d543701317ad1e937bd53</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.src.rpm" version="1.8.0.31"><filename>java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.x86_64.rpm</filename><sum type="sha256">52f89c3a631b8f252c70fa8ac87159a283136fd69a7838d0d352636e0d53d2c0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.src.rpm" version="1.8.0.31"><filename>java-1.8.0-openjdk-src-1.8.0.31-1.b13.el6_6.x86_64.rpm</filename><sum type="sha256">63aae4f81ac3b289186e391495c3a119fcc71497db179bccf2885d47cc09d5fa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.31-1.b13.el6_6.src.rpm" version="1.8.0.31"><filename>java-1.8.0-openjdk-demo-1.8.0.31-1.b13.el6_6.x86_64.rpm</filename><sum type="sha256">3e0a4e5c2e1cc1b69aceb65ec3b34c1d6b15797d28ef009d526e064c1da00b67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6549" id="CVE-2014-6549" title="Openjdk: Incorrect Class Loader Permission Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" id="CVE-2014-6585" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" id="CVE-2014-6587" title="Openjdk: Multicastsocket Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" id="CVE-2014-6591" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" id="CVE-2014-6593" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" id="CVE-2014-6601" title="Openjdk: Class Verifier Insufficient " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" id="CVE-2015-0383" title="Openjdk: Insecure Hsperfdata Temporary File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" id="CVE-2015-0395" title="Openjdk: Phantom References Handling Issue In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" id="CVE-2015-0407" title="Openjdk: Directory Information Leak Via File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" id="CVE-2015-0408" title="Openjdk: Incorrect Context Class Loader Use In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" id="CVE-2015-0410" title="Openjdk: Der Decoder Infinite Loop (Security, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" id="CVE-2015-0412" title="Openjdk: Insufficient Code Privileges Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0437" id="CVE-2015-0437" title="Openjdk: Code Generation Issue (Hotspot, 8064524)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123870" id="1123870" title="Openjdk: Insecure Hsperfdata Temporary File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183020" id="1183020" title="Openjdk: Class Verifier Insufficient " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183021" id="1183021" title="Openjdk: Insufficient Code Privileges Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183023" id="1183023" title="Openjdk: Incorrect Context Class Loader Use In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183031" id="1183031" title="Openjdk: Phantom References Handling Issue In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183043" id="1183043" title="Openjdk: Directory Information Leak Via File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183044" id="1183044" title="Openjdk: Der Decoder Infinite Loop (Security, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183049" id="1183049" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183645" id="1183645" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183646" id="1183646" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183660" id="1183660" title="Openjdk: Incorrect Class Loader Permission Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183670" id="1183670" title="Openjdk: Code Generation Issue (Hotspot, 8064524)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183715" id="1183715" title="Openjdk: Multicastsocket Null Pointer " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0069.html" id="RHSA-2015:0069-1" title="Rhsa-2015:0069-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0074-1</id><title>Important: Jasper Security Update</title><description>An off-by-one flaw, leading to a heap-based buffer overflow, was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8157) 
An unrestricted stack memory use flaw was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2014-8158) 
All applications using the JasPer libraries must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="jasper-utils" release="16.el6_6.3" src="jasper-1.900.1-16.el6_6.3.src.rpm" version="1.900.1"><filename>jasper-utils-1.900.1-16.el6_6.3.x86_64.rpm</filename><sum type="sha256">fcf8e4d6526679382f53a9f1f31cca53daf83bcf9c788c461c574330c03211ae</sum></package><package arch="x86_64" name="jasper" release="16.el6_6.3" src="jasper-1.900.1-16.el6_6.3.src.rpm" version="1.900.1"><filename>jasper-1.900.1-16.el6_6.3.x86_64.rpm</filename><sum type="sha256">589819f521bf522fc3709e10fb458e00a1bfef0270bf0b75f9cff76b78a4abc7</sum></package><package arch="i686" name="jasper-devel" release="16.el6_6.3" src="jasper-1.900.1-16.el6_6.3.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-16.el6_6.3.i686.rpm</filename><sum type="sha256">6533deb5149a074ccd853f21c5191bce7abe63fca1436c4437be2c7c4c5198e9</sum></package><package arch="x86_64" name="jasper-libs" release="16.el6_6.3" src="jasper-1.900.1-16.el6_6.3.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-16.el6_6.3.x86_64.rpm</filename><sum type="sha256">089417f3556bd69aee4fc1337a5e7dc43abae7b10db021b469812bbc77ded03b</sum></package><package arch="i686" name="jasper-libs" release="16.el6_6.3" src="jasper-1.900.1-16.el6_6.3.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-16.el6_6.3.i686.rpm</filename><sum type="sha256">a627742200d52b7ccc1afe653f6a48a4d6460f1f0f8d07a4f70a598db935ac3a</sum></package><package arch="x86_64" name="jasper-devel" release="16.el6_6.3" src="jasper-1.900.1-16.el6_6.3.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-16.el6_6.3.x86_64.rpm</filename><sum type="sha256">90d8c3b23f8375878bbb1d86b9e000d03e40840e69c25fea7cc5ce400da1c0ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157" id="CVE-2014-8157" title="Jasper: Dec-&gt;Numtiles Off-By-One Check In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158" id="CVE-2014-8158" title="Jasper: Unrestricted Stack Memory Use In " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179282" id="1179282" title="Jasper: Dec-&gt;Numtiles Off-By-One Check In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179298" id="1179298" title="Jasper: Unrestricted Stack Memory Use In " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0074.html" id="RHSA-2015:0074-1" title="Rhsa-2015:0074-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0085-1</id><title>Important: Java-1.6.0-Openjdk Security Update</title><description>A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. (CVE-2014-6601) 
Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-0412, CVE-2015-0408) 
A flaw was found in the way the Hotspot garbage collector handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0395) 
A flaw was found in the way the DER (Distinguished Encoding Rules) decoder in the Security component in OpenJDK handled negative length values. A specially crafted, DER-encoded input could cause a Java application to enter an infinite loop when decoded. (CVE-2015-0410) 
A flaw was found in the way the SSL 3.0 protocol handled padding bytes when decrypting messages that were encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw could possibly allow a man-in-the- middle (MITM) attacker to decrypt portions of the cipher text using a padding oracle attack. (CVE-2014-3566) 
It was discovered that the SSL/TLS implementation in the JSSE component in OpenJDK failed to properly check whether the ChangeCipherSpec was received during the SSL/TLS connection handshake. An MITM attacker could possibly use this flaw to force a connection to be established without encryption being enabled. (CVE-2014-6593) 
An information leak flaw was found in the Swing component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0407) 
A NULL pointer dereference flaw was found in the MulticastSocket implementation in the Libraries component of OpenJDK. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2014-6587) 
Multiple boundary check flaws were found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could allow an untrusted Java application or applet to disclose portions of the Java Virtual Machine memory. (CVE-2014-6585, CVE-2014-6591) 
Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. (CVE-2015-0383) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.6.1.el6_6" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm</filename><sum type="sha256">28e312f2a44d8d9856c3eeff3559cc3254abcd5980c7416279b1e7fe9b541681</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.6.1.el6_6" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm</filename><sum type="sha256">f82f7be824259d9985737e48ad1ed9323fa757108a91e369539df0b017c235a2</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.6.1.el6_6" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm</filename><sum type="sha256">981934606970f4110c9e47f198bd896dd66600485be5c96575922e80a3cc8cee</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.6.1.el6_6" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm</filename><sum type="sha256">365155c13c78327783c144c395dd9a32bee2ffc7b508d3492785587ec6934d98</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.6.1.el6_6" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm</filename><sum type="sha256">e4d8705f0c3469f22b274c0aa7bc2e784fadcc5ce82d2ddaeafc95f73741dfff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" id="CVE-2014-6585" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" id="CVE-2014-6587" title="Openjdk: Multicastsocket Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" id="CVE-2014-6591" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" id="CVE-2014-6593" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" id="CVE-2014-6601" title="Openjdk: Class Verifier Insufficient " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" id="CVE-2015-0383" title="Openjdk: Insecure Hsperfdata Temporary File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" id="CVE-2015-0395" title="Openjdk: Phantom References Handling Issue In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" id="CVE-2015-0407" title="Openjdk: Directory Information Leak Via File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" id="CVE-2015-0408" title="Openjdk: Incorrect Context Class Loader Use In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" id="CVE-2015-0410" title="Openjdk: Der Decoder Infinite Loop (Security, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" id="CVE-2015-0412" title="Openjdk: Insufficient Code Privileges Checks " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123870" id="1123870" title="Openjdk: Insecure Hsperfdata Temporary File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183020" id="1183020" title="Openjdk: Class Verifier Insufficient " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183021" id="1183021" title="Openjdk: Insufficient Code Privileges Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183023" id="1183023" title="Openjdk: Incorrect Context Class Loader Use In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183031" id="1183031" title="Openjdk: Phantom References Handling Issue In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183043" id="1183043" title="Openjdk: Directory Information Leak Via File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183044" id="1183044" title="Openjdk: Der Decoder Infinite Loop (Security, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183049" id="1183049" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183645" id="1183645" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183646" id="1183646" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183715" id="1183715" title="Openjdk: Multicastsocket Null Pointer " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0085.html" id="RHSA-2015:0085-1" title="Rhsa-2015:0085-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0087-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way the Linux kernel's SCTP implementation validated INIT chunks when performing Address Configuration Change (ASCONF). A remote attacker could use this flaw to crash the system by sending a specially crafted SCTP packet to trigger a NULL pointer dereference on the system. (CVE-2014-7841, Important) 
* An integer overflow flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system. (CVE-2014-4656, Moderate) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-02-03 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">d6d6652e04d7772f88495560a4125b25825e659f8145bdf01e5c6dfe93efcea7</sum></package><package arch="x86_64" name="python-perf" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">14841f667ed9f4f99772651aa20839c3cb78e627abb78f0b657a7f5788d3e726</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">082997cb27668ed0a9569865a810b7e38582acce487879d3f89ed60f28c89cb2</sum></package><package arch="x86_64" name="perf" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">7564921232d894acd04c751480a97df5370968f899a625685df0892a592f91f7</sum></package><package arch="noarch" name="kernel-firmware" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.8.1.el6.noarch.rpm</filename><sum type="sha256">a10859de762ed5edd3e1b70e6a9341ada5f764b225b1742d48a3d5a3796aeb6f</sum></package><package arch="x86_64" name="kernel" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">62babb9b8e72c0c22fd409398758bce613f5521a3ceef6561e4f2a3506f6f6d6</sum></package><package arch="x86_64" name="kernel-debug" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">22a50670e3d259d1290cfa43434b5aa292fefaee346a5f881de43388c3de4f4a</sum></package><package arch="noarch" name="kernel-doc" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.8.1.el6.noarch.rpm</filename><sum type="sha256">3173d1b57a7beaac602e358933d8a47545194c1e330c67a15b8679f6836452f7</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.8.1.el6.noarch.rpm</filename><sum type="sha256">2987cfe7cb1f97c53c19d829597a9fb02a7b6227567ff5e021383892e98b80b9</sum></package><package arch="x86_64" name="kernel-headers" release="504.8.1.el6" src="kernel-2.6.32-504.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.8.1.el6.x86_64.rpm</filename><sum type="sha256">8ccc42fe0cd204198e9afa019ffd215ebe012fe8185b892d0b2921f5964cdd0f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" id="CVE-2014-4656" title="Kernel: Alsa: Control: Integer Overflow In Id.Index &amp; Id.Numid" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" id="CVE-2014-7841" title="Kernel: Net: Sctp: Null Pointer Dereference In Af-&amp;Amp;Gt;From_Addr_Param On Malformed Packet" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113470" id="1113470" title="Kernel: Alsa: Control: Integer Overflow In Id.Index &amp; Id.Numid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163087" id="1163087" title="Cve-2014-7841 Kernel: Net: Sctp: Null Pointer Dereference In Af-&amp;Gt;From_Addr_Param On Malformed Packet" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0087.html" id="RHSA-2015:0087-1" title="Rhsa-2015:0087-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0092-1</id><title>Critical: Glibc Security Update</title><description>A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glibc-devel" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">21e3a59c939689200e2d99cefef30226705e40b39127eaaa463230c83e0a2ee4</sum></package><package arch="x86_64" name="glibc" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">3ea167c5419deab39c270ea3a11991225bae543c5a45999ba4dd92c6c65d3f8b</sum></package><package arch="i686" name="glibc" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6_6.5.i686.rpm</filename><sum type="sha256">6d1b0adf445a9b59a0cba270c7ea45f0fcd75f964ef53f5df0a920af27b4eb39</sum></package><package arch="x86_64" name="glibc-static" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">3f61dcadd7f00a3dfe8e4fc67c06a8b873431ddb034d3a625071884c35479dc2</sum></package><package arch="x86_64" name="nscd" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>nscd-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">470bbebdfba3853eef6aebe96054cb7ad81aa5760324e8eecec0bbdfe259874f</sum></package><package arch="i686" name="glibc-devel" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6_6.5.i686.rpm</filename><sum type="sha256">c64028def3e2bcd74c30c1ac3262d9181b02a3258206cb98445ea04d1cba1676</sum></package><package arch="x86_64" name="glibc-common" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-common-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">f304032d6f9120e06cab475211a96bbbe2b1337c3f01493eba09aa61226e18a5</sum></package><package arch="x86_64" name="glibc-utils" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">57b4469c654893c4cc2e4b6adfaab7a48b8ef09f7cad46857e6c89681f29115b</sum></package><package arch="x86_64" name="glibc-headers" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.149.el6_6.5.x86_64.rpm</filename><sum type="sha256">6c954e409a1c418000ab6ea79fd71c5551cc104a93067ff87708222de2f2afeb</sum></package><package arch="i686" name="glibc-static" release="1.149.el6_6.5" src="glibc-2.12-1.149.el6_6.5.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6_6.5.i686.rpm</filename><sum type="sha256">0c60c4e93efc1644698bc2a915f4bec11c2151ab0b0040e1585f4e56ad04df21</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" id="CVE-2015-0235" title="Glibc: __Nss_Hostname_Digits_Dots() Heap-Based Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183461" id="1183461" title="Glibc: __Nss_Hostname_Digits_Dots() Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0092.html" id="RHSA-2015:0092-1" title="Rhsa-2015:0092-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0100-1</id><title>Moderate: Libyaml Security Update</title><description>An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash. (CVE-2014-9130) 
All running applications linked against the libyaml library must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-02-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libyaml" release="4.el6_6" src="libyaml-0.1.3-4.el6_6.src.rpm" version="0.1.3"><filename>libyaml-0.1.3-4.el6_6.i686.rpm</filename><sum type="sha256">72537ca04002ff4c1c23c624fb9d5da3070129e2db0976660ed2f4ef04261f8b</sum></package><package arch="x86_64" name="libyaml" release="4.el6_6" src="libyaml-0.1.3-4.el6_6.src.rpm" version="0.1.3"><filename>libyaml-0.1.3-4.el6_6.x86_64.rpm</filename><sum type="sha256">0a465df6fffc4ca016fe7d3f8ef6ecfcc54ba573b208ec9771736fd8447317a2</sum></package><package arch="x86_64" name="libyaml-devel" release="4.el6_6" src="libyaml-0.1.3-4.el6_6.src.rpm" version="0.1.3"><filename>libyaml-devel-0.1.3-4.el6_6.x86_64.rpm</filename><sum type="sha256">3d0d3643b047204fbb420ba6f99ab6c6a321818626002d0776ee3816e4ba8dd3</sum></package><package arch="i686" name="libyaml-devel" release="4.el6_6" src="libyaml-0.1.3-4.el6_6.src.rpm" version="0.1.3"><filename>libyaml-devel-0.1.3-4.el6_6.i686.rpm</filename><sum type="sha256">b942ef400ca4636a8017b78af2bbd81b61c54215965624458addf80c42830c71</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" id="CVE-2014-9130" title="Libyaml: Assert Failure When Processing Wrapped " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169369" id="1169369" title="Libyaml: Assert Failure When Processing Wrapped " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0100.html" id="RHSA-2015:0100-1" title="Rhsa-2015:0100-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0165-1</id><title>Moderate: Subversion Security Update</title><description>A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. (CVE-2014-3580) 
It was discovered that Subversion clients retrieved cached authentication credentials using the MD5 hash of the server realm string without also checking the server's URL. A malicious server able to provide a realm that triggers an MD5 collision could possibly use this flaw to obtain the credentials for a different realm. (CVE-2014-3528) 
After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-02-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="subversion" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">cf4e622817660a94d97e2c84c905b99e0d3fa9764b9108e664f7295a5fc92dbf</sum></package><package arch="i686" name="subversion-gnome" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-gnome-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">cb318d439eeef86b36600bd28d606476eac1e7f8c4acb6aa803f201c1c2c5528</sum></package><package arch="i686" name="subversion-kde" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-kde-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">faca374c8f263afeefcb29e6945680531b357f303b501b7c001a987ecc50e67c</sum></package><package arch="i686" name="subversion" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">5a403186543a6e2d4f1512842a78c8534505a6de2d220c8b4cce5af48c4a3ccc</sum></package><package arch="x86_64" name="subversion-kde" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-kde-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">284098776f07b7898daf3414759762318d32c2edbca49a239434a5a4f297a07a</sum></package><package arch="x86_64" name="subversion-javahl" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-javahl-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">5a48542e8eae326e5f742e7b13ab9da3c08a86c4c93a11d017864cd22abb285b</sum></package><package arch="noarch" name="subversion-svn2cl" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-svn2cl-1.6.11-12.el6_6.noarch.rpm</filename><sum type="sha256">6af0fd0681882004fc8073da02948675fc777880dfbb6cbef93aac8d7acbd04e</sum></package><package arch="x86_64" name="mod_dav_svn" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>mod_dav_svn-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">956ee2c594c20c55fe950bb35e61838c8b5d67c5ddb410106e3815d3665ab08c</sum></package><package arch="x86_64" name="subversion-perl" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-perl-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">9568388af2000242f13c77967863311dee1b0941c634afc4cf309e6c8cbe3357</sum></package><package arch="i686" name="subversion-javahl" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-javahl-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">d98dfd58ef8f5729f137d913442af7c916f3a01a9746c01ffe6d871a4bf8012d</sum></package><package arch="i686" name="subversion-devel" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-devel-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">3056c79d283ada43a91ca238e7133a7b1dfe6b0afa72844011bc40a2aafe35a7</sum></package><package arch="i686" name="subversion-ruby" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-ruby-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">cef4634db96fd16ef522c9248fb227d8d0c3666b7ae72dc07c7eb9fb0fef7031</sum></package><package arch="x86_64" name="subversion-ruby" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-ruby-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">0207f7b6c76154372ce72fc5a0379f781a6ee1363be789ad24ac971b5675233d</sum></package><package arch="x86_64" name="subversion-gnome" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-gnome-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">23842739669ac5232a345cfea00bf224b6111e40aeacf62423512f778a604b67</sum></package><package arch="x86_64" name="subversion-devel" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-devel-1.6.11-12.el6_6.x86_64.rpm</filename><sum type="sha256">cd6d89aa2117ef18959ae713967bd7e463ccbab14245a7b51e3bbb7047debe2b</sum></package><package arch="i686" name="subversion-perl" release="12.el6_6" src="subversion-1.6.11-12.el6_6.src.rpm" version="1.6.11"><filename>subversion-perl-1.6.11-12.el6_6.i686.rpm</filename><sum type="sha256">66c356774dd18aec7d280f2ef3d7b8cb2fc98b4748106b9c6f8b41f6d6a39bf5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528" id="CVE-2014-3528" title="Subversion: Credentials Leak Via Md5 Collision" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580" id="CVE-2014-3580" title="Subversion: Null Pointer Dereference Flaw In Mod_Dav_Svn When Handling Report Requests" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1125799" id="1125799" title="Subversion: Credentials Leak Via Md5 Collision" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174054" id="1174054" title="Subversion: Null Pointer Dereference Flaw In Mod_Dav_Svn When Handling Report Requests" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0165.html" id="RHSA-2015:0165-1" title="Rhsa-2015:0165-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0250-1</id><title>Critical: Samba4 Security Update</title><description>An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user). (CVE-2015-0240) 
After installing this update, the smb service will be restarted automatically.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-winbind-clients" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-clients-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">f2d3269a865638532b49f1e2d16df69710c59352d64fc514a4ef8b5297837e4d</sum></package><package arch="x86_64" name="samba4-dc-libs" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-libs-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">2b4f61e0f268e685c8e1aeddd7e1952ecc08b8dbe68ef4d652c3381393618959</sum></package><package arch="x86_64" name="samba4-test" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-test-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">9754c4331cd4f51ed6ee5b36d93d55097de85c61378c2100959437984f6f6d71</sum></package><package arch="x86_64" name="samba4-swat" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-swat-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">8f6a1751b592be2dd0e1c6ec3669b36845ec35d29cb93ba5fc9ab200ea86da2a</sum></package><package arch="x86_64" name="samba4-winbind" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">e903b07b9415dd97148d25e231825b2789bfbd379700524f32301c81c7695174</sum></package><package arch="x86_64" name="samba4-common" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-common-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">fe1eb18ab2436154a4030c20e0cd08fad874c6a1fbde9d8aee3ce8e26a72ae04</sum></package><package arch="x86_64" name="samba4-devel" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-devel-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">119d02b82890ff9664d96a6ad42c302ff701a5e76ddc05ced02d19b235caeba8</sum></package><package arch="x86_64" name="samba4-python" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-python-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">3b56b8cd693e4973b2ea46e01056258c2dd585112fb2d4ad16038d9199bd41b0</sum></package><package arch="x86_64" name="samba4-client" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-client-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">c123bc055ff13974bb2acd7427fece3a5ef5c1df4f45347f90a55cd7e02f6527</sum></package><package arch="x86_64" name="samba4-dc" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">05799aa9c58cc312eb93fab615c780bc2a43cb97abc41855c74b8e7c61689108</sum></package><package arch="x86_64" name="samba4" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">d4143444c3d86cc028c529ce064671bef5aa5c820166175dea9345caeb3c25fc</sum></package><package arch="x86_64" name="samba4-pidl" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-pidl-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">ce343e5d380732d37f07955f775d3f0198a8fa51f7370340df929e7f856aa93e</sum></package><package arch="x86_64" name="samba4-libs" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-libs-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">b7f106f8eba7d4bfb97a66328154f39535fd5fc1336823a8663d32b3ea6320c2</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="66.el6_6.rc4" src="samba4-4.0.0-66.el6_6.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-krb5-locator-4.0.0-66.el6_6.rc4.x86_64.rpm</filename><sum type="sha256">dcdd1f63a210cacb07aa1c4d882534a737bae6648bbec90adf123497af17f647</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" id="CVE-2015-0240" title="Cve-2015-0240" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191325" id="1191325" title="Samba: Talloc Free On Uninitialized Stack " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0250.html" id="RHSA-2015:0250-1" title="Rhsa-2015:0250-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0251-1</id><title>Critical: Samba Security Update</title><description>An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user). (CVE-2015-0240) 
After installing this update, the smb service will be restarted automatically.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libsmbclient" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">5a39499bc223aa57122f15d95229c29a8a8d47f180521df15616701feb302626</sum></package><package arch="x86_64" name="samba-common" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">466f30ccb477bc310d7f2a425e165979b65f68735a777f5a62d082b9a6f7e00d</sum></package><package arch="x86_64" name="samba-winbind-clients" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">f92e689c2202fae9e649eaf3d9d20ecfd36abf6ff44e431bb32592108340a923</sum></package><package arch="x86_64" name="samba" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">11d6af2c921c506341e69a89c5b8173a11f10597f651df27395fcbaa9ab8aa89</sum></package><package arch="i686" name="samba-common" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-14.el6_6.i686.rpm</filename><sum type="sha256">bb8a332ca31bdfb263966b1a7f0ed11b08c444775eba410263d805dccf051b99</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">367190207e21a918828f73d850bc877f56934b2772d4565821ecc27c4928a3db</sum></package><package arch="i686" name="samba-winbind-devel" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-14.el6_6.i686.rpm</filename><sum type="sha256">497d1b1f83e7ef1788d8e93117732f7e40ade6547ade384b1e70a78d1eb47ee0</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">c5afb47559dcb4c72d304033a5130258107ff0aa30272b6001648b4ab4b9a02a</sum></package><package arch="x86_64" name="samba-swat" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">20b0e97df60038cf8624c4dcb22d8f71ac9b1aabf6a912e31dc0cb322ac845cc</sum></package><package arch="i686" name="samba-winbind-clients" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-14.el6_6.i686.rpm</filename><sum type="sha256">a50dff2b7b430513cb20160f8104cf79c6697cc3b73314e913728937a9104e68</sum></package><package arch="i686" name="libsmbclient-devel" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-14.el6_6.i686.rpm</filename><sum type="sha256">ba7a2f58e304688eb6fea51c6f35fdd5015e191d7f834c050356951adabb36d4</sum></package><package arch="x86_64" name="samba-doc" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">417e9e40b6151d67b42154880b43a97eae20a8e93b0610771757b07b98e70426</sum></package><package arch="x86_64" name="samba-glusterfs" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">1cf96d3ce58ab48ed46dab433538d8123f9e22dc9d920718d4ff707b803a6fcf</sum></package><package arch="i686" name="libsmbclient" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-14.el6_6.i686.rpm</filename><sum type="sha256">7da8fe0bd9c789c3e3bd31fdb1ce5d448e5fa6020d6795ad062d557e972ce83e</sum></package><package arch="x86_64" name="samba-winbind-devel" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">3145b3e7fd909d64a2b07253555bc525080b4233ac84e69e4afba5624a07bdcc</sum></package><package arch="x86_64" name="samba-client" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">a656b01bcda80e29229eec4f80768ca55b1cf4e0b8cc6177550b334aa0fbbce7</sum></package><package arch="x86_64" name="libsmbclient-devel" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">9e6fc101c79d633bb1129f1db5cecd2e33e6ce3502d78176dd340ade9282f6ad</sum></package><package arch="x86_64" name="samba-winbind" release="14.el6_6" src="samba-3.6.23-14.el6_6.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-14.el6_6.x86_64.rpm</filename><sum type="sha256">59838e2e471cfed75616c9e4b987db93e37e37db0ba85299f7cb54e21420902a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" id="CVE-2015-0240" title="Cve-2015-0240" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191325" id="1191325" title="Samba: Talloc Free On Uninitialized Stack " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0251.html" id="RHSA-2015:0251-1" title="Rhsa-2015:0251-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0265-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0836, CVE-2015-0831, CVE-2015-0827) 
An information leak flaw was found in the way Firefox implemented autocomplete forms. An attacker able to trick a user into specifying a local file in the form could use this flaw to access the contents of that file. (CVE-2015-0822) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_6" src="firefox-31.5.0-1.el6_6.src.rpm" version="31.5.0"><filename>firefox-31.5.0-1.el6_6.i686.rpm</filename><sum type="sha256">c642feb8c3a24bdb363c8fb6480f1cc895d91129ac81b1d5e74f4ce88d8a3e8b</sum></package><package arch="x86_64" name="firefox" release="1.el6_6" src="firefox-31.5.0-1.el6_6.src.rpm" version="31.5.0"><filename>firefox-31.5.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">48256b720e81fd9e332fc274065feb254dc3188bd8a178711aa2d203d048f035</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" id="CVE-2015-0822" title="Mozilla: Reading Of Local Files Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" id="CVE-2015-0827" title="Mozilla: Out-Of-Bounds Read And Write While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" id="CVE-2015-0831" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" id="CVE-2015-0836" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195605" id="1195605" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195619" id="1195619" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195623" id="1195623" title="Mozilla: Out-Of-Bounds Read And Write While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195638" id="1195638" title="Mozilla: Reading Of Local Files Through " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0265.html" id="RHSA-2015:0265-1" title="Rhsa-2015:0265-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0266-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0836, CVE-2015-0831, CVE-2015-0827) 
An information leak flaw was found in the way Thunderbird implemented autocomplete forms. An attacker able to trick a user into specifying a local file in the form could use this flaw to access the contents of that file. (CVE-2015-0822) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_6" src="thunderbird-31.5.0-1.el6_6.src.rpm" version="31.5.0"><filename>thunderbird-31.5.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">64c4a98a49d0f1095fd622803debc505d35400d329faf23ea0daafd6ea6eef3a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" id="CVE-2015-0822" title="Mozilla: Reading Of Local Files Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" id="CVE-2015-0827" title="Mozilla: Out-Of-Bounds Read And Write While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" id="CVE-2015-0831" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" id="CVE-2015-0836" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195605" id="1195605" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195619" id="1195619" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195623" id="1195623" title="Mozilla: Out-Of-Bounds Read And Write While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195638" id="1195638" title="Mozilla: Reading Of Local Files Through " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0266.html" id="RHSA-2015:0266-1" title="Rhsa-2015:0266-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0628-1</id><title>Important: 389-Ds-Base Security Update</title><description>An information disclosure flaw was found in the way the 389 Directory Server stored information in the Changelog that is exposed via the 'cn=changelog' LDAP sub-tree. An unauthenticated user could in certain cases use this flaw to read data from the Changelog, which could include sensitive information such as plain-text passwords. (CVE-2014-8105) 
This update also fixes the following bugs: 
* In multi-master replication (MMR), deleting a single-valued attribute of a Directory Server (DS) entry was previously in some cases not correctly replicated. Consequently, the entry state in the replica systems did not reflect the intended changes. This bug has been fixed and the removal of a single-valued attribute is now properly replicated. 
* Prior to this update, the Directory Server (DS) always checked the ACI syntax. As a consequence, removing an ACI failed with a syntax error. With this update, the ACI check is stopped when the ACI is going to be removed, and the removal thus works as expected. 
In addition, this update adds the following enhancement: 
* The buffer size limit for the 389-ds-base application has been increased to 2MB in order to match the buffer size limit of Simple Authentication and Security Layer (SASL) and Basic Encoding Rules (BER). 
After installing this update, the 389 server service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-03-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="389-ds-base-devel" release="50.el6_6" src="389-ds-base-1.2.11.15-50.el6_6.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-50.el6_6.i686.rpm</filename><sum type="sha256">a02d0d369d3d9610c55c50989377fad50ba36edfbf8423d3c814e30b7ad91224</sum></package><package arch="x86_64" name="389-ds-base" release="50.el6_6" src="389-ds-base-1.2.11.15-50.el6_6.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-50.el6_6.x86_64.rpm</filename><sum type="sha256">2b5f89dc702a5eb9ebd77152690c48119b0684cc1ffa2b56d50dc0d97d9e06e1</sum></package><package arch="i686" name="389-ds-base-libs" release="50.el6_6" src="389-ds-base-1.2.11.15-50.el6_6.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-50.el6_6.i686.rpm</filename><sum type="sha256">71569a0bb2394a7e6fc98559cfd174cfd3d6e40de9c4891c35a601f2035d7af0</sum></package><package arch="x86_64" name="389-ds-base-devel" release="50.el6_6" src="389-ds-base-1.2.11.15-50.el6_6.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-50.el6_6.x86_64.rpm</filename><sum type="sha256">26b09b4ea9a45489e2961c36e2f7a5dc82757f1585a2ac23d321b98cc1eb1af9</sum></package><package arch="x86_64" name="389-ds-base-libs" release="50.el6_6" src="389-ds-base-1.2.11.15-50.el6_6.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-50.el6_6.x86_64.rpm</filename><sum type="sha256">0536b22302505a899c408ff64f353921384d9430529a7243961250c9ebedfe75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8105" id="CVE-2014-8105" title="389-Ds-Base: Information Disclosure Through 'Cn=Changelog' Subtree" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167858" id="1167858" title="389-Ds-Base: Information Disclosure Through 'Cn=Changelog' Subtree" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0628.html" id="RHSA-2015:0628-1" title="Rhsa-2015:0628-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0672-1</id><title>Moderate: Bind Security Update</title><description>A flaw was found in the way BIND handled trust anchor management. A remote attacker could use this flaw to cause the BIND daemon (named) to crash under certain conditions. (CVE-2015-1349) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-03-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-libs" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm</filename><sum type="sha256">c7d41073e05e709c7eb31a3f8baeae3a53ae4b88d4ceb528e70d6ab6805a4497</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm</filename><sum type="sha256">8ef1ba173c3b146d5bcee33631059935aade1cd3a1e59171a78d9088a41ee6ef</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm</filename><sum type="sha256">afcf3be1677e45c9e73f7ef6db6f1177d79d8a2ceb7ce73b8131c452612e0020</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm</filename><sum type="sha256">9ab75081e495c88805dcffb8aaa9e8d610dc3ad02e4c0d179ce833d83b9faedf</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm</filename><sum type="sha256">4b9c9ae2aa9ea162b39c914b07abd70edb7b03627c29e9698b4fc8633ec4a00d</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm</filename><sum type="sha256">927a101384f8d9d08a21d9a56c0f7b878f2e83d923ee6104e3557eab3c3e914c</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm</filename><sum type="sha256">ac6e399391e620b78194253923bfb70e594676de8c0d3a987600beba5d456ddc</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.30.rc1.el6_6.2" src="bind-9.8.2-0.30.rc1.el6_6.2.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm</filename><sum type="sha256">28d34641f3239e63a19962258fd2020d9900cc6c63cbc97342bb8e4af886711f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" id="CVE-2015-1349" title="Bind: Issue In Trust Anchor Management Can Cause " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193820" id="1193820" title="Bind: Issue In Trust Anchor Management Can Cause " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0672.html" id="RHSA-2015:0672-1" title="Rhsa-2015:0672-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0674-1</id><title>Important: Kernel Security Update</title><description>* It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the (u)verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-8159, Important) 
* A flaw was found in the way the Linux kernel's splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system. (CVE-2014-7822, Moderate) 
* A flaw was found in the way the Linux kernel's netfilter subsystem handled generic protocol tracking. As demonstrated in the Stream Control Transmission Protocol (SCTP) case, a remote attacker could use this flaw to bypass intended iptables rule restrictions when the associated connection tracking module was not loaded on the system. (CVE-2014-8160, Moderate) 
* It was found that the fix for CVE-2014-3601 was incomplete: the Linux kernel's kvm_iommu_map_pages() function still handled IOMMU mapping failures incorrectly. A privileged user in a guest with an assigned host device could use this flaw to crash the host. (CVE-2014-8369, Moderate) 
Bug fixes: 
* The maximum amount of entries in the IPv6 route table (net.ipv6.route.max_size) was 4096, and every route towards this maximum size limit was counted. Communication to more systems was impossible when the limit was exceeded. Now, only cached routes are counted, which guarantees that the kernel does not run out of memory, but the user can now install as many routes as the memory allows until the kernel indicates it can no longer handle the amount of memory and returns an error message. 
In addition, the default "net.ipv6.route.max_size" value has been increased to 16384 for performance improvement reasons. 
* When the user attempted to scan for an FCOE-served Logical Unit Number (LUN), after an initial LUN scan, a kernel panic occurred in bnx2fc_init_task. System scanning for LUNs is now stable after LUNs have been added. 
* Under certain conditions, such as when attempting to scan the network for LUNs, a race condition in the bnx2fc driver could trigger a kernel panic in bnx2fc_init_task. A patch fixing a locking issue that caused the race condition has been applied, and scanning the network for LUNs no longer leads to a kernel panic. 
* Previously, it was not possible to boot the kernel on Xen hypervisor in PVHVM mode if more than 32 vCPUs were specified in the guest configuration. Support for more than 32 vCPUs has been added, and the kernel now boots successfully in the described situation. 
* When the NVMe driver allocated a namespace queue, it indicated that it was a request-based driver when it was actually a block I/O-based driver. Consequently, when NVMe driver was loaded along with a request-based dm device, the system could terminate unexpectedly or become unresponsive when attempting to access data. The NVMe driver no longer sets the QUEUE_FLAG_STACKABLE bit when allocating a namespace queue and device- mapper no longer perceives NVMe driver as request-based; system hangs or crashes no longer occur. 
* If a user attempted to apply an NVRAM firmware update when running the tg3 module provided with Scientific Linux 6.6 kernels, the update could fail. As a consequence, the Network Interface Card (NIC) could stay in an unusable state and this could prevent the entire system from booting. The tg3 module has been updated to correctly apply firmware updates. 
* Support for key sizes of 256 and 192 bits has been added to AES-NI.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-03-17 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.12.2.el6.noarch.rpm</filename><sum type="sha256">89e9201d9fd563745d5a1c2c6a595ad3f71864e5e14ae3522e3128e18a047b3e</sum></package><package arch="x86_64" name="kernel-headers" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">b848dff4c701a807d997fc04eb330a97fbc16bb6ddcf9137bf528f6857a1b340</sum></package><package arch="x86_64" name="python-perf" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">b1f4d6319c0e4d30cffc1d7de183ab64d6a97c591fd657f23d3d4add45881fc2</sum></package><package arch="x86_64" name="kernel-devel" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">635cf4034fa12d8516b12be68fe2e45d0ea3b0b28847c9c5ebaa2253a85bd82d</sum></package><package arch="x86_64" name="kernel" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">93c3abbacc461d67bda1177c3201b3591c56eebc7c4e9ac602318eb2f606f920</sum></package><package arch="x86_64" name="perf" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">876447e154ef12d648541b97ee8c90cf8cfd7d48ae2687863629fae74bde2372</sum></package><package arch="x86_64" name="kernel-debug" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">4c1723dc475d74e51ed0fc69c7ca1ec3d6ca20ef3ba905e4af88f3bf0664bcd4</sum></package><package arch="noarch" name="kernel-firmware" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.12.2.el6.noarch.rpm</filename><sum type="sha256">10a3d7e9226681c69acd84a19babb27a158ac2004669d1718640feed3ea99833</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.12.2.el6.noarch.rpm</filename><sum type="sha256">13dcc472e5b7b6751560aa63a281bd90112003c7f25080c8b10fb79ea04b2726</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.12.2.el6" src="kernel-2.6.32-504.12.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.12.2.el6.x86_64.rpm</filename><sum type="sha256">a2db77f0bd8723808ee7ca18c035780863456ff9ae2962291e2b5b5d4ef27e40</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" id="CVE-2014-7822" title="Kernel: Splice: Lack Of Generic Write Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" id="CVE-2014-8159" title="Kernel: Infiniband: Uverbs: Unprotected Physical Memory Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" id="CVE-2014-8160" title="Kernel: Iptables Restriction Bypass If A Protocol Handler Kernel Module Not Loaded" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369" id="CVE-2014-8369" title="Kernel: Kvm: Excessive Pages Un-Pinning In Kvm_Iommu_Map Error Path" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1156518" id="1156518" title="Kernel: Kvm: Excessive Pages Un-Pinning In Kvm_Iommu_Map Error Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163792" id="1163792" title="Kernel: Splice: Lack Of Generic Write Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181166" id="1181166" title="Kernel: Infiniband: Uverbs: Unprotected Physical Memory Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1182059" id="1182059" title="Kernel: Iptables Restriction Bypass If A Protocol Handler Kernel Module Not Loaded" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0674.html" id="RHSA-2015:0674-1" title="Rhsa-2015:0674-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0696-1</id><title>Important: Freetype Security Update</title><description>Multiple integer overflow flaws and an integer signedness flaw, leading to heap-based buffer overflows, were found in the way FreeType handled Mac fonts. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-9673, CVE-2014-9674) 
Multiple flaws were found in the way FreeType handled fonts in various formats. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, possibly, disclose a portion of the application memory. (CVE-2014-9657, CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664, CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9675) 
The X server must be restarted (log out, then log back in) for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-03-31 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="freetype" release="15.el6_6.1" src="freetype-2.3.11-15.el6_6.1.src.rpm" version="2.3.11"><filename>freetype-2.3.11-15.el6_6.1.x86_64.rpm</filename><sum type="sha256">e36d20bbcc20eb39784df4ff4818850441ad1c4986623dd8005cf33e21af2fb2</sum></package><package arch="x86_64" name="freetype-devel" release="15.el6_6.1" src="freetype-2.3.11-15.el6_6.1.src.rpm" version="2.3.11"><filename>freetype-devel-2.3.11-15.el6_6.1.x86_64.rpm</filename><sum type="sha256">0a00f4e4639b2aac42bda6eb6cb58d4d35f558d58a1f06ae25d4a1369ee85f9a</sum></package><package arch="x86_64" name="freetype-demos" release="15.el6_6.1" src="freetype-2.3.11-15.el6_6.1.src.rpm" version="2.3.11"><filename>freetype-demos-2.3.11-15.el6_6.1.x86_64.rpm</filename><sum type="sha256">7cacff79c493272085f56e2244858644fb0ead6f3c9b58f4f37eb1ff491a1c8e</sum></package><package arch="i686" name="freetype-devel" release="15.el6_6.1" src="freetype-2.3.11-15.el6_6.1.src.rpm" version="2.3.11"><filename>freetype-devel-2.3.11-15.el6_6.1.i686.rpm</filename><sum type="sha256">e026cb152e3a75d6a93d7a353b22a2b28fdb4d80cd9d838f7b6922b9db2d0cdf</sum></package><package arch="i686" name="freetype" release="15.el6_6.1" src="freetype-2.3.11-15.el6_6.1.src.rpm" version="2.3.11"><filename>freetype-2.3.11-15.el6_6.1.i686.rpm</filename><sum type="sha256">b893a95345276be00c550496f4dc4f31da8a771f183cef822685961e07b3bc7a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" id="CVE-2014-9657" title="Freetype: Off-By-One Buffer Over-Read In Tt_Face_Load_Hdmx()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" id="CVE-2014-9658" title="Freetype: Buffer Over-Read And Integer Underflow In Tt_Face_Load_Kern()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" id="CVE-2014-9660" title="Freetype: Missing Endchar Null Pointer Dereference In The _Bdf_Parse_Glyphs()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" id="CVE-2014-9661" title="Freetype: Out Of Bounds Read In Type42 Font Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" id="CVE-2014-9663" title="Freetype: Out-Of-Bounds Read In Tt_Cmap4_Validate()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" id="CVE-2014-9664" title="Freetype: Off-By-One Buffer Over-Read In Parse_Charstrings() / T42_Parse_Charstrings()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" id="CVE-2014-9667" title="Freetype: Integer Overflow In Tt_Face_Load_Font_Dir() Leading To Out-Of-Bounds Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" id="CVE-2014-9669" title="Freetype: Multiple Integer Overflows Leading To Buffer Over-Reads In Cmap Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" id="CVE-2014-9670" title="Freetype: Integer Overflow In Pcf_Get_Encodings() Leading To Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" id="CVE-2014-9671" title="Freetype: Integer Overflow In Pcf_Get_Properties() Leading To Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" id="CVE-2014-9673" title="Freetype: Integer Signedness Error In Mac_Read_Post_Resource() Leading To Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" id="CVE-2014-9674" title="Freetype: Multiple Integer Overflows Mac_Read_Post_Resource() Leading To Heap-Based Buffer Overflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" id="CVE-2014-9675" title="Freetype: Information Leak In _Bdf_Add_Property()" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191079" id="1191079" title="Freetype: Off-By-One Buffer Over-Read In Tt_Face_Load_Hdmx()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191080" id="1191080" title="Freetype: Buffer Over-Read And Integer Underflow In Tt_Face_Load_Kern()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191082" id="1191082" title="Freetype: Missing Endchar Null Pointer Dereference In The _Bdf_Parse_Glyphs()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191083" id="1191083" title="Freetype: Out Of Bounds Read In Type42 Font Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191085" id="1191085" title="Freetype: Out-Of-Bounds Read In Tt_Cmap4_Validate()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191086" id="1191086" title="Freetype: Off-By-One Buffer Over-Read In Parse_Charstrings() / T42_Parse_Charstrings()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191090" id="1191090" title="Freetype: Integer Overflow In Tt_Face_Load_Font_Dir() Leading To Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191092" id="1191092" title="Freetype: Multiple Integer Overflows Leading To Buffer Over-Reads In Cmap Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191093" id="1191093" title="Freetype: Integer Overflow In Pcf_Get_Encodings() Leading To Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191094" id="1191094" title="Freetype: Integer Overflow In Pcf_Get_Properties() Leading To Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191096" id="1191096" title="Freetype: Integer Signedness Error In Mac_Read_Post_Resource() Leading To Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191190" id="1191190" title="Freetype: Multiple Integer Overflows Mac_Read_Post_Resource() Leading To Heap-Based Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191192" id="1191192" title="Freetype: Information Leak In _Bdf_Add_Property()" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0696.html" id="RHSA-2015:0696-1" title="Rhsa-2015:0696-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0700-1</id><title>Moderate: Unzip Security Update</title><description>A buffer overflow was found in the way unzip uncompressed certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash or, possibly, execute arbitrary code when the archive was tested with unzip's '-t' option. (CVE-2014-9636) 
A buffer overflow flaw was found in the way unzip computed the CRC32 checksum of certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash when the archive was tested with unzip's '-t' option. (CVE-2014-8139) 
An integer underflow flaw, leading to a buffer overflow, was found in the way unzip uncompressed certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash when the archive was tested with unzip's '-t' option. (CVE-2014-8140) 
A buffer overflow flaw was found in the way unzip handled Zip64 files. A specially crafted Zip archive could possibly cause unzip to crash when the archive was uncompressed. (CVE-2014-8141)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-03-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="unzip" release="2.el6_6" src="unzip-6.0-2.el6_6.src.rpm" version="6.0"><filename>unzip-6.0-2.el6_6.x86_64.rpm</filename><sum type="sha256">11311fb8e1655d69d1d4bba6303150613245068c12b17bc64fa19ef3673dd75a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" id="CVE-2014-8139" title="Unzip: Crc32 Verification Heap-Based Buffer Overread (Ocert-2014-011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" id="CVE-2014-8140" title="Unzip: Out-Of-Bounds Write Issue In Test_Compr_Eb() (Ocert-2014-011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" id="CVE-2014-8141" title="Unzip: Getzip64Data() Out-Of-Bounds Read Issues (Ocert-2014-011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" id="CVE-2014-9636" title="Unzip: Out-Of-Bounds Read/Write In Test_Compr_Eb() In Extract.C" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174844" id="1174844" title="Unzip: Crc32 Verification Heap-Based Buffer Overread (Ocert-2014-011)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174851" id="1174851" title="Unzip: Out-Of-Bounds Write Issue In Test_Compr_Eb() (Ocert-2014-011)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174856" id="1174856" title="Unzip: Getzip64Data() Out-Of-Bounds Read Issues (Ocert-2014-011)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184985" id="1184985" title="Unzip: Out-Of-Bounds Read/Write In Test_Compr_Eb() In Extract.C" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0700.html" id="RHSA-2015:0700-1" title="Rhsa-2015:0700-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0715-1</id><title>Moderate: Openssl Security Update</title><description>An invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp() function. A remote attacker could crash a TLS/SSL client or server using OpenSSL via a specially crafted X.509 certificate when the attacker- supplied certificate was verified by the application. (CVE-2015-0286) 
An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input (such as a PEM file) could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292) 
A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) 
A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported. (CVE-2015-0209) 
An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. A remote attacker could possibly use a specially crafted ASN.1 structure that, when parsed by an application, would cause that application to crash. (CVE-2015-0287) 
A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate handling implementation. A specially crafted X.509 certificate could cause an application using OpenSSL to crash if the application attempted to convert the certificate to a certificate request. (CVE-2015-0288) 
A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw. (CVE-2015-0289) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-03-31 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl-perl" release="30.el6_6.7" src="openssl-1.0.1e-30.el6_6.7.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-30.el6_6.7.x86_64.rpm</filename><sum type="sha256">7261da41547db2b438988ffa937d5a60f41fbb6606036e0dff40497911b5f78c</sum></package><package arch="x86_64" name="openssl" release="30.el6_6.7" src="openssl-1.0.1e-30.el6_6.7.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.7.x86_64.rpm</filename><sum type="sha256">a6c5a8cd44d371ad8137f7cdc05c8079b9b6c3ee75eb0d793285a9c27d2a01e0</sum></package><package arch="i686" name="openssl" release="30.el6_6.7" src="openssl-1.0.1e-30.el6_6.7.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.7.i686.rpm</filename><sum type="sha256">174e78a35300f1d74673217d23472155a29234b8d54c8e5cf4714a3a9582304b</sum></package><package arch="i686" name="openssl-devel" release="30.el6_6.7" src="openssl-1.0.1e-30.el6_6.7.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.7.i686.rpm</filename><sum type="sha256">dea50e15ab277617b76bb0c3ef94ff296617cb1f4cfb9f9d984d0c0401d8f389</sum></package><package arch="x86_64" name="openssl-static" release="30.el6_6.7" src="openssl-1.0.1e-30.el6_6.7.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-30.el6_6.7.x86_64.rpm</filename><sum type="sha256">14cea5b5be9270e33ca5bf1bbbef6edba1350bcdd6684014f56b009f30b7fd3e</sum></package><package arch="x86_64" name="openssl-devel" release="30.el6_6.7" src="openssl-1.0.1e-30.el6_6.7.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.7.x86_64.rpm</filename><sum type="sha256">5acab3c8b289eadeeeceb1eead8a8637511387df264d659f07d9ec4b14652794</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" id="CVE-2015-0209" title="Openssl: Use-After-Free On Invalid Ec Private Key Import" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" id="CVE-2015-0286" title="Openssl: Invalid Pointer Use In Asn1_Type_Cmp()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" id="CVE-2015-0287" title="Openssl: Asn.1 Structure Reuse Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" id="CVE-2015-0288" title="Openssl: X509_To_X509_Req Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" id="CVE-2015-0289" title="Openssl: Pkcs7 Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" id="CVE-2015-0292" title="Openssl: Integer Underflow Leading To Buffer Overflow In Base64 Decoding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" id="CVE-2015-0293" title="Openssl: Assertion Failure In Sslv2 Servers" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196737" id="1196737" title="Openssl: Use-After-Free On Invalid Ec Private Key Import" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202366" id="1202366" title="Openssl: Invalid Pointer Use In Asn1_Type_Cmp()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202380" id="1202380" title="Openssl: Asn.1 Structure Reuse Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202384" id="1202384" title="Openssl: Pkcs7 Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202395" id="1202395" title="Openssl: Integer Underflow Leading To Buffer Overflow In Base64 Decoding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202404" id="1202404" title="Openssl: Assertion Failure In Sslv2 Servers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202418" id="1202418" title="Openssl: X509_To_X509_Req Null Pointer Dereference" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0715.html" id="RHSA-2015:0715-1" title="Rhsa-2015:0715-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0718-1</id><title>Critical: Firefox Security Update</title><description>Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0817, CVE-2015-0818) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-31 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_6" src="firefox-31.5.3-1.el6_6.src.rpm" version="31.5.3"><filename>firefox-31.5.3-1.el6_6.i686.rpm</filename><sum type="sha256">0e51f7666bc088529dd9140873ff942f19b6ae97ac267b7996c84ecb53ba59dc</sum></package><package arch="x86_64" name="firefox" release="1.el6_6" src="firefox-31.5.3-1.el6_6.src.rpm" version="31.5.3"><filename>firefox-31.5.3-1.el6_6.x86_64.rpm</filename><sum type="sha256">b46789d6cc2e33514327146db8b7e16d37d652f955acde136fdb784835fea38f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" id="CVE-2015-0817" title="Mozilla: Code Execution Through Incorrect Javascript Bounds Checking Elimination (Mfsa 2015-29)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" id="CVE-2015-0818" title="Mozilla: Privilege Escalation Through Svg Navigation (Mfsa 2015-28)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1204362" id="1204362" title="Mozilla: Code Execution Through Incorrect Javascript Bounds Checking Elimination (Mfsa 2015-29)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1204363" id="1204363" title="Mozilla: Privilege Escalation Through Svg Navigation (Mfsa 2015-28)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0718.html" id="RHSA-2015:0718-1" title="Rhsa-2015:0718-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0729-1</id><title>Important: Setroubleshoot Security Update</title><description>It was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command. (CVE-2015-1815)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="setroubleshoot-doc" release="6.el6_6.1" src="setroubleshoot-3.0.47-6.el6_6.1.src.rpm" version="3.0.47"><filename>setroubleshoot-doc-3.0.47-6.el6_6.1.x86_64.rpm</filename><sum type="sha256">e566de0c9f03c2f9361d0524584ce53b5bfa51174968ec2c8dfc482032cd7f72</sum></package><package arch="x86_64" name="setroubleshoot" release="6.el6_6.1" src="setroubleshoot-3.0.47-6.el6_6.1.src.rpm" version="3.0.47"><filename>setroubleshoot-3.0.47-6.el6_6.1.x86_64.rpm</filename><sum type="sha256">eb2e8dfcb90e591e3886d2e1e28df0a3ab29f50efe3e159a72878cc2a65f7427</sum></package><package arch="x86_64" name="setroubleshoot-server" release="6.el6_6.1" src="setroubleshoot-3.0.47-6.el6_6.1.src.rpm" version="3.0.47"><filename>setroubleshoot-server-3.0.47-6.el6_6.1.x86_64.rpm</filename><sum type="sha256">0ee544482e0c75f7fc1fdc440d5b324c8732f64ee1d3221bce7e42f7b6477e84</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1815" id="CVE-2015-1815" title="Setroubleshoot: Command Injection Via Crafted File Name" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203352" id="1203352" title="Setroubleshoot: Command Injection Via Crafted File Name" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0729.html" id="RHSA-2015:0729-1" title="Rhsa-2015:0729-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0750-1</id><title>Moderate: Postgresql Security Update</title><description>An information leak flaw was found in the way the PostgreSQL database server handled certain error messages. An authenticated database user could possibly obtain the results of a query they did not have privileges to execute by observing the constraint violation error messages produced when the query was executed. (CVE-2014-8161) 
A buffer overflow flaw was found in the way PostgreSQL handled certain numeric formatting. An authenticated database user could use a specially crafted timestamp formatting template to cause PostgreSQL to crash or, under certain conditions, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2015-0241) 
A stack-buffer overflow flaw was found in PostgreSQL's pgcrypto module. An authenticated database user could use this flaw to cause PostgreSQL to crash or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2015-0243) 
A flaw was found in the way PostgreSQL handled certain errors that were generated during protocol synchronization. An authenticated database user could use this flaw to inject queries into an existing connection. (CVE-2015-0244) 
If the postgresql service is running, it will be automatically restarted after installing this update.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="postgresql-devel" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-2.el6_6.i686.rpm</filename><sum type="sha256">2ddf76a70f02829d66ac6c20ccb6f5cc467eb6ffa444072ee49b82f708a96c6a</sum></package><package arch="x86_64" name="postgresql-contrib" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-contrib-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">fa8d0d2134bc7c512e0120cc9f077f29a69defe0b1b5f3eddeba9ee9c3dad5be</sum></package><package arch="x86_64" name="postgresql-plpython" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-plpython-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">17bb29743931f2d738bfdc428556e9e435f97198994f5b08899106d85be58ea0</sum></package><package arch="x86_64" name="postgresql-devel" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">c73d14917f516e91eca2312a8160050d38c3b083c96ae4b6512a9b53cf75b4fc</sum></package><package arch="x86_64" name="postgresql" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">48d49dc56b93fac4963f6e89d41f036ac744ec72862e6ba52651b72a792b7a7f</sum></package><package arch="x86_64" name="postgresql-libs" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">e2efdc730d7874c6f343c1ff91805b9df877ac309386f3a8244efc4cc733ba05</sum></package><package arch="i686" name="postgresql-libs" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-2.el6_6.i686.rpm</filename><sum type="sha256">cc98bba5613abc50112ae60720a308f5446995d30e904635fdfb4438dca5eb41</sum></package><package arch="x86_64" name="postgresql-pltcl" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-pltcl-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">0a180c5d580b014af8003febe2bbfa12e9f9e2efc72b062185abe03a26424a58</sum></package><package arch="x86_64" name="postgresql-server" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-server-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">c61553a6e2ef6670f5be51c04dfe8d0d50f0152b7482f5a3064bd3538b9764dd</sum></package><package arch="x86_64" name="postgresql-test" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-test-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">9135dfd94baee3cbd0fcf95c4666652054650be83144b52e66713542d00494b0</sum></package><package arch="x86_64" name="postgresql-docs" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-docs-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">1aab8665595045c6f9e1966e28f7a42616f0481f875b95df7744039d975e0a48</sum></package><package arch="i686" name="postgresql" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-2.el6_6.i686.rpm</filename><sum type="sha256">1ea8d37eb091382d79399c29475d7fad22b34de3825eeae3688fbc896c324388</sum></package><package arch="x86_64" name="postgresql-plperl" release="2.el6_6" src="postgresql-8.4.20-2.el6_6.src.rpm" version="8.4.20"><filename>postgresql-plperl-8.4.20-2.el6_6.x86_64.rpm</filename><sum type="sha256">8b380983ee370a1c692a7f28ea1a0ce1671b731eb23cfd9e9f98e8132fe6f8c7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" id="CVE-2014-8161" title="Postgresql: Information Leak Through Constraint Violation Errors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" id="CVE-2015-0241" title="Postgresql: Buffer Overflow In The To_Char() Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" id="CVE-2015-0243" title="Postgresql: Buffer Overflow Flaws In Contrib/Pgcrypto" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" id="CVE-2015-0244" title="Postgresql: Loss Of Frontend/Backend Protocol Synchronization After An Error" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1182043" id="1182043" title="Postgresql: Information Leak Through Constraint Violation Errors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1188684" id="1188684" title="Postgresql: Buffer Overflow In The To_Char() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1188689" id="1188689" title="Postgresql: Buffer Overflow Flaws In Contrib/Pgcrypto" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1188694" id="1188694" title="Postgresql: Loss Of Frontend/Backend Protocol Synchronization After An Error" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0750.html" id="RHSA-2015:0750-1" title="Rhsa-2015:0750-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0766-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0813, CVE-2015-0815, CVE-2015-0801) 
A flaw was found in the way documents were loaded via resource URLs in, for example, Mozilla's PDF.js PDF file viewer. An attacker could use this flaw to bypass certain restrictions and under certain conditions even execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0816) 
A flaw was found in the Beacon interface implementation in Firefox. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack. (CVE-2015-0807) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="2.el6_6" src="firefox-31.6.0-2.el6_6.src.rpm" version="31.6.0"><filename>firefox-31.6.0-2.el6_6.x86_64.rpm</filename><sum type="sha256">055d243aa19e6ab84dd1a02eb345ccbf33d9cac955dedbfea0c1f8b57058b239</sum></package><package arch="i686" name="firefox" release="2.el6_6" src="firefox-31.6.0-2.el6_6.src.rpm" version="31.6.0"><filename>firefox-31.6.0-2.el6_6.i686.rpm</filename><sum type="sha256">8f7ce53f20c60bb899177d3e4eae092d6ac61cb5678ed4c4a949a249ce6fc4cf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" id="CVE-2015-0801" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" id="CVE-2015-0807" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" id="CVE-2015-0813" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" id="CVE-2015-0815" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" id="CVE-2015-0816" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207068" id="1207068" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207072" id="1207072" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207076" id="1207076" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207084" id="1207084" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207088" id="1207088" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0766.html" id="RHSA-2015:0766-1" title="Rhsa-2015:0766-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0767-1</id><title>Important: Flac Security Update</title><description>A buffer overflow flaw was found in the way flac decoded FLAC audio files. An attacker could create a specially crafted FLAC audio file that could cause an application using the flac library to crash or execute arbitrary code when the file was read. (CVE-2014-9028) 
A buffer over-read flaw was found in the way flac processed certain ID3v2 metadata. An attacker could create a specially crafted FLAC audio file that could cause an application using the flac library to crash when the file was read. (CVE-2014-8962) 
After installing the update, all applications linked against the flac library must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="flac" release="7.el6_6" src="flac-1.2.1-7.el6_6.src.rpm" version="1.2.1"><filename>flac-1.2.1-7.el6_6.i686.rpm</filename><sum type="sha256">d58b1290db42d8ec9e236f5f5f2973b1e33b8183895dc9272c31d042cb07cc05</sum></package><package arch="i686" name="flac-devel" release="7.el6_6" src="flac-1.2.1-7.el6_6.src.rpm" version="1.2.1"><filename>flac-devel-1.2.1-7.el6_6.i686.rpm</filename><sum type="sha256">aabda9cad5e4b4e93e7456dda1a8d605b618c47372404e9c7b5965b780a9ae31</sum></package><package arch="x86_64" name="flac-devel" release="7.el6_6" src="flac-1.2.1-7.el6_6.src.rpm" version="1.2.1"><filename>flac-devel-1.2.1-7.el6_6.x86_64.rpm</filename><sum type="sha256">3b923897227f3ed814dc8a5deabbac66863e138e0b42c07465aaabfb3aa2f7f7</sum></package><package arch="x86_64" name="flac" release="7.el6_6" src="flac-1.2.1-7.el6_6.src.rpm" version="1.2.1"><filename>flac-1.2.1-7.el6_6.x86_64.rpm</filename><sum type="sha256">0da4509e605d8f814e1ed5105d727ac5f982a62ff53990decc2bbd086d8771e2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" id="CVE-2014-8962" title="Flac: Buffer Read Overflow When Processing Id3V2 Metadata" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" id="CVE-2014-9028" title="Flac: Heap Buffer Write Overflow In Read_Residual_Partitioned_Rice_" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167236" id="1167236" title="Flac: Buffer Read Overflow When Processing Id3V2 Metadata" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167741" id="1167741" title="Flac: Heap Buffer Write Overflow In Read_Residual_Partitioned_Rice_" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0767.html" id="RHSA-2015:0767-1" title="Rhsa-2015:0767-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0771-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0813, CVE-2015-0815, CVE-2015-0801) 
A flaw was found in the way documents were loaded via resource URLs. An attacker could use this flaw to bypass certain restrictions and under certain conditions even execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0816) 
A flaw was found in the Beacon interface implementation in Thunderbird. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack. (CVE-2015-0807) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_6" src="thunderbird-31.6.0-1.el6_6.src.rpm" version="31.6.0"><filename>thunderbird-31.6.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">dacaced39035f8619c75d50ebe94b13e1390ebade283c135326d60496c53efbf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" id="CVE-2015-0801" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" id="CVE-2015-0807" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" id="CVE-2015-0813" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" id="CVE-2015-0815" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" id="CVE-2015-0816" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207068" id="1207068" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207072" id="1207072" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207076" id="1207076" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207084" id="1207084" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207088" id="1207088" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0771.html" id="RHSA-2015:0771-1" title="Rhsa-2015:0771-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0794-1</id><title>Moderate: Krb5 Security Update</title><description>The following security issues are fixed with this release: 
A use-after-free flaw was found in the way the MIT Kerberos libgssapi_krb5 library processed valid context deletion tokens. An attacker able to make an application using the GSS-API library (libgssapi) could call the gss_process_context_token() function and use this flaw to crash that application. (CVE-2014-5352) 
If kadmind were used with an LDAP back end for the KDC database, a remote, authenticated attacker who has the permissions to set the password policy could crash kadmind by attempting to use a named ticket policy object as a password policy for a principal. (CVE-2014-5353) 
It was found that the krb5_read_message() function of MIT Kerberos did not correctly sanitize input, and could create invalid krb5_data objects. A remote, unauthenticated attacker could use this flaw to crash a Kerberos child process via a specially crafted request. (CVE-2014-5355) 
A double-free flaw was found in the way MIT Kerberos handled invalid External Data Representation (XDR) data. An authenticated user could use this flaw to crash the MIT Kerberos administration server (kadmind), or other applications using Kerberos libraries, via specially crafted XDR packets. (CVE-2014-9421) 
It was found that the MIT Kerberos administration server (kadmind) incorrectly accepted certain authentication requests for two-component server principal names. A remote attacker able to acquire a key with a particularly named principal (such as "kad/x") could use this flaw to impersonate any user to kadmind, and perform administrative actions as that user. (CVE-2014-9422)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="krb5-devel" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-devel-1.10.3-37.el6_6.i686.rpm</filename><sum type="sha256">47141ffb54261754db57236e00bcdae6d85efd4df74edc1b3d13f1235a2bf78a</sum></package><package arch="x86_64" name="krb5-devel" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-devel-1.10.3-37.el6_6.x86_64.rpm</filename><sum type="sha256">7ff5d3fdd97693c5c1b2ad0cd9dd29a34433aed534d5e9acc8a60c02066b5ee4</sum></package><package arch="x86_64" name="krb5-server-ldap" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-server-ldap-1.10.3-37.el6_6.x86_64.rpm</filename><sum type="sha256">12c352fdbf992c5f295e58ffafc4385f817e85dc2a184d4812802880a39e9bf7</sum></package><package arch="x86_64" name="krb5-workstation" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-workstation-1.10.3-37.el6_6.x86_64.rpm</filename><sum type="sha256">47612976196d33d2f20d124106323bae91be3c9f274cdfa4a3acaecccd900a2f</sum></package><package arch="i686" name="krb5-libs" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-libs-1.10.3-37.el6_6.i686.rpm</filename><sum type="sha256">c0248cdd5fe73a36aead69a05c21db9811897d2d42fc2ace0dc8dbe72036489e</sum></package><package arch="i686" name="krb5-server-ldap" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-server-ldap-1.10.3-37.el6_6.i686.rpm</filename><sum type="sha256">4985653f38c04915d4b4ff87d3b62da3c3158d40b3bce702448d7082d92c1313</sum></package><package arch="x86_64" name="krb5-libs" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-libs-1.10.3-37.el6_6.x86_64.rpm</filename><sum type="sha256">1f66adaaaa67b3b974429d3edc32f90661fe2d700a44fc6d816a95ab669d8e2b</sum></package><package arch="x86_64" name="krb5-server" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-server-1.10.3-37.el6_6.x86_64.rpm</filename><sum type="sha256">f7b34b4d1c6e61385a968a7457ec24683725446848229bdccf6588cbde8eb674</sum></package><package arch="x86_64" name="krb5-pkinit-openssl" release="37.el6_6" src="krb5-1.10.3-37.el6_6.src.rpm" version="1.10.3"><filename>krb5-pkinit-openssl-1.10.3-37.el6_6.x86_64.rpm</filename><sum type="sha256">992f11389059582dbfae6b4c03af522994223e4be651dc776ee1ce8e4346c4ee</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" id="CVE-2014-5352" title="Krb5: Gss_Process_Context_Token() Incorrectly Frees Context (Mitkrb5-Sa-2015-001)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" id="CVE-2014-5353" title="Krb5: Null Pointer Dereference When Using A Ticket Policy Name As A Password Policy Name" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" id="CVE-2014-5355" title="Krb5: Unauthenticated Denial Of Service In Recvauth_Common() And Others" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" id="CVE-2014-9421" title="Krb5: Kadmind Doubly Frees Partial Deserialization Results (Mitkrb5-Sa-2015-001)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" id="CVE-2014-9422" title="Krb5: Kadmind Incorrectly Validates Server Principal Name (Mitkrb5-Sa-2015-001)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174543" id="1174543" title="Krb5: Null Pointer Dereference When Using A Ticket Policy Name As A Password Policy Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179856" id="1179856" title="Krb5: Gss_Process_Context_Token() Incorrectly Frees Context (Mitkrb5-Sa-2015-001)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179857" id="1179857" title="Krb5: Kadmind Doubly Frees Partial Deserialization Results (Mitkrb5-Sa-2015-001)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179861" id="1179861" title="Krb5: Kadmind Incorrectly Validates Server Principal Name (Mitkrb5-Sa-2015-001)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193939" id="1193939" title="Krb5: Unauthenticated Denial Of Service In Recvauth_Common() And Others" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0794.html" id="RHSA-2015:0794-1" title="Rhsa-2015:0794-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0797-1</id><title>Moderate: Xorg-X11-Server Security Update</title><description>A buffer over-read flaw was found in the way the X.Org server handled XkbGetGeometry requests. A malicious, authorized client could use this flaw to disclose portions of the X.Org server memory, or cause the X.Org server to crash using a specially crafted XkbGetGeometry request. (CVE-2015-0255)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="xorg-x11-server-source" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-source-1.15.0-26.sl6.noarch.rpm</filename><sum type="sha256">13bedaa35b471610cc3d2d7435e873007c6774aa07e1aaf278327078f4078b99</sum></package><package arch="i686" name="xorg-x11-server-devel" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-devel-1.15.0-26.sl6.i686.rpm</filename><sum type="sha256">650f9da0e9239255bfec2253e5175250cf139547ec688f9ee977dc9bb8f608fe</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xorg-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">753469e6af7e4baba2f63f62e47545f17fe0d1c065d5708ca5af7207064a8b3b</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-devel-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">ce41760ec4cc524d269a037534834f3d72785859f5b7ed0b490a051e0b2a1c3b</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xdmx-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">d71118cc251f4782ea481c803367e49c6860afc4841e751e886ffeded24aec14</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xephyr-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">a2629e8ca401da422c8b4a82a9c2963ffd52945106ba8ce51657f3d466780d94</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xnest-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">4b433599f54a90a3f191346728e989f979b015542ae1d692ddbad40e2eb48768</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-common-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">7ce10129599e5aa16eb1abbdd09bba30028d1635595ba4825576ce433068eb9e</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="26.sl6" src="xorg-x11-server-1.15.0-26.sl6.src.rpm" version="1.15.0"><filename>xorg-x11-server-Xvfb-1.15.0-26.sl6.x86_64.rpm</filename><sum type="sha256">116a84d54abf9f69ae207e0c9d120a6573240b262648405cbb6ca35584baa04b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" id="CVE-2015-0255" title="Xorg-X11-Server: Information Leak In The " type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1189062" id="1189062" title="Xorg-X11-Server: Information Leak In The " type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0797.html" id="RHSA-2015:0797-1" title="Rhsa-2015:0797-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0806-1</id><title>Critical: Java-1.7.0-Openjdk Security Update</title><description>An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) 
A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) 
A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) 
A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0477) 
A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) 
It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-04-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.5.5.1.el6_6" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el6_6.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el6_6.x86_64.rpm</filename><sum type="sha256">4c5cad2aff4afcd9cf1ee9bcc9b3fe199a0f09827f8665e2b9e4dfb243d238c1</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.5.1.el6_6" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el6_6.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el6_6.noarch.rpm</filename><sum type="sha256">25ee63c46246a392493117a627fc57c0b2df61af818e0bad80187e2c8e3c9b7f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.5.1.el6_6" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el6_6.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el6_6.x86_64.rpm</filename><sum type="sha256">5b303ec36f50940ab682652de8603a8b79a0912465fc7b696482e3dffc72397f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.5.1.el6_6" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el6_6.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el6_6.x86_64.rpm</filename><sum type="sha256">816e71857cb441947c40ced4ddb1564d27abb87aa61488ea84784dba79b761d0</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.5.1.el6_6" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el6_6.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el6_6.x86_64.rpm</filename><sum type="sha256">2ab21fa894bd97d040b17934ec28fa111c78a49369b78a69d1cf01a80698fdd0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1080" id="CVE-2005-1080" title="Cve-2005-1080" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" id="CVE-2015-0460" title="Cve-2015-0460" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" id="CVE-2015-0469" title="Cve-2015-0469" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" id="CVE-2015-0477" title="Cve-2015-0477" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" id="CVE-2015-0478" title="Cve-2015-0478" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" id="CVE-2015-0480" title="Cve-2015-0480" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" id="CVE-2015-0488" title="Cve-2015-0488" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210355" id="1210355" title="Openjdk: Rsa Implementation Hardening (Jce, 8071726)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210829" id="1210829" title="Icu: Layout Engine Glyphstorage Off-By-One (Openjdk 2D, 8067699)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211285" id="1211285" title="Openjdk: Incorrect Handling Of Phantom References (Hotspot, 8071931)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211299" id="1211299" title="Openjdk: Incorrect Permissions Check In Resource Loading (Beans, 8068320)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211504" id="1211504" title="Openjdk: Jar Directory Traversal Issues (Tools, 8064601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211543" id="1211543" title="Openjdk: Certificate Options Parsing Uncaught Exception (Jsse, 8068720)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=606442" id="606442" title="Jar: Directory Traversal Vulnerability" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0806.html" id="RHSA-2015:0806-1" title="Rhsa-2015:0806-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0808-1</id><title>Important: Java-1.6.0-Openjdk Security Update</title><description>An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) 
A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) 
A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) 
A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0477) 
A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) 
It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.7.1.el6_6" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el6_6.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el6_6.x86_64.rpm</filename><sum type="sha256">95f5264021b2f51e41aac6c73764981895063af1eb205a7197e418690cfa044e</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.7.1.el6_6" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el6_6.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el6_6.x86_64.rpm</filename><sum type="sha256">b3d87ce4dbbd577ce864399eab23862fcb0cc441d7ab4425e805907d8a714492</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.7.1.el6_6" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el6_6.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el6_6.x86_64.rpm</filename><sum type="sha256">f2e44a4bbf474c9715ffa9ef9e6f1b111d3460d885933f158722e99a975273e6</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.7.1.el6_6" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el6_6.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el6_6.x86_64.rpm</filename><sum type="sha256">5b366088677276d06a89eca2f13ac213036d2156ee207de9c55d05788e3aa5f0</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.7.1.el6_6" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el6_6.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el6_6.x86_64.rpm</filename><sum type="sha256">f4eed79a16d45e6774c63550076484fb340ac61c10ae8d344838b7231f7f55af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1080" id="CVE-2005-1080" title="Cve-2005-1080" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" id="CVE-2015-0460" title="Cve-2015-0460" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" id="CVE-2015-0469" title="Cve-2015-0469" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" id="CVE-2015-0477" title="Cve-2015-0477" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" id="CVE-2015-0478" title="Cve-2015-0478" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" id="CVE-2015-0480" title="Cve-2015-0480" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" id="CVE-2015-0488" title="Cve-2015-0488" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210355" id="1210355" title="Openjdk: Rsa Implementation Hardening (Jce, 8071726)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210829" id="1210829" title="Icu: Layout Engine Glyphstorage Off-By-One (Openjdk 2D, 8067699)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211285" id="1211285" title="Openjdk: Incorrect Handling Of Phantom References (Hotspot, 8071931)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211299" id="1211299" title="Openjdk: Incorrect Permissions Check In Resource Loading (Beans, 8068320)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211504" id="1211504" title="Openjdk: Jar Directory Traversal Issues (Tools, 8064601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211543" id="1211543" title="Openjdk: Certificate Options Parsing Uncaught Exception (Jsse, 8068720)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=606442" id="606442" title="Jar: Directory Traversal Vulnerability" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0808.html" id="RHSA-2015:0808-1" title="Rhsa-2015:0808-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0809-1</id><title>Important: Java-1.8.0-Openjdk Security Update</title><description>An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) 
A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) 
A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) 
Multiple flaws were discovered in the Beans and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-0477, CVE-2015-0470) 
A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) 
It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="28.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.src.rpm" version="1.8.0.45"><filename>java-1.8.0-openjdk-javadoc-1.8.0.45-28.b13.el6_6.noarch.rpm</filename><sum type="sha256">53a7abd3e334f6c37dfb68a5c8b8c1dab1d268b7e964e29097af02d876db6ee9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="28.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.src.rpm" version="1.8.0.45"><filename>java-1.8.0-openjdk-headless-1.8.0.45-28.b13.el6_6.x86_64.rpm</filename><sum type="sha256">bee4efca1a92044b6f6ba84161702b9330d5794eab35850ac44e9d51000a3495</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="28.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.src.rpm" version="1.8.0.45"><filename>java-1.8.0-openjdk-demo-1.8.0.45-28.b13.el6_6.x86_64.rpm</filename><sum type="sha256">c4c582f1b7793a45161ff00b7567a54df4ac68d39e73d945fccb5bd8bafaca45</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="28.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.src.rpm" version="1.8.0.45"><filename>java-1.8.0-openjdk-devel-1.8.0.45-28.b13.el6_6.x86_64.rpm</filename><sum type="sha256">13d6a14377b18e21da30df878c62bd889391699d30853a773df3bcf6dcbfd034</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="28.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.src.rpm" version="1.8.0.45"><filename>java-1.8.0-openjdk-src-1.8.0.45-28.b13.el6_6.x86_64.rpm</filename><sum type="sha256">3a5a39d420c086eb8b4d5b94a619adfd0aed9432d08a729309298ad82e57d2f4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="28.b13.el6_6" src="java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.src.rpm" version="1.8.0.45"><filename>java-1.8.0-openjdk-1.8.0.45-28.b13.el6_6.x86_64.rpm</filename><sum type="sha256">96abf7651c75cb0611dc014443086752740cd8cfda7c55d0eeec8776e991e9f1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1080" id="CVE-2005-1080" title="Cve-2005-1080" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" id="CVE-2015-0460" title="Cve-2015-0460" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" id="CVE-2015-0469" title="Cve-2015-0469" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470" id="CVE-2015-0470" title="Cve-2015-0470" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" id="CVE-2015-0477" title="Cve-2015-0477" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" id="CVE-2015-0478" title="Cve-2015-0478" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" id="CVE-2015-0480" title="Cve-2015-0480" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" id="CVE-2015-0488" title="Cve-2015-0488" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210355" id="1210355" title="Openjdk: Rsa Implementation Hardening (Jce, 8071726)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210829" id="1210829" title="Icu: Layout Engine Glyphstorage Off-By-One (Openjdk 2D, 8067699)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211285" id="1211285" title="Openjdk: Incorrect Handling Of Phantom References (Hotspot, 8071931)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211299" id="1211299" title="Openjdk: Incorrect Permissions Check In Resource Loading (Beans, 8068320)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211387" id="1211387" title="Openjdk: Incorrect Handling Of Default Methods (Hotspot, 8065366)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211504" id="1211504" title="Openjdk: Jar Directory Traversal Issues (Tools, 8064601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211543" id="1211543" title="Openjdk: Certificate Options Parsing Uncaught Exception (Jsse, 8068720)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=606442" id="606442" title="Jar: Directory Traversal Vulnerability" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0809.html" id="RHSA-2015:0809-1" title="Rhsa-2015:0809-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0863-1</id><title>Moderate: Glibc Security Update</title><description>A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) 
It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) 
This update also fixes the following bug: 
* Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glibc-static" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">f56389b70acd961fe700d9b5f40e9b0f68bda66f3ca46497eaee0245fb90fc03</sum></package><package arch="i686" name="glibc" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6_6.7.i686.rpm</filename><sum type="sha256">0140d4a427ef1081ac9ab91a612843dca742dc5802d86f108ef69b8ed10630f3</sum></package><package arch="x86_64" name="glibc-headers" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">bd62ef179b28613fef518a28663ee92fab73182daa8b81e37e0dadd390631797</sum></package><package arch="x86_64" name="glibc-utils" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">d4823f4a4148c214bef35a6e3c10dc4f30fe9e0fb521f0a4b0c2ced51bb2534a</sum></package><package arch="i686" name="glibc-static" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-static-2.12-1.149.el6_6.7.i686.rpm</filename><sum type="sha256">8007e1bcd5d58119bae994203046ecacc51c7b092aa7814b323c0e57950530ca</sum></package><package arch="x86_64" name="glibc" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">075b0875920d15c706866dfd1fdef35323211e19bdf44523a9daf6443b752d81</sum></package><package arch="x86_64" name="nscd" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>nscd-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">a3c61e19bd076247852672f74cf9cf3d77a4ac68fbf37e7d7387992e518eb118</sum></package><package arch="x86_64" name="glibc-common" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-common-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">0bb438027ce5ad294e9d120148fb63e5fd2f74d77727fe966a083119df0cfa21</sum></package><package arch="x86_64" name="glibc-devel" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6_6.7.x86_64.rpm</filename><sum type="sha256">eb27169457d80bbda664bb70c9208bfda169ce90c5181bc699d593ad1c379f66</sum></package><package arch="i686" name="glibc-devel" release="1.149.el6_6.7" src="glibc-2.12-1.149.el6_6.7.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.149.el6_6.7.i686.rpm</filename><sum type="sha256">e94b5c3e4461499b2fa595f89a9db0ea82382fae878e25b454a7de33b87524dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" id="CVE-2013-7423" title="Glibc: Getaddrinfo() Writes Dns Queries To Random File Descriptors Under High Load" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" id="CVE-2015-1781" title="Glibc: Buffer Overflow In Gethostbyname_R() And Related Functions With Misaligned Buffer" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1187109" id="1187109" title="Glibc: Getaddrinfo() Writes Dns Queries To Random File Descriptors Under High Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199525" id="1199525" title="Glibc: Buffer Overflow In Gethostbyname_R() And Related Functions With Misaligned Buffer" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0863.html" id="RHSA-2015:0863-1" title="Rhsa-2015:0863-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0864-1</id><title>Important: Kernel Security Update</title><description>* A flaw was found in the way seunshare, a utility for running executables under a different security context, used the capng_lock functionality of the libcap-ng library. The subsequent invocation of suid root binaries that relied on the fact that the setuid() system call, among others, also sets the saved set-user-ID when dropping the binaries' process privileges, could allow a local, unprivileged user to potentially escalate their privileges on the system. Note: the fix for this issue is the kernel part of the overall fix, and introduces the PR_SET_NO_NEW_PRIVS functionality and the related SELinux exec transitions support. (CVE-2014-3215, Important) 
* A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1421, Important) 
* It was found that the Linux kernel's KVM implementation did not ensure that the host CR4 control register value remained unchanged across VM entries on the same virtual CPU. A local, unprivileged user could use this flaw to cause a denial of service on the system. (CVE-2014-3690, Moderate) 
* An out-of-bounds memory access flaw was found in the syscall tracing functionality of the Linux kernel's perf subsystem. A local, unprivileged user could use this flaw to crash the system. (CVE-2014-7825, Moderate) 
* An out-of-bounds memory access flaw was found in the syscall tracing functionality of the Linux kernel's ftrace subsystem. On a system with ftrace syscall tracing enabled, a local, unprivileged user could use this flaw to crash the system, or escalate their privileges. (CVE-2014-7826, Moderate) 
* It was found that the Linux kernel memory resource controller's (memcg) handling of OOM (out of memory) conditions could lead to deadlocks. An attacker able to continuously spawn new processes within a single memory- constrained cgroup during an OOM event could use this flaw to lock up the system. (CVE-2014-8171, Moderate) 
* A race condition flaw was found in the way the Linux kernel keys management subsystem performed key garbage collection. A local attacker could attempt accessing a key while it was being garbage collected, which would cause the system to crash. (CVE-2014-9529, Moderate) 
* A stack-based buffer overflow flaw was found in the TechnoTrend/Hauppauge DEC USB device driver. A local user with write access to the corresponding device could use this flaw to crash the kernel or, potentially, elevate their privileges on the system. (CVE-2014-8884, Low) 
* An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory. (CVE-2014-9584, Low) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-28 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">b272365f3a0a7035388bd85cc574275a5edf5e0b20f904655d6ade449417147c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">51c970a38158530a5d0c30c430cf21ffc2d6095ccd6790791ca053db50712fe0</sum></package><package arch="noarch" name="kernel-doc" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.16.2.el6.noarch.rpm</filename><sum type="sha256">1e4955677ef6ff83e6a1eb9a9fe502935876c081a04c7333ac7f0e829c5913c5</sum></package><package arch="noarch" name="kernel-firmware" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.16.2.el6.noarch.rpm</filename><sum type="sha256">aead4e486e866e5515b3628df455e82e82243c035aeaf80951987b9cd0981536</sum></package><package arch="x86_64" name="perf" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">2a95925a2ba1bdc45fb4022ca0cbeacd47f5463a27558be0a1c97a02e057b8fd</sum></package><package arch="x86_64" name="kernel-debug" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">0e596306f89f0fd335f790f954411b41d6e9e1d7c05fe0206d0e0a4d34d84d4d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.16.2.el6.noarch.rpm</filename><sum type="sha256">be588d39d244cb7db4d3f2f6a4885c27113820fd27bd8afa5c2c36dbfc89fee3</sum></package><package arch="x86_64" name="kernel-headers" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">a9a346d66eccf066c1ea67e9f3ac903a714c5f75becc295ae0567ae1162a3f1f</sum></package><package arch="x86_64" name="python-perf" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">a4f91b7fc75f8c2a917fae4beaed02ec71d3f9d361cc772142d0b1cd3eac3368</sum></package><package arch="x86_64" name="kernel-devel" release="504.16.2.el6" src="kernel-2.6.32-504.16.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.16.2.el6.x86_64.rpm</filename><sum type="sha256">434a480f9e3a43a10bafb6f9408813fa947dcf7e5c7c799d3b1f203d22e4f25b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3215" id="CVE-2014-3215" title="Policycoreutils: Local Privilege Escalation Via Seunshare" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" id="CVE-2014-3690" title="Kernel: Kvm: Vmx: Invalid Host Cr4 Handling Across Vm Entries" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7825" id="CVE-2014-7825" title="Kernel: Insufficient Syscall Number Validation In Perf And Ftrace Subsystems" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" id="CVE-2014-7826" title="Kernel: Insufficient Syscall Number Validation In Perf And Ftrace Subsystems" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8171" id="CVE-2014-8171" title="Kernel: Memcg: Oom Handling Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" id="CVE-2014-8884" title="Kernel: Usb: Buffer Overflow In Ttusb-Dec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529" id="CVE-2014-9529" title="Kernel: Memory Corruption Or Panic During Key Garbage Collection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" id="CVE-2014-9584" title="Kernel: Isofs: Unchecked Printing Of Er Records" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421" id="CVE-2015-1421" title="Kernel: Net: Slab Corruption From Use After Free On Init Collisions" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1095855" id="1095855" title="Policycoreutils: Local Privilege Escalation Via Seunshare" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153322" id="1153322" title="Kernel: Kvm: Vmx: Invalid Host Cr4 Handling Across Vm Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1161565" id="1161565" title="Kernel: Insufficient Syscall Number Validation In Perf And Ftrace Subsystems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1164266" id="1164266" title="Kernel: Usb: Buffer Overflow In Ttusb-Dec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1179813" id="1179813" title="Kernel: Memory Corruption Or Panic During Key Garbage Collection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180119" id="1180119" title="Kernel: Isofs: Unchecked Printing Of Er Records" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196581" id="1196581" title="Kernel: Net: Slab Corruption From Use After Free On Init Collisions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198109" id="1198109" title="Kernel: Memcg: Oom Handling Dos" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0864.html" id="RHSA-2015:0864-1" title="Rhsa-2015:0864-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0867-1</id><title>Important: Qemu-Kvm Security Update</title><description>It was found that the Cirrus blit region checks were insufficient. A privileged guest user could use this flaw to write outside of VRAM- allocated buffer boundaries in the host's QEMU process address space with attacker-provided data. (CVE-2014-8106) 
This update also fixes the following bug: 
* Previously, the effective downtime during the last phase of a live migration would sometimes be much higher than the maximum downtime specified by 'migration_downtime' in vdsm.conf. This problem has been corrected. The value of 'migration_downtime' is now honored and the migration is aborted if the downtime cannot be achieved. 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.448.el6_6.2" src="qemu-kvm-0.12.1.2-2.448.el6_6.2.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.448.el6_6.2.x86_64.rpm</filename><sum type="sha256">f33b34bb8afd842c3404ef26d48457db84ce799328a5e8c1e7dd81890eb9112a</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.448.el6_6.2" src="qemu-kvm-0.12.1.2-2.448.el6_6.2.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.448.el6_6.2.x86_64.rpm</filename><sum type="sha256">16e8132e37a7cf2f9bdda1d162a0155cda70153893822b3bab88fa0008b24909</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.448.el6_6.2" src="qemu-kvm-0.12.1.2-2.448.el6_6.2.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.448.el6_6.2.x86_64.rpm</filename><sum type="sha256">1fbd5378eff66d4e686967fcdc5d3dec6a0000170174b0f9baa80860d1f6934e</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.448.el6_6.2" src="qemu-kvm-0.12.1.2-2.448.el6_6.2.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.448.el6_6.2.x86_64.rpm</filename><sum type="sha256">84700f0dae908f9699e42df51db0808d91f61056a9476cd4dcd258325e8f1666</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" id="CVE-2014-8106" title="Qemu: Cirrus: Insufficient Blit Region Checks" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169454" id="1169454" title="Qemu: Cirrus: Insufficient Blit Region Checks" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0867.html" id="RHSA-2015:0867-1" title="Rhsa-2015:0867-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0988-1</id><title>Critical: Firefox Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2708, CVE-2015-0797, CVE-2015-2710, CVE-2015-2713) 
A heap-based buffer overflow flaw was found in the way Firefox processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Firefox, could cause it to crash or execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2716) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="4.el6_6" src="firefox-38.0-4.el6_6.src.rpm" version="38.0"><filename>firefox-38.0-4.el6_6.i686.rpm</filename><sum type="sha256">6eec84d593784cc3e187cd4e72ecbb36b625d0b1a6a3d61911e0aa781ebb066a</sum></package><package arch="x86_64" name="firefox" release="4.el6_6" src="firefox-38.0-4.el6_6.src.rpm" version="38.0"><filename>firefox-38.0-4.el6_6.x86_64.rpm</filename><sum type="sha256">ccbea1c3ee8abd67a4925c7b373487e1503262ed32d932adde52e090c7535aa0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" id="CVE-2015-0797" title="Mozilla: Buffer Overflow Parsing H.264 Video With Linux Gstreamer (Mfsa 2015-47)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" id="CVE-2015-2708" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" id="CVE-2015-2710" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" id="CVE-2015-2713" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" id="CVE-2015-2716" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Critical" id="Critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220597" id="1220597" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220600" id="1220600" title="Mozilla: Buffer Overflow Parsing H.264 Video With Linux Gstreamer (Mfsa 2015-47)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220601" id="1220601" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220605" id="1220605" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220607" id="1220607" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0988.html" id="RHSA-2015:0988-1" title="Rhsa-2015:0988-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0990-1</id><title>Important: Pcs Security Update</title><description>It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI. Note: the pcsd web UI is not enabled by default. (CVE-2015-1848) 
This update also fixes the following bug: 
* When the IPv6 protocol was disabled on a system, starting the pcsd daemon on this system previously failed. This update adds the ability for pcsd to fall back to IPv4 when IPv6 is not available. As a result, pcsd starts properly and uses IPv4 if IPv6 is disabled. 
After installing the updated packages, the pcsd daemon will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pcs" release="9.el6_6.2" src="pcs-0.9.123-9.el6_6.2.src.rpm" version="0.9.123"><filename>pcs-0.9.123-9.el6_6.2.x86_64.rpm</filename><sum type="sha256">9d812cb0810fa1e594aa0fd270dbc3e95790d9a0c6d32b592577da725aec7df4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1848" id="CVE-2015-1848" title="Pcs: Improper Web Session Variable Signing" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1208294" id="1208294" title="Cve-2015-1848 Pcs: Improper Web Session Variable Signing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212115" id="1212115" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0990.html" id="RHSA-2015:0990-1" title="Rhsa-2015:0990-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0991-1</id><title>Moderate: Tomcat6 Security Update</title><description>It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service. (CVE-2014-0227) 
This update also fixes the following bug: 
* Before this update, the tomcat6 init script did not try to kill the tomcat process if an attempt to stop it was unsuccessful, which would prevent tomcat from restarting properly. The init script was modified to correct this issue. 
Tomcat must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="tomcat6-admin-webapps" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">13d89a06e67474028866a4af7fa8340a05d70a9bc7c5d1e0aa56c3bb47bb7c72</sum></package><package arch="x86_64" name="tomcat6-jsp-2.1-api" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">4b2399254353b522c445a26f20ad705486b34e0d3b2c762e76c33571739c84d3</sum></package><package arch="x86_64" name="tomcat6-javadoc" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">dd02a7967fc95dbaafbcf2febb5552e9bb40415fd7f9734ca0717293da93a4bb</sum></package><package arch="x86_64" name="tomcat6-el-2.1-api" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">563ab8a734db294346cc53785bc1db16b9247ca86e5ba4f03f2560768ae2f4da</sum></package><package arch="x86_64" name="tomcat6-docs-webapp" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">2fee9eb66c8bdda55f1ba307d739f73c4e145fa670bb99b8fe0f1b3afd7b2b87</sum></package><package arch="x86_64" name="tomcat6-servlet-2.5-api" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">e6f2527f867d79f807966a4c9517775b69f2220b498ad0c8e631eb6483fcd027</sum></package><package arch="x86_64" name="tomcat6" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">2b981d60d2a06801d6fdaeba9cf29a9728f8409e71adf08fc03a5eeaedbccbdc</sum></package><package arch="x86_64" name="tomcat6-webapps" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">47be41e0fb56629551c65da6c38c8b82f3c526224a2c42596825f4b07e1b6148</sum></package><package arch="x86_64" name="tomcat6-lib" release="83.el6_6" src="tomcat6-6.0.24-83.el6_6.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-83.el6_6.x86_64.rpm</filename><sum type="sha256">4b76351e13ce4abfd5066b7e0617dc1acf3c46b3ee465c0266ff8b71dbfdb8d8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227" id="CVE-2014-0227" title="Tomcat/Jbossweb: Request Smuggling Andl Imited Dos In Chunkedinputfilter" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Moderate" id="Moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1109196" id="1109196" title="Cve-2014-0227 Tomcat/Jbossweb: Request Smuggling Andl Imited Dos In Chunkedinputfilter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207048" id="1207048" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0991.html" id="RHSA-2015:0991-1" title="Rhsa-2015:0991-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:0998-1</id><title>Important: Qemu-Kvm Security Update</title><description>An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller (FDC) handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest. (CVE-2015-3456) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.448.el6_6.3" src="qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.448.el6_6.3.x86_64.rpm</filename><sum type="sha256">74d1503ef7a6c32050cdaf3d8cd5bbba7d8514ec902f8b44e7c714f7a21cebc5</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.448.el6_6.3" src="qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.448.el6_6.3.x86_64.rpm</filename><sum type="sha256">c625a4d6dde70dd9c93df40173bb2f3d5e5b8656c9cfa8a0c1159a8b31de726b</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.448.el6_6.3" src="qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.448.el6_6.3.x86_64.rpm</filename><sum type="sha256">153beffab5429da6ffc3c13a95a2ae497a36356292edcf879345591e58d28bc3</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.448.el6_6.3" src="qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.448.el6_6.3.x86_64.rpm</filename><sum type="sha256">5718e176d259fef0d1daf7b65a237e9b0630ac4ec835c7d4a4dd364edcd59d93</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" id="CVE-2015-3456" title="Qemu: Fdc: Out-Of-Bounds Fifo Buffer Memory Access" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218611" id="1218611" title="Qemu: Fdc: Out-Of-Bounds Fifo Buffer Memory Access" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-0998.html" id="RHSA-2015:0998-1" title="Rhsa-2015:0998-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1012-1</id><title>Important: Thunderbird Security Update</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2708, CVE-2015-2710, CVE-2015-2713) 
A heap-based buffer overflow flaw was found in the way Thunderbird processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Thunderbird, could cause it to crash or execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2716) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-05-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_6" src="thunderbird-31.7.0-1.el6_6.src.rpm" version="31.7.0"><filename>thunderbird-31.7.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">6712913af1cc4305df0e308377c3b5a9d586f56f5caa6849e3495a1975cd0d00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" id="CVE-2015-2708" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" id="CVE-2015-2710" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" id="CVE-2015-2713" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" id="CVE-2015-2716" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="cve" /><reference href="https://access.redhat.com/security/updates/classification/#Important" id="Important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220597" id="1220597" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220601" id="1220601" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220605" id="1220605" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220607" id="1220607" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="bugzilla" /><reference href="https://rhn.redhat.com/errata/RHSA-2015-1012.html" id="RHSA-2015:1012-1" title="Rhsa-2015:1012-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1072-1</id><title>Openssl</title><description>A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) 
Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-06-09 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl-devel" release="30.el6_6.9" src="openssl-1.0.1e-30.el6_6.9.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.9.i686.rpm</filename><sum type="sha256">c05a3eba0f7bd223486a2c7c5ddd52ecddc2e663d052c1387cdb9fe994bb3e61</sum></package><package arch="i686" name="openssl" release="30.el6_6.9" src="openssl-1.0.1e-30.el6_6.9.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.9.i686.rpm</filename><sum type="sha256">cb3fdb85a5f46aaa22698ed7dad64e0f0f0052f95ea0f890b0964f84a475dda6</sum></package><package arch="x86_64" name="openssl-devel" release="30.el6_6.9" src="openssl-1.0.1e-30.el6_6.9.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.9.x86_64.rpm</filename><sum type="sha256">0b27869f54c624322891efc3a56e7fd08dc227e102046ee12ed6007ae7c5abab</sum></package><package arch="x86_64" name="openssl-static" release="30.el6_6.9" src="openssl-1.0.1e-30.el6_6.9.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-30.el6_6.9.x86_64.rpm</filename><sum type="sha256">336866855191978b028738e7ef47f1838da626f81b01b190238d4b03d3db8f90</sum></package><package arch="x86_64" name="openssl" release="30.el6_6.9" src="openssl-1.0.1e-30.el6_6.9.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.9.x86_64.rpm</filename><sum type="sha256">11a52674cf1eafce609cb14c0203f83cb1a079eea6916c103c46fcb0c835eaa9</sum></package><package arch="x86_64" name="openssl-perl" release="30.el6_6.9" src="openssl-1.0.1e-30.el6_6.9.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-30.el6_6.9.x86_64.rpm</filename><sum type="sha256">182d27933260f039cddc3fdb7d696c4185cd4a3e5e7e0bad78bf0af525768a77</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1072" id="RHSA-2015:1072-1" title="Rhsa-2015:1072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1081-1</id><title>Kernel</title><description>* It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) 
* A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AES-GCM mode IPSec security association. (CVE-2015-3331, Important) 
* An information leak flaw was found in the way the Linux kernel changed certain segment registers and thread-local storage (TLS) during a context switch. A local, unprivileged user could use this flaw to leak the user space TLS base address of an arbitrary process. (CVE-2014-9419, Low) 
* It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) 
* An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-06-16 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="perf" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">d2da6e87bedab209b3b5607a1cdcc2a3c8e0b452d6666317b8a085e9559eba06</sum></package><package arch="noarch" name="kernel-firmware" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.23.4.el6.noarch.rpm</filename><sum type="sha256">b519100fb7d35e4f158feace7771c3b29682d59cafb0571db02e6524dd7e31f2</sum></package><package arch="x86_64" name="kernel-headers" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">38358ddfb447e159d1b29c22cbe2602df082afe7cee608f1023534661c24b3a2</sum></package><package arch="noarch" name="kernel-doc" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.23.4.el6.noarch.rpm</filename><sum type="sha256">4e1b92421ace1ff6d521245f09ead807a0b56fadd3fef125da1749e4c05623b9</sum></package><package arch="x86_64" name="kernel-debug" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">cf8b3d0984a77ce26ce4e657fe200c046600564f7f18a6d51ab626f6473b418d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.23.4.el6.noarch.rpm</filename><sum type="sha256">1712a8aebbd4a086f316aaabfd4cafa3a614a47a192e9f1fbe5c795742c3fee8</sum></package><package arch="x86_64" name="kernel" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">6e48df8231c598b82b969e56ee219c081372c069f7ae6f12864625a384e8e6d6</sum></package><package arch="x86_64" name="kernel-devel" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">777e2f85574e70e9ca619b4c93ba1c3178dde2b5ecad03a0ec28877bad2d7504</sum></package><package arch="x86_64" name="python-perf" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">0e470cb9f060b7491b39d8d50f3dcc1088b657c0f3d0ed3d623e2075f0d6de07</sum></package><package arch="x86_64" name="kernel-debug-devel" release="504.23.4.el6" src="kernel-2.6.32-504.23.4.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.23.4.el6.x86_64.rpm</filename><sum type="sha256">b87fb6685073e24fce35de4fa34a8e01a73b4282c985cd80eef216f33866ae80</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" id="CVE-2014-9419" title="Kernel: Partial Aslr Bypass Through Tls Base Addresses Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" id="CVE-2014-9420" title="Kernel: Fs: Isofs: Infinite Loop In Ce Record Entries" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" id="CVE-2014-9585" title="Kernel: Aslr Bruteforce Possible For Vdso Library" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" id="CVE-2015-1805" title="Kernel: Pipe: Iovec Overrun Leading To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331" id="CVE-2015-3331" title="Kernel: Crypto: Buffer Overruns In Rfc4106 Implementation Using Aesni" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1081" id="RHSA-2015:1081-1" title="Rhsa-2015:1081-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1175235" id="1175235" title="Kernel: Fs: Isofs: Infinite Loop In Ce Record Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1177260" id="1177260" title="Kernel: Partial Aslr Bypass Through Tls Base Addresses Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181054" id="1181054" title="Kernel: Aslr Bruteforce Possible For Vdso Library" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202855" id="1202855" title="Kernel: Pipe: Iovec Overrun Leading To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213322" id="1213322" title="Cve-2015-3331 Kernel: Crypto: Buffer Overruns In Rfc4106 Implementation Using Aesni" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1087-1</id><title>Qemu-Kvm</title><description>A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled multi-TMD packets with a length above 4096 bytes. A privileged guest user in a guest with an AMD PCNet ethernet card enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. (CVE-2015-3209) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.448.el6_6.4" src="qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.448.el6_6.4.x86_64.rpm</filename><sum type="sha256">31ea1d90cf90c93d26c37f36065636b0bccc023449146af5c974a7bd9406f91c</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.448.el6_6.4" src="qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm</filename><sum type="sha256">81df9937fbd85fd8a5ba3e86e76ac6bfeb67c17e8dda5aa04553e1d99d57c26c</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.448.el6_6.4" src="qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.448.el6_6.4.x86_64.rpm</filename><sum type="sha256">0e0438105e53794e3c7984ef6e0747790cb81e2b65a07748309db51f992eee08</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.448.el6_6.4" src="qemu-kvm-0.12.1.2-2.448.el6_6.4.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.448.el6_6.4.x86_64.rpm</filename><sum type="sha256">8078833527370e56111707ef541e35b964d0bf626ef341da96a6d7832d586b15</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" id="CVE-2015-3209" title="Qemu: Pcnet: Multi-Tmd Buffer Overflow In The Tx Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1087" id="RHSA-2015:1087-1" title="Rhsa-2015:1087-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1225882" id="1225882" title="Qemu: Pcnet: Multi-Tmd Buffer Overflow In The Tx Path" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1115-1</id><title>Openssl</title><description>An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176) 
A flaw was found in the way the OpenSSL packages shipped with Scientific Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216) 
An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) 
A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. (CVE-2015-1791) 
A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792) 
A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-06-23 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl-devel" release="30.el6_6.11" src="openssl-1.0.1e-30.el6_6.11.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm</filename><sum type="sha256">2c196474f36e68a5e09d29136c2698e4d148c396ecabf418b6c4e72859dad119</sum></package><package arch="i686" name="openssl" release="30.el6_6.11" src="openssl-1.0.1e-30.el6_6.11.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.11.i686.rpm</filename><sum type="sha256">79ea371cf3fb540927a212741c57356a61305d8e59c1e8f5d79ac869f6a9fa59</sum></package><package arch="x86_64" name="openssl" release="30.el6_6.11" src="openssl-1.0.1e-30.el6_6.11.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-30.el6_6.11.x86_64.rpm</filename><sum type="sha256">3352a9a1aae3a8f2c05f04f37cac19d92502411d86d0e6650dd16d0874e04c15</sum></package><package arch="x86_64" name="openssl-static" release="30.el6_6.11" src="openssl-1.0.1e-30.el6_6.11.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm</filename><sum type="sha256">9940da05fcb679b1cddd29b9f216822b8d7e7e2a261a5a7e746af044adf8a8c8</sum></package><package arch="x86_64" name="openssl-perl" release="30.el6_6.11" src="openssl-1.0.1e-30.el6_6.11.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm</filename><sum type="sha256">8e4c855a82f1cdd6c2b3ce6e28f72469515ae896af1c5dec254ca03a0b7e9198</sum></package><package arch="i686" name="openssl-devel" release="30.el6_6.11" src="openssl-1.0.1e-30.el6_6.11.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-30.el6_6.11.i686.rpm</filename><sum type="sha256">c7e88cbed4bd8d9d744b1a230fb53927f725fe458c47300ed1c97a978894816b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176" id="CVE-2014-8176" title="Cve-2014-8176" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" id="CVE-2015-1789" title="Cve-2015-1789" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" id="CVE-2015-1790" title="Cve-2015-1790" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" id="CVE-2015-1791" title="Cve-2015-1791" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" id="CVE-2015-1792" title="Cve-2015-1792" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" id="CVE-2015-3216" title="Cve-2015-3216" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1115" id="RHSA-2015:1115-1" title="Rhsa-2015:1115-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227574" id="1227574" title="Openssl: Crash In Ssleay_Rand_Bytes Due To Locking Regression" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1123-1</id><title>Cups</title><description>A string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) 
A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the 'localhost' or loopback interface. (CVE-2015-1159) 
An integer overflow leading to a heap-based buffer overflow was found in the way cups handled compressed raster image files. An attacker could create a specially-crafted image file, which when passed via the cups Raster filter, could cause the cups filter to crash. (CVE-2014-9679) 
After installing this update, the cupsd daemon will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-06-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="1" name="cups-libs" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-libs-1.4.2-67.el6_6.1.i686.rpm</filename><sum type="sha256">449e9227fd3b6fad9095bf394a4ce9311ac41227a0cd63ef847b04a4eb9da6e1</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm</filename><sum type="sha256">18563a39829b3b651cdf6160f2b942aa2d6d1f8db767076a423dffbbc47ef2b4</sum></package><package arch="i686" epoch="1" name="cups-devel" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-devel-1.4.2-67.el6_6.1.i686.rpm</filename><sum type="sha256">52a7a3ba7f06918d83f4020d1f3340d6400616a383bba08044db8cfed9a7c5d5</sum></package><package arch="x86_64" epoch="1" name="cups-php" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-php-1.4.2-67.el6_6.1.x86_64.rpm</filename><sum type="sha256">d2e1a458333b55eabbb4730599356adf6940aef9673cfb7b2b9555b32c67ebec</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-libs-1.4.2-67.el6_6.1.x86_64.rpm</filename><sum type="sha256">183a99444d6d3dc3314dfd40e41d464e103031ef840c2f97eff35309e6444114</sum></package><package arch="x86_64" epoch="1" name="cups-devel" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-devel-1.4.2-67.el6_6.1.x86_64.rpm</filename><sum type="sha256">8709dfe62f0782c22a5348965344882323278daae8a6a9395e51d5c9391ec7b5</sum></package><package arch="x86_64" epoch="1" name="cups" release="67.el6_6.1" src="cups-1.4.2-67.el6_6.1.src.rpm" version="1.4.2"><filename>cups-1.4.2-67.el6_6.1.x86_64.rpm</filename><sum type="sha256">57d407cd5519e491c4184bde62062bb293a3acdd98e9ccd3e3233d9fe8c089fe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" id="CVE-2014-9679" title="Cups: Cupsrasterreadpixels Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" id="CVE-2015-1158" title="Cups: Incorrect String Reference Counting (Vu#810572)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" id="CVE-2015-1159" title="Cups: Cross-Site Scripting Flaw In Cups Web Ui (Vu#810572)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1123" id="RHSA-2015:1123-1" title="Rhsa-2015:1123-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191588" id="1191588" title="Cups: Cupsrasterreadpixels Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221641" id="1221641" title="Cups: Incorrect String Reference Counting (Vu#810572)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221642" id="1221642" title="Cups: Cross-Site Scripting Flaw In Cups Web Ui (Vu#810572)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1185-1</id><title>Nss</title><description>A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) 
Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. 
The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-07-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-devel" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-3.el6_6.x86_64.rpm</filename><sum type="sha256">40c7c83d3d545ef595524cb37aa56189bd3c53ee72fd0b0857d6bd83968813cf</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-sysinit-3.19.1-3.el6_6.x86_64.rpm</filename><sum type="sha256">0e5448fed7d4e05159511628efe0ea2bb53c895f971a5761e2c9cdda0c63c262</sum></package><package arch="i686" name="nss-devel" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-3.el6_6.i686.rpm</filename><sum type="sha256">bd583ae8aa9bc787496c4a6b6dcd2654bbef9530969d5e633c9496bd59886095</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_6" src="nss-util-3.19.1-1.el6_6.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-1.el6_6.x86_64.rpm</filename><sum type="sha256">14c807977182e00ed0551b0c8bf71f81fd7979b3b159892cf8fa986c8a3438aa</sum></package><package arch="i686" name="nss" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-3.19.1-3.el6_6.i686.rpm</filename><sum type="sha256">04d2fddf39cd3b8958969b1edd3ce28b9cfd9abd88b7fe76464f36fc57d71e5b</sum></package><package arch="x86_64" name="nss-util" release="1.el6_6" src="nss-util-3.19.1-1.el6_6.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-1.el6_6.x86_64.rpm</filename><sum type="sha256">563cc396239645a9e7387cfb64dea07212299c8f585a5e0f5af862dca5fbfa2c</sum></package><package arch="x86_64" name="nss" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-3.19.1-3.el6_6.x86_64.rpm</filename><sum type="sha256">3a7d6d337d67c19ffeb1101966fc5fc0f60112922d4cad7252e5abad324e11fb</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm</filename><sum type="sha256">a0fce3fc18c863fd966096cdb105e86824e300c22408bc16156bb4af61189596</sum></package><package arch="i686" name="nss-util" release="1.el6_6" src="nss-util-3.19.1-1.el6_6.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-1.el6_6.i686.rpm</filename><sum type="sha256">539838e9b74a9149cb6475015421ae916f18fed30d34ed28a2b3109887d210e6</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm</filename><sum type="sha256">346f876474e09b0aacb99befca569046d5b0cb0d4a888fcac4517fadb1a41e54</sum></package><package arch="x86_64" name="nss-tools" release="3.el6_6" src="nss-3.19.1-3.el6_6.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-3.el6_6.x86_64.rpm</filename><sum type="sha256">e444a8cf90dae14a57ba12a4588d745d5b903102c2d07c2624c49ae031286c93</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_6" src="nss-util-3.19.1-1.el6_6.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-1.el6_6.i686.rpm</filename><sum type="sha256">2d8ea11b0ed18097fce52423bde89276cd1e796aee1f644dabf5a0167e5c65ca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1185" id="RHSA-2015:1185-1" title="Rhsa-2015:1185-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1194-1</id><title>Postgresql</title><description>A double-free flaw was found in the connection handling. An unauthenticated attacker could exploit this flaw to crash the PostgreSQL back end by disconnecting at approximately the same time as the authentication time out is triggered. (CVE-2015-3165) 
It was discovered that PostgreSQL did not properly check the return values of certain standard library functions. If the system is in a state that would cause the standard library functions to fail, for example memory exhaustion, an authenticated user could exploit this flaw to disclose partial memory contents or cause the GSSAPI authentication to use an incorrect keytab file. (CVE-2015-3166) 
It was discovered that the pgcrypto module could return different error messages when decrypting certain data with an incorrect key. This can help an authenticated user to launch a possible cryptographic attack, although no suitable attack is currently known. (CVE-2015-3167) 
If the postgresql service is running, it will be automatically restarted after installing this update.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-07-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="postgresql-libs" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">593e18eb939cccbf6b1fc0da358b41e9cb8529aa5165fe975fc6f52e04dd6d8b</sum></package><package arch="i686" name="postgresql-libs" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-3.el6_6.i686.rpm</filename><sum type="sha256">b81b9b4a6e1cbccdef5955be1393bd99581f0d13bc9e01f8a2ec5b8927af46c5</sum></package><package arch="x86_64" name="postgresql-plperl" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">9984ad3bf25bda3839edb64a7cefc020eff57f1eaf23f670d1acfef1f3bea8eb</sum></package><package arch="x86_64" name="postgresql" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">98e4ea6e75c2cdc680493210b1d24abaceecadf883485ea8b3d601f6bf68eeae</sum></package><package arch="x86_64" name="postgresql-server" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-server-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">ae6e716a47ecbdc36227fe81334fe0c5675929432a4bcccf5f967e8c4bfc7913</sum></package><package arch="x86_64" name="postgresql-plpython" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">02603d3b7659fc3944b2d919917a99383f1b7a04113f3fa23814c3266a7df3c5</sum></package><package arch="i686" name="postgresql-devel" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-3.el6_6.i686.rpm</filename><sum type="sha256">a91b49958203322be978fb5b7199daa63cfa725c177cbb4cbd92a7bdb37c3bbf</sum></package><package arch="x86_64" name="postgresql-contrib" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">cdeea2dce7d54b3ab509dc1fb285dc26fa82b7e534252b74209e288d9e06fff0</sum></package><package arch="x86_64" name="postgresql-pltcl" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">fb05d23939a80355517041fc1a10d1fcc88b5e06a08adb0c77968ac501c824b3</sum></package><package arch="x86_64" name="postgresql-test" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-test-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">74eaecc34692938b9e3e5ad4fcde355a5b90b22155ac69780339de4e9e158ddb</sum></package><package arch="x86_64" name="postgresql-devel" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">df5a5627c4712bfe5395c5e4f76edbb9ff497b42121e9485066a2f0713c394a7</sum></package><package arch="i686" name="postgresql" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-3.el6_6.i686.rpm</filename><sum type="sha256">2fb3296110ac1eb6826497019d183a9f6efc4b41280dafb6a134041aa2e0393f</sum></package><package arch="x86_64" name="postgresql-docs" release="3.el6_6" src="postgresql-8.4.20-3.el6_6.src.rpm" version="8.4.20"><filename>postgresql-docs-8.4.20-3.el6_6.x86_64.rpm</filename><sum type="sha256">a7d6c718aeee5f21ff0a93cea2a0dffc42f1c941ed9b229a92a7bfa2fc089daa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" id="CVE-2015-3165" title="Postgresql: Double-Free After Authentication Timeout" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" id="CVE-2015-3166" title="Postgresql: Unanticipated Errors From The Standard Library" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" id="CVE-2015-3167" title="Postgresql: Pgcrypto Has Multiple Error Messages For Decryption With An Incorrect Key." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1194" id="RHSA-2015:1194-1" title="Rhsa-2015:1194-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221537" id="1221537" title="Postgresql: Double-Free After Authentication Timeout" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221539" id="1221539" title="Postgresql: Unanticipated Errors From The Standard Library" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221541" id="1221541" title="Postgresql: Pgcrypto Has Multiple Error Messages For Decryption With An Incorrect Key." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1207-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2722, CVE-2015-2727, CVE-2015-2728, CVE-2015-2729, CVE-2015-2731, CVE-2015-2733, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) 
It was found that Firefox skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741) 
A flaw was discovered in Mozilla's PDF.js PDF file viewer. When combined with another vulnerability, it could allow execution of arbitrary code with the privileges of the user running Firefox. (CVE-2015-2743) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-07-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_6" src="firefox-38.1.0-1.el6_6.src.rpm" version="38.1.0"><filename>firefox-38.1.0-1.el6_6.i686.rpm</filename><sum type="sha256">8c06f4309d683d25b341ffbdf70411bf6896bf463eeed138f4b6abe3f22b2258</sum></package><package arch="x86_64" name="firefox" release="1.el6_6" src="firefox-38.1.0-1.el6_6.src.rpm" version="38.1.0"><filename>firefox-38.1.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">2c78cab082565c929058bfcbbd110412d83e7fce4c8c84c40cc1b8598d441a4b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" id="CVE-2015-2722" title="Mozilla: Use-After-Free In Workers While Using Xmlhttprequest (Mfsa 2015-65)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" id="CVE-2015-2724" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" id="CVE-2015-2725" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727" id="CVE-2015-2727" title="Mozilla: Local Files Or Privileged Urls In Pages Can Be Opened Into New Tabs (Mfsa 2015-60)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" id="CVE-2015-2728" title="Mozilla: Type Confusion In Indexed Database Manager (Mfsa 2015-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" id="CVE-2015-2729" title="Mozilla: Out-Of-Bound Read While Computing An Oscillator Rendering Range In Web Audio (Mfsa 2015-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" id="CVE-2015-2731" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" id="CVE-2015-2733" title="Mozilla: Use-After-Free In Workers While Using Xmlhttprequest (Mfsa 2015-65)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" id="CVE-2015-2734" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" id="CVE-2015-2735" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" id="CVE-2015-2736" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" id="CVE-2015-2737" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" id="CVE-2015-2738" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" id="CVE-2015-2739" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" id="CVE-2015-2740" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" id="CVE-2015-2741" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" id="CVE-2015-2743" title="Mozilla: Privilege Escalation In Pdf.Js (Mfsa 2015-69)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1207" id="RHSA-2015:1207-1" title="Rhsa-2015:1207-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236947" id="1236947" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236950" id="1236950" title="Mozilla: Local Files Or Privileged Urls In Pages Can Be Opened Into New Tabs (Mfsa 2015-60)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236951" id="1236951" title="Mozilla: Type Confusion In Indexed Database Manager (Mfsa 2015-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236952" id="1236952" title="Mozilla: Out-Of-Bound Read While Computing An Oscillator Rendering Range In Web Audio (Mfsa 2015-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236953" id="1236953" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236955" id="1236955" title="Mozilla: Use-After-Free In Workers While Using Xmlhttprequest (Mfsa 2015-65)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236956" id="1236956" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236963" id="1236963" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236964" id="1236964" title="Mozilla: Privilege Escalation In Pdf.Js (Mfsa 2015-69)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1210-1</id><title>Abrt</title><description>It was found that ABRT was vulnerable to multiple race condition and symbolic link flaws. A local attacker could use these flaws to potentially escalate their privileges on the system. (CVE-2015-3315) 
It was discovered that the kernel-invoked coredump processor provided by ABRT wrote core dumps to files owned by other system users. This could result in information disclosure if an application crashed while its current directory was a directory writable to by other users (such as /tmp). (CVE-2015-3142) 
It was discovered that the default event handling scripts installed by ABRT did not handle symbolic links correctly. A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-1869) 
It was found that the ABRT event scripts created a user-readable copy of an sosreport file in ABRT problem directories, and included excerpts of /var/log/messages selected by the user-controlled process name, leading to an information disclosure. (CVE-2015-1870) 
It was discovered that, when moving problem reports between certain directories, abrt-handle-upload did not verify that the new problem directory had appropriate permissions and did not contain symbolic links. An attacker able to create a crafted problem report could use this flaw to expose other parts of ABRT, or to overwrite arbitrary files on the system. (CVE-2015-3147) 
It was discovered that the abrt-action-install-debuginfo-to-abrt-cache helper program did not properly filter the process environment before invoking abrt-action-install-debuginfo. A local attacker could use this flaw to escalate their privileges on the system. (CVE-2015-3159)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-07-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libreport-plugin-logger" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-plugin-logger-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">8e3efd8d966c5d32ded1af9c117a4c4ee408ba883439ba1d312882069d0b2da4</sum></package><package arch="x86_64" name="libreport-python" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-python-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">47357224e39829156f033b3f79b6cd24d54160656057a076dca0b1135817aec6</sum></package><package arch="x86_64" name="abrt" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">f153b5ecff3cd12497bd7b358cb4a0ed67c241b7414cb16f372e5c80be1d912d</sum></package><package arch="x86_64" name="abrt-cli" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-cli-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">457ae6c95ea2f936b97b8e6b87c8f74339dfd69ee906e140c8f467028d4951c7</sum></package><package arch="x86_64" name="libreport" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">3d05a5f973610e8652b207fcbace90925566392670726ad1daba966ca356efec</sum></package><package arch="x86_64" name="abrt-gui" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-gui-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">c981b96c0724defe774b1d6fc83421cb26523a9977d744fa805abcffdaab41f3</sum></package><package arch="x86_64" name="libreport-plugin-rhtsupport" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-plugin-rhtsupport-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">e731c9c91d665a4d118bbceb5213d7e7ce1de2caf7c9d12c26456c1f44758714</sum></package><package arch="x86_64" name="libreport-gtk" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-gtk-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">01c1883f82b0f4bf128e74ceda9429cf1ac1fbf7ba2381e73f0519b5fdfff4f4</sum></package><package arch="x86_64" name="libreport-plugin-mailx" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-plugin-mailx-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">523fa440fad28485ba572834c6efc8fdb63df734655d96352a1861cd83f03336</sum></package><package arch="x86_64" name="libreport-filesystem" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-filesystem-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">b466b78be7c80c15c13e172dd559ac46013d89e1e3b5a4efb73e22e20c478ca8</sum></package><package arch="i686" name="libreport-devel" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-devel-2.0.9-21.el6_6.1.i686.rpm</filename><sum type="sha256">da708f15704679cf26f9e501e2a100f72f0079489780ca50f27096e3e73a83e1</sum></package><package arch="x86_64" name="abrt-addon-python" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-addon-python-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">611676552d612c8878af59bb4298f2b4e24d312c43057c5fdb4ba1022e3d5af9</sum></package><package arch="x86_64" name="abrt-devel" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-devel-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">d2d32216e6d5ff21e9a3fb86d87c5734477d013987a567896fe8bdc9cc6f2177</sum></package><package arch="noarch" name="abrt-python" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-python-2.0.8-26.sl6.1.noarch.rpm</filename><sum type="sha256">7145a3ab38659a025ed955c069fd7becb3161504c2c6a4c5ce58565b35afbd60</sum></package><package arch="i686" name="libreport" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-2.0.9-21.el6_6.1.i686.rpm</filename><sum type="sha256">79e660935238dbd4f8f5624e2eb58c06c245751e70416d8cab01328e877f42a2</sum></package><package arch="i686" name="abrt-libs" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-libs-2.0.8-26.sl6.1.i686.rpm</filename><sum type="sha256">0ac556a06b39d73d1a8763170cbcbb46c88acf2d75507a1384548b275828a06d</sum></package><package arch="x86_64" name="libreport-newt" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-newt-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">abc2ab05e8436e36a15fd4366dabd5fb1ec17562dc3ab90ca3a825bd298c7469</sum></package><package arch="x86_64" name="libreport-plugin-reportuploader" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-plugin-reportuploader-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">ed4ef04351c22040016bfa2b4debab57e8fdcfdc1aa32a1edfa0467380054feb</sum></package><package arch="x86_64" name="libreport-plugin-bugzilla" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-plugin-bugzilla-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">165ee190b9e2c11047f4a49051d7661a4328b4ff8a94c8f94e88f5fa840ebbfd</sum></package><package arch="x86_64" name="libreport-cli" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-cli-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">3e9f116c388eecab9f25e2b1c0042931beb449f4ccf6830c23d2f37c87a61ab7</sum></package><package arch="x86_64" name="abrt-addon-vmcore" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-addon-vmcore-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">5a2b6f8ccae349a43dfe660f698a69098c71e3c9a4b67e37012de02eb0c44313</sum></package><package arch="i686" name="libreport-gtk" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-gtk-2.0.9-21.el6_6.1.i686.rpm</filename><sum type="sha256">3aae79194aeaa6528637e028072bf83043791e3e21bd62d6bbbad79fd367a692</sum></package><package arch="x86_64" name="abrt-libs" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-libs-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">dd6c6588d85c966710bf6c4544ac0e68841b7492f1e8cbdb31c4f21025b48846</sum></package><package arch="x86_64" name="abrt-addon-kerneloops" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-addon-kerneloops-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">38dd5087de55f679560c8586eede4d4fac0c5d66bdc552659ebb0f58832d8818</sum></package><package arch="i686" name="libreport-gtk-devel" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-gtk-devel-2.0.9-21.el6_6.1.i686.rpm</filename><sum type="sha256">69ec0245a77d42edba83bddcfb7756db00240c1268fe03afc8dbc93318e5f665</sum></package><package arch="x86_64" name="abrt-console-notification" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-console-notification-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">15c52b6957af995051c15a90ce1e159a94c9dc1a9b6cde8388a0fdbf9a5a222b</sum></package><package arch="i686" name="abrt-devel" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-devel-2.0.8-26.sl6.1.i686.rpm</filename><sum type="sha256">012382b97a1df56b20e7a81e399c745d379148f6b1bd1eb17e9855f1208e5acd</sum></package><package arch="x86_64" name="abrt-desktop" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-desktop-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">4bdab348924d12604e305d55e97b53293ea943c8290c445ad863606f9f4cd94f</sum></package><package arch="x86_64" name="abrt-tui" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-tui-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">a7fb1a1b733d1075c3ac1b64f40979b1db9ad4e7b437f20f862bacce183aa838</sum></package><package arch="x86_64" name="libreport-gtk-devel" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-gtk-devel-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">9a7c4233cade3cc006b9db25971df4363669b2aa05e720cf9177d5d9482c6fba</sum></package><package arch="x86_64" name="abrt-addon-ccpp" release="26.sl6.1" src="abrt-2.0.8-26.sl6.1.src.rpm" version="2.0.8"><filename>abrt-addon-ccpp-2.0.8-26.sl6.1.x86_64.rpm</filename><sum type="sha256">1f8f8a608cc4f79649f36075067501592878e68f321b2252393c52946d76ddef</sum></package><package arch="x86_64" name="libreport-compat" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-compat-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">0ac5412b8b52b6d0c376d47861f1a9c7737ea1ee9738bb224878ca51fdc705ce</sum></package><package arch="x86_64" name="libreport-devel" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-devel-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">1b6ba0e7d99ef1f02f4b2c66cfe98cdf6d9fbae2bb04776071eab50c00e6d3f0</sum></package><package arch="x86_64" name="libreport-plugin-kerneloops" release="21.el6_6.1" src="libreport-2.0.9-21.el6_6.1.src.rpm" version="2.0.9"><filename>libreport-plugin-kerneloops-2.0.9-21.el6_6.1.x86_64.rpm</filename><sum type="sha256">c8158c9aca6057eb8298203b6387f3261941fd6125e1a7ca13fa5f75864690b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1869" id="CVE-2015-1869" title="Abrt: Default Event Scripts Follow Symbolic Links" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1870" id="CVE-2015-1870" title="Abrt: Default Abrt Event Scripts Lead To Information Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3142" id="CVE-2015-3142" title="Abrt: Abrt-Hook-Ccpp Writes Core Dumps To Existing Files Owned By Others" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3147" id="CVE-2015-3147" title="Abrt: Does Not Validate Contents Of Uploaded Problem Reports" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3159" id="CVE-2015-3159" title="Abrt: Missing Process Environment Sanitizaton In Abrt-Action-Install-Debuginfo-To-Abrt-Cache" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3315" id="CVE-2015-3315" title="Abrt: Various Race-Conditions And Symlink Issues Found In Abrt" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1210" id="RHSA-2015:1210-1" title="Rhsa-2015:1210-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211835" id="1211835" title="Abrt: Various Race-Conditions And Symlink Issues Found In Abrt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212818" id="1212818" title="Abrt: Abrt-Hook-Ccpp Writes Core Dumps To Existing Files Owned By Others" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212861" id="1212861" title="Abrt: Default Event Scripts Follow Symbolic Links" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212868" id="1212868" title="Abrt: Default Abrt Event Scripts Lead To Information Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212953" id="1212953" title="Abrt: Does Not Validate Contents Of Uploaded Problem Reports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1216962" id="1216962" title="Abrt: Missing Process Environment Sanitizaton In Abrt-Action-Install-Debuginfo-To-Abrt-Cache" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1218-1</id><title>Php</title><description>A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024) 
An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-0232) 
An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022) 
Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603) 
It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598) 
Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2301, CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021) 
A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) 
A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) 
A double free flaw was found in zend_ts_hash_graceful_destroy() function in the PHP ZTS module. This flaw could possibly cause a PHP application to crash. (CVE-2014-9425) 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-07-14 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-tidy" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">aa73db30e26139024e3be6f40b6dd8655f94a8cad50204d46c6cdd0bc5964aba</sum></package><package arch="x86_64" name="php-zts" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">d42a91181db568df8b4ed6c31bd7a7705a1c4e2ae4bc29d20dda8d4284fd9e5e</sum></package><package arch="x86_64" name="php-recode" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">fb619e9da8ac9a741f3ee7d8570423295eaf5f2f0abdc9d631622701167be7fb</sum></package><package arch="x86_64" name="php-process" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-process-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">34f8776d7643e64f529b7b693c52e1902014c1893934fbb30212c60cec6b72d0</sum></package><package arch="x86_64" name="php-embedded" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">9afe461d7da7dcd679a9be7db7bc6a32115f4a51edb74797f748f62ec708ea40</sum></package><package arch="x86_64" name="php-xml" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">7d86cbbd26c5a701e9db25100f2f505dc4ac626c64250379109b8ebaf664ec2a</sum></package><package arch="x86_64" name="php-common" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-common-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">3952d8c2142ae7e8684358a0b431e52b86ad48e5cff672e994e953f864043b64</sum></package><package arch="x86_64" name="php-pspell" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">251b1a9811bb6d4aa74f6f291263330f63585edc3dc1b003f7e78c556ce4dfc3</sum></package><package arch="x86_64" name="php-intl" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">0bc04619ec01616b0354f94ee3a77eb0bf7bdadef66c2bb12b5134936ac6d7fe</sum></package><package arch="x86_64" name="php-enchant" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">783dced244fe63f430f2084d3643f62c2f5fe07946dc3db8f9b3cb914231716b</sum></package><package arch="x86_64" name="php-imap" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">8e7051e535018c74f41f014f41885aab3ff21346f5b7d1f4e027a5a1d4313a26</sum></package><package arch="x86_64" name="php-devel" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">1fc7323e077ec6b6d912b7ba12b7c7aea2ea079f995a6b307e6ccaf815c939f4</sum></package><package arch="x86_64" name="php-ldap" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">b99e86279c04c9093c33b55fb2e76748ade40f171d0d6963bcab6b78971631ae</sum></package><package arch="x86_64" name="php" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">d42ef42712b05c4dceb8444ce36c91977d0c7b1612f841f3ce1f857e831ea8f2</sum></package><package arch="x86_64" name="php-pdo" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">5f822cc2949cdfb9f60f555dfe716cf9380ac564c0dbde252f88606b99329c34</sum></package><package arch="x86_64" name="php-pgsql" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">f9fb4ab39b288466dede3af87bb888f72647bcd457e1ce0531bc4c27029c2bd3</sum></package><package arch="x86_64" name="php-xmlrpc" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">1722f8c1ed01782d369f494cdd421b92c62b4b20d0aef69784bdcd7f4c09b14e</sum></package><package arch="x86_64" name="php-soap" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">dc191ee660233eb793ed3dca29710efa4779f38f8631ad85a442803bc77ae195</sum></package><package arch="x86_64" name="php-snmp" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">e53349e939266a3466abc05f0d704c9b66745e976e61e89a21e5ba66242f888f</sum></package><package arch="x86_64" name="php-dba" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">b925c4b57db492786d17cce95a494b2f755ab353ef1270a673b154df32443133</sum></package><package arch="x86_64" name="php-mysql" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">ff767ba5f47b56e39ca4198f070f7f567b7187f01196b905cad54bc208e6c076</sum></package><package arch="x86_64" name="php-fpm" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">16bc1733bc24c012d6642eab05d74769b3e2b95f12fdce740485e6e5d795a199</sum></package><package arch="x86_64" name="php-cli" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">8d34d2b71283fdb9ad741799fd8b1f77991265c6cc7a934aa77ed48ac5c0d192</sum></package><package arch="x86_64" name="php-odbc" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">ec8e3db5e44bb023c55045fd7f78d06c23458488c705ce7fced4736f642b95bf</sum></package><package arch="x86_64" name="php-mbstring" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">47ea75b347bfc35389b6672e5c588bdafb981ef7431ea6b154ed0cc3f7c3460c</sum></package><package arch="x86_64" name="php-gd" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">65f5d9dd3c4d34bccb7f61dbbddb1922ed0f114696a70cd83d23c6eb51004b9a</sum></package><package arch="x86_64" name="php-bcmath" release="46.el6_6" src="php-5.3.3-46.el6_6.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-46.el6_6.x86_64.rpm</filename><sum type="sha256">a50e5ff191c6d1780c683060bd9d71d64906bce9b590cb2b29bfa1a87d46fc23</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9425" id="CVE-2014-9425" title="Php: Double-Free In Zend_Ts_Hash_Graceful_Destroy()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705" id="CVE-2014-9705" title="Php: Heap Buffer Overflow In Enchant_Broker_Request_Dict()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" id="CVE-2014-9709" title="Gd: Buffer Read Overflow In Gd_Gif_In.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232" id="CVE-2015-0232" title="Php: Free Called On Unitialized Pointer In Exif.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273" id="CVE-2015-0273" title="Php: Use After Free Vulnerability In Unserialize() With Datetimezone" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301" id="CVE-2015-2301" title="Php: Use After Free In Phar_Object.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783" id="CVE-2015-2783" title="Php: Buffer Over-Read In Phar Metadata Parsing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787" id="CVE-2015-2787" title="Php: Use-After-Free Vulnerability In The Process_Nested_Data Function In Ext/Standard/Var_Unserializer.Re" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3307" id="CVE-2015-3307" title="Php: Invalid Pointer Free() In Phar_Tar_Process_Metadata()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329" id="CVE-2015-3329" title="Php: Buffer Overflow In Phar_Set_Inode()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3411" id="CVE-2015-3411" title="Php: Missing Null Byte Checks For Paths In Various Php Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3412" id="CVE-2015-3412" title="Php: Missing Null Byte Checks For Paths In Various Php Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021" id="CVE-2015-4021" title="Php: Memory Corruption In Phar_Parse_Tarfile Caused By Empty Entry File Name" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022" id="CVE-2015-4022" title="Php: Integer Overflow Leading To Heap Overflow When Reading Ftp File Listing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024" id="CVE-2015-4024" title="Php: Multipart/Form-Data Request Paring Cpu Usage Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026" id="CVE-2015-4026" title="Php: Pcntl_Exec() Accepts Paths With Nul Character" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4147" id="CVE-2015-4147" title="Php: Soapclient'S __Call() Type Confusion Through Unserialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4148" id="CVE-2015-4148" title="Php: Soapclient'S Do_Soap_Call() Type Confusion After Unserialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598" id="CVE-2015-4598" title="Php: Missing Null Byte Checks For Paths In Dom And Gd Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4599" id="CVE-2015-4599" title="Php: Type Confusion Issue In Unserialize() With Various Soap Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4600" id="CVE-2015-4600" title="Php: Type Confusion Issue In Unserialize() With Various Soap Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4601" id="CVE-2015-4601" title="Php: Type Confusion Issue In Unserialize() With Various Soap Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4602" id="CVE-2015-4602" title="Php: Incomplete Class Unserialization Type Confusion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4603" id="CVE-2015-4603" title="Php: Exception::Gettraceasstring Type Confusion Issue After Unserialize" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1218" id="RHSA-2015:1218-1" title="Rhsa-2015:1218-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1177734" id="1177734" title="Php: Double-Free In Zend_Ts_Hash_Graceful_Destroy()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185472" id="1185472" title="Php: Free Called On Unitialized Pointer In Exif.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1188639" id="1188639" title="Gd: Buffer Read Overflow In Gd_Gif_In.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1194730" id="1194730" title="Php: Use After Free Vulnerability In Unserialize() With Datetimezone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1194737" id="1194737" title="Php: Heap Buffer Overflow In Enchant_Broker_Request_Dict()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1194747" id="1194747" title="Php: Use After Free In Phar_Object.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1204868" id="1204868" title="Php: Soapclient'S __Call() Type Confusion Through Unserialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207676" id="1207676" title="Php: Use-After-Free Vulnerability In The Process_Nested_Data Function In Ext/Standard/Var_Unserializer.Re" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213407" id="1213407" title="Php: Missing Null Byte Checks For Paths In Various Php Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213446" id="1213446" title="Php: Buffer Over-Read In Phar Metadata Parsing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213449" id="1213449" title="Php: Buffer Overflow In Phar_Set_Inode()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222485" id="1222485" title="Php: Multipart/Form-Data Request Paring Cpu Usage Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222538" id="1222538" title="Php: Type Confusion Issue In Unserialize() With Various Soap Methods" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223412" id="1223412" title="Php: Integer Overflow Leading To Heap Overflow When Reading Ftp File Listing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223422" id="1223422" title="Php: Pcntl_Exec() Accepts Paths With Nul Character" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223425" id="1223425" title="Php: Memory Corruption In Phar_Parse_Tarfile Caused By Empty Entry File Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223441" id="1223441" title="Php: Invalid Pointer Free() In Phar_Tar_Process_Metadata()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1226916" id="1226916" title="Php: Soapclient'S Do_Soap_Call() Type Confusion After Unserialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1232823" id="1232823" title="Php: Missing Null Byte Checks For Paths In Various Php Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1232897" id="1232897" title="Php: Missing Null Byte Checks For Paths In Dom And Gd Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1232918" id="1232918" title="Php: Exception::Gettraceasstring Type Confusion Issue After Unserialize" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1232923" id="1232923" title="Php: Incomplete Class Unserialization Type Confusion" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1221-1</id><title>Kernel</title><description>* A NULL pointer dereference flaw was found in the way the Linux kernel's virtual console implementation handled reference counting when accessing pseudo-terminal device files (/dev/pts/*). A local, unprivileged attacker could use this flaw to crash the system. (CVE-2011-5321, Moderate) 
* It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system. (CVE-2015-3636, Moderate) 
* An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593, Low) 
* A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-2830, Low) 
* It was found that the Linux kernel's TCP/IP protocol suite implementation for IPv6 allowed the Hop Limit value to be set to a smaller value than the default one. An attacker on a local network could use this flaw to prevent systems on that network from sending or receiving network packets. (CVE-2015-2922, Low) 
For information on the most significant of these changes, users are directed to the following article on the Red Hat Customer Portal: 
The system must be rebooted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-07-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">5fda1cf89f9e2f1e63852493b70a2d767e5c2d213167ed48f5d393c625c83754</sum></package><package arch="x86_64" name="kernel" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">acaa9a47fe3c49ddf9f69a0ad2bd2696da6182440b7e8575b0df54bff606310e</sum></package><package arch="x86_64" name="kernel-debug" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">42805821b4865c805e88f8568f6dc528928dffcb77bb94e6e0b1ac09a1442758</sum></package><package arch="x86_64" name="kernel-devel" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">f13ea9045aff80e0da4f778daefaade30c345c4a71ef99938ec0613d57daf79a</sum></package><package arch="x86_64" name="python-perf" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">128bc7a0cd9092e119c3c302dd34dd38e3bfca9d366777723ffff7bb8e800fd3</sum></package><package arch="x86_64" name="kernel-headers" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">212f44da72717f835393e698b70f79c3f9daa2bb7d91b19000a12f3df442802e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-504.30.3.el6.noarch.rpm</filename><sum type="sha256">2fbc0e577ca7e3acd2cf9da773ed8619f0b7d9ce019fd05c923a8ed08cc32de2</sum></package><package arch="x86_64" name="perf" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-504.30.3.el6.x86_64.rpm</filename><sum type="sha256">771082d6190cefa46ca127df74596800ac257b29eb6e59c81cf3bf1ee7459380</sum></package><package arch="noarch" name="kernel-firmware" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-504.30.3.el6.noarch.rpm</filename><sum type="sha256">1025c2a1778bb2e465f5d3515a57df4318fe8444d5c8987e00a4ea3db726e294</sum></package><package arch="noarch" name="kernel-doc" release="504.30.3.el6" src="kernel-2.6.32-504.30.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-504.30.3.el6.noarch.rpm</filename><sum type="sha256">52000138698656f96957b532e60605f158672fa09a052d36564eea213deaf71d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5321" id="CVE-2011-5321" title="Kernel: Tty: Driver Reference Leakage In Tty_Open" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" id="CVE-2015-1593" title="Kernel: Linux Stack Aslr Implementation Integer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830" id="CVE-2015-2830" title="Kernel: Int80 Fork From 64-Bit Tasks Mishandling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922" id="CVE-2015-2922" title="Kernel: Denial Of Service (Dos) Attack Against Ipv6 Network Stacks Due To Improper Handling Of Router Advertisements." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" id="CVE-2015-3636" title="Kernel: Ping Sockets: Use-After-Free Leading To Local Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1221" id="RHSA-2015:1221-1" title="Rhsa-2015:1221-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1192519" id="1192519" title="Kernel: Linux Stack Aslr Implementation Integer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201887" id="1201887" title="Kernel: Tty: Driver Reference Leakage In Tty_Open" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203712" id="1203712" title="Kernel: Denial Of Service (Dos) Attack Against Ipv6 Network Stacks Due To Improper Handling Of Router Advertisements." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1208598" id="1208598" title="Kernel: Int80 Fork From 64-Bit Tasks Mishandling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218074" id="1218074" title="Kernel: Ping Sockets: Use-After-Free Leading To Local Privilege Escalation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1228-1</id><title>Java-1.8.0-Openjdk</title><description>Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) 
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) 
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) 
It was discovered that the GCM (Galois Counter Mode) implementation in the Security component of OpenJDK failed to properly perform a null check. This could cause the Java Virtual Machine to crash when an application performed encryption using a block cipher in the GCM mode. (CVE-2015-2659) 
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) 
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) 
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) 
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) 
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) 
Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. Note: This issue was originally fixed as CVE-2015-0383, but the fix was regressed in the SLSA-2015:0809 advisory. (CVE-2015-3149) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-07-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b16.el6_6" src="java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-demo-1.8.0.51-0.b16.el6_6.x86_64.rpm</filename><sum type="sha256">d2de9642c3d9194bd17484a3a5f8ce80881928da9a1d348c34c312cbdff02108</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b16.el6_6" src="java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-devel-1.8.0.51-0.b16.el6_6.x86_64.rpm</filename><sum type="sha256">3fb51b64c654eb3b2eafa4e33f7b2843abbc5afe49278a5122512bff876053ce</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b16.el6_6" src="java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-headless-1.8.0.51-0.b16.el6_6.x86_64.rpm</filename><sum type="sha256">7ef28501463aa6465d75f845285d73500e870ab2bc89e2a93b629807624ba3ff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b16.el6_6" src="java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-src-1.8.0.51-0.b16.el6_6.x86_64.rpm</filename><sum type="sha256">a99bcfa20352a7a67f82fee927f26a424d72e42fbbb28b8b638e2a06afcc33af</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b16.el6_6" src="java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-javadoc-1.8.0.51-0.b16.el6_6.noarch.rpm</filename><sum type="sha256">b4855e053d1a7998adaeb48b80985f8fda773ad177c0be7744b6c9ca0d52b00f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b16.el6_6" src="java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-1.8.0.51-0.b16.el6_6.x86_64.rpm</filename><sum type="sha256">49fbe712f54c85c8e61f024181e70abde14f7b50bb8b9f5cd5577aabc60bbd27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" id="CVE-2015-2590" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" id="CVE-2015-2601" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" id="CVE-2015-2621" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" id="CVE-2015-2625" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" id="CVE-2015-2628" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" id="CVE-2015-2632" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2659" id="CVE-2015-2659" title="Openjdk: Gcm Cipher Issue Causing Jvm Crash (Security, 8067648)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" id="CVE-2015-2808" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3149" id="CVE-2015-3149" title="Openjdk8: Insecure Hsperfdata Temporary File Handling, Cve-2015-0383 Regression (Hotspot)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" id="CVE-2015-4731" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" id="CVE-2015-4732" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" id="CVE-2015-4733" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" id="CVE-2015-4748" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" id="CVE-2015-4749" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" id="CVE-2015-4760" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1228" id="RHSA-2015:1228-1" title="Rhsa-2015:1228-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207101" id="1207101" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213365" id="1213365" title="Openjdk8: Insecure Hsperfdata Temporary File Handling, Cve-2015-0383 Regression (Hotspot)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241965" id="1241965" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242019" id="1242019" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242144" id="1242144" title="Openjdk: Gcm Cipher Issue Causing Jvm Crash (Security, 8067648)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242232" id="1242232" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242234" id="1242234" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242240" id="1242240" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242275" id="1242275" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242281" id="1242281" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242372" id="1242372" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242379" id="1242379" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242394" id="1242394" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242447" id="1242447" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243139" id="1243139" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1229-1</id><title>Java-1.7.0-Openjdk</title><description>Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) 
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) 
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) 
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) 
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) 
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) 
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) 
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-07-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.1.3.el6_6" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm</filename><sum type="sha256">98865288e9599e1fee30ccfdd515a8574780a2f1a708f00a93e57141bdc6bf31</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.1.3.el6_6" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm</filename><sum type="sha256">17093e0344b0e3477cf4bdc39230d139f32e92ff3b16dd2a9af08fe5ff0210b3</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.1.3.el6_6" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm</filename><sum type="sha256">9056fb4559f826fef1e07346807d1db1688cecd2fb34f1caddb7f7d37acb015b</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.1.3.el6_6" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm</filename><sum type="sha256">20312a3388ca5151423d0c89d94124947bf021c14e1e0aac203c2dd90bc25cfd</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.1.3.el6_6" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm</filename><sum type="sha256">2e7b16400391123e3f8cb84d8c79a0cb4c5c0c1d1946024caa5b998b771ae482</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" id="CVE-2015-2590" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" id="CVE-2015-2601" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" id="CVE-2015-2621" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" id="CVE-2015-2625" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" id="CVE-2015-2628" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" id="CVE-2015-2632" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" id="CVE-2015-2808" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" id="CVE-2015-4731" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" id="CVE-2015-4732" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" id="CVE-2015-4733" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" id="CVE-2015-4748" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" id="CVE-2015-4749" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" id="CVE-2015-4760" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1229" id="RHSA-2015:1229-1" title="Rhsa-2015:1229-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207101" id="1207101" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241965" id="1241965" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242019" id="1242019" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242232" id="1242232" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242234" id="1242234" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242240" id="1242240" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242275" id="1242275" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242281" id="1242281" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242372" id="1242372" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242379" id="1242379" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242394" id="1242394" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242447" id="1242447" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243139" id="1243139" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1249-2</id><title>Httpd</title><description>A flaw was found in the way httpd handled HTTP Trailer headers when processing requests using chunked encoding. A malicious client could use Trailer headers to set additional HTTP headers after header processing was performed by other modules. This could, for example, lead to a bypass of header restrictions defined with mod_headers. (CVE-2013-5704) 
This update also fixes the following bugs: 
* The order of mod_proxy workers was not checked when httpd configuration was reloaded. When mod_proxy workers were removed, added, or their order was changed, their parameters and scores could become mixed. The order of mod_proxy workers has been made internally consistent during configuration reload. 
* The local host certificate created during firstboot contained CA extensions, which caused the httpd service to return warning messages. This has been addressed by local host certificates being generated with the "-extensions v3_req" option. 
* The default mod_ssl configuration no longer enables support for SSL cipher suites using the single DES, IDEA, or SEED encryption algorithms. 
* The apachectl script did not take into account the HTTPD_LANG variable set in the /etc/sysconfig/httpd file during graceful restarts. Consequently, httpd did not use a changed value of HTTPD_LANG when the daemon was restarted gracefully. The script has been fixed to handle the HTTPD_LANG variable correctly. 
* The mod_deflate module failed to check the original file size while extracting files larger than 4 GB, making it impossible to extract large files. Now, mod_deflate checks the original file size properly according to RFC1952, and it is able to decompress files larger than 4 GB. 
* The httpd service did not check configuration before restart. When a configuration contained an error, an attempt to restart httpd gracefully failed. Now, httpd checks configuration before restart and if the configuration is in an inconsistent state, an error message is printed, httpd is not stopped and a restart is not performed. 
* The SSL_CLIENT_VERIFY environment variable was incorrectly handled when the "SSLVerifyClient optional_no_ca" and "SSLSessionCache" options were used. When an SSL session was resumed, the SSL_CLIENT_VERIFY value was set to "SUCCESS" instead of the previously set "GENEROUS". SSL_CLIENT_VERIFY is now correctly set to GENEROUS in this scenario. 
* The ab utility did not correctly handle situations when an SSL connection was closed after some data had already been read. As a consequence, ab did not work correctly with SSL servers and printed "SSL read failed" error messages. With this update, ab works as expected with HTTPS servers. 
* When a client presented a revoked certificate, log entries were created only at the debug level. The log level of messages regarding a revoked certificate has been increased to INFO, and administrators are now properly informed of this situation. 
In addition, this update adds the following enhancement: 
* A mod_proxy worker can now be set into drain mode (N) using the balancer-manager web interface or using the httpd configuration file. A worker in drain mode accepts only existing sticky sessions destined for itself and ignores all other requests. The worker waits until all clients currently connected to this worker complete their work before the worker is stopped. As a result, drain mode enables to perform maintenance on a worker without affecting clients. 
After installing the updated packages, the httpd service will be restarted automatically.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="httpd-manual" release="45.sl6" src="httpd-2.2.15-45.sl6.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-45.sl6.noarch.rpm</filename><sum type="sha256">ae78a81057cb627ab15f2a3801230b1a9d2f31f12e438c99b76720c771c3d2a4</sum></package><package arch="i686" name="httpd-devel" release="45.sl6" src="httpd-2.2.15-45.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-45.sl6.i686.rpm</filename><sum type="sha256">c17652ea03088d6eb1a8fc1291fe060acf121f8151193cd7eede6d5d5b864396</sum></package><package arch="x86_64" name="httpd-tools" release="45.sl6" src="httpd-2.2.15-45.sl6.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-45.sl6.x86_64.rpm</filename><sum type="sha256">b6a5773687940930989841ebb8da22ce699aca1c03921e6eb4588701f705c83a</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="45.sl6" src="httpd-2.2.15-45.sl6.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-45.sl6.x86_64.rpm</filename><sum type="sha256">8cb3c47827e4b28efb371d07dfa5ff5b12c46529af77b710887d9274f481d8ba</sum></package><package arch="x86_64" name="httpd" release="45.sl6" src="httpd-2.2.15-45.sl6.src.rpm" version="2.2.15"><filename>httpd-2.2.15-45.sl6.x86_64.rpm</filename><sum type="sha256">1e92f2925b24e1c111a8ba9bb5ec2d8ed29b7e9825462be66c6ccf256ba65b84</sum></package><package arch="x86_64" name="httpd-devel" release="45.sl6" src="httpd-2.2.15-45.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-45.sl6.x86_64.rpm</filename><sum type="sha256">f1d58c1f923750a113e383263761f56b51f577e9d47ff2d65be830d6def777a0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" id="CVE-2013-5704" title="Httpd: Bypass Of Mod_Headers Rules Via Chunked Requests" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1249" id="RHSA-2015:1249-2" title="Rhsa-2015:1249-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1045477" id="1045477" title="&quot;Ab&quot; To Https Sites Broken" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1057695" id="1057695" title="Mod_Deflate Does Not Decompress Files Larger Than 4Gb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069625" id="1069625" title="Httpd.Conf Uses Icon Bomb.Gif For All Files/Dirs Ending With Core" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1082903" id="1082903" title="Httpd: Bypass Of Mod_Headers Rules Via Chunked Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1125269" id="1125269" title="Ab Fails When Domain Name Resolved To Ipv6 Adress" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1149703" id="1149703" title="Bad Ssl_Client_Verify Value On Resumed Session With &quot;Sslverifyclient Optional_No_Ca&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1149906" id="1149906" title="Mixed Up Mod_Proxy_Balancer Jvmroutes Causing Sticky Session Breaks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1161328" id="1161328" title="[Mod_Ssl] Revoked Certificates Are Logged At The Debug Level" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1162268" id="1162268" title="Misspelling In Patch File Causes Failure To Build Against Older Openssl Releases" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=922844" id="922844" title="Rotatelogs %Z Does Not Use Correct Timezone Respecting Dst" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=963146" id="963146" title="Httpd_Lang Doesn'T Effect When Httpd Starts By Graceful." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=987590" id="987590" title="Apache Startup Fails With Misleading Error If Documentroot Has Context Type User_Home_T" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1254-2</id><title>Curl</title><description>It was found that the libcurl library did not correctly handle partial literal IP addresses when parsing received HTTP cookies. An attacker able to trick a user into connecting to a malicious server could use this flaw to set the user's cookie to a crafted domain, making other cookie-related issues easier to exploit. (CVE-2014-3613) 
A flaw was found in the way the libcurl library performed the duplication of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS option for a handle, using the handle's duplicate could cause the application to crash or disclose a portion of its memory. (CVE-2014-3707) 
It was discovered that the libcurl library failed to properly handle URLs with embedded end-of-line characters. An attacker able to make an application using libcurl to access a specially crafted URL via an HTTP proxy could use this flaw to inject additional headers to the request or construct additional requests. (CVE-2014-8150) 
It was discovered that libcurl implemented aspects of the NTLM and Negotatiate authentication incorrectly. If an application uses libcurl and the affected mechanisms in a specifc way, certain requests to a previously NTLM-authenticated server could appears as sent by the wrong authenticated user. Additionally, the initial set of credentials for HTTP Negotiate- authenticated requests could be reused in subsequent requests, although a different set of credentials was specified. (CVE-2015-3143, CVE-2015-3148) 
Bug fixes: 
* An out-of-protocol fallback to SSL version 3.0 (SSLv3.0) was available with libcurl. Attackers could abuse the fallback to force downgrade of the SSL version. The fallback has been removed from libcurl. Users requiring this functionality can explicitly enable SSLv3.0 through the libcurl API. 
* A single upload transfer through the FILE protocol opened the destination file twice. If the inotify kernel subsystem monitored the file, two events were produced unnecessarily. The file is now opened only once per upload. 
* Utilities using libcurl for SCP/SFTP transfers could terminate unexpectedly when the system was running in FIPS mode. 
* Using the "--retry" option with the curl utility could cause curl to terminate unexpectedly with a segmentation fault. Now, adding "--retry" no longer causes curl to crash. 
* The "curl --trace-time" command did not use the correct local time when printing timestamps. Now, "curl --trace-time" works as expected. 
* The valgrind utility could report dynamically allocated memory leaks on curl exit. Now, curl performs a global shutdown of the NetScape Portable Runtime (NSPR) library on exit, and valgrind no longer reports the memory leaks. 
* Previously, libcurl returned an incorrect value of the CURLINFO_HEADER_SIZE field when a proxy server appended its own headers to the HTTP response. Now, the returned value is valid. 
Enhancements: 
* The "--tlsv1.0", "--tlsv1.1", and "--tlsv1.2" options are available for specifying the minor version of the TLS protocol to be negotiated by NSS. The "--tlsv1" option now negotiates the highest version of the TLS protocol supported by both the client and the server. 
* It is now possible to explicitly enable or disable the ECC and the new AES cipher suites to be used for TLS.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libcurl" release="46.el6" src="curl-7.19.7-46.el6.src.rpm" version="7.19.7"><filename>libcurl-7.19.7-46.el6.i686.rpm</filename><sum type="sha256">d5306e6451591548768b722f626d2d2b2c95f5cf1c098074f747b287b0bdc193</sum></package><package arch="x86_64" name="libcurl" release="46.el6" src="curl-7.19.7-46.el6.src.rpm" version="7.19.7"><filename>libcurl-7.19.7-46.el6.x86_64.rpm</filename><sum type="sha256">36a4997baf2cd9cd3eadc8b4f779767b2218dae68a53e01b4b2638bd4396f040</sum></package><package arch="x86_64" name="libcurl-devel" release="46.el6" src="curl-7.19.7-46.el6.src.rpm" version="7.19.7"><filename>libcurl-devel-7.19.7-46.el6.x86_64.rpm</filename><sum type="sha256">ef2382400877a0cd18675c7116511be2404d812126b963784a7efc7dc4505d3d</sum></package><package arch="x86_64" name="curl" release="46.el6" src="curl-7.19.7-46.el6.src.rpm" version="7.19.7"><filename>curl-7.19.7-46.el6.x86_64.rpm</filename><sum type="sha256">ce9d8ed7a3978928fdee566819cecf0bd28ed75cca4a47d9f05947336ff08117</sum></package><package arch="i686" name="libcurl-devel" release="46.el6" src="curl-7.19.7-46.el6.src.rpm" version="7.19.7"><filename>libcurl-devel-7.19.7-46.el6.i686.rpm</filename><sum type="sha256">02a451f9ddd8225454bbceda310cd72a9dc566478b0c1c5ee8038eedf93bcb34</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" id="CVE-2014-3613" title="Curl: Incorrect Handling Of Ip Addresses In Cookie Domain" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" id="CVE-2014-3707" title="Curl: Incorrect Handle Duplication After Copypostfields" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" id="CVE-2014-8150" title="Curl: Url Request Injection Vulnerability In Parseurlandfillconn()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" id="CVE-2015-3143" title="Curl: Re-Using Authenticated Connection When Unauthenticated" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" id="CVE-2015-3148" title="Curl: Negotiate Not Treated As Connection-Oriented" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1254" id="RHSA-2015:1254-2" title="Rhsa-2015:1254-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1008178" id="1008178" title="Curl Scp Download Fails In Fips Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1011101" id="1011101" title="Manpage Typos Found Using Aspell" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1058767" id="1058767" title="Curl Does Not Support Ecdsa Certificates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104160" id="1104160" title="Link In Curl Man Page Is Wrong" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136154" id="1136154" title="Curl: Incorrect Handling Of Ip Addresses In Cookie Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154059" id="1154059" title="Curl: Disable Out-Of-Protocol Fallback To Ssl 3.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154747" id="1154747" title="Ntlm: Ignore Curlopt_Forbid_Reuse During Ntlm Http Auth" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154941" id="1154941" title="Curl: Incorrect Handle Duplication After Copypostfields" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1156422" id="1156422" title="Curl Does Not Allow Explicit Control Of Dhe Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1161163" id="1161163" title="Response Headers Added By Proxy Servers Missing In Curlinfo_Header_Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168137" id="1168137" title="Curl Closes Connection After Head Request Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1178692" id="1178692" title="Curl: Url Request Injection Vulnerability In Parseurlandfillconn()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213306" id="1213306" title="Curl: Re-Using Authenticated Connection When Unauthenticated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213351" id="1213351" title="Curl: Negotiate Not Treated As Connection-Oriented" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=835898" id="835898" title="Bug In Dns Cache Causes Connections Until Restart Of Libcurl-Using Processes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=883002" id="883002" title="Curl Used With File:// Protocol Opens And Closes A Destination File Twice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=997185" id="997185" title="Sendrecv.C Example Incorrect Type For Sockfd" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1272-1</id><title>Kernel</title><description>* A flaw was found in the way Linux kernel's Transparent Huge Pages (THP) implementation handled non-huge page migration. A local, unprivileged user could use this flaw to crash the kernel by migrating transparent hugepages. (CVE-2014-3940, Moderate) 
* A buffer overflow flaw was found in the way the Linux kernel's eCryptfs implementation decoded encrypted file names. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-9683, Moderate) 
* A race condition flaw was found between the chown and execve system calls. When changing the owner of a setuid user binary to root, the race condition could momentarily make the binary setuid root. A local, unprivileged user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-3339, Moderate) 
* Multiple out-of-bounds write flaws were found in the way the Cherry Cymotion keyboard driver, KYE/Genius device drivers, Logitech device drivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote control driver, and Sunplus wireless desktop driver handled HID reports with an invalid report descriptor size. An attacker with physical access to the system could use either of these flaws to write data past an allocated memory buffer. (CVE-2014-3184, Low) 
* An information leak flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled access of the user control's state. A local, privileged user could use this flaw to leak kernel memory to user space. (CVE-2014-4652, Low) 
* It was found that the espfix functionality could be bypassed by installing a 16-bit RW data segment into GDT instead of LDT (which espfix checks), and using that segment on the stack. A local, unprivileged user could potentially use this flaw to leak kernel stack addresses. (CVE-2014-8133, Low) 
* An information leak flaw was found in the Linux kernel's IEEE 802.11 wireless networking implementation. When software encryption was used, a remote attacker could use this flaw to leak up to 8 bytes of plaintext. (CVE-2014-8709, Low) 
* It was found that the Linux kernel KVM subsystem's sysenter instruction emulation was not sufficient. An unprivileged guest user could use this flaw to escalate their privileges by tricking the hypervisor to emulate a SYSENTER instruction in 16-bit mode, if the guest OS did not initialize the SYSENTER model-specific registers (MSRs). Note: Certified guest operating systems for Scientific Linux with KVM do initialize the SYSENTER MSRs and are thus not vulnerable to this issue when running on a KVM hypervisor. (CVE-2015-0239, Low) 
The system must be rebooted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.el6.noarch.rpm</filename><sum type="sha256">386679ee44419508b1c79257dad0e9d4a77fdd0ce25a0763268dc585a90a21c1</sum></package><package arch="x86_64" name="kernel-devel" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">bbf7b02310bd0fb9513b8d36fe8095fa75a7c0e5439c8c3120bb94ccf8e1dfa3</sum></package><package arch="x86_64" name="python-perf" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">a3df4c8d64b6afeede5c9c33a12065b165b7c7658114c8e249dac6eeee6e8650</sum></package><package arch="x86_64" name="kernel-debug" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">b56c3e1076a182637616e11ce1a9f847f84b9a3cec9b54534799209cab42cda2</sum></package><package arch="noarch" name="kernel-firmware" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.el6.noarch.rpm</filename><sum type="sha256">1143c5d12a208861ca48aa6a65095f5a8db7b29c6372468f3502efd82fbac834</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.el6.noarch.rpm</filename><sum type="sha256">9fedf9ebe0b9c06cc96ec9a90f469c1adba01c3303d1b04d0dce3d7edfd68326</sum></package><package arch="x86_64" name="perf" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">3e8482292cfbc9216ae22e87e274eb7b76bd8271e1a03284225d996cb1142e3b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">fee17da6d6f204fe2768a2e75d3f5d565e436cf9aa284beb5dcf2de422a964d7</sum></package><package arch="x86_64" name="kernel-headers" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">435998fb50289e24360920949ad92cccd99bab1eb7e5c59a4220f03e6988d2d1</sum></package><package arch="noarch" name="kmod-openafs" release="1.SL67.el6" src="kmod-openafs-1.6.13-1.SL67.el6.src.rpm" version="1.6.13"><filename>kmod-openafs-1.6.13-1.SL67.el6.noarch.rpm</filename><sum type="sha256">eb7f968464bf25fc22af45d5ceacfacffe68e502f436d5a192adcc3a80edb61a</sum></package><package arch="x86_64" name="kmod-openafs-573" release="215.sl6.573" src="openafs.SLx-1.6.13-215.src.rpm" version="1.6.13"><filename>kmod-openafs-573-1.6.13-215.sl6.573.x86_64.rpm</filename><sum type="sha256">03f2b94045f8aadefad7878ebcc348e01a2b50b9d12cdcd3927e1325021d5d42</sum></package><package arch="x86_64" name="kernel" release="573.el6" src="kernel-2.6.32-573.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.el6.x86_64.rpm</filename><sum type="sha256">7606d56fcdda9de2d52be4f06b2c826683daf7090b64f92c9c5b485eec7341d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" id="CVE-2014-3184" title="Kernel: Hid: Off By One Error In Various _Report_Fixup Routines" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3940" id="CVE-2014-3940" title="Kernel: Missing Check During Hugepage Migration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" id="CVE-2014-4652" title="Kernel: Alsa: Control: Protect User Controls Against Races &amp; Memory Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" id="CVE-2014-8133" title="Kernel: X86: Espfix(64) Bypass Via Set_Thread_Area And Clone_Settls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" id="CVE-2014-8709" title="Kernel: Net: Mac80211: Plain Text Information Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683" id="CVE-2014-9683" title="Kernel: Buffer Overflow In Ecryptfs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239" id="CVE-2015-0239" title=" Kernel: Kvm: Insufficient Sysenter Emulation When Invoked From 16-Bit Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339" id="CVE-2015-3339" title="Kernel: Race Condition Between Chown() And Execve()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1272" id="RHSA-2015:1272-1" title="Rhsa-2015:1272-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025868" id="1025868" title="Kernel Panic When Installing Rhel4 With Opteron G3 Cpu Model" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066702" id="1066702" title="Hugepage Allocations Hang On Numa Nodes With Insufficient Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104097" id="1104097" title="Kernel: Missing Check During Hugepage Migration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113406" id="1113406" title="Kernel: Alsa: Control: Protect User Controls Against Races &amp; Memory Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1115545" id="1115545" title="Nfs4: Remove Incorrect &quot;Lock Reclaim Failed!&quot; Warning When Delegations Are Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1116398" id="1116398" title="Rhev-H Crashes And Reboots When Ksmd (Mom) Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141391" id="1141391" title="Kernel: Hid: Off By One Error In Various _Report_Fixup Routines" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144128" id="1144128" title="Fuse: Scheduling While Atomic Oopses When Using Inval_Entry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145751" id="1145751" title="Kvm_Clock Lacks Protection Against Tsc Going Backwards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150510" id="1150510" title="Kernel Ignores Acpi Memory Devices (Pnp0C80) Present At Boot Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1156661" id="1156661" title="Kernel Crash When Unmounting Ext4 Filesystem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171317" id="1171317" title="Xfs May Crash After Unmount If A Log Write Is Delayed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1172797" id="1172797" title="Kernel: X86: Espfix(64) Bypass Via Set_Thread_Area And Clone_Settls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173580" id="1173580" title="Kernel: Net: Mac80211: Plain Text Information Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183773" id="1183773" title="Clock_Event_Device:Min_Delta_Ns Can Overflow And Can Never Go Down" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1186448" id="1186448" title=" Kernel: Kvm: Insufficient Sysenter Emulation When Invoked From 16-Bit Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1187940" id="1187940" title="Regression: Loading Memory Mapped Files Does Not Use The Optimal Sized (Large) I/O Any More In Kernel 2.6.32-504.3.3.El6.X86_64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193830" id="1193830" title="Kernel: Buffer Overflow In Ecryptfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196319" id="1196319" title="Backport The Dm-Switch Target To Rhel 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1200541" id="1200541" title="Reset Socket Ignored When Socket State Is Last-Ack And Connection State Is Syn-Sent" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1208065" id="1208065" title="O_Trunc Ignored On Nfs File With Invalid Cache Entry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1214030" id="1214030" title="Kernel: Race Condition Between Chown() And Execve()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=734360" id="734360" title="&quot;Opcontrol --Deinit&quot; Cause Kernel Panic Inside Guest Os." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=840708" id="840708" title="Misleading (Typo) Print For &quot;Max_Report_Luns&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=986761" id="986761" title="Guest Kernel Will Print Many &quot;Serial8250: Too Much Work For Irq3&quot; When Using Kvm With Isa-Serial" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1287-1</id><title>Freeradius</title><description>A stack-based buffer overflow was found in the way the FreeRADIUS rlm_pap module handled long password hashes. An attacker able to make radiusd process a malformed password hash could cause the daemon to crash. (CVE-2014-2015) 
The freeradius packages have been upgraded to upstream version 2.2.6, which provides a number of bug fixes and enhancements over the previous version, including: 
* The number of dictionaries have been updated. 
* This update implements several Extensible Authentication Protocol (EAP) improvements. 
* A number of new expansions have been added, including: %{randstr:...}, %{hex:...}, %{sha1:...}, %{base64:...}, %{tobase64:...}, and %{base64tohex:...}. 
* Hexadecimal numbers (0x...) are now supported in %{expr:...} expansions. 
* This update adds operator support to the rlm_python module. 
* The Dynamic Host Configuration Protocol (DHCP) and DHCP relay code have been finalized. 
* This update adds the rlm_cache module to cache arbitrary attributes. 
This update also fixes the following bugs: 
* The /var/log/radius/radutmp file was configured to rotate at one-month intervals, even though this was unnecessary. This update removes /var/log/radius/radutmp from the installed logrotate utility configuration in the /etc/logrotate.d/radiusd file, and /var/log/radius/radutmp is no longer rotated. 
* The radiusd service could not write the output file created by the raddebug utility. The raddebug utility now sets appropriate ownership to the output file, allowing radiusd to write the output. 
* After starting raddebug using the "raddebug -t 0" command, raddebug exited immediately. A typo in the special case comparison has been fixed, and raddebug now runs for 11.5 days in this situation. 
* MS-CHAP authentication failed when the User-Name and MS-CHAP-User-Name attributes used different encodings, even when the user provided correct credentials. Now, MS-CHAP authentication properly handles mismatching character encodings. Authentication with correct credentials no longer fails in this situation. 
* Automatically generated default certificates used the SHA-1 algorithm message digest, which is considered insecure. The default certificates now use the more secure SHA-256 algorithm message digest. 
* During the Online Certificate Status Protocol (OCSP) validation, radiusd terminated unexpectedly with a segmentation fault after attempting to access the next update field that was not provided by the OCSP responder. Now, radiusd does not crash in this situation and instead continues to complete the OCSP validation. 
* Prior to this update, radiusd failed to work with some of the more recent MikroTIK attributes, because the installed directory.mikrotik file did not include them. This update adds MikroTIK attributes with IDs up to 22 to dictionary.mikrotik, and radiusd now works as expected with these attributes. 
After installing this update, the radiusd service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="freeradius-ldap" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-ldap-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">6661719505899117a2a60c6dda136471a21b5efac21881240ed388e9ba7d27f8</sum></package><package arch="x86_64" name="freeradius-utils" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-utils-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">1c0e2b2ad2ac50fa71268ec13dccf0e91e433d4743560f3cd7947e4ad7d99346</sum></package><package arch="x86_64" name="freeradius-perl" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-perl-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">29c85136798d32ba91f255957b4f0c67d9e6095148cb8dff6802041b279c58aa</sum></package><package arch="x86_64" name="freeradius-python" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-python-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">b5c240f0c666cd7cc38a4a688fe6e2d7a6cecff0aab41d476e1dfb0c93da889c</sum></package><package arch="x86_64" name="freeradius-postgresql" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-postgresql-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">f2eac9ca7c3b42f95ed4dcbafa858020c7118754d491a913812ad673a1faeedd</sum></package><package arch="x86_64" name="freeradius" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">a7a0d56ca5f7312b8951b714976a2e2fb9501f04e471232a361f9f42e68903ad</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-unixODBC-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">5e81c717e0d03166b7fdcfd51885bb44871292be2802879cb68e5624d7887add</sum></package><package arch="x86_64" name="freeradius-krb5" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-krb5-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">799613a5a915248ca8e07373e4025a55052be68a6e79b62c0ce0b61b79705af7</sum></package><package arch="x86_64" name="freeradius-mysql" release="4.el6" src="freeradius-2.2.6-4.el6.src.rpm" version="2.2.6"><filename>freeradius-mysql-2.2.6-4.el6.x86_64.rpm</filename><sum type="sha256">9aff487cc056cd9378aa6320d692e4ce1ac98e8851228b05c24c4e91966dda44</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015" id="CVE-2014-2015" title="Freeradius: Stack-Based Buffer Overflow Flaw In Rlm_Pap Module" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1287" id="RHSA-2015:1287-1" title="Rhsa-2015:1287-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1060319" id="1060319" title="Mschap Authentication Is Not Working Using Automatic Windows User Credentials." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066761" id="1066761" title="Freeradius: Stack-Based Buffer Overflow Flaw In Rlm_Pap Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1078736" id="1078736" title="Rebase Freeradius To 2.2.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135439" id="1135439" title="Default Message Digest Defaults To Sha1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142669" id="1142669" title="Eap-Tls And Ocsp Validation Causing Segmentation Fault + Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173388" id="1173388" title="Dictionary.Mikrotik Missing Attributes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1189011" id="1189011" title="Freeradius Doesn'T Start After Upgrade Due To Failing Openssl Version Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1189386" id="1189386" title="Radiusd Fails To Start After 'Clean' Installation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1189394" id="1189394" title="Radiusd Segfaults After Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=904578" id="904578" title="Radutmp Should Not Rotate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921563" id="921563" title="Raddebug Not Working Correctly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921567" id="921567" title="Raddebug -T 0 Exists Immediately" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1330-1</id><title>Python</title><description>It was discovered that the socket.recvfrom_into() function failed to check the size of the supplied buffer. This could lead to a buffer overflow when the function was called with an insufficiently sized buffer. (CVE-2014-1912) 
It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict the sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752) 
It was discovered that the CGIHTTPServer module incorrectly handled URL encoded paths. A remote attacker could use this flaw to execute scripts outside of the cgi-bin directory, or disclose the source code of the scripts in the cgi-bin directory. (CVE-2014-4650) 
An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control these arguments could use this flaw to disclose portions of the application memory or cause it to crash. (CVE-2014-7185)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="python-devel" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-devel-2.6.6-64.el6.i686.rpm</filename><sum type="sha256">64d37cdba06e67990513c1e359240e059468a98b3331ae58b3528d3ce8979e67</sum></package><package arch="x86_64" name="python-libs" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-libs-2.6.6-64.el6.x86_64.rpm</filename><sum type="sha256">18779d531b61488af7f85adf433b1f08f26679e3ba49488f8502e2093e5f2635</sum></package><package arch="x86_64" name="python-tools" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-tools-2.6.6-64.el6.x86_64.rpm</filename><sum type="sha256">e6f0d1c99025d1e020b2721aa5a376feb91e2d0357a1198f1fa314eef98154f3</sum></package><package arch="i686" name="python-libs" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-libs-2.6.6-64.el6.i686.rpm</filename><sum type="sha256">745f78f84494ab138dd80b6e04330a916e049c83db53a43ed1184fbeca01aa45</sum></package><package arch="x86_64" name="python-devel" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-devel-2.6.6-64.el6.x86_64.rpm</filename><sum type="sha256">6f970059280a910351662730b8248918833e9a3389557c195394c2d79b1aa332</sum></package><package arch="x86_64" name="tkinter" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>tkinter-2.6.6-64.el6.x86_64.rpm</filename><sum type="sha256">7a231450d4859aedb79cd2be9a6129c03aaee5855ad4a5a5ea2ebb8730250662</sum></package><package arch="x86_64" name="python" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-2.6.6-64.el6.x86_64.rpm</filename><sum type="sha256">af95625d96e0766459b3df8ef228c2c37b713caf6de5648ee787bb186f72b945</sum></package><package arch="x86_64" name="python-test" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-test-2.6.6-64.el6.x86_64.rpm</filename><sum type="sha256">16dd091d92200e5b716876219f536c0e27a8cf5b7d98c4d95245bce58f39a573</sum></package><package arch="i686" name="python" release="64.el6" src="python-2.6.6-64.el6.src.rpm" version="2.6.6"><filename>python-2.6.6-64.el6.i686.rpm</filename><sum type="sha256">e9c12ee26184aaf927d015d1a23c4c5cbfa1a38d639d4fc321331db7deb7756b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" id="CVE-2013-1752" title="Python: Multiple Unbound Readline() Dos Flaws In Python Stdlib" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" id="CVE-2014-1912" title="Python: Buffer Overflow In Socket.Recvfrom_Into()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" id="CVE-2014-4650" title="Python: Cgihttpserver Module Does Not Properly Handle Url-Encoded Path Separators In Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" id="CVE-2014-7185" title="Python: Buffer() Integer Overflow Leading To Out Of Bounds Read" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1330" id="RHSA-2015:1330-1" title="Rhsa-2015:1330-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1046174" id="1046174" title="Python: Multiple Unbound Readline() Dos Flaws In Python Stdlib" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1062370" id="1062370" title="Python: Buffer Overflow In Socket.Recvfrom_Into()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1073165" id="1073165" title="Subprocess.Popen.Communicate() Fails With: Ioerror: [Errno 4] Interrupted System Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113527" id="1113527" title="Python: Cgihttpserver Module Does Not Properly Handle Url-Encoded Path Separators In Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1146026" id="1146026" title="Python: Buffer() Integer Overflow Leading To Out Of Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1160640" id="1160640" title="Cprofile Main() Traceback If Options Syntax Is Invalid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180864" id="1180864" title="Multiprocessing Basemanager Serve_Client() Does Not Check Eintr On Recv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199997" id="1199997" title="Python-Libs Should Have &quot;Provides: Python-Ordereddict&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223037" id="1223037" title="Python Raises Exception On Deepcopy Of Instance Methods" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=794632" id="794632" title="Python 2.6 Installation Is Not 64 Bit Clean" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1344-1</id><title>Autofs</title><description>It was found that program-based automounter maps that used interpreted languages such as Python would use standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system. (CVE-2014-8169) 
Note: This issue has been fixed by adding the "AUTOFS_" prefix to the affected environment variables so that they are not used to subvert the system. A configuration option ("force_standard_program_map_env") to override this prefix and to use the environment variables without the prefix has been added. In addition, warnings have been added to the manual page and to the installed configuration file. Now, by default the standard variables of the program map are provided only with the prefix added to its name. 
Bug fixes: 
* If the "ls *" command was executed before a valid mount, the autofs program failed on further mount attempts inside the mount point, whether the mount point was valid or not. While attempting to mount, the "ls *" command of the root directory of an indirect mount was executed, which led to an attempt to mount "*", causing it to be added to the negative map entry cache. This bug has been fixed by checking for and not adding "*" while updating the negative map entry cache. 
* The autofs program by design did not mount host map entries that were duplicate exports in an NFS server export list. The duplicate entries in a multi-mount map entry were recognized as a syntax error and autofs refused to perform mounts when the duplicate entries occurred. Now, autofs has been changed to continue mounting the last seen instance of the duplicate entry rather than fail, and to report the problem in the log files to alert the system administrator. 
* The autofs program did not recognize the yp map type in the master map. This was caused by another change in the master map parser to fix a problem with detecting the map format associated with mapping the type in the master map. The change led to an incorrect length for the type comparison of yp maps that resulted in a match operation failure. This bug has been fixed by correcting the length which is used for the comparison. 
* The autofs program did not update the export list of the Sun-format maps of the network shares exported from an NFS server. This happened due to a change of the Sun-format map parser leading to the hosts map update to stop working on the map re-read operation. The bug has been now fixed by selectively preventing this type of update only for the Sun-formatted maps. The updates of the export list on the Sun-format maps are now visible and refreshing of the export list is no longer supported for the Sun-formatted hosts map. 
* Within changes made for adding of the Sun-format maps, an incorrect check was added that caused a segmentation fault in the Sun-format map parser in  certain circumstances. This has been now fixed by analyzing the intent of  the incorrect check and changing it in order to properly identify the  conditions without causing a fault. 
* A bug in the autofs program map lookup module caused an incorrect map format type comparison. The incorrect comparison affected the Sun-format program maps where it led to the unused macro definitions. The bug in the comparison has been fixed so that the macro definitions are not present for the Sun-format program maps.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="autofs" release="113.el6" src="autofs-5.0.5-113.el6.src.rpm" version="5.0.5"><filename>autofs-5.0.5-113.el6.x86_64.rpm</filename><sum type="sha256">90ff1cab0f4787c7c5540661ee0136afe84ebf2bd2c1eeec644eb85417758d74</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8169" id="CVE-2014-8169" title="Autofs: Priv Escalation Via Interpreter Load Path For Program Based Automount Maps" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1344" id="RHSA-2015:1344-1" title="Rhsa-2015:1344-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153130" id="1153130" title="Autofs-5.0.5-109 With Upgrade To Rhel 6.6 No Longer Recognizes +Yp: In Auto.Master" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163957" id="1163957" title="Autofs Unable To Mount Indirect After Attempt To Mount Wildcard" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1175671" id="1175671" title="Automount Segment Fault In Parse_Sun.So For Negative Parser Tests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1192565" id="1192565" title="Autofs: Priv Escalation Via Interpreter Load Path For Program Based Automount Maps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201195" id="1201195" title="Autofs: Mapfmt_Default Is Not Macro In Lookup_Program.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1347-1</id><title>Pki-Core</title><description>Multiple cross-site scripting flaws were discovered in the Red Hat Certificate System Agent and End Entity pages. An attacker could use these flaws to perform a cross-site scripting (XSS) attack against victims using the Certificate System's web interface. (CVE-2012-2662) 
This update also fixes the following bugs: 
* Previously, pki-core required the SSL version 3 (SSLv3) protocol ranges to communicate with the 389-ds-base packages. However, recent changes to 389-ds-base disabled the default use of SSLv3 and enforced using protocol ranges supported by secure protocols, such as the TLS protocol. As a consequence, the CA failed to install during an Identity Management (IdM) server installation. This update adds TLS-related parameters to the server.xml file of the CA to fix this problem, and running the ipa-server- install command now installs the CA as expected. 
* Previously, the ipa-server-install script failed when attempting to configure a stand-alone CA on systems with OpenJDK version 1.8.0 installed. The pki-core build and runtime dependencies have been modified to use OpenJDK version 1.7.0 during the stand-alone CA configuration. As a result, ipa-server-install no longer fails in this situation. 
* Creating a Scientific Linux 7 replica from a Scientific Linux 6 replica running the CA service sometimes failed in IdM deployments where the initial Scientific Linux 6 CA master had been removed. This could cause problems in some situations, such as when migrating from Scientific Linux 6 to Scientific Linux 7. The bug occurred due to a problem in a previous version of IdM where the subsystem user, created during the initial CA server installation, was removed together with the initial master. This update adds the restore-subsystem-user.py script that restores the subsystem user in the described situation, thus enabling administrators to create a Scientific Linux 7 replica in this scenario. 
* Several Java import statements specify wildcard arguments. However, due to the use of wildcard arguments in the import statements of the source code contained in the Scientific Linux 6 maintenance branch, a name space collision created the potential for an incorrect class to be utilized. As a consequence, the Token Processing System (TPS) rebuild test failed with an error message. This update addresses the bug by supplying the fully named class in all of the affected areas, and the TPS rebuild test no longer fails. 
* Previously, pki-core failed to build with the rebased version of the CMake build system during the TPS rebuild test. The pki-core build files have been updated to comply with the rebased version of CMake. As a result, pki-core builds successfully in the described scenario.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pki-native-tools" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-native-tools-9.0.3-43.el6.x86_64.rpm</filename><sum type="sha256">a570a2c666bbdcf11d1b730939b6add82623e005665443b4b240d81557b04894</sum></package><package arch="noarch" name="pki-setup" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-setup-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">a1ecdc611a08d743208cd37fef1dd28d1f1263abb13211a1b95ad1597436d07a</sum></package><package arch="noarch" name="pki-selinux" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-selinux-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">ea9418f2fd4929fef6af758b575bdc0267269f8f89e8d413b79486f1d4125cfc</sum></package><package arch="noarch" name="pki-ca" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-ca-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">afb97af0a9db794df594112f06a9ed34f9904ef526517b9fcf8b4b85d5363a1a</sum></package><package arch="noarch" name="pki-common-javadoc" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-common-javadoc-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">3abaceb56db91919c093ae88f4c26e41bcea1cbad347238076aae1a400bdf9d4</sum></package><package arch="noarch" name="pki-common" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-common-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">923cf685a2465c25f097bb1bf923af3462e3cd1de63116f55cad7dd8e86c2878</sum></package><package arch="noarch" name="pki-silent" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-silent-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">a046c828ae6dc55df01fda568cafab7507c0cf4ad03ba5068c2aaaa55258ad12</sum></package><package arch="noarch" name="pki-util-javadoc" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-util-javadoc-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">87de3240280bda9f36eff1166016ce360221f5092e16d343d36e00b8f053a5fd</sum></package><package arch="noarch" name="pki-java-tools-javadoc" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-java-tools-javadoc-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">bdb91b12cf0f3d4c5a9dcea2fbea88f19877d1d95dcee2b8a51d1a0e68c3de6d</sum></package><package arch="noarch" name="pki-java-tools" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-java-tools-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">b8ac4aad4d5f8191a363aca3367a4ce1cc617363068c146aeae236c517d684a7</sum></package><package arch="x86_64" name="pki-symkey" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-symkey-9.0.3-43.el6.x86_64.rpm</filename><sum type="sha256">3391f1534b0f18da731e2b39405e80e64a83225a391075134609ced07462ef6f</sum></package><package arch="noarch" name="pki-util" release="43.el6" src="pki-core-9.0.3-43.el6.src.rpm" version="9.0.3"><filename>pki-util-9.0.3-43.el6.noarch.rpm</filename><sum type="sha256">775771b302ee3153deb67493d1d3fe38eb48efc7715f5fbcfdccbd11c7a1aad3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2662" id="CVE-2012-2662" title="Cve-2012-2662" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1347" id="RHSA-2015:1347-1" title="Rhsa-2015:1347-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144188" id="1144188" title="Tps Tests: Rpm Rebuild Failure Due To Wildcard Imports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144608" id="1144608" title="Pki-Core Failed To Build With Cmake-2.8.12.2-4.El6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1225589" id="1225589" title="Unable To Create Rhel 7.1 Replica From Rhel 6 Replica Ca Because Subsystem User Does Not Exist" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=826646" id="826646" title="Cve-2012-2662 Certificate System: Multiple Xss Flaws" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1378-1</id><title>Hivex</title><description>It was found that hivex attempted to read, and possibly write, beyond its allocated buffer when reading a hive file with a very small size or with a truncated or improperly formatted content. An attacker able to supply a specially crafted hive file to an application using the hivex library could possibly use this flaw to execute arbitrary code with the privileges of the user running that application. (CVE-2014-9273) 
This update also fixes the following bug: 
* The hivex(3) man page previously contained a typographical error. This update fixes the typo.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="hivex-devel" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>hivex-devel-1.3.3-4.3.el6.x86_64.rpm</filename><sum type="sha256">677f7c90406dbe3fda3aa2360c8c1e5517c70e1fc4d3950b82166ebcd5c0839e</sum></package><package arch="i686" name="hivex-devel" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>hivex-devel-1.3.3-4.3.el6.i686.rpm</filename><sum type="sha256">b801dbe7bd01d39ab2557b056331df7ed489ca5aae83ec338ad8f7dfc46d0fcf</sum></package><package arch="x86_64" name="ocaml-hivex-devel" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>ocaml-hivex-devel-1.3.3-4.3.el6.x86_64.rpm</filename><sum type="sha256">143410ae9e0bebe9640e89d41ab2f4737ec14c091c3c52ea5d18b913b779bd0b</sum></package><package arch="x86_64" name="perl-hivex" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>perl-hivex-1.3.3-4.3.el6.x86_64.rpm</filename><sum type="sha256">baf82f619081dc063cad8cb409459127edcf9133351e77faf954ce7cee2ae54a</sum></package><package arch="x86_64" name="hivex" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>hivex-1.3.3-4.3.el6.x86_64.rpm</filename><sum type="sha256">8c0983c15888b267662c4e40a69e9b9f55448a41305e6d49b8e5ed6de47dca18</sum></package><package arch="i686" name="hivex" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>hivex-1.3.3-4.3.el6.i686.rpm</filename><sum type="sha256">ad95337c547ebe3edb4a31e340214a4568608014bd81d8c7611c5e63dfc804e0</sum></package><package arch="x86_64" name="ocaml-hivex" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>ocaml-hivex-1.3.3-4.3.el6.x86_64.rpm</filename><sum type="sha256">ce3b608da9ca13a05a02709446335f5cb89678e28867d3fc3fa4dbd7e5d50671</sum></package><package arch="x86_64" name="python-hivex" release="4.3.el6" src="hivex-1.3.3-4.3.el6.src.rpm" version="1.3.3"><filename>python-hivex-1.3.3-4.3.el6.x86_64.rpm</filename><sum type="sha256">ae112ef982232d1f1113cd610ff015a1f6357c3421203b906394db65d2829e3b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9273" id="CVE-2014-9273" title="Hivex: Missing Checks For Small-Sized Files" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1378" id="RHSA-2015:1378-1" title="Rhsa-2015:1378-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1164693" id="1164693" title="Typo Error In Man Page Win::Hivex.3Pm.Gz" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167756" id="1167756" title="Hivex: Missing Checks For Small-Sized Files" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1385-1</id><title>Net-Snmp</title><description>A denial of service flaw was found in the way snmptrapd handled certain SNMP traps when started with the "-OQ" option. If an attacker sent an SNMP trap containing a variable with a NULL type where an integer variable type was expected, it would cause snmptrapd to crash. (CVE-2014-3565) 
This update also fixes the following bugs: 
* The HOST-RESOURCES-MIB::hrSystemProcesses object was not implemented because parts of the HOST-RESOURCES-MIB module were rewritten in an earlier version of net-snmp. Consequently, HOST-RESOURCES- MIB::hrSystemProcesses did not provide information on the number of currently loaded or running processes. With this update, HOST-RESOURCES- MIB::hrSystemProcesses has been implemented, and the net-snmp daemon reports as expected. 
* The Net-SNMP agent daemon, snmpd, reloaded the system ARP table every 60 seconds. As a consequence, snmpd could cause a short CPU usage spike on busy systems with a large APR table. With this update, snmpd does not reload the full ARP table periodically, but monitors the table changes using a netlink socket. 
* Previously, snmpd used an invalid pointer to the current time when periodically checking certain conditions specified by the "monitor" option in the /etc/snmpd/snmpd.conf file. Consequently, snmpd terminated unexpectedly on start with a segmentation fault if a certain entry with the "monitor" option was used. Now, snmpd initializes the correct pointer to the current time, and snmpd no longer crashes on start. 
* Previously, snmpd expected 8-bit network interface indices when processing HOST-RESOURCES-MIB::hrDeviceTable. If an interface index of a local network interface was larger than 30,000 items, snmpd could terminate unexpectedly due to accessing invalid memory. Now, processing of all network sizes is enabled, and snmpd no longer crashes in the described situation. 
* The snmpdtrapd service incorrectly checked for errors when forwarding a trap with a RequestID value of 0, and logged "Forward failed" even though the trap was successfully forwarded. This update fixes snmptrapd checks and the aforementioned message is now logged only when appropriate. 
* Previously, snmpd ignored the value of the "storageUseNFS" option in the /etc/snmpd/snmpd.conf file. As a consequence, NFS drivers were shown as "Network Disks", even though "storageUseNFS" was set to "2" to report them as "Fixed Disks" in HOST-RESOURCES-MIB::hrStorageTable. With this update, snmpd takes the "storageUseNFS" option value into account, and "Fixed Disks" NFS drives are reported correctly. 
* Previously, the Net-SNMP python binding used an incorrect size (8 bytes instead of 4) for variables of IPADDRESS type. Consequently, applications that were using Net-SNMP Python bindings could send malformed SNMP messages. With this update, the bindings now use 4 bytes for variables with IPADRESS type, and only valid SNMP messages are sent. 
* Previously, the snmpd service did not cut values in HOST-RESOURCES- MIB::hrStorageTable to signed 32-bit integers, as required by SNMP standards, and provided the values as unsigned integers. As a consequence, the HOST-RESOURCES-MIB::hrStorageTable implementation did not conform to RFC 2790. The values are now cut to 32-bit signed integers, and snmpd is therefore standard compliant.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="net-snmp-python" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-python-5.5-54.el6.x86_64.rpm</filename><sum type="sha256">c01db5b35af0ed6de6dd812a8308ed2eb363872074d2d07e05ce6e4775246d2d</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-54.el6.i686.rpm</filename><sum type="sha256">eef856b6a7304ff55f8459a7671bb3303e3c9c38150af601b4abbc1fb5cddb2f</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-utils-5.5-54.el6.x86_64.rpm</filename><sum type="sha256">2b3d8864742d9654711cd06fa0562e64ec50b0c971ec713feafbdf96f7025e4d</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-54.el6.i686.rpm</filename><sum type="sha256">961fd16ce9943645271130baeee80b7872747a55f7053c8a75f6b0c026f6b95b</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-54.el6.x86_64.rpm</filename><sum type="sha256">279df45b3c2c1233fbe704795ac5c7680f57d4f5db4ac4f03f8cdb011c5320f0</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-perl-5.5-54.el6.x86_64.rpm</filename><sum type="sha256">a7b37ab776a822c41dba887b6a8103b7e202efd3960a23dacde1a5c609d63d8e</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-5.5-54.el6.x86_64.rpm</filename><sum type="sha256">62bde26ea5f8d629db93b6813f2c782f6674187239c15b9e2e3b1dca8b6da233</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="54.el6" src="net-snmp-5.5-54.el6.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-54.el6.x86_64.rpm</filename><sum type="sha256">e644a51db23671a90901301d16193fe00cdac1306f2440c3e409b3c1aa382724</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" id="CVE-2014-3565" title="Net-Snmp: Snmptrapd Crash When Handling An Snmp Trap Containing A Ifmtu With A Null Type" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1385" id="RHSA-2015:1385-1" title="Rhsa-2015:1385-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1023570" id="1023570" title="Libnetsnmpagent.So Crash Under Certain Conditions - Patched Upstream In 2009" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1034441" id="1034441" title="Net-Snmp Libraries And Headers Are Invalid Due To Hyphens." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1069046" id="1069046" title="Snmpd Returns Truncated Value For Counter64 Taken From Smuxpeer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1070075" id="1070075" title="Snmp Hrprocessorload Returns Incorrect Values For Processor #'S &gt; 100" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1073544" id="1073544" title="Net-Snmp.Rpm Is Not Multilib Safe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1100099" id="1100099" title="Net-Snmp-Python Adds Zeros To End Of Ip Address (Ipaddr Type), Which Is Not Valid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1119567" id="1119567" title="After Installation Of Net-Snmp-Devel-5.5-44.El6_4.4.X86_64 The Command '$ Man Snmp_Read' Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1125155" id="1125155" title="Net-Snmp: Snmptrapd Crash When Handling An Snmp Trap Containing A Ifmtu With A Null Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1125793" id="1125793" title="[Rhel6] Net-Snmp &quot;Storageusenfs 2&quot; Option Does Not Report Nfs Mount As &quot;Fixed Disks&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126914" id="1126914" title="Ocetets Truncated With Python Bindings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1134335" id="1134335" title="Hrsystemprocesses Is Missing (Net-Snmp-5.5-49.El6_5.2)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1157373" id="1157373" title="Readme File In Net-Snmp-Python Package Is Wrong" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181994" id="1181994" title="Net-Snmp Package Does Not Compile On Fedora 21" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=886468" id="886468" title="Snmpd Does Not Report Error When Clientaddr &lt;Ip&gt;:&lt;Port&gt; Cannot Bind To The Specified Port" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=967871" id="967871" title="Net-Snmp Does Not Display Correct Lm_Sensors Sensor Data / Missing Cpu Cores" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1409-1</id><title>Sudo</title><description>It was discovered that sudo did not perform any checks of the TZ environment variable value. If sudo was configured to preserve the TZ environment variable, a local user with privileges to execute commands via sudo could possibly use this flaw to achieve system state changes not permitted by the configured commands. (CVE-2014-9680) 
Note: The default sudoers configuration in Scientific Linux 6 removes the TZ variable from the environment in which commands run by sudo are executed. 
This update also fixes the following bugs: 
* Previously, the sudo utility child processes could sometimes become unresponsive because they ignored the SIGPIPE signal. With this update, SIGPIPE handler is properly restored in the function that reads passwords from the user, and the child processes no longer ignore SIGPIPE. As a result, sudo child processes do not hang in this situation. 
* Prior to this update, the order in which sudo rules were processed did not honor the user-defined sudoOrder attribute. Consequently, sudo rules were processed in an undefined order even when the user defined the order in sudoOrder. The implementation of SSSD support in sudo has been modified to sort the rules according to the sudoOrder value, and sudo rules are now sorted in the order defined by the user in sudoOrder. 
* Previously, sudo became unresponsive after the user issued a command when a sudoers source was mentioned multiple times in the /etc/nsswitch.conf file. The problem occurred when nsswitch.conf contained, for example, the "sudoers: files sss sss" entry. The sudoers source processing code has been fixed to correctly handle multiple instances of the same sudoers source. As a result, sudo no longer hangs when a sudoers source is mentioned multiple times in /etc/nsswitch.conf. 
In addition, this update adds the following enhancement: 
* The sudo utility now supports I/O logs compressed using the zlib library. With this update, sudo can generate zlib compressed I/O logs and also process zlib compressed I/O logs generated by other versions of sudo with zlib support.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sudo-devel" release="19.el6" src="sudo-1.8.6p3-19.el6.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-19.el6.x86_64.rpm</filename><sum type="sha256">fd69d590bd554063cd88159415dce0a80a8a34d988b50266ec11e5aca383563f</sum></package><package arch="x86_64" name="sudo" release="19.el6" src="sudo-1.8.6p3-19.el6.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-19.el6.x86_64.rpm</filename><sum type="sha256">d6e1587bcab584e3c867b52dbd4d9813754ef54562323b7be40979f629e603ad</sum></package><package arch="i686" name="sudo-devel" release="19.el6" src="sudo-1.8.6p3-19.el6.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-19.el6.i686.rpm</filename><sum type="sha256">b318fe2229695b340005fcdcb7e43feaa253f173c33ed2cc1936ba631703916e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" id="CVE-2014-9680" title="Sudo: Unsafe Handling Of Tz Environment Variable" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1409" id="RHSA-2015:1409-1" title="Rhsa-2015:1409-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1138267" id="1138267" title="Sudoers.Ldap Man Page Has Typos In Description" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1138581" id="1138581" title="Sudo With Sssd Doesn'T  Work Correctly With Sudoorder Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142122" id="1142122" title="Sudo Option Mail_No_User Doesn'T Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144448" id="1144448" title="Sudo With Ldap Doesn'T Work Correctly With 'Listpw=All' And 'Verifypw=All' In Sudooption Entry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1147498" id="1147498" title="Duplicate Sss Module In Nsswitch Breaks Sudo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191144" id="1191144" title="Sudo: Unsafe Handling Of Tz Environment Variable" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1417-1</id><title>Mailman</title><description>It was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman. (CVE-2015-2775) 
It was found that mailman stored private email messages in a world- readable directory. A local user could use this flaw to read private mailing list archives. (CVE-2002-0389) 
This update also fixes the following bugs: 
* Previously, it was impossible to configure Mailman in a way that Domain- based Message Authentication, Reporting &amp; Conformance (DMARC) would recognize Sender alignment for Domain Key Identified Mail (DKIM) signatures. Consequently, Mailman list subscribers that belonged to a mail server with a "reject" policy for DMARC, such as yahoo.com or AOL.com, were unable to receive Mailman forwarded messages from senders residing in any domain that provided DKIM signatures. With this update, domains with a "reject" DMARC policy are recognized correctly, and Mailman list administrators are able to configure the way these messages are handled. As a result, after a proper configuration, subscribers now correctly receive Mailman forwarded messages in this scenario. 
* Mailman used a console encoding when generating a subject for a "welcome email" when new mailing lists were created by the "newlist" command. Consequently, when the console encoding did not match the encoding used by Mailman for that particular language, characters in the "welcome email" could be displayed incorrectly. Mailman has been fixed to use the correct encoding, and characters in the "welcome email" are now displayed properly. 
* The "rmlist" command used a hardcoded path to list data based on the VAR_PREFIX configuration variable. As a consequence, when the list was created outside of VAR_PREFIX, it was impossible to remove it using the "rmlist" command. With this update, the "rmlist" command uses the correct LIST_DATA_DIR value instead of VAR_PREFIX, and it is now possible to remove the list in described situation. 
* Due to an incompatibility between Python and Mailman in Scientific Linux 6, when moderators were approving a moderated message to a mailing list and checked the "Preserve messages for the site administrator" checkbox, Mailman failed to approve the message and returned an error. This incompatibility has been fixed, and Mailman now approves messages as expected in this scenario. 
* When Mailman was set to not archive a list but the archive was not set to private, attachments sent to that list were placed in a public archive. Consequently, users of Mailman web interface could list private attachments because httpd configuration of public archive directory allows listing all files in the archive directory. The httpd configuration of Mailman has been fixed to not allow listing of private archive directory, and users of Mailman web interface are no longer able to list private attachments.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="3" name="mailman" release="25.el6" src="mailman-2.1.12-25.el6.src.rpm" version="2.1.12"><filename>mailman-2.1.12-25.el6.x86_64.rpm</filename><sum type="sha256">2107cd9f1d06da26286f5e5f34cf1009b2cbb0773be8145fdf38c1dc9334f678</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0389" id="CVE-2002-0389" title="Mailman: Local Users Able To Read Private Mailing List Archives" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2775" id="CVE-2015-2775" title="Mailman: Directory Traversal In Mta Transports That Deliver Programmatically" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1417" id="RHSA-2015:1417-1" title="Rhsa-2015:1417-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1008139" id="1008139" title="Rmlist Fails If List_Data_Dir Is Not A Child Of Var_Prefix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1056366" id="1056366" title="The Subject Of The Welcome Email Is Character Garbled When Creating A New Mailing List With The New List Command Of Mailman." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1095359" id="1095359" title="Yahoo.Com And Aol Dmarc Reject Policies Cripples Mailman-2.1.12 - Update To Newer Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1208059" id="1208059" title="Mailman: Directory Traversal In Mta Transports That Deliver Programmatically" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=723584" id="723584" title="Mailman: Local Users Able To Read Private Mailing List Archives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=745409" id="745409" title="Default Httpd Config For Mailman Offers Directory Listings For Lists With Disabled But Public Archives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=765807" id="765807" title="Messages To Moderated Queues Are Put In Shunt Box" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1419-1</id><title>Libxml2</title><description>A denial of service flaw was found in the way the libxml2 library parsed certain XML files. An attacker could provide a specially crafted XML file that, when parsed by an application using libxml2, could cause that application to use an excessive amount of memory. (CVE-2015-1819) 
This update also fixes the following bug: 
This update fixes an error that occurred when running a test case for the serialization of HTML documents. 
The desktop must be restarted (log out, then log back in) for this update to take effect.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libxml2-devel" release="20.el6" src="libxml2-2.7.6-20.el6.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-20.el6.x86_64.rpm</filename><sum type="sha256">2a311bab600974864dc64403f03484e290d4f65bbb8264ae7be0c33f7bd33eeb</sum></package><package arch="x86_64" name="libxml2-static" release="20.el6" src="libxml2-2.7.6-20.el6.src.rpm" version="2.7.6"><filename>libxml2-static-2.7.6-20.el6.x86_64.rpm</filename><sum type="sha256">bca010ac3f75d71d9fda2654003f53013ee058bb3d2827b4a22a0e2f14fb4d3a</sum></package><package arch="i686" name="libxml2-devel" release="20.el6" src="libxml2-2.7.6-20.el6.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-20.el6.i686.rpm</filename><sum type="sha256">58c5391cc34b0bbe4e619c1c4316db36ceba044abffd3efadc6c11d35d631772</sum></package><package arch="x86_64" name="libxml2-python" release="20.el6" src="libxml2-2.7.6-20.el6.src.rpm" version="2.7.6"><filename>libxml2-python-2.7.6-20.el6.x86_64.rpm</filename><sum type="sha256">b98ee29f63e5df0ef29a4e5665b509a9a26ee7674e7861cb5f2414e4b60b35d2</sum></package><package arch="x86_64" name="libxml2" release="20.el6" src="libxml2-2.7.6-20.el6.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-20.el6.x86_64.rpm</filename><sum type="sha256">11c3723c57cbedc435b311067cc7a4819cb9d1a16d24ebca2c9cb2369ceb5f6a</sum></package><package arch="i686" name="libxml2" release="20.el6" src="libxml2-2.7.6-20.el6.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-20.el6.i686.rpm</filename><sum type="sha256">d76ff1af7773e58cbab7de599c971a351c9a14cd462998bdac71b90022789972</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" id="CVE-2015-1819" title="Libxml2: Denial Of Service Processing A Crafted Xml Document" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1419" id="RHSA-2015:1419-1" title="Rhsa-2015:1419-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211278" id="1211278" title="Libxml2: Denial Of Service Processing A Crafted Xml Document" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1424-1</id><title>Pacemaker</title><description>A flaw was found in the way pacemaker, a cluster resource manager, evaluated added nodes in certain situations. A user with read-only access could potentially assign any other existing roles to themselves and then add privileges to other users as well. (CVE-2015-1867) 
This update also fixes the following bugs: 
* Due to a race condition, nodes that gracefully shut down occasionally had difficulty rejoining the cluster. As a consequence, nodes could come online and be shut down again immediately by the cluster. This bug has been fixed, and the "shutdown" attribute is now cleared properly. 
* Prior to this update, the pacemaker utility caused an unexpected termination of the attrd daemon after a system update to Scientific Linux 6.6. The bug has been fixed so that attrd no longer crashes when pacemaker starts. 
* Previously, the access control list (ACL) of the pacemaker utility allowed a role assignment to the Cluster Information Base (CIB) with a read-only permission. With this update, ACL is enforced and can no longer be bypassed by the user without the write permission, thus fixing this bug. 
* Prior to this update, the ClusterMon (crm_mon) utility did not trigger an external agent script with the "-E" parameter to monitor the Cluster Information Base (CIB) when the pacemaker utility was used. A patch has been provided to fix this bug, and crm_mon now calls the agent script when the "-E" parameter is used.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pacemaker-doc" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-doc-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">c7bcc66d046a57a8673bf812a23e5196a94897513d0d770d3490c7fcf41d5329</sum></package><package arch="x86_64" name="pacemaker-remote" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-remote-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">15ee05c622a7f210af94ba7f0789a843d40962da46978fbd8fa6614cd9137154</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-libs-devel-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">2d0dd9c27e744491483401cb0ba0acd54543a1014d21c57dd10c29cdf0a9b276</sum></package><package arch="i686" name="pacemaker-libs-devel" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-libs-devel-1.1.12-8.el6.i686.rpm</filename><sum type="sha256">02261e77f8aee5af0914e5cc5ad7b8db45d273ad6a516630917033a49b13f535</sum></package><package arch="i686" name="pacemaker-libs" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-libs-1.1.12-8.el6.i686.rpm</filename><sum type="sha256">fe4623768ae0e98816c7d3b6170ecf79a3546fbbbb182760477d0813348940fa</sum></package><package arch="x86_64" name="pacemaker" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">1905b6703f369974e7df5ab650ddd00698d728e56e5b8c52556546bbf4dd31c6</sum></package><package arch="x86_64" name="pacemaker-cli" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-cli-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">b1a3fb86ac44e3fc187120f17cb22d12d690277db5cb307550ac91bb3c784c7d</sum></package><package arch="x86_64" name="pacemaker-cts" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-cts-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">5da39777babad4dd1e374c5f5f23c3055bbb5fb81033e8d125b8971a7f970b27</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-cluster-libs-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">7b28acffe39c52ea960ed0b8bbfeced0de80c294b2a1a2273cea4885d8547f91</sum></package><package arch="x86_64" name="pacemaker-libs" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-libs-1.1.12-8.el6.x86_64.rpm</filename><sum type="sha256">f951770fc64a87d5e3ff619aeb9188df38833e5ae4f821fefb3e38a46861167f</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="8.el6" src="pacemaker-1.1.12-8.el6.src.rpm" version="1.1.12"><filename>pacemaker-cluster-libs-1.1.12-8.el6.i686.rpm</filename><sum type="sha256">5a71080a59444aa8572c64c16ff0a70c75e979c9d30e41e49bb0bfd04d2d38f9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1867" id="CVE-2015-1867" title="Pacemaker: Acl Read-Only Access Allow Role Assignment" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1424" id="RHSA-2015:1424-1" title="Rhsa-2015:1424-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163982" id="1163982" title="Upgrading Pacemaker-1.3-Style Configuration To Pacemaker-2.0 With Upgrade-1.3.Xsl Every 15 Minutes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1177821" id="1177821" title="Init Script: Does Not Export Sysconfig Environment Variables Before Starting Daemon" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207621" id="1207621" title="Pacemaker (1.1.12-4.El6.X86_64) Acl Read-Only Access Allow Role Assignment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211370" id="1211370" title="Pacemaker: Acl Read-Only Access Allow Role Assignment" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1439-1</id><title>Wpa_Supplicant</title><description>An integer underflow flaw, leading to a buffer over-read, was found in the way wpa_supplicant handled WMM Action frames. A specially crafted frame could possibly allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash. (CVE-2015-4142) 
This update includes the following enhancement: 
* Prior to this update, wpa_supplicant did not provide a way to require the host name to be listed in an X.509 certificate's Common Name or Subject Alternative Name, and only allowed host name suffix or subject substring checks. This update introduces a new configuration directive, 'domain_match', which adds a full host name check. 
After installing this update, the wpa_supplicant service will be restarted automatically.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="6.el6" src="wpa_supplicant-0.7.3-6.el6.src.rpm" version="0.7.3"><filename>wpa_supplicant-0.7.3-6.el6.x86_64.rpm</filename><sum type="sha256">90618ba80ae06dd70be0be1388a30b9a8ace95a8bcf1dc553122cf6b2a73c3bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" id="CVE-2015-4142" title="Wpa_Supplicant And Hostapd: Integer Underflow In Ap Mode Wmm Action Frame Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1439" id="RHSA-2015:1439-1" title="Rhsa-2015:1439-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221178" id="1221178" title="Wpa_Supplicant And Hostapd: Integer Underflow In Ap Mode Wmm Action Frame Processing" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1447-1</id><title>Grep</title><description>An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) 
A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) 
The grep packages have been upgraded to upstream version 2.20, which provides a number of bug fixes and enhancements over the previous version. Notably, the speed of various operations has been improved significantly. Now, the recursive grep utility uses the fts function of the gnulib library for directory traversal, so that it can handle much larger directories without reporting the "File name too long" error message, and it can operate faster when dealing with large directory hierarchies. 
This update also fixes the following bugs: 
* Prior to this update, the \w and \W symbols were inconsistently matched to the [:alnum:] character class. Consequently, regular expressions that used \w and \W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \w is now matched to the [_[:alnum:]] character and \W to the [^_[:alnum:]] character consistently. 
* Previously, the "--fixed-regexp" command-line option was not included in the grep(1) manual page. Consequently, the manual page was inconsistent with the built-in help of the grep utility. To fix this bug, grep(1) has been updated to include a note informing the user that "--fixed-regexp" is an obsolete option. Now, the built-in help and manual page are consistent regarding the "--fixed-regexp" option. 
* Previously, the Perl Compatible Regular Expression (PCRE) library did not work correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an error message about invalid UTF-8 byte sequence characters was returned. To fix this bug, patches from upstream have been applied to the PCRE library and the grep utility. As a result, PCRE now skips non-UTF-8 characters as non-matching text without returning any error message.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="grep" release="3.el6" src="grep-2.20-3.el6.src.rpm" version="2.20"><filename>grep-2.20-3.el6.x86_64.rpm</filename><sum type="sha256">d95fbb08242be6622229f515c3f6e92aef79e8bc1a9e04aadeb53b40eb213ecd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5667" id="CVE-2012-5667" title="Grep: Integer Overflow Leading To Heap-Based Buffer-Overflow When Reading Large Lines" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1345" id="CVE-2015-1345" title="Grep: Heap Buffer Overrun" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1447" id="RHSA-2015:1447-1" title="Rhsa-2015:1447-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103270" id="1103270" title="Undocumented Option --Fixed-Regexp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167766" id="1167766" title="Grep Abandons (With Core Dump In Some Systems) When Invoked With Recurse And Perl Switches" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171806" id="1171806" title="Grep Matches Lowercase When Only Searching For Uppercase Range" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183651" id="1183651" title="Grep: Heap Buffer Overrun" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=799863" id="799863" title="Inconsistent \W And [[:Alnum:]] Behaviour" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=889935" id="889935" title="Grep: Integer Overflow Leading To Heap-Based Buffer-Overflow When Reading Large Lines" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=982215" id="982215" title="Word Boundary Error Near An Utf8 Character" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1455-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2731, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) 
It was found that Thunderbird skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-07-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_6" src="thunderbird-31.8.0-1.el6_6.src.rpm" version="31.8.0"><filename>thunderbird-31.8.0-1.el6_6.x86_64.rpm</filename><sum type="sha256">bf88c326d1cbd8fda1e4330e87fc46a9e3f35f79846fca9b1ad26684f193dd73</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" id="CVE-2015-2724" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" id="CVE-2015-2725" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" id="CVE-2015-2731" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" id="CVE-2015-2734" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" id="CVE-2015-2735" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" id="CVE-2015-2736" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" id="CVE-2015-2737" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" id="CVE-2015-2738" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" id="CVE-2015-2739" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" id="CVE-2015-2740" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" id="CVE-2015-2741" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1455" id="RHSA-2015:1455-1" title="Rhsa-2015:1455-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236947" id="1236947" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236953" id="1236953" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236956" id="1236956" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236963" id="1236963" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1457-1</id><title>Gnutls</title><description>It was found that GnuTLS did not check activation and expiration dates of CA certificates. This could cause an application using GnuTLS to incorrectly accept a certificate as valid when its issuing CA is already expired. (CVE-2014-8155) 
It was found that GnuTLS did not verify whether a hashing algorithm listed in a signature matched the hashing algorithm listed in the certificate. An attacker could create a certificate that used a different hashing algorithm than it claimed, possibly causing GnuTLS to use an insecure, disallowed hashing algorithm during certificate verification. (CVE-2015-0282) 
It was discovered that GnuTLS did not check if all sections of X.509 certificates indicate the same signature algorithm. This flaw, in combination with a different flaw, could possibly lead to a bypass of the certificate signature check. (CVE-2015-0294) 
This update also fixes the following bug: 
* Previously, under certain circumstances, the certtool utility could generate X.509 certificates which contained a negative modulus. Consequently, such certificates could have interoperation problems with the software using them. The bug has been fixed, and certtool no longer generates X.509 certificates containing a negative modulus.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="gnutls-utils" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-utils-2.8.5-18.el6.x86_64.rpm</filename><sum type="sha256">2225b22298215f5c866db93fc4fd94b947ed7be46511e602abbd929423aa1194</sum></package><package arch="i686" name="gnutls-guile" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-18.el6.i686.rpm</filename><sum type="sha256">3ac598b30594ffd838bd0d25e12bba1f0f9e48989589b034dd2fc5ae8533a589</sum></package><package arch="x86_64" name="gnutls-devel" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-18.el6.x86_64.rpm</filename><sum type="sha256">69ad8e1e093ca80205d36e95ceabd7b1c221eaa20a593e1003fd3874b9ed3435</sum></package><package arch="i686" name="gnutls-devel" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-18.el6.i686.rpm</filename><sum type="sha256">a5b42bb46c9fedcef0e3788e1e7651760ae7b255a326d3f3f06f3c0ee8b5a17f</sum></package><package arch="i686" name="gnutls" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-18.el6.i686.rpm</filename><sum type="sha256">5f59cdb9f2c36716a76b882bd4d3e4a4d982e89223ff36cb0751e0d2be88bb00</sum></package><package arch="x86_64" name="gnutls" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-18.el6.x86_64.rpm</filename><sum type="sha256">7eeaad68601b070f5e361f7a21af717ef6175217755c86dae6793030df26273a</sum></package><package arch="x86_64" name="gnutls-guile" release="18.el6" src="gnutls-2.8.5-18.el6.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-18.el6.x86_64.rpm</filename><sum type="sha256">4f2ea0f138f2b7cac02b2e6d6da35cafff066311c669fca08e6bb6f52c57dba4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8155" id="CVE-2014-8155" title="Gnutls: Gnutls Does Not Perform Date/Time Checks On Ca Certificates" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282" id="CVE-2015-0282" title="Gnutls: Rsa Pkcs#1 Signature Verification Forgery" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" id="CVE-2015-0294" title="Gnutls: Certificate Algorithm Consistency Checking Issue" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1457" id="RHSA-2015:1457-1" title="Rhsa-2015:1457-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1036385" id="1036385" title="Certtool Generates X509 Certificates Which Contain Negative Modulus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1194371" id="1194371" title="Gnutls: Rsa Pkcs#1 Signature Verification Forgery" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196323" id="1196323" title="Gnutls: Certificate Algorithm Consistency Checking Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1197995" id="1197995" title="Gnutls: Gnutls Does Not Perform Date/Time Checks On Ca Certificates" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1458-1</id><title>Libreoffice</title><description>A flaw was found in the way the LibreOffice HWP (Hangul Word Processor) file filter processed certain HWP documents. An attacker able to trick a user into opening a specially crafted HWP document could possibly use this flaw to execute arbitrary code with the privileges of the user opening that document. (CVE-2015-1774) 
The libreoffice packages have been upgraded to upstream version 4.2.8.2, which provides a number of bug fixes and enhancements over the previous version, including: 
* OpenXML interoperability has been improved. 
* This update adds additional statistics functions to the Calc application, thus improving interoperability with Microsoft Excel and its "Analysis ToolPak" add-in. 
* Various performance improvements have been implemented in Calc. 
* This update adds new import filters for importing files from the Appple Keynote and Abiword applications. 
* The export filter for the MathML markup language has been improved. 
* This update adds a new start screen that includes thumbnails of recently opened documents. 
* A visual clue is now displayed in the Slide Sorter window for slides with transitions or animations. 
* This update improves trend lines in charts. 
* LibreOffice now supports BCP 47 language tags.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-sdk-doc-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">3fb05ae4e2ef6b8ac61124ec0d78f8fff6dda6e930968f1beb491fdae7e248d7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-headless" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-headless-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">bf998aa0b9d573fbbdd271110a775e992e98f3f5585d7389e0b0c962b504ae29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-core-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">430605aa5420995d6821fb4417bad4ddcbc8245c18eff5fef3591ac37db08068</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nr-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">4b19ce4021dc8c9a09a6896691a59c7fce2edb5c22467542e3d4dbd75ed44fb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sl-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">feaea3423520b5fae4fc4b8f878b8f57488cac5c66cccc386898e361b28b018c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ar-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">fbf4639de318ef53089acf1b8f7abf114061aad522fdf5f0a582cbc7faba6f53</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-zh-Hant-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">9e0218569780a1e5416980a930a7ce38c85f84e567d88244dd02f6657b87317a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-th-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">44e0d6e67228bce0c2432c76236ac59921b729255f28cd591d8d041cf082957d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-zh-Hans-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">c537e29fe24036379fe23b1edda75281f9650262d1ccc66c4711adaf5279d6d6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-eu-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">b6720d7ee3e09e1c5b23f7cc3656db81e506480e4036daedb135c17022cd2d5c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-as-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">6a1312632522fab08d7e7830b314593d1f7677279ca0b3a50b2efc6b4dbe6bf5</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-hu-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">4c296c7c44fd1023d06bb05ad1c184ca5b8b9ad8b47a583ea8397c22a1368a1b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-es-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">bed1b969f46ef895572731e86ed691c50f3997acbc09066f3e251532effe181b</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-de-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">290e486263e6770f6dad09f9fea7e2ea463ca624a74e44e39b9483ae607d45fa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nn-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">4d7f4a32e70f89074d32961f6cfd1076db7daff7d9051124ce23ce621f1c93c3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ro-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">5a34796fc5c52e8dc1786eb93eac6fabf9407150d47ee9b187a46030a3a550d0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-hi-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">f73c9468e87b2da6a62588c0b56d7065acd234fb3a8fe07f73f8eb621e002f26</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-ja-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">9cec30dac1cfece7df1dc570697ffa30bb004d545fb9476d30d95d76ba5fccb7</sum></package><package arch="i686" epoch="1" name="libreoffice-gdb-debug-support" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-gdb-debug-support-4.2.8.2-11.el6.i686.rpm</filename><sum type="sha256">b341d41acc86cc7f8309f3a7733ee90e3a9c228d34230c84a5481d7bc4d85eea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-bg-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">3511bbb2b848bf50bf9f0254e35eb77f0d3707eb8a3808990284b052f18ca0c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-nlpsolver-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">a8dc143cd5eb490eb14fbb22a46046f33daf97b193cf4b0abd6d8d20865d8f46</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-or-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">24e916926914e4f75e3172b80bb3c3f2a404d60007e4f51ca665adcaa0103b7b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-hr-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">7e806bc640bc422b134c1168d52a8e7429cd0b2b5e74f38fd4d8066a72fe94b8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ga-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">dfdefab7196c9cb3ce1c7ab866feabb3f1a7491f482d7b418bc54eeb9ce65c61</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-graphicfilter-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">8111891a686cc739e7d0c7e87926bce7a5d4d095935f3a35e80a81d8e7daa2d3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ms" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ms-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">cddf6a7ec3c13f9b65f2ba9379ac937091cc82428de489e5657c18b188e8a3ed</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-lt-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">c5c5450ce5be3712f3c384fcf32464e4d0ea1262c4ccb28b8f03407a827c241e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nso-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">a46844e617082a03b3fac5464f8b44c96e50885150815927d1e501aefc0d81e8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sk-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">6115ff7999ac233128ef380ddb310b138221febf7c15802a3c0e058f4a2f5391</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-sr-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">d05544af9a1896fba9d69cd4a41d842275b9728a459ea372e6a4df62f957b763</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sr-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">01f37641fb37442c8e534399b722d993658fbd42c0400c7c90b916da0f687f24</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-st-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">f549159c26b41f8f5f7de560c262f0822d1d84e461e4ded5d151a4ae614ae39c</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-pt-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">1d79ce2b5ae8527acd1845be5329cbf1c9ce48890c31c453a24df06353c27d3b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-en-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">0c1ac8c2061958a90c1390ed9c76f6b2c09be24834373cb069afbf6f33863541</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-math-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">dae091ad20ebaa934e8b0e85797641910e8f966ca12c1dc0beefb0ff0ba0c763</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-xh-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">b404ef7d37c6e62ac68e8aee031475af2c929c6bb7d99860efa8ca3de97fb634</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-gdb-debug-support-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">fe2d8db61f443c6e6a6dede3c6c3d3dfb9b32d00396fe58a03b9b26448891152</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-gl-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">4ba724264355f080bb9b16ff5d2c8727c8d89175711d6eea4a8a42297eb36d4a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-fi-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">a42a07783229ea74759fef1e3710163d68303df42c075b26e281f3750a8d91f0</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-fi-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">0c28cffee93ab8b0b26ce7c91ba6b3ced00f785c8d490c9efd00e7a062a019c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-lt-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">c01c54e1f7716167aa75a4e17208685ad8bbf12afb1fbac74d6602be8bb18154</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-ga-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">bd98c57bbeb635b5ede8ccf83c19aaeb7c4691e8116aa4b640a6bb85222e8c00</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-nl-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">7e98850e15174dd406c39a60a6092dc14a57ce4d60594f913d33e7b25c6cbb29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-et-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">29f69f264a7e55f0159fc45203b2759cfc137850adee51c176cca2b4399f291e</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-bg-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">a92ea91b282655195456c6703c4edcdccefd2430d90d7bfc839b2aaa2919003b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-pyuno-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">3579e70d78dcd9707564507162646c27becee9d4a107faacfb8af58c4acb4b1e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-ogltrans-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">6fd550105fcf524622f0d32fe384262ebdc22f386c9a261628d9d1cec3b53159</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-it-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">a0a3fa34919a632fdc24005a03d0d6a7b56722713835a8f385dd8cda7caf0937</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-opensymbol-fonts-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">70a8e6ff3e2ea6a30421e11b1e8041b8eabeecdebd1c59eeddba51059a05279a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-cs-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">6e8e31ce9eeea27b10cab085cd4cd9907bb06faf5c02286d795705a06b10b791</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-mai-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">42290170efb45bc39a14a1de6c1aa0d9cfdaccb4362d6fa6422e3ecb0ded2fa5</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">0f87ae3bf238194a3109301f9e32ec8d9fa4cf4e500deee34bc8631425de8149</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-hu-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">b786bb9d916b8ffe41daad63ac7da5304edfd93176d2373dc4445a5d0286193a</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-it-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">1be4a69d26fc758fa8b8da25151ab674a683d97a50fab6ba2cf63d55e9437569</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ml-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">df0d4b45af3c0b9b2a325cb9ed466d0bf17170cba18ae316d4eea187da901d16</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-xsltfilter-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">52b8f8b19dbc68258fdb99de76227c0942712559bb6fa818c4060b45532c469a</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-mn-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">8af88061a9cf47501de062a4231ab0c3ac68fdaed700a958acdd8aa90e563e9d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-gu-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">647073603d16c9f4bd3c6c930fd8a3be0a1448307debc70bb6a12ede373d9bed</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nb-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">479c4fcf72b4950d201ee8c759b77083f0fe01bd7a58aea05e0905c86a3f9ad0</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-af-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">6a74299bc678f4e9f93b4eaeaad3289438786031de78ea6209d0984e4fc3a267</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-cy-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">cc92e0bccdf54be4e1162e5a58ddb7d4041face5be550140decee7d107e1613f</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-zh-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">2ea6dc9df5ebc83c9abdbfed6904133ecbefaed6393ec8c9f2de4336d6c8b198</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-hr-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">856813d35c09a09dd7e78d20d9294f5f6985908ec958d6632b01a72d4d3347a8</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-es-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">811e062e22aa4f421ed1a30083f5f9c3db0e7b4839de31a52a195bfe9a7757e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-mr-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">44f3d9133430b37ff44b30e6d7df3e969d87d7082c61481416e9a546ee85b1ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-pdfimport-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">4c450d3b9afa6ce9799ac9be0afc129b36f2e1a86c07d63adc1bc24cdb8f6d1e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-ure-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">1e1dbcace9e26977a0c669c3bf414c3e2876c18f7a788b2acc267899ad5db33b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ta-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">29dc026b6a09ec74961fe76256e9aa72687cf0e88f3fedb968f7da6c394ae7b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-te-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">774b245c91185b4b3e359a7d31be9d50f99f6f4ab44fbf815d0905bd51dd922b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-wiki-publisher-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">07bfe9292f82849af34517abf105aba6f0e93d7e1cde0b4b9bc84fa9f0fb5476</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-zu-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">dbb46e6a1c23fbc1ccad51b83a0e59136dbf14a1ef17705fea943987c27d9795</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-filters-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">cc41ebedce486a6c739bf6202c80a9cd2d08ca5b82698343a635ba542573faf7</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-ro-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">6589c777f4fda07f55d68153128e601bf48c240762bddc29c21987f8a919018e</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-da-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">c5ffc12468db3f6523e43e6bb304cf8edc9d541b0bc8450e206ab0de7a3c1ca2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-fr-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">3651696105c0ede1a79d4060ae3558d15732d5bc4242de36bb2698a4d12b3870</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ko-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">f05b8ce40014fbc42aeae284417e4043e9395644e0d3e26557280e0f8932b556</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-librelogo-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">b85de8d4d7d7ce48368f05e42bac07965136b3eabd00986398ae2ca52ae87317</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-impress-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">5a53c3f0dcd0108238f7c0c3620fc0a04da442e4574d64f364b3a877d958d278</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-he-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">1bc5e5a85c2eaba21b0e4b88bce143e1bb1cc98944429853b24f98fe93b8e646</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-tr-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">6c509b22ab8f12889963bee720b1459429126e21867a7a05cfac8d278524b6f7</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-ko-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">0a49a74d9cd0bdbd06c2c56e2500800f964297c9fa401e2a209b2954ce6ac096</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-ru-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">245bcd21a9fa122add2d1c18207c2e5b92e1055f221719d9e6e1140ba0fc9fbf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-bsh-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">b57fce073eef2e6c05cf8edf46aa6d142276d576a298cbc7cbf0ea833582d426</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ca-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">55ac8333f7e3fc63043084e3445932cd89c81b48711de68cf684f2d971733862</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pa-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">7461e81af44bd1b98cafcf2ebe69df665834c9413f9a63c254968c5523be620a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-bn-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">c07d173b3dde0202e2b3349a0cc0dc00e661384e8202504d05a9dae268bd624f</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-cs-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">df3b9fbc9001da5c4fbee1b5e8c652954c8be5d7d7ceab25dd698c025dfdd210</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-dz-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">8d5b0c96fa09ef25b3582484e063121107cfe6a09c6fee97c48b3611cfe63b80</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-vi-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">dd2dcd37e870aae103d955d23713935cf59d4d8b31d8b72b1a1f7908ea2bc08e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-el-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">ee6807664240bf41ea65575fc11cd06a269c58bf9127e824d57910658d4c4404</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-sv-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">35c6dc9cfba458d522730d82007293e12dc81aca8218856c5dd7c510e7b06957</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-draw-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">75a8ceb9e2153af163267a730558921b499fc37ca8c0a42f325a746d4e732b05</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-de-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">3b4d2127054023515174d5e32907831ab87628199007061ea31d949a303fda4f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-da-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">fe4c8a31b541228597c93ba60f6aa9e77d6f93cd9a70464a6037f21beed5d9cb</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-fr-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">1d69ee2ce6b78d5d6330933acc515e171c4fe9632e07c13316ca9f8eb34fe9c4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ur" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ur-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">357b5234b5ccec088409dbbe8fbaab24b9debf658ae65c30ac7088f3d5c5653b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-kn-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">afa20c8851464e6aa5576e731d81a721edc8dc38b470f5fc7a49c44a088709ef</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-pl-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">2a460da3f5b56156044f768f5be1528f63412a393478f7bba727a58fbe0ed393</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-tn-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">56cc6f2a981cb5ce8a5feed765459b799cb361ea97c66995a8323459b0cbd9cc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-af-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">4f329a7fbe6144e3dc3cbdd1a58d92b181b00f1b4780b0f7aa00b9dc14d43ed1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sv-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">85c5cdbfa1448f3e18217b6abedfdd8deafe7f56c2e42045ff8980bb15f7a314</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-rhino-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">cc3520dfd5eed10e7e197752fc9fa8362088f6adf8444d94c53f5e6ce60f3b01</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-sl-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">917de0d45620f3a9d8ddaa6ef23a15cf32a162ac64ed84c6ab8a3aabe8533558</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-en-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">373a696a9b3f5b532cec99bb863aaf241e8b1c929d74626699c8abb0f96fd886</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nl-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">019e7094a47cf4fb20362dc1be40cf27f6bc1f9407ebc46b10e4dec42b5fdfce</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-calc-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">a3adb93aee756573e4064794f7730b0f391ddd4ed9d7340d8caf2bcbc373398b</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-ca-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">b03b798d8eb6622083ce3982f2f6acab8ae5245304d9442b211f2ac109ed24c6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-base-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">ece55ef75093ce7e064da886466f67ddaceabacdf71982d115cb2e49d10f251c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ja-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">ecccf4193baa5c9d1e3ae3f9d3bd9bcad38d16becd25ec9fcfc49e37287a2225</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pt-PT-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">457911497146f22fd81594c16f448cfc1b822902db87767f36a52a370472a1c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pl-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">af79d2ebe0ef06ddf9219e2838c1090d96f1ecfb6c34a502ccaeb77eb0de37b5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-emailmerge-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">2a683d718e884e16c60f84ccc9f3fdf37a3d673784b9c88eca00d8a1e28fd12c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pt-BR-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">e8a6f859f7831a78c1d139cdf4cadf8efbbd91f16940c93fcc1b2a91fb4be792</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-uk-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">f25a9e7a8d47d8cd96755e292e7b9030e8c4c57fa0a51511674c1b4219da42bf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ve-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">ecab601005f32898ca3ab2c71ed8b155e5775267fb0460ca241fc6d04429125d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-glade-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">73c25d8f4e98e09a7cb79a8ff07826842e83fdd7e1211bcc2f78bdd24484e81b</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-lb-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">12271be8ea87a62f772b8ee16c8e3a7634d2156ff893b81e5d77ff13fa4f7762</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ts-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">9d90300903d4a787b13723b3211336f87acd73c65479c8747303e71c912f3c32</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-sk-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">e26319d060dff149b2e900719a4b3d534ed8ce38ae0ba1cf88272aa7ca0a4820</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-writer-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">d0e8aca1699c0a2ed4f6bfbc64af421c6e5eaf6a266a19c3c455b866c800fece</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>autocorr-fa-4.2.8.2-11.el6.noarch.rpm</filename><sum type="sha256">f3b5d1316e00d4eafd0391f4634b5966631a86cba83cb81135d54160fbb5eeef</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ru-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">fe2a1b0d0bb0f3b619c302a27f61e6ff2359506b0e9ef3dba4b7943c57c399cd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ss-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">0e8c130ea1112605ec2688a0df4cfa5ce32fbfa402e5775ae7cab53c5405a784</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-sdk-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">ee8453718b8978111d45653bcbf7903225027dbe23df2b9ee4a711aa9d04a9d9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="11.el6" src="libreoffice-4.2.8.2-11.el6.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-tr-4.2.8.2-11.el6.x86_64.rpm</filename><sum type="sha256">d14c6806826abf15b4bf29af9360f43863e0610b15aea01683d74d9f2d9ec61a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1774" id="CVE-2015-1774" title="Libreoffice: Hwp File Filter Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1458" id="RHSA-2015:1458-1" title="Rhsa-2015:1458-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1015083" id="1015083" title="Page Preview Is Not Regerated For Spreadsheet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150048" id="1150048" title="Rebase To Latest Stable Libreoffice 4.2.8.2 In Rhel-6.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1209852" id="1209852" title="[Fix Available] Cannot Open/Save On Remote Share" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1216042" id="1216042" title="Libreoffice: Hwp File Filter Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1459-1</id><title>Ntp</title><description>It was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses. (CVE-2014-9298) 
A denial of service flaw was found in the way NTP hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers. (CVE-2015-1799) 
A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server. (CVE-2015-3405) 
A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash. (CVE-2014-9297) 
It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key. (CVE-2015-1798) 
Bug fixes: 
* The ntpd daemon truncated symmetric keys specified in the key file to 20 bytes. As a consequence, it was impossible to configure NTP authentication to work with peers that use longer keys. The maximum length of keys has now been changed to 32 bytes. 
* The ntp-keygen utility used the exponent of 3 when generating RSA keys, and generating RSA keys failed when FIPS mode was enabled. ntp-keygen has been modified to use the exponent of 65537, and generating keys in FIPS mode now works as expected. 
* The ntpd daemon included a root delay when calculating its root dispersion. Consequently, the NTP server reported larger root dispersion than it should have and clients could reject the source when its distance reached the maximum synchronization distance (1.5 seconds by default). Calculation of root dispersion has been fixed, the root dispersion is now reported correctly, and clients no longer reject the server due to a large synchronization distance. 
* The ntpd daemon dropped incoming NTP packets if their source port was lower than 123 (the NTP port). Clients behind Network Address Translation (NAT) were unable to synchronize with the server if their source port was translated to ports below 123. With this update, ntpd no longer checks the source port number. 
Enhancements: 
* This update introduces configurable access of memory segments used for Shared Memory Driver (SHM) reference clocks. Previously, only the first two memory segments were created with owner-only access, allowing just two SHM reference clocks to be used securely on a system. Now, the owner-only access to SHM is configurable with the "mode" option, and it is therefore possible to use more SHM reference clocks securely. 
* Support for nanosecond resolution has been added to the SHM reference clock. Prior to this update, when a Precision Time Protocol (PTP) hardware clock was used as a time source to synchronize the system clock (for example, with the timemaster service from the linuxptp package), the accuracy of the synchronization was limited due to the microsecond resolution of the SHM protocol. The nanosecond extension in the SHM protocol now enables sub-microsecond synchronization of the system clock.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntp" release="5.el6" src="ntp-4.2.6p5-5.el6.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-5.el6.x86_64.rpm</filename><sum type="sha256">a382b622a8d9fda96c8a994cd7baf58786ebd93308324dfcc27d6203d32101e6</sum></package><package arch="x86_64" name="ntp-perl" release="5.el6" src="ntp-4.2.6p5-5.el6.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-5.el6.x86_64.rpm</filename><sum type="sha256">01c747044c347e63beaa02460dcce0f1a2a29a537d64dad9ba35aabbaeadaad7</sum></package><package arch="noarch" name="ntp-doc" release="5.el6" src="ntp-4.2.6p5-5.el6.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-5.el6.noarch.rpm</filename><sum type="sha256">92c420d92841d229a1809da97debcd3d3a139aa5f769af3d4bfd3858bc114a64</sum></package><package arch="x86_64" name="ntpdate" release="5.el6" src="ntp-4.2.6p5-5.el6.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-5.el6.x86_64.rpm</filename><sum type="sha256">1d528d8d3b921d6dd9a8abfa7ed00a7c984beb45aa6b32deb766ec17121443a2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" id="CVE-2014-9297" title="Ntp: Vallen In Extension Fields Are Not Validated" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" id="CVE-2014-9298" title="Ntp: Drop Packets With Source Address ::1" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" id="CVE-2015-1798" title="Ntp: Ntpd Accepts Unauthenticated Packets With Symmetric Key Crypto" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" id="CVE-2015-1799" title="Ntp: Authentication Doesn'T Protect Symmetric Associations Against Dos Attacks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" id="CVE-2015-3405" title="Ntp: Ntp-Keygen May Generate Non-Random Symmetric Keys On Big-Endian Systems" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1459" id="RHSA-2015:1459-1" title="Rhsa-2015:1459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1045376" id="1045376" title="Fix Root Distance And Root Dispersion Calculations." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1117704" id="1117704" title="Shm Refclock Doesn'T Support Nanosecond Resolution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122015" id="1122015" title="Shm Refclock Allows Only Two Units With Owner-Only Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1165141" id="1165141" title="Ntp: Mreadvar Command Crash In Ntpq" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166596" id="1166596" title="Ntpd Should Warn When Monitoring Facility Can'T Be Disabled Due To Restrict Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171630" id="1171630" title="Ntp Drops Requests When Sourceport Is Below 123" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184572" id="1184572" title="Ntp: Drop Packets With Source Address ::1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184573" id="1184573" title="Ntp: Vallen In Extension Fields Are Not Validated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190619" id="1190619" title="Ntpd -X Steps Clock On Leap Second" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193849" id="1193849" title="Logconfig Documentation Needs Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1193850" id="1193850" title="Ntpd Does Not Update Dstadr When The Routing Table Changes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199430" id="1199430" title="Ntp: Ntpd Accepts Unauthenticated Packets With Symmetric Key Crypto" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199435" id="1199435" title="Ntp: Authentication Doesn'T Protect Symmetric Associations Against Dos Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210324" id="1210324" title="Ntp: Ntp-Keygen May Generate Non-Random Symmetric Keys On Big-Endian Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=995134" id="995134" title="Ntp Package Doesn'T Build With Net-Snmp-Devel" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1460-1</id><title>Wireshark</title><description>Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-8714, CVE-2014-8712, CVE-2014-8713, CVE-2014-8711, CVE-2014-8710, CVE-2015-0562, CVE-2015-0564, CVE-2015-2189, CVE-2015-2191) 
This update also fixes the following bugs: 
* Previously, the Wireshark tool did not support Advanced Encryption Standard Galois/Counter Mode (AES-GCM) cryptographic algorithm. As a consequence, AES-GCM was not decrypted. Support for AES-GCM has been added to Wireshark, and AES-GCM is now correctly decrypted. 
* Previously, when installing the system using the kickstart method, a dependency on the shadow-utils packages was missing from the wireshark packages, which could cause the installation to fail with a "bad scriptlet" error message. With this update, shadow-utils are listed as required in the wireshark packages spec file, and kickstart installation no longer fails. 
* Prior to this update, the Wireshark tool could not decode types of elliptic curves in Datagram Transport Layer Security (DTLS) Client Hello. Consequently, Wireshark incorrectly displayed elliptic curves types as data. A patch has been applied to address this bug, and Wireshark now decodes elliptic curves types properly. 
* Previously, a dependency on the gtk2 packages was missing from the wireshark packages. As a consequence, the Wireshark tool failed to start under certain circumstances due to an unresolved symbol, "gtk_combo_box_text_new_with_entry", which was added in gtk version 2.24. With this update, a dependency on gtk2 has been added, and Wireshark now always starts as expected. 
In addition, this update adds the following enhancements: 
* With this update, the Wireshark tool supports process substitution, which feeds the output of a process (or processes) into the standard input of another process using the "&lt;(command_list)" syntax. When using process substitution with large files as input, Wireshark failed to decode such input. 
* Wireshark has been enhanced to enable capturing packets with nanosecond time stamp precision, which allows better analysis of recorded network traffic. 
All running instances of Wireshark must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="wireshark-gnome" release="17.el6" src="wireshark-1.8.10-17.el6.src.rpm" version="1.8.10"><filename>wireshark-gnome-1.8.10-17.el6.x86_64.rpm</filename><sum type="sha256">632030c203bbca907435ddf262ed9c6767d81d3af9be6e66c14ecd5a000bd5de</sum></package><package arch="i686" name="wireshark" release="17.el6" src="wireshark-1.8.10-17.el6.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-17.el6.i686.rpm</filename><sum type="sha256">03e265a72c5de1147f6c0787dd2fd02b0566261aceb0054becae480ee18eb4e5</sum></package><package arch="x86_64" name="wireshark-devel" release="17.el6" src="wireshark-1.8.10-17.el6.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-17.el6.x86_64.rpm</filename><sum type="sha256">b5360086601a0681c5e77c8f91375c389c74d08cd7d1ad8c91f68c35b40d47ca</sum></package><package arch="i686" name="wireshark-devel" release="17.el6" src="wireshark-1.8.10-17.el6.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-17.el6.i686.rpm</filename><sum type="sha256">dcca16926cb85c78b3930d54968446de861277f513b45db22d092a8a400d5642</sum></package><package arch="x86_64" name="wireshark" release="17.el6" src="wireshark-1.8.10-17.el6.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-17.el6.x86_64.rpm</filename><sum type="sha256">b187d8c70d1721202e8bb83c8dab1f3875339d65a01b55a2b742c4ac383525dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" id="CVE-2014-8710" title="Wireshark: Sigcomp Dissector Crash (Wnpa-Sec-2014-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" id="CVE-2014-8711" title="Wireshark: Amqp Dissector Crash (Wnpa-Sec-2014-21)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" id="CVE-2014-8712" title="Wireshark: Ncp Dissector Crashes (Wnpa-Sec-2014-22)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" id="CVE-2014-8713" title="Wireshark: Ncp Dissector Crashes (Wnpa-Sec-2014-22)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" id="CVE-2014-8714" title="Wireshark: Tn5250 Infinite Loop (Wnpa-Sec-2014-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" id="CVE-2015-0562" title="Wireshark: Dec Dna Routing Protocol Dissector Crash (Wnpa-Sec-2015-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" id="CVE-2015-0564" title="Wireshark: Tls/Ssl Decryption Crash (Wnpa-Sec-2015-05)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" id="CVE-2015-2189" title="Wireshark: The Pcapng File Parser Could Crash (Wnpa-Sec-2015-08)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" id="CVE-2015-2191" title="Wireshark: The Tnef Dissector Could Go Into An Infinite Loop On 32-Bit Architectures (Wnpa-Sec-2015-10)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1460" id="RHSA-2015:1460-1" title="Rhsa-2015:1460-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163581" id="1163581" title="Wireshark: Tn5250 Infinite Loop (Wnpa-Sec-2014-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163582" id="1163582" title="Wireshark: Ncp Dissector Crashes (Wnpa-Sec-2014-22)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163583" id="1163583" title="Wireshark: Amqp Dissector Crash (Wnpa-Sec-2014-21)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163584" id="1163584" title="Wireshark: Sigcomp Dissector Crash (Wnpa-Sec-2014-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180182" id="1180182" title="Wireshark: Dec Dna Routing Protocol Dissector Crash (Wnpa-Sec-2015-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180197" id="1180197" title="Wireshark: Tls/Ssl Decryption Crash (Wnpa-Sec-2015-05)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199165" id="1199165" title="Wireshark: The Pcapng File Parser Could Crash (Wnpa-Sec-2015-08)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1199167" id="1199167" title="Wireshark: The Tnef Dissector Could Go Into An Infinite Loop On 32-Bit Architectures (Wnpa-Sec-2015-10)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1462-1</id><title>Ipa</title><description>Note: The IdM version provided by this update no longer uses jQuery. 
Bug fixes: 
* The ipa-server-install, ipa-replica-install, and ipa-client-install utilities are not supported on machines running in FIPS-140 mode. Previously, IdM did not warn users about this. Now, IdM does not allow running the utilities in FIPS-140 mode, and displays an explanatory message. 
* If an Active Directory (AD) server was specified or discovered automatically when running the ipa-client-install utility, the utility produced a traceback instead of informing the user that an IdM server is expected in this situation. Now, ipa-client-install detects the AD server and fails with an explanatory message. 
* When IdM servers were configured to require the TLS protocol version 1.1 (TLSv1.1) or later in the httpd server, the ipa utility failed. With this update, running ipa works as expected with TLSv1.1 or later. 
* In certain high-load environments, the Kerberos authentication step of the IdM client installer can fail. Previously, the entire client installation failed in this situation. This update modifies ipa-client- install to prefer the TCP protocol over the UDP protocol and to retry the authentication attempt in case of failure. 
* If ipa-client-install updated or created the /etc/nsswitch.conf file, the sudo utility could terminate unexpectedly with a segmentation fault. Now, ipa-client-install puts a new line character at the end of nsswitch.conf if it modifies the last line of the file, fixing this bug. 
* The ipa-client-automount utility failed with the "UNWILLING_TO_PERFORM" LDAP error when the nsslapd-minssf Red Hat Directory Server configuration parameter was set to "1". This update modifies ipa-client-automount to use encrypted connection for LDAP searches by default, and the utility now finishes successfully even with nsslapd-minssf specified. 
* If installing an IdM server failed after the Certificate Authority (CA) installation, the "ipa-server-install --uninstall" command did not perform a proper cleanup. After the user issued "ipa-server-install --uninstall" and then attempted to install the server again, the installation failed. Now, "ipa-server-install --uninstall" removes the CA-related files in the described situation, and ipa-server-install no longer fails with the mentioned error message. 
* Running ipa-client-install added the "sss" entry to the sudoers line in nsswitch.conf even if "sss" was already configured and the entry was present in the file. Duplicate "sss" then caused sudo to become unresponsive. Now, ipa-client-install no longer adds "sss" if it is already present in nsswitch.conf. 
* After running ipa-client-install, it was not possible to log in using SSH under certain circumstances. Now, ipa-client-install no longer corrupts the sshd_config file, and the sshd service can start as expected, and logging in using SSH works in the described situation. 
* An incorrect definition of the dc attribute in the /usr/share/ipa/05rfc2247.ldif file caused bogus error messages to be returned during migration. The attribute has been fixed, but the bug persists if the copy-schema-to-ca.py script was run on Scientific Linux 6.6 prior to running it on Scientific Linux 6.7. To work around this problem, manually copy /usr/share/ipa/schema/05rfc2247.ldif to /etc/dirsrv /slapd-PKI-IPA/schema/ and restart IdM.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ipa-admintools" release="47.el6" src="ipa-3.0.0-47.el6.src.rpm" version="3.0.0"><filename>ipa-admintools-3.0.0-47.el6.x86_64.rpm</filename><sum type="sha256">2cfa0c6dc506c308e7c7d5732b05f6ad58d13ade5bc8e14b40dcfd0f93d2ba3d</sum></package><package arch="x86_64" name="ipa-client" release="47.el6" src="ipa-3.0.0-47.el6.src.rpm" version="3.0.0"><filename>ipa-client-3.0.0-47.el6.x86_64.rpm</filename><sum type="sha256">1b968f8beff8d8c7ae0bf918b265ed16fb70e68e17967d37306501a4e4abd46e</sum></package><package arch="x86_64" name="ipa-server" release="47.el6" src="ipa-3.0.0-47.el6.src.rpm" version="3.0.0"><filename>ipa-server-3.0.0-47.el6.x86_64.rpm</filename><sum type="sha256">c0a8de3f7e8d04f53a5d7b1bf5b7d6018817a9c331032c06dceeb23acb1a9332</sum></package><package arch="x86_64" name="ipa-server-selinux" release="47.el6" src="ipa-3.0.0-47.el6.src.rpm" version="3.0.0"><filename>ipa-server-selinux-3.0.0-47.el6.x86_64.rpm</filename><sum type="sha256">00f2322dc7ed038ebf99cd5f4119d41a1e304f0aab967648f5ab013b807b1f65</sum></package><package arch="x86_64" name="ipa-python" release="47.el6" src="ipa-3.0.0-47.el6.src.rpm" version="3.0.0"><filename>ipa-python-3.0.0-47.el6.x86_64.rpm</filename><sum type="sha256">f6bc256223476eedf98d438c42ba8c39a27a7cce69145cbea94e94e772338a44</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="47.el6" src="ipa-3.0.0-47.el6.src.rpm" version="3.0.0"><filename>ipa-server-trust-ad-3.0.0-47.el6.x86_64.rpm</filename><sum type="sha256">9680b416f9d0aec91a6432230c15756861a194b06e28ca180cdd9ef5d60ab25e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5312" id="CVE-2010-5312" title="Jquery-Ui: Xss Vulnerability In Jquery.Ui.Dialog Title Option" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6662" id="CVE-2012-6662" title="Jquery-Ui: Xss Vulnerability In Default Content In Tooltip Widget" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1462" id="RHSA-2015:1462-1" title="Rhsa-2015:1462-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1132261" id="1132261" title="Ipa-Client-Install Failing Produces A Traceback Instead Of Useful Error Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1146870" id="1146870" title="Ipa-Client-Install Fails With &quot;Kerbtransport Instance Has No Attribute '__Conn'&quot; Traceback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154687" id="1154687" title="Poodle: Force Using Safe Ciphers (Non-Sslv3) In Ipa Client And Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166041" id="1166041" title="Jquery-Ui: Xss Vulnerability In Jquery.Ui.Dialog Title Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166064" id="1166064" title="Jquery-Ui: Xss Vulnerability In Default Content In Tooltip Widget" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185207" id="1185207" title="Ipa-Client Dont End New Line Character In /Etc/Nsswitch.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198339" id="1198339" title="Ipa-Client-Install Adds Extra Sss To Sudoers In Nsswitch.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201454" id="1201454" title="Ipa Breaks Sshd Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1205660" id="1205660" title="Ipa-Client Rpm Should Require Keyutils" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207649" id="1207649" title="Host Certificate Not Issued To Client During Ipa-Client-Install" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220788" id="1220788" title="Request To Backport Ticket 3578 To Rhel6. Provoking Migration To 7.1 Issues." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1471-1</id><title>Bind</title><description>A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure. (CVE-2015-4620) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.1.x86_64.rpm</filename><sum type="sha256">502637cfc6ac5775f94ba3ed36b3dc94d14345b9e711f4d7936e8c55a3f1d4c0</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.37.rc1.el6_7.1.x86_64.rpm</filename><sum type="sha256">554c272b898d4859a116f28fd367767ed736ee30c94318e285a02ffc712cfafc</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.37.rc1.el6_7.1.x86_64.rpm</filename><sum type="sha256">a3ed66f49be925b84ef3497555bc69ece7ec4ea769119302a47c8e6ad9f0d792</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.1.i686.rpm</filename><sum type="sha256">c91ac19f6ae46ceab137c8682dcdb6fcb30af2b0b774e556bb87296babb6d795</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.37.rc1.el6_7.1.x86_64.rpm</filename><sum type="sha256">ae6d078b6b474ae4742fdd090637d141bdd3214a39055265a2441aef3e805c04</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.1.x86_64.rpm</filename><sum type="sha256">c540d0d0fb5c93a7d168eda2efeef1ea09f6200ea22e227933b0231c980ff227</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.37.rc1.el6_7.1.x86_64.rpm</filename><sum type="sha256">fed009977b2b56ef4da05d49d93952ce30f8ef2ebf71ca4d5a69283a2426a49b</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.1" src="bind-9.8.2-0.37.rc1.el6_7.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.1.i686.rpm</filename><sum type="sha256">e3fcaa2d365264f30f6c11972cadf58db0aae40bc4d83568e31e94c1849f6a36</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" id="CVE-2015-4620" title="Bind: Abort Dos Caused By Uninitialized Value Use In Isselfsigned()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1471" id="RHSA-2015:1471-1" title="Rhsa-2015:1471-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1237258" id="1237258" title="Bind: Abort Dos Caused By Uninitialized Value Use In Isselfsigned()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1482-1</id><title>Libuser</title><description>Two flaws were found in the way the libuser library handled the /etc/passwd file. A local attacker could use an application compiled against libuser (for example, userhelper) to manipulate the /etc/passwd file, which could result in a denial of service or possibly allow the attacker to escalate their privileges to root. (CVE-2015-3245, CVE-2015-3246)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libuser-python" release="8.el6_7" src="libuser-0.56.13-8.el6_7.src.rpm" version="0.56.13"><filename>libuser-python-0.56.13-8.el6_7.x86_64.rpm</filename><sum type="sha256">15da2c9475449e7f927ea0c509d424e020a6b51df32ed068ac7bf3ebc53d9fb1</sum></package><package arch="i686" name="libuser-devel" release="8.el6_7" src="libuser-0.56.13-8.el6_7.src.rpm" version="0.56.13"><filename>libuser-devel-0.56.13-8.el6_7.i686.rpm</filename><sum type="sha256">396d7c1e88fbbde67fdb51da92aa5f073b4b684341c1985a583f459d4d74aaac</sum></package><package arch="i686" name="libuser" release="8.el6_7" src="libuser-0.56.13-8.el6_7.src.rpm" version="0.56.13"><filename>libuser-0.56.13-8.el6_7.i686.rpm</filename><sum type="sha256">9f48b004098e617510e0b1de10df67f61106388ab810ec5fc230717159c65818</sum></package><package arch="x86_64" name="libuser" release="8.el6_7" src="libuser-0.56.13-8.el6_7.src.rpm" version="0.56.13"><filename>libuser-0.56.13-8.el6_7.x86_64.rpm</filename><sum type="sha256">42a943612c05d18de4cbcee23f32b7a4b3abd8e9b5a61291e585aa0d7d55e842</sum></package><package arch="x86_64" name="libuser-devel" release="8.el6_7" src="libuser-0.56.13-8.el6_7.src.rpm" version="0.56.13"><filename>libuser-devel-0.56.13-8.el6_7.x86_64.rpm</filename><sum type="sha256">fa0b7620b486ed394737a39a7f9b2d63e41786d2c3e7860ca43d06581c2144d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3245" id="CVE-2015-3245" title="Libuser Does Not Filter Newline Characters In The Gecos Field" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3246" id="CVE-2015-3246" title="Libuser: Security Flaw In Handling /Etc/Passwd File" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1482" id="RHSA-2015:1482-1" title="Rhsa-2015:1482-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233043" id="1233043" title="Libuser Does Not Filter Newline Characters In The Gecos Field" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233052" id="1233052" title="Libuser: Security Flaw In Handling /Etc/Passwd File" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1513-1</id><title>Bind</title><description>A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.2.x86_64.rpm</filename><sum type="sha256">f50c1b60249478a6ba2183a9c920f3e4a88c22d08d933cc1ef73fdf661b9d7a6</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.2.x86_64.rpm</filename><sum type="sha256">ea28861f140a450279b5500ff7f382a11b8b15a2cc5067f1fd56f614b7943933</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.37.rc1.el6_7.2.x86_64.rpm</filename><sum type="sha256">c826a7d615f258d6f2593ed962bf5a005cbf5c2f6ba6b97d18c6e1f284decec9</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.37.rc1.el6_7.2.x86_64.rpm</filename><sum type="sha256">2dc4ae78b926af7439907d6fb9409b2a32d4a339648b9e64692c7e6d10ae16e7</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.37.rc1.el6_7.2.x86_64.rpm</filename><sum type="sha256">b8076b6dbee4c8431af45e6586ace97a838226c70235923d6333335097087233</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.2.i686.rpm</filename><sum type="sha256">2c78eda06f3f11997551a1496c8cf1ce6a42a1d849bf63864e425283379ed69c</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.2.i686.rpm</filename><sum type="sha256">23b6d24ba5e508df74ded38bd71606fc2c89349ea64913da722f5ae814488c77</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.37.rc1.el6_7.2" src="bind-9.8.2-0.37.rc1.el6_7.2.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.37.rc1.el6_7.2.x86_64.rpm</filename><sum type="sha256">7c705f43139755f67279c46dc45bad9301840a653cda5337b863d9415b8ecb3a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" id="CVE-2015-5477" title="Bind: Tkey Query Handling Flaw Leading To Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1513" id="RHSA-2015:1513-1" title="Rhsa-2015:1513-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247361" id="1247361" title="Bind: Tkey Query Handling Flaw Leading To Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1526-1</id><title>Java-1.6.0-Openjdk</title><description>Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) 
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) 
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) 
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) 
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000) 
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) 
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) 
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.8.1.el6_7" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm</filename><sum type="sha256">671210fa6f2b4b694497e7984825e84fe469a1c1b4edaa32ce10909c474b1a65</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.8.1.el6_7" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm</filename><sum type="sha256">e8cc2e3b40e247d29e3d98fdeefaa3d19fad79f787ff8a5db5c1bc41ed2ce858</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.8.1.el6_7" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm</filename><sum type="sha256">d341c068b6630cfa7bd52f83a7330339fa8a8c43ddd262f15b362bef7a28efac</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.8.1.el6_7" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm</filename><sum type="sha256">ff85625b36258bb1ebabe2ece6cc6ea26112d525a6917135d385ae22d7c92d50</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.8.1.el6_7" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el6_7.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el6_7.x86_64.rpm</filename><sum type="sha256">ef5d0279ddb1d7814c78b36cf009a015948f05f4dbb5547f521a66dcb0afb42c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" id="CVE-2015-2590" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" id="CVE-2015-2601" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" id="CVE-2015-2621" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" id="CVE-2015-2625" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" id="CVE-2015-2628" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" id="CVE-2015-2632" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" id="CVE-2015-2808" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" id="CVE-2015-4731" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" id="CVE-2015-4732" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" id="CVE-2015-4733" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" id="CVE-2015-4748" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" id="CVE-2015-4749" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" id="CVE-2015-4760" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1526" id="RHSA-2015:1526-1" title="Rhsa-2015:1526-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207101" id="1207101" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241965" id="1241965" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242019" id="1242019" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242232" id="1242232" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242234" id="1242234" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242240" id="1242240" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242275" id="1242275" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242281" id="1242281" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242372" id="1242372" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242379" id="1242379" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242394" id="1242394" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242447" id="1242447" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243139" id="1243139" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1581-1</id><title>Firefox</title><description>A flaw was discovered in Mozilla Firefox that could be used to violate the same-origin policy and inject web script into a non-privileged part of the built-in PDF file viewer (PDF.js). An attacker could create a malicious web page that, when viewed by a victim, could steal arbitrary files (including private SSH keys, the /etc/passwd file, and other potentially sensitive files) from the system running Firefox. (CVE-2015-4495) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_7" src="firefox-38.1.1-1.el6_7.src.rpm" version="38.1.1"><filename>firefox-38.1.1-1.el6_7.i686.rpm</filename><sum type="sha256">82d1fdace438c6d140af17a8f87bbc3ab9ded8aa0c9cffa872c73709c4fab1d1</sum></package><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-38.1.1-1.el6_7.src.rpm" version="38.1.1"><filename>firefox-38.1.1-1.el6_7.x86_64.rpm</filename><sum type="sha256">ec6754b2819ad349be5b3dceb55b05c0f3cd2ce973e9801d36e95c4deba71ebf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" id="CVE-2015-4495" title="Mozilla: Same Origin Violation And Local File Stealing Via Pdf Reader (Mfsa 2015-78)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1581" id="RHSA-2015:1581-1" title="Rhsa-2015:1581-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1251318" id="1251318" title="Mozilla: Same Origin Violation And Local File Stealing Via Pdf Reader (Mfsa 2015-78)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1586-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4473, CVE-2015-4475, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4493, CVE-2015-4484, CVE-2015-4491, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4492) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-08-18 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="4.el6_7" src="firefox-38.2.0-4.el6_7.src.rpm" version="38.2.0"><filename>firefox-38.2.0-4.el6_7.x86_64.rpm</filename><sum type="sha256">666c2dc2f403a59b538b1ba18f573bc06532bc261d6c8d7c8ad9221ec6188219</sum></package><package arch="i686" name="firefox" release="4.el6_7" src="firefox-38.2.0-4.el6_7.src.rpm" version="38.2.0"><filename>firefox-38.2.0-4.el6_7.i686.rpm</filename><sum type="sha256">48fdbdf8e4d14df086d299390ed8b63a1dd9fb70e0cb2bbe42289e4c4a1b61ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" id="CVE-2015-4473" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" id="CVE-2015-4475" title="Mozilla: Out-Of-Bounds Read With Malformed Mp3 File (Mfsa 2015-80)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" id="CVE-2015-4478" title="Mozilla: Redefinition Of Non-Configurable Javascript Object Properties (Mfsa 2015-82)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" id="CVE-2015-4479" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480" id="CVE-2015-4480" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" id="CVE-2015-4484" title="Mozilla: Crash When Using Shared Memory In Javascript (Mfsa 2015-87)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" id="CVE-2015-4485" title="Mozilla: Buffer Overflows On Libvpx When Decoding Webm Video (Mfsa 2015-89)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" id="CVE-2015-4486" title="Mozilla: Buffer Overflows On Libvpx When Decoding Webm Video (Mfsa 2015-89)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" id="CVE-2015-4487" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" id="CVE-2015-4488" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" id="CVE-2015-4489" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" id="CVE-2015-4491" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" id="CVE-2015-4492" title="Mozilla: Use-After-Free In Xmlhttprequest With Shared Workers (Mfsa 2015-92)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493" id="CVE-2015-4493" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1586" id="RHSA-2015:1586-1" title="Rhsa-2015:1586-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252271" id="1252271" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252276" id="1252276" title="Mozilla: Out-Of-Bounds Read With Malformed Mp3 File (Mfsa 2015-80)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252282" id="1252282" title="Mozilla: Redefinition Of Non-Configurable Javascript Object Properties (Mfsa 2015-82)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252285" id="1252285" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252289" id="1252289" title="Mozilla: Crash When Using Shared Memory In Javascript (Mfsa 2015-87)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252290" id="1252290" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252292" id="1252292" title="Mozilla: Buffer Overflows On Libvpx When Decoding Webm Video (Mfsa 2015-89)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252293" id="1252293" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252295" id="1252295" title="Mozilla: Use-After-Free In Xmlhttprequest With Shared Workers (Mfsa 2015-92)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1623-1</id><title>Kernel</title><description>Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) 
This update also fixes the following bugs: 
* When removing a directory, and a reference was held to that directory by a reference to a negative child dentry, the directory dentry was previously not killed. In addition, once the negative child dentry was killed, an unlinked and unused dentry was present in the cache. As a consequence, deadlock could be caused by forcing the dentry eviction while the file system in question was frozen. With this update, all unused dentries are unhashed and evicted just after a successful directory removal, which avoids the deadlock, and the system no longer hangs in the aforementioned scenario. 
* Due to the broken s_umount lock ordering, a race condition occurred when an unlinked file was closed and the sync (or syncfs) utility was run at the same time. As a consequence, deadlock occurred on a frozen file system between sync and a process trying to unfreeze the file system. With this update, sync (or syncfs) is skipped on a frozen file system, and deadlock no longer occurs in the aforementioned situation. 
* Previously, in the scenario when a file was opened by file handle (fhandle) with its dentry not present in dcache ("cold dcache") and then making use of the unlink() and close() functions, the inode was not freed upon the close() system call. As a consequence, the iput() final was delayed indefinitely. A patch has been provided to fix this bug, and the inode is now freed as expected. 
* Due to a corrupted Executable and Linkable Format (ELF) header in the /proc/vmcore file, the kdump utility failed to provide any information. The underlying source code has been patched, and kdump now provides debuging information for kernel crashes as intended. 
* Previously, running the multipath request queue caused regressions in cases where paths failed regularly under I/O load. This regression manifested as I/O stalls that exceeded 300 seconds. This update reverts the changes aimed to reduce running the multipath request queue resulting in I/O stalls completing in a timely manner. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-18 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">a6ab6fab4f58fc5c0241fee8c1c110241fb23c2d7100644adf7cb3822ca6493a</sum></package><package arch="x86_64" name="kernel-debug" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">7e497b00453d8257dad218635e461c02ad1c032302d14ff499442cded796b586</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.3.1.el6.noarch.rpm</filename><sum type="sha256">d75e2f8afe1966ebe8b9ff35f2de4576d041a02259d0281ec114a187b27a5640</sum></package><package arch="x86_64" name="perf" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">d883523c1e440b3ab714155ddbe780afd58c4f4286f77c1e91147f012f1f3082</sum></package><package arch="noarch" name="kernel-doc" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.3.1.el6.noarch.rpm</filename><sum type="sha256">94055d578420fd899d7bb813a69496015a2c0189a31842569ab7402708efeb33</sum></package><package arch="noarch" name="kernel-firmware" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.3.1.el6.noarch.rpm</filename><sum type="sha256">0f53c136b1cfae20234794b2e6b2ec9f9f1fa4246669e842eed2d13f24ca7ff0</sum></package><package arch="x86_64" name="kernel" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">c3f51d7009160de260bc86bf45b29332aad709f55b5f85de03b84d92951ef920</sum></package><package arch="x86_64" name="python-perf" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">976ee08f2d3b2ab224d72f65b371e111965dbb459af37e3612925de19b1c8a27</sum></package><package arch="x86_64" name="kernel-headers" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">2971189e04e322f09f3779b6d1698d579028b0fb90566ee6b6687c6f4cdbde6f</sum></package><package arch="x86_64" name="kernel-devel" release="573.3.1.el6" src="kernel-2.6.32-573.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.3.1.el6.x86_64.rpm</filename><sum type="sha256">3bc21ae433e44cb183bb5d157612d71918665603036fdf31409812e731ea49e1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" id="CVE-2015-5364" title="Kernel: Net: Incorrect Processing Of Checksums In Udp Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" id="CVE-2015-5366" title="Kernel: Net: Incorrect Processing Of Checksums In Udp Implementation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1623" id="RHSA-2015:1623-1" title="Rhsa-2015:1623-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1239029" id="1239029" title="Kernel: Net: Incorrect Processing Of Checksums In Udp Implementation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1633-1</id><title>Subversion</title><description>An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) 
It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) 
It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) 
After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="subversion-devel" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-devel-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">87772b400f1cd87c3215fb95c97b092f8bee9bbcfd658b8d588f60d16a9bfebc</sum></package><package arch="x86_64" name="subversion-ruby" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-ruby-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">463923b7d34143195fbeb6ac1e6f176ccb3980bdfb50ae64df76d826b88d9d41</sum></package><package arch="i686" name="subversion-gnome" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-gnome-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">faadcaa10a13ce7b8a4fc38c43f1c7ff8dbe3f0ff21b6185447ed0d3faf2efaa</sum></package><package arch="x86_64" name="mod_dav_svn" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>mod_dav_svn-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">344731102a40c279eb6f6a3643f5e34b482f55df88202b797877dd87b6e5fbaf</sum></package><package arch="i686" name="subversion-devel" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-devel-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">94e2fa44fe5d531a9d4a94069202fdf65bb5433fd34b6df065332ad88f031e84</sum></package><package arch="i686" name="subversion-ruby" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-ruby-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">f68693cfdd7bf241b8e4c468ff65a5837fcf1bbeeb43879b1b4145140e60076d</sum></package><package arch="i686" name="subversion-javahl" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-javahl-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">94c5d919dd8ff6a62a733b98e2ce9c047b167c07d92882a80906c0fede604fc1</sum></package><package arch="x86_64" name="subversion-kde" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-kde-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">6e3fdafc0ae12fb9fa72e6cec489390d01af0c0e7c337720b1362253b8228b42</sum></package><package arch="x86_64" name="subversion-javahl" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-javahl-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">36db56e37de1168b8dc366571865a473256c4a0d1ccb7d6acbd51a245ec8070a</sum></package><package arch="x86_64" name="subversion-perl" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-perl-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">fa50460c04a77cb1b6ede49c9292f862057386ff6f0cc868ef437dfdcad0a4b0</sum></package><package arch="i686" name="subversion" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">4eabf58461a19f464e6b546535a882b40ba42585e04fa88f67a964032e2d7f2c</sum></package><package arch="x86_64" name="subversion" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">5e298b2a42b46cc9f47c51b167c77098d861881702b91a8ffc174c91b33e1237</sum></package><package arch="x86_64" name="subversion-gnome" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-gnome-1.6.11-15.el6_7.x86_64.rpm</filename><sum type="sha256">2fa3efb5fa7e430a73378e783ce839373f3c55db11d6b965a308af7754e5129d</sum></package><package arch="i686" name="subversion-perl" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-perl-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">131ae904d82887363912a7e1b6328eac85db8126acf7e5536a453d4eb019412c</sum></package><package arch="i686" name="subversion-kde" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-kde-1.6.11-15.el6_7.i686.rpm</filename><sum type="sha256">05081f17470327038d5a8be20af6455c743ccb344e4daf6045db24c0db6549e4</sum></package><package arch="noarch" name="subversion-svn2cl" release="15.el6_7" src="subversion-1.6.11-15.el6_7.src.rpm" version="1.6.11"><filename>subversion-svn2cl-1.6.11-15.el6_7.noarch.rpm</filename><sum type="sha256">bf6c67ea20a40fed4d4cc42e3c9425b988094887041d04d182af8520b673e4ec</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0248" id="CVE-2015-0248" title="Subversion: (Mod_Dav_Svn) Remote Denial Of Service With Certain Requests With Dynamically Evaluated Revision Numbers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0251" id="CVE-2015-0251" title="Subversion: (Mod_Dav_Svn) Spoofing Svn:Author Property Values For New Revisions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3187" id="CVE-2015-3187" title="Subversion: Svn_Repos_Trace_Node_Locations() Reveals Paths Hidden By Authz" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1633" id="RHSA-2015:1633-1" title="Rhsa-2015:1633-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1205138" id="1205138" title="Subversion: (Mod_Dav_Svn) Remote Denial Of Service With Certain Requests With Dynamically Evaluated Revision Numbers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1205140" id="1205140" title="Subversion: (Mod_Dav_Svn) Spoofing Svn:Author Property Values For New Revisions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247252" id="1247252" title="Subversion: Svn_Repos_Trace_Node_Locations() Reveals Paths Hidden By Authz" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1634-1</id><title>Sqlite</title><description>It was found that SQLite's sqlite3VXPrintf() function did not properly handle precision and width values during floating-point conversions. A local attacker could submit a specially crafted SELECT statement that would crash the SQLite process, or have other unspecified impacts. (CVE-2015-3416)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="sqlite" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>sqlite-3.6.20-1.el6_7.2.i686.rpm</filename><sum type="sha256">b7ef1c45963f5fe8845e58cec3b3510e56524f056e7e39e43a6d949106839b2d</sum></package><package arch="x86_64" name="sqlite-tcl" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>sqlite-tcl-3.6.20-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">bf86d1b2037b754d44fb4115188095bce3cfe9a77979a195fe4ee4b57bd9540f</sum></package><package arch="x86_64" name="sqlite" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>sqlite-3.6.20-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">a6952d237a98f9b6f1e3be45732c4e46b107b90a22f84706ce87cf4608bbffe4</sum></package><package arch="i686" name="sqlite-devel" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>sqlite-devel-3.6.20-1.el6_7.2.i686.rpm</filename><sum type="sha256">8379d4e61eaf37c06505ece543cb7ef01ddebd386f3d93ecb9ac27b0ff0bfbed</sum></package><package arch="x86_64" name="sqlite-devel" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>sqlite-devel-3.6.20-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">cd53ab69ae4c46c8c7650a257857485673669cddff424cef6e68816cabeb8a51</sum></package><package arch="x86_64" name="sqlite-doc" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>sqlite-doc-3.6.20-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">0c4e9a5428e2a1669eb1a1722029729c25e8bcd6f4e3886bd48b01bbe84a510c</sum></package><package arch="x86_64" name="lemon" release="1.el6_7.2" src="sqlite-3.6.20-1.el6_7.2.src.rpm" version="3.6.20"><filename>lemon-3.6.20-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">79da6c983ca06c649f598e2838531aa2609a2866a5b6dce5437f92eb74780583</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" id="CVE-2015-3416" title="Sqlite: Stack Buffer Overflow In Src/Printf.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1634" id="RHSA-2015:1634-1" title="Rhsa-2015:1634-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212357" id="1212357" title="Sqlite: Stack Buffer Overflow In Src/Printf.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1636-1</id><title>Net-Snmp</title><description>It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd. (CVE-2015-5621)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="1" name="net-snmp-devel" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-54.el6_7.1.i686.rpm</filename><sum type="sha256">65851eadb0c449d4ba8576fc6a3b0dc194cfa84548d856a619fbe72818845a8a</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-5.5-54.el6_7.1.x86_64.rpm</filename><sum type="sha256">70f9e7b26dbbb6bde09f624271d0bb2688ec55d57b254eda73d3066d3851e1ab</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-54.el6_7.1.x86_64.rpm</filename><sum type="sha256">46b26c94eb411d16b32689fbc536350e182d61813aaf4f73f3d21ba4235e9729</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-utils-5.5-54.el6_7.1.x86_64.rpm</filename><sum type="sha256">4cebccdad1e9c709e0fc37bf4b6d4edd9273b5d9f5f47034d5b1386b02e9dd18</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-perl-5.5-54.el6_7.1.x86_64.rpm</filename><sum type="sha256">cb92e7ad2425bd5e35199ac3ecbc8bdb5e46c40d9392b6a4ecc2022871c662a4</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-54.el6_7.1.x86_64.rpm</filename><sum type="sha256">5568d904356870954d3080198c53030d3643476cf95ad9d95f2e55b44589b175</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-54.el6_7.1.i686.rpm</filename><sum type="sha256">de85cf7186b6bf46b6eb5b4b9645ca0a64b4afe6fa0d749842cc8709ecb28e05</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="54.el6_7.1" src="net-snmp-5.5-54.el6_7.1.src.rpm" version="5.5"><filename>net-snmp-python-5.5-54.el6_7.1.x86_64.rpm</filename><sum type="sha256">51bac06f58067584831e92566d7129b91458a44b0be797195fb004c6b4f67e30</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" id="CVE-2015-5621" title="Net-Snmp: Snmp_Pdu_Parse() Incompletely Parsed Varbinds Left In List Of Variables" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1636" id="RHSA-2015:1636-1" title="Rhsa-2015:1636-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212408" id="1212408" title="Net-Snmp: Snmp_Pdu_Parse() Incompletely Parsed Varbinds Left In List Of Variables" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1640-1</id><title>Pam</title><description>It was discovered that the _unix_run_helper_binary() function of PAM's unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system. (CVE-2015-3238)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pam-devel" release="20.el6_7.1" src="pam-1.1.1-20.el6_7.1.src.rpm" version="1.1.1"><filename>pam-devel-1.1.1-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">d68e6856f1791ece6ff01f71998e333a1c423dbcb66f25d13887d1b36b437bf5</sum></package><package arch="x86_64" name="pam" release="20.el6_7.1" src="pam-1.1.1-20.el6_7.1.src.rpm" version="1.1.1"><filename>pam-1.1.1-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">0dd7699b1525e9450f06365368c858f749d03e1071f9ea7b6e0b0bd918b7a4a2</sum></package><package arch="i686" name="pam" release="20.el6_7.1" src="pam-1.1.1-20.el6_7.1.src.rpm" version="1.1.1"><filename>pam-1.1.1-20.el6_7.1.i686.rpm</filename><sum type="sha256">d1621b55e1e8e9d42f2331b521cb4efa2120ed41db2cb89632b091c7b3878036</sum></package><package arch="i686" name="pam-devel" release="20.el6_7.1" src="pam-1.1.1-20.el6_7.1.src.rpm" version="1.1.1"><filename>pam-devel-1.1.1-20.el6_7.1.i686.rpm</filename><sum type="sha256">1e137fbc41346a6c72269cebe67940b36b1bbdf81329e9ab222807f7e0f4f7d1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238" id="CVE-2015-3238" title="Pam: Dos/User Enumeration Due To Blocking Pipe In Pam_Unix Module" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1640" id="RHSA-2015:1640-1" title="Rhsa-2015:1640-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228571" id="1228571" title="Pam: Dos/User Enumeration Due To Blocking Pipe In Pam_Unix Module" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1668-1</id><title>Httpd</title><description>Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183) 
After installing the updated packages, the httpd service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-09-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="httpd-manual" release="47.sl6" src="httpd-2.2.15-47.sl6.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-47.sl6.noarch.rpm</filename><sum type="sha256">18db703d8732e0e731ca18a752b62768a70410426cdf075d0a5806ba7e02a69d</sum></package><package arch="x86_64" name="httpd-devel" release="47.sl6" src="httpd-2.2.15-47.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.x86_64.rpm</filename><sum type="sha256">d3e955bf30e18f6e271e43f1ac2163d1f9276c40316124b2c80665cca6d14831</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="47.sl6" src="httpd-2.2.15-47.sl6.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-47.sl6.x86_64.rpm</filename><sum type="sha256">e7ba040817ca39a2687a7f6b6f2cb912df14b6c28edb53c215f018c0790980fe</sum></package><package arch="x86_64" name="httpd" release="47.sl6" src="httpd-2.2.15-47.sl6.src.rpm" version="2.2.15"><filename>httpd-2.2.15-47.sl6.x86_64.rpm</filename><sum type="sha256">5ed164adfda7e90c3efe9bc818aaf1b8244592497a71a7448112d30056f0725a</sum></package><package arch="x86_64" name="httpd-tools" release="47.sl6" src="httpd-2.2.15-47.sl6.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-47.sl6.x86_64.rpm</filename><sum type="sha256">e6635363bb484307e91e49fd33a0e55898ca609bf81690b94885996bd392443e</sum></package><package arch="i686" name="httpd-devel" release="47.sl6" src="httpd-2.2.15-47.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.i686.rpm</filename><sum type="sha256">aaac898d26cc97615d43d3d28b7b32f8d1f7f377ef03bdf6f93e68a10e45382c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183" id="CVE-2015-3183" title="Httpd: Http Request Smuggling Attack Against Chunked Request Parser" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1668" id="RHSA-2015:1668-1" title="Rhsa-2015:1668-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243887" id="1243887" title="Httpd: Http Request Smuggling Attack Against Chunked Request Parser" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1682-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4473, CVE-2015-4491, CVE-2015-4487, CVE-2015-4488,  CVE-2015-4489) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-01 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="4.el6_7" src="thunderbird-38.2.0-4.el6_7.src.rpm" version="38.2.0"><filename>thunderbird-38.2.0-4.el6_7.x86_64.rpm</filename><sum type="sha256">ce9db15e71b9e00ac743aac8f13e01e7f06d1bbbabb906c677c83aa5e2a81276</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" id="CVE-2015-4473" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" id="CVE-2015-4487" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" id="CVE-2015-4488" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" id="CVE-2015-4489" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" id="CVE-2015-4491" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1682" id="RHSA-2015:1682-1" title="Rhsa-2015:1682-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252271" id="1252271" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252290" id="1252290" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252293" id="1252293" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1693-1</id><title>Firefox</title><description>A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4497) 
A flaw was found in the way Firefox handled installation of add-ons. An attacker could use this flaw to bypass the add-on installation prompt, and trick the user inso installing an add-on from a malicious source. (CVE-2015-4498) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-09-01 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-38.2.1-1.el6_7.src.rpm" version="38.2.1"><filename>firefox-38.2.1-1.el6_7.x86_64.rpm</filename><sum type="sha256">3f8fd4e059f5bf23e2613bc7ef40538bf4a0e1aea3690850068e218817946631</sum></package><package arch="i686" name="firefox" release="1.el6_7" src="firefox-38.2.1-1.el6_7.src.rpm" version="38.2.1"><filename>firefox-38.2.1-1.el6_7.i686.rpm</filename><sum type="sha256">a836363f257f09014d32234f687732a4c0f9e654036597302e3d89d34074b627</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" id="CVE-2015-4497" title="Mozilla: Use-After-Free When Resizing Canvas Element During Restyling (Mfsa 2015-94)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" id="CVE-2015-4498" title="Mozilla: Add-On Notification Bypass Through Data Urls (Mfsa 2015-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1693" id="RHSA-2015:1693-1" title="Rhsa-2015:1693-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257276" id="1257276" title="Mozilla: Use-After-Free When Resizing Canvas Element During Restyling (Mfsa 2015-94)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257278" id="1257278" title="Mozilla: Add-On Notification Bypass Through Data Urls (Mfsa 2015-95)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1694-1</id><title>Gdk-Pixbuf2</title><description>An integer overflow, leading to a heap-based buffer overflow, was found in the way gdk-pixbuf, an image loading library for GNOME, scaled certain bitmap format images. An attacker could use a specially crafted BMP image file that, when processed by an application compiled against the gdk- pixbuf library, would cause that application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2015-4491)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gdk-pixbuf2-devel" release="6.el6_7" src="gdk-pixbuf2-2.24.1-6.el6_7.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-devel-2.24.1-6.el6_7.i686.rpm</filename><sum type="sha256">b81de2e03e8c4620acde593ae42f5e73eb970a4aae8e229f80e3b17580295fd5</sum></package><package arch="x86_64" name="gdk-pixbuf2-devel" release="6.el6_7" src="gdk-pixbuf2-2.24.1-6.el6_7.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-devel-2.24.1-6.el6_7.x86_64.rpm</filename><sum type="sha256">0f1b5bebb2a5d386ddb0c4eb3850d06fd1a0bcae43dc3203f94936175a3912cf</sum></package><package arch="x86_64" name="gdk-pixbuf2" release="6.el6_7" src="gdk-pixbuf2-2.24.1-6.el6_7.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-2.24.1-6.el6_7.x86_64.rpm</filename><sum type="sha256">dc48773ab3d5dc8d1396f6e7c531ee37e75b46a8d0444b13969ce876697b1cfd</sum></package><package arch="i686" name="gdk-pixbuf2" release="6.el6_7" src="gdk-pixbuf2-2.24.1-6.el6_7.src.rpm" version="2.24.1"><filename>gdk-pixbuf2-2.24.1-6.el6_7.i686.rpm</filename><sum type="sha256">1189d54bcf65fb05f5854c6b9743c56db70605c403201ea9bd1e6c7062e9914a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" id="CVE-2015-4491" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1694" id="RHSA-2015:1694-1" title="Rhsa-2015:1694-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252290" id="1252290" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1695-1</id><title>Jakarta-Taglibs-Standard</title><description>It was found that the Java Standard Tag Library (JSTL) allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution. (CVE-2015-0254) 
Note: additional configuration may be required: 
This version uses JAXP&#8217;s FEATURE_SECURE_PROCESSING to restrict XML processing. Depending on the Java runtime version in use. Java8: External entity access is automatically disabled if a        SecurityManager is active. Java7: JAXP properties may need to be used to disable external access.        See http://docs.oracle.com/javase/tutorial/jaxp/properties/properties.html Java6 and earlier:      A new system property org.apache.taglibs.standard.xml.accessExternalEntity may     be used to specify the protocols that can be used to access external     entities. This defaults to &#8220;all&#8221; if no SecurityManager is present and     to &#8220;&#8221; (thereby disabling access) if a SecurityManager is detected.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="jakarta-taglibs-standard" release="11.7.el6_7" src="jakarta-taglibs-standard-1.1.1-11.7.el6_7.src.rpm" version="1.1.1"><filename>jakarta-taglibs-standard-1.1.1-11.7.el6_7.noarch.rpm</filename><sum type="sha256">616756046fea79357db5b9ba7e6a051150d4ee156efe210276201ee5c7eb0655</sum></package><package arch="noarch" name="jakarta-taglibs-standard-javadoc" release="11.7.el6_7" src="jakarta-taglibs-standard-1.1.1-11.7.el6_7.src.rpm" version="1.1.1"><filename>jakarta-taglibs-standard-javadoc-1.1.1-11.7.el6_7.noarch.rpm</filename><sum type="sha256">2223007eea20c9e2aac11d95dfee25fd5a103878f6b3d7131ea271922ed4c8d8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254" id="CVE-2015-0254" title="Jakarta-Taglibs-Standard: Xxe And Rce Via Xsl Extension In Jstl Xml Tags" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1695" id="RHSA-2015:1695-1" title="Rhsa-2015:1695-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198606" id="1198606" title="Jakarta-Taglibs-Standard: Xxe And Rce Via Xsl Extension In Jstl Xml Tags" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1699-1</id><title>Nss-Softokn</title><description>A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-softokn-freebl" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm</filename><sum type="sha256">4708139ddf6d3afb16125be2f6720086b662b2c8b99dda1f838be724d95dcaea</sum></package><package arch="x86_64" name="nss-softokn" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-23.el6_7.x86_64.rpm</filename><sum type="sha256">7af12e27ae9f659470ead1b9936028eae1681fb6cbaf901797e778138ba61e7f</sum></package><package arch="x86_64" name="nss-softokn-devel" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-23.el6_7.x86_64.rpm</filename><sum type="sha256">09e6ed56b998a0b3bca629b54ae2fd0b182f099dc157087dcf79657b8130c5c2</sum></package><package arch="i686" name="nss-softokn-devel" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-23.el6_7.i686.rpm</filename><sum type="sha256">5bad8326dbacdc0e00c4598fed0472660a16616085ade853ab7966a7b3e02144</sum></package><package arch="i686" name="nss-softokn" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-23.el6_7.i686.rpm</filename><sum type="sha256">edba8e85df8c9badc0f106b54aa56f0b9ad5bf260900a0aacd20546150eb9a40</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-23.el6_7.x86_64.rpm</filename><sum type="sha256">ac73ea8f4487ff7d127c9e62858115caa8163391dd0a8f09166cd308642d9432</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-23.el6_7.x86_64.rpm</filename><sum type="sha256">6621f38c2bb3115df8c32d67d90f603909743b7f810c740373a143915dea8862</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="23.el6_7" src="nss-softokn-3.14.3-23.el6_7.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-23.el6_7.i686.rpm</filename><sum type="sha256">fdc3eb7a853448f5eaac64424577997a1a4b3bd1553a15020292e51fd21fdfe3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" id="CVE-2015-2730" title="Nss: Ecdsa Signature Validation Fails To Handle " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1699" id="RHSA-2015:1699-1" title="Rhsa-2015:1699-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236954" id="1236954" title="Nss: Ecdsa Signature Validation Fails To Handle " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1700-1</id><title>Pcs</title><description>A command injection flaw was found in the pcsd web UI. An attacker able to trick a victim that was logged in to the pcsd web UI into visiting a specially crafted URL could use this flaw to execute arbitrary code with root privileges on the server hosting the web UI. (CVE-2015-5190) 
A race condition was found in the way the pcsd web UI backend performed authorization of user requests. An attacker could use this flaw to send a request that would be evaluated as originating from a different user, potentially allowing the attacker to perform actions with permissions of a more privileged user. (CVE-2015-5189)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pcs" release="9.el6_7.1" src="pcs-0.9.139-9.el6_7.1.src.rpm" version="0.9.139"><filename>pcs-0.9.139-9.el6_7.1.x86_64.rpm</filename><sum type="sha256">bd6038e13d2c9aee0413d9e6ae526dc8d3ac473fbaaad38dae4faf850a7c299d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5189" id="CVE-2015-5189" title="Pcs: Incorrect Authorization When Using Pcs Web Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5190" id="CVE-2015-5190" title="Pcs: Command Injection With Root Privileges." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1700" id="RHSA-2015:1700-1" title="Rhsa-2015:1700-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252805" id="1252805" title="Pcs: Incorrect Authorization When Using Pcs Web Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252813" id="1252813" title="Pcs: Command Injection With Root Privileges." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1705-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-sdb" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm</filename><sum type="sha256">dcf95f701a783eee3d68aef9699ce5ad7dd8ac258cd10c200f858371b8c75760</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.4.i686.rpm</filename><sum type="sha256">ba412205dd4629e97172ed1ab51459411be4933c4f99d5b4842a4621b6d6ab1e</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm</filename><sum type="sha256">8d5c462aadde106461c476dec6b47cf4790a305a34850171d501bacb4633baf2</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm</filename><sum type="sha256">f441bf9e7d946a5a3ace56f9b243b634476b2aed2cd8bcdd6cee8d0f9889d94c</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm</filename><sum type="sha256">1e4c5ebe1ae6bcf59078f8646a72790fc2a96dc265e99f18258b93f4dbec7b87</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm</filename><sum type="sha256">9a2883b18118d068641f090a2c6bac18f1078383cd5dc3da41d421d71e11c9f7</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.37.rc1.el6_7.4.x86_64.rpm</filename><sum type="sha256">4e3521b63c2545f4b0dab154b19e7d65492664cd9af379021cf7e8ef8e8aaf55</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.4" src="bind-9.8.2-0.37.rc1.el6_7.4.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.4.i686.rpm</filename><sum type="sha256">060e2b7fd6ffc15cd25d09e3320b10338509a878f76ae1c89ca6dc81dcfa1810</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" id="CVE-2015-5722" title="Bind: Malformed Dnssec Key Failed Assertion Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1705" id="RHSA-2015:1705-1" title="Rhsa-2015:1705-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259087" id="1259087" title="Bind: Malformed Dnssec Key Failed Assertion Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1708-1</id><title>Libxfont</title><description>An integer overflow flaw was found in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1802) 
An integer truncation flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1804) 
A NULL pointer dereference flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server. (CVE-2015-1803)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libXfont-devel" release="5.el6_7" src="libXfont-1.4.5-5.el6_7.src.rpm" version="1.4.5"><filename>libXfont-devel-1.4.5-5.el6_7.i686.rpm</filename><sum type="sha256">935ad069f19cbedcf487a8364025bd3a5fd5f2858cb676668bd496883dfb3699</sum></package><package arch="i686" name="libXfont" release="5.el6_7" src="libXfont-1.4.5-5.el6_7.src.rpm" version="1.4.5"><filename>libXfont-1.4.5-5.el6_7.i686.rpm</filename><sum type="sha256">ea16a0f758e29ce196048ab0327551c67d7aa517391a6db4063e35020e645893</sum></package><package arch="x86_64" name="libXfont" release="5.el6_7" src="libXfont-1.4.5-5.el6_7.src.rpm" version="1.4.5"><filename>libXfont-1.4.5-5.el6_7.x86_64.rpm</filename><sum type="sha256">d82370b35c2df7fc4a4aea8800cc5c19d51fc694a0d8a254bdc1415da112ed3d</sum></package><package arch="x86_64" name="libXfont-devel" release="5.el6_7" src="libXfont-1.4.5-5.el6_7.src.rpm" version="1.4.5"><filename>libXfont-devel-1.4.5-5.el6_7.x86_64.rpm</filename><sum type="sha256">eac4431375f9d3efac66596531fb56c5a7d87bdf8ed34b49e81e7d9f8a37f8f3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" id="CVE-2015-1802" title="Libxfont: Missing Range Check In Bdfreadproperties" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" id="CVE-2015-1803" title="Libxfont: Crash On Invalid Read In Bdfreadcharacters" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" id="CVE-2015-1804" title="Libxfont: Out-Of-Bounds Memory Access In Bdfreadcharacters" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1708" id="RHSA-2015:1708-1" title="Rhsa-2015:1708-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203715" id="1203715" title="Libxfont: Missing Range Check In Bdfreadproperties" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203718" id="1203718" title="Libxfont: Crash On Invalid Read In Bdfreadcharacters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203719" id="1203719" title="Libxfont: Out-Of-Bounds Memory Access In Bdfreadcharacters" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1715-1</id><title>Spice-Server</title><description>A race condition flaw, leading to a heap-based memory corruption, was found in spice's worker_update_monitors_config() function, which runs under the QEMU-KVM context on the host. A user in a guest could leverage this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-3247)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="12.el6_7.1" src="spice-server-0.12.4-12.el6_7.1.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-12.el6_7.1.x86_64.rpm</filename><sum type="sha256">bba49019afc159aa781111818adca14574f6453e7abe1089e1b16b445527030a</sum></package><package arch="x86_64" name="spice-server" release="12.el6_7.1" src="spice-server-0.12.4-12.el6_7.1.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-12.el6_7.1.x86_64.rpm</filename><sum type="sha256">72faa02abe590d632fadc3f34e6411157624ea4bba0c2d4783b0350608f1aa57</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" id="CVE-2015-3247" title="Spice: Memory Corruption In Worker_Update_Monitors_Config()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1715" id="RHSA-2015:1715-1" title="Rhsa-2015:1715-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233238" id="1233238" title="Spice: Memory Corruption In Worker_Update_Monitors_Config()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1741-1</id><title>Haproxy</title><description>An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session. (CVE-2015-3281)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="haproxy" release="2.el6_7.1" src="haproxy-1.5.4-2.el6_7.1.src.rpm" version="1.5.4"><filename>haproxy-1.5.4-2.el6_7.1.x86_64.rpm</filename><sum type="sha256">a3f7431c0f5ffe1c81f26eb7f1cdbd2395868cf75ef3bb2979104211001991c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3281" id="CVE-2015-3281" title="Haproxy: Information Leak In Buffer_Slow_Realign()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1741" id="RHSA-2015:1741-1" title="Rhsa-2015:1741-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1239072" id="1239072" title="Haproxy: Information Leak In Buffer_Slow_Realign()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1833-1</id><title>Qemu-Kvm</title><description>An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory. (CVE-2015-5165) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.479.el6_7.1" src="qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.479.el6_7.1.x86_64.rpm</filename><sum type="sha256">53d1adeaacd31b087a70372c466a14815e89d63543f1964a58aba855f3011d51</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.479.el6_7.1" src="qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.479.el6_7.1.x86_64.rpm</filename><sum type="sha256">6415bc35e8da09a441ec92e4f54fc1b46f4c0ec02ecd76d078ad1facb419d000</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.479.el6_7.1" src="qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.479.el6_7.1.x86_64.rpm</filename><sum type="sha256">e34078c51565323c6acd6f9670c25753d11fa5b89469cd779fadb46e2a3736ec</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.479.el6_7.1" src="qemu-kvm-0.12.1.2-2.479.el6_7.1.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.479.el6_7.1.x86_64.rpm</filename><sum type="sha256">68910fbb8c43979ea0f8dbfa30c868d096e22dd4f720da3991543306ff7e76d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" id="CVE-2015-5165" title="Qemu: Rtl8139 Uninitialized Heap Memory Information Leakage To Guest (Xsa-140)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1833" id="RHSA-2015:1833-1" title="Rhsa-2015:1833-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248760" id="1248760" title="Qemu: Rtl8139 Uninitialized Heap Memory Information Leakage To Guest (Xsa-140)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1834-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4510) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-09-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="2.el6_7" src="firefox-38.3.0-2.el6_7.src.rpm" version="38.3.0"><filename>firefox-38.3.0-2.el6_7.i686.rpm</filename><sum type="sha256">48e3de1a511f02c837038dc9526e4c56629253f4c0a6d0c93b09fbba45539735</sum></package><package arch="x86_64" name="firefox" release="2.el6_7" src="firefox-38.3.0-2.el6_7.src.rpm" version="38.3.0"><filename>firefox-38.3.0-2.el6_7.x86_64.rpm</filename><sum type="sha256">4f8509d2ddf20f070c5f03a078a2b4102d0713bca10bea602bcb003707a92788</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" id="CVE-2015-4500" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" id="CVE-2015-4509" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510" id="CVE-2015-4510" title="Mozilla: Use-After-Free With Shared Workers And Indexeddb (Mfsa 2015-104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1834" id="RHSA-2015:1834-1" title="Rhsa-2015:1834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265186" id="1265186" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265190" id="1265190" title="Mozilla: Use-After-Free With Shared Workers And Indexeddb (Mfsa 2015-104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265192" id="1265192" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1840-1</id><title>Openldap</title><description>A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openldap" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-2.4.40-6.el6_7.i686.rpm</filename><sum type="sha256">60dfd2a88c9f903ef9e55ba4b14ba0d50bd78a633c3cb09fd7b179286ec7ef74</sum></package><package arch="x86_64" name="openldap-clients" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-clients-2.4.40-6.el6_7.x86_64.rpm</filename><sum type="sha256">f6f089d8d78303f48ae1a38bbdab8ff0223fe8e06574441674c53215fd15248a</sum></package><package arch="x86_64" name="openldap-servers-sql" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-servers-sql-2.4.40-6.el6_7.x86_64.rpm</filename><sum type="sha256">27a98fda0654e232702017eff629670f31b771232e00990f19be42ed23dfd052</sum></package><package arch="x86_64" name="openldap" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-2.4.40-6.el6_7.x86_64.rpm</filename><sum type="sha256">e0a01e409064446b77350b5fa3d9ec3e6e018312e45bca7329eacd390830fb50</sum></package><package arch="i686" name="openldap-devel" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-devel-2.4.40-6.el6_7.i686.rpm</filename><sum type="sha256">334c4e10a7f8386124a37f0ab3fa55879a79216d5217b0fe5c7f552e94ba4e07</sum></package><package arch="x86_64" name="openldap-servers" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-servers-2.4.40-6.el6_7.x86_64.rpm</filename><sum type="sha256">bc5010f2f79eda2fdb84f7ee55d0de81062c14d3dce03a5a578822e731c19017</sum></package><package arch="x86_64" name="openldap-devel" release="6.el6_7" src="openldap-2.4.40-6.el6_7.src.rpm" version="2.4.40"><filename>openldap-devel-2.4.40-6.el6_7.x86_64.rpm</filename><sum type="sha256">61124c663c24cece58f2bbc93c1d695380c2c422f8949322a6b629fa98c57a2f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" id="CVE-2015-6908" title="Openldap: Ber_Get_Next Denial Of Service Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1840" id="RHSA-2015:1840-1" title="Rhsa-2015:1840-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262393" id="1262393" title="Openldap: Ber_Get_Next Denial Of Service Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1852-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180) 
Two information leak flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to disclose sensitive information or, in certain cases, crash. (CVE-2015-4519, CVE-2015-4520) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-06 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_7" src="thunderbird-38.3.0-1.el6_7.src.rpm" version="38.3.0"><filename>thunderbird-38.3.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">9174a0180ef8389c9a13134c087201382e564446a62761cfd8df7ccae07d13a1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" id="CVE-2015-4500" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" id="CVE-2015-4509" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" id="CVE-2015-4517" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" id="CVE-2015-4519" title="Mozilla: Dragging And Dropping Images Exposes Final Url After Redirects (Mfsa 2015-110)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" id="CVE-2015-4520" title="Mozilla: Errors In The Handling Of Cors Preflight Request Headers (Mfsa 2015-111)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" id="CVE-2015-4521" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" id="CVE-2015-4522" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" id="CVE-2015-7174" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" id="CVE-2015-7175" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" id="CVE-2015-7176" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" id="CVE-2015-7177" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" id="CVE-2015-7180" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1852" id="RHSA-2015:1852-1" title="Rhsa-2015:1852-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265186" id="1265186" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265192" id="1265192" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265778" id="1265778" title="Mozilla: Dragging And Dropping Images Exposes Final Url After Redirects (Mfsa 2015-110)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265781" id="1265781" title="Mozilla: Errors In The Handling Of Cors Preflight Request Headers (Mfsa 2015-111)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265784" id="1265784" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1889-1</id><title>Spice-Server</title><description>A heap-based buffer overflow flaw was found in the way SPICE handled certain guest QXL commands related to surface creation. A user in a guest could use this flaw to read and write arbitrary memory locations on the host. (CVE-2015-5261) 
A heap-based buffer overflow flaw was found in the way spice handled certain QXL commands related to the "surface_id" parameter. A user in a guest could use this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-5260)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="12.el6_7.3" src="spice-server-0.12.4-12.el6_7.3.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-12.el6_7.3.x86_64.rpm</filename><sum type="sha256">0feb6e84c93b6651d56c6e51515202f85d4fc46294b27d69781e43bbfdf819e2</sum></package><package arch="x86_64" name="spice-server" release="12.el6_7.3" src="spice-server-0.12.4-12.el6_7.3.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-12.el6_7.3.x86_64.rpm</filename><sum type="sha256">0add84933df5b7bfaa29687a13ebc77d2fe6cc356ee7ca0a603f1788b9094486</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" id="CVE-2015-5260" title="Spice: Insufficient Validation Of Surface_Id " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" id="CVE-2015-5261" title="Spice: Host Memory Access From Guest Using " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1889" id="RHSA-2015:1889-1" title="Rhsa-2015:1889-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260822" id="1260822" title="Spice: Insufficient Validation Of Surface_Id " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261889" id="1261889" title="Spice: Host Memory Access From Guest Using " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1917-1</id><title>Libwmf</title><description>It was discovered that libwmf did not correctly process certain WMF (Windows Metafiles) with embedded BMP images. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running the application. (CVE-2015-0848, CVE-2015-4588) 
It was discovered that libwmf did not properly process certain WMF files. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly exploit this flaw to cause a crash or execute arbitrary code with the privileges of the user running the application. (CVE-2015-4696) 
It was discovered that libwmf did not properly process certain WMF files. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly exploit this flaw to cause a crash. (CVE-2015-4695) 
After installing the update, all applications using libwmf must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libwmf-devel" release="25.el6_7" src="libwmf-0.2.8.4-25.el6_7.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-25.el6_7.x86_64.rpm</filename><sum type="sha256">1f005c47df796c6253bb682ee53fc0f8dd1d3df35e754da47e440e074ce0c7d0</sum></package><package arch="i686" name="libwmf-devel" release="25.el6_7" src="libwmf-0.2.8.4-25.el6_7.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-25.el6_7.i686.rpm</filename><sum type="sha256">c4dba2f81a41b70f008faf529729ad8851f85a8cc6bb06579131123762189379</sum></package><package arch="x86_64" name="libwmf" release="25.el6_7" src="libwmf-0.2.8.4-25.el6_7.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-25.el6_7.x86_64.rpm</filename><sum type="sha256">e50b9922e13920a5c121f356ab2ff69a528350fbe5e86613f29187c6fddf532d</sum></package><package arch="i686" name="libwmf" release="25.el6_7" src="libwmf-0.2.8.4-25.el6_7.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-25.el6_7.i686.rpm</filename><sum type="sha256">91e100060d6c7cb92dded33d39c9dd4787c5943dd59287a42cafae1214ab8c67</sum></package><package arch="i686" name="libwmf-lite" release="25.el6_7" src="libwmf-0.2.8.4-25.el6_7.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-25.el6_7.i686.rpm</filename><sum type="sha256">aabf8d04324a9ac5fd2f0e75a2628c23cdd6b1a750eef94c00048810f1ae4c30</sum></package><package arch="x86_64" name="libwmf-lite" release="25.el6_7" src="libwmf-0.2.8.4-25.el6_7.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-25.el6_7.x86_64.rpm</filename><sum type="sha256">75f6e45a916c7f8f7cf65c096208dde88be7d7749dfc584c455691847cd86fe8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848" id="CVE-2015-0848" title="Libwmf: Heap Overflow When Decoding Bmp Images" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588" id="CVE-2015-4588" title="Libwmf: Heap Overflow Within The Rle Decoding Of Embedded Bmp Images" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695" id="CVE-2015-4695" title="Libwmf: Heap Buffer Overread In Meta.H" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696" id="CVE-2015-4696" title="Libwmf: Use-After-Free Flaw In Meta.H" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1917" id="RHSA-2015:1917-1" title="Rhsa-2015:1917-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227243" id="1227243" title="Libwmf: Heap Overflow When Decoding Bmp Images" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1235665" id="1235665" title="Libwmf: Heap Buffer Overread In Meta.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1235669" id="1235669" title="Libwmf: Use-After-Free Flaw In Meta.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272993" id="1272993" title="Libwmf: Heap Overflow Within The Rle Decoding Of Embedded Bmp Images" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1919-1</id><title>Java-1.8.0-Openjdk</title><description>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) 
Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) 
A flaw was found in the way the Libraries component in OpenJDK handled certificate revocation lists (CRL). In certain cases, CRL checking code could fail to report a revoked certificate, causing the application to accept it as trusted. (CVE-2015-4868) 
It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) 
Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">65234931526fcdeaecdc26f6daea2c4ba9465985c26a15854574b582bf310515</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-devel-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">5b4b68a36a43a2ba4defb9ce5313a0666745a0b106c5b6d90a94e5e5e2e638f8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">f3d62242c398d2379510be5488ff690a1a8d0b239d676c149875cdfa03d5fbf1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-src-debug-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">6d6fa81cc3e0ce8f57c8b548c645995a946f3c5b6995cef495434c32123b7e07</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">baa25b95541a92d7658823c3161398389d998bde089329b62f34d3295501086e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-headless-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">da0c5951e8ea90d331af813a7fa75956227207fcc5a09245afa755940c1fc59d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">064fff270593f1b537039bf46d63713aa50dd20298211f1f29a6b3fe93a8fd59</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-demo-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">89de75f63ce02bec94b7c182fc18accfc485dcf4f6a08893a05b847d49b7ce72</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-debug-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">883f87432594cd9f359e98a5844619930254ff229a61a97bab9517a236f5ae06</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-javadoc-1.8.0.65-0.b17.el6_7.noarch.rpm</filename><sum type="sha256">9339a660eb9009e22c3dfccfeda888e8d003210a63f673d8f6421dd6e14c598a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b17.el6_7" src="java-1.8.0-openjdk-1.8.0.65-0.b17.el6_7.src.rpm" version="1.8.0.65"><filename>java-1.8.0-openjdk-src-1.8.0.65-0.b17.el6_7.x86_64.rpm</filename><sum type="sha256">2de60b7cff11a52d7de3422841fa75247f2cc8b803570af7d1b99cd96aea09c1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" id="CVE-2015-4734" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" id="CVE-2015-4803" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" id="CVE-2015-4805" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" id="CVE-2015-4806" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" id="CVE-2015-4835" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" id="CVE-2015-4840" title="Openjdk: Oob Access In Cms Code (2D, 8086092)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" id="CVE-2015-4842" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" id="CVE-2015-4843" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" id="CVE-2015-4844" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" id="CVE-2015-4860" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868" id="CVE-2015-4868" title="Openjdk: Crl Checking Flaw (Libraries, 8081744)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" id="CVE-2015-4872" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" id="CVE-2015-4881" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" id="CVE-2015-4882" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" id="CVE-2015-4883" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" id="CVE-2015-4893" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" id="CVE-2015-4903" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" id="CVE-2015-4911" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1919" id="RHSA-2015:1919-1" title="Rhsa-2015:1919-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233687" id="1233687" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273022" id="1273022" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273027" id="1273027" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273053" id="1273053" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273304" id="1273304" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273308" id="1273308" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273311" id="1273311" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273318" id="1273318" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273328" id="1273328" title="Openjdk: Crl Checking Flaw (Libraries, 8081744)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273338" id="1273338" title="Openjdk: Oob Access In Cms Code (2D, 8086092)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273414" id="1273414" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273425" id="1273425" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273430" id="1273430" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273496" id="1273496" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273637" id="1273637" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273638" id="1273638" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273645" id="1273645" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273734" id="1273734" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1920-1</id><title>Java-1.7.0-Openjdk</title><description>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) 
Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) 
It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) 
Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.2.2.el6_7" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.2.el6_7.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.2.el6_7.x86_64.rpm</filename><sum type="sha256">a48bf76e9dbd3666a418f718415588833b0196e0398410ab41fd23d9aa07fef7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.2.2.el6_7" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.2.el6_7.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.2.el6_7.x86_64.rpm</filename><sum type="sha256">0a4d305e03daea9235758f586a6e90a93185659311b55ab235833e598d093148</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.2.2.el6_7" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.2.el6_7.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-1.7.0.91-2.6.2.2.el6_7.x86_64.rpm</filename><sum type="sha256">dd9929b495ae40c9f0ee2b34bb0d89843c205dd177ac9aaadd28229edaf2e13f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.2.2.el6_7" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.2.el6_7.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-src-1.7.0.91-2.6.2.2.el6_7.x86_64.rpm</filename><sum type="sha256">b28f45ee7ef1148827016163d788889089876cf02396016c7a539cd9db5d62e7</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.2.2.el6_7" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.2.el6_7.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.2.el6_7.noarch.rpm</filename><sum type="sha256">1f97a870919146bb9c758922b20528d790247d77eeaf7e3a2d49f781ef2f0e74</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" id="CVE-2015-4734" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" id="CVE-2015-4803" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" id="CVE-2015-4805" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" id="CVE-2015-4806" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" id="CVE-2015-4835" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" id="CVE-2015-4840" title="Openjdk: Oob Access In Cms Code (2D, 8086092)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" id="CVE-2015-4842" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" id="CVE-2015-4843" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" id="CVE-2015-4844" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" id="CVE-2015-4860" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" id="CVE-2015-4872" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" id="CVE-2015-4881" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" id="CVE-2015-4882" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" id="CVE-2015-4883" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" id="CVE-2015-4893" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" id="CVE-2015-4903" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" id="CVE-2015-4911" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1920" id="RHSA-2015:1920-1" title="Rhsa-2015:1920-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233687" id="1233687" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273022" id="1273022" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273027" id="1273027" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273053" id="1273053" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273304" id="1273304" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273308" id="1273308" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273311" id="1273311" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273318" id="1273318" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273338" id="1273338" title="Openjdk: Oob Access In Cms Code (2D, 8086092)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273414" id="1273414" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273425" id="1273425" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273430" id="1273430" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273496" id="1273496" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273637" id="1273637" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273638" id="1273638" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273645" id="1273645" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273734" id="1273734" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1924-1</id><title>Qemu-Kvm</title><description>A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. (CVE-2015-5279) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.479.el6_7.2" src="qemu-kvm-0.12.1.2-2.479.el6_7.2.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.479.el6_7.2.x86_64.rpm</filename><sum type="sha256">e2a639c20c07ff838c0bfc7f245899be55668294ca0ed4aaab481658319f5a3c</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.479.el6_7.2" src="qemu-kvm-0.12.1.2-2.479.el6_7.2.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.479.el6_7.2.x86_64.rpm</filename><sum type="sha256">0613a8dd78e349f107dc99b6c2548f750362166d58f5ff0a4ee02e85fc04d010</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.479.el6_7.2" src="qemu-kvm-0.12.1.2-2.479.el6_7.2.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.479.el6_7.2.x86_64.rpm</filename><sum type="sha256">c5d295648887962748ea929b5bb9534b7f04317cafccdcc79a56f4332c64f2c5</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.479.el6_7.2" src="qemu-kvm-0.12.1.2-2.479.el6_7.2.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.479.el6_7.2.x86_64.rpm</filename><sum type="sha256">fe04b364ca2f815c61cbaaa6089c9fa2decd073cbcd5e9c8e9281e9d15c0ba0b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" id="CVE-2015-5279" title="Qemu: Heap Overflow Vulnerability In Ne2000_Receive() Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1924" id="RHSA-2015:1924-1" title="Rhsa-2015:1924-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256672" id="1256672" title="Qemu: Heap Overflow Vulnerability In Ne2000_Receive() Function" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1930-1</id><title>Ntp</title><description>It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client's polling interval value, and effectively disable synchronization with the server. (CVE-2015-7704) 
It was found that ntpd did not correctly implement the threshold limitation for the '-g' option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value. (CVE-2015-5300) 
After installing the update, the ntpd daemon will restart automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntp-perl" release="5.el6_7.2" src="ntp-4.2.6p5-5.el6_7.2.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm</filename><sum type="sha256">80d1473ec91f49e724060bc9fcea2df10ec2a7f20dceda4a7e3d9c052010c7de</sum></package><package arch="noarch" name="ntp-doc" release="5.el6_7.2" src="ntp-4.2.6p5-5.el6_7.2.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm</filename><sum type="sha256">66cd4ea82ff2d86259855109a2bb43c0d23ca8f630ecdd48c251ed869d7c634e</sum></package><package arch="x86_64" name="ntp" release="5.el6_7.2" src="ntp-4.2.6p5-5.el6_7.2.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-5.el6_7.2.x86_64.rpm</filename><sum type="sha256">a73248ef2fa427843cce5d87a377434cd0d622726551de90f6aa10c77fef9058</sum></package><package arch="x86_64" name="ntpdate" release="5.el6_7.2" src="ntp-4.2.6p5-5.el6_7.2.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm</filename><sum type="sha256">8b41f7e4cf25d26872f866f79968812ad6f7d9732cc9049c32a7c5610a7c7778</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" id="CVE-2015-5300" title="Ntp: Mitm Attacker Can Force Ntpd To Make A Step " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" id="CVE-2015-7704" title="Ntp: Disabling Synchronization Via Crafted Kod " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1930" id="RHSA-2015:1930-1" title="Rhsa-2015:1930-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271070" id="1271070" title="Ntp: Disabling Synchronization Via Crafted Kod " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271076" id="1271076" title="Ntp: Mitm Attacker Can Force Ntpd To Make A Step " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1981-1</id><title>Nss, Nss-Util, And Nspr</title><description>A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) 
A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) 
Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-util-devel" release="2.el6_7" src="nss-util-3.19.1-2.el6_7.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-2.el6_7.i686.rpm</filename><sum type="sha256">aecafb877ddb9748b18a014f86e13a8a7d960ffbdf0d1a489e9c6d6e8c059884</sum></package><package arch="x86_64" name="nss-tools" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">1b6ead7a4cf5080602e36aaf9f3038ed4233948f803d2a8dc5c504df8b0eea11</sum></package><package arch="x86_64" name="nss-util" release="2.el6_7" src="nss-util-3.19.1-2.el6_7.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-2.el6_7.x86_64.rpm</filename><sum type="sha256">76fb0ad8be78ff598da00521eea6e5df9f2b83a4097299f53d4c72a21e5678c5</sum></package><package arch="i686" name="nss" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-3.19.1-5.el6_7.i686.rpm</filename><sum type="sha256">a01fc67fe6ac145ad4e9114e4bee299c490c8b27bdcd03a55c3e4f17ea77cd20</sum></package><package arch="i686" name="nss-util" release="2.el6_7" src="nss-util-3.19.1-2.el6_7.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-2.el6_7.i686.rpm</filename><sum type="sha256">9c7944f88c35c7eb10efe5341c4aa6e53d1440aa52d8346f31033f4446c6d795</sum></package><package arch="i686" name="nspr" release="2.el6_7" src="nspr-4.10.8-2.el6_7.src.rpm" version="4.10.8"><filename>nspr-4.10.8-2.el6_7.i686.rpm</filename><sum type="sha256">54537ff7d07641fbd16514fe1c1b8e590918d01c7123c4ac48c3cd1e257e9e1e</sum></package><package arch="x86_64" name="nss" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">dd1a90b540fa8ba5f325aa1010f692bef7da82e7f0f816b0f370c080898f941a</sum></package><package arch="i686" name="nss-pkcs11-devel" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-5.el6_7.i686.rpm</filename><sum type="sha256">f6d95487c691c5632d09f3230d72a1779b02d0035d3ff84b12ea85230ab96738</sum></package><package arch="i686" name="nss-devel" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-5.el6_7.i686.rpm</filename><sum type="sha256">7a1381bf5106d668800756454046c787122b6972b129557a3cb8e4b6e3f20f95</sum></package><package arch="x86_64" name="nspr" release="2.el6_7" src="nspr-4.10.8-2.el6_7.src.rpm" version="4.10.8"><filename>nspr-4.10.8-2.el6_7.x86_64.rpm</filename><sum type="sha256">27adfe37fdd317e75a71ed6a6fb3b1913a0eb39aca173d36a0ad7d9b56cbf5b3</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">3ea4121c70054cfcc72456a11f87b715b6abfb6f4602e957eb5bd33e1fd5d0aa</sum></package><package arch="i686" name="nspr-devel" release="2.el6_7" src="nspr-4.10.8-2.el6_7.src.rpm" version="4.10.8"><filename>nspr-devel-4.10.8-2.el6_7.i686.rpm</filename><sum type="sha256">90b3c35f27b4f4b8f9b7a5ade6b9579714c4f14311b38fc189ba017654817a94</sum></package><package arch="x86_64" name="nspr-devel" release="2.el6_7" src="nspr-4.10.8-2.el6_7.src.rpm" version="4.10.8"><filename>nspr-devel-4.10.8-2.el6_7.x86_64.rpm</filename><sum type="sha256">cc676a0ad9e588607f45e49f1190cae928dafbc908caf7f5e82b8225a6af0e48</sum></package><package arch="x86_64" name="nss-util-devel" release="2.el6_7" src="nss-util-3.19.1-2.el6_7.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-2.el6_7.x86_64.rpm</filename><sum type="sha256">6adb6a98ab2b6615c33c440ddde1ba40ff807301d1c033522a4bdba33a1ed89d</sum></package><package arch="x86_64" name="nss-devel" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">b0cecae23ecc7022abc7d626c1861e8435a6d31739f1bec9477f2c336357c40f</sum></package><package arch="x86_64" name="nss-sysinit" release="5.el6_7" src="nss-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-sysinit-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">6ec473e9af187eabd5dedd539e7cc701ce5a86f9d5a6a48145ab89956380bb16</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" id="CVE-2015-7181" title="Nss: Use-After-Poison In Sec_Asn1D_Parse_Leaf() (Mfsa 2015-133)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" id="CVE-2015-7182" title="Nss: Asn.1 Decoder Heap Overflow When Decoding Constructed Octet String That Mixes Indefinite And Definite Length Encodings (Mfsa 2015-133)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" id="CVE-2015-7183" title="Nspr: Heap-Buffer Overflow In Pl_Arena_Allocate (Mfsa 2015-133)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1981" id="RHSA-2015:1981-1" title="Rhsa-2015:1981-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269345" id="1269345" title="Nss: Use-After-Poison In Sec_Asn1D_Parse_Leaf() (Mfsa 2015-133)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269351" id="1269351" title="Nss: Asn.1 Decoder Heap Overflow When Decoding Constructed Octet String That Mixes Indefinite And Definite Length Encodings (Mfsa 2015-133)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269353" id="1269353" title="Nspr: Heap-Buffer Overflow In Pl_Arena_Allocate (Mfsa 2015-133)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:1982-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7194, CVE-2015-7196, CVE-2015-7198, CVE-2015-7197) 
A same-origin policy bypass flaw was found in the way Firefox handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Firefox to disclose sensitive information. (CVE-2015-7193) 
A same-origin policy bypass flaw was found in the way Firefox handled URLs containing IP addresses with white-space characters. This could lead to cross-site scripting attacks. (CVE-2015-7188) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-11-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_7" src="firefox-38.4.0-1.el6_7.src.rpm" version="38.4.0"><filename>firefox-38.4.0-1.el6_7.i686.rpm</filename><sum type="sha256">872c5a26a9641179ec22171d191c606b055de6cbd9d2ecd4049cc948eb7fc64c</sum></package><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-38.4.0-1.el6_7.src.rpm" version="38.4.0"><filename>firefox-38.4.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">401bd3200c67ef78b6755eef73e69776da994720168c24aec0266e7f4f2b2675</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" id="CVE-2015-4513" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" id="CVE-2015-7188" title="Mozilla: Trailing Whitespace In Ip Address Hostnames Can Bypass Same-Origin Policy (Mfsa 2015-122)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" id="CVE-2015-7189" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" id="CVE-2015-7193" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" id="CVE-2015-7194" title="Mozilla: Memory Corruption In Libjar Through Zip Files (Mfsa 2015-128)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" id="CVE-2015-7196" title="Mozilla: Javascript Garbage Collection Crash With Java Applet (Mfsa 2015-130)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" id="CVE-2015-7197" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" id="CVE-2015-7198" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1982" id="RHSA-2015:1982-1" title="Rhsa-2015:1982-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277332" id="1277332" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277343" id="1277343" title="Mozilla: Trailing Whitespace In Ip Address Hostnames Can Bypass Same-Origin Policy (Mfsa 2015-122)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277344" id="1277344" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277346" id="1277346" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277347" id="1277347" title="Mozilla: Memory Corruption In Libjar Through Zip Files (Mfsa 2015-128)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277349" id="1277349" title="Mozilla: Javascript Garbage Collection Crash With Java Applet (Mfsa 2015-130)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277350" id="1277350" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277351" id="1277351" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2019-1</id><title>Sssd</title><description>It was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in. (CVE-2015-5292) 
This update also fixes the following bugs: 
* Previously, SSSD did not correctly handle sudo rules that applied to groups with names containing special characters, such as the "(" opening parenthesis sign. Consequently, SSSD skipped such sudo rules. The internal sysdb search has been modified to escape special characters when searching for objects to which sudo rules apply. As a result, SSSD applies the described sudo rules as expected. 
* Prior to this update, SSSD did not correctly handle group names containing special Lightweight Directory Access Protocol (LDAP) characters, such as the "(" or ")" parenthesis signs. When a group name contained one or more such characters, the internal cache cleanup operation failed with an I/O error. With this update, LDAP special characters in the Distinguished Name (DN) of a cache entry are escaped before the cleanup operation starts. As a result, the cleanup operation completes successfully in the described situation. 
* Applications performing Kerberos authentication previously increased the memory footprint of the Kerberos plug-in that parses the Privilege Attribute Certificate (PAC) information. The plug-in has been updated to free the memory it allocates, thus fixing this bug. 
* Previously, when malformed POSIX attributes were defined in an Active Directory (AD) LDAP server, SSSD unexpectedly switched to offline mode. This update relaxes certain checks for AD POSIX attribute validity. As a result, SSSD now works as expected even when malformed POSIX attributes are present in AD and no longer enters offline mode in the described situation. 
After installing the update, the sssd service will be restarted automatically. Additionally, all running applications using the PAC responder plug-in must be restarted for the changes to take effect.</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2015-11-17 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libsss_idmap" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">fa6118c519abdc987bbda91701a6f128554492ebd8273409ad87e32553d58f06</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">bd9e14d4fc3df0110af8039a1542212cd11f1480b09cc3daf8215d809d065b6c</sum></package><package arch="x86_64" name="sssd-ad" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-ad-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">009f76bf4931d59ea445dad6defd87796df86a90493df2cf8c99bca5a6a4a6a4</sum></package><package arch="x86_64" name="libsss_idmap" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">6d54267b09c3bcc19acdc5dd18e0727c81c4969772e802710574ad74560f4d12</sum></package><package arch="i686" name="libipa_hbac-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">555a93797c152ba2d9fb1201bd9c48c6facaa9642390ad8c81b5d39a5aff5125</sum></package><package arch="x86_64" name="libipa_hbac" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">cc5fb255a0bc9a0a8d29d189f1bf11474197e6701bcf6d0ac5b378c2172bfbcd</sum></package><package arch="x86_64" name="sssd-dbus" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-dbus-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">33f99f2316e2169d208514238c0d1ddca7389872b1b343ba52ac4373d316bfd2</sum></package><package arch="i686" name="libsss_simpleifp" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">bdae24e57ec6d2f6e3742c29cfbf94ccbae5ad8e8acc8afee87f56b8170ec81e</sum></package><package arch="x86_64" name="libsss_simpleifp" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">11a0a7f1c893c286df6da31004d56cde2db6a121147e78c56d2531758927d270</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">6135a60daad2dd46dd5f8c75d52833dfd033e64c1697fbebe4bea01fbd913612</sum></package><package arch="i686" name="libipa_hbac" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">db4339a6bd7e0549570f85333690eb589ea00193d5158566d9572898e5375543</sum></package><package arch="i686" name="sssd-client" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">3a18cc1a1d0077e6451eeede31d840c6735796a92ea6c68ea06835d61b08ae0e</sum></package><package arch="x86_64" name="sssd-common" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-common-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">12fd5dfe2f63518d55a80b69f3d1b5ccb2b7e067bb7c1236f2ffdac918d3ea70</sum></package><package arch="x86_64" name="sssd-common-pac" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-common-pac-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">c7f699157bb41a836a3607ccb33311e2c60218214fc50072540ac7db92a0e498</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">1f49f6a6256493bdcd009e67277b4a62d99167c77f6ba2dfc44078cccc174cd6</sum></package><package arch="i686" name="libsss_idmap-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">3ade79c469ff096b32ee847713dbd025fc0dfaba66df18768baf270c6a40d0e1</sum></package><package arch="x86_64" name="sssd-ldap" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-ldap-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">9e07d9067d437f41ea09ab85d3814cee22b18eddfd74504597dec12de1b8128f</sum></package><package arch="x86_64" name="sssd-tools" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-tools-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">30a82a5c095b221f7ffa9ce1189338c13d698478818262679355faeddd26d6e9</sum></package><package arch="x86_64" name="libsss_nss_idmap-python" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-python-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">ca47f432e9e6b94f13ae7f6935c8aa2ebdbdc97c1797dae941ca9f783de71e91</sum></package><package arch="x86_64" name="sssd-ipa" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-ipa-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">b56fdc5dbb6fbfc9b92d58663ea0d25b94c6f744e6860cf36a21e063251233be</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">a92bcae0abbb453c93b9722b2402af2a7de74893254cbd9c0b3917062d543fcb</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">38c69ba60e336eced8bde29b84d2d5659cf0bdfb3bce90df42e7be01a1698477</sum></package><package arch="i686" name="libsss_nss_idmap" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6_7.4.i686.rpm</filename><sum type="sha256">3bbaa1de01ce497ba44e6008a764901610740b27808ee10c3181fa5ba6b6bc23</sum></package><package arch="noarch" name="python-sssdconfig" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>python-sssdconfig-1.12.4-47.el6_7.4.noarch.rpm</filename><sum type="sha256">0e57dab5f269000696500d52f72867b79dabc2dd8291d8279cbb218cf861c94e</sum></package><package arch="x86_64" name="sssd-krb5" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-krb5-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">4c08c10a37df41bde6e55c397ec31283e00a918b7dcb0e54f2b159754f5cc838</sum></package><package arch="x86_64" name="sssd-client" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">9abb0d18e5f7ccc37211c5c3e8f858467a1673429f40da37b47a9271a66e252e</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">c245a3b28d35bdaf130bde62cb29a9f29c587a9245dab1094770a063e1f61ea3</sum></package><package arch="x86_64" name="sssd-krb5-common" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-krb5-common-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">f528b0ab757a4b775495c72af53537c80df84e33783bc3ad0c897f730c77367b</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">1e3c2d3ca7f2069d51c3c8bb609d650012779efa0c31ac411d25d5f7becd3325</sum></package><package arch="x86_64" name="libipa_hbac-python" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>libipa_hbac-python-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">3abfc39d3937e4ac6c206f22f6c0bf4b9c9503fb14d88e226f862f1703d58d30</sum></package><package arch="x86_64" name="sssd" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">48ca3c7c8fe5274623cb98fb5f1f58150c7f2e01cd67656b4a272031131c9400</sum></package><package arch="x86_64" name="sssd-proxy" release="47.el6_7.4" src="sssd-1.12.4-47.el6_7.4.src.rpm" version="1.12.4"><filename>sssd-proxy-1.12.4-47.el6_7.4.x86_64.rpm</filename><sum type="sha256">18981e444d934375ab85d783a755dd1a6f77228b0cd7ad295f51791fa65c855f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5292" id="CVE-2015-5292" title="Sssd: Memory Leak In The Sssd_Pac_Plugin" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2019" id="RHSA-2015:2019-1" title="Rhsa-2015:2019-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267580" id="1267580" title="Sssd: Memory Leak In The Sssd_Pac_Plugin" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2081-1</id><title>Postgresql</title><description>A memory leak error was discovered in the crypt() function of the pgCrypto extension. An authenticated attacker could possibly use this flaw to disclose a limited amount of the server memory. (CVE-2015-5288) 
If the postgresql service is running, it will be automatically restarted after installing this update.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-11-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="postgresql-devel" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">92ed8f49bdc753ad8e8b60461f988a62f0d305f3c524a14581df8ac2d8b97f2c</sum></package><package arch="i686" name="postgresql-libs" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-4.el6_7.i686.rpm</filename><sum type="sha256">33d30d53f7aecbfcacc1e3d43e1b74665617f065e5829958cbbf521bde3322a4</sum></package><package arch="x86_64" name="postgresql-docs" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-docs-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">dbc1bcb81c27cdde0d1baaad0eb7649a7448cd4708befc475a89a8cfeb6a1bf8</sum></package><package arch="x86_64" name="postgresql" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">4c958efb9acb1f87d895152bc4b84dd7070f14d5cd96a3a11ce94628ae193c91</sum></package><package arch="i686" name="postgresql" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-4.el6_7.i686.rpm</filename><sum type="sha256">24150af71835d0b2d05a025c93487d624ed20d6446cf8ffe5d574b987552e9f0</sum></package><package arch="x86_64" name="postgresql-libs" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">657c75b86c99c9568bfd855eef3cedbde23ebead37b0704edc91390f83c96d23</sum></package><package arch="x86_64" name="postgresql-server" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-server-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">99bb1cd02eaa0daf9cd69d4070a4a25f3db2d69f0a99f3bef0a03ba585c65196</sum></package><package arch="x86_64" name="postgresql-pltcl" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-pltcl-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">c75db0a9d2c14bb84f57ea6ce1e4b3bdf95e035eeeee7cdf06ae34e701a0ee05</sum></package><package arch="x86_64" name="postgresql-test" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-test-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">337dd3f2deecb50e5fd7117c9bddaedd5f6d9cbd69347574dbac4bc9400a2f67</sum></package><package arch="i686" name="postgresql-devel" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-4.el6_7.i686.rpm</filename><sum type="sha256">03eb94f415612cde81a7c0dd476b170d18abf68e5e41a78825b51e1fdb132471</sum></package><package arch="x86_64" name="postgresql-plpython" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-plpython-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">ac53f7d4f38ac3bb740548cd329a02b193c9d49ff604379f952b06dcbefa6d9b</sum></package><package arch="x86_64" name="postgresql-plperl" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-plperl-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">bec3aad0401961ec99a5347a4855775af06b9497220e75d3cafd5e07dbb4c1d7</sum></package><package arch="x86_64" name="postgresql-contrib" release="4.el6_7" src="postgresql-8.4.20-4.el6_7.src.rpm" version="8.4.20"><filename>postgresql-contrib-8.4.20-4.el6_7.x86_64.rpm</filename><sum type="sha256">81a6f4bad1340712e691257878c04293faffca8033432866d18d7093a42a56e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" id="CVE-2015-5288" title="Postgresql: Limited Memory Disclosure Flaw In Crypt()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2081" id="RHSA-2015:2081-1" title="Rhsa-2015:2081-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270306" id="1270306" title="Postgresql: Limited Memory Disclosure Flaw In Crypt()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2086-1</id><title>Java-1.6.0-Openjdk</title><description>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) 
Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) 
It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) 
Multiple flaws were found in the Libraries, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-11-24 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.9.4.el6_7" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el6_7.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el6_7.x86_64.rpm</filename><sum type="sha256">249e8f3ee27b807a40b6a80fd5459db3e79b4235bfbb1e8653fc196783600100</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.9.4.el6_7" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el6_7.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el6_7.x86_64.rpm</filename><sum type="sha256">15022f29ba93aed83ad77d55e5c448d730fc44ef09aef2eddf1ea5c8a00fe96d</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.9.4.el6_7" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el6_7.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el6_7.x86_64.rpm</filename><sum type="sha256">79ca78b24c8c217117b0494f44787f16a8f24660bcef32017b5d9507d2eab1f2</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.9.4.el6_7" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el6_7.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el6_7.x86_64.rpm</filename><sum type="sha256">87adf9ee73727007ad7b91161181cd80957375f8809862e7d3c128d6370f96f8</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.9.4.el6_7" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el6_7.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el6_7.x86_64.rpm</filename><sum type="sha256">44d9e5723834a833219d571c5849a927aaef6b5d5b47bbc4a3aa112b23f006bd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" id="CVE-2015-4734" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" id="CVE-2015-4803" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" id="CVE-2015-4805" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" id="CVE-2015-4806" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" id="CVE-2015-4835" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" id="CVE-2015-4842" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" id="CVE-2015-4843" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" id="CVE-2015-4844" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" id="CVE-2015-4860" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" id="CVE-2015-4872" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" id="CVE-2015-4881" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" id="CVE-2015-4882" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" id="CVE-2015-4883" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" id="CVE-2015-4893" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" id="CVE-2015-4903" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" id="CVE-2015-4911" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2086" id="RHSA-2015:2086-1" title="Rhsa-2015:2086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233687" id="1233687" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273022" id="1273022" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273027" id="1273027" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273053" id="1273053" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273304" id="1273304" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273308" id="1273308" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273311" id="1273311" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273318" id="1273318" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273414" id="1273414" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273425" id="1273425" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273430" id="1273430" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273496" id="1273496" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273637" id="1273637" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273638" id="1273638" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273645" id="1273645" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273734" id="1273734" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2504-1</id><title>Libreport</title><description>It was found that ABRT may have exposed unintended information to Red Hat Bugzilla during crash reporting. A bug in the libreport library caused changes made by a user in files included in a crash report to be discarded. As a result, Bugzilla attachments may contain data that was not intended to be made public, including host names, IP addresses, or command line options. (CVE-2015-5302) 
This flaw did not affect default installations of ABRT on Scientific Linux as they do not post data to Red Hat Bugzilla.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-12-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libreport-plugin-logger" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-logger-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">e6d0b4524d5ae55c41c9da730e6b16e6dcb0bbb290a9c9dcf87dcb6005709d29</sum></package><package arch="x86_64" name="libreport-plugin-bugzilla" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-bugzilla-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">e9017ab87bc43e47c6f4709172c818c0657dbd75fa6311955ddd17f6076f811f</sum></package><package arch="i686" name="libreport-gtk" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-gtk-2.0.9-25.el6_7.i686.rpm</filename><sum type="sha256">9413848196a8322dada57ecdc41abf96d3082a039289c1a3bed051a56423f4f7</sum></package><package arch="x86_64" name="libreport-python" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-python-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">0cbbf99801a94eabf1951c2184af502c6466416be4d97f8291d63ddf87f1e360</sum></package><package arch="x86_64" name="libreport-filesystem" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-filesystem-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">660566e7f4cba9f3b08950ccd3f7d86bcfe847d5b2ca5aaaeb1511a5b395638f</sum></package><package arch="i686" name="libreport-devel" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-devel-2.0.9-25.el6_7.i686.rpm</filename><sum type="sha256">a74be01ce00b6c5025075ba87933f938bbeb2db838f51a6b3882353bce72ba49</sum></package><package arch="x86_64" name="libreport-gtk-devel" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-gtk-devel-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">4b1aed876e7d9fa5aeb3eccd1f1972b3c25c48637f4718679ad9c15e80637720</sum></package><package arch="x86_64" name="libreport-plugin-reportuploader" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-reportuploader-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">e78416707c14684b54bf3b5b8afbf3def99955d1ed2eb031ae596a505d9bf8bf</sum></package><package arch="x86_64" name="libreport-plugin-mailx" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-mailx-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">3ab0ce54cade77808cd07dd63fa2dfdf1394f69d62b0d5f4f6c739b35b14beaf</sum></package><package arch="x86_64" name="libreport-gtk" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-gtk-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">5d203ae8ef66916f1d08197a36b4cdff73cc0704557da5503ec783f5215fa0f8</sum></package><package arch="x86_64" name="libreport-plugin-rhtsupport" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-rhtsupport-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">e4251106a84f501d6c3c2259f2369ca18b3a70dbb52c5eb73ba00439251dddb5</sum></package><package arch="i686" name="libreport-gtk-devel" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-gtk-devel-2.0.9-25.el6_7.i686.rpm</filename><sum type="sha256">2e3dffe9766526fc0a7e8dad43f103b02145363268e9f5781dcdf21da8cbe935</sum></package><package arch="x86_64" name="libreport-devel" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-devel-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">257a439c55196660cfa6cb4f75e1e891d4401ae148db3a9b90abdac1e548d90e</sum></package><package arch="x86_64" name="libreport-newt" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-newt-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">22be692a4278d23624b144fef8b905e0a10809df1dc45536420ec706829ee8d2</sum></package><package arch="i686" name="libreport" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-2.0.9-25.el6_7.i686.rpm</filename><sum type="sha256">03b9262325e61d9abe8750e6d48c67986f91d8140ed6489f4cfc424a5add38a4</sum></package><package arch="x86_64" name="libreport" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">d01028a6a9ae4ff0612837f1158b5f97a4968930c2d3cd2f07583d4652fd36d6</sum></package><package arch="x86_64" name="libreport-plugin-ureport" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-ureport-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">8f43b3cd82679a7ad8a5a167f82d071c63656be761f9c26bb84eb9f13e36b3ae</sum></package><package arch="x86_64" name="libreport-plugin-kerneloops" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-plugin-kerneloops-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">b8ad6749420da804f64727018360bd05e88b06ab777cbf29dd0440bfced44c5d</sum></package><package arch="x86_64" name="libreport-cli" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-cli-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">51ed9a979334f23eedf61b0b445875f65dd25c45cddf49b78ec81aeb391dc496</sum></package><package arch="x86_64" name="libreport-compat" release="25.el6_7" src="libreport-2.0.9-25.el6_7.src.rpm" version="2.0.9"><filename>libreport-compat-2.0.9-25.el6_7.x86_64.rpm</filename><sum type="sha256">dd1f00165921bd47d6d15ce6200cb0701a25ec088f83b3b6e7a69ccfd32b67a1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5302" id="CVE-2015-5302" title="Libreport: Possible Private Data Leak In Bugzilla Bugs Opened By Abrt" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2504" id="RHSA-2015:2504-1" title="Rhsa-2015:2504-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270903" id="1270903" title="Libreport: Possible Private Data Leak In Bugzilla Bugs Opened By Abrt" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2519-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200) 
A same-origin policy bypass flaw was found in the way Thunderbird handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Thunderbird to disclose sensitive information. (CVE-2015-7193) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-01 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_7" src="thunderbird-38.4.0-1.el6_7.src.rpm" version="38.4.0"><filename>thunderbird-38.4.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">dc2c411cffd0bec5dab6de5d658fd9d0eb346d410eafa1653bf3d5005918f48e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" id="CVE-2015-4513" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" id="CVE-2015-7189" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" id="CVE-2015-7193" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" id="CVE-2015-7197" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" id="CVE-2015-7198" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" id="CVE-2015-7199" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" id="CVE-2015-7200" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2519" id="RHSA-2015:2519-1" title="Rhsa-2015:2519-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277332" id="1277332" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277344" id="1277344" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277346" id="1277346" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277350" id="1277350" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277351" id="1277351" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2521-1</id><title>Jakarta-Commons-Collections</title><description>It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons- collections library. (CVE-2015-7501) 
With this update, deserialization of certain classes in the commons- collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization. 
In the interim, the quickest way to resolve this specific deserialization vulnerability is to remove the vulnerable class files (InvokerTransformer, InstantiateFactory, and InstantiateTransformer) in all commons-collections jar files. Any manual changes should be tested to avoid unforseen complications. 
All running applications using the commons-collections library must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-15 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="jakarta-commons-collections-testframework-javadoc" release="3.5.el6_7" src="jakarta-commons-collections-3.2.1-3.5.el6_7.src.rpm" version="3.2.1"><filename>jakarta-commons-collections-testframework-javadoc-3.2.1-3.5.el6_7.noarch.rpm</filename><sum type="sha256">2e4efc06d6c8d8b09615da15a592974c2ba766769478ac4480efecabce1084eb</sum></package><package arch="noarch" name="jakarta-commons-collections-javadoc" release="3.5.el6_7" src="jakarta-commons-collections-3.2.1-3.5.el6_7.src.rpm" version="3.2.1"><filename>jakarta-commons-collections-javadoc-3.2.1-3.5.el6_7.noarch.rpm</filename><sum type="sha256">e49d28348fbe4332f2e7db80fcc50c59d45a0c44b5e47da67c0da5a05243fc49</sum></package><package arch="noarch" name="jakarta-commons-collections" release="3.5.el6_7" src="jakarta-commons-collections-3.2.1-3.5.el6_7.src.rpm" version="3.2.1"><filename>jakarta-commons-collections-3.2.1-3.5.el6_7.noarch.rpm</filename><sum type="sha256">5fb947ea6da65104c417d10fb5e45e9bf18847adcfab8d08dc418cb246b1eb08</sum></package><package arch="noarch" name="jakarta-commons-collections-tomcat5" release="3.5.el6_7" src="jakarta-commons-collections-3.2.1-3.5.el6_7.src.rpm" version="3.2.1"><filename>jakarta-commons-collections-tomcat5-3.2.1-3.5.el6_7.noarch.rpm</filename><sum type="sha256">eb4a978b10e6906c10c064d8c7a989c4cba38c2f1001823659b4b1c0e3224b63</sum></package><package arch="noarch" name="jakarta-commons-collections-testframework" release="3.5.el6_7" src="jakarta-commons-collections-3.2.1-3.5.el6_7.src.rpm" version="3.2.1"><filename>jakarta-commons-collections-testframework-3.2.1-3.5.el6_7.noarch.rpm</filename><sum type="sha256">2fa06f5e9b751cb77077fcdc048ee4f9b729fb854338c6783706ccd6769c992b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501" id="CVE-2015-7501" title="Cve-2015-7501" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2521" id="RHSA-2015:2521-1" title="Rhsa-2015:2521-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279330" id="1279330" title="Apache-Commons-Collections: Invokertransformer Code Execution During Deserialisation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2549-1</id><title>Libxml2</title><description>Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) 
The desktop must be restarted (log out, then log back in) for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-12-15 00:00:00" /><restart_suggested>true</restart_suggested><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libxml2-devel" release="20.el6_7.1" src="libxml2-2.7.6-20.el6_7.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-20.el6_7.1.i686.rpm</filename><sum type="sha256">d86a6c87efd711dc3eba75616300adf4c370a336f90463a636861e617a6d80e0</sum></package><package arch="i686" name="libxml2" release="20.el6_7.1" src="libxml2-2.7.6-20.el6_7.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-20.el6_7.1.i686.rpm</filename><sum type="sha256">373c803309596f13709373660f446fdeeacb897546210a2371ea94ad139e5c6b</sum></package><package arch="x86_64" name="libxml2-devel" release="20.el6_7.1" src="libxml2-2.7.6-20.el6_7.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">7c77acf5e4bbe68026644117283aa3fb07aa7d8e3623a54f1f5d7b3fd0ec3351</sum></package><package arch="x86_64" name="libxml2-static" release="20.el6_7.1" src="libxml2-2.7.6-20.el6_7.1.src.rpm" version="2.7.6"><filename>libxml2-static-2.7.6-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">f318e758087721c4d0188ebfdb484f3369f9189c7a704aae3e622fb641155ff0</sum></package><package arch="x86_64" name="libxml2-python" release="20.el6_7.1" src="libxml2-2.7.6-20.el6_7.1.src.rpm" version="2.7.6"><filename>libxml2-python-2.7.6-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">f2c887dad43b6382afc229a24768f2404f9e41d972e229811c9582199e5b3a6e</sum></package><package arch="x86_64" name="libxml2" release="20.el6_7.1" src="libxml2-2.7.6-20.el6_7.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">17c1824347a4c475c762eee6d410cb4a2cc41a9ceacf4f126e14cd7ba71d4084</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" id="CVE-2015-5312" title="Libxml2: Cpu Exhaustion When Processing Specially Crafted Xml Input" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" id="CVE-2015-7497" title="Libxml2: Heap-Based Buffer Overflow In Xmldictcomputefastqkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" id="CVE-2015-7498" title="Libxml2: Heap-Based Buffer Overflow In Xmlparsexmldecl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" id="CVE-2015-7499" title="Libxml2: Heap-Based Buffer Overflow In Xmlgrow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" id="CVE-2015-7500" title="Libxml2: Heap Buffer Overflow In Xmlparsemisc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" id="CVE-2015-7941" title="Libxml2: Out-Of-Bounds Memory Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" id="CVE-2015-7942" title="Libxml2: Heap-Based Buffer Overflow In Xmlparseconditionalsections()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" id="CVE-2015-8241" title="Libxml2: Buffer Overread With Xml Parser In Xmlnextchar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" id="CVE-2015-8242" title="Libxml2: Buffer Overread With Html Parser In Push Mode In Xmlsax2Textnode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" id="CVE-2015-8317" title="Libxml2: Out-Of-Bounds Heap Read When Parsing File With Unfinished Xml Declaration" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2549" id="RHSA-2015:2549-1" title="Rhsa-2015:2549-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213957" id="1213957" title="Libxml2: Out-Of-Bounds Memory Access When Parsing An Unclosed Html Comment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274222" id="1274222" title="Libxml2: Out-Of-Bounds Memory Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276297" id="1276297" title="Libxml2: Heap-Based Buffer Overflow In Xmlparseconditionalsections()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276693" id="1276693" title="Libxml2: Cpu Exhaustion When Processing Specially Crafted Xml Input" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281862" id="1281862" title="Libxml2: Heap-Based Buffer Overflow In Xmldictcomputefastqkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281879" id="1281879" title="Libxml2: Heap-Based Buffer Overflow In Xmlparsexmldecl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281925" id="1281925" title="Libxml2: Heap-Based Buffer Overflow In Xmlgrow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281930" id="1281930" title="Libxml2: Out-Of-Bounds Heap Read When Parsing File With Unfinished Xml Declaration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281936" id="1281936" title="Libxml2: Buffer Overread With Xml Parser In Xmlnextchar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281943" id="1281943" title="Libxml2: Heap Buffer Overflow In Xmlparsemisc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281950" id="1281950" title="Libxml2: Buffer Overread With Html Parser In Push Mode In Xmlsax2Textnode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281955" id="1281955" title="Libxml2: Multiple Out-Of-Bounds Reads In Xmldictcomputefastkey.Isra.2 And Xmldictaddstring.Isra.O" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2594-1</id><title>Libpng</title><description>It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472) 
An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-7981) 
This will go into the autoyum area tomorrow.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-12-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="libpng-devel" release="2.el6_7" src="libpng-1.2.49-2.el6_7.src.rpm" version="1.2.49"><filename>libpng-devel-1.2.49-2.el6_7.x86_64.rpm</filename><sum type="sha256">cfb6fe32e6a67f3f6fd6fcfe0b2e6f9f75370175102aa7ed7a31ecbb917ca5ec</sum></package><package arch="i686" epoch="2" name="libpng" release="2.el6_7" src="libpng-1.2.49-2.el6_7.src.rpm" version="1.2.49"><filename>libpng-1.2.49-2.el6_7.i686.rpm</filename><sum type="sha256">5fbbfa564e70243903ce88629be9faf834c205e72ebf8c65505a4c9c492dc744</sum></package><package arch="x86_64" epoch="2" name="libpng" release="2.el6_7" src="libpng-1.2.49-2.el6_7.src.rpm" version="1.2.49"><filename>libpng-1.2.49-2.el6_7.x86_64.rpm</filename><sum type="sha256">46540d7cf701cb48bcf8453b91a1747e01251286c64cbaaa4380f39250adc160</sum></package><package arch="i686" epoch="2" name="libpng-devel" release="2.el6_7" src="libpng-1.2.49-2.el6_7.src.rpm" version="1.2.49"><filename>libpng-devel-1.2.49-2.el6_7.i686.rpm</filename><sum type="sha256">c23ff52e73275dc9be07d998a028bca6effe2f81437601376170a35c4b3964c5</sum></package><package arch="x86_64" epoch="2" name="libpng-static" release="2.el6_7" src="libpng-1.2.49-2.el6_7.src.rpm" version="1.2.49"><filename>libpng-static-1.2.49-2.el6_7.x86_64.rpm</filename><sum type="sha256">b683ea1c1528f7a22426e2b72716d6278918dc2a7edb9eb2a5060642c127e784</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" id="CVE-2015-7981" title="Libpng: Out-Of-Bounds Read In Png_Convert_To_Rfc1123" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" id="CVE-2015-8126" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" id="CVE-2015-8472" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2594" id="RHSA-2015:2594-1" title="Rhsa-2015:2594-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276416" id="1276416" title="Libpng: Out-Of-Bounds Read In Png_Convert_To_Rfc1123" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281756" id="1281756" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2617-1</id><title>Openssl</title><description>A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. (CVE-2015-3194) 
A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) 
A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. (CVE-2015-3196) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl-perl" release="42.el6_7.1" src="openssl-1.0.1e-42.el6_7.1.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-42.el6_7.1.x86_64.rpm</filename><sum type="sha256">1b9ca25c7251d3442cc1eb598736e1bee08812653947e2bf4ac658e7796de817</sum></package><package arch="i686" name="openssl" release="42.el6_7.1" src="openssl-1.0.1e-42.el6_7.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-42.el6_7.1.i686.rpm</filename><sum type="sha256">b4b08905dbe38efd4014324728804f008cb36d5b1af190db03245b9b5dce6088</sum></package><package arch="x86_64" name="openssl-devel" release="42.el6_7.1" src="openssl-1.0.1e-42.el6_7.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-42.el6_7.1.x86_64.rpm</filename><sum type="sha256">cda1edff4521b4d9854dae70ae0dfcd6cf96c760d8d705a0140e0192db1581cf</sum></package><package arch="x86_64" name="openssl" release="42.el6_7.1" src="openssl-1.0.1e-42.el6_7.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-42.el6_7.1.x86_64.rpm</filename><sum type="sha256">e1a8bcb3084f45a359c6730a2b58e133a08e4fd1893306f9eb852d4230efae33</sum></package><package arch="i686" name="openssl-devel" release="42.el6_7.1" src="openssl-1.0.1e-42.el6_7.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-42.el6_7.1.i686.rpm</filename><sum type="sha256">67b5f00e0fc6680d2c17dd6b197d337e8039d944e4c1755f153eb00cc6ae9739</sum></package><package arch="x86_64" name="openssl-static" release="42.el6_7.1" src="openssl-1.0.1e-42.el6_7.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-42.el6_7.1.x86_64.rpm</filename><sum type="sha256">c7d3daa540e60a4b3735c24bb6e076dd1dd530939ab057aa80776ad59b21eab7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" id="CVE-2015-3194" title="Openssl: Certificate Verify Crash With Missing Pss Parameter" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" id="CVE-2015-3195" title="Openssl: X509_Attribute Memory Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" id="CVE-2015-3196" title="Openssl: Race Condition Handling Psk Identify Hint" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2617" id="RHSA-2015:2617-1" title="Rhsa-2015:2617-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288320" id="1288320" title="Openssl: Certificate Verify Crash With Missing Pss Parameter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288322" id="1288322" title="Openssl: X509_Attribute Memory Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288326" id="1288326" title="Openssl: Race Condition Handling Psk Identify Hint" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2619-1</id><title>Libreoffice</title><description>It was discovered that LibreOffice did not properly restrict automatic link updates. By tricking a victim into opening specially crafted documents, an attacker could possibly use this flaw to disclose contents of files accessible by the victim. (CVE-2015-4551) 
An integer underflow flaw leading to a heap-based buffer overflow when parsing PrinterSetup data was discovered. By tricking a user into opening a specially crafted document, an attacker could possibly exploit this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5212) 
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way LibreOffice processed certain Microsoft Word .doc files. By tricking a user into opening a specially crafted Microsoft Word .doc document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5213) 
It was discovered that LibreOffice did not properly sanity check bookmark indexes. By tricking a user into opening a specially crafted document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5214)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-graphicfilter-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">b89b8ac3a2084d664820c11a0d99a2804991c0cf5d1310f3eef392ef4dea675a</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-zh-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">de4d3a2b8b9b54cdf6c01e17bf736674438d7523ef41a2b4e67627b5c0641232</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-emailmerge-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">22da488529c58dc25bba44fdaf1ba4b64889edb2782be099d2eee41ad6a3b77a</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-hu-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">223a681ce59b6e859d8fc982812a054fde73b7bf0450d9f88b7d387e86f118f0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-glade-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">7b7469cc205976be3feaf5cf2c833476e0db2a33c9495dede82051211a0130e0</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-hr-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">f3dc08b30c1c4bdffd9ffd4500dd6d6700b88329827a059e35df7dcf4cee8a4f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-mr-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">7cf51edf81c63659ec9e5504ac8497133fa30ee26dbee332c60a9f00886d884d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pt-PT-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">432464aba7e750ca0e1454218fc02979e7ed42c72b47e28ab63ecbd64a2907f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">488842efd5d62a879c328695dda3999d9a37f73f3fbded3737f4de4ecb8cfa13</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-fi-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">5d06eb4b93897620a6214b35099729e21c5680c3ff7f8625fe0238e29b6bd497</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-bg-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">5d0605cb4c8e9ed34b2e749c0eecc55f7230fd7cea58228b09c84c99313925a5</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-ko-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">a04da8532cc9cb77c72037a6e783cdc9aba618169125cfc3641ada37481c860d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-writer-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">212d69fcddfb0023e8aef3b85ad9946cae6500a286db580e010ae2982c6577bf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-librelogo-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">af5ae5da1af130a7b4138dbf6ddc01484f0793d4be0451fe7f18e9cfab2f8ff2</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-nl-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">6fd7d8b6cfe52419b2ae30ab84deaad67bee8064d51a97c26c21beefed5e453f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ga-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">85ccfb661d2eee8a0f73986cb2eb1a2b38deb46083ed722b3ffb48c03f6c0bea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-rhino-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">146e062ab5fff459a791ec4430dc4458969f018b2bc6e404f2cae53711d9fbb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-mai-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">b1cf3fcfd13aef5a06fb815bf161a6a484367f977eb18c3466de978aa1f148a8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-math-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">c1807b1c85a7d8a1ee1395906c51337cad7cb95336f08bcff82007e1bbbf285c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nr-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">5195b3ce44cb9027c8bd62f0f6b8ec94de22db8c6658f2c09e97801aac28380d</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-en-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">1243b1b7c355931a41bf8d2813c68e65e718091b2b5b1914767d2eb1ed5f9c41</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-hi-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">e7cffc6a3f6c8b9e2761424af48b61e2c1f3b3cf7accbfbfcd51587f38c1d6ba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ss-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">853a8cfa919f6ac0d0afdab2095481c7bfe60e4b3d5019ea4416321ee163ec36</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-th-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">0933d0daf14290eb43bf88d71393efb1dc2a2ae290f2f4356670d2ad0fa56278</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-lt-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">a594e02fdc339aebfaf485694a44a956b47251dbebecf148f5bba2c7720334ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sl-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">83ce9d707812ceadc5d10907e00ca759c2bdb689c72f66e0e31833f36fbb750b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ve-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">641b9002f63541646402600f07f31b7696738dd4db56b59b2294871e63383eb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-fr-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">4b8bc39bce6fdb787b2fc8b566dd55d9816714c59e8faa838125dbd7095a33c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-he-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">236ac517eb8b83267e216cef89e4ac5b5166925d3a84deaf37fb631cb960e2d3</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-de-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">ff8e877fdec567260555b388f0b071a85695ceaf792d007df6fe984f042c5741</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-xh-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">4a455c04be35c87270cc9598836cf5e99010ec57191644b7d4058b400b57b952</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sr-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">19e7a4a2677f1e4dd8988ac1e68c53d011de9d42edcad46e4b1a34b45f704df3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-base-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">f4e303464efc0f4ebbd404af9fcaec95ce90fc914ef90906a8aded9c2ab2997a</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-lb-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">dc32e395ade8effa2ce2b04adfe32ec5b7e0e69274d1877a624e4f4f9901d026</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-af-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">7bdaa934878e8f59706be8b817993499fc79d90a2ad7eca67253038ae69fc56a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-zh-Hans-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">959b3974fb8d053d5a5e63092ea95f6962fa707052e2e14ef1f6b041191f273c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-core-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">0e2796ffde19b298d8664d254eeb98d9fa69738d3621a4a410d78c8a65e3a7de</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-da-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">cd7e8edf3251a6847ca4d6b3b455174be3c13d816bd88a9ef3b1ba984191bc6e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-te-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">adb3f93606ccd1a85404c4247be01dc587243b82253ef7f7cfc3e9ba69c9cdc3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-ogltrans-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">059998a45d38c59fbb6e77e3c7381011bac9748edd18f07025dd923806afb48e</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-ru-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">d0b093d5e97fcce03d71d98915fbbe40ebb6b8e6cad3ebe52b55f1d855705269</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-st-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">c6c63943eeea900c7de6c20af1395fe8de8a7e6e6c4bf80d9e824c3cda41675b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ms" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ms-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">511d5b19df435f03517f904bee4b99780f3ccbf9fc7a478ee4a43e8a9d7670b7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nl-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">7f9dfe4ba3b13cbe765dcc99ad3bec3389dd52dbfd02df143d58c66c39987b8a</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-vi-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">7376a122fbf92bfba336da13db9cd886da6a3d408da6da8bed5ffe9266bbfec5</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-tr-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">f764f60c55a7c81e3fe73feeaec20a533715476af7a90503d852551be9ee18e2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ar-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">4e86d382e9d205c8da2e6f1515924e915ecba05d5e3b4eee66dd4571061e0ba9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ru-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">2f31eaa8e826417fbc2ea7c1b208783b0bbc343bf01ff7bc5a5b5e0fb59b299b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ca-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">138013f3f559116092300471c45936bbf5de05d78916bb2cd849510fe5f3c82f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ml-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">d6bf858b27422e4d03ef089a4627c7956fc98c1d05ecc20bbefa11c9caecbef5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-eu-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">f882a836cbabfa891e53ab982434668f51ae645611a9910b328926b71be51a38</sum></package><package arch="x86_64" epoch="1" name="libreoffice-headless" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-headless-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">e7e9ece7354cf528691aefe7446e3898b7b776e537948074b723cce521551e6d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pa-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">a7ed258a278dbbc7056aa5879aee0220c88721d8043d4ecfa8cb4bd064f7b1ae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pt-BR-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">45ff579b2596a1bdf38c266442b403fcbabeb804d82893fbd01f1ccff8bc2a26</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-draw-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">742a66c06f7e3114b97eedba1e0c51ecf1d6cfcede5f16270f7c325b451dd212</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-sv-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">5ffc9a94f77ee7a3946dfd7c2bcfe7fe675b8322e0427212248070259ce6a98d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-hr-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">dca080a188ded0c82db12a097bfa2daa802f7f1d413eb66aec97c2934c23c019</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-bg-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">dc80e1b10cb9bda7e64496229215735c98043918f1b94e2eb7d811a368f73c15</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-fr-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">65cdb7d75e42a56dadf7c700ab70c4ad7b3d3379c60ea9c18c677c6b3851e1e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ur" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ur-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">cf95c9b762df01f354eb630d5f0a0acb38c7a0f7ad5cb6b8ed0e6218a3834641</sum></package><package arch="i686" epoch="1" name="libreoffice-gdb-debug-support" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-gdb-debug-support-4.2.8.2-11.el6_7.1.i686.rpm</filename><sum type="sha256">3218a9d13d7f147c81543a0ef4bb1c1bfe8005f7e9a6e26973c3c2d0de7b2043</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-it-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">a39ccad180fada58ad004b3017d964fc73586a849543ee45dc00e514cfbd1b19</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sv-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">59f8a46f93483c5cb5838201cb7619281719586da7a39cb4ef1a9260b910f65f</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-pl-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">2bcca06d2c3bfb73d0bdd01c6450e12945e0709966d203d6b719ddca6279df44</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-gl-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">2c82a0bb07e542d5033452ef781e8f64159222175c7bfed32e2a145ea443b05c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-de-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">d1268cffe66f79efe971f9dc23f66efa74c59adf3839f9d463d59cf998c26e0e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-bsh-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">dd50fc8dbdf82d260375fd3f819724e218c448c2f2fa3d4602344d0edf7950a1</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-fa-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">eef929cfee75678238997d0c8e50dab42bc6d9505fa26a337f2860fb8dff4d87</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-af-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">b87c3cca1d18e4759f587da0e73ffb3ffa16f5ad13a0a40651968a70c1622535</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-sl-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">7ec9443999de4cb52e55de8cdf6fc3b503877d69640b60951839a6a9107ffa41</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-ga-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">b0f0e0595d0054f4777981dc65153640593dfa4070dc354bd20e5bd4a7fe1bb3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-hu-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">eed61f06189eb3bd6ff13291ac0f7f5c2ee8bd5294270de6fb22d3888d806952</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-dz-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">5c5477a47d025a1b4b42d0937721850691f0c3e8be523e854bb812523ee28fdb</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">e11b7a03cfc6de27111dd72d56997eafb2036c22740abdf3606f461bde021387</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-cy-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">b9477b3cc6f70af042d8a2f0c54084b0baa2e322a9e157b0881b33443d3e3bb2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ro-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">71d041de456a3dd6dc58531dde284803394d98ae8284738f2d0b1d8fde92aec5</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-cs-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">43deb0f9284cf9bb2afc55bdbcb2b972b9bf243810e46f66fd36c62661572f5e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-ure-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">20fb17041b46e15584d5825183ee0030fe7c319779c0d4feebf79e2b572ca905</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-ja-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">d59a386c8032335eda477ab1ab4521308a2762b30bec8044b7f034181413d915</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-pt-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">12584140ef1dd6f31823d63f48265d8c0985cd90389de990b55dafbd2df6df64</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ko-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">88a31f226cad5fbff4de5b2034e64e014920cc75ffdd8714e64fb825e96233a1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-or-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">b736b8e5b678312794fe56e4da208b11e1544e548cfef538bccee4cbeab4ed65</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nso-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">414014dba58c7af8eb6eadc72fd46b484c76fb50d190489464835f51fbf3e7c8</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-da-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">a89d1d379159c9edec17019af81485c290552320c4f30057b615c266d5a56625</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-es-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">9860fe9b1f0401e91c6af1c3db042d6cda7500a72fb50e6fcb2240878b0cb255</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-bn-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">c2d22f0ad483179601dab24c6686aa1841a764ba41f1b722258930c98f739e10</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-tn-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">daaac32332ed5fa6603245621347e3983b3426e0451eaec2d1b21f40f8066ace</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-sr-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">191c8c3b682b69ee24f5fa9eed6df21737135e3b3b361583b0976eb8d880fa69</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-filters-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">d811952c767a739a1c755de2053184773d711baf6369d49fe0dcdf255346816e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-el-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">e1eccb31fbe46de776cff24df280874abbc9e1d385732a6a36f06fa99ac5a881</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-cs-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">ad8cbc857d5dea5b81076595cac454763c460bdebf20fef093dd959c694336e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-sdk-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">ea25c1549166e83ebee5290edbf5a4eabf851b7404f0602c5900f202f41ec4ad</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-ca-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">2e9b321435d412b53b3e6e837a1315bcf27275f0b282d4b524d0e3fb5cf3fcd0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-calc-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">c2789f1f96ba02534cbe7f77aaabbb3e367dfc3dfa3a6c1b2c9ca52e5404f8d5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ts-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">fc38290374e03017e8f35cdc60a81faf98cd1455a6e9117cc468ae50c67d3e79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-pdfimport-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">a2f168c701db4a434bad2436e2e2795b1f91b84a70dcad6b2e64b2ced09d1230</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-wiki-publisher-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">54b45782ae9628aac124796de2e4224a09e779a04a4b3ab0d83ec6732b024c1b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-kn-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">2a9abeec10f406064647b7a46c5a0588b302cf89b0b015cc5a6cdf8dffefffa0</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-opensymbol-fonts-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">b141de5189fa7573646cbb08dc65d561b1beafe0edd68e5badf12a9e15e15802</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-is-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">a139d3ebeaea06447047a2d3252de30c9731086caea63d61719bf350a0fb781b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-pl-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">fd2ce5200825678dcb6ba97bc2ac7726974b5a4dffbd9cf6ad371cf0bacf09fc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-gu-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">d6324d6fae7150fd9a92f1cd5ca1327fd047565087751ea515b1835c978da5a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-sdk-doc-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">65d347415c0355f76babe319f909ab741e3153f0fc82d00a5ef5726c6cec25a5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-zu-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">40d97d77f1c886915eaf4849b7a2ff6a42de278a3b6c110fe7c84366e5918cc9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-sk-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">e0214ffb9bfa54ab28ca742dcd2732e4c07c54e72e9f8a704ccc9a71ce7a4c00</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ja-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">fec0d416153908d41bdc948d47532db48349c51de99816f38459f13f4b79ffc4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-as-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">27d50fadf0ed12ab02acb84733e132965821f51c822f1a81df7d3869956abfca</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-zh-Hant-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">9283cc7f2d91719614f16d828614289904446d8492c3d62c86bc10f52b69736b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-xsltfilter-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">3383e9bc305c75964a53e56e7177f0c09c0eab0eb7fd3953f99a00c449e4b8a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-impress-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">0baf365666ebb8eda88670c3ec24fb6af2e05d083c7ddc49fce9594a33b5cb05</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-pyuno-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">4c4f93f88531f114e297b721f1a8789c0bc709dd1ed630153cd93625c7276596</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-tr-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">5ef84cb299e9d9ae49e4a2faa73b0bafd27d4c93dda1b8bdfe12000a05c5a52f</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-mn-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">b8c52bd7f4090b5d812c34c5826fcb69fc98dca91f2a6bae42787ffe4e4f20cc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-nlpsolver-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">df7f1913570ac5e40c22193680c5c60c8cdff2ecf0017e384daa311bcc38b871</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-lt-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">21da45baa307a9896e47a1287e436fe0409afde1d768de1fab7ece0fce4e5abb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-en-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">e1dfd5b8c14a9f11fb5a97d77c8badeec04391b6cdedc8ded799489250bdfb37</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-it-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">652ef3676aed9c1a0bb953841d75a48859e233865c609df39145446b4ef940c4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-uk-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">bf04d1e2b522f061cc0d1172d0ba9aed95a55e3e425612c47b4fe38d10ff617c</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-sk-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">015cf1d95087ce97353f6360fa9c29f79dd82cf477bd704fa5f26ecfd398efc1</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>autocorr-ro-4.2.8.2-11.el6_7.1.noarch.rpm</filename><sum type="sha256">929d9295a7e94717d04c8aaa7d2ca2d82dc81b52c8f8c3861d32705db362d932</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-et-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">83c97aac81877887e4b208b0f64f37c676379afc607c4fd149a11f5294ccd568</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-es-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">ccd9a49e2b8bde5d6ef99492ed34d2b488791b49bf9cb421c1bfe0027db2a593</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-ta-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">40f9395bd8ed36533ccad4782773138bc4986585f935770724b0574b408bcb70</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nn-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">b91b4530b48caba6b18891a128f5ba8eb2898b3e68fc3470b908392f2791373f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-nb-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">ea8c9e1a509bbdc8c72e80748d5080ff06d87fe108786203f7f8f3b5db991b8b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="11.el6_7.1" src="libreoffice-4.2.8.2-11.el6_7.1.src.rpm" version="4.2.8.2"><filename>libreoffice-langpack-fi-4.2.8.2-11.el6_7.1.x86_64.rpm</filename><sum type="sha256">09d8056e782de995c8386607dc28d8b8eb307b4bad0b44e063b3291574a49f7d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551" id="CVE-2015-4551" title="Libreoffice: Arbitrary File Disclosure In Calc And Writer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212" id="CVE-2015-5212" title="Libreoffice: Integer Underflow In Printersetup Length" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213" id="CVE-2015-5213" title="Libreoffice: Integer Overflow In Doc Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214" id="CVE-2015-5214" title="Libreoffice: Bookmarks In Doc Documents Are Insufficiently Checked Causing Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2619" id="RHSA-2015:2619-1" title="Rhsa-2015:2619-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278812" id="1278812" title="Libreoffice: Arbitrary File Disclosure In Calc And Writer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278820" id="1278820" title="Libreoffice: Integer Underflow In Printersetup Length" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278824" id="1278824" title="Libreoffice: Integer Overflow In Doc Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278827" id="1278827" title="Libreoffice: Bookmarks In Doc Documents Are Insufficiently Checked Causing Memory Corruption" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2636-1</id><title>Kernel</title><description>* A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. (CVE-2015-2925, Important) 
* It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) 
* A race condition flaw was found in the way the Linux kernel's IPC subsystem initialized certain fields in an IPC object structure that were later used for permission checking before inserting the object into a globally visible list. A local, unprivileged user could potentially use this flaw to elevate their privileges on the system. (CVE-2015-7613, Important) 
* It was found that the Linux kernel's keys subsystem did not correctly garbage collect uninstantiated keyrings. A local attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-7872, Important) 
This update also fixes the following bugs: 
* Previously, Human Interface Device (HID) ran a report on an unaligned buffer, which could cause a page fault interrupt and an oops when the end of the report was read. This update fixes this bug by padding the end of the report with extra bytes, so the reading of the report never crosses a page boundary. As a result, a page fault and subsequent oops no longer occur. 
* The NFS client was previously failing to detect a directory loop for some NFS server directory structures. This failure could cause NFS inodes to remain referenced after attempting to unmount the file system, leading to a kernel crash. Loop checks have been added to VFS, which effectively prevents this problem from occurring. 
* Due to a race whereby the nfs_wb_pages_cancel() and nfs_commit_release_pages() calls both removed a request from the nfs_inode struct type, the kernel panicked with negative nfs_inode.npages count. The provided upstream patch performs the required serialization by holding the inode i_lock over the check of PagePrivate and locking the request, thus preventing the race and kernel panic from occurring. 
* Due to incorrect URB_ISO_ASAP semantics, playing an audio file using a USB sound card could previously fail for some hardware configurations. This update fixes the bug, and playing audio from a USB sound card now works as expected. 
* Inside hugetlb, region data structures were protected by a combination of a memory map semaphore and a single hugetlb instance mutex. However, a page-fault scalability improvement backported to the kernel on previous releases removed the single hugetlb instance mutex and introduced a new mutex table, making the locking combination insufficient, leading to possible race windows that could cause corruption and undefined behavior. This update fixes the problem by introducing a required spinlock to the region tracking functions for proper serialization. The problem only affects software using huge pages through hugetlb interface. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm</filename><sum type="sha256">eeacc4ff05945f3d5137d417c03a313bf77fe659e0c70389fea14e47341fef7e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">3e33feae94605ff946d68522797edb20a145f5bd25324b85207fc2fbb0c89171</sum></package><package arch="x86_64" name="perf" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">c75e1aca4dcf5d340001ffca1a44204f1904457b5ed58e79af4ca2851970d0fd</sum></package><package arch="x86_64" name="kernel-headers" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">7d69099d8043633a07351413ed181a735f9453c285bf30be9238203be850af21</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm</filename><sum type="sha256">0dd28907c3304f1c4f99ef8f81ea249cbb95069808954301dee4515046ccf222</sum></package><package arch="x86_64" name="kernel-debug" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">479fecd4ca0b38e3743e3c0451ace4160ed1d94cb5f1c1af0b549cc526d0cc5e</sum></package><package arch="noarch" name="kernel-doc" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.12.1.el6.noarch.rpm</filename><sum type="sha256">b13f65ca8763bb35c1a60aff3c16a2133a83748ac722f2accdefb5fe8c3bad2d</sum></package><package arch="x86_64" name="kernel" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">ab01ff106524427124c0c90ae04291267a72befb00423b9cd9438829fa8cc080</sum></package><package arch="i686" name="kernel-debug-devel" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm</filename><sum type="sha256">8802d1aab8ebf5ab472b27372467643d4302bebd937596019f8895548bbbd76a</sum></package><package arch="x86_64" name="kernel-devel" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">f37783c4f09c7f38603f0f75fa44de55fca63d3902f4705664c9254d0711e5b5</sum></package><package arch="x86_64" name="python-perf" release="573.12.1.el6" src="kernel-2.6.32-573.12.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.12.1.el6.x86_64.rpm</filename><sum type="sha256">ca63c35eb14629d46408c9bbf55e020fc67be8973d09daf42f1f1c4028ecc450</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2925" id="CVE-2015-2925" title="Kernel: Vfs: Do Not Allow Escaping From Bind Mounts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" id="CVE-2015-5307" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Ac Exception" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613" id="CVE-2015-7613" title="Kernel: Unauthorized Access To Ipc Objects With Sysv Shm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" id="CVE-2015-7872" title="Kernel: Keyrings Crash Triggerable By Unprivileged User" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" id="CVE-2015-8104" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Db Exception" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2636" id="RHSA-2015:2636-1" title="Rhsa-2015:2636-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1209367" id="1209367" title="Kernel: Vfs: Do Not Allow Escaping From Bind Mounts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268270" id="1268270" title="Kernel: Unauthorized Access To Ipc Objects With Sysv Shm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272371" id="1272371" title="Kernel: Keyrings Crash Triggerable By Unprivileged User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277172" id="1277172" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Ac Exception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278496" id="1278496" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Db Exception" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2655-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) 
Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm</filename><sum type="sha256">f1683f87568ee1f6d80d49b24bd5cd76db2f5cd32c8a7b23bd8486d1ef5f9e78</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.5.i686.rpm</filename><sum type="sha256">1e95d14f04f66c5edf8c004c03169e8a6dbfecab2723ef2a96773181a8f21b73</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm</filename><sum type="sha256">ac137ba9931d0e2ea54f103e901c0892bf9a9a44e1a3c59b6e08a4eb13b2e441</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm</filename><sum type="sha256">be2bea96a9b50e0e7b2fbdc2a934e13714108b5e5860566b626f14867ce0de0b</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.5.i686.rpm</filename><sum type="sha256">3fdea44c33476215c1186b519600a83082950c0a7959d0eb493d6c14506a415e</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm</filename><sum type="sha256">cefff6f753cb73a432575f43631c0c9dc596e730328041b36112a9a992bb4544</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm</filename><sum type="sha256">bbd4528db275a32aa8a95e97e0ff7ee7283fb78cccd33ca0a20b7f0f16f33351</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.5" src="bind-9.8.2-0.37.rc1.el6_7.5.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.5.x86_64.rpm</filename><sum type="sha256">6d4f554885f811e426944893cac0835c0be8984bb8bfc20003740da974982a8f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" id="CVE-2015-8000" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2655" id="RHSA-2015:2655-1" title="Rhsa-2015:2655-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291176" id="1291176" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2657-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7210, CVE-2015-7212, CVE-2015-7213, CVE-2015-7222) 
A flaw was found in the way Firefox handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same- origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="2.el6_7" src="firefox-38.5.0-2.el6_7.src.rpm" version="38.5.0"><filename>firefox-38.5.0-2.el6_7.i686.rpm</filename><sum type="sha256">8b3c90d31e4313ae86f3dbbdc21b7214e5c7a1aa87671052ca130f988765fedc</sum></package><package arch="x86_64" name="firefox" release="2.el6_7" src="firefox-38.5.0-2.el6_7.src.rpm" version="38.5.0"><filename>firefox-38.5.0-2.el6_7.x86_64.rpm</filename><sum type="sha256">a84b2f9310ffb82759b5183e21d4ef99de7d1a7774f758629b237bb5d1a63d14</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" id="CVE-2015-7201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" id="CVE-2015-7205" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" id="CVE-2015-7210" title="Mozilla: Use-After-Free In Webrtc When Datachannel Is Used After Being Destroyed (Mfsa 2015-138)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" id="CVE-2015-7212" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" id="CVE-2015-7213" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" id="CVE-2015-7214" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" id="CVE-2015-7222" title="Mozilla: Integer Underflow And Buffer Overflow Processing Mp4 Metadata In Libstagefright (Mfsa 2015-147)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2657" id="RHSA-2015:2657-1" title="Rhsa-2015:2657-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291571" id="1291571" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291585" id="1291585" title="Mozilla: Use-After-Free In Webrtc When Datachannel Is Used After Being Destroyed (Mfsa 2015-138)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291587" id="1291587" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291595" id="1291595" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291596" id="1291596" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291597" id="1291597" title="Mozilla: Integer Underflow And Buffer Overflow Processing Mp4 Metadata In Libstagefright (Mfsa 2015-147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291600" id="1291600" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2694-1</id><title>Qemu-Kvm</title><description>A heap-based buffer overflow flaw was discovered in the way QEMU's AMD PC- Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user (with the CAP_SYS_RAWIO capability) inside a guest could use this flaw to crash the host QEMU process (resulting in denial of service) or, potentially, execute arbitrary code with privileges of the host QEMU process. (CVE-2015-7504) 
A buffer overflow flaw was found in the way QEMU's AMD PC-Net II emulation validated certain received packets from a remote host in non-loopback mode. A remote, unprivileged attacker could potentially use this flaw to execute arbitrary code on the host with the privileges of the QEMU process. Note that to exploit this flaw, the guest network interface must have a large MTU limit. (CVE-2015-7512) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.479.el6_7.3" src="qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm</filename><sum type="sha256">65e8eb8034236ab0f8acd7e9390b5fecb398a3d3ecffaefea29eb202f29edf9d</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.479.el6_7.3" src="qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm</filename><sum type="sha256">406c12ee32a5018b14f49c2a768e2b0f4a9a1c4219cbfc87937824d998b530f4</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.479.el6_7.3" src="qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm</filename><sum type="sha256">c1c2918046f7696d7a9d97d3ea7487359c10ff83d566293c7863975fefb7db5c</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.479.el6_7.3" src="qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm</filename><sum type="sha256">132ca31c58e8017d19207ef4af05f31c1bc0ed649c074333d3c87839471f3fc1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" id="CVE-2015-7504" title="Qemu: Net: Pcnet: Heap Overflow Vulnerability In Pcnet_Receive" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" id="CVE-2015-7512" title="Qemu: Net: Pcnet: Buffer Overflow In Non-Loopback Mode" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2694" id="RHSA-2015:2694-1" title="Rhsa-2015:2694-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261461" id="1261461" title="Qemu: Net: Pcnet: Heap Overflow Vulnerability In Pcnet_Receive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285061" id="1285061" title="Qemu: Net: Pcnet: Buffer Overflow In Non-Loopback Mode" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0001-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7212, CVE-2015-7213) 
A flaw was found in the way Thunderbird handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same-origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_7" src="thunderbird-38.5.0-1.el6_7.src.rpm" version="38.5.0"><filename>thunderbird-38.5.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">a67c7d3928fd98263671878b26ab9a98aa69af0a5a6c28d26a46a10a64295613</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" id="CVE-2015-7201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" id="CVE-2015-7205" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" id="CVE-2015-7212" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" id="CVE-2015-7213" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" id="CVE-2015-7214" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0001" id="RHSA-2016:0001-1" title="Rhsa-2016:0001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291571" id="1291571" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291587" id="1291587" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291595" id="1291595" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291596" id="1291596" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291600" id="1291600" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0005-1</id><title>Rpcbind</title><description>A use-after-free flaw related to the PMAP_CALLIT operation and TCP/UDP connections was discovered in rpcbind. A remote attacker could possibly exploit this flaw to crash the rpcbind service by performing a series of UDP and TCP calls. (CVE-2015-7236) 
If the rpcbind service is running, it will be automatically restarted after installing this update.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="rpcbind" release="11.el6_7" src="rpcbind-0.2.0-11.el6_7.src.rpm" version="0.2.0"><filename>rpcbind-0.2.0-11.el6_7.x86_64.rpm</filename><sum type="sha256">39f794cc9595f0fb161e4dcafd78ab713b9cee3b27d5b08ad2633a590d5ba854</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" id="CVE-2015-7236" title="Rpcbind: Use-After-Free Vulnerability In Pmap_Callit" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0005" id="RHSA-2016:0005-1" title="Rhsa-2016:0005-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264345" id="1264345" title="Rpcbind: Use-After-Free Vulnerability In Pmap_Callit" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0007-1</id><title>Nss</title><description>A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
For the update to take effect, all services linked to the NSS library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-pkcs11-devel" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-8.el6_7.x86_64.rpm</filename><sum type="sha256">3e0d665647674efe19b5e59567e00f0a4dd3e650e58a43ba37ed4eaafda4f464</sum></package><package arch="x86_64" name="nss-tools" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-8.el6_7.x86_64.rpm</filename><sum type="sha256">e4cec79e49bf12de6da01e657de94e7ea7e43b0f0f4f68ac78f81cf1acb4bf41</sum></package><package arch="i686" name="nss-devel" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-8.el6_7.i686.rpm</filename><sum type="sha256">bba9318f45bb7a116e9cd5d807c883914e788a7fa8686011da7f6ad361b7bf22</sum></package><package arch="x86_64" name="nss-sysinit" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-sysinit-3.19.1-8.el6_7.x86_64.rpm</filename><sum type="sha256">f9265eea4551ed838c50774ec2da35781b0e16f3da594b03222d89718a335931</sum></package><package arch="i686" name="nss-pkcs11-devel" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-8.el6_7.i686.rpm</filename><sum type="sha256">281c82e96fedf37e04b93c03a8d0803e4a6962494a5bc9b6669cfa96aadfa068</sum></package><package arch="x86_64" name="nss" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-3.19.1-8.el6_7.x86_64.rpm</filename><sum type="sha256">b7a4186e7ee22bd20a025e01f032d832bc5bdd4a441ca23cc5bb1e27f0e84cfe</sum></package><package arch="x86_64" name="nss-devel" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-8.el6_7.x86_64.rpm</filename><sum type="sha256">56035ba8802b166a655a746ec8163beb55fc184fd1de7771c03c63bc07cd39aa</sum></package><package arch="i686" name="nss" release="8.el6_7" src="nss-3.19.1-8.el6_7.src.rpm" version="3.19.1"><filename>nss-3.19.1-8.el6_7.i686.rpm</filename><sum type="sha256">df1b720196bfd38befc97ce2d63484557a02394829b3ed89daa5e1d8474c1dea</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0007" id="RHSA-2016:0007-1" title="Rhsa-2016:0007-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0008-1</id><title>Openssl</title><description>A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl-devel" release="42.el6_7.2" src="openssl-1.0.1e-42.el6_7.2.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-42.el6_7.2.i686.rpm</filename><sum type="sha256">e1e6bf93611b37a6633658908a884f0d0a54145928c866543b5bf9754cef931f</sum></package><package arch="x86_64" name="openssl" release="42.el6_7.2" src="openssl-1.0.1e-42.el6_7.2.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-42.el6_7.2.x86_64.rpm</filename><sum type="sha256">0947335487ef1bd658f9a273cdaf3712857e757de1ac0124af9e4803e3dc8580</sum></package><package arch="i686" name="openssl" release="42.el6_7.2" src="openssl-1.0.1e-42.el6_7.2.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-42.el6_7.2.i686.rpm</filename><sum type="sha256">dafce543c33dc27142b132b85cf31eb2be698559f64a2c490b5d17219cf888c2</sum></package><package arch="x86_64" name="openssl-perl" release="42.el6_7.2" src="openssl-1.0.1e-42.el6_7.2.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-42.el6_7.2.x86_64.rpm</filename><sum type="sha256">47b3ace300cbfa2f806c60c0eb6928a9854f49fb0dcc8adb9cc07d6c931cd6e3</sum></package><package arch="x86_64" name="openssl-static" release="42.el6_7.2" src="openssl-1.0.1e-42.el6_7.2.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-42.el6_7.2.x86_64.rpm</filename><sum type="sha256">7be75a6580c6595de61fa83e9d6d1dbc5a66aaab01533a7e49f10ad43612ba1c</sum></package><package arch="x86_64" name="openssl-devel" release="42.el6_7.2" src="openssl-1.0.1e-42.el6_7.2.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-42.el6_7.2.x86_64.rpm</filename><sum type="sha256">7289e5d360e76b857c089d9284454c83b6653f153b045f63ea7d3294c1913a52</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0008" id="RHSA-2016:0008-1" title="Rhsa-2016:0008-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0009-1</id><title>Libldb</title><description>A denial of service flaw was found in the ldb_wildcard_compare() function of libldb. A remote attacker could send a specially crafted packet that, when processed by an application using libldb (for example the AD LDAP server in Samba), would cause that application to consume an excessive amount of memory and crash. (CVE-2015-3223) 
A memory-read flaw was found in the way the libldb library processed LDB DN records with a null byte. An authenticated, remote attacker could use this flaw to read heap-memory pages from the server. (CVE-2015-5330)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pyldb-devel" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>pyldb-devel-1.1.13-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">c00477390d82aa8b58a58498b3c7a7de10870da144dbfc8948fce9864322d6f8</sum></package><package arch="x86_64" name="pyldb" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>pyldb-1.1.13-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">0e21027e0d9a24b434b5fba3fd50c1c123be793ea88006871a9905a913879d16</sum></package><package arch="i686" name="libldb-devel" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>libldb-devel-1.1.13-3.el6_7.1.i686.rpm</filename><sum type="sha256">0e99e9c30540f8e386555da338f5dc70422723d8c04e37606ee9b41812d77be1</sum></package><package arch="i686" name="libldb" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>libldb-1.1.13-3.el6_7.1.i686.rpm</filename><sum type="sha256">021e97eedf82747d7531748525707588a8ba698de61cc0994cc5325a48c6412c</sum></package><package arch="x86_64" name="ldb-tools" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>ldb-tools-1.1.13-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">ba56e59e95a2449453d2d4213a58c84feb486de9081fe7a0224737b7d0185034</sum></package><package arch="x86_64" name="libldb" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>libldb-1.1.13-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">e309b82f5d3f2971cd658d516b3105c22125f85d83d366679472daa3d0fc8634</sum></package><package arch="x86_64" name="libldb-devel" release="3.el6_7.1" src="libldb-1.1.13-3.el6_7.1.src.rpm" version="1.1.13"><filename>libldb-devel-1.1.13-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">1acc558f862ba0a2af88e47619413d06c43d65cf0931b964b9754c2823f4b4fb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" id="CVE-2015-3223" title="Libldb: Remote Dos In Samba (Ad) Ldap Server" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" id="CVE-2015-5330" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0009" id="RHSA-2016:0009-1" title="Rhsa-2016:0009-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281326" id="1281326" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290287" id="1290287" title="Libldb: Remote Dos In Samba (Ad) Ldap Server" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0010-2</id><title>Samba4</title><description>A denial of service flaw was found in the LDAP server provided by the AD DC in the Samba process daemon. A remote attacker could exploit this flaw by sending a specially crafted packet, which could cause the server to consume an excessive amount of memory and crash. (CVE-2015-7540) 
Multiple buffer over-read flaws were found in the way Samba handled malformed inputs in certain encodings. An authenticated, remote attacker could possibly use these flaws to disclose portions of the server memory. (CVE-2015-5330) 
A man-in-the-middle vulnerability was found in the way "connection signing" was implemented by Samba. A remote attacker could use this flaw to downgrade an existing Samba client connection and force the use of plain text. (CVE-2015-5296) 
A missing access control flaw was found in Samba. A remote, authenticated attacker could use this flaw to view the current snapshot on a Samba share, despite not having DIRECTORY_LIST access rights. (CVE-2015-5299) 
An access flaw was found in the way Samba verified symbolic links when creating new files on a Samba share. A remote attacker could exploit this flaw to gain access to files outside of Samba's share path. (CVE-2015-5252) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-dc" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">28c8d1f44bdf77b5702038f6b1eef083206bf3a5cf3912f8645568c3ffc5c17d</sum></package><package arch="x86_64" name="samba4" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">7392ec5c1ba8c5706eaf63b9d560b4047f18933ec99e0a4e2657b338cd8dd6c7</sum></package><package arch="x86_64" name="samba4-devel" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-devel-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">8cb2097c7645f1ad329063770274927843005d601d617399a0d0e5a76ce430c3</sum></package><package arch="x86_64" name="samba4-client" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-client-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">0e940b4d48eb2171bee26df82bd65a5f6c3d14bf7c1656952803a6dc1ab68d2c</sum></package><package arch="x86_64" name="samba4-python" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-python-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">ac08e6c195ddc94176c28e757cfeacaae219815d0794b10fa1724f274a06607d</sum></package><package arch="x86_64" name="samba4-pidl" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-pidl-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">be7d4d5848f18fc130077d1b055ed584850a695bf45b923e5a761b7c3e46d2a6</sum></package><package arch="x86_64" name="samba4-libs" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-libs-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">d542e29f9df75b3909f00a040ef242d94e04f28df2d558e500885fd1f53ec6b0</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-krb5-locator-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">8e7beba9dcca82418e5960c49935cc71cffd1673d5f2dada3433ab9c7c6ce571</sum></package><package arch="x86_64" name="samba4-winbind" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">3a2b07a8a1831c4e882ccc39b04e1ac8ea6203348809a15abc5b768e7350fe47</sum></package><package arch="x86_64" name="samba4-dc-libs" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-libs-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">b4917c004f091d87a52d46a01d77f21131dadea65114931ffce6751c55a54429</sum></package><package arch="x86_64" name="samba4-test" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-test-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">bb47f4971a419c88e56070d523cc85744d7f69f74af3d9ba87f5ddac40eb0cf3</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-clients-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">dcf90a385a949237b958acb61375a8dcbfa86495814285fdd3ada53bcd5b09a1</sum></package><package arch="x86_64" name="samba4-common" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-common-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">df3fdd2b3e46c2b03b837356fadd3e88619e28e8ff15200d40e072c663592240</sum></package><package arch="x86_64" name="samba4-swat" release="67.el6_7.rc4" src="samba4-4.0.0-67.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-swat-4.0.0-67.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">798d5477db14f86bf28a8c1be35c193827dc5c51e061af5fabc0eff8a7ef5eb5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" id="CVE-2015-5252" title="Samba: Insufficient Symlink Verification In Smbd" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" id="CVE-2015-5296" title="Samba: Client Requesting Encryption Vulnerable To Downgrade Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" id="CVE-2015-5299" title="Samba: Missing Access Control Check In Shadow Copy Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" id="CVE-2015-5330" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" id="CVE-2015-7540" title="Samba: Dos To Ad-Dc Due To Insufficient Checking Of Asn1 Memory Allocation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0010" id="RHSA-2016:0010-2" title="Rhsa-2016:0010-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276126" id="1276126" title="Samba: Missing Access Control Check In Shadow Copy Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281326" id="1281326" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288451" id="1288451" title="Samba: Dos To Ad-Dc Due To Insufficient Checking Of Asn1 Memory Allocation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290288" id="1290288" title="Samba: Insufficient Symlink Verification In Smbd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290292" id="1290292" title="Samba: Client Requesting Encryption Vulnerable To Downgrade Attack" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0011-1</id><title>Samba</title><description>A man-in-the-middle vulnerability was found in the way "connection signing" was implemented by Samba. A remote attacker could use this flaw to downgrade an existing Samba client connection and force the use of plain text. (CVE-2015-5296) 
A missing access control flaw was found in Samba. A remote, authenticated attacker could use this flaw to view the current snapshot on a Samba share, despite not having DIRECTORY_LIST access rights. (CVE-2015-5299) 
An access flaw was found in the way Samba verified symbolic links when creating new files on a Samba share. A remote attacker could exploit this flaw to gain access to files outside of Samba's share path. (CVE-2015-5252) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-winbind-krb5-locator" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">2e6f3d66c37b0d99f7bd56daa93e9af3d83f120409967b865cf2c4d7c244ee41</sum></package><package arch="x86_64" name="samba" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">51ff4be2770a016678d2d36c13717e456d95caad6f575e6ba86698b6d8299a37</sum></package><package arch="x86_64" name="samba-doc" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">9b4b28403afd75cb16f62bee3d7ed697f71e11f532363d55300362c7b507626e</sum></package><package arch="x86_64" name="libsmbclient-devel" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">67f4700da463eefe23256f555f3d0838f9b7ab46c17c2230b328d368261286fe</sum></package><package arch="x86_64" name="samba-winbind" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">f8d9535f6841b5e3fa0faecdeb4113fcb3e7c7e6f3ddf561dc6a4494d31e9bf5</sum></package><package arch="x86_64" name="libsmbclient" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">609d4726e8b21e562953acebaff98c1d924a0e40fc9335485d76f458afa427ee</sum></package><package arch="x86_64" name="samba-client" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">1f4618359de7f492dca2b8cd837223540833a1749afd50a223942f16411289f5</sum></package><package arch="i686" name="libsmbclient-devel" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-24.el6_7.i686.rpm</filename><sum type="sha256">c515d7974bec80ea7d8c279994b1535f9d1071ae91775ddf310cc147dcc7ee36</sum></package><package arch="x86_64" name="samba-winbind-clients" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">1e913041f779e70819de13dceba174fdcdb163293389085454909ae76ebe3193</sum></package><package arch="i686" name="samba-common" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-24.el6_7.i686.rpm</filename><sum type="sha256">38a23f85bfb5523f0713cb5a1c4bb3f2e228440b2c77e7c467c64db1913830e2</sum></package><package arch="x86_64" name="samba-winbind-devel" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">6f49a90fd850f2507409e19c1e158cae630d98935dc3574edadd4027b6f200f4</sum></package><package arch="i686" name="libsmbclient" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-24.el6_7.i686.rpm</filename><sum type="sha256">cc90458f0b10823729f153c51b08dc62c33d9d50dff97c472d38c3f1a2a2012b</sum></package><package arch="x86_64" name="samba-glusterfs" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">21d6528ea3df1e724de0615af62336c1e2bf8a6f9dfb364877805b40dbdae5f0</sum></package><package arch="x86_64" name="samba-swat" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">3a1892b7a65a6552f763783c25ca5cf16d52d78e7d347e681c85cb04a3b8132d</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">26e66f9263378e63e361f1a93faa2cb55176316c70288bd794b5a279de14b6f3</sum></package><package arch="x86_64" name="samba-common" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-24.el6_7.x86_64.rpm</filename><sum type="sha256">8afe1e1d9078312101e4dc0874c239406d44ea42da2677c15459cb556ba1a518</sum></package><package arch="i686" name="samba-winbind-clients" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-24.el6_7.i686.rpm</filename><sum type="sha256">888e3c520a86ea523fd2b927ca288b6b6d209d7800c9ebf6f81dca2c14167967</sum></package><package arch="i686" name="samba-winbind-devel" release="24.el6_7" src="samba-3.6.23-24.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-24.el6_7.i686.rpm</filename><sum type="sha256">81e7c61a520764ec678168d4a9f04b382c23abbfaf79409f00f2047b57cf6940</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" id="CVE-2015-5252" title="Samba: Insufficient Symlink Verification In Smbd" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" id="CVE-2015-5296" title="Samba: Client Requesting Encryption Vulnerable To Downgrade Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" id="CVE-2015-5299" title="Samba: Missing Access Control Check In Shadow Copy Code" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0011" id="RHSA-2016:0011-1" title="Rhsa-2016:0011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276126" id="1276126" title="Samba: Missing Access Control Check In Shadow Copy Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290288" id="1290288" title="Samba: Insufficient Symlink Verification In Smbd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290292" id="1290292" title="Samba: Client Requesting Encryption Vulnerable To Downgrade Attack" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0012-1</id><title>Gnutls</title><description>A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
For the update to take effect, all applications linked to the GnuTLS library must be restarted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="gnutls-devel" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-19.el6_7.x86_64.rpm</filename><sum type="sha256">63299b51f0f38dd430c6af93549e7e1d12bd3c52bcd9bf013a6e6fb533a55bc8</sum></package><package arch="i686" name="gnutls-guile" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-19.el6_7.i686.rpm</filename><sum type="sha256">6b531da5e540a007fff1efb9e93688c558c6c76375253937b1481f59f187b115</sum></package><package arch="i686" name="gnutls" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-19.el6_7.i686.rpm</filename><sum type="sha256">9a6467a0e55463080d8489a7d916f62889f57d09e8f5d7a786f04903f0a513af</sum></package><package arch="x86_64" name="gnutls-utils" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-utils-2.8.5-19.el6_7.x86_64.rpm</filename><sum type="sha256">e1a93754436c8ade7f80635fd216ed9c7dc66c0c09da10d9af976474a2672a57</sum></package><package arch="x86_64" name="gnutls-guile" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-guile-2.8.5-19.el6_7.x86_64.rpm</filename><sum type="sha256">6054ce4616f798520115b01132a3b9ca730a1e7398fd5408a19fb211b51f2f0c</sum></package><package arch="i686" name="gnutls-devel" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-devel-2.8.5-19.el6_7.i686.rpm</filename><sum type="sha256">e333f5b5295895c36e015f0203cbacca684efa597e4359c4a88ffcea04f4e48d</sum></package><package arch="x86_64" name="gnutls" release="19.el6_7" src="gnutls-2.8.5-19.el6_7.src.rpm" version="2.8.5"><filename>gnutls-2.8.5-19.el6_7.x86_64.rpm</filename><sum type="sha256">7506a6b55ad1507f016c48a53e82fcaee6adf61aea429dadc45faf81eab4d8e8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0012" id="RHSA-2016:0012-1" title="Rhsa-2016:0012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0050-1</id><title>Java-1.8.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the password-based encryption (PBE) implementation in the Libraries component in OpenJDK used an incorrect key length. This could, in certain cases, lead to generation of keys that were weaker than expected. (CVE-2016-0475) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-01-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-demo-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">9a37cb883cabd10d2c4b79efc6b5df2739efd00617b9c75b0bde2ad2343502a6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">3c58f3487db822f5c0da4d609fd1855d0fd8ead4bca1688cdd2573c34c5f3982</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">91e6ab024252eb77cd85d09ed9bb80c02fb2f406e2dddcdab7bc34425c5d9951</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">6190344b8c6ebf12debebba24c75703f9521209e99aa1ae61b6536d3fa98069d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-src-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">c08f7f88ec4c5370bfcb54dc7e0352885b7fae04772c24932a17938b07551848</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-src-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">9f1fec96ce9951276abf147528ff2ea3fd3511705ef1b29ae77352d9ac8baed4</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-javadoc-1.8.0.71-1.b15.el6_7.noarch.rpm</filename><sum type="sha256">74a8deba339bea07386e2e61bdd11f097fe6c5367bd3ffb7e12925248cf78769</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">7438f084a697923b04e6c9f707108ae441ad96bbc8ca536fa22d67beedf255f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-devel-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">415a8575c6242782adb5063462cc7fcf78b0e55741eae4b188e5b57658e0fece</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-debug-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">1d71cc1b67f4adc27f4da9b6667fb73cba5d9799adc485bf06b0cc6adad83c8f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b15.el6_7" src="java-1.8.0-openjdk-1.8.0.71-1.b15.el6_7.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-headless-1.8.0.71-1.b15.el6_7.x86_64.rpm</filename><sum type="sha256">34a4125e6b2fa86d2ad30fdd772c375f5410f40fbe79cb96a4fa803929ac7c0d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0475" id="CVE-2016-0475" title="Openjdk: Pbe Incorrect Key Lengths (Libraries, 8138589)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0050" id="RHSA-2016:0050-1" title="Rhsa-2016:0050-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298949" id="1298949" title="Openjdk: Pbe Incorrect Key Lengths (Libraries, 8138589)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0053-1</id><title>Java-1.7.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
Multiple flaws were discovered in the Libraries, Networking, and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4871, CVE-2016-0402, CVE-2016-0448) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-01-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.4.0.el6_7" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el6_7.x86_64.rpm</filename><sum type="sha256">910ccfb9d15a75080ea996915a7fcc3dda0e1b1d390bbf15181422d0bf0b02d7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.4.0.el6_7" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el6_7.x86_64.rpm</filename><sum type="sha256">3598b41c4146a55ff8ff63e2285c050df87a1afa059ac9390e8e906dad2c8008</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.4.0.el6_7" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7.x86_64.rpm</filename><sum type="sha256">6df9397748f9ea97f0edfce211255a83477dd1984f11930d3aa22dafef6e546f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.4.0.el6_7" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el6_7.x86_64.rpm</filename><sum type="sha256">9e5d250afe697db0c5037268e98cbae5ab05e1476806ca48e80bbe713d05517e</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.4.0.el6_7" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el6_7.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el6_7.noarch.rpm</filename><sum type="sha256">b92229e59b53b81a0c10d5650e353f60ce3166cb16c883951b6d606c90797e3c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" id="CVE-2015-4871" title="Oracle Jdk: Unspecified Vulnerability Fixed In 7U91 (Libraries)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0053" id="RHSA-2016:0053-1" title="Rhsa-2016:0053-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273859" id="1273859" title="Oracle Jdk: Unspecified Vulnerability Fixed In 7U91 (Libraries)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0063-1</id><title>Ntp</title><description>It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client. (CVE-2015-8138) 
After installing the update, the ntpd daemon will restart automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ntp-doc" release="5.el6_7.4" src="ntp-4.2.6p5-5.el6_7.4.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm</filename><sum type="sha256">fb28023239809c722a2baaa7d6d6d10f1bda9fbf30e0721c877fb32dcc14d8b0</sum></package><package arch="x86_64" name="ntp" release="5.el6_7.4" src="ntp-4.2.6p5-5.el6_7.4.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-5.el6_7.4.x86_64.rpm</filename><sum type="sha256">e9a2c2b591b00fcb148310e677dfcc24572291982e29579079b3f04fa679ddda</sum></package><package arch="x86_64" name="ntp-perl" release="5.el6_7.4" src="ntp-4.2.6p5-5.el6_7.4.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm</filename><sum type="sha256">07d1479916edee0b004d8077d88614b8e3ad189e4b6c7d4b977bf00fb3c71401</sum></package><package arch="x86_64" name="ntpdate" release="5.el6_7.4" src="ntp-4.2.6p5-5.el6_7.4.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm</filename><sum type="sha256">ebeb30debcbad674ff71f307d7eb002663723c1192705706eed552be5034432a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" id="CVE-2015-8138" title="Ntp: Missing Check For Zero Originate Timestamp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0063" id="RHSA-2016:0063-1" title="Rhsa-2016:0063-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299442" id="1299442" title="Ntp: Missing Check For Zero Originate Timestamp" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0067-1</id><title>Java-1.6.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.10.0.el6_7" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el6_7.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el6_7.x86_64.rpm</filename><sum type="sha256">a0f7bf2b4f90a04c219ca834cb36671de611edca4701f14afd717d67f8fc0f15</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.10.0.el6_7" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el6_7.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el6_7.x86_64.rpm</filename><sum type="sha256">9483cc7f3fd0d1dc6dd283912dd6d146f5249993cf109768cc7e7e66fd42b4ee</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.10.0.el6_7" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el6_7.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el6_7.x86_64.rpm</filename><sum type="sha256">82e9c3bd820c79ed3cf52bec1ea38bf7c9fa6b7a4c53f323e39ff5b9ff77e3ee</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.10.0.el6_7" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el6_7.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el6_7.x86_64.rpm</filename><sum type="sha256">f108f9e88b4083d3a38a5fea00d1ea56f21142e4f6c31b9990d8c9c736672774</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.10.0.el6_7" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el6_7.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el6_7.x86_64.rpm</filename><sum type="sha256">d1fe46e6138cdd8c7e62c77b2bfa27de0fdfef9e32329f7f000eb07a2dfa7b9e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0067" id="RHSA-2016:0067-1" title="Rhsa-2016:0067-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0071-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1930, CVE-2016-1935) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_7" src="firefox-38.6.0-1.el6_7.src.rpm" version="38.6.0"><filename>firefox-38.6.0-1.el6_7.i686.rpm</filename><sum type="sha256">cdbb7c8110933e6029aee930a93511e57f674a4e676c5ae1204083a3ba0ed81b</sum></package><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-38.6.0-1.el6_7.src.rpm" version="38.6.0"><filename>firefox-38.6.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">ac18414e504f73d4bdf6a3a6f044c20e620e03de3fc2d6d8978a32109f26927d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" id="CVE-2016-1930" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" id="CVE-2016-1935" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0071" id="RHSA-2016:0071-1" title="Rhsa-2016:0071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301818" id="1301818" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301821" id="1301821" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0073-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.6.i686.rpm</filename><sum type="sha256">2375ad5e29a45db76bc2cae6353cc28f814255fd626f3d3059178d9a997cd231</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm</filename><sum type="sha256">396cd9b0dd59d8d96101d10cc52a298acacab480da3baf4b3b2d16529c29eb65</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm</filename><sum type="sha256">b2bb0ffcfa5f94a34513238b738442d66f8b6621a0206ca5ac3b08ddd2821e1f</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm</filename><sum type="sha256">d4165605171e8cb3008231e0e30570cac879aaf8d99d27af7178de4c45da7b23</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm</filename><sum type="sha256">4092121ff849762a326550a604506e2cbfa952d200fa4808eb69d199b67a0fcb</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm</filename><sum type="sha256">1df50d0eb251911472cb7a9546e945314a30d5b7f04dfcc52aeaa41fd4f03257</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.6.i686.rpm</filename><sum type="sha256">fca9f739e450a78d410010a24758298a438aa023b78671ef2ba9f90cce876b21</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.37.rc1.el6_7.6" src="bind-9.8.2-0.37.rc1.el6_7.6.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm</filename><sum type="sha256">fcdc2c8c112eb75c48ece36a0377346ea4ab736d0c23535252f29812d0addfde</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" id="CVE-2015-8704" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0073" id="RHSA-2016:0073-1" title="Rhsa-2016:0073-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299364" id="1299364" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0082-1</id><title>Qemu-Kvm</title><description>An out-of-bounds read/write flaw was discovered in the way QEMU's Firmware Configuration device emulation processed certain firmware configurations. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2016-1714) 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.479.el6_7.4" src="qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64.rpm</filename><sum type="sha256">9ae974cd5da81cd453ebc14490858d03baa25ff673790d4baff7dd0b90a2433b</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.479.el6_7.4" src="qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.479.el6_7.4.x86_64.rpm</filename><sum type="sha256">1a3607ea066db6501047868f29827460c76ae9576c2b4212a8988a59ef74d3c3</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.479.el6_7.4" src="qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.479.el6_7.4.x86_64.rpm</filename><sum type="sha256">86eefc23f3902d54b48c9ee4a8486adc124ec844b3e48be1e61e4d285dca4e7c</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.479.el6_7.4" src="qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.479.el6_7.4.x86_64.rpm</filename><sum type="sha256">69e800240301d348d268200ef2be18e3174b589a176baf29603ab01e3bb0a7c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" id="CVE-2016-1714" title="Qemu: Nvram: Oob R/W Access In Processing Firmware Configurations" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0082" id="RHSA-2016:0082-1" title="Rhsa-2016:0082-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296060" id="1296060" title="Qemu: Nvram: Oob R/W Access In Processing Firmware Configurations" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0152-1</id><title>Sos</title><description>An insecure temporary file use flaw was found in the way sos created certain sosreport files. A local attacker could possibly use this flaw  to perform a symbolic link attack to reveal the contents of sosreport  files, or in some cases modify arbitrary files and escalate their  privileges on the system. (CVE-2015-7529) 
This update also fixes the following bug: 
* Previously, when the hpasm plug-in ran the "hpasmcli" command in a Python Popen constructor or a system pipeline, the command would hang and eventually time out after 300 seconds. Sos was forced to wait for the time out to finish, unnecessarily prolonging its run time. With this update, the timeout of the "hpasmcli" command has been set to 0, eliminating the delay and speeding up sos completion time.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-02-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="sos" release="28.el6_7.2" src="sos-3.2-28.el6_7.2.src.rpm" version="3.2"><filename>sos-3.2-28.el6_7.2.noarch.rpm</filename><sum type="sha256">6ceb01e839e4c8c50eded153e9dc9b3f780bc034aa0a8220d9b880ff11bb5518</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7529" id="CVE-2015-7529" title="Sos: Usage Of Predictable Temporary Files Allows Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0152" id="RHSA-2016:0152-1" title="Rhsa-2016:0152-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1282542" id="1282542" title="Sos: Usage Of Predictable Temporary Files Allows Privilege Escalation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0175-1</id><title>Glibc</title><description>A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547) 
This update also fixes the following bugs: 
* The dynamic loader has been enhanced to allow the loading of more shared libraries that make use of static thread local storage. While static thread local storage is the fastest access mechanism it may also prevent the shared library from being loaded at all since the static storage space is a limited and shared process-global resource. Applications which would previously fail with "dlopen: cannot load any more object with static TLS" should now start up correctly. 
* A bug in the POSIX realtime support would cause asynchronous I/O or certain timer API calls to fail and return errors in the presence of large thread-local storage data that exceeded PTHREAD_STACK_MIN in size (generally 16 KiB). The bug in librt has been corrected and the impacted APIs no longer return errors when large thread-local storage data is present in the application.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-02-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glibc-devel" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">6979c81237abf1c3ad8b19d91f9d9f31104008c5e47f20d8b001d5f06a28f00a</sum></package><package arch="i686" name="glibc-devel" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.166.el6_7.7.i686.rpm</filename><sum type="sha256">0458034ba5664e53a5cc137f57e560703917782b7856e8d08b71e0b8bb142ee7</sum></package><package arch="x86_64" name="nscd" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>nscd-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">dfbde7c3f055cc0101ddd2bb555a1086cb7037e5e0a1904bb4a178ad70199b6d</sum></package><package arch="x86_64" name="glibc-utils" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">ecb4dce685ad067e114c2bae1e3c1bc799e165f815f1709fec023649b3b878e4</sum></package><package arch="x86_64" name="glibc-common" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-common-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">4e3dfaa551ef6ab527f1e3744f3c85be4948180dc9cddfd359c2ebe03453c46b</sum></package><package arch="i686" name="glibc" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-2.12-1.166.el6_7.7.i686.rpm</filename><sum type="sha256">c016e9e823937d38c70d2fec46be2fb77950583507f25d24c61207290f3d93c7</sum></package><package arch="i686" name="glibc-static" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-static-2.12-1.166.el6_7.7.i686.rpm</filename><sum type="sha256">60f9605ec867ad83c4cf4d106e0214139a089be71f1d80470a9181e901bfae31</sum></package><package arch="x86_64" name="glibc-headers" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">7873f03921d6a76f7cda4f550f2d7fb18ce1ca3f033891b42ce9c4af2614771b</sum></package><package arch="x86_64" name="glibc" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">4e9ee8c91f6cf245225a10c6d9990b51be58271679a693fcfe88f5d49af925b8</sum></package><package arch="x86_64" name="glibc-static" release="1.166.el6_7.7" src="glibc-2.12-1.166.el6_7.7.src.rpm" version="2.12"><filename>glibc-static-2.12-1.166.el6_7.7.x86_64.rpm</filename><sum type="sha256">2c21125a8e14cb79dc99330ebb426cd95a6ea4a7a954ce84cb31a5be49e08d74</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" id="CVE-2015-7547" title="Glibc: Getaddrinfo Stack-Based Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0175" id="RHSA-2016:0175-1" title="Rhsa-2016:0175-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293532" id="1293532" title="Glibc: Getaddrinfo Stack-Based Buffer Overflow" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0197-1</id><title>Firefox</title><description>Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-02-23 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-38.6.1-1.el6_7.src.rpm" version="38.6.1"><filename>firefox-38.6.1-1.el6_7.x86_64.rpm</filename><sum type="sha256">1ccf371272b683eb472969082d78bf7ecdc3599d651e0987e1c648a44cf82176</sum></package><package arch="i686" name="firefox" release="1.el6_7" src="firefox-38.6.1-1.el6_7.src.rpm" version="38.6.1"><filename>firefox-38.6.1-1.el6_7.i686.rpm</filename><sum type="sha256">08499f74a2ff6f72526f7d5d6fb399cfcd74b6ae8ecb7dd24fb7f9e92b4427b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" id="CVE-2016-1521" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522" id="CVE-2016-1522" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" id="CVE-2016-1523" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0197" id="RHSA-2016:0197-1" title="Rhsa-2016:0197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305805" id="1305805" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305810" id="1305810" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305813" id="1305813" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306496" id="1306496" title="Mozilla: Vulnerabilities In Graphite 2 (Mfsa 2016-14)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0258-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1930, CVE-2016-1935) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-02-23 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_7" src="thunderbird-38.6.0-1.el6_7.src.rpm" version="38.6.0"><filename>thunderbird-38.6.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">b0a71279e70cf4378fa1ee6ba9807f326740355dcab4be98fa8889420ba39e5f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" id="CVE-2016-1930" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" id="CVE-2016-1935" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0258" id="RHSA-2016:0258-1" title="Rhsa-2016:0258-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301818" id="1301818" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301821" id="1301821" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0301-1</id><title>Openssl</title><description>A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) 
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) 
A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim's thread that is performing decryption, could use this flaw to recover RSA private keys. (CVE-2016-0702) 
A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705) 
An integer overflow flaw, leading to a NULL pointer dereference or a heap- based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) 
For the update  to take effect, all services linked to the OpenSSL library must be  restarted, or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-08 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl-devel" release="42.el6_7.4" src="openssl-1.0.1e-42.el6_7.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-42.el6_7.4.i686.rpm</filename><sum type="sha256">68b67d5ed61781084b847adcd653935cd8bfabb3e7caa7fd945a7d04e4bfd09e</sum></package><package arch="i686" name="openssl" release="42.el6_7.4" src="openssl-1.0.1e-42.el6_7.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-42.el6_7.4.i686.rpm</filename><sum type="sha256">f3dd6b0fc32dd1fc1075f84be5390ef56abaecbe03a80721e3cb461861fc7c1c</sum></package><package arch="x86_64" name="openssl" release="42.el6_7.4" src="openssl-1.0.1e-42.el6_7.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-42.el6_7.4.x86_64.rpm</filename><sum type="sha256">5ff3c2c8b9ee7bf95c098bc536e083627bd4f47bd84360626489b64e8ea2bb6b</sum></package><package arch="x86_64" name="openssl-static" release="42.el6_7.4" src="openssl-1.0.1e-42.el6_7.4.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-42.el6_7.4.x86_64.rpm</filename><sum type="sha256">a27a22096b8827f6474824b86c8075fadf10ee050e1dca7e7987b0522d8a9a96</sum></package><package arch="x86_64" name="openssl-devel" release="42.el6_7.4" src="openssl-1.0.1e-42.el6_7.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-42.el6_7.4.x86_64.rpm</filename><sum type="sha256">cb0aac3f9a09e3f2faff66201ef9c45744a60b094fd2b189156c3ec3e9770ea2</sum></package><package arch="x86_64" name="openssl-perl" release="42.el6_7.4" src="openssl-1.0.1e-42.el6_7.4.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-42.el6_7.4.x86_64.rpm</filename><sum type="sha256">96c97ab09062a2a4196aba4d43935682b157df5ae77ff6dbf34e6a1e62b4d7b1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" id="CVE-2015-3197" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" id="CVE-2016-0702" title="Openssl: Side Channel Attack On Modular Exponentiation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" id="CVE-2016-0705" title="Openssl: Double-Free In Dsa Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" id="CVE-2016-0797" title="Openssl: Bn_Hex2Bn/Bn_Dec2Bn Null Pointer Deref/Heap Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" id="CVE-2016-0800" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0301" id="RHSA-2016:0301-1" title="Rhsa-2016:0301-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301846" id="1301846" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310593" id="1310593" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310596" id="1310596" title="Openssl: Double-Free In Dsa Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310599" id="1310599" title="Openssl: Side Channel Attack On Modular Exponentiation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311880" id="1311880" title="Openssl: Bn_Hex2Bn/Bn_Dec2Bn Null Pointer Deref/Heap Corruption" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0347-1</id><title>Postgresql</title><description>An integer overflow flaw, leading to a heap-based buffer overflow, was found in the PostgreSQL handling code for regular expressions. A remote attacker could use a specially crafted regular expression to cause PostgreSQL to crash or possibly execute arbitrary code. (CVE-2016-0773) 
If the postgresql service is running, it will be automatically restarted after installing this update.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="postgresql-plperl" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-plperl-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">6f3c0347eb9f9e5888da5927837097c90ddbfb397941604552201896a3280287</sum></package><package arch="x86_64" name="postgresql-contrib" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-contrib-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">2154e6cce75c9fa84d3e61d3ead1ea3ca3aa6a5d53c5168fb7aaabf1febd363b</sum></package><package arch="x86_64" name="postgresql-docs" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-docs-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">e5037b83d3ee832170dcf71b6cb5c1cea20a327906996a1977a0d576024f47d0</sum></package><package arch="x86_64" name="postgresql-test" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-test-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">59aa0e98fd23ec5071ff3db666a7bcede4173e39dccd7818a167e57a6a6eeab2</sum></package><package arch="i686" name="postgresql" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-5.el6_7.i686.rpm</filename><sum type="sha256">76b35686f312ec379bd927a46e81499d45bea3ebd8e2536aab64cee18ecf29e1</sum></package><package arch="x86_64" name="postgresql-pltcl" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-pltcl-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">227f4053416a6987f3585c9aafea80739de5b6dddbb1c9fdc0c8526e8f504d22</sum></package><package arch="x86_64" name="postgresql-plpython" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-plpython-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">c6e81994cfb8dc892439adcef74983a07d79059aa4b8f1eb29cc965f19f09556</sum></package><package arch="i686" name="postgresql-devel" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-5.el6_7.i686.rpm</filename><sum type="sha256">4bc89d744066c2f740d57ecc84bdf94ec53b52c1a416fd39ac500d7cc56d196e</sum></package><package arch="x86_64" name="postgresql-libs" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">8890977c046dcad5fbc2341ec48fab69581daca7e7564eef6b88f601ae3fa442</sum></package><package arch="x86_64" name="postgresql-server" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-server-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">3432db7dac6110463eff84a1fed419f9b1626aa8c6dc6f925fe3f26bb135b796</sum></package><package arch="x86_64" name="postgresql" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">6a59e77b6d8b122fb2971c0ab116441b1f066e23c7d7582c271d6bde175c3f00</sum></package><package arch="i686" name="postgresql-libs" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-5.el6_7.i686.rpm</filename><sum type="sha256">f0cef825696ceeab86b72770a1620f844df466725270f1f48e1211aa27f5c179</sum></package><package arch="x86_64" name="postgresql-devel" release="5.el6_7" src="postgresql-8.4.20-5.el6_7.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-5.el6_7.x86_64.rpm</filename><sum type="sha256">f5277d0cbc8e726e4a7e41d7a662ca854a78d58937a04d2384da49b7efd302e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" id="CVE-2016-0773" title="Postgresql: Case Insensitive Range Handling Integer Overflow Leading To Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0347" id="RHSA-2016:0347-1" title="Rhsa-2016:0347-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303832" id="1303832" title="Postgresql: Case Insensitive Range Handling Integer Overflow Leading To Buffer Overflow" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0370-1</id><title>Nss-Util</title><description>A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2016-1950) 
For the update to take effect, all applications linked to the nss and nss- util library must be restarted, or the system rebooted.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-03-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-util-devel" release="5.el6_7" src="nss-util-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-5.el6_7.i686.rpm</filename><sum type="sha256">793facf8d76e4c860c54623245460bfaa4ae4b94d1beffb764bf7bab6fa0c80f</sum></package><package arch="x86_64" name="nss-util" release="5.el6_7" src="nss-util-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">617b3c8d3946b49c544e3d4569bbb5f7a1b9a9c4fef15595bc827424b28cadb2</sum></package><package arch="x86_64" name="nss-util-devel" release="5.el6_7" src="nss-util-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-5.el6_7.x86_64.rpm</filename><sum type="sha256">59c84edc1f15d231bfdc6eb5829405a8071273561afb9c42ae838c5e329fd0a0</sum></package><package arch="i686" name="nss-util" release="5.el6_7" src="nss-util-3.19.1-5.el6_7.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-5.el6_7.i686.rpm</filename><sum type="sha256">c5fed11c021179f5a60c7fbcc474ca21391e4119d1efc66efaada27649b18688</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" id="CVE-2016-1950" title="Nss: Heap Buffer Overflow Vulnerability In Asn1 Certificate Parsing (Mfsa 2016-35)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0370" id="RHSA-2016:0370-1" title="Rhsa-2016:0370-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310509" id="1310509" title="Nss: Heap Buffer Overflow Vulnerability In Asn1 Certificate Parsing (Mfsa 2016-35)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0372-1</id><title>Openssl098E</title><description>A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) 
It was discovered that the SSLv2 servers using OpenSSL accepted SSLv2 connection handshakes that indicated non-zero clear key length for non- export cipher suites. An attacker could use this flaw to decrypt recorded SSLv2 sessions with the server by using it as a decryption oracle.(CVE-2016-0703) 
It was discovered that the SSLv2 protocol implementation in OpenSSL did not properly implement the Bleichenbacher protection for export cipher suites. An attacker could use a SSLv2 server using OpenSSL as a Bleichenbacher oracle. (CVE-2016-0704) 
Note: The CVE-2016-0703 and CVE-2016-0704 issues could allow for more efficient exploitation of the CVE-2016-0800 issue via the DROWN attack. 
A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) 
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) 
For the update to take effect, all services linked to the openssl098e library must be restarted, or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl098e" release="20.el6_7.1" src="openssl098e-0.9.8e-20.el6_7.1.src.rpm" version="0.9.8e"><filename>openssl098e-0.9.8e-20.el6_7.1.i686.rpm</filename><sum type="sha256">9c0bc92f32991f6494aa03cf194dc827c0f48b4d05bbe2b67402b5a987528ea8</sum></package><package arch="x86_64" name="openssl098e" release="20.el6_7.1" src="openssl098e-0.9.8e-20.el6_7.1.src.rpm" version="0.9.8e"><filename>openssl098e-0.9.8e-20.el6_7.1.x86_64.rpm</filename><sum type="sha256">c083858e887696497834fae5b1caaba2d145f051725a67507154d3a2f552c915</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" id="CVE-2015-0293" title="Openssl: Assertion Failure In Sslv2 Servers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" id="CVE-2015-3197" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" id="CVE-2016-0703" title="Openssl: Divide-And-Conquer Session Key Recovery In Sslv2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704" id="CVE-2016-0704" title="Openssl: Sslv2 Bleichenbacher Protection Overwrites Wrong Bytes For Export Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" id="CVE-2016-0800" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0372" id="RHSA-2016:0372-1" title="Rhsa-2016:0372-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202404" id="1202404" title="Openssl: Assertion Failure In Sslv2 Servers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301846" id="1301846" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310593" id="1310593" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310811" id="1310811" title="Openssl: Divide-And-Conquer Session Key Recovery In Sslv2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310814" id="1310814" title="Openssl: Sslv2 Bleichenbacher Protection Overwrites Wrong Bytes For Export Ciphers" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0373-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1958, CVE-2016-1960, CVE-2016-1961, CVE-2016-1962, CVE-2016-1973, CVE-2016-1974, CVE-2016-1964, CVE-2016-1965, CVE-2016-1966) 
Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-03-15 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-38.7.0-1.el6_7.src.rpm" version="38.7.0"><filename>firefox-38.7.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">63ad55fee38022bd95f7712144597d21a0c12ab2afb30f360be8291b642fa72f</sum></package><package arch="i686" name="firefox" release="1.el6_7" src="firefox-38.7.0-1.el6_7.src.rpm" version="38.7.0"><filename>firefox-38.7.0-1.el6_7.i686.rpm</filename><sum type="sha256">4219a8f74bdb9affde36177d47fe8b5ba65ebd6bb3295bfeed71837799220050</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" id="CVE-2016-1952" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" id="CVE-2016-1954" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" id="CVE-2016-1957" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" id="CVE-2016-1958" title="Mozilla: Displayed Page Address Can Be Overridden (Mfsa 2016-21)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" id="CVE-2016-1960" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" id="CVE-2016-1961" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" id="CVE-2016-1962" title="Mozilla: Use-After-Free When Using Multiple Webrtc Data Channels (Mfsa 2016-25)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" id="CVE-2016-1964" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" id="CVE-2016-1965" title="Mozilla: Addressbar Spoofing Though History Navigation And Location Protocol Property (Mfsa 2016-28)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" id="CVE-2016-1966" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973" id="CVE-2016-1973" title="Mozilla: Use-After-Free In Getstaticinstance In Webrtc (Mfsa 2016-33)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" id="CVE-2016-1974" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0373" id="RHSA-2016:0373-1" title="Rhsa-2016:0373-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315566" id="1315566" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315569" id="1315569" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315573" id="1315573" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315574" id="1315574" title="Mozilla: Displayed Page Address Can Be Overridden (Mfsa 2016-21)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315576" id="1315576" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315577" id="1315577" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315578" id="1315578" title="Mozilla: Use-After-Free When Using Multiple Webrtc Data Channels (Mfsa 2016-25)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315774" id="1315774" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315775" id="1315775" title="Mozilla: Addressbar Spoofing Though History Navigation And Location Protocol Property (Mfsa 2016-28)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315778" id="1315778" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315782" id="1315782" title="Mozilla: Use-After-Free In Getstaticinstance In Webrtc (Mfsa 2016-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315785" id="1315785" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315795" id="1315795" title="Mozilla: Font Vulnerabilities In The Graphite 2 Library (Mfsa 2016-37)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0428-1</id><title>Libssh2</title><description>A type confusion issue was found in the way libssh2 generated ephemeral secrets for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use significantly less secure random parameters. (CVE-2016-0787) 
After installing these updated packages, all running applications using libssh2 must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-15 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libssh2" release="2.el6_7.1" src="libssh2-1.4.2-2.el6_7.1.src.rpm" version="1.4.2"><filename>libssh2-1.4.2-2.el6_7.1.i686.rpm</filename><sum type="sha256">8c29d766c6f1cdae10f5262e4614b99d8f6cbb5a9e25dcf49075b57373dc0ea3</sum></package><package arch="x86_64" name="libssh2-docs" release="2.el6_7.1" src="libssh2-1.4.2-2.el6_7.1.src.rpm" version="1.4.2"><filename>libssh2-docs-1.4.2-2.el6_7.1.x86_64.rpm</filename><sum type="sha256">cfe91c4f14e7a86beaf885ff55416cc7bf61002bc6f13c1200645e472d60451b</sum></package><package arch="x86_64" name="libssh2" release="2.el6_7.1" src="libssh2-1.4.2-2.el6_7.1.src.rpm" version="1.4.2"><filename>libssh2-1.4.2-2.el6_7.1.x86_64.rpm</filename><sum type="sha256">5e1c40856b72d18063d62298823a2e2020567fe1f148b1a3d78ae0a20f5a856f</sum></package><package arch="x86_64" name="libssh2-devel" release="2.el6_7.1" src="libssh2-1.4.2-2.el6_7.1.src.rpm" version="1.4.2"><filename>libssh2-devel-1.4.2-2.el6_7.1.x86_64.rpm</filename><sum type="sha256">1b64c2efaf67880369b673d89be6ebaacb7c6a38033d1490dce9a6f84cddd933</sum></package><package arch="i686" name="libssh2-devel" release="2.el6_7.1" src="libssh2-1.4.2-2.el6_7.1.src.rpm" version="1.4.2"><filename>libssh2-devel-1.4.2-2.el6_7.1.i686.rpm</filename><sum type="sha256">5e884b34406e42eb7cd1483951ec2699a723b93fb4eac7fcf5b13052ef9d0fae</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" id="CVE-2016-0787" title="Libssh2: Bits/Bytes Confusion Resulting In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0428" id="RHSA-2016:0428-1" title="Rhsa-2016:0428-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306021" id="1306021" title="Libssh2: Bits/Bytes Confusion Resulting In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0448-1</id><title>Samba</title><description>A flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL. (CVE-2015-7560) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="samba-winbind-clients" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-25.el6_7.i686.rpm</filename><sum type="sha256">8d4142a5de060c32f3e0e3194e0a7819a9fe6fade7e45a342769048ed647e6fc</sum></package><package arch="x86_64" name="samba-swat" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">56fb7d5bbcb30f3887f5671c3c526c305d51ec68a0e3f7f252bd4084b36ece06</sum></package><package arch="x86_64" name="samba-common" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">64f33553789b8710cdc9ef9ed0c6a150354f8f223d8a15dd49d41ad72e6994f4</sum></package><package arch="x86_64" name="samba-client" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">0db15d007aee102f96bd40bb24fee99a120feba7b94693869dd3af488c4084fb</sum></package><package arch="x86_64" name="samba-winbind" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">b9e7419583412776acef72ca1b8f782af7bcae69b5736207e1d1b948df9beae5</sum></package><package arch="x86_64" name="samba-winbind-clients" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">84f8e6349ba0ea2d45a1c43ff3bcc577f9aa603d356947bf97d8a0f0f9012883</sum></package><package arch="i686" name="samba-winbind-devel" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-25.el6_7.i686.rpm</filename><sum type="sha256">bdf95a1909537ee91992baa0fb13aef0a24b29f3af609f3e440890d3137a5253</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">8e7d707b4a4f42990a7b45eafc3abb3d9ffd26b37b6c07d852ebe481da73e900</sum></package><package arch="i686" name="libsmbclient-devel" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-25.el6_7.i686.rpm</filename><sum type="sha256">8c3e0104715acff04c0f69ecea25f068effb7bef1a21e264827181a0ec5e49f3</sum></package><package arch="x86_64" name="libsmbclient" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">5918e4f9becbe89e7aeada434977c440bd6096f04f48a64f38d9aca2e3cb94a6</sum></package><package arch="x86_64" name="samba" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">ae7ca4615be906003c97f087317f7a5330f6802b6748f0e2fbad858249f78961</sum></package><package arch="x86_64" name="samba-winbind-devel" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">4bc348e3e07a9f24d4ca5196e0f1dce1289b60b67a16dfe42f37babd3f9ca114</sum></package><package arch="i686" name="libsmbclient" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-25.el6_7.i686.rpm</filename><sum type="sha256">970f0d0fb5f6c4c54ee91c52ec26ba4f87c64d07749992ad06cd8155d0fb9b3a</sum></package><package arch="x86_64" name="samba-glusterfs" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">bfcd22ecc1fe7511af6330c915b5529b190dc1e354436b0d176d159b4129568c</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">06a9b517972df494ef4c221e55afc698378e8ea1decaa6ff604653d4a2f15906</sum></package><package arch="i686" name="samba-common" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-25.el6_7.i686.rpm</filename><sum type="sha256">f4053298ea66c3d2f36c86d95d3f06c855ff5fe9d6aa0b76eb8b28cd36fbc6dc</sum></package><package arch="x86_64" name="libsmbclient-devel" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">1726159458be959f70a68f5f04b6a526262afaa9e09822bd8d73d09bc02af95d</sum></package><package arch="x86_64" name="samba-doc" release="25.el6_7" src="samba-3.6.23-25.el6_7.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-25.el6_7.x86_64.rpm</filename><sum type="sha256">af6a1f5a38e7fbd4264b8cef00006e24f341a61f869c490a5474d359f0936b00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" id="CVE-2015-7560" title="Samba: Incorrect Acl Get/Set Allowed On Symlink Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0448" id="RHSA-2016:0448-1" title="Rhsa-2016:0448-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309992" id="1309992" title="Samba: Incorrect Acl Get/Set Allowed On Symlink Path" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0449-1</id><title>Samba4</title><description>A flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL. (CVE-2015-7560) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-libs" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-libs-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">7bae643867f72483949c4cfe888b80734475172ec53995f2bcf1fbabde1db629</sum></package><package arch="x86_64" name="samba4-common" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-common-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">841f33e1a54859d15f517cea6c757c768b7d9f99b648cbb8b57a3cd27d437673</sum></package><package arch="x86_64" name="samba4-client" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-client-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">143d09550d0081b05cd96b10f58ef930e7b343b482cd4e730a74660f785f4fa6</sum></package><package arch="x86_64" name="samba4-devel" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-devel-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">85e2e1716cec211fa83ed1b86a4fc253ec314ab7c1133c11e037d03e50bb8794</sum></package><package arch="x86_64" name="samba4-python" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-python-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">688dfa48fdf7e3e10eb307ff1804a3a9af56394e19a67ddd9d33e70ba36589aa</sum></package><package arch="x86_64" name="samba4-pidl" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-pidl-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">2da31c9c3f84bc9755ff7d6aef03aef2ea8faf10b71daf617d14cf6660641891</sum></package><package arch="x86_64" name="samba4" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">ca1d12e80964d63d415a5530c1eb2be12d381aab5272e7f60faa51533da7c840</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-clients-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">c706000ce012632700691199bf8a3108b7ac1b9d0a1c49a6de142855d1b4b0d9</sum></package><package arch="x86_64" name="samba4-swat" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-swat-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">e9a6b205aa147e603ef7e4164749df5c11b17cbf7e9abb57c439c9f3e90d9f1e</sum></package><package arch="x86_64" name="samba4-winbind" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">2e3888b8507d8bfad4c1938300e4f7d657cf319f09824d08b230c5f96137883a</sum></package><package arch="x86_64" name="samba4-dc" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">52bc58b9268663c56c87b2b3495845a110b0095d9e91231d92988762dfc17247</sum></package><package arch="x86_64" name="samba4-test" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-test-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">83cace7202be0abd2ae4e6febb22a6fca8745318092fc6c552acdd10b8336e90</sum></package><package arch="x86_64" name="samba4-dc-libs" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-dc-libs-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">b0059dcc44f7cba96cf5227fa6752b916f207a9639ea86566426cf4901fa29ad</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="68.el6_7.rc4" src="samba4-4.0.0-68.el6_7.rc4.src.rpm" version="4.0.0"><filename>samba4-winbind-krb5-locator-4.0.0-68.el6_7.rc4.x86_64.rpm</filename><sum type="sha256">e87b22c4d2d8aeeec239263b40b1ca6ad17b95505d65dd0ed663277e4dae9cbd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" id="CVE-2015-7560" title="Samba: Incorrect Acl Get/Set Allowed On Symlink Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0449" id="RHSA-2016:0449-1" title="Rhsa-2016:0449-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309992" id="1309992" title="Samba: Incorrect Acl Get/Set Allowed On Symlink Path" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0459-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) 
A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.7.x86_64.rpm</filename><sum type="sha256">660bdfae9fb6b7395d57d94c381988572d7e3ef10e35f3f4ebc3be34985e7992</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.37.rc1.el6_7.7.x86_64.rpm</filename><sum type="sha256">963331da3c018169adbd0cc52a86e479f5de5cf74c33bb95db8f7ad48cbe0fda</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.7.i686.rpm</filename><sum type="sha256">d4571732d261920246991286773ff23489ffd7deb4415370ed5f59c1e2c30749</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.37.rc1.el6_7.7.i686.rpm</filename><sum type="sha256">292432aca91d21d89b4143d563f198513d353b4575d0010fa69e874ae65ead86</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.37.rc1.el6_7.7.x86_64.rpm</filename><sum type="sha256">e0b66387661f960ca47762348b427ec1aeecbc977f8664e3995d2bd38841bdc2</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.37.rc1.el6_7.7.x86_64.rpm</filename><sum type="sha256">7bcfa931079985e60bbcecd3fa045e801b0268d28dbd2442d0154f9355375dc6</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.37.rc1.el6_7.7.x86_64.rpm</filename><sum type="sha256">7d860a5e9f42f9cee048e41c52c008d6c32519d8c23e0d87776f9bcbee3cbf02</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.37.rc1.el6_7.7" src="bind-9.8.2-0.37.rc1.el6_7.7.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.37.rc1.el6_7.7.x86_64.rpm</filename><sum type="sha256">6ec91a175bcd8388bffe4e339bacb043333854cc6a4da11333676080a4842d8a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" id="CVE-2016-1285" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" id="CVE-2016-1286" title="Bind: Malformed Signature Records For Dname " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0459" id="RHSA-2016:0459-1" title="Rhsa-2016:0459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315674" id="1315674" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315680" id="1315680" title="Bind: Malformed Signature Records For Dname " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0460-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1960, CVE-2016-1961, CVE-2016-1974, CVE-2016-1964, CVE-2016-1966) 
Multiple security flaws were found in the graphite2 font library shipped with Thunderbird. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_7" src="thunderbird-38.7.0-1.el6_7.src.rpm" version="38.7.0"><filename>thunderbird-38.7.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">e2e99eedfbb31e172d59a0b9d09c28b524972a204744ebc1c0fc96a112430b39</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" id="CVE-2016-1952" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" id="CVE-2016-1954" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" id="CVE-2016-1957" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" id="CVE-2016-1960" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" id="CVE-2016-1961" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" id="CVE-2016-1964" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" id="CVE-2016-1966" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" id="CVE-2016-1974" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0460" id="RHSA-2016:0460-1" title="Rhsa-2016:0460-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315566" id="1315566" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315569" id="1315569" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315573" id="1315573" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315576" id="1315576" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315577" id="1315577" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315774" id="1315774" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315778" id="1315778" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315785" id="1315785" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315795" id="1315795" title="Mozilla: Font Vulnerabilities In The Graphite 2 Library (Mfsa 2016-37)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0466-1</id><title>Openssh</title><description>It was discovered that the OpenSSH server did not sanitize data received in requests to enable X11 forwarding. An authenticated client with restricted SSH access could possibly use this flaw to bypass intended restrictions. (CVE-2016-3115) 
It was discovered that the OpenSSH sshd daemon did not check the list of keyboard-interactive authentication methods for duplicates. A remote attacker could use this flaw to bypass the MaxAuthTries limit, making it easier to perform password guessing attacks. (CVE-2015-5600) 
After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssh-ldap" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-114.el6_7.x86_64.rpm</filename><sum type="sha256">b98494d730ea383e091aa7a5714a1488b881df6d2759a94c34615c22484e123d</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-114.el6_7.x86_64.rpm</filename><sum type="sha256">4eb4d16bf0e8666e4b625a659ea72bb245fe1223377e121bfcf1cf762d259581</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm</filename><sum type="sha256">6173661609bd815ecda5f77e339fac4eb2966db8e0608a551c27829a17442ffa</sum></package><package arch="x86_64" name="openssh" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="5.3p1"><filename>openssh-5.3p1-114.el6_7.x86_64.rpm</filename><sum type="sha256">8cca6c23dd85dc1497171203e1f2fdbcdaa77476532fb9435ab23996b196dd63</sum></package><package arch="x86_64" name="openssh-askpass" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-114.el6_7.x86_64.rpm</filename><sum type="sha256">fe35067dd5e567c4fd8ba76d67d76bf24599b8b94f52f67caab71775d966aaf9</sum></package><package arch="x86_64" name="openssh-server" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-114.el6_7.x86_64.rpm</filename><sum type="sha256">82d5faa99e6af90cb88df894f323e04129fb17309d553194f830885ea8eba460</sum></package><package arch="x86_64" name="openssh-clients" release="114.el6_7" src="openssh-5.3p1-114.el6_7.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-114.el6_7.x86_64.rpm</filename><sum type="sha256">6f331c606d6884cd2ab7fa825cf9446c29b4f18cfde706cd32f9400f33cf449f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" id="CVE-2015-5600" title="Openssh: Maxauthtries Limit Bypass Via Duplicates In Kbdinteractivedevices" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" id="CVE-2016-3115" title="Openssh: Missing Sanitisation Of Input For X11 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0466" id="RHSA-2016:0466-1" title="Rhsa-2016:0466-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1245969" id="1245969" title="Openssh: Maxauthtries Limit Bypass Via Duplicates In Kbdinteractivedevices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316829" id="1316829" title="Openssh: Missing Sanitisation Of Input For X11 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0491-1</id><title>Foomatic</title><description>It was discovered that the unhtmlify() function of foomatic-rip did not correctly calculate buffer sizes, possibly leading to a heap-based memory corruption. A malicious attacker could exploit this flaw to cause foomatic-rip to crash or, possibly, execute arbitrary code. (CVE-2010-5325) 
It was discovered that foomatic-rip failed to remove all shell special characters from inputs used to construct command lines for external programs run by the filter. An attacker could possibly use this flaw to execute arbitrary commands. (CVE-2015-8327, CVE-2015-8560)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="foomatic" release="5.el6_7" src="foomatic-4.0.4-5.el6_7.src.rpm" version="4.0.4"><filename>foomatic-4.0.4-5.el6_7.x86_64.rpm</filename><sum type="sha256">7b955cbfa1cfb525bf6cce3907efb5ff4342e8ccc9711f09535c26bfe1e0e045</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5325" id="CVE-2010-5325" title="Foomatic: Potential Remote Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" id="CVE-2015-8327" title="Cups-Filters: Foomatic-Rip Did Not Consider The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560" id="CVE-2015-8560" title="Cups-Filters: Foomatic-Rip Did Not Consider " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0491" id="RHSA-2016:0491-1" title="Rhsa-2016:0491-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218297" id="1218297" title="Foomatic: Potential Remote Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287523" id="1287523" title="Cups-Filters: Foomatic-Rip Did Not Consider The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291227" id="1291227" title="Cups-Filters: Foomatic-Rip Did Not Consider " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0492-1</id><title>Tomcat6</title><description>It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810) 
This update also fixes the following bug: 
* Previously, using a New I/O (NIO) connector in the Apache Tomcat 6 servlet resulted in a large memory leak. An upstream patch has been applied to fix this bug, and the memory leak no longer occurs. 
Tomcat must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="tomcat6-docs-webapp" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">c3bff743ec560a4a453fd127f86502d13ac38aeefaf25f28b8a906d84ba5bdfc</sum></package><package arch="x86_64" name="tomcat6-webapps" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">5ea8bf51879797b5f01420a6bfae1f8ee5faca13353cd60640172569e42df36c</sum></package><package arch="x86_64" name="tomcat6-jsp-2.1-api" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">d277a8de0b77072270fb233a1a2aa58d8dd05df9feeebb82f91f40634b0ff620</sum></package><package arch="x86_64" name="tomcat6-el-2.1-api" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">9b30da1e02ceff0476c00c7e5bd684a54c7f5060a1621728fc486a3cca9e4e18</sum></package><package arch="x86_64" name="tomcat6-javadoc" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">bc4fd989061e873def6a97848b83c5d20a07e598b0f55f1a73edfa7e374b44b7</sum></package><package arch="x86_64" name="tomcat6-lib" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">bd6f112b62daea2f1f080324fc14e1447c54ae70d51ee64d6145ac1dcd06fabf</sum></package><package arch="x86_64" name="tomcat6-servlet-2.5-api" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">3a819adba3b89b046267d16305708c061ae3a8d49f8fdbc7f0a35f549e0a74d7</sum></package><package arch="x86_64" name="tomcat6" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">541d3dc4ff60bd42ac9ec104e3280f9292910354281928b32adb2606bb2f6b25</sum></package><package arch="x86_64" name="tomcat6-admin-webapps" release="94.el6_7" src="tomcat6-6.0.24-94.el6_7.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-94.el6_7.x86_64.rpm</filename><sum type="sha256">8c553623c0361af25caa40b54ca48148f719844b20f257275607f8921071f96d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810" id="CVE-2014-7810" title="Cve-2014-7810" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0492" id="RHSA-2016:0492-1" title="Rhsa-2016:0492-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222573" id="1222573" title="Tomcat/Jbossweb: Security Manager Bypass Via El " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0493-1</id><title>Krb5</title><description>A memory leak flaw was found in the krb5_unparse_name() function of the MIT Kerberos kadmind service. An authenticated attacker could repeatedly send specially crafted requests to the server, which could cause the server to consume large amounts of memory resources, ultimately leading to a denial of service due to memory exhaustion. (CVE-2015-8631) 
An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure. (CVE-2015-8629) 
After installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="krb5-server-ldap" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-server-ldap-1.10.3-42z1.el6_7.x86_64.rpm</filename><sum type="sha256">70d054efbbc30b5f1b5bf55e947f0d4df47466de6c71d9af46e1bf51ef9eacd5</sum></package><package arch="x86_64" name="krb5-libs" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-libs-1.10.3-42z1.el6_7.x86_64.rpm</filename><sum type="sha256">97c4c6b098ffe134e721693e4d615c29a29dbafd7c72eb3cbf336eb3f310cb28</sum></package><package arch="i686" name="krb5-libs" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-libs-1.10.3-42z1.el6_7.i686.rpm</filename><sum type="sha256">0a79c4119d976945609c183d720c1707590f96cca998ee72a593a05c14716876</sum></package><package arch="x86_64" name="krb5-server" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-server-1.10.3-42z1.el6_7.x86_64.rpm</filename><sum type="sha256">1167171e5ab0e5f08f4b0a55023b09580a314c8b1ad763c30e39d0943f663659</sum></package><package arch="x86_64" name="krb5-workstation" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-workstation-1.10.3-42z1.el6_7.x86_64.rpm</filename><sum type="sha256">1ee8c26f66a7d9449b99b877d879db3908d99ae1ede4fe9740f9c073ce7cbd9f</sum></package><package arch="i686" name="krb5-server-ldap" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-server-ldap-1.10.3-42z1.el6_7.i686.rpm</filename><sum type="sha256">f23768a13145abadf89f357e16beb9825748501759a7d5750b963a588000ff9b</sum></package><package arch="x86_64" name="krb5-devel" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-devel-1.10.3-42z1.el6_7.x86_64.rpm</filename><sum type="sha256">09a8c132a25f59c72502af509bc1b18b3bdafa2845523108f3dde9ba6199bc0c</sum></package><package arch="x86_64" name="krb5-pkinit-openssl" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-pkinit-openssl-1.10.3-42z1.el6_7.x86_64.rpm</filename><sum type="sha256">dbfed351a414302d8ec8b9c38dedb6bcb59901fb7ed32f437e64e750871af2c4</sum></package><package arch="i686" name="krb5-devel" release="42z1.el6_7" src="krb5-1.10.3-42z1.el6_7.src.rpm" version="1.10.3"><filename>krb5-devel-1.10.3-42z1.el6_7.i686.rpm</filename><sum type="sha256">b41cb960faa9b5b45ce2db1aff3e9ccadbd7a2e76be41d3f98831fb9e939b629</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" id="CVE-2015-8629" title="Krb5: Xdr_Nullstring() Doesn'T Check For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" id="CVE-2015-8631" title="Krb5: Memory Leak Caused By Supplying A Null " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0493" id="RHSA-2016:0493-1" title="Rhsa-2016:0493-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302617" id="1302617" title="Krb5: Xdr_Nullstring() Doesn'T Check For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302642" id="1302642" title="Krb5: Memory Leak Caused By Supplying A Null " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0494-1</id><title>Kernel</title><description>* It was found that the fix for CVE-2015-1805 incorrectly kept buffer offset and buffer length in sync on a failed atomic read, potentially resulting in a pipe buffer state corruption. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space. (CVE-2016-0774, Moderate) 
This update also fixes the following bugs: 
* In the anon_vma structure, the degree counts number of child anon_vmas and of VMAs which points to this anon_vma. Failure to decrement the parent's degree in the unlink_anon_vma() function, when its list was empty, previously triggered a BUG_ON() assertion. The provided patch makes sure the anon_vma degree is always decremented when the VMA list is empty, thus fixing this bug. 
* When running Internet Protocol Security (IPSEC) on external storage encrypted with LUKS under a substantial load on the system, data corruptions could previously occur. A set of upstream patches has been provided, and data corruption is no longer reported in this situation. 
* Due to prematurely decremented calc_load_task, the calculated load average was off by up to the number of CPUs in the machine. As a consequence, job scheduling worked improperly causing a drop in the system performance. This update keeps the delta of the CPU going into NO_HZ idle separately, and folds the pending idle delta into the global active count while correctly aging the averages for the idle-duration when leaving NO_HZ mode. Now, job scheduling works correctly, ensuring balanced CPU load. 
* Due to a regression in the Scientific Linux 6.7 kernel, the cgroup OOM notifier accessed a cgroup-specific internal data structure without a proper locking protection, which led to a kernel panic. This update adjusts the cgroup OOM notifier to lock internal data properly, thus fixing the bug. 
* GFS2 had a rare timing window that sometimes caused it to reference an uninitialized variable. Consequently, a kernel panic occurred. The code has been changed to reference the correct value during this timing window, and the kernel no longer panics. 
* Due to a race condition whereby a cache operation could be submitted after a cache object was killed, the kernel occasionally crashed on systems running the cachefilesd service. The provided patch prevents the race condition by adding serialization in the code that makes the object unavailable. As a result, all subsequent operations targetted on the object are rejected and the kernel no longer crashes in this scenario. 
This update also adds this enhancement: 
* The lpfc driver has been updated to version 11.0.0.4. 
The system must be rebooted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">176febd429f290613c2f5752e1e178243a28a0298906545949164862bab18de5</sum></package><package arch="x86_64" name="kernel" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">3bca8ec571992d0ef472c04bfa1689aa3f5432fa701d8e97c57017e62ab0469b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">c849e78f57ead3f9ed45e3c9c7b76da0970b6901d32bd14bf2b2e73154b79452</sum></package><package arch="x86_64" name="perf" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">2aa0f7dc4d6ec93161dc29bf65c383fd47c39ffb0c9454e454e1394d69fc3db3</sum></package><package arch="noarch" name="kernel-doc" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.22.1.el6.noarch.rpm</filename><sum type="sha256">11f6b75405495ed2258051d9d11a1ef48d3182d0b46115839cc22882e7648ca5</sum></package><package arch="x86_64" name="kernel-headers" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">be1912bfaa29ce0b3f10f19f097c80b347b4bee551edd27d95d08455a83c6201</sum></package><package arch="x86_64" name="python-perf" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">e6492b60b1c32ec1e50931e83a2bb312fc301d1db24eae0a290f2f9e98bcc19b</sum></package><package arch="x86_64" name="kernel-devel" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.22.1.el6.x86_64.rpm</filename><sum type="sha256">1fb9b96c4eba86090e05d59a19bf9ddf46a82f5062ffe3e7fb77cca7f3424a7e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.22.1.el6.noarch.rpm</filename><sum type="sha256">865b4652edb4e25fa20be45f5cd2931beab2991b91e5adb440a568983f7f6266</sum></package><package arch="noarch" name="kernel-firmware" release="573.22.1.el6" src="kernel-2.6.32-573.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.22.1.el6.noarch.rpm</filename><sum type="sha256">1e17f297eece1f9c293dfd02e8dca6cd3485354f8fca675448f550c74ca07d83</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0774" id="CVE-2016-0774" title="Kernel: Pipe Buffer State Corruption After Unsuccessful Atomic Read From Pipe" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0494" id="RHSA-2016:0494-1" title="Rhsa-2016:0494-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303961" id="1303961" title="Kernel: Pipe Buffer State Corruption After Unsuccessful Atomic Read From Pipe" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0496-1</id><title>Git</title><description>An integer truncation flaw and an integer overflow flaw, both leading to a heap-based buffer overflow, were found in the way Git processed certain path information. A remote attacker could create a specially crafted Git repository that would cause a Git client or server to crash or, possibly, execute arbitrary code. (CVE-2016-2315, CVE-2016-2324)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="emacs-git-el" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>emacs-git-el-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">8b23b40754fbdfb4cebd38e3bd696c5c39f65879814768a3058a3d5711bfee7d</sum></package><package arch="noarch" name="git-svn" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-svn-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">17042bcbc95db1ab43c93fd042ab5ecdd2f0450984b9eb73417ff725dfcf7688</sum></package><package arch="noarch" name="git-email" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-email-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">25fad0978331fb1899505014ac031cda2425574887c13affd7b8c0e7b318cac9</sum></package><package arch="noarch" name="git-gui" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-gui-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">9d1dc58b40b9f1f15376cf5f3a2c6365d14ce32c4ef15d247c982dc8ea42c203</sum></package><package arch="noarch" name="emacs-git" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>emacs-git-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">98189c49bd2e933e3c283a488d54982fc5d600538539434c073c2af64c4f8e1b</sum></package><package arch="noarch" name="gitweb" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>gitweb-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">697bd280ecfa7752d0b91b5f675a90762b605be45cdc18c56e7b7fdad9917417</sum></package><package arch="noarch" name="perl-Git" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>perl-Git-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">e113b089c2aa87ebd601dd69d61f6fe3b084d02588254beb6eb4f852fd31b6d3</sum></package><package arch="x86_64" name="git" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-1.7.1-4.el6_7.1.x86_64.rpm</filename><sum type="sha256">c39766ffc59900bb0e3001866683c66d2c1551f8e295bfd57986cc30fcbf99f5</sum></package><package arch="noarch" name="git-cvs" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-cvs-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">b535e8e8cfc94767a1311b87255ec69137bb773e581af25ae2b5cf985ea75b6c</sum></package><package arch="x86_64" name="git-daemon" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-daemon-1.7.1-4.el6_7.1.x86_64.rpm</filename><sum type="sha256">73f2cac9820425cd324ac2a6d7ee70ed2d1aea0b60f5b36d3e4dce3b453b493d</sum></package><package arch="noarch" name="git-all" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>git-all-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">f68b08935aa1c391cdb17597fd11199471383bdf6ad2b9ae96f3589529a62050</sum></package><package arch="noarch" name="gitk" release="4.el6_7.1" src="git-1.7.1-4.el6_7.1.src.rpm" version="1.7.1"><filename>gitk-1.7.1-4.el6_7.1.noarch.rpm</filename><sum type="sha256">7b1a4abfb2e2582d9247b50d49bf21d84f534beb138c2c6d01acfe975eabfe97</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" id="CVE-2016-2315" title="Git: Path_Name() Integer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" id="CVE-2016-2324" title="Git: Path_Name() Integer " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0496" id="RHSA-2016:0496-1" title="Rhsa-2016:0496-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317981" id="1317981" title="Git: Path_Name() Integer " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0511-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.5.0.el6_7" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el6_7.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-javadoc-1.7.0.99-2.6.5.0.el6_7.noarch.rpm</filename><sum type="sha256">795f8fbd634d99376e14a78b88d9300dc906e9cd531dafd8125e8dcc0b852985</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.5.0.el6_7" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el6_7.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-devel-1.7.0.99-2.6.5.0.el6_7.x86_64.rpm</filename><sum type="sha256">00b4a7c6c145a4a3cceb266dfd3c4ee43ee6866644d93c5f1f9f3d86a752f70d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.5.0.el6_7" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el6_7.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-src-1.7.0.99-2.6.5.0.el6_7.x86_64.rpm</filename><sum type="sha256">b9a38b220e3545e3c0b614101b78b6e64c6beecbfb39e4e34e9183846f941559</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.5.0.el6_7" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el6_7.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-demo-1.7.0.99-2.6.5.0.el6_7.x86_64.rpm</filename><sum type="sha256">8c24057b9f97c92fe0951a63136cac4d2384d8109afef1a58930a10d36ec5421</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.5.0.el6_7" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el6_7.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el6_7.x86_64.rpm</filename><sum type="sha256">509e1df868c18bab022ab600a87ca46a71aa5ec4dcea2cb235219790d942f145</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" id="CVE-2016-0636" title="Openjdk: Out-Of-Band Urgent Security Fix " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0511" id="RHSA-2016:0511-1" title="Rhsa-2016:0511-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320650" id="1320650" title="Openjdk: Out-Of-Band Urgent Security Fix " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0514-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-demo-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">e2aca6fa61ea735585b2c0996c750dd4e61f3b5ce2af1d2e02cd26c11f52468f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-headless-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">b169d764b08f11e77a047569f27ac25202a0f33fbf8211d4ebfd60afd8df101e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">122eb14d9acd3e17b4b4420a7026aeebe2f3a58a398516db5dec66e9b3ba044b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-devel-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">d601212b1c850bd88944fbeea7e9e25f5405a5ad43cd2b582a9325f8503ab576</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">6d4db336b4b2dce9dc376beaea6c71a68927b5474796f47b77c65e7136af4d3c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">25d3dcfa7ed8507a9b67382b8b957c66ec7c6e0a277cccd2b39f34564f454319</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-src-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">f33382cdadb21ce7a7d19a36677b70e316f4bf35ae03d8f24aae20f96780f6de</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">3b95a980b4af44880eea13e007da53652603316001cd3ba526a94e23ea826610</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-src-debug-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">ca8e01d398e07feb9716485b5b40ae6b7a4c501e8247eeffe60344365a92717a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-debug-1.8.0.77-0.b03.el6_7.x86_64.rpm</filename><sum type="sha256">a982fbbf8e515e54e077231c7189eb5bfafc85f786f0aad4b9f0d3575c07d310</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b03.el6_7" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el6_7.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-javadoc-1.8.0.77-0.b03.el6_7.noarch.rpm</filename><sum type="sha256">f468cc9cacca99a7a825a4c1b4feab7e7b140ced4370ea5ece4142b05bea9dc1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" id="CVE-2016-0636" title="Openjdk: Out-Of-Band Urgent Security Fix " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0514" id="RHSA-2016:0514-1" title="Rhsa-2016:0514-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320650" id="1320650" title="Openjdk: Out-Of-Band Urgent Security Fix " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0591-1</id><title>Nss, Nss-Util, And Nspr</title><description>The following packages have been upgraded to a newer upstream version: nss 3.21.0, nss-util 3.21.0, nspr 4.11.0. 
Security Fix(es): 
* A use-after-free flaw was found in the way NSS handled DHE (Diffie- Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) 
* A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-04-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-pkcs11-devel" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-pkcs11-devel-3.21.0-0.3.el6_7.i686.rpm</filename><sum type="sha256">57618524405d87c19d15b907331ebaf74de51d525730566c54419617bb072b8a</sum></package><package arch="i686" name="nss-util-devel" release="0.3.el6_7" src="nss-util-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-util-devel-3.21.0-0.3.el6_7.i686.rpm</filename><sum type="sha256">3bf24da8b8b4a7efe874d61a53021f5f875a6e5f9c033ce6af8835cc6a8d7681</sum></package><package arch="x86_64" name="nss-tools" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-tools-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">2dadee0f97a90d6a2dfcb60076f3d4bee366be7cd65b7327652f096f7c52097e</sum></package><package arch="x86_64" name="nspr" release="0.1.el6_7" src="nspr-4.11.0-0.1.el6_7.src.rpm" version="4.11.0"><filename>nspr-4.11.0-0.1.el6_7.x86_64.rpm</filename><sum type="sha256">4498faa72d7ae7896bea40bec63074648454f5e552755b08c5e56630c86a5885</sum></package><package arch="i686" name="nss-devel" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-devel-3.21.0-0.3.el6_7.i686.rpm</filename><sum type="sha256">beffbcee5247aeacf7ef0761c0d19f58217ff23da12d69cc70b31762edb3d510</sum></package><package arch="x86_64" name="nss-devel" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-devel-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">cd0f5a8db38f90f65ff1c01c1742943dfc5b1a49bdbb66f2bcd1351fb8797f6d</sum></package><package arch="x86_64" name="nss-util-devel" release="0.3.el6_7" src="nss-util-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-util-devel-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">850da65bb2f0c212d8900d554ec162885f4692ad0b19837b0fe924ae9e6b1b37</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-pkcs11-devel-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">7aa27122f494b52e59640a73345feb122da5b5511262619f9071a01849a38c61</sum></package><package arch="i686" name="nspr-devel" release="0.1.el6_7" src="nspr-4.11.0-0.1.el6_7.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-0.1.el6_7.i686.rpm</filename><sum type="sha256">c2ed3824cffca55fe9a287df48581493e1ad8fc3d446a8811f0ce1babac6fd8b</sum></package><package arch="i686" name="nss" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-3.21.0-0.3.el6_7.i686.rpm</filename><sum type="sha256">6aefdc0d3469fa501a3626ec0c6af17192bc3d49335710c469d366829cb83e96</sum></package><package arch="x86_64" name="nspr-devel" release="0.1.el6_7" src="nspr-4.11.0-0.1.el6_7.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-0.1.el6_7.x86_64.rpm</filename><sum type="sha256">039b3f95cae597630e76523cc5d9be68cf50ff3ddd06bb78c8ed81e958c5ac2b</sum></package><package arch="x86_64" name="nss" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">cbdc1f21c7c96ac58f24c36144fc9be2cddd4968cc4a403bdc3a0da6c1439949</sum></package><package arch="x86_64" name="nss-util" release="0.3.el6_7" src="nss-util-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-util-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">202991e4be6d209baec98aa170faf6f76db98676dd420991c923a2c6397973ca</sum></package><package arch="i686" name="nss-util" release="0.3.el6_7" src="nss-util-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-util-3.21.0-0.3.el6_7.i686.rpm</filename><sum type="sha256">a8ecb9184a2e23d5ceaa5d5645f27103dd3a2f394b5e0b7709223f4507e03bf0</sum></package><package arch="x86_64" name="nss-sysinit" release="0.3.el6_7" src="nss-3.21.0-0.3.el6_7.src.rpm" version="3.21.0"><filename>nss-sysinit-3.21.0-0.3.el6_7.x86_64.rpm</filename><sum type="sha256">98025442511cddd9f5b8b2ef6de1f9a905facaba0fac80a4dd98b769a662c85d</sum></package><package arch="i686" name="nspr" release="0.1.el6_7" src="nspr-4.11.0-0.1.el6_7.src.rpm" version="4.11.0"><filename>nspr-4.11.0-0.1.el6_7.i686.rpm</filename><sum type="sha256">c5e676aa70286dc249c9056c7b89c291b3a2e425893b43c10ce1085677231bf6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" id="CVE-2016-1978" title="Nss: Use-After-Free In Nss During Ssl " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" id="CVE-2016-1979" title="Nss: Use-After-Free During Processing Of Der " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0591" id="RHSA-2016:0591-1" title="Rhsa-2016:0591-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299861" id="1299861" title="Rebase Rhel 6.7.Z To Nspr 4.11 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299874" id="1299874" title="Rebase Rhel 6.7.Z To Nss-Util 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300629" id="1300629" title="Rebase Rhel 6.7.Z To Nss 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315202" id="1315202" title="Nss: Use-After-Free During Processing Of Der " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315565" id="1315565" title="Nss: Use-After-Free In Nss During Ssl " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0611-1</id><title>Samba</title><description>Security Fix(es): 
* Multiple flaws were found in Samba's DCE/RPC protocol implementation. A remote, authenticated attacker could use these flaws to cause a denial of service against the Samba server (high CPU load or a crash) or, possibly, execute arbitrary code with the permissions of the user running Samba (root). This flaw could also be used to downgrade a secure DCE/RPC connection by a man-in-the-middle attacker taking control of an Active Directory (AD) object and compromising the security of a Samba Active Directory Domain Controller (DC). (CVE-2015-5370) 
Note: While Samba packages as shipped in Scientific Linux do not support running Samba as an AD DC, this flaw applies to all roles Samba implements. 
* A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database. (CVE-2016-2118) 
* It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine. (CVE-2016-2111) 
* It was found that Samba's LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections. (CVE-2016-2112) 
* It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (CVE-2016-2115)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-04-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-winbind-krb5-locator" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">8954f926d6fd77fdc6f61357831d62c863fb89f6053d6a83430a51e44d3d03ec</sum></package><package arch="x86_64" name="samba-doc" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">8cac16eca986067bc3a2d6a50b68277e4c181d2f41cd26e661314d0095baa90a</sum></package><package arch="i686" name="libsmbclient" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-30.el6_7.i686.rpm</filename><sum type="sha256">bbaa32e640e6d08a2adf14bb4b3e819f42eeb67c34223c5a5b8916147d43958f</sum></package><package arch="x86_64" name="samba" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">d8c24418290d6ba21d8bae50f13f78047590d9ef1cb12c7da51c4b52cd63e818</sum></package><package arch="x86_64" name="libsmbclient" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">e36518995b876181d6fcad36641cfda2351ce1a5e470c17bc1e7eac8e8ff9746</sum></package><package arch="x86_64" name="samba-glusterfs" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">5a6127a160e13e2b6d452879b90e1cb8312879aadd90ddba8e9edddc12f1e3ad</sum></package><package arch="x86_64" name="samba-client" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">a5fc6dccfc3870a821dceb92a8d41d6b9d36955563de3847ef03172d5cece066</sum></package><package arch="x86_64" name="libsmbclient-devel" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">ce4b03b6fc053f3a8af2c69d65c46cdfdc772b57de57f70c4c1e6baaf1aa0c8d</sum></package><package arch="x86_64" name="samba-winbind-clients" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">c5c6b86422188bade85bfc4b17d744d1e74ce1bdde5efb2d9424bb4210898312</sum></package><package arch="i686" name="samba-winbind-devel" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-30.el6_7.i686.rpm</filename><sum type="sha256">bd454c4f0665b22ca96d25fffbb430723047b5bf9939b956c28f2bd4aa0849f9</sum></package><package arch="i686" name="libsmbclient-devel" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-30.el6_7.i686.rpm</filename><sum type="sha256">63ca85fa5693210f4a9c178cf6b3f8b4dd6a6a1b6ecad36edfc71412edab4d17</sum></package><package arch="i686" name="samba-common" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-30.el6_7.i686.rpm</filename><sum type="sha256">cbce38f57e98d41d502583daddba671949dd48955125589f03b4d11bc1e09fbd</sum></package><package arch="x86_64" name="samba-winbind" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">99f676b7d76cb9611d80f26d7360e855b44e59f88451885224747bfe31dca627</sum></package><package arch="x86_64" name="samba-common" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">b613996d2381a7e82c187ae1c71c450a1dc77d2b7b5ad71f20686d13d064b3d2</sum></package><package arch="x86_64" name="samba-winbind-devel" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">dced4a3cda494db3bb6fbda8fd376eef1d5ce3066aed3baff341d498c43ab7f1</sum></package><package arch="x86_64" name="samba-swat" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">e788e5c2c404c97258382b365c0770c4d90f1bf7feff0af6606cb70c23f20cb8</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-30.el6_7.x86_64.rpm</filename><sum type="sha256">945bbdb3d56c0c631813e22b323b12743453152766522ef457859556945c8ecb</sum></package><package arch="i686" name="samba-winbind-clients" release="30.el6_7" src="samba-3.6.23-30.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-30.el6_7.i686.rpm</filename><sum type="sha256">c82f4d7ce431407409c57456d6aa1e63479d39ae8847de0ce93787267f31541c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" id="CVE-2015-5370" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" id="CVE-2016-2111" title="Samba: Spoofing Vulnerability When Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" id="CVE-2016-2112" title="Samba: Missing Downgrade Detection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" id="CVE-2016-2115" title="Samba: Smb Signing Not Required By Default When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" id="CVE-2016-2118" title="Samba: Samr And Lsa Man In The Middle Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0611" id="RHSA-2016:0611-1" title="Rhsa-2016:0611-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309987" id="1309987" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311902" id="1311902" title="Samba: Spoofing Vulnerability When Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311903" id="1311903" title="Samba: Missing Downgrade Detection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312084" id="1312084" title="Samba: Smb Signing Not Required By Default When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317990" id="1317990" title="Samba: Samr And Lsa Man In The Middle Attacks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0612-1</id><title>Samba And Samba4</title><description>Security Fix(es): 
* Multiple flaws were found in Samba's DCE/RPC protocol implementation. A remote, authenticated attacker could use these flaws to cause a denial of service against the Samba server (high CPU load or a crash) or, possibly, execute arbitrary code with the permissions of the user running Samba (root). This flaw could also be used to downgrade a secure DCE/RPC connection by a man-in-the-middle attacker taking control of an Active Directory (AD) object and compromising the security of a Samba Active Directory Domain Controller (DC). (CVE-2015-5370) 
Note: While Samba packages as shipped in Scientific Linux do not support running Samba as an AD DC, this flaw applies to all roles Samba implements. 
* A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database. (CVE-2016-2118) 
* Several flaws were found in Samba's implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection. (CVE-2016-2110) 
* It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine. (CVE-2016-2111) 
* It was found that Samba's LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections. (CVE-2016-2112) 
* It was found that Samba did not validate SSL/TLS certificates in certain connections. A man-in-the-middle attacker could use this flaw to spoof a Samba server using a specially crafted SSL/TLS certificate. (CVE-2016-2113) 
* It was discovered that Samba did not enforce Server Message Block (SMB) signing for clients using the SMB1 protocol. A man-in-the-middle attacker could use this flaw to modify traffic between a client and a server. (CVE-2016-2114) 
* It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (CVE-2016-2115)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-04-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libtdb" release="1.el6_7" src="libtdb-1.3.8-1.el6_7.src.rpm" version="1.3.8"><filename>libtdb-1.3.8-1.el6_7.i686.rpm</filename><sum type="sha256">d3f3209d31befdbc8923db13e156c505abc197836303c1215bab65afb009ef80</sum></package><package arch="x86_64" name="samba4-pidl" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">aec007daba4e385286803ddd160186278ae7f2e01686a7e4bf4b0dab3ebe31d7</sum></package><package arch="i686" name="libtalloc" release="1.el6_7" src="libtalloc-2.1.5-1.el6_7.src.rpm" version="2.1.5"><filename>libtalloc-2.1.5-1.el6_7.i686.rpm</filename><sum type="sha256">5d3212cddad3aa31a6735f512b034e19949e994e50749b78e5b2532efba1073e</sum></package><package arch="x86_64" name="samba4" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">df35fc4b60eff1437de7efa2dcc4e22631c2a3d31503fbdc29aecd558f25e6b6</sum></package><package arch="x86_64" name="pytalloc" release="1.el6_7" src="libtalloc-2.1.5-1.el6_7.src.rpm" version="2.1.5"><filename>pytalloc-2.1.5-1.el6_7.x86_64.rpm</filename><sum type="sha256">4b9e0eaca24014b15389fe522675b32c56ccca4af7ef02e60297372c5545d44b</sum></package><package arch="x86_64" name="libldb" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>libldb-1.1.25-2.el6_7.x86_64.rpm</filename><sum type="sha256">cef63a1b39abbfe40052a282792c6afb1eccdb9ee0bf83dfc2de4f1fc0819b8e</sum></package><package arch="x86_64" name="samba4-client" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">82fe08757e87d9398f2b409e76b046c27b1fb9140ee8de4ffeed70ff824f4e7a</sum></package><package arch="x86_64" name="libtevent-devel" release="2.el6_7" src="libtevent-0.9.26-2.el6_7.src.rpm" version="0.9.26"><filename>libtevent-devel-0.9.26-2.el6_7.x86_64.rpm</filename><sum type="sha256">9fc8bd2380fac2c6ce71c8f0d1766bf4902de197ab596db6e8572aaa524a1a3b</sum></package><package arch="x86_64" name="libtevent" release="2.el6_7" src="libtevent-0.9.26-2.el6_7.src.rpm" version="0.9.26"><filename>libtevent-0.9.26-2.el6_7.x86_64.rpm</filename><sum type="sha256">893b9803040d371af52ae6e9b24546eb2c93f2d4743c6f47ca4d9eee4132bdc3</sum></package><package arch="x86_64" name="samba4-test" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">aa41f3828918f9d80c8d5adbf1966403d2f29681ec8d37a3daea14a4d75cc3bc</sum></package><package arch="x86_64" name="samba4-common" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">bd01ed102713d1ef9428d7e0fb2d699cc431d7382b65f8a5a3ab3246d494f15c</sum></package><package arch="x86_64" name="ipa-server-selinux" release="47.el6_7.2" src="ipa-3.0.0-47.el6_7.2.src.rpm" version="3.0.0"><filename>ipa-server-selinux-3.0.0-47.el6_7.2.x86_64.rpm</filename><sum type="sha256">9612c577bbb228e3c872b5582411ec2a58badd1290f9eb01dab76ea084b61992</sum></package><package arch="x86_64" name="openchange" release="7.el6_7" src="openchange-1.0-7.el6_7.src.rpm" version="1.0"><filename>openchange-1.0-7.el6_7.x86_64.rpm</filename><sum type="sha256">234ad2e7dde2f832bc0a08ac913e8e427fbf6056bf24821fd95f1c072f11c826</sum></package><package arch="x86_64" name="ipa-python" release="47.el6_7.2" src="ipa-3.0.0-47.el6_7.2.src.rpm" version="3.0.0"><filename>ipa-python-3.0.0-47.el6_7.2.x86_64.rpm</filename><sum type="sha256">ed0aab7a0e91d88498161bbef07e128f89fcc355e49f582f1969cdd852a91b95</sum></package><package arch="i686" name="libtalloc-devel" release="1.el6_7" src="libtalloc-2.1.5-1.el6_7.src.rpm" version="2.1.5"><filename>libtalloc-devel-2.1.5-1.el6_7.i686.rpm</filename><sum type="sha256">c26bdc47dd05cd5c48118f6d3d2d8720c8081a6d8faabca35ba6e10acf00123b</sum></package><package arch="x86_64" name="libtdb" release="1.el6_7" src="libtdb-1.3.8-1.el6_7.src.rpm" version="1.3.8"><filename>libtdb-1.3.8-1.el6_7.x86_64.rpm</filename><sum type="sha256">4f8dc3e6627f4a8c54adf9f000d3ecc653ee1308dc628590db5592c943b5602d</sum></package><package arch="i686" name="libldb" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>libldb-1.1.25-2.el6_7.i686.rpm</filename><sum type="sha256">00ffad3e228a5e9e337716ffef80468b03db443c6830e152f694317de66905b1</sum></package><package arch="i686" name="libtdb-devel" release="1.el6_7" src="libtdb-1.3.8-1.el6_7.src.rpm" version="1.3.8"><filename>libtdb-devel-1.3.8-1.el6_7.i686.rpm</filename><sum type="sha256">05ca599ced4a6106bf22f25ae7dfd219e7d7e1d8b4442aba8e050d3900481896</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="47.el6_7.2" src="ipa-3.0.0-47.el6_7.2.src.rpm" version="3.0.0"><filename>ipa-server-trust-ad-3.0.0-47.el6_7.2.x86_64.rpm</filename><sum type="sha256">b0fb23e6c0028b657ffa7a52572bb2fa31fed24245477fd38fb7837ccc044242</sum></package><package arch="x86_64" name="samba4-dc-libs" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">4f4c52e4f358773ae0fe6f0221692396658f671bc50ec7d355b2c1e40a5e62ba</sum></package><package arch="x86_64" name="openchange-devel-docs" release="7.el6_7" src="openchange-1.0-7.el6_7.src.rpm" version="1.0"><filename>openchange-devel-docs-1.0-7.el6_7.x86_64.rpm</filename><sum type="sha256">fe34a966e5b702a5e0a0345a472b8ed9873e57aadfa2e698ab201313d26597ca</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el6_7" src="libtalloc-2.1.5-1.el6_7.src.rpm" version="2.1.5"><filename>pytalloc-devel-2.1.5-1.el6_7.x86_64.rpm</filename><sum type="sha256">7e021fe852710f74a749b71b91bde536d9d93996d42470de6edc90929220d7f2</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">b8b2ea601f49aa665b1113d95261703fd8628ec9f13aa32b4f98ead535c26829</sum></package><package arch="i686" name="libtevent-devel" release="2.el6_7" src="libtevent-0.9.26-2.el6_7.src.rpm" version="0.9.26"><filename>libtevent-devel-0.9.26-2.el6_7.i686.rpm</filename><sum type="sha256">cba1255522f5bda8d567f1bf1a4fa6c62246b4d541a800a0abacd48d3db29f98</sum></package><package arch="x86_64" name="libtalloc" release="1.el6_7" src="libtalloc-2.1.5-1.el6_7.src.rpm" version="2.1.5"><filename>libtalloc-2.1.5-1.el6_7.x86_64.rpm</filename><sum type="sha256">dc12735c635227e7a12a126db5db67d83def1ee671e608dcf188fafb54c71f8b</sum></package><package arch="x86_64" name="tdb-tools" release="1.el6_7" src="libtdb-1.3.8-1.el6_7.src.rpm" version="1.3.8"><filename>tdb-tools-1.3.8-1.el6_7.x86_64.rpm</filename><sum type="sha256">42d7b5cd7680ef782f597885cfa0c9ef3ec7e0b2e8c10d9ba08d4ff86d81c6d0</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">2a12eba163321557b169eb6e20fee39a87483536cca271085acfbe3612ca2ed2</sum></package><package arch="x86_64" name="samba4-winbind" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">1968a2bf5d9fef6a91bb6522f686de05a9bf35106b47ffc392d6eaf36bde02f2</sum></package><package arch="x86_64" name="pyldb-devel" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>pyldb-devel-1.1.25-2.el6_7.x86_64.rpm</filename><sum type="sha256">16d132bf256b5451bfc10a7be4c196b0b4520a84684ba8d41fc264f61376b1dd</sum></package><package arch="x86_64" name="samba4-devel" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">6bedc6b0244c49309f1cb37dfe861260b15daee3991a4aa682a5ce599ac63afc</sum></package><package arch="x86_64" name="samba4-libs" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">65887f2e883628b4131189eacf44d59797a066d31afe61d5ba50f20d28551c3e</sum></package><package arch="x86_64" name="python-tdb" release="1.el6_7" src="libtdb-1.3.8-1.el6_7.src.rpm" version="1.3.8"><filename>python-tdb-1.3.8-1.el6_7.x86_64.rpm</filename><sum type="sha256">22db56cd41fe02ba0373a2a333af522b27c39a38cfe8c27ab0bce3976f55186d</sum></package><package arch="x86_64" name="libtalloc-devel" release="1.el6_7" src="libtalloc-2.1.5-1.el6_7.src.rpm" version="2.1.5"><filename>libtalloc-devel-2.1.5-1.el6_7.x86_64.rpm</filename><sum type="sha256">9085297c6f98d765147757751d619695108cf1df8e7d54d6e6d7fa074ea314bc</sum></package><package arch="x86_64" name="libldb-devel" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>libldb-devel-1.1.25-2.el6_7.x86_64.rpm</filename><sum type="sha256">e0299e6ca5660464e3984343055058b40a55b179a7d1006368f5a7cde24ff9ef</sum></package><package arch="x86_64" name="ipa-admintools" release="47.el6_7.2" src="ipa-3.0.0-47.el6_7.2.src.rpm" version="3.0.0"><filename>ipa-admintools-3.0.0-47.el6_7.2.x86_64.rpm</filename><sum type="sha256">9370ff4769f508df3591626faa4b5de845de41a2b523cd7c48995ae059b3a000</sum></package><package arch="x86_64" name="ipa-client" release="47.el6_7.2" src="ipa-3.0.0-47.el6_7.2.src.rpm" version="3.0.0"><filename>ipa-client-3.0.0-47.el6_7.2.x86_64.rpm</filename><sum type="sha256">bc95c8e9e34a4715e4a0822a4abd308d10cfb59828c2f59bd1bb1271b510a9ec</sum></package><package arch="i686" name="libtevent" release="2.el6_7" src="libtevent-0.9.26-2.el6_7.src.rpm" version="0.9.26"><filename>libtevent-0.9.26-2.el6_7.i686.rpm</filename><sum type="sha256">65931d5cbc43af912199617d27f35883b09105ac2826f3f0b12fb3e86e62bb42</sum></package><package arch="x86_64" name="samba4-dc" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">ca01e0430698a87bc9415dc0091a6d0c61007ca61ca9815602e3f84bfe08502d</sum></package><package arch="x86_64" name="samba4-python" release="6.el6_7" src="samba4-4.2.10-6.el6_7.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-6.el6_7.x86_64.rpm</filename><sum type="sha256">9fe4f9d1170e88fca9ebed1bfd975643a3400c61ee9a3bc6a4c426748be4d05e</sum></package><package arch="x86_64" name="openchange-devel" release="7.el6_7" src="openchange-1.0-7.el6_7.src.rpm" version="1.0"><filename>openchange-devel-1.0-7.el6_7.x86_64.rpm</filename><sum type="sha256">6fef1a5e2dd632ad70c93c3450dcd21f0f8d2b1672ab9ee9dc1368e8e810186e</sum></package><package arch="i686" name="libldb-devel" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>libldb-devel-1.1.25-2.el6_7.i686.rpm</filename><sum type="sha256">e84bb62900bc3005a44fa30ffc8f830529fcd156ef7b461091fddd46a541e052</sum></package><package arch="x86_64" name="libtdb-devel" release="1.el6_7" src="libtdb-1.3.8-1.el6_7.src.rpm" version="1.3.8"><filename>libtdb-devel-1.3.8-1.el6_7.x86_64.rpm</filename><sum type="sha256">3fffcd30be37e9a38a2b90e1826b617e018272b997e4cb418b4ae67bc762b907</sum></package><package arch="x86_64" name="python-tevent" release="2.el6_7" src="libtevent-0.9.26-2.el6_7.src.rpm" version="0.9.26"><filename>python-tevent-0.9.26-2.el6_7.x86_64.rpm</filename><sum type="sha256">4746fe3429c7f7d3ca0de1ea3cd4d8842537344b528b2cc52fa62c9dea13ed09</sum></package><package arch="x86_64" name="ipa-server" release="47.el6_7.2" src="ipa-3.0.0-47.el6_7.2.src.rpm" version="3.0.0"><filename>ipa-server-3.0.0-47.el6_7.2.x86_64.rpm</filename><sum type="sha256">88cefdcb10b4c13b4802c8430b3e791827b30d66e7be1203c4be5e218b734368</sum></package><package arch="x86_64" name="ldb-tools" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>ldb-tools-1.1.25-2.el6_7.x86_64.rpm</filename><sum type="sha256">e8f56bf26edd3a4dc528b61d3bd8d1b3ed2ef545478968446b21a4b8ebc3ee07</sum></package><package arch="x86_64" name="openchange-client" release="7.el6_7" src="openchange-1.0-7.el6_7.src.rpm" version="1.0"><filename>openchange-client-1.0-7.el6_7.x86_64.rpm</filename><sum type="sha256">e5fdb90f7093d728c06ce9c5b919cd771e6923865339393dc6efb532f8547d46</sum></package><package arch="x86_64" name="pyldb" release="2.el6_7" src="libldb-1.1.25-2.el6_7.src.rpm" version="1.1.25"><filename>pyldb-1.1.25-2.el6_7.x86_64.rpm</filename><sum type="sha256">986f430e3a4e0de72b278f2480139885babf9aa6c28a8fe8c20fc963e509127e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" id="CVE-2015-5370" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" id="CVE-2016-2110" title="Samba: Man-In-The-Middle Attacks Possible With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" id="CVE-2016-2111" title="Samba: Spoofing Vulnerability When Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" id="CVE-2016-2112" title="Samba: Missing Downgrade Detection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" id="CVE-2016-2113" title="Samba: Server Certificates Not Validated At " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" id="CVE-2016-2114" title="Samba: Samba Based Active Directory Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" id="CVE-2016-2115" title="Samba: Smb Signing Not Required By Default When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" id="CVE-2016-2118" title="Samba: Samr And Lsa Man In The Middle Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0612" id="RHSA-2016:0612-1" title="Rhsa-2016:0612-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309987" id="1309987" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311893" id="1311893" title="Samba: Man-In-The-Middle Attacks Possible With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311902" id="1311902" title="Samba: Spoofing Vulnerability When Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311903" id="1311903" title="Samba: Missing Downgrade Detection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311910" id="1311910" title="Samba: Server Certificates Not Validated At " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312082" id="1312082" title="Samba: Samba Based Active Directory Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312084" id="1312084" title="Samba: Smb Signing Not Required By Default When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317990" id="1317990" title="Samba: Samr And Lsa Man In The Middle Attacks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0651-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component in OpenJDK used a non-constant time comparison when comparing GCM authentication tags. A remote attacker could possibly use this flaw to determine the value of the authentication tag. (CVE-2016-3426) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">5a1008032e660b84f0cc25adb5f7896dc0a33aa8ce33eb262d21f2c7e979d84a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">d611efec09da5f495336b286e810851de68371649b6b43fc8be05b2d2ec58056</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el6_7.noarch.rpm</filename><sum type="sha256">2c6875600a769ad90121dcf95de82c89430a398f1e08a44585d3632f53e503ab</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">84af2955c6f692cb66db100771b0f1e04285d65853249aefc3aa4ef031c1eadd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">32150388c901647438df5b9fbc5c5fad4516dfa63eac888d8835c124a28f4844</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">6561fa559f4e7fd09576e030269e7ad93a8ac27ef3fb166f84a2d928f3fc18f3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-src-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">27e4d2e5a370df3c4657b322271128ea8f3958cddf87025b1e1592f368d341f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">7442c42c2a7ad6c682d9d56b664fc48e91bdbf8d37e6427ad98a113b364caa51</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">48458f7a49f067b8adbe917464298325fac70a6e188830f8792ec43f6f2d0bd2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">a22e728ea7e16bf88e2f4ba5f31c0729eb39fbd0d07b8c15a12e75303c249fce</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b14.el6_7" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el6_7.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el6_7.x86_64.rpm</filename><sum type="sha256">3ee73006e78e883e1b9557c5d47d5d4e1cfd02e458e57499cea24bb12f7e42bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" id="CVE-2016-3426" title="Openjdk: Non-Constant Time Gcm Authentication " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0651" id="RHSA-2016:0651-1" title="Rhsa-2016:0651-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328059" id="1328059" title="Openjdk: Non-Constant Time Gcm Authentication " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0675-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.6.1.el6_7" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm</filename><sum type="sha256">029bea465d991b6432e02d86a10b9aadf71656c52b510393b55783b5c8378930</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.6.1.el6_7" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el6_7.noarch.rpm</filename><sum type="sha256">3030c2513883d0cd33a7362b2acd90698987e4f1e3bd4ee604dad51ea97f0bd5</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.6.1.el6_7" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm</filename><sum type="sha256">1b6776f3b47f930d7ded2fc61439b094607ade0e348cdbcb504a5feb6ee24079</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.6.1.el6_7" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm</filename><sum type="sha256">7b0def1935cae9b265047885daf33ffce9a8d9128d3d6254dc0137e8554c8eea</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.6.1.el6_7" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el6_7.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el6_7.x86_64.rpm</filename><sum type="sha256">c9156c82949acb4a125cf6915f01c3c6d88fb4a8b169b8563bf775b1c63d3293</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0675" id="RHSA-2016:0675-1" title="Rhsa-2016:0675-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0695-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.1.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2805, CVE-2016-2806, CVE-2016-2807, CVE-2016-2808, CVE-2016-2814)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-45.1.0-1.el6_7.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">e1a8896294604abd3ae497571cc3110a42949b38677a422d3c30471c747cc29d</sum></package><package arch="i686" name="firefox" release="1.el6_7" src="firefox-45.1.0-1.el6_7.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el6_7.i686.rpm</filename><sum type="sha256">f8d450d7c4917ad6cbcb888e8e6f2fa18f84ebcf30bb4960a04453daa34abe39</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" id="CVE-2016-2806" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" id="CVE-2016-2808" title="Mozilla: Write To Invalid Hashmap Entry Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" id="CVE-2016-2814" title="Mozilla: Buffer Overflow In Libstagefright With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0695" id="RHSA-2016:0695-1" title="Rhsa-2016:0695-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330270" id="1330270" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330280" id="1330280" title="Mozilla: Buffer Overflow In Libstagefright With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330286" id="1330286" title="Mozilla: Write To Invalid Hashmap Entry Through " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0715-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the way the Linux kernel handled IRET faults during the processing of NMIs. An unprivileged, local user could use this flaw to crash the system or, potentially (although highly unlikely), escalate their privileges on the system. (CVE-2015-5157, Moderate) 
* A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) 
Bug Fix(es): 
* When the nvme driver held the queue lock for too long, for example during DMA mapping, a lockup occurred leading to nvme hard-lockup panic. This update fixes the underlying source code, and nvme now works as expected. 
* Due to a regression, a Unix domain datagram socket could come to a deadlock when sending a datagram to itself. The provided patch adds another "sk" check to the unix_dgram_sendmsg() function, and the aforementioned deadlock no longer occurs. 
* Previously, writing a large file using direct I/O in 16 MB chunks sometimes caused a pathological allocation pattern where 16 MB chunks of large free extent were allocated to a file in reversed order. The provided patch avoids the backward allocation, and writing a large file using direct I/O now proceeds successfully. 
* MD RAID1 devices that repeatedly became hot removed and re-added could become mismatched due to a race condition. This caused them to return stale data, leading to data corruption. The provided set of patches fixes this bug, and hot removals and re-additions of md devices now work as expected. 
* A couple of previous fixes caused a deadlock on the "rq" lock leading to a kernel panic on CPU 0. The provided set of patches reverts the relevant commits, thus preventing the panic from occurring. 
Enhancement(s): 
* VLAN support has been updated to integrate some of the latest upstream features. This update also makes sure that Null pointer crashes related to VLAN support in bonding mode no longer occur and that tag stripping and insertion work as expected. 
* This update adds additional model numbers for Broadwell to perf.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">8ae6e0e1a0dac3f0689617d399d75334c4dbb36dc52d2c8896cbd9778ffaf693</sum></package><package arch="noarch" name="kernel-firmware" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.26.1.el6.noarch.rpm</filename><sum type="sha256">22ed88a9528d6619ff427e44025f54f3cefa607286ea0f30046d0f78c094f2e8</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">29a1f46d7d738dcb55115a5d0bde12160705c0bbd3e3cb5e46224ee305835204</sum></package><package arch="x86_64" name="kernel-headers" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">c037ffac9a54b19de5eb8947e7c8c1446b003a22341d1b6d1f93c16d7ad53ce8</sum></package><package arch="x86_64" name="kernel" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">c3ea6abff4793bc9e247002806d9c1d711a6d564667a1dedc59f5301aff61a82</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.26.1.el6.noarch.rpm</filename><sum type="sha256">266f276fd52e800e319b724bf54bd08100f060c3c7ed5bd5400512ed791ed487</sum></package><package arch="x86_64" name="perf" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">a0c316957969bd8430ebf5ae93aa3c262364a59a12d006e7f86f0273eade31fb</sum></package><package arch="noarch" name="kernel-doc" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.26.1.el6.noarch.rpm</filename><sum type="sha256">eb7c9b79a5e3331173609b64e8bea7d405f1496af6fde30bc6eca2452de3b13f</sum></package><package arch="x86_64" name="python-perf" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">ba4d05edf27a03a0a62eaf6645af36f302f530509914f60afdeb433bc74b64cc</sum></package><package arch="x86_64" name="kernel-devel" release="573.26.1.el6" src="kernel-2.6.32-573.26.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.26.1.el6.x86_64.rpm</filename><sum type="sha256">c33778d4be560f827f299fb4d8c077852f7c8934a0effb0fa95b81edbb5e6a9f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" id="CVE-2015-5157" title="Kernel: X86-64: Iret Faults During Nmis Processing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" id="CVE-2015-8767" title="Kernel: Sctp Denial Of Service During Timeout" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0715" id="RHSA-2016:0715-1" title="Rhsa-2016:0715-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259577" id="1259577" title="Kernel: X86-64: Iret Faults During Nmis Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297389" id="1297389" title="Kernel: Sctp Denial Of Service During Timeout" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0723-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.11.0.el6_7" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm</filename><sum type="sha256">d308eff2c307afcf0754a4b5c021d1d6b8a189765a6162cdeaed28026c63c729</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.11.0.el6_7" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm</filename><sum type="sha256">8cadc6adcb4070fb2b09ceb61cf9ae8fd530d8b88733165e9359028ec80b2658</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.11.0.el6_7" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm</filename><sum type="sha256">4a20398d1463a4c3f9aac566e1f151d732c25436f380d8651c9ded6bf927edc0</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.11.0.el6_7" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm</filename><sum type="sha256">e5a59eab551f47125898dbc5a7472f3151ad302e0953c694d3a0ff1800a78863</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.11.0.el6_7" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm</filename><sum type="sha256">c89ff663fb06bf73fcb30f60dc7623f8f5a77d59917384e717722f1df3c78705</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0723" id="RHSA-2016:0723-1" title="Rhsa-2016:0723-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0726-1</id><title>Imagemagick</title><description>Security Fix(es): 
* It was discovered that ImageMagick did not properly sanitize certain input before passing it to the delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-3714) 
* It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow the attacker to delete, move, or disclose the contents of arbitrary files. (CVE-2016-3715, CVE-2016-3716, CVE-2016-3717) 
* A server-side request forgery flaw was discovered in the way ImageMagick processed certain images. A remote attacker could exploit this flaw to mislead an application using ImageMagick or an unsuspecting user using the ImageMagick utilities into, for example, performing HTTP(S) requests or opening FTP sessions via specially crafted images. (CVE-2016-3718) 
Note: This update contains an updated /etc/ImageMagick/policy.xml file that disables the EPHEMERAL, HTTPS, HTTP, URL, FTP, MVG, MSL, TEXT, and LABEL coders. If you experience any problems after the update, it may be necessary to manually adjust the policy.xml file to match your requirements. Please take additional precautions to ensure that your applications using the ImageMagick library do not process malicious or untrusted files before doing so.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ImageMagick-c++" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-6.7.2.7-4.el6_7.x86_64.rpm</filename><sum type="sha256">2d828facd626a1d198b6ef5f061caca85258a7ed3c5c5ed35367e0f37d6b4ff1</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-devel-6.7.2.7-4.el6_7.x86_64.rpm</filename><sum type="sha256">3584a4563824e6977902bfdaadb64f963d2372e5340d5dd01c8b1b4f91a7e880</sum></package><package arch="i686" name="ImageMagick-c++" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm</filename><sum type="sha256">5af428c3dbe877f96d348356eb7c4ff10bb65aa13abaf5797edf863a405c7756</sum></package><package arch="i686" name="ImageMagick-devel" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm</filename><sum type="sha256">5ffaff95316b02fcef2214d164fc7800f44c515cf0d29905bd971fe842d59889</sum></package><package arch="x86_64" name="ImageMagick" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-6.7.2.7-4.el6_7.x86_64.rpm</filename><sum type="sha256">dec1f06c343c212b2812fd4367e682ab885e7c81fdcb8dfc592f486d5459aae1</sum></package><package arch="x86_64" name="ImageMagick-perl" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-perl-6.7.2.7-4.el6_7.x86_64.rpm</filename><sum type="sha256">56d4ca69a0903a936ff0123ece5e31b90ccd23279de16aeb905b33467e976dd5</sum></package><package arch="x86_64" name="ImageMagick-doc" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-doc-6.7.2.7-4.el6_7.x86_64.rpm</filename><sum type="sha256">2f09f9167899684ecc8f37e05d3d8b271142ef70bd2b43bc993645e406a991d9</sum></package><package arch="x86_64" name="ImageMagick-devel" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-devel-6.7.2.7-4.el6_7.x86_64.rpm</filename><sum type="sha256">0081676b1edac0aea3109c1631cb5a0163d1ee932d4fd5ab39370d8ca6f00563</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm</filename><sum type="sha256">d13129b1fc0687793a7ac0a9fcb8925ff02c0194f5e37eccfc0f67d723fb4e66</sum></package><package arch="i686" name="ImageMagick" release="4.el6_7" src="ImageMagick-6.7.2.7-4.el6_7.src.rpm" version="6.7.2.7"><filename>ImageMagick-6.7.2.7-4.el6_7.i686.rpm</filename><sum type="sha256">792065677c547d92342932a5d6bc21902aca5e889370871e7e410c7fd1ad99dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" id="CVE-2016-3714" title="Imagemagick: Insufficient Shell Characters Filtering" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" id="CVE-2016-3715" title="Imagemagick: File Deletion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" id="CVE-2016-3716" title="Imagemagick: File Moving" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" id="CVE-2016-3717" title="Imagemagick: Local File Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" id="CVE-2016-3718" title="Imagemagick: Ssrf Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0726" id="RHSA-2016:0726-1" title="Rhsa-2016:0726-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332492" id="1332492" title="Imagemagick: Insufficient Shell Characters Filtering" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332500" id="1332500" title="Imagemagick: File Deletion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332504" id="1332504" title="Imagemagick: File Moving" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332505" id="1332505" title="Imagemagick: Local File Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332802" id="1332802" title="Imagemagick: Ssrf Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0741-1</id><title>Openssh</title><description>Security Fix(es): 
* It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2015-5352) 
* A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users. (CVE-2015-6563) 
* A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges. (CVE-2015-6564) 
* An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pam_ssh_agent_auth" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-117.el6.x86_64.rpm</filename><sum type="sha256">491fbfad24d9c03582ceed6add3847f6069f445f963d64bd312da06fdcb9bf35</sum></package><package arch="x86_64" name="openssh" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="5.3p1"><filename>openssh-5.3p1-117.el6.x86_64.rpm</filename><sum type="sha256">7d88a649d398f631f253736f79b44be833364df8724d9a3cd0308f6c5cb36982</sum></package><package arch="src" name="openssh" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="5.3p1"><filename>openssh-5.3p1-117.el6.src.rpm</filename><sum type="sha256">0b2eb90d41525d4e7b44aaa49274e699d32d8a210f033a8f9aa2163d2e1ef620</sum></package><package arch="x86_64" name="openssh-clients" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-117.el6.x86_64.rpm</filename><sum type="sha256">a9b49c008fa53247a16b2eed74b060dda0fe726bff1aa00b5dc09610d8476b5f</sum></package><package arch="x86_64" name="openssh-ldap" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-117.el6.x86_64.rpm</filename><sum type="sha256">7ecc44642bfe7a0150e4f751629c8fd3ddc5979242520f3b983b796c8f550d28</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-117.el6.i686.rpm</filename><sum type="sha256">76529803eb6646bd794efee2a39f73f4024fa3d1e41c1d6f54c79bc2b054fe7b</sum></package><package arch="x86_64" name="openssh-server" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-117.el6.x86_64.rpm</filename><sum type="sha256">e1f10a46534ffd4f1c176ddecb3a67cdb314c982a6b4f24b9e3b61df535c38f0</sum></package><package arch="x86_64" name="openssh-askpass" release="117.el6" src="openssh-5.3p1-117.el6.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-117.el6.x86_64.rpm</filename><sum type="sha256">b0d9c8111f2471792cd8d75ef3032987aa429006443006ff59e68cb7af03f86e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" id="CVE-2015-5352" title="Openssh: Xsecurity Restrictions Bypass Under " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" id="CVE-2015-6563" title="Openssh: Privilege Separation Weakness Related To Pam Support" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" id="CVE-2015-6564" title="Openssh: Use-After-Free Bug Related To Pam Support" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" id="CVE-2016-1908" title="Openssh: Possible Fallback From Untrusted To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0741" id="RHSA-2016:0741-1" title="Rhsa-2016:0741-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211673" id="1211673" title="[Rfe] Backport Match Localaddress From Openssh 6.1 (And Later)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218070" id="1218070" title="Ecdsa Host Key Not Loaded By Sshd By Default (Inconsistent " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1219820" id="1219820" title="Lack Of Clarity Of Match Block Processing And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1238231" id="1238231" title="Openssh: Xsecurity Restrictions Bypass Under " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252844" id="1252844" title="Openssh: Privilege Separation Weakness Related To Pam Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252852" id="1252852" title="Openssh: Use-After-Free Bug Related To Pam Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298741" id="1298741" title="Openssh: Possible Fallback From Untrusted To " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0760-1</id><title>File</title><description>Security Fix(es): 
* Multiple flaws were found in the file regular expression rules for detecting various files. A remote attacker could use these flaws to cause file to consume an excessive amount of CPU. (CVE-2014-3538) 
* A denial of service flaw was found in the way file parsed certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash file via a specially crafted CDF file. (CVE-2014-3587) 
* Multiple flaws were found in the way file parsed Executable and Linkable Format (ELF) files. A remote attacker could use these flaws to cause file to crash, disclose portions of its memory, or consume an excessive amount of system resources. (CVE-2014-3710, CVE-2014-8116, CVE-2014-8117, CVE-2014-9620, CVE-2014-9653)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="file-libs" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>file-libs-5.04-30.el6.i686.rpm</filename><sum type="sha256">a7a4c50e8cdeed5f18678fa8bba77aabb2c61228a220de13b45e10422866f8d3</sum></package><package arch="x86_64" name="file-static" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>file-static-5.04-30.el6.x86_64.rpm</filename><sum type="sha256">0dcedcd0b852839a179614394cb12a32943aebff2b9a29d0321d2a1c9aaf4bc8</sum></package><package arch="x86_64" name="file-devel" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>file-devel-5.04-30.el6.x86_64.rpm</filename><sum type="sha256">4eaa2f89767d7f15e0d958349b066b1fdbceb2ec6c8f36ee02b60a5fa3675529</sum></package><package arch="x86_64" name="python-magic" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>python-magic-5.04-30.el6.x86_64.rpm</filename><sum type="sha256">d5d4e09941f55c68cf12cbdaeb5cd34e2451f81b968617f0286c8198f121260d</sum></package><package arch="i686" name="file-devel" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>file-devel-5.04-30.el6.i686.rpm</filename><sum type="sha256">8d7e30adc6b50822c0dee87f14204d2b7593457c076a506fe61db4259cb80c93</sum></package><package arch="x86_64" name="file-libs" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>file-libs-5.04-30.el6.x86_64.rpm</filename><sum type="sha256">4bf9aba10811a0f58d7aede59977a160cd004929e7f31bb40e1d56b8853584a2</sum></package><package arch="x86_64" name="file" release="30.el6" src="file-5.04-30.el6.src.rpm" version="5.04"><filename>file-5.04-30.el6.x86_64.rpm</filename><sum type="sha256">c10778c14b2a11c55eaeaa725fd174edcb8dd220df53e796f75c4eb4a8db9006</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538" id="CVE-2014-3538" title="File: Unrestricted Regular Expression Matching" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" id="CVE-2014-3587" title="File: Incomplete Fix For Cve-2012-1571 In Cdf_Read_Property_Info" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" id="CVE-2014-3710" title="File: Out-Of-Bounds Read In Elf Note Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" id="CVE-2014-8116" title="File: Multiple Denial Of Service Issues (Resource Consumption)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" id="CVE-2014-8117" title="File: Denial Of Service Issue (Resource Consumption)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620" id="CVE-2014-9620" title="File: Limit The Number Of Elf Notes Processed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653" id="CVE-2014-9653" title="File: Malformed Elf File Causes Access To Uninitialized Memory" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0760" id="RHSA-2016:0760-1" title="Rhsa-2016:0760-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1098222" id="1098222" title="File: Unrestricted Regular Expression Matching" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128587" id="1128587" title="File: Incomplete Fix For Cve-2012-1571 In Cdf_Read_Property_Info" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154802" id="1154802" title="File Reports &quot;Data&quot; Instead Of Zip File When The First File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155071" id="1155071" title="File: Out-Of-Bounds Read In Elf Note Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169509" id="1169509" title="File: Report Full Java Version For 1.7 And 1.8 Class Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171580" id="1171580" title="File: Multiple Denial Of Service Issues (Resource Consumption)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174606" id="1174606" title="File: Denial Of Service Issue (Resource Consumption)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180639" id="1180639" title="File: Limit The Number Of Elf Notes Processed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190116" id="1190116" title="File: Malformed Elf File Causes Access To Uninitialized Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243650" id="1243650" title="If We Execute The File Command Against /Var/Log/Messages Then " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=809898" id="809898" title="Rfe: Add Detection Of Python Bytecode For Recent Versions Of Python" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0778-1</id><title>Icedtea-Web</title><description>The following packages have been upgraded to a newer upstream version: icedtea-web (1.6.2). 
Security Fix(es): 
* It was discovered that IcedTea-Web did not properly sanitize applet URLs when storing applet trust settings. A malicious web page could use this flaw to inject trust-settings configuration, and cause applets to be executed without user approval. (CVE-2015-5234) 
* It was discovered that IcedTea-Web did not properly determine an applet's origin when asking the user if the applet should be run. A malicious page could use this flaw to cause IcedTea-Web to execute the applet without user approval, or confuse the user into approving applet execution based on an incorrectly indicated applet origin. (CVE-2015-5235)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="icedtea-web-javadoc" release="1.el6" src="icedtea-web-1.6.2-1.el6.src.rpm" version="1.6.2"><filename>icedtea-web-javadoc-1.6.2-1.el6.noarch.rpm</filename><sum type="sha256">11a8bea0827180653c4f4106665513d8f2a44e4ee700dfd1ea2cab75acbdde10</sum></package><package arch="x86_64" name="icedtea-web" release="1.el6" src="icedtea-web-1.6.2-1.el6.src.rpm" version="1.6.2"><filename>icedtea-web-1.6.2-1.el6.x86_64.rpm</filename><sum type="sha256">95a5faa1c9239bc9797d38036218b33392b3363603016b8856a26378542e954b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234" id="CVE-2015-5234" title="Icedtea-Web: Unexpected Permanent Authorization " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235" id="CVE-2015-5235" title="Icedtea-Web: Applet Origin Spoofing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0778" id="RHSA-2016:0778-1" title="Rhsa-2016:0778-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233667" id="1233667" title="Icedtea-Web: Unexpected Permanent Authorization " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233697" id="1233697" title="Icedtea-Web: Applet Origin Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299976" id="1299976" title="Jnlp.Launchexception: Fatal: Initialization Error - " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0780-1</id><title>Ntp</title><description>Security Fix(es): 
* It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702) 
* A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701) 
* An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852) 
* A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977) 
* A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd. (CVE-2015-7978) 
* It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194) 
* It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. (CVE-2015-5195) 
* It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219) 
* It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-7703) 
The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvr (Red Hat).</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntpdate" release="10.el6" src="ntp-4.2.6p5-10.el6.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-10.el6.x86_64.rpm</filename><sum type="sha256">836175503d8a7a6e588e9ecffa139cfaf540e9982a968c6d48e5862c175c0e05</sum></package><package arch="x86_64" name="ntp" release="10.el6" src="ntp-4.2.6p5-10.el6.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-10.el6.x86_64.rpm</filename><sum type="sha256">5ebcec029f1592f2d3f24cb2fafcb20386f26c7371957f1be38d5b339142056d</sum></package><package arch="x86_64" name="ntp-perl" release="10.el6" src="ntp-4.2.6p5-10.el6.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-10.el6.x86_64.rpm</filename><sum type="sha256">e4d6c2224335adf1851383bae9cc9c4d6dfe5a74ae36eea245fbcb12f563f215</sum></package><package arch="noarch" name="ntp-doc" release="10.el6" src="ntp-4.2.6p5-10.el6.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-10.el6.noarch.rpm</filename><sum type="sha256">9e8ab0e77ea5db65ea8080dec8cb5c85d04987e5efe39975d1e52b89b1bf41e9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194" id="CVE-2015-5194" title="Ntp: Crash With Crafted Logconfig Configuration " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195" id="CVE-2015-5195" title="Ntp: Ntpd Crash When Processing Config Commands " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" id="CVE-2015-5219" title="Ntp: Infinite Loop In Sntp Processing Crafted Packet" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" id="CVE-2015-7691" title="Ntp: Incomplete " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" id="CVE-2015-7692" title="Ntp: Incomplete " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" id="CVE-2015-7701" title="Ntp: Slow Memory Leak In Crypto_Assoc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" id="CVE-2015-7702" title="Ntp: Incomplete " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" id="CVE-2015-7703" title="Ntp: Config Command Can Be Used To Set The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" id="CVE-2015-7852" title="Ntp: Ntpq Atoascii Memory Corruption Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" id="CVE-2015-7977" title="Ntp: Restriction List Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" id="CVE-2015-7978" title="Ntp: Stack Exhaustion In Recursive Traversal Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0780" id="RHSA-2016:0780-1" title="Rhsa-2016:0780-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254542" id="1254542" title="Ntp: Crash With Crafted Logconfig Configuration " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254544" id="1254544" title="Ntp: Ntpd Crash When Processing Config Commands " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254547" id="1254547" title="Ntp: Config Command Can Be Used To Set The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255118" id="1255118" title="Ntp: Infinite Loop In Sntp Processing Crafted Packet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274254" id="1274254" title="Ntp: Incomplete " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274255" id="1274255" title="Ntp: Slow Memory Leak In Crypto_Assoc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274261" id="1274261" title="Ntp: Ntpq Atoascii Memory Corruption Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286969" id="1286969" title="Ntpstat Reports Synchronized Even When The Local Ntpd Doesn'T " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300269" id="1300269" title="Ntp: Restriction List Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300270" id="1300270" title="Ntp: Stack Exhaustion In Recursive Traversal Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0855-1</id><title>Kernel</title><description>Security Fix(es): 
* It was found that reporting emulation failures to user space could lead to either a local (CVE-2014-7842) or a L2-&gt;L1 (CVE-2010-5313) denial of service. In the case of a local denial of service, an attacker must have access to the MMIO area or be able to access an I/O port. Please note that on certain systems, HPET is mapped to userspace as part of vdso (vvar) and thus an unprivileged user may generate MMIO transactions (and enter the emulator) this way. (CVE-2010-5313, CVE-2014-7842, Moderate) 
* It was found that the Linux kernel did not properly account file descriptors passed over the unix socket against the process limit. A local user could use this flaw to exhaust all available memory on the system. (CVE-2013-4312, Moderate) 
* A buffer overflow flaw was found in the way the Linux kernel's virtio- net subsystem handled certain fraglists when the GRO (Generic Receive Offload) functionality was enabled in a bridged network configuration. An attacker on the local network could potentially use this flaw to crash the system, or, although unlikely, elevate their privileges on the system. (CVE-2015-5156, Moderate) 
* It was found that the Linux kernel's IPv6 network stack did not properly validate the value of the MTU variable when it was set. A remote attacker could potentially use this flaw to disrupt a target system's networking (packet loss) by setting an invalid MTU value, for example, via a NetworkManager daemon that is processing router advertisement packets running on the target system. (CVE-2015-8215, Moderate) 
* A NULL pointer dereference flaw was found in the way the Linux kernel's network subsystem handled socket creation with an invalid protocol identifier. A local user could use this flaw to crash the system. (CVE-2015-8543, Moderate) 
* It was found that the espfix functionality does not work for 32-bit KVM paravirtualized guests. A local, unprivileged guest user could potentially use this flaw to leak kernel stack addresses. (CVE-2014-8134, Low) 
* A flaw was found in the way the Linux kernel's ext4 file system driver handled non-journal file systems with an orphan list. An attacker with physical access to the system could use this flaw to crash the system or, although unlikely, escalate their privileges on the system. (CVE-2015-7509, Low) 
* A NULL pointer dereference flaw was found in the way the Linux kernel's ext4 file system driver handled certain corrupted file system images. An attacker with physical access to the system could use this flaw to crash the system. (CVE-2015-8324, Low) 
Notes: * Problems have been reported with this kernel and VirtualBox. More info is available in the notes for the VirtualBox ticket here: https://www.virtualbox.org/ticket/14866</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.el6.noarch.rpm</filename><sum type="sha256">d945a3ecc43d58b4b404495a939af9dee48015aa9bb7a184afaba9920e76d6b3</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">8c52eafc99c46e507873b73d1202a4e2c3f5089c557505c99865507aea820c77</sum></package><package arch="x86_64" name="perf" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">b560fac484bb5959ed4fb460fb220a092d8362956194f359c6b9badb9494e4ba</sum></package><package arch="x86_64" name="python-perf" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">2c528592c74c2fd2b8a7e2bd54e49f273d7cb72a0a31ad663c16b6f9880ef74c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.el6.noarch.rpm</filename><sum type="sha256">656f377656e4f9a9c0c3f8bc18a92879a591027bae6a50641f8eb920dd959714</sum></package><package arch="x86_64" name="kernel-devel" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">067840a5b59393e5d67b88b1a4c3f02faf4f5a479b9c88d9b243bb42e53be1d5</sum></package><package arch="x86_64" name="kernel-headers" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">044290c67fe63fcbfa54b7615eae1fd89e7aecd7f1d6a58e5ee276596ccb77bd</sum></package><package arch="x86_64" name="kernel-debug" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">85cbafcb3fef1bc2dd2d860fa5cb1ed389f9dbf1365e068598395f65b11e0652</sum></package><package arch="noarch" name="kernel-firmware" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.el6.noarch.rpm</filename><sum type="sha256">c748d770c969e1215262d23134f791f63747d52369a3d9c53ee5b086102e6817</sum></package><package arch="x86_64" name="kernel" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.el6.x86_64.rpm</filename><sum type="sha256">aea2b506bf0960dc9929e7c16d7959819eaae43baab9821ec2855d236d489b02</sum></package><package arch="i686" name="kernel-debug-devel" release="642.el6" src="kernel-2.6.32-642.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.el6.i686.rpm</filename><sum type="sha256">05f503173a5609313d2b23ea3f8e4b1bf4a5adf72482742137aba7b572e9eff5</sum></package><package arch="noarch" name="kmod-openafs" release="1.SL68.el6" src="kmod-openafs-1.6.17-1.SL68.el6.src.rpm" version="1.6.17"><filename>kmod-openafs-1.6.17-1.SL68.el6.noarch.rpm</filename><sum type="sha256">69f3d457b22fa2265dba6a44f0964d350490ff872024be3141b0e3d07204efb2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313" id="CVE-2010-5313" title="Kernel: Kvm: Reporting Emulation Failures To Userspace" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" id="CVE-2013-4312" title="Kernel: File Descriptors Passed Over Unix " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" id="CVE-2014-7842" title="Kernel: Kvm: Reporting Emulation Failures To Userspace" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" id="CVE-2014-8134" title="Kernel: X86: Espfix Not Working For 32-Bit Kvm " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5156" id="CVE-2015-5156" title="Kernel: Buffer Overflow With Fraglist Larger Than Max_Skb_Frags + 2 In Virtio-Net" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7509" id="CVE-2015-7509" title="Kernel: Mounting Ext2 Fs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8215" id="CVE-2015-8215" title="Kernel: Mtu Value Is Not Validated In Ipv6 Stack " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8324" id="CVE-2015-8324" title="Kernel: Null Pointer Dereference When Mounting Ext4" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" id="CVE-2015-8543" title="Kernel: Ipv6 Connect Causes Dos Via Null Pointer " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0855" id="RHSA-2016:0855-1" title="Rhsa-2016:0855-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066751" id="1066751" title="Tmpfs: Creates Files With Inode Number 0, Rendering Parent " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163762" id="1163762" title="Kernel: Kvm: Reporting Emulation Failures To Userspace" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1172765" id="1172765" title="Kernel: X86: Espfix Not Working For 32-Bit Kvm " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1197875" id="1197875" title="Cifs Dfs Shares Fail To Mount When Specifying Sec= Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1225359" id="1225359" title="Bonding: Fail To Configure Master Mac Address By Initscripts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242239" id="1242239" title="Md Raid1 Writemostly Feature Broken" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243852" id="1243852" title="Kernel: Buffer Overflow With Fraglist Larger Than Max_Skb_Frags + 2 In Virtio-Net" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248507" id="1248507" title="Kernel: [Drm:Cpt_Set_Fifo_Underrun_Reporting] *Error* " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254020" id="1254020" title="Rhel6.6: Nfs Client Has Kernel Panic After Seeing 'Vfs: Busy " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259222" id="1259222" title="Kernel: Mounting Ext2 Fs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259870" id="1259870" title="Incomplete Nl80211 Backport Broke Hostapd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267261" id="1267261" title="Kernel: Null Pointer Dereference When Mounting Ext4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283253" id="1283253" title="Kernel: Mtu Value Is Not Validated In Ipv6 Stack " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290475" id="1290475" title="Kernel: Ipv6 Connect Causes Dos Via Null Pointer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297813" id="1297813" title="Kernel: File Descriptors Passed Over Unix " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310661" id="1310661" title="Bug: Unable To Handle Kernel Paging Request At 65642072 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=697750" id="697750" title="[Xfs] Concurrent Aio/Dio Got Stuck" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=723722" id="723722" title="Bug: Selinux Is Preventing /Usr/Bin/Nautilus (Deleted) &quot;Write&quot; " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=889368" id="889368" title="Lvm Raid:  I/O Can Hang If Entire Stripe (Mirror Group) Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0996-1</id><title>Openssl</title><description>Security Fix(es): 
* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) 
* Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106) 
* It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107) 
* Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842) 
* A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl-devel" release="48.sl6_8.1" src="openssl-1.0.1e-48.sl6_8.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.sl6_8.1.i686.rpm</filename><sum type="sha256">0b8373ee180c20829d98c13981477acce6bba9ade728e7978e56abf3316a7085</sum></package><package arch="i686" name="openssl" release="48.el6_8.1" src="openssl-1.0.1e-48.el6_8.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.el6_8.1.i686.rpm</filename><sum type="sha256">48192dd8c69b530522da04e582c5738fb59023e8a13958190286c7ad7ddbe87a</sum></package><package arch="x86_64" name="openssl" release="48.el6_8.1" src="openssl-1.0.1e-48.el6_8.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.el6_8.1.x86_64.rpm</filename><sum type="sha256">793cb586a8a3a39bc7c0f75dc62578edc414f97f067d52f762d46ee6b4074ee4</sum></package><package arch="x86_64" name="openssl-static" release="48.el6_8.1" src="openssl-1.0.1e-48.el6_8.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-48.el6_8.1.x86_64.rpm</filename><sum type="sha256">d0ea66445ddae2c7db70d859dd67b4ec60c24bd53dd68a988c21e6bfbbd454dc</sum></package><package arch="x86_64" name="openssl" release="48.sl6_8.1" src="openssl-1.0.1e-48.sl6_8.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.sl6_8.1.x86_64.rpm</filename><sum type="sha256">1bfcd73c1c02956d5f0d68d49cb720439c4ec1438011a595aad3aece337ddfc8</sum></package><package arch="x86_64" name="openssl-static" release="48.sl6_8.1" src="openssl-1.0.1e-48.sl6_8.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-48.sl6_8.1.x86_64.rpm</filename><sum type="sha256">7b2454cafcbdcc022658239adb30eedae623a68c54869905ac5b29be91bc6645</sum></package><package arch="x86_64" name="openssl-perl" release="48.el6_8.1" src="openssl-1.0.1e-48.el6_8.1.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-48.el6_8.1.x86_64.rpm</filename><sum type="sha256">9f6ee15d9c3eccbe0321f2ce234948690089c1e15fd34b9b0ebf09ecd87a61a0</sum></package><package arch="i686" name="openssl" release="48.sl6_8.1" src="openssl-1.0.1e-48.sl6_8.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.sl6_8.1.i686.rpm</filename><sum type="sha256">acb86da32f6476efff4ed21e65dc9b934062562b6e588c34008faff2f0fff0eb</sum></package><package arch="i686" name="openssl-devel" release="48.el6_8.1" src="openssl-1.0.1e-48.el6_8.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.el6_8.1.i686.rpm</filename><sum type="sha256">7ecba0da895cb2359ce4e64e29487dd84c131f375ffcfbea43c6b8eaff058f4c</sum></package><package arch="x86_64" name="openssl-devel" release="48.el6_8.1" src="openssl-1.0.1e-48.el6_8.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.el6_8.1.x86_64.rpm</filename><sum type="sha256">1828e10b33d8a29a927ab991df2e94bbd2a7dfaff474e2346b2db0fc8f921413</sum></package><package arch="x86_64" name="openssl-devel" release="48.sl6_8.1" src="openssl-1.0.1e-48.sl6_8.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.sl6_8.1.x86_64.rpm</filename><sum type="sha256">2afb34a90359fc18c90b8225bde526aa350d0493115141d674154673deca6be3</sum></package><package arch="x86_64" name="openssl-perl" release="48.sl6_8.1" src="openssl-1.0.1e-48.sl6_8.1.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-48.sl6_8.1.x86_64.rpm</filename><sum type="sha256">58dbae0fd136eb153d23f347ebd389af348ab301164fb774370518ce9fc3f943</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" id="CVE-2016-0799" title="Openssl: Fix Memory Issues In Bio_*Printf Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" id="CVE-2016-2105" title="Openssl: Evp_Encodeupdate Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" id="CVE-2016-2106" title="Openssl: Evp_Encryptupdate Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" id="CVE-2016-2107" title="Openssl: Padding Oracle In Aes-Ni Cbc Mac Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" id="CVE-2016-2108" title="Openssl: Memory Corruption In The Asn.1 Encoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" id="CVE-2016-2109" title="Openssl: Asn.1 Bio Handling Of Large Amounts Of Data" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842" id="CVE-2016-2842" title="Openssl: Doapr_Outch Function Does Not Verify " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0996" id="RHSA-2016:0996-1" title="Rhsa-2016:0996-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312219" id="1312219" title="Openssl: Fix Memory Issues In Bio_*Printf Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314757" id="1314757" title="Openssl: Doapr_Outch Function Does Not Verify " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330101" id="1330101" title="Openssl: Asn.1 Bio Handling Of Large Amounts Of Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331402" id="1331402" title="Openssl: Memory Corruption In The Asn.1 Encoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331426" id="1331426" title="Openssl: Padding Oracle In Aes-Ni Cbc Mac Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331441" id="1331441" title="Openssl: Evp_Encodeupdate Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331536" id="1331536" title="Openssl: Evp_Encryptupdate Overflow" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0997-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.491.el6_8.1" src="qemu-kvm-0.12.1.2-2.491.el6_8.1.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.491.el6_8.1.x86_64.rpm</filename><sum type="sha256">e22fb36fd79844840eb81794604a3ce060e71833c78d410693b20d3d9126d125</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.491.el6_8.1" src="qemu-kvm-0.12.1.2-2.491.el6_8.1.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.491.el6_8.1.x86_64.rpm</filename><sum type="sha256">33213bcab102e3a1de21bde7c218d53f3fd78e237609deb94fa9c0a7db680d87</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.491.el6_8.1" src="qemu-kvm-0.12.1.2-2.491.el6_8.1.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.491.el6_8.1.x86_64.rpm</filename><sum type="sha256">e9df85f41b0e6bf804f5b6d2fd5f0d5a7cfd2bca742370de6ade9e3e9d0f5d1c</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.491.el6_8.1" src="qemu-kvm-0.12.1.2-2.491.el6_8.1.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.491.el6_8.1.x86_64.rpm</filename><sum type="sha256">03f83d6d260ef7b8fa5eb1219548e540b716240a79a4f36eb9027a445a08c226</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" id="CVE-2016-3710" title="Qemu: Incorrect Banked Access Bounds Checking In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0997" id="RHSA-2016:0997-1" title="Rhsa-2016:0997-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331401" id="1331401" title="Qemu: Incorrect Banked Access Bounds Checking In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1041-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 38.8.0. 
Security Fix(es): 
* Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2805, CVE-2016-2807)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_8" src="thunderbird-38.8.0-2.el6_8.src.rpm" version="38.8.0"><filename>thunderbird-38.8.0-2.el6_8.x86_64.rpm</filename><sum type="sha256">fcfd4ba512c23ce3c1e80c6d9a56d27d330781a13143cb99dcf62f6645416ae3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1041" id="RHSA-2016:1041-1" title="Rhsa-2016:1041-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1138-1</id><title>Squid</title><description>Security Fix(es): 
* A buffer overflow flaw was found in the way the Squid cachemgr.cgi utility processed remotely relayed Squid input. When the CGI interface utility is used, a remote attacker could possibly use this flaw to execute arbitrary code. (CVE-2016-4051) 
* Buffer overflow and input validation flaws were found in the way Squid processed ESI responses. If Squid was used as a reverse proxy, or for TLS/HTTPS interception, a remote attacker able to control ESI components on an HTTP server could use these flaws to crash Squid, disclose parts of the stack memory, or possibly execute arbitrary code as the user running Squid. (CVE-2016-4052, CVE-2016-4053, CVE-2016-4054) 
* An input validation flaw was found in Squid's mime_get_header_field() function, which is used to search for headers within HTTP requests. An attacker could send an HTTP request from the client side with specially crafted header Host header that bypasses same-origin security protections, causing Squid operating as interception or reverse-proxy to contact the wrong origin server. It could also be used for cache poisoning for client not following RFC 7230. (CVE-2016-4554) 
* An incorrect reference counting flaw was found in the way Squid processes ESI responses. If Squid is configured as reverse-proxy, for TLS/HTTPS interception, an attacker controlling a server accessed by Squid, could crash the squid worker, causing a Denial of Service attack. (CVE-2016-4556)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid" release="16.el6_8.4" src="squid-3.1.23-16.el6_8.4.src.rpm" version="3.1.23"><filename>squid-3.1.23-16.el6_8.4.x86_64.rpm</filename><sum type="sha256">16a7fd2ff1bb1c043bbd1c5ce7f1b6e955ef47a8fbc26a0c98fbba31b3c798d7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" id="CVE-2016-4051" title="Squid: Buffer Overflow In Cachemgr.Cgi" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" id="CVE-2016-4052" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" id="CVE-2016-4053" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" id="CVE-2016-4054" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" id="CVE-2016-4554" title="Squid: Header Smuggling Issue In Http Request " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" id="CVE-2016-4556" title="Squid: Sigsegv In Esicontext Response Handling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1138" id="RHSA-2016:1138-1" title="Rhsa-2016:1138-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329126" id="1329126" title="Squid: Buffer Overflow In Cachemgr.Cgi" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329136" id="1329136" title="Squid: Multiple " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334241" id="1334241" title="Squid: Header Smuggling Issue In Http Request " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334786" id="1334786" title="Squid: Sigsegv In Esicontext Response Handling" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1140-1</id><title>Squid34</title><description>Security Fix(es): 
* A buffer overflow flaw was found in the way the Squid cachemgr.cgi utility processed remotely relayed Squid input. When the CGI interface utility is used, a remote attacker could possibly use this flaw to execute arbitrary code. (CVE-2016-4051) 
* Buffer overflow and input validation flaws were found in the way Squid processed ESI responses. If Squid was used as a reverse proxy, or for TLS/HTTPS interception, a remote attacker able to control ESI components on an HTTP server could use these flaws to crash Squid, disclose parts of the stack memory, or possibly execute arbitrary code as the user running Squid. (CVE-2016-4052, CVE-2016-4053, CVE-2016-4054) 
* An input validation flaw was found in the way Squid handled intercepted HTTP Request messages. An attacker could use this flaw to bypass the protection against issues related to CVE-2009-0801, and perform cache poisoning attacks on Squid. (CVE-2016-4553) 
* An input validation flaw was found in Squid's mime_get_header_field() function, which is used to search for headers within HTTP requests. An attacker could send an HTTP request from the client side with specially crafted header Host header that bypasses same-origin security protections, causing Squid operating as interception or reverse-proxy to contact the wrong origin server. It could also be used for cache poisoning for client not following RFC 7230. (CVE-2016-4554) 
* A NULL pointer dereference flaw was found in the way Squid processes ESI responses. If Squid was used as a reverse proxy or for TLS/HTTPS interception, a malicious server could use this flaw to crash the Squid worker process. (CVE-2016-4555) 
* An incorrect reference counting flaw was found in the way Squid processes ESI responses. If Squid is configured as reverse-proxy, for TLS/HTTPS interception, an attacker controlling a server accessed by Squid, could crash the squid worker, causing a Denial of Service attack. (CVE-2016-4556)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid34" release="9.el6_8.3" src="squid34-3.4.14-9.el6_8.3.src.rpm" version="3.4.14"><filename>squid34-3.4.14-9.el6_8.3.x86_64.rpm</filename><sum type="sha256">4743710631093d3769302cf2820c836794de22893eb2af83407ea71f771c03c1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" id="CVE-2016-4051" title="Squid: Buffer Overflow In Cachemgr.Cgi" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" id="CVE-2016-4052" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" id="CVE-2016-4053" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" id="CVE-2016-4054" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553" id="CVE-2016-4553" title="Squid: Cache Poisoning Issue In Http Request " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" id="CVE-2016-4554" title="Squid: Header Smuggling Issue In Http Request " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555" id="CVE-2016-4555" title="Squid: Segfault From Esiinclude::Start" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" id="CVE-2016-4556" title="Squid: Sigsegv In Esicontext Response Handling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1140" id="RHSA-2016:1140-1" title="Rhsa-2016:1140-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329126" id="1329126" title="Squid: Buffer Overflow In Cachemgr.Cgi" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329136" id="1329136" title="Squid: Multiple " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334233" id="1334233" title="Squid: Cache Poisoning Issue In Http Request " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334241" id="1334241" title="Squid: Header Smuggling Issue In Http Request " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334246" id="1334246" title="Squid: Segfault From Esiinclude::Start" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334786" id="1334786" title="Squid: Sigsegv In Esicontext Response Handling" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1141-1</id><title>Ntp</title><description>Security Fix(es): 
* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979) 
* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547) 
* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548) 
* A flaw was found in the way NTP's libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550) 
* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518) 
The CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="ntp-doc" release="10.el6.1" src="ntp-4.2.6p5-10.el6.1.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-10.el6.1.noarch.rpm</filename><sum type="sha256">6865880083ffa40c7e5a6c0af3328ffcf072d1e36a86868c38e0c7cb71cb545b</sum></package><package arch="x86_64" name="ntpdate" release="10.el6.1" src="ntp-4.2.6p5-10.el6.1.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-10.el6.1.x86_64.rpm</filename><sum type="sha256">4b869025e2c2241bd17180a0dff068493300dfe6d8fa5972b01d3f6f2bf75c14</sum></package><package arch="x86_64" name="ntp-perl" release="10.el6.1" src="ntp-4.2.6p5-10.el6.1.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm</filename><sum type="sha256">cef842b726b093b3dee0939781a9d4941fbbf60a17b3b158569360ad60e38d21</sum></package><package arch="x86_64" name="ntp" release="10.el6.1" src="ntp-4.2.6p5-10.el6.1.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-10.el6.1.x86_64.rpm</filename><sum type="sha256">a7504ac96bf4fdff71faf3c39bb533519abd32c5bc08d7e351eca395a15e9259</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" id="CVE-2015-7979" title="Ntp: Off-Path Denial Of Service On Authenticated " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" id="CVE-2016-1547" title="Ntp: Crypto-Nak Preemptable Association Denial " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" id="CVE-2016-1548" title="Ntp: Ntpd Switching To Interleaved Mode With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" id="CVE-2016-1550" title="Ntp: Libntp Message Digest Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" id="CVE-2016-2518" title="Ntp: Out-Of-Bounds References On Crafted Packet" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1141" id="RHSA-2016:1141-1" title="Rhsa-2016:1141-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300271" id="1300271" title="Ntp: Off-Path Denial Of Service On Authenticated " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331461" id="1331461" title="Ntp: Crypto-Nak Preemptable Association Denial " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331462" id="1331462" title="Ntp: Ntpd Switching To Interleaved Mode With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331464" id="1331464" title="Ntp: Libntp Message Digest Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331468" id="1331468" title="Ntp: Out-Of-Bounds References On Crafted Packet" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1204-1</id><title>Spice-Server</title><description>Security Fix(es): 
* A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) 
* A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150) 
The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and the CVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="13.el6.1" src="spice-server-0.12.4-13.el6.1.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-13.el6.1.x86_64.rpm</filename><sum type="sha256">c21ea4c672adcfff18461963e358874addde6c0383969a31bc745fe41eae8c68</sum></package><package arch="x86_64" name="spice-server" release="13.el6.1" src="spice-server-0.12.4-13.el6.1.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-13.el6.1.x86_64.rpm</filename><sum type="sha256">4ac5618bd0adecbb379d61b209ce3092bc2da8a097cbabb4e87d364614f9a748</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" id="CVE-2016-0749" title="Spice: Heap-Based Memory Corruption Within " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" id="CVE-2016-2150" title="Spice: Host Memory Access From Guest With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1204" id="RHSA-2016:1204-1" title="Rhsa-2016:1204-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300646" id="1300646" title="Spice: Heap-Based Memory Corruption Within " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313496" id="1313496" title="Spice: Host Memory Access From Guest With " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1217-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.2.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2818, CVE-2016-2819, CVE-2016-2821, CVE-2016-2822, CVE-2016-2828, CVE-2016-2831)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.2.0-1.el6_8.src.rpm" version="45.2.0"><filename>firefox-45.2.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">d6671617370041e511a425e7cd222e3a8e0bc29cc468b10ee21cb0c2955220b4</sum></package><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.2.0-1.el6_8.src.rpm" version="45.2.0"><filename>firefox-45.2.0-1.el6_8.i686.rpm</filename><sum type="sha256">5181e4204b7f713975e3b48b22543365f007736a9249b17443d398ded41a3e64</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" id="CVE-2016-2818" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" id="CVE-2016-2819" title="Mozilla: Buffer Overflow Parsing Html5 Fragments " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" id="CVE-2016-2821" title="Mozilla: Use-After-Free Deleting Tables From A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" id="CVE-2016-2822" title="Mozilla: Addressbar Spoofing Though The Select " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" id="CVE-2016-2828" title="Mozilla: Use-After-Free When Textures Are Used " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" id="CVE-2016-2831" title="Mozilla: Entering Fullscreen And Persistent " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1217" id="RHSA-2016:1217-1" title="Rhsa-2016:1217-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342887" id="1342887" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342891" id="1342891" title="Mozilla: Buffer Overflow Parsing Html5 Fragments " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342892" id="1342892" title="Mozilla: Use-After-Free Deleting Tables From A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342893" id="1342893" title="Mozilla: Addressbar Spoofing Though The Select " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342895" id="1342895" title="Mozilla: Use-After-Free When Textures Are Used " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342898" id="1342898" title="Mozilla: Entering Fullscreen And Persistent " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1237-1</id><title>Imagemagick</title><description>Security Fix(es): 
* It was discovered that ImageMagick did not properly sanitize certain input before using it to invoke processes. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5118) 
* It was discovered that ImageMagick did not properly sanitize certain input before passing it to the gnuplot delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5239) 
* Multiple flaws have been discovered in ImageMagick. A remote attacker could, for example, create specially crafted images that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would result in a memory corruption and, potentially, execution of arbitrary code, a denial of service, or an application crash. (CVE-2015-8896, CVE-2015-8895, CVE-2016-5240, CVE-2015-8897, CVE-2015-8898)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ImageMagick-doc" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-doc-6.7.2.7-5.el6_8.x86_64.rpm</filename><sum type="sha256">df32ef3572c1c86855cd515e4e5f349e2134433fa4542beaa69c08cc88e39d0b</sum></package><package arch="x86_64" name="ImageMagick" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-6.7.2.7-5.el6_8.x86_64.rpm</filename><sum type="sha256">843f94324c93cfe5f8d3887d18c0c20e94a9b26a1a5e8936e7d93b7b22b0bade</sum></package><package arch="x86_64" name="ImageMagick-devel" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-devel-6.7.2.7-5.el6_8.x86_64.rpm</filename><sum type="sha256">f2f788f073189d2e433f5a92b6aae52cb902a8074926cf4491d3482203eb6de2</sum></package><package arch="x86_64" name="ImageMagick-c++" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-6.7.2.7-5.el6_8.x86_64.rpm</filename><sum type="sha256">5232281b39a2f5fb79504d73dfcf78ae0556e93429d65470dabc533d7e619aa2</sum></package><package arch="i686" name="ImageMagick-devel" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-devel-6.7.2.7-5.el6_8.i686.rpm</filename><sum type="sha256">25a240ccb0f4c74b76b89b43b95946b2cfad66de03a4b096ae8de6fdfc1d152e</sum></package><package arch="x86_64" name="ImageMagick-perl" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-perl-6.7.2.7-5.el6_8.x86_64.rpm</filename><sum type="sha256">809874029635761c374a4d9081b513631b9743641d92a6471413bfe791838c62</sum></package><package arch="i686" name="ImageMagick" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-6.7.2.7-5.el6_8.i686.rpm</filename><sum type="sha256">4379f7ae86b38847700d998ccb9d2e23ce53d213e4f3db402c9f05e678722c10</sum></package><package arch="i686" name="ImageMagick-c++" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-6.7.2.7-5.el6_8.i686.rpm</filename><sum type="sha256">ef5817ecb24cb843bbbd223308c8649ba12d7fb0c79b7f6c7af76d491c8ea445</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-devel-6.7.2.7-5.el6_8.x86_64.rpm</filename><sum type="sha256">93d424023a24964927ed4a88210b993b358bda6795fad35e417a26680464e661</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="5.el6_8" src="ImageMagick-6.7.2.7-5.el6_8.src.rpm" version="6.7.2.7"><filename>ImageMagick-c++-devel-6.7.2.7-5.el6_8.i686.rpm</filename><sum type="sha256">36843db7b6d799f0cb5a96a3797df90c0892f74795a1f5cc33e1a7e26985722f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" id="CVE-2015-8895" title="Imagemagick: Integer And Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" id="CVE-2015-8896" title="Imagemagick: Integer Truncation Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" id="CVE-2015-8897" title="Imagemagick: Crash Due To Out Of Bounds Error In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" id="CVE-2015-8898" title="Imagemagick: Prevent Null Pointer Access In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" id="CVE-2016-5118" title="Imagemagick: Remote Code Execution Via Filename" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239" id="CVE-2016-5239" title="Imagemagick,Graphicsmagick: Gnuplot Delegate " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240" id="CVE-2016-5240" title="Imagemagick: Svg Converting Issue Resulting In Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1237" id="RHSA-2016:1237-1" title="Rhsa-2016:1237-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269553" id="1269553" title="Imagemagick: Integer And Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269562" id="1269562" title="Imagemagick: Integer Truncation Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333417" id="1333417" title="Imagemagick: Svg Converting Issue Resulting In Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334188" id="1334188" title="Imagemagick,Graphicsmagick: Gnuplot Delegate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340814" id="1340814" title="Imagemagick: Remote Code Execution Via Filename" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344264" id="1344264" title="Imagemagick: Prevent Null Pointer Access In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344271" id="1344271" title="Imagemagick: Crash Due To Out Of Bounds Error In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1267-1</id><title>Setroubleshoot And Setroubleshoot-Plugins</title><description>The setroubleshoot-plugins package provides a set of analysis plugins for use with setroubleshoot. Each plugin has the capacity to analyze SELinux AVC data and system data to provide user friendly reports describing how to interpret SELinux AVC denials. 
Security Fix(es): 
* Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with root privileges. (CVE-2016-4445, CVE-2016-4989) 
* Shell command injection flaws were found in the way the setroubleshoot allow_execmod and allow_execstack plugins executed external commands. A local attacker able to trigger an execmod or execstack SELinux denial could use these flaws to execute arbitrary code with root privileges. (CVE-2016-4444, CVE-2016-4446) 
The CVE-2016-4444 and CVE-2016-4446 issues were discovered by Milos Malik (Red Hat) and the CVE-2016-4445 and CVE-2016-4989 issues were discovered by Red Hat Product Security.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="setroubleshoot" release="12.el6_8" src="setroubleshoot-3.0.47-12.el6_8.src.rpm" version="3.0.47"><filename>setroubleshoot-3.0.47-12.el6_8.x86_64.rpm</filename><sum type="sha256">35396f58582eb7e9120147fbe65362d83a47b472ea619ac440685a3dab0fd04d</sum></package><package arch="x86_64" name="setroubleshoot-server" release="12.el6_8" src="setroubleshoot-3.0.47-12.el6_8.src.rpm" version="3.0.47"><filename>setroubleshoot-server-3.0.47-12.el6_8.x86_64.rpm</filename><sum type="sha256">8cb340d87275cc9d7b27d5de9d268b2c240a39cfcb6a78fb9ecb34ddd50472ee</sum></package><package arch="x86_64" name="setroubleshoot-doc" release="12.el6_8" src="setroubleshoot-3.0.47-12.el6_8.src.rpm" version="3.0.47"><filename>setroubleshoot-doc-3.0.47-12.el6_8.x86_64.rpm</filename><sum type="sha256">22e0aa49e02a2f6a3ce6547bba4b7360878678f8b34105ecbb46ecaa76226424</sum></package><package arch="noarch" name="setroubleshoot-plugins" release="3.1.el6_8" src="setroubleshoot-plugins-3.0.40-3.1.el6_8.src.rpm" version="3.0.40"><filename>setroubleshoot-plugins-3.0.40-3.1.el6_8.noarch.rpm</filename><sum type="sha256">cbdbcc5b7288b27f9d0f5af1c02147c80bf024bf94e5633996be4d3f1162b5e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4444" id="CVE-2016-4444" title="Setroubleshoot-Plugins: Insecure Commands.Getstatusoutput Use In The Allow_Execmod Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4445" id="CVE-2016-4445" title="Setroubleshoot: Insecure Use Of Commands.Getstatusoutput" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4446" id="CVE-2016-4446" title="Setroubleshoot-Plugins: Insecure Commands.Getoutput Use In The Allow_Execstack Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4989" id="CVE-2016-4989" title="Setroubleshoot: Command Injection Issues" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1267" id="RHSA-2016:1267-1" title="Rhsa-2016:1267-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332644" id="1332644" title="Cve-2016-4444 Setroubleshoot-Plugins: Insecure Commands.Getstatusoutput Use In The Allow_Execmod Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339183" id="1339183" title="Cve-2016-4445 Setroubleshoot: Insecure Use Of Commands.Getstatusoutput" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339250" id="1339250" title="Cve-2016-4446 Setroubleshoot-Plugins: Insecure Commands.Getoutput Use In The Allow_Execstack Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346461" id="1346461" title="Cve-2016-4989 Setroubleshoot: Command Injection Issues" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1292-1</id><title>Libxml2</title><description>Security Fix(es): 
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2016-1834, CVE-2016-1840) 
Multiple denial of service flaws were found in libxml2. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, could cause that application to crash. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libxml2-static" release="21.el6_8.1" src="libxml2-2.7.6-21.el6_8.1.src.rpm" version="2.7.6"><filename>libxml2-static-2.7.6-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">6e7f42865f80d9cb2f355f3c7ed08ef0295fd1f9a13f476df050b1660c088474</sum></package><package arch="i686" name="libxml2" release="21.el6_8.1" src="libxml2-2.7.6-21.el6_8.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-21.el6_8.1.i686.rpm</filename><sum type="sha256">6dd3f49101b77e722d3a9467414a73423ed45b2c4a9e8948edf2db872c5395c7</sum></package><package arch="x86_64" name="libxml2-python" release="21.el6_8.1" src="libxml2-2.7.6-21.el6_8.1.src.rpm" version="2.7.6"><filename>libxml2-python-2.7.6-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">95053dbb1cd7df03f7c75b869c3459d5354d339fe70f640f195e84c304400743</sum></package><package arch="x86_64" name="libxml2-devel" release="21.el6_8.1" src="libxml2-2.7.6-21.el6_8.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">74961fafa02b5daed8bde601f070252bebeed554624e8573fd791ccbd36e8388</sum></package><package arch="x86_64" name="libxml2" release="21.el6_8.1" src="libxml2-2.7.6-21.el6_8.1.src.rpm" version="2.7.6"><filename>libxml2-2.7.6-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">fde1b18a52bba3a851d05b7c1508617c4c5ceaf655d74fb2fb61822ec1147381</sum></package><package arch="i686" name="libxml2-devel" release="21.el6_8.1" src="libxml2-2.7.6-21.el6_8.1.src.rpm" version="2.7.6"><filename>libxml2-devel-2.7.6-21.el6_8.1.i686.rpm</filename><sum type="sha256">6790c4313f8495dbf94713982866e072234eb919fe6e9f5b22641d767c0f7675</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" id="CVE-2016-1762" title="Libxml2: Heap-Based Buffer-Overread In Xmlnextchar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" id="CVE-2016-1833" title="Libxml2: Heap-Based Buffer Overread In Htmlcurrentchar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" id="CVE-2016-1834" title="Libxml2: Heap-Buffer-Overflow In Xmlstrncat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" id="CVE-2016-1835" title="Libxml2: Heap Use-After-Free In Xmlsax2Attributens" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" id="CVE-2016-1836" title="Libxml2: Heap Use-After-Free In Xmldictcomputefastkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" id="CVE-2016-1837" title="Libxml2: Heap Use-After-Free In Htmlparsepubidliteral And Htmlparsesystemiteral" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" id="CVE-2016-1838" title="Libxml2: Heap-Based Buffer Overread In Xmlparserprintfilecontextinternal" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" id="CVE-2016-1839" title="Libxml2: Heap-Based Buffer Overread In Xmldictaddstring" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" id="CVE-2016-1840" title="Libxml2: Heap-Buffer-Overflow In Xmlfaparserposchargroup" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" id="CVE-2016-3627" title="Libxml2: Stack Exhaustion While Parsing Xml Files In Recovery Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" id="CVE-2016-3705" title="Libxml2: Stack Overflow Before Detecting Invalid Xml File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447" id="CVE-2016-4447" title="Libxml2: Heap-Based Buffer Underreads Due To Xmlparsename" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448" id="CVE-2016-4448" title="Libxml2: Format String Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449" id="CVE-2016-4449" title="Libxml2: Inappropriate Fetch Of Entities Content" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1292" id="RHSA-2016:1292-1" title="Rhsa-2016:1292-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319829" id="1319829" title="Libxml2: Stack Exhaustion While Parsing Xml Files In Recovery Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332443" id="1332443" title="Libxml2: Stack Overflow Before Detecting Invalid Xml File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338682" id="1338682" title="Libxml2: Heap-Based Buffer Overread In Htmlcurrentchar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338686" id="1338686" title="Libxml2: Heap-Based Buffer Underreads Due To Xmlparsename" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338691" id="1338691" title="Libxml2: Heap Use-After-Free In Xmlsax2Attributens" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338696" id="1338696" title="Libxml2: Heap Use-After-Free In Htmlparsepubidliteral And Htmlparsesystemiteral" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338700" id="1338700" title="Libxml2: Format String Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338701" id="1338701" title="Libxml2: Inappropriate Fetch Of Entities Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338702" id="1338702" title="Libxml2: Heap Use-After-Free In Xmldictcomputefastkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338703" id="1338703" title="Libxml2: Heap-Based Buffer Overread In Xmldictaddstring" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338705" id="1338705" title="Libxml2: Heap-Based Buffer Overread In Xmlparserprintfilecontextinternal" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338706" id="1338706" title="Libxml2: Heap-Buffer-Overflow In Xmlfaparserposchargroup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338708" id="1338708" title="Libxml2: Heap-Buffer-Overflow In Xmlstrncat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338711" id="1338711" title="Libxml2: Heap-Based Buffer-Overread In Xmlnextchar" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1392-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.2.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2818)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-07-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.2-1.el6_8.src.rpm" version="45.2"><filename>thunderbird-45.2-1.el6_8.x86_64.rpm</filename><sum type="sha256">ff6c504a1d4e1cc1548cd815a65d16243ff2066a471dd27010c4e3eb7604960a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" id="CVE-2016-2818" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1392" id="RHSA-2016:1392-1" title="Rhsa-2016:1392-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342887" id="1342887" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1406-1</id><title>Kernel</title><description>Security Fix: 
* A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) 
This update also fixes the following bugs: 
* When providing some services and using the Integrated Services Digital Network (ISDN), the system could terminate unexpectedly due to the call of the tty_ldisc_flush() function. The provided patch removes this call and the system no longer hangs in the described scenario. 
* An update to the Scientific Linux 6 kernel added calls of two functions provided by the ipv6.ko kernel module, which added a dependency on that module. On systems where ipv6.ko was prevented from being loaded, the nfsd.ko and lockd.ko modules were unable to be loaded. Consequently, it was not possible to run an NFS server or to mount NFS file systems as a client. The underlying source code has been fixed by adding the symbol_get() function, which determines if nfsd.ko and lock.ko are loaded into memory and calls them through function pointers, not directly. As a result, the aforementioned kernel modules are allowed to be loaded even if ipv6.ko is not, and the NFS mount works as expected. 
* After upgrading the kernel, CPU load average increased compared to the prior kernel version due to the modification of the scheduler. The provided patch set reverts the calculation algorithm of this load average to the the previous version thus resulting in relatively lower values under the same system load. 
Updated dracut packages have also been included to satisfy dependencies.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">aa2704cd574d692f814977bb3b1165b69c20c0cb2a984db44a9e453a20163a41</sum></package><package arch="x86_64" name="kernel" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">39098b6d7dd34095d2af40d9afdaecf14e61170f57a6de2246096297da0a4f56</sum></package><package arch="x86_64" name="kernel-debug" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">39d62f7e9529c4bbd789f59d39b26ceb04c529afa36d473161c08e9a43e2f61d</sum></package><package arch="x86_64" name="kernel-headers" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">f859e9a95f62dc21ac832196baf87feec23f82b2aa8296f3aa5295ea09a97b8b</sum></package><package arch="x86_64" name="perf" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">29d5f23c846fda1bcd321d7044ebe289b8f50263ecfb7ebb62e56995598ab69b</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.3.1.el6.noarch.rpm</filename><sum type="sha256">dca4966e034b8413994cc1eb86adda66a0ca5c9a87beaba245942b7a5feb632e</sum></package><package arch="i686" name="kernel-debug-devel" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.3.1.el6.i686.rpm</filename><sum type="sha256">084d6cc35c03ffd3f8aabe41c05a0a5d27b1f390e05c42765fab3eaedeb761a5</sum></package><package arch="noarch" name="kernel-doc" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.3.1.el6.noarch.rpm</filename><sum type="sha256">f125a8dd16852a9d251e80de642b80dd9407a85850df5fa645591cd432c668f7</sum></package><package arch="x86_64" name="python-perf" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">9662612d19a6d45b5f76fd4c681b5f9bc3931da24f0a1a3bc87282c8427d90ca</sum></package><package arch="noarch" name="kernel-firmware" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.3.1.el6.noarch.rpm</filename><sum type="sha256">ffa3eea0324bbbf03aa50500e6347abdbb478a4baa558892d34691e14bde4bf6</sum></package><package arch="x86_64" name="kernel-devel" release="642.3.1.el6" src="kernel-2.6.32-642.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.3.1.el6.x86_64.rpm</filename><sum type="sha256">99ea5147834f396bcedee5548960eb765be292c05cbcf2e380f67271ea3a7e1c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" id="CVE-2016-4565" title="Kernel: Infiniband: Unprivileged Process Can Overwrite Kernel Memory Using Rdma_Ucm.Ko" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1406" id="RHSA-2016:1406-1" title="Rhsa-2016:1406-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310570" id="1310570" title="Kernel: Infiniband: Unprivileged Process Can Overwrite Kernel Memory Using Rdma_Ucm.Ko" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1421-1</id><title>Httpd</title><description>Security Fix(es): 
* It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5387) 
Note: After this update, httpd will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="httpd-manual" release="54.sl6" src="httpd-2.2.15-54.sl6.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-54.sl6.noarch.rpm</filename><sum type="sha256">d492472e8cbafcea13d63554152f84304c241f7f5768e641322285863f55f41e</sum></package><package arch="x86_64" name="httpd-tools" release="54.sl6" src="httpd-2.2.15-54.sl6.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-54.sl6.x86_64.rpm</filename><sum type="sha256">5f9614dc1fcae0735822509aaade2b4a325f15e77ed79742c0e2131a09441174</sum></package><package arch="x86_64" name="httpd-devel" release="54.sl6" src="httpd-2.2.15-54.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-54.sl6.x86_64.rpm</filename><sum type="sha256">8909cdc1b17a1ed7458b207784aefa75f9136ad1cb6ecad4af962715e558fc08</sum></package><package arch="i686" name="httpd-devel" release="54.sl6" src="httpd-2.2.15-54.sl6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-54.sl6.i686.rpm</filename><sum type="sha256">6eefc715b2077d07d769c3a5b8c944bb024b05ad5bd6b37a1eca67b496a9ceb8</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="54.sl6" src="httpd-2.2.15-54.sl6.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-54.sl6.x86_64.rpm</filename><sum type="sha256">c895056546e3cc82172e8e371c03936e5169bbf22a753908d58119c82b6f367b</sum></package><package arch="x86_64" name="httpd" release="54.sl6" src="httpd-2.2.15-54.sl6.src.rpm" version="2.2.15"><filename>httpd-2.2.15-54.sl6.x86_64.rpm</filename><sum type="sha256">05e15cd4d98cca6aea35d40a288535f7a9ce23aac10345ba7519e7ba68815e24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" id="CVE-2016-5387" title="Apache Httpd: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1421" id="RHSA-2016:1421-1" title="Rhsa-2016:1421-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353755" id="1353755" title="Apache Httpd: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1458-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3587, CVE-2016-3598, CVE-2016-3610) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">5b6661bf349d83b3883231b46e4684e250b7145c11f8cb6a722b88d46a06c450</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el6_8.noarch.rpm</filename><sum type="sha256">2d729363cc783d1de062aee0dfec759fe589169a96ae700e8e9f16db45049342</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">b1d9dffa937069fd927076bcc4859fe18971ee0d3db1ee51017cd107422d1518</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">5261e18c69fd2f5fe4404b71e6a265bb64cb689d336d8a0dd06e55971a32568b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">ca6071329519d1d1dbded8e9cd33ed82f325c74ae20d73fee2e1ce21bc99283f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">f0fc868fe5370fbcf7579ba37970a2db6b48ee3b8131b2cff5ef7f8bc12e7826</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">9eae8dd13ab43f1917a17b7186f35b8dfff3fc060607219843fce9d60acc5359</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">b8f8ed991cfb6ffeff4912cc49147fa04f45dd75d2afd8f0e8bc648166e7f00c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">3a99efdd70786812ced7aedb7b19c61c0f77758e4eec0744622b3e35d8850146</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el6_8.noarch.rpm</filename><sum type="sha256">40d50ca9ce65d96a924f6b8f3cdfce060be3230e35dcea3c4bf59e35ed1c91a8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-src-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">e0dbea5f47dc51489e23f68706bc3de8c6b0252f8c46530857dacb07983f168b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el6_8.x86_64.rpm</filename><sum type="sha256">b69864973187abd188545ad150573b148f2cb9c1866360b37e8c3195383700cf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" id="CVE-2016-3587" title="Openjdk: Insufficient Protection Of Methodhandle.Invokebasic() (Hotspot, 8154475)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" id="CVE-2016-3598" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" id="CVE-2016-3610" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1458" id="RHSA-2016:1458-1" title="Rhsa-2016:1458-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356971" id="1356971" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356987" id="1356987" title="Openjdk: Insufficient Protection Of Methodhandle.Invokebasic() (Hotspot, 8154475)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356994" id="1356994" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1487-1</id><title>Samba4</title><description>Security Fix(es): 
* A flaw was found in the way Samba initiated signed DCE/RPC connections. A man-in-the-middle attacker could use this flaw to downgrade the connection to not use signing and therefore impersonate the server. (CVE-2016-2119)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-08-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">045a12f19059838fff53feb8a440208a28d84bdfd287c25eb4cf4de4798b11b2</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">7352adb1410b9fc4bc8f50e3cd62d28878da4350b0818cabce04278a6c3ad29c</sum></package><package arch="x86_64" name="samba4-dc-libs" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">c34d131fa0ffa05e56fcf935bc167e255f406ca1996c62125c4da59c57ec3b96</sum></package><package arch="x86_64" name="samba4-pidl" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">bbf280cc0ed1f00d5265409654de9326a2968eca668ac726a6fb39dd40052dc1</sum></package><package arch="x86_64" name="samba4-client" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">b101b64d8a2503685f67c9b561ac60b1c9262b6ee47dc4ef1fa371cce79feb1c</sum></package><package arch="x86_64" name="samba4-common" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">10070bd43c1f602eb940b1f65723e9b2cb417bc5577715f39348744838239d7f</sum></package><package arch="x86_64" name="samba4-winbind" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">77009cba34a57d822d6e32b462443162edd62e89d4a2ca785148037dc2e9b108</sum></package><package arch="x86_64" name="samba4-test" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">3c54b8abff91e8fee4dddd328d88f5950787209fb911d641442418f7115dea82</sum></package><package arch="x86_64" name="samba4-dc" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">db263dc7163a4e88f15582a7a8cfda9a761499fc6c5ef96dd5b563c64ebe522e</sum></package><package arch="x86_64" name="samba4-libs" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">9fac5077730b7132f251f36a99f135abebaa403c961ef5d49354f358ca82e2b7</sum></package><package arch="x86_64" name="samba4-python" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">9527babed5a35169bd38aeedd34997fa287fb69229738cd4fcee91e6cdfe2c84</sum></package><package arch="x86_64" name="samba4-devel" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">d3affd60753a113b106225f2bff12141bedbdc265abafc5a1c5f9e9e94d2e06e</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="7.el6_8" src="samba4-4.2.10-7.el6_8.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-7.el6_8.x86_64.rpm</filename><sum type="sha256">013c2ee4485e063006be2411238e8fabcefcf8dfdb2751fa0237dc69699412be</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" id="CVE-2016-2119" title="Samba: Client Side Smb2/3 Required Signing Can Be Downgraded" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1487" id="RHSA-2016:1487-1" title="Rhsa-2016:1487-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351955" id="1351955" title="Samba: Client Side Smb2/3 Required Signing Can Be Downgraded" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1504-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3598, CVE-2016-3610) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-08-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.7.2.el6_8" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el6_8.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el6_8.x86_64.rpm</filename><sum type="sha256">b9c4ddf03f204e85baa8dfc30f10fc81181297d9b010f768624fe411aa006460</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.7.2.el6_8" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el6_8.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el6_8.noarch.rpm</filename><sum type="sha256">fbcadfaa7ceac5cfdc4677a48acbfa6323e7f13b971e3bf9277116356f89f9c8</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.7.2.el6_8" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el6_8.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el6_8.x86_64.rpm</filename><sum type="sha256">103088e6c1088d46182a0e8ef113b29badf14f1c22d2fdd53a1ab0e5d86a7b1a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.7.2.el6_8" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el6_8.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el6_8.x86_64.rpm</filename><sum type="sha256">0366e5664966ccd311d9c522649133b484c672b639f46e7f9c54adfe49b22555</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.7.2.el6_8" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el6_8.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el6_8.x86_64.rpm</filename><sum type="sha256">af18b52182d8b139902de26aa0a093f0644ffcec1e815b226c27820af86aa9eb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" id="CVE-2016-3598" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" id="CVE-2016-3610" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1504" id="RHSA-2016:1504-1" title="Rhsa-2016:1504-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356971" id="1356971" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356994" id="1356994" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1547-1</id><title>Libtiff</title><description>Security Fix(es): 
* Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547, CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2016-3990, CVE-2016-5320) 
* Multiple flaws have been discovered in various libtiff tools (bmp2tiff, pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit, tiff2rgba). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632, CVE-2016-3945, CVE-2016-3991)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-08-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libtiff-static" release="18.el6_8" src="libtiff-3.9.4-18.el6_8.src.rpm" version="3.9.4"><filename>libtiff-static-3.9.4-18.el6_8.x86_64.rpm</filename><sum type="sha256">c6e95dac2f2b15e1ea53df8a2cbe173846f53dd1f8b3365f3b42a177ce447e25</sum></package><package arch="x86_64" name="libtiff" release="18.el6_8" src="libtiff-3.9.4-18.el6_8.src.rpm" version="3.9.4"><filename>libtiff-3.9.4-18.el6_8.x86_64.rpm</filename><sum type="sha256">8bddb7a4f3cb5eeafe4e1044fdf5a9aab48301fea5d8d88910c64e08df2b9caf</sum></package><package arch="i686" name="libtiff-devel" release="18.el6_8" src="libtiff-3.9.4-18.el6_8.src.rpm" version="3.9.4"><filename>libtiff-devel-3.9.4-18.el6_8.i686.rpm</filename><sum type="sha256">feaaad3dd9c26fa03808af2816cd013d1486274a7c55f5f93874d0a92ed2e2a1</sum></package><package arch="i686" name="libtiff" release="18.el6_8" src="libtiff-3.9.4-18.el6_8.src.rpm" version="3.9.4"><filename>libtiff-3.9.4-18.el6_8.i686.rpm</filename><sum type="sha256">2e9b30db0c8d728e746675c1bc9f5aee3519a80778e20e4865a0cd5d2ee61184</sum></package><package arch="x86_64" name="libtiff-devel" release="18.el6_8" src="libtiff-3.9.4-18.el6_8.src.rpm" version="3.9.4"><filename>libtiff-devel-3.9.4-18.el6_8.x86_64.rpm</filename><sum type="sha256">5a4a9a451d18b957c8d80843a9b5d71c574a384338714e607eb0ccad14fa7a0a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" id="CVE-2014-8127" title="Libtiff: Out-Of-Bounds Read With Malformed Tiff Image In Multiple Tools" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" id="CVE-2014-8129" title="Libtiff: Out-Of-Bounds Read/Write With Malformed Tiff Image In Tiff2Pdf" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" id="CVE-2014-8130" title="Libtiff: Divide By Zero In The Tiffdither Tool" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330" id="CVE-2014-9330" title="Libtiff: Out-Of-Bounds Reads Followed By A Crash In Bmp2Tiff" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" id="CVE-2014-9655" title="Libtiff: Use Of Uninitialized Memory In Putcontig8Bitycbcr21Tile And Nextdecode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" id="CVE-2015-1547" title="Libtiff: Use Of Uninitialized Memory In Nextdecode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" id="CVE-2015-7554" title="Libtiff: Invalid-Write In _Tiffvgetfield() When Parsing Some Extension Tags" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" id="CVE-2015-8665" title="Libtiff: Out-Of-Bounds Read In Tif_Getimage.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668" id="CVE-2015-8668" title="Libtiff: Oob Read In Bmp2Tiff" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" id="CVE-2015-8683" title="Libtiff: Out-Of-Bounds When Reading Cie Lab Image Format Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" id="CVE-2015-8781" title="Libtiff: Invalid Assertion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" id="CVE-2015-8782" title="Libtiff: Invalid Assertion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" id="CVE-2015-8783" title="Libtiff: Invalid Assertion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784" id="CVE-2015-8784" title="Libtiff: Out-Of-Bound Write In Nextdecode()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" id="CVE-2016-3632" title="Libtiff: Out-Of-Bounds Write In _Tiffvgetfield Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" id="CVE-2016-3945" title="Libtiff: Out-Of-Bounds Write In The Tiff2Rgba Tool" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" id="CVE-2016-3990" title="Libtiff: Out-Of-Bounds Write In Horizontaldifference8()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" id="CVE-2016-3991" title="Libtiff: Out-Of-Bounds Write In Loadimage() Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" id="CVE-2016-5320" title="Libtiff: Out-Of-Bounds Write In Pixarlogdecode() Function In Tif_Pixarlog.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1547" id="RHSA-2016:1547-1" title="Rhsa-2016:1547-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1177893" id="1177893" title="Libtiff: Out-Of-Bounds Reads Followed By A Crash In Bmp2Tiff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185805" id="1185805" title="Libtiff: Out-Of-Bounds Read With Malformed Tiff Image In Multiple Tools" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185815" id="1185815" title="Libtiff: Out-Of-Bounds Read/Write With Malformed Tiff Image In Tiff2Pdf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185817" id="1185817" title="Libtiff: Divide By Zero In The Tiffdither Tool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190703" id="1190703" title="Libtiff: Use Of Uninitialized Memory In Putcontig8Bitycbcr21Tile And Nextdecode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190709" id="1190709" title="Libtiff: Use Of Uninitialized Memory In Nextdecode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294417" id="1294417" title="Libtiff: Invalid-Write In _Tiffvgetfield() When Parsing Some Extension Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294425" id="1294425" title="Libtiff: Oob Read In Bmp2Tiff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294427" id="1294427" title="Libtiff: Out-Of-Bounds When Reading Cie Lab Image Format Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294444" id="1294444" title="Libtiff: Out-Of-Bounds Read In Tif_Getimage.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301649" id="1301649" title="Libtiff: Invalid Assertion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301652" id="1301652" title="Libtiff: Out-Of-Bound Write In Nextdecode()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325093" id="1325093" title="Libtiff: Out-Of-Bounds Write In The Tiff2Rgba Tool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325095" id="1325095" title="Libtiff: Out-Of-Bounds Write In _Tiffvgetfield Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326246" id="1326246" title="Libtiff: Out-Of-Bounds Write In Horizontaldifference8()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326249" id="1326249" title="Libtiff: Out-Of-Bounds Write In Loadimage() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346687" id="1346687" title="Libtiff: Out-Of-Bounds Write In Pixarlogdecode() Function In Tif_Pixarlog.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1551-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.3.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2836, CVE-2016-5258, CVE-2016-5259, CVE-2016-5252, CVE-2016-5263, CVE-2016-2830, CVE-2016-2838, CVE-2016-5254, CVE-2016-5262, CVE-2016-5264, CVE-2016-5265, CVE-2016-2837)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-08-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.3.0-1.el6_8.src.rpm" version="45.3.0"><filename>firefox-45.3.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">faac264baf4e2490ea12bf79772f2f527b4929a4c91ea5e9b8a129cce42d423d</sum></package><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.3.0-1.el6_8.src.rpm" version="45.3.0"><filename>firefox-45.3.0-1.el6_8.i686.rpm</filename><sum type="sha256">f47a01caf0cef34eb5d2a6edb31f9d86906d52b8deb3b4f5cc79cbcd503da5b1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" id="CVE-2016-2830" title="Mozilla: Favicon Network Connection Persists When Page Is Closed (Mfsa 2016-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" id="CVE-2016-2836" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" id="CVE-2016-2837" title="Mozilla: Buffer Overflow In Clearkey Content Decryption Module (Cdm) During Video Playback (Mfsa 2016-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" id="CVE-2016-2838" title="Mozilla: Buffer Overflow Rendering Svg With Bidirectional Content (Mfsa 2016-64)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" id="CVE-2016-5252" title="Mozilla: Stack Underflow During 2D Graphics Rendering (Mfsa 2016-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" id="CVE-2016-5254" title="Mozilla: Use-After-Free When Using Alt Key And Toplevel Menus (Mfsa 2016-70)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" id="CVE-2016-5258" title="Mozilla: Use-After-Free In Dtls During Webrtc Session Shutdown (Mfsa 2016-72)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" id="CVE-2016-5259" title="Mozilla: Use-After-Free In Service Workers With Nested Sync Events (Mfsa 2016-73)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" id="CVE-2016-5262" title="Mozilla: Scripts On Marquee Tag Can Execute In Sandboxed Iframes (Mfsa 2016-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" id="CVE-2016-5263" title="Mozilla: Type Confusion In Display Transformation (Mfsa 2016-78)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" id="CVE-2016-5264" title="Mozilla: Use-After-Free When Applying Svg Effects (Mfsa 2016-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" id="CVE-2016-5265" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-80)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1551" id="RHSA-2016:1551-1" title="Rhsa-2016:1551-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342897" id="1342897" title="Mozilla: Favicon Network Connection Persists When Page Is Closed (Mfsa 2016-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361974" id="1361974" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361976" id="1361976" title="Mozilla: Buffer Overflow Rendering Svg With Bidirectional Content (Mfsa 2016-64)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361979" id="1361979" title="Mozilla: Stack Underflow During 2D Graphics Rendering (Mfsa 2016-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361980" id="1361980" title="Mozilla: Use-After-Free When Using Alt Key And Toplevel Menus (Mfsa 2016-70)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361982" id="1361982" title="Mozilla: Use-After-Free In Dtls During Webrtc Session Shutdown (Mfsa 2016-72)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361984" id="1361984" title="Mozilla: Use-After-Free In Service Workers With Nested Sync Events (Mfsa 2016-73)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361987" id="1361987" title="Mozilla: Scripts On Marquee Tag Can Execute In Sandboxed Iframes (Mfsa 2016-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361989" id="1361989" title="Mozilla: Buffer Overflow In Clearkey Content Decryption Module (Cdm) During Video Playback (Mfsa 2016-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361991" id="1361991" title="Mozilla: Type Confusion In Display Transformation (Mfsa 2016-78)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361992" id="1361992" title="Mozilla: Use-After-Free When Applying Svg Effects (Mfsa 2016-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361994" id="1361994" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-80)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1573-1</id><title>Squid</title><description>Security Fix(es): 
* It was found that the fix for CVE-2016-4051 released via SLSA-2016:1138 did not properly prevent the stack overflow in the munge_other_line() function. A remote attacker could send specially crafted data to the Squid proxy, which would exploit the cachemgr CGI utility, possibly triggering execution of arbitrary code. (CVE-2016-5408)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-08-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid" release="16.el6_8.6" src="squid-3.1.23-16.el6_8.6.src.rpm" version="3.1.23"><filename>squid-3.1.23-16.el6_8.6.x86_64.rpm</filename><sum type="sha256">23a78589ec2bc0a8f4ab10091db4a1bbaaf3548c2d5b17656af17d7b33c003fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5408" id="CVE-2016-5408" title="Squid: Buffer Overflow Vulnerability In Cachemgr.Cgi Tool" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1573" id="RHSA-2016:1573-1" title="Rhsa-2016:1573-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1359203" id="1359203" title="Squid: Buffer Overflow Vulnerability In Cachemgr.Cgi Tool" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1585-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick emulator(Qemu) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.491.el6_8.3" src="qemu-kvm-0.12.1.2-2.491.el6_8.3.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.491.el6_8.3.x86_64.rpm</filename><sum type="sha256">0271eaeb5ea51723ab135b1a557c4cf319c771f5d0921948cc6e3bb0e1ee6dab</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.491.el6_8.3" src="qemu-kvm-0.12.1.2-2.491.el6_8.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.491.el6_8.3.x86_64.rpm</filename><sum type="sha256">355a9088693bafed1e83e1af3833f1fa39f0a6333b3a8f9075700e12dfb3e455</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.491.el6_8.3" src="qemu-kvm-0.12.1.2-2.491.el6_8.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.491.el6_8.3.x86_64.rpm</filename><sum type="sha256">a330c544ac28e30cd15d382cb2710a848889d24fdb0c226c285f7b64d3111161</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.491.el6_8.3" src="qemu-kvm-0.12.1.2-2.491.el6_8.3.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.491.el6_8.3.x86_64.rpm</filename><sum type="sha256">026645a65c96691415c6763c0d09868653a49cb47beed6c1249a4a3f71c1529c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" id="CVE-2016-5403" title="Qemu: Virtio: Unbounded Memory Allocation On Host Via Guest Leading To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1585" id="RHSA-2016:1585-1" title="Rhsa-2016:1585-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358359" id="1358359" title="Qemu: Virtio: Unbounded Memory Allocation On Host Via Guest Leading To Dos" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1609-1</id><title>Php</title><description>Security Fix(es): 
* It was discovered that PHP did not properly protect against the HTTP_PROXY variable name clash. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a PHP script to an attacker- controlled proxy via a malicious HTTP request. (CVE-2016-5385)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-pdo" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">4a95261198a5fdaf9e5567e2716d9924c9505fce06d02d65453ba5b74fbd556d</sum></package><package arch="x86_64" name="php-pspell" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">719e78355996485f01f6d449ce02ad2a5d1dd230ffd2acc85459fc574ce71bce</sum></package><package arch="x86_64" name="php-zts" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">bf490f0d914d15d247e39b92900301b0d21411581eb603ed8463080f7aa07d83</sum></package><package arch="x86_64" name="php-enchant" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">88af02144a6b48bc6c026f3aad2648391982eb88b4004927b57cfe9fea10f9af</sum></package><package arch="x86_64" name="php-soap" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">58285a87835df869bc0d5372ad65cf1287ae538bde471169de6430aa6e082ad7</sum></package><package arch="x86_64" name="php-ldap" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">25999f350dc944bda8aa5d279025dad172233cebd0fc02001b3fbb996276b5f7</sum></package><package arch="x86_64" name="php-snmp" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">045ba5219cb4c5ffda46c4d95432174b71b6149721fcf55e8e74b741cf9ee523</sum></package><package arch="x86_64" name="php-pgsql" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">723796fba77c9b543122ccd9d36c5953dfd499eff3ba75e4da9a81546d19eb79</sum></package><package arch="x86_64" name="php-fpm" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">19e877c5049cfc12efdf1c277b7b60dbcc80a32448044433c276e0793b9c4e48</sum></package><package arch="x86_64" name="php-odbc" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">e5ee74f71ae8204cb606f592a4595485d1d754eb8ba98e5f2e93b1f40ce5e6db</sum></package><package arch="x86_64" name="php-imap" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">5e7665a4e33953b52c9929b0be8dd656a34c95d596c2ee717bf5346552299ee2</sum></package><package arch="x86_64" name="php-embedded" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">ad53d37e380cfc5d0aed2ff21d26b81ee81d53dc94b9a2135ad17e52ecc0823f</sum></package><package arch="x86_64" name="php-devel" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">f6412afdbd9e179eceb95faa4f4d9366182c42a289a02087dd8e65f475010d50</sum></package><package arch="x86_64" name="php-gd" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">8414c44489c2b234a2435cf8b52ba7fab2b0674648cf1fb61380bdffdc18010a</sum></package><package arch="x86_64" name="php-common" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-common-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">ccefb67d0cded417507ac432f8ec60102af580dec3713623e58738b3adf9d503</sum></package><package arch="x86_64" name="php-bcmath" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">f3abc0722db233dc6281a9616c530cc54f7b5786980e45c74ab7ffd56b80625b</sum></package><package arch="x86_64" name="php-cli" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">cb7642ba7d6c36c53387ec4e453f67d16ca4253810a4687410931f49ffa8e1c4</sum></package><package arch="x86_64" name="php-xmlrpc" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">a6799234772acb5a08032fffd1aec7611a275b56384a857dd3af26d194f07aca</sum></package><package arch="x86_64" name="php-xml" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">004d293ce1f52b245821e87662720d8b12bb1fc154db449dfd00d083c732f019</sum></package><package arch="x86_64" name="php-recode" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">9da61fd4963f23c5a2782e7921081cfd28b1efa6686b44f5caff652acce359bb</sum></package><package arch="x86_64" name="php-mysql" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">1899fb69a4dd6c6b60a33f9686ac7113ff0cf743c841b6fc31bd35b666c659c3</sum></package><package arch="x86_64" name="php-intl" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">f093a8b72dee024a5bf0a3e08fcfa6411e89ca3634dc38ce25082d9150fcc234</sum></package><package arch="x86_64" name="php-mbstring" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">d1191d5ccf994883088f2e889ead3d73654d23c6f069f4b38fb6a1b54468e024</sum></package><package arch="x86_64" name="php-dba" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">1f3f188c866a0a5adc60534bbb52ed1db9c081bf4a3d2024ac5ce97430312e37</sum></package><package arch="x86_64" name="php" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">52606ebcfa8af844d1c92ad2b8f87fd84d43623556e57eb67b24728d7bb8d807</sum></package><package arch="x86_64" name="php-tidy" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">91448584ee106e52d5b6d57341276c0631dfc46b8022639569cc800edf5df26b</sum></package><package arch="x86_64" name="php-process" release="48.el6_8" src="php-5.3.3-48.el6_8.src.rpm" version="5.3.3"><filename>php-process-5.3.3-48.el6_8.x86_64.rpm</filename><sum type="sha256">4e8e723b98c012645b208cec76afab68a5f88375fcf84187259173e5164d6470</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385" id="CVE-2016-5385" title="Php: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1609" id="RHSA-2016:1609-1" title="Rhsa-2016:1609-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353794" id="1353794" title="Php: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1626-1</id><title>Python</title><description>Security Fix(es): 
* It was discovered that the Python CGIHandler class did not properly protect against the HTTP_PROXY variable name clash in a CGI context. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a Python CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000110) 
* It was found that Python's smtplib library did not return an exception when StartTLS failed to be established in the SMTP.starttls() function. A man in the middle attacker could strip out the STARTTLS command without generating an exception on the Python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772) 
* It was found that the Python's httplib library (used by urllib, urllib2 and others) did not properly check HTTPConnection.putheader() function arguments. An attacker could use this flaw to inject additional headers in a Python application that allowed user provided header names or values. (CVE-2016-5699)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-08-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="tkinter" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>tkinter-2.6.6-66.el6_8.x86_64.rpm</filename><sum type="sha256">9052e422a82d078ec86919b97a93eab22467638dc2298a36eb42610f2a2d6a1f</sum></package><package arch="x86_64" name="python-devel" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-devel-2.6.6-66.el6_8.x86_64.rpm</filename><sum type="sha256">d4ac8de599b54438d4667b1ca8db9eecadc10b7ae49208f2e00ab47cbc14907d</sum></package><package arch="x86_64" name="python-tools" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-tools-2.6.6-66.el6_8.x86_64.rpm</filename><sum type="sha256">f5f0cdf6cf663e236f679d36d42e72ec97c3d23978f016d3325a39d42a47c736</sum></package><package arch="i686" name="python-devel" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-devel-2.6.6-66.el6_8.i686.rpm</filename><sum type="sha256">db53ba9713fe8b4160b294fe1171d1baacbe7f1c0e1a106d1a0ee61aafb4e260</sum></package><package arch="i686" name="python" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-2.6.6-66.el6_8.i686.rpm</filename><sum type="sha256">60083273ddcb6e3f7c93666d0b460551516d1577e1e544352be5c11adff98a93</sum></package><package arch="x86_64" name="python-test" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-test-2.6.6-66.el6_8.x86_64.rpm</filename><sum type="sha256">4117760775d823beee9ec0acf589ea34c862ac779bfd83ef1c70bcc5b93f0076</sum></package><package arch="x86_64" name="python-libs" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-libs-2.6.6-66.el6_8.x86_64.rpm</filename><sum type="sha256">f6266a8ec38c47e788717ac4344cb5d9798b6961b9aa763f9feb9c5cb12b3b48</sum></package><package arch="x86_64" name="python" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-2.6.6-66.el6_8.x86_64.rpm</filename><sum type="sha256">891f80be227bb0cc40a3bbaa7793883a072558d1e0fa7e0e91526643e4e11529</sum></package><package arch="i686" name="python-libs" release="66.el6_8" src="python-2.6.6-66.el6_8.src.rpm" version="2.6.6"><filename>python-libs-2.6.6-66.el6_8.i686.rpm</filename><sum type="sha256">f58e00d14e841ebe3e0d6393b89466688314924c05f731e2b3e9fba5714737bd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" id="CVE-2016-0772" title="Python: Smtplib Starttls Stripping Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" id="CVE-2016-1000110" title="Python Cgihandler: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" id="CVE-2016-5699" title="Python: Http Protocol Steam Injection Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1626" id="RHSA-2016:1626-1" title="Rhsa-2016:1626-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303647" id="1303647" title="Python: Smtplib Starttls Stripping Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303699" id="1303699" title="Python: Http Protocol Steam Injection Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351584" id="1351584" title="Python Brew Builds Fail For Rhel 7.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357334" id="1357334" title="Python Cgihandler: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365200" id="1365200" title="Upstream Tests Cause Building Python Package On Brew Stall And Leave Orphan Processes That Need Manually Kill" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1664-1</id><title>Kernel</title><description>Security Fix(es): 
It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important) 
Bug Fix(es): 
* When loading the Direct Rendering Manager (DRM) kernel module, the kernel panicked if DRM was previously unloaded. The kernel panic was caused by a memory leak of the ID Resolver (IDR2). With this update, IDR2 is loaded during kernel boot, and the kernel panic no longer occurs in the described scenario. 
* When more than one process attempted to use the "configfs" directory entry at the same time, a kernel panic in some cases occurred. With this update, a race condition between a directory entry and a lookup operation has been fixed. As a result, the kernel no longer panics in the described scenario. 
* When shutting down the system by running the halt -p command, a kernel panic occurred due to a conflict between the kernel offlining CPUs and the sched command, which used the sched group and the sched domain data without first checking the data. The underlying source code has been fixed by adding a check to avoid the conflict. As a result, the described scenario no longer results in a kernel panic. 
* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. 
* Previously, multiple Very Secure FTP daemon (vsftpd) processes on a directory with a large number of files led to a high contention rate on each inode's spinlock, which caused excessive CPU usage. With this update, a spinlock to protect a single memory-to-memory copy has been removed from the ext4_getattr() function. As a result, system CPU usage has been reduced and is no longer excessive in the described situation. 
* When the gfs2_grow utility is used to extend Global File System 2 (GFS2), the next block allocation causes the GFS2 kernel module to re-read its resource group index. If multiple processes in the GFS2 module raced to do the same thing, one process sometimes overwrote a valid object pointer with an invalid pointer, which caused either a kernel panic or a file system corruption. This update ensures that the resource group object pointer is not overwritten. As a result, neither kernel panic nor file system corruption occur in the described scenario. 
* Previously, the SCSI Remote Protocol over InfiniBand (IB-SRP) was disabled due to a bug in the srp_queue() function. As a consequence, an attempt to enable the Remote Direct Memory Access (RDMA) at boot caused the kernel to crash. With this update, srp_queue() has been fixed, and the system now boots as expected when RDMA is enabled. 
Enhancement(s): 
* This update optimizes the efficiency of the Transmission Control Protocol (TCP) when the peer is using a window under 537 bytes in size. As a result, devices that use maximum segment size (MSS) of 536 bytes or fewer will experience improved network performance.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-08-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-headers" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">24d2f10ad4deb6be92ded71c27280b8adc0f9a1b60887211d2044f84313d8f89</sum></package><package arch="x86_64" name="python-perf" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">a856c1ee68b37972bc5893397eccb2d3c27a27bb92ccd7589253c9036aa2346c</sum></package><package arch="x86_64" name="kernel-devel" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">4ecc053d29093257e17e5a9684253c88233d0761f7ab67a1071b6b88cb98fc1b</sum></package><package arch="i686" name="kernel-debug-devel" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm</filename><sum type="sha256">499566c537b3dfdcf38a608f8beb90c76ef6754e7067e06098aba09e48b56bce</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm</filename><sum type="sha256">9bd107c0a1d08f0d470bbbf877036c6ee3973b9e4895be018b26701aa1e4523d</sum></package><package arch="noarch" name="kernel-firmware" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm</filename><sum type="sha256">798e799de5c1244d69e47ad0c03b00cfce85bc28c002dd5713e7fc43d310d5d8</sum></package><package arch="noarch" name="kernel-doc" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.4.2.el6.noarch.rpm</filename><sum type="sha256">5bd3788c57ba50371a9fe27df4ada8d3352c468949108df8b90817395c43fa43</sum></package><package arch="x86_64" name="kernel" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">47be75127327731efdfcd776770762bc1077f10b9570875ba2103a73fe528f9a</sum></package><package arch="x86_64" name="perf" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">bdc7cdb01595c021fb741e0be71740fde0db25784489b862625497d906a3e3a9</sum></package><package arch="x86_64" name="kernel-debug" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">62aec8c2aa9659c2c1e908b0193c0a6a2d1d85546db21359ace706b7b64a9555</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.4.2.el6" src="kernel-2.6.32-642.4.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.4.2.el6.x86_64.rpm</filename><sum type="sha256">c084bcce9eb3d1bef56a38900b7a5738b0ef254c141eeeb023c6289ec70dd106</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" id="CVE-2016-5696" title="Kernel: Challenge Ack Counter Information Disclosure." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1664" id="RHSA-2016:1664-1" title="Rhsa-2016:1664-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354708" id="1354708" title="Kernel: Challenge Ack Counter Information Disclosure." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1776-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* An insufficient bytecode verification flaw was discovered in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to completely bypass Java sandbox restrictions. (CVE-2016-3606) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-08-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.12.6.el6_8" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.6.el6_8.x86_64.rpm</filename><sum type="sha256">1daa2f2494056695e8dc8aafdb108e248a7504f25883c0b630519fa44e408e62</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.12.6.el6_8" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.6.el6_8.x86_64.rpm</filename><sum type="sha256">b3a192e989322e7951aeba7b9f5696b82455985678d71c6385e0d93fd2d1ceb4</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.12.6.el6_8" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8.x86_64.rpm</filename><sum type="sha256">db81be18fd8348698bf6adfd662e898f61d51559fd96ec08f4e8cd3b6d27f7f0</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.12.6.el6_8" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-src-1.6.0.40-1.13.12.6.el6_8.x86_64.rpm</filename><sum type="sha256">2a8caf9e41350301cb8c898558f5564ed56951bd101cbf18b1564579e1aec418</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.12.6.el6_8" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.6.el6_8.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.6.el6_8.x86_64.rpm</filename><sum type="sha256">e83161f91db8277343e64126057ec2ab525781766716b2e78c2977c44443a7d2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1776" id="RHSA-2016:1776-1" title="Rhsa-2016:1776-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1797-1</id><title>Ipa</title><description>Security Fix(es): 
* An insufficient permission check issue was found in the way IPA server treats certificate revocation requests. An attacker logged in with the 'retrieve certificate' permission enabled could use this flaw to revoke certificates, possibly triggering a denial of service attack. (CVE-2016-5404)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-09-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ipa-python" release="50.el6_8.2" src="ipa-3.0.0-50.el6_8.2.src.rpm" version="3.0.0"><filename>ipa-python-3.0.0-50.el6_8.2.x86_64.rpm</filename><sum type="sha256">7d118191b083656411796b5c6945c5572e8fc3cf874d4b5a8068ca33c36ce09e</sum></package><package arch="x86_64" name="ipa-client" release="50.el6_8.2" src="ipa-3.0.0-50.el6_8.2.src.rpm" version="3.0.0"><filename>ipa-client-3.0.0-50.el6_8.2.x86_64.rpm</filename><sum type="sha256">b8f20f030d65b910f55706a1addb48f6fcbac642d29f08fd90567621b913f113</sum></package><package arch="x86_64" name="ipa-admintools" release="50.el6_8.2" src="ipa-3.0.0-50.el6_8.2.src.rpm" version="3.0.0"><filename>ipa-admintools-3.0.0-50.el6_8.2.x86_64.rpm</filename><sum type="sha256">7525295422265ddbadc79e33918cd4c5f580e1b13a932e9dd11ffa62fc16d7fc</sum></package><package arch="x86_64" name="ipa-server" release="50.el6_8.2" src="ipa-3.0.0-50.el6_8.2.src.rpm" version="3.0.0"><filename>ipa-server-3.0.0-50.el6_8.2.x86_64.rpm</filename><sum type="sha256">6036857bbf358d6e8ea44aeb435917c25def07b8f9afce2176e66f4d3cacc594</sum></package><package arch="x86_64" name="ipa-server-selinux" release="50.el6_8.2" src="ipa-3.0.0-50.el6_8.2.src.rpm" version="3.0.0"><filename>ipa-server-selinux-3.0.0-50.el6_8.2.x86_64.rpm</filename><sum type="sha256">e24c59adb94b4f9d9771fd5d94ec1d448514b3a8865504c893d6788276f89f61</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="50.el6_8.2" src="ipa-3.0.0-50.el6_8.2.src.rpm" version="3.0.0"><filename>ipa-server-trust-ad-3.0.0-50.el6_8.2.x86_64.rpm</filename><sum type="sha256">89a97e5fb1971d1d4b17b73de98acdac1a7d1ee0e013eb0bc2ae1aeb7839c578</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5404" id="CVE-2016-5404" title="Ipa: Insufficient Privileges Check In Certificate Revocation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1797" id="RHSA-2016:1797-1" title="Rhsa-2016:1797-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351593" id="1351593" title="Ipa: Insufficient Privileges Check In Certificate Revocation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1809-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.3.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2836)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-09-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.3.0-1.el6_8.src.rpm" version="45.3.0"><filename>thunderbird-45.3.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">7243157b50f08339ba12290d3b450a443e9453c0ee02ec053a945884cfa491cb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" id="CVE-2016-2836" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1809" id="RHSA-2016:1809-1" title="Rhsa-2016:1809-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361974" id="1361974" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1850-1</id><title>Libarchive</title><description>Security Fix(es): 
* A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418) 
* Multiple out-of-bounds read flaws were found in libarchive. Specially crafted AR or MTREE files could cause the application to read data out of bounds, potentially disclosing a small amount of application memory, or causing an application crash. (CVE-2015-8920, CVE-2015-8921) 
* A denial of service vulnerability was found in libarchive's handling of GZIP streams. A crafted GZIP file could cause libarchive to allocate an excessive amount of memory, eventually leading to a crash. (CVE-2016-7166) 
* A denial of service vulnerability was found in libarchive. A specially crafted CPIO archive containing a symbolic link to a large target path could cause memory allocation to fail, causing an application using libarchive that attempted to view or extract such archive to crash. (CVE-2016-4809) 
* Multiple instances of undefined behavior due to arithmetic overflow were found in libarchive. Specially crafted Compress streams or ISO9660 volumes could potentially cause the application to fail to read the archive, or to crash. (CVE-2015-8932, CVE-2016-5844)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libarchive" release="7.el6_8" src="libarchive-2.8.3-7.el6_8.src.rpm" version="2.8.3"><filename>libarchive-2.8.3-7.el6_8.x86_64.rpm</filename><sum type="sha256">ae55e2d92424e8019a5309eee3b923e8e0a3d249ed5e3d1291ea79e95d476b8f</sum></package><package arch="i686" name="libarchive" release="7.el6_8" src="libarchive-2.8.3-7.el6_8.src.rpm" version="2.8.3"><filename>libarchive-2.8.3-7.el6_8.i686.rpm</filename><sum type="sha256">0d098393bca197c17b24812e720f46a9c3c6861bd527aeda349a494b81a79696</sum></package><package arch="i686" name="libarchive-devel" release="7.el6_8" src="libarchive-2.8.3-7.el6_8.src.rpm" version="2.8.3"><filename>libarchive-devel-2.8.3-7.el6_8.i686.rpm</filename><sum type="sha256">79e98076171fa574efed22a6553519e7cf086778aad8502aaec25d4749c7b9f0</sum></package><package arch="x86_64" name="libarchive-devel" release="7.el6_8" src="libarchive-2.8.3-7.el6_8.src.rpm" version="2.8.3"><filename>libarchive-devel-2.8.3-7.el6_8.x86_64.rpm</filename><sum type="sha256">89bcb8e53c109d5b62fc85489dc155bf2ada1cb43a9b7be448ebdc7c63879230</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" id="CVE-2015-8920" title="Libarchive: Stack Out Of Bounds Read In Ar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" id="CVE-2015-8921" title="Libarchive: Global Out Of Bounds Read In Mtree Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932" id="CVE-2015-8932" title="Libarchive: Undefined Behavior / Invalid Shiftleft In Tar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" id="CVE-2016-4809" title="Libarchive: Memory Allocate Error With Symbolic Links In Cpio Archives" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844" id="CVE-2016-5844" title="Libarchive: Undefined Behaviour (Integer Overflow) In Iso Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7166" id="CVE-2016-7166" title="Libarchive: Denial Of Service Using A Crafted Gzip File" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1850" id="RHSA-2016:1850-1" title="Rhsa-2016:1850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347084" id="1347084" title="Libarchive: Memory Allocate Error With Symbolic Links In Cpio Archives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347086" id="1347086" title="Libarchive: Denial Of Service Using A Crafted Gzip File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348416" id="1348416" title="Libarchive: Stack Out Of Bounds Read In Ar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348772" id="1348772" title="Libarchive: Global Out Of Bounds Read In Mtree Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348780" id="1348780" title="Libarchive: Undefined Behavior / Invalid Shiftleft In Tar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350280" id="1350280" title="Libarchive: Undefined Behaviour (Integer Overflow) In Iso Parser" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1912-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.4.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5257, CVE-2016-5278, CVE-2016-5270, CVE-2016-5272, CVE-2016-5274, CVE-2016-5276, CVE-2016-5277, CVE-2016-5280, CVE-2016-5281, CVE-2016-5284, CVE-2016-5250, CVE-2016-5261)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-09-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.4.0-1.el6_8.src.rpm" version="45.4.0"><filename>firefox-45.4.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">dbc2b292c6699e249842fd735bbc62a8863319e46ae685bbcc7aae77810dde10</sum></package><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.4.0-1.el6_8.src.rpm" version="45.4.0"><filename>firefox-45.4.0-1.el6_8.i686.rpm</filename><sum type="sha256">f707ad6cd7b09b48ff4b1919f7f9f4fd2859cb371c283450b2cf4f010fbb7f86</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" id="CVE-2016-5250" title="Mozilla: Resource Timing Api Is Storing Resources Sent By The Previous Page (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" id="CVE-2016-5257" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" id="CVE-2016-5261" title="Mozilla: Integer Overflow And Memory Corruption In Websocketchannel (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" id="CVE-2016-5270" title="Mozilla: Heap-Buffer-Overflow In Nscasetransformtextrunfactory::Transformstring (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" id="CVE-2016-5272" title="Mozilla: Bad Cast In Nsimagegeometrymixin (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" id="CVE-2016-5274" title="Mozilla: Use-After-Free In Nsframemanager::Captureframestate (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" id="CVE-2016-5276" title="Mozilla: Heap-Use-After-Free In Mozilla::A11Y::Docaccessible::Processinvalidationlist (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" id="CVE-2016-5277" title="Mozilla: Heap-Use-After-Free In Nsrefreshdriver::Tick (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" id="CVE-2016-5278" title="Mozilla: Heap-Buffer-Overflow In Nsbmpencoder::Addimageframe (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" id="CVE-2016-5280" title="Mozilla: Use-After-Free In Mozilla::Nstextnodedirectionalitymap::Removeelementfrommap (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" id="CVE-2016-5281" title="Mozilla: Use-After-Free In Domsvglength (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" id="CVE-2016-5284" title="Mozilla: Add-On Update Site Certificate Pin Expiration (Mfsa 2016-86)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1912" id="RHSA-2016:1912-1" title="Rhsa-2016:1912-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361986" id="1361986" title="Mozilla: Integer Overflow And Memory Corruption In Websocketchannel (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361998" id="1361998" title="Mozilla: Resource Timing Api Is Storing Resources Sent By The Previous Page (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377543" id="1377543" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377549" id="1377549" title="Mozilla: Heap-Buffer-Overflow In Nsbmpencoder::Addimageframe (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377552" id="1377552" title="Mozilla: Heap-Buffer-Overflow In Nscasetransformtextrunfactory::Transformstring (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377554" id="1377554" title="Mozilla: Bad Cast In Nsimagegeometrymixin (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377557" id="1377557" title="Mozilla: Heap-Use-After-Free In Mozilla::A11Y::Docaccessible::Processinvalidationlist (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377558" id="1377558" title="Mozilla: Use-After-Free In Nsframemanager::Captureframestate (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377559" id="1377559" title="Mozilla: Heap-Use-After-Free In Nsrefreshdriver::Tick (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377561" id="1377561" title="Mozilla: Use-After-Free In Mozilla::Nstextnodedirectionalitymap::Removeelementfrommap (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377563" id="1377563" title="Mozilla: Use-After-Free In Domsvglength (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377565" id="1377565" title="Mozilla: Add-On Update Site Certificate Pin Expiration (Mfsa 2016-86)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1940-1</id><title>Openssl</title><description>Security Fix(es): 
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) 
* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178) 
* It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. (CVE-2016-2179) 
* A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181) 
* An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code. (CVE-2016-2182) 
* A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default. 
* An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets. (CVE-2016-6302) 
* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177) 
* An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. (CVE-2016-2180) 
* Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl-perl" release="48.sl6_8.3" src="openssl-1.0.1e-48.sl6_8.3.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-48.sl6_8.3.x86_64.rpm</filename><sum type="sha256">4b149339824e7ead1d806080480d81aa92bb0c859961dc004bcafb3822d4a8fe</sum></package><package arch="x86_64" name="openssl" release="48.sl6_8.3" src="openssl-1.0.1e-48.sl6_8.3.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.sl6_8.3.x86_64.rpm</filename><sum type="sha256">8adb40a9b7a833affdb3490cc20dbe7656c5afee7b519c493b08b795a5589096</sum></package><package arch="x86_64" name="openssl-devel" release="48.sl6_8.3" src="openssl-1.0.1e-48.sl6_8.3.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.sl6_8.3.x86_64.rpm</filename><sum type="sha256">1c40233c19223cfdbd45d37e9db4b55d0a99b6a37e52f66637fe837e983c5a8e</sum></package><package arch="x86_64" name="openssl-static" release="48.sl6_8.3" src="openssl-1.0.1e-48.sl6_8.3.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-48.sl6_8.3.x86_64.rpm</filename><sum type="sha256">cc2f42a8b4048dbbaa86636c47990024f81bc69e317c887ec12a6fa2fecc7fe3</sum></package><package arch="i686" name="openssl-devel" release="48.sl6_8.3" src="openssl-1.0.1e-48.sl6_8.3.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.sl6_8.3.i686.rpm</filename><sum type="sha256">12bfc2005f0a2d121cbb7b8c085162a1ef4625b1d534086977a2a83b5d7b11b7</sum></package><package arch="i686" name="openssl" release="48.sl6_8.3" src="openssl-1.0.1e-48.sl6_8.3.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.sl6_8.3.i686.rpm</filename><sum type="sha256">438ea01961b7a4b259c08197b49cdadf0502350f87947a7c3ae91531a073eb10</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" id="CVE-2016-2177" title="Openssl: Possible Integer Overflow Vulnerabilities In Codebase" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" id="CVE-2016-2178" title="Openssl: Non-Constant Time Codepath Followed For Certain Operations In Dsa Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" id="CVE-2016-2179" title="Openssl: Dtls Memory Exhaustion Dos When Messages Are Not Removed From Fragment Buffer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" id="CVE-2016-2180" title="Openssl: Oob Read In Ts_Obj_Print_Bio()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" id="CVE-2016-2181" title="Openssl: Dtls Replay Protection Bypass Allows Dos Against Dtls Connection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" id="CVE-2016-2182" title="Openssl: Out-Of-Bounds Write Caused By Unchecked Errors In Bn_Bn2Dec()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" id="CVE-2016-6302" title="Openssl: Insufficient Tls Session Ticket Hmac Length Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" id="CVE-2016-6304" title="Openssl: Ocsp Status Request Extension Unbounded Memory Growth" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" id="CVE-2016-6306" title="Openssl: Certificate Message Oob Reads" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1940" id="RHSA-2016:1940-1" title="Rhsa-2016:1940-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341705" id="1341705" title="Openssl: Possible Integer Overflow Vulnerabilities In Codebase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343400" id="1343400" title="Openssl: Non-Constant Time Codepath Followed For Certain Operations In Dsa Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1359615" id="1359615" title="Openssl: Oob Read In Ts_Obj_Print_Bio()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367340" id="1367340" title="Openssl: Out-Of-Bounds Write Caused By Unchecked Errors In Bn_Bn2Dec()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369113" id="1369113" title="Openssl: Dtls Replay Protection Bypass Allows Dos Against Dtls Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369504" id="1369504" title="Openssl: Dtls Memory Exhaustion Dos When Messages Are Not Removed From Fragment Buffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369855" id="1369855" title="Openssl: Insufficient Tls Session Ticket Hmac Length Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377594" id="1377594" title="Openssl: Certificate Message Oob Reads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377600" id="1377600" title="Openssl: Ocsp Status Request Extension Unbounded Memory Growth" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1944-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm</filename><sum type="sha256">845abf51708d77f0d69bd21f630f8dfc4896f28163a39d25fbde60151e51b2d8</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm</filename><sum type="sha256">5ffd14a12018f62930a2ba579337274eff016bc2b538dd178630548eadde5c4d</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm</filename><sum type="sha256">4d12eb81ef361953ee7726d32486214e4ea1548d4e7bbc9e8504d0bc22779fbb</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.1.i686.rpm</filename><sum type="sha256">7ed4f220bb74da3d02a6235937e4627cd5c1a8a35d31705b3565f3beb7918c61</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm</filename><sum type="sha256">1f33e8053d0dfa5adfc0e878fa64234cd37fada2984308ab624d9ff27bf5701e</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.1.i686.rpm</filename><sum type="sha256">225ecf461de670e36346a49df85bcd152a4f758c0860a663b3b0571c2f7518c6</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm</filename><sum type="sha256">ac47945ff6929ab7e75995a91edee987016c9ed7cb46a73a2cfd6dda64303561</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.47.rc1.el6_8.1" src="bind-9.8.2-0.47.rc1.el6_8.1.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.47.rc1.el6_8.1.x86_64.rpm</filename><sum type="sha256">eaff4b5d4589da4515fe211161d5e6c77ba5c7a8845e05ec7e9e2a99e3e862af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" id="CVE-2016-2776" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1944" id="RHSA-2016:1944-1" title="Rhsa-2016:1944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378380" id="1378380" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1978-1</id><title>Python-Twisted-Web</title><description>Security Fix(es): 
* It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000111) 
Note: After this update, python-twisted-web will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-twisted-web" release="5.el6_8" src="python-twisted-web-8.2.0-5.el6_8.src.rpm" version="8.2.0"><filename>python-twisted-web-8.2.0-5.el6_8.x86_64.rpm</filename><sum type="sha256">699d6d5d1692f0e172a5f82aba29eeed0f201c174205902419c2bdeaecfb8f4f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111" id="CVE-2016-1000111" title="Python Twisted: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1978" id="RHSA-2016:1978-1" title="Rhsa-2016:1978-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357345" id="1357345" title="Python Twisted: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1985-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.4.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5257)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.4.0-1.el6_8.src.rpm" version="45.4.0"><filename>thunderbird-45.4.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">fc24bd8afdfdf25cc2c1c3d6339ec0557e2c17a5a679ef6658daaf27e8a77921</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" id="CVE-2016-5257" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1985" id="RHSA-2016:1985-1" title="Rhsa-2016:1985-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377543" id="1377543" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2006-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialized variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) 
* A heap-based buffer overflow vulnerability was found in the Linux kernel's hiddev driver. This flaw could allow a local attacker to corrupt kernel memory, possible privilege escalation or crashing the system. (CVE-2016-5829, Moderate) 
The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.). 
Bug Fix(es): 
* Previously, when two NFS shares with different security settings were mounted, the I/O operations to the kerberos-authenticated mount caused the RPC_CRED_KEY_EXPIRE_SOON parameter to be set, but the parameter was not unset when performing the I/O operations on the sec=sys mount. Consequently, writes to both NFS shares had the same parameters, regardless of their security settings. This update fixes this problem by moving the NO_CRKEY_TIMEOUT parameter to the auth-&gt;au_flags field. As a result, NFS shares with different security settings are now handled as expected. 
* In some circumstances, resetting a Fibre Channel over Ethernet (FCoE) interface could lead to a kernel panic, due to invalid information extracted from the FCoE header. This update adds santiy checking to the cpu number extracted from the FCoE header. This ensures that subsequent operations address a valid cpu, and eliminates the kernel panic. 
* Prior to this update, the following problems occurred with the way GSF2 transitioned files and directories from the "unlinked" state to the "free" state: 
The numbers reported for the df and the du commands in some cases got out of sync, which caused blocks in the file system to appear missing. The blocks were not actually missing, but they were left in the "unlinked" state. 
In some circumstances, GFS2 referenced a cluster lock that was already deleted, which led to a kernel panic. 
If an object was deleted and its space reused as a different object, GFS2 sometimes deleted the existing one, which caused file system corruption. 
With this update, the transition from "unlinked" to "free" state has been fixed. As a result, none of these three problems occur anymore. 
* Previously, the GFS2 file system in some cases became unresponsive due to lock dependency problems between inodes and the cluster lock. This occurred most frequently on nearly full file systems where files and directories were being deleted and recreated at the same block location at the same time. With this update, a set of patches has been applied to fix these lock dependencies. As a result, GFS2 no longer hangs in the described circumstances. 
* When used with controllers that do not support DCMD- MR_DCMD_PD_LIST_QUERY, the megaraid_sas driver can go into infinite error reporting loop of error reporting messages. This could cause difficulties with finding other important log messages, or even it could cause the disk to overflow. This bug has been fixed by ignoring the DCMD MR_DCMD_PD_LIST_QUERY query for controllers which do not support it and sending the DCMD SUCCESS status to the AEN functions. As a result, the error messages no longer appear when there is a change in the status of one of the arrays.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="kernel-debug-devel" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.6.1.el6.i686.rpm</filename><sum type="sha256">48523547abb5a9b8e55db041c790a29ab2b6014bfea21bdbb3b1031bbec476b0</sum></package><package arch="x86_64" name="kernel-debug" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">af6fe7194b365cfacc60a42f5d26b68eb2c7bb5d5e95ecaade4358dcb4bec94b</sum></package><package arch="x86_64" name="kernel" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">4ba62735160a8bdee993cb98c53c4c69beb642d860b04d77318ed30938ee5952</sum></package><package arch="noarch" name="kernel-doc" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.6.1.el6.noarch.rpm</filename><sum type="sha256">60345739d4b03b5e21e9983e5c4566fb802bcbb10709b82391778defd5b48eba</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.6.1.el6.noarch.rpm</filename><sum type="sha256">bc0a55ed3f6af22af1e644fda84f6aa298f5984928f22348146b4b27631847f1</sum></package><package arch="x86_64" name="perf" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">c0a468e8dc1a5138e3581aeb566c8da548d36a1ecbf324dbdf8c40fc3ab3909a</sum></package><package arch="x86_64" name="kernel-devel" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">21ee71101ed593626a99384e059e3749ec7b32cbdfb8977f9f0769f35e043007</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">79d5b6e19d09ae5e4efaebd0386b78fc91e147c2348820819a273f986778ac36</sum></package><package arch="x86_64" name="python-perf" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">50830dd8bd872412a9c98f5047d9a02ba194a2e68f70c92b41dd2145bef339a4</sum></package><package arch="x86_64" name="kernel-headers" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.6.1.el6.x86_64.rpm</filename><sum type="sha256">c6d6a895541608bb7ea3cca0b412681f949f2be64ff17eb3ebbb739cc72177e6</sum></package><package arch="noarch" name="kernel-firmware" release="642.6.1.el6" src="kernel-2.6.32-642.6.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.6.1.el6.noarch.rpm</filename><sum type="sha256">554c8eb06816819f41d4c7ee41693b7f08379b5a4af468baf6a1d51739fad8ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" id="CVE-2016-4470" title="Kernel: Uninitialized Variable In Request_Key Handling Causes Kernel Crash In Error Handling Path" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" id="CVE-2016-5829" title="Kernel: Heap Buffer Overflow In Hiddev Driver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2006" id="RHSA-2016:2006-1" title="Rhsa-2016:2006-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341716" id="1341716" title="Kernel: Uninitialized Variable In Request_Key Handling Causes Kernel Crash In Error Handling Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350509" id="1350509" title="Kernel: Heap Buffer Overflow In Hiddev Driver" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2045-1</id><title>Tomcat6</title><description>Security Fix(es): 
* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325) 
* It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714) 
* It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5388) 
* A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. (CVE-2015-5174) 
* It was found that Tomcat could reveal the presence of a directory even when that directory was protected by a security constraint. A user could make a request to a directory via a URL not ending with a slash and, depending on whether Tomcat redirected that request, could confirm whether that directory existed. (CVE-2015-5345) 
* It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706) 
Bug Fix(es): 
* Due to a bug in the tomcat6 spec file, the catalina.out file's md5sum, size, and mtime attributes were compared to the file's attributes at installation time. Because these attributes change after the service is started, the "rpm -V" command previously failed. With this update, the attributes mentioned above are ignored in the RPM verification and the catalina.out file now passes the verification check.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-webapps" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">2997ced8ecf9d7e179911e00ed63ba64cab978d9ee428cede4ebdb3a0b648fec</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">8f6175283b9801d4ff2a5fa9024f8ff9f5867a1362dd0ffcbc64b1147e97ffca</sum></package><package arch="noarch" name="tomcat6-lib" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">480bb7f17c104c0eb270c574ab00dc29b74e42aa21143061ac1fc44ef114c74c</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">b12e3c125c38385f2095c9fbbf121c4e2bbc25e1034da9d221d48526c2aef61f</sum></package><package arch="noarch" name="tomcat6-javadoc" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">ebde1556a415a96f7913183c895633d0512fb84c48a57f625ea9240f9c6f000e</sum></package><package arch="noarch" name="tomcat6" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">688d83a1790d5dd61551d505365acd8bd212c7203f691916a0bbecce9418bec2</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">ca084b61bfb27573109c778cbe7c0d67ffa37681062bccde65e6b97cf0cbb089</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">4f56c066c7ff970800d26305f6842d982d47ed8ba49d1533a00689ef2ba6e93b</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="98.el6_8" src="tomcat6-6.0.24-98.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-98.el6_8.noarch.rpm</filename><sum type="sha256">b8965f0d81de61aaa637505eb75d6f8c506adbb422519ccb097e460172147364</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174" id="CVE-2015-5174" title="Cve-2015-5174" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345" id="CVE-2015-5345" title="Tomcat: Directory Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706" id="CVE-2016-0706" title="Tomcat: Security Manager Bypass Via Statusmanagerservlet" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714" id="CVE-2016-0714" title="Tomcat: Security Manager Bypass Via Persistence Mechanisms" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388" id="CVE-2016-5388" title="Tomcat: Cgi Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6325" id="CVE-2016-6325" title="Tomcat: Tomcat Writable Config Files Allow Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2045" id="RHSA-2016:2045-1" title="Rhsa-2016:2045-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265698" id="1265698" title="Tomcat: Url Normalization Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311082" id="1311082" title="Tomcat: Security Manager Bypass Via Persistence Mechanisms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311087" id="1311087" title="Tomcat: Security Manager Bypass Via Statusmanagerservlet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311089" id="1311089" title="Tomcat: Directory Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353809" id="1353809" title="Tomcat: Cgi Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367447" id="1367447" title="Tomcat: Tomcat Writable Config Files Allow Privilege Escalation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2079-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively. 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">f3c73d322619f600347fbee06c25f0df918019fc939ba364ac234a611cbec4a9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">b5671fe4cac91c2c4f0d6b0fb90f9417bf2822cc50f719712c01f9a79366bdd5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">968dcaee47bda804ab3cdd144945edfe2a7153e87e1dd474d46bfece372ede7e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">b41e1f8bb852411021be08fccfaa59a63b144ae364939da9df360003cc7b2713</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.111-0.b15.el6_8.noarch.rpm</filename><sum type="sha256">9a4f8ece9b39a3adb58337235fe9bbe5f7e92129e9ca852fe448716c209396ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-debug-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">43ab42b7c52302a1d88543f2793dd88829f7bb51cfbe535d181eff25620345d0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">be4295b2065b86ffb17b076704864cfffcf8c2e1ae281d13e4e2c78e01a3cf50</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-1.8.0.111-0.b15.el6_8.noarch.rpm</filename><sum type="sha256">dcb22f1e1a35c38c16b833e15a8c155935fcd31f73cdd1cfc09ee27bc02da6ce</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">d4faa172ddba5b6386125f7a3bb710da3566bc05136db44a7b2f7438a7a994c9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-debug-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">80f2bc24b5e9a6c3938aaef8ab34c1e5695b4e05829f1883f3df1572881d9aaf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">9d34cda16498bd2cede0a5465ecf2a3bcd98a36ad97f27fa8007da652de89e23</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-0.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-1.8.0.111-0.b15.el6_8.x86_64.rpm</filename><sum type="sha256">d76fdd92d75c6877a5bc85e8e283247dbf7b6730f3074e92e0fed630e524ef31</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2079" id="RHSA-2016:2079-1" title="Rhsa-2016:2079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2093-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.2.i686.rpm</filename><sum type="sha256">ab5ad2ae3cb0e498be09870850b99d17bbd0e48c28179a9d4962950c340a998d</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm</filename><sum type="sha256">b06f47e5608951ed0681e6497f10d66f5014ae9c97eeef809b0c0355d8ba545c</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm</filename><sum type="sha256">7738b5e7d17fe74c86e15a6f028fbddba09b53d43110cbb8950050bbad3ebdfe</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.2.i686.rpm</filename><sum type="sha256">0f9820c649ad42856935e7809f29c15456e3ed23974869a2c471d19bcbf48dc3</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm</filename><sum type="sha256">e151848244e24f44966ede974eb2e245fe62a251fdd96d0f22b5978055a49e01</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm</filename><sum type="sha256">1571c8842205bd3750e43cabb6a17ec3906fbb3bdf43180a530f6aff93f4f6df</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm</filename><sum type="sha256">f5ef2808a924aa690602d3818185d958c3cee2102d102a1d3b0e1d88b3b5e5c7</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.47.rc1.el6_8.2" src="bind-9.8.2-0.47.rc1.el6_8.2.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm</filename><sum type="sha256">bdf7952fed77bfd532ad48ee0db1b06dbff57b89134df840e6c529f63c07fad5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2848" id="CVE-2016-2848" title="Bind: Assertion Failure Triggered By A Packet " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2093" id="RHSA-2016:2093-1" title="Rhsa-2016:2093-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385450" id="1385450" title="Bind: Assertion Failure Triggered By A Packet " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2105-1</id><title>Kernel</title><description>Security Fix(es):

* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm</filename><sum type="sha256">4a0ebcc73c7cc2e0778d20d8dc081a4e69a93db18a832c370a1c7d5fb1574f08</sum></package><package arch="x86_64" name="kernel-devel" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">936602ed85aeaa37126dc7fd167d0efe93059453b5564101beb22b39c1f63424</sum></package><package arch="x86_64" name="python-perf" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">1017ac1a13a47f9fa9b7dae13e05087f690c11e27d31602a65aa09aa98b0a27b</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm</filename><sum type="sha256">f1f5d6c9d24f5bcb0e2f53f43bee4a4a48d7853b3b8fbff64397b3ee3f2a9250</sum></package><package arch="x86_64" name="kernel-headers" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">2cbb5a1945e42963c5ed0f3d0003e880f0b7e625c62256d60831c423cc44be96</sum></package><package arch="noarch" name="kernel-doc" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.6.2.el6.noarch.rpm</filename><sum type="sha256">68fd844e19f6d08fa7359df4004d2eae4ce32eff51204c2460bfb79faa40dc53</sum></package><package arch="x86_64" name="kernel" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">381fe26908878a00667ff0dd1fb5680a73979f502e2ca044629a8dd8850fb992</sum></package><package arch="i686" name="kernel-debug-devel" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm</filename><sum type="sha256">012c019b0cca4d48802ecb2d3d06d61b1499337b8771e33c699faf1c8e99d4f8</sum></package><package arch="x86_64" name="kernel-debug" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">79e408d52b9a508ff18544d03e723bf058c3c38fef9d1e5054976bd1106a4ea7</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">d1e956c218610187bf138e3d8cf8ec17e91706490849c076459c765a938e11d9</sum></package><package arch="x86_64" name="perf" release="642.6.2.el6" src="kernel-2.6.32-642.6.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.6.2.el6.x86_64.rpm</filename><sum type="sha256">382409f46a11ab841eb9a7da86f040aeccd68ed804599db52725ba9c270aca42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" id="CVE-2016-5195" title="Kernel: Mm: Privilege Escalation Via Map_Private Cow Breakage" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2105" id="RHSA-2016:2105-1" title="Rhsa-2016:2105-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384344" id="1384344" title="Kernel: Mm: Privilege Escalation Via Map_Private Cow Breakage" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2141-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm</filename><sum type="sha256">39bd3667ed283e3512068bd9a38f5a5f37e2d4c48eb1e6e764ec7deb21a553b4</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm</filename><sum type="sha256">973fb2f5466d065c0eb106618bae0d6bedad7d9ab9c28c37e311072da1b06ad0</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm</filename><sum type="sha256">3423e3b07feb5b8a9fbd1064295bb7227c3cf256cbe85f6ca22b31d5a5a067c8</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm</filename><sum type="sha256">7df9a7e6133f690ecd7e529d9baa99b199a8bf207b358205bec221c69112f0b8</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm</filename><sum type="sha256">c0cb49d05cb02886ce5c3395c4b1ac3974436c7ab5153db297c0bfa11d245512</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm</filename><sum type="sha256">400c36e6258346e281c5f3afb95223614751dbc006c4b1ba37353670f90cca03</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm</filename><sum type="sha256">f57713b59fcc082c4abbc2393da452610e58ef1413a25701fbb9c8ee89847bf8</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.3" src="bind-9.8.2-0.47.rc1.el6_8.3.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm</filename><sum type="sha256">078c9a8d0e1f590832e9fdc80386b3aae0bc03c54225b1a51207f472746d8415</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" id="CVE-2016-8864" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2141" id="RHSA-2016:2141-1" title="Rhsa-2016:2141-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389652" id="1389652" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2658-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.8.1.el6_8" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el6_8.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-src-1.7.0.121-2.6.8.1.el6_8.x86_64.rpm</filename><sum type="sha256">45293314b723bb53e72de69816ac8289b38da04d5a66f7abf5135abf093084d9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.8.1.el6_8" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el6_8.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.1.el6_8.x86_64.rpm</filename><sum type="sha256">4ce76a5303091bc6ec98bcb786e1989bb827b42b2041e539bf49076011deee89</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.8.1.el6_8" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el6_8.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el6_8.x86_64.rpm</filename><sum type="sha256">cc587d41297b5cd1c6cc6ac2e0aef88532f45c492b780748483b491fbbd12ed7</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.8.1.el6_8" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el6_8.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.1.el6_8.noarch.rpm</filename><sum type="sha256">506a38abfa34a5070a2014a09236e699a6812c1586c6a1b819a708a8bb573b82</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.8.1.el6_8" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el6_8.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.1.el6_8.x86_64.rpm</filename><sum type="sha256">d5e6c55d50fe38fbc4367c4ea5d3a24db97fc1b2ce4ca3942129c8a9a8713ab9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2658" id="RHSA-2016:2658-1" title="Rhsa-2016:2658-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2674-1</id><title>Libgcrypt</title><description>Security Fix(es): 
* A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes. (CVE-2016-6313)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libgcrypt-devel" release="12.el6_8" src="libgcrypt-1.4.5-12.el6_8.src.rpm" version="1.4.5"><filename>libgcrypt-devel-1.4.5-12.el6_8.i686.rpm</filename><sum type="sha256">04234acdc46b31bf7c556d0d525a578e00c1c7f0190a67d46b6923ceb53b49fe</sum></package><package arch="x86_64" name="libgcrypt-devel" release="12.el6_8" src="libgcrypt-1.4.5-12.el6_8.src.rpm" version="1.4.5"><filename>libgcrypt-devel-1.4.5-12.el6_8.x86_64.rpm</filename><sum type="sha256">39e1f522f744ef6479de16cc39601dc26f66d81a6ef13a5bcfb3d3b91953ee9d</sum></package><package arch="x86_64" name="libgcrypt" release="12.el6_8" src="libgcrypt-1.4.5-12.el6_8.src.rpm" version="1.4.5"><filename>libgcrypt-1.4.5-12.el6_8.x86_64.rpm</filename><sum type="sha256">a198530b34dd4eb0e171b5c6a5bf980160b2e283b26ad67c423fe713ada2dafb</sum></package><package arch="i686" name="libgcrypt" release="12.el6_8" src="libgcrypt-1.4.5-12.el6_8.src.rpm" version="1.4.5"><filename>libgcrypt-1.4.5-12.el6_8.i686.rpm</filename><sum type="sha256">7b45e6ed65eefc24a22f1b1175b86116aeb8c6cfac6a151808dcd41946367412</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" id="CVE-2016-6313" title="Libgcrypt: Prng Output Is Predictable" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2674" id="RHSA-2016:2674-1" title="Rhsa-2016:2674-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366105" id="1366105" title="Libgcrypt: Prng Output Is Predictable" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2675-1</id><title>Pacemaker</title><description>Security Fix(es): 
* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="pacemaker-libs-devel" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-libs-devel-1.1.14-8.el6_8.2.i686.rpm</filename><sum type="sha256">db9ece9300fcbb5a2f140aa3f2c6449b02b5f89f60b3601ffdda3f68503a9b4f</sum></package><package arch="x86_64" name="pacemaker" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">dd8d2f1923b8a27193af6d83c42c853fc5b7b4d2dd832aa0b925fed377fb6484</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-libs-devel-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">d71b1fe3f5c62e3c12e5403926fdbbe3fd474f8111da6c347bbea801bdaa50c2</sum></package><package arch="x86_64" name="pacemaker-cli" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-cli-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">b68da423100cbe451d7ca37b9d464b469cf53d9e48e0f14e34d4f1e411c0972e</sum></package><package arch="x86_64" name="pacemaker-libs" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-libs-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">544db6f58e75befd0bf042a47a2b6e3830ee6466bc85e8a4809cbe0d6a8d10c1</sum></package><package arch="x86_64" name="pacemaker-doc" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-doc-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">9ae522d375ba6a96f6878319ce489baed8d37ed0acff88699d219c1d5b124938</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-cluster-libs-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">f04e020a184a50e25d520926de624a6d4ed908f6e82cba54f94b23b5a9b191bc</sum></package><package arch="x86_64" name="pacemaker-remote" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-remote-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">b75482eee75c2462db65f4e07672ac2c3861d0f29ee39fb5935592a497d7209c</sum></package><package arch="i686" name="pacemaker-libs" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-libs-1.1.14-8.el6_8.2.i686.rpm</filename><sum type="sha256">3534bf6774c4036e30df663f051c36fbf3f1136427a529ada0a78b01f3ee7f8b</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-cluster-libs-1.1.14-8.el6_8.2.i686.rpm</filename><sum type="sha256">a147916934130fb129b9c0ce3cb158cd0bddd6505fc81cc8e9b5bb24bdf18d38</sum></package><package arch="x86_64" name="pacemaker-cts" release="8.el6_8.2" src="pacemaker-1.1.14-8.el6_8.2.src.rpm" version="1.1.14"><filename>pacemaker-cts-1.1.14-8.el6_8.2.x86_64.rpm</filename><sum type="sha256">e81fb64c53d95ee184429c78151f77f93813cd7250ba6e08bae4bec13a659ea9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7035" id="CVE-2016-7035" title="Pacemaker: Privilege Escalation Due To Improper Guarding Of Ipc Communication" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2675" id="RHSA-2016:2675-1" title="Rhsa-2016:2675-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369732" id="1369732" title="Pacemaker: Privilege Escalation Due To Improper Guarding Of Ipc Communication" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2702-1</id><title>Policycoreutils</title><description>Security Fix(es): 
* It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox. (CVE-2016-7545)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="policycoreutils-newrole" release="30.1.el6_8" src="policycoreutils-2.0.83-30.1.el6_8.src.rpm" version="2.0.83"><filename>policycoreutils-newrole-2.0.83-30.1.el6_8.x86_64.rpm</filename><sum type="sha256">ea335420218800af0926312ef054d4bca600e4e8e22c18c4c6bc8c4a85549cda</sum></package><package arch="x86_64" name="policycoreutils-python" release="30.1.el6_8" src="policycoreutils-2.0.83-30.1.el6_8.src.rpm" version="2.0.83"><filename>policycoreutils-python-2.0.83-30.1.el6_8.x86_64.rpm</filename><sum type="sha256">09ddd84383c1844602b004eb4a378d685414c068d4f62e06f6c71fb84030e148</sum></package><package arch="x86_64" name="policycoreutils" release="30.1.el6_8" src="policycoreutils-2.0.83-30.1.el6_8.src.rpm" version="2.0.83"><filename>policycoreutils-2.0.83-30.1.el6_8.x86_64.rpm</filename><sum type="sha256">33cc8a9ae02472b4588851aaf202875353de8daac09ba863c8771e689ae5fba3</sum></package><package arch="x86_64" name="policycoreutils-gui" release="30.1.el6_8" src="policycoreutils-2.0.83-30.1.el6_8.src.rpm" version="2.0.83"><filename>policycoreutils-gui-2.0.83-30.1.el6_8.x86_64.rpm</filename><sum type="sha256">910decb28c134be55e964e583e8c495fd2659a9b6d6f95f8c686fee51a1cbcfd</sum></package><package arch="x86_64" name="policycoreutils-sandbox" release="30.1.el6_8" src="policycoreutils-2.0.83-30.1.el6_8.src.rpm" version="2.0.83"><filename>policycoreutils-sandbox-2.0.83-30.1.el6_8.x86_64.rpm</filename><sum type="sha256">04dd35a1da2bd8b87da83058d934374e8c320a6bd627d9596db9c09567e178cd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7545" id="CVE-2016-7545" title="Policycoreutils: Selinux Sandbox Escape Via Tiocsti Ioctl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2702" id="RHSA-2016:2702-1" title="Rhsa-2016:2702-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378577" id="1378577" title="Policycoreutils: Selinux Sandbox Escape Via Tiocsti Ioctl" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2765-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* It was found that 389 Directory Server was vulnerable to a flaw in which the default ACI (Access Control Instructions) could be read by an anonymous user. This could lead to leakage of sensitive information. (CVE-2016-5416) 
* An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not. (CVE-2016-4992) 
* It was found that 389 Directory Server was vulnerable to a remote password disclosure via timing attack. A remote attacker could possibly use this flaw to retrieve directory server password after many tries. (CVE-2016-5405) 
Bug Fix(es): 
* Previously, a bug in the changelog iterator buffer caused it to point to an incorrect position when reloading the buffer. This caused replication to skip parts of the changelog, and consequently some changes were not replicated. This bug has been fixed, and replication data loss due to an incorrectly reloaded changelog buffer no longer occurs. 
* Previously, if internal modifications were generated on a consumer (for example by the Account Policy plug-in) and additional changes to the same attributes were received from replication, a bug caused Directory Server to accumulate state information on the consumer. The bug has been fixed by making sure that replace operations are only applied if they are newer than existing attribute deletion change sequence numbers (CSNs), and state information no longer accumulates in this situation. 
Enhancement(s): 
* In a multi-master replication environment where multiple masters receive updates at the same time, it was previously possible for a single master to obtain exclusive access to a replica and hold it for a very long time due to problems such as a slow network connection. During this time, other masters were blocked from accessing the same replica, which considerably slowed down the replication process. This update adds a new configuration attribute, "nsds5ReplicaReleaseTimeout", which can be used to specify a timeout in seconds. After the specified timeout period passes, the master releases the replica, allowing other masters to access it and send their updates.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="389-ds-base-libs" release="84.el6_8" src="389-ds-base-1.2.11.15-84.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-84.el6_8.i686.rpm</filename><sum type="sha256">d1bfb6fb92159b23a1c78501fe09b9c7d0de119252a07abf94adcbf1e9ef993c</sum></package><package arch="i686" name="389-ds-base-devel" release="84.el6_8" src="389-ds-base-1.2.11.15-84.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-84.el6_8.i686.rpm</filename><sum type="sha256">999bc7238fdfe1a537b5cd7b5cf2bd8dbc315086c3a910e222b8899ab49d86c5</sum></package><package arch="x86_64" name="389-ds-base-libs" release="84.el6_8" src="389-ds-base-1.2.11.15-84.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-84.el6_8.x86_64.rpm</filename><sum type="sha256">d18788826e46074978642023458cf376450c440f648d9b1f9d5317e60055288e</sum></package><package arch="x86_64" name="389-ds-base-devel" release="84.el6_8" src="389-ds-base-1.2.11.15-84.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-84.el6_8.x86_64.rpm</filename><sum type="sha256">a7d3a43ecddf83ec874ed0004252f1e8db5a5b2697daa9ab4c6fe97558895a9e</sum></package><package arch="x86_64" name="389-ds-base" release="84.el6_8" src="389-ds-base-1.2.11.15-84.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-84.el6_8.x86_64.rpm</filename><sum type="sha256">6809326082c9f59db3ad6853e4b05395ad7a6f0def55a88e64276a7ba0eb3c4c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4992" id="CVE-2016-4992" title="389-Ds-Base: Information Disclosure Via Repeated Use Of Ldap Add Operation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5405" id="CVE-2016-5405" title="389-Ds-Base: Password Verification Vulnerable To Timing Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5416" id="CVE-2016-5416" title="389-Ds-Base: Aci Readable By Anonymous User" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2765" id="RHSA-2016:2765-1" title="Rhsa-2016:2765-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347760" id="1347760" title="389-Ds-Base: Information Disclosure Via Repeated Use Of Ldap Add Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349540" id="1349540" title="389-Ds-Base: Aci Readable By Anonymous User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354331" id="1354331" title="Replication Changelog Can Incorrectly Skip Over Updates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358865" id="1358865" title="389-Ds-Base: Password Verification Vulnerable To Timing Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1376676" id="1376676" title="Backport Aes Storage Scheme Plugin." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1381153" id="1381153" title="Crash In Import_Wait_For_Space_In_Fifo()." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2766-1</id><title>Kernel</title><description>Security Fix(es): 
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important) 
* It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process. (CVE-2016-2143, Moderate) 
Bug Fix(es): 
* Use of a multi-threaded workload with high memory mappings sometiems caused a kernel panic, due to a race condition between the context switch and the pagetable upgrade. This update fixes the switch_mm() by using the complete asce parameter instead of the asce_bits parameter. As a result, the kernel no longer panics in the described scenario. 
* When iptables created the Transmission Control Protocol (TCP) reset packet, a kernel crash could occur due to uninitialized pointer to the TCP header within the Socket Buffer (SKB). This update fixes the transport header pointer in TCP reset for both IPv4 and IPv6, and the kernel no longer crashes in the described situation. 
* Previously, when the Enhanced Error Handling (EEH) mechanism did not block the PCI configuration space access and an error was detected, a kernel panic occurred. This update fixes EEH to fix this problem. As a result, the kernel no longer panics in the described scenario. 
* When the lockd service failed to start up completely, the notifier blocks were in some cases registered on a notification chain multiple times, which caused the occurrence of a circular list on the notification chain. Consequently, a soft lock-up or a kernel oops occurred. With this update, the notifier blocks are unregistered if lockd fails to start up completely, and the soft lock-ups or the kernel oopses no longer occur under the described circumstances. 
* When the Fibre Channel over Ethernet (FCoE) was configured, the FCoE MaxFrameSize parameter was incorrectly restricted to 1452. With this update, the NETIF_F_ALL_FCOE symbol is no longer ignored, which fixes this bug. MaxFrameSize is now restricted to 2112, which is the correct value. 
* When the fnic driver was installed on Cisco UCS Blade Server, the discs were under certain circumstances put into the offline state with the following error message: "Medium access timeout failure. Offlining disk!". This update fixes fnic to set the Small Computer System Interface (SCSI) status as DID_ABORT after a successful abort operation. As a result, the discs are no longer put into the offlined state in the described situation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.11.1.el6.noarch.rpm</filename><sum type="sha256">0adbeecb285985374e30fdbf84cc4342c144074d1ea2896e63893936606fc453</sum></package><package arch="x86_64" name="kernel" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">ae8bd63ab7c8696c6144010ffae666a7379f026452964723674fdbddc92a0fbd</sum></package><package arch="i686" name="kernel-debug-devel" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.11.1.el6.i686.rpm</filename><sum type="sha256">4bd2050751ec90f557a44a4f3bfe6cac045d71a9eb1ab3ab002974daf5f71e02</sum></package><package arch="x86_64" name="perf" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">44075de55fe9a0f02436bf3897f6445703e0e06e5bd52a5015ba0741c3ad014b</sum></package><package arch="noarch" name="kernel-doc" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.11.1.el6.noarch.rpm</filename><sum type="sha256">89fd2720630b715c741f382a1cad5d2c70624964a5b3788d128f5d707ff1a828</sum></package><package arch="x86_64" name="kernel-debug" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">17f83b6751ae72a399cf7e2d775656d0ced38c92bb49a49de0f3ac68e42bb825</sum></package><package arch="noarch" name="kernel-firmware" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.11.1.el6.noarch.rpm</filename><sum type="sha256">0f020bdf0a662a63f2f51a5a237dd15898902d682c9f8041c96f4bc19bf2f73d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">141e3490cc1180db467d5fb16cb1df1089a7274b9f0c64a5f4ccd8b5a08fb44a</sum></package><package arch="x86_64" name="kernel-devel" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">3e30f11fdb0adaa62ad3f26ca137d2b418e10a06d765a31dd2ddef3ca8254108</sum></package><package arch="x86_64" name="python-perf" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">2ae5ba77bc16ef3793f8b7dbda4d25fe03a464ac691bf5ad92ea239297507b19</sum></package><package arch="x86_64" name="kernel-headers" release="642.11.1.el6" src="kernel-2.6.32-642.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.11.1.el6.x86_64.rpm</filename><sum type="sha256">22fbf279b0774f7525fc81714e07ec932801ae587da1d8da642f761deb4625b9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" id="CVE-2016-1583" title="Kernel: Stack Overflow Via Ecryptfs And /Proc/$Pid/Environ" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143" id="CVE-2016-2143" title="Kernel: Fork Of Large Process Causes Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2766" id="RHSA-2016:2766-1" title="Rhsa-2016:2766-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308908" id="1308908" title="Kernel: Fork Of Large Process Causes Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344721" id="1344721" title="Kernel: Stack Overflow Via Ecryptfs And /Proc/$Pid/Environ" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2779-1</id><title>Nss And Nss-Util</title><description>The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. 
The following packages have been upgraded to a newer upstream version: nss (3.12.3), nss-util (3.12.3). 
Security Fix(es): 
* Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) 
* A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) 
* It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-sysinit" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-sysinit-3.21.3-2.el6_8.x86_64.rpm</filename><sum type="sha256">3d77957eec19eebdf578e57184f5614f7bdb6952b9821f6f8a669f9a2f0c4103</sum></package><package arch="i686" name="nss-util" release="1.el6_8" src="nss-util-3.21.3-1.el6_8.src.rpm" version="3.21.3"><filename>nss-util-3.21.3-1.el6_8.i686.rpm</filename><sum type="sha256">33141bcfa11b5652bd974126dc816958c77b3c0729b089fd58d97e85fb0bfdd8</sum></package><package arch="i686" name="nss" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-3.21.3-2.el6_8.i686.rpm</filename><sum type="sha256">d26027f7e0f9dd771640120c2ffce75692f3aebe65256e7a9f4d6d59613fd2f9</sum></package><package arch="x86_64" name="nss-devel" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-devel-3.21.3-2.el6_8.x86_64.rpm</filename><sum type="sha256">ef75c3327ca2c3657c3d7e567fd5b6a30330dc8f6dcde3186a98d38d4d9ae1b4</sum></package><package arch="x86_64" name="nss-tools" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-tools-3.21.3-2.el6_8.x86_64.rpm</filename><sum type="sha256">e528f376c74c4b7b62a04ab26a1686a30f439a96f4fdd0a9a03e1e39756f0780</sum></package><package arch="x86_64" name="nss-util" release="1.el6_8" src="nss-util-3.21.3-1.el6_8.src.rpm" version="3.21.3"><filename>nss-util-3.21.3-1.el6_8.x86_64.rpm</filename><sum type="sha256">4b912fab02e0c883d22acdff4a6a67349469f19483d320e61efab93fa7efb31d</sum></package><package arch="i686" name="nss-devel" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-devel-3.21.3-2.el6_8.i686.rpm</filename><sum type="sha256">aaf32f62f91d2d057a56b2d373b1863a6679bc5a2d4d13a8451ab08316d123af</sum></package><package arch="i686" name="nss-pkcs11-devel" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-pkcs11-devel-3.21.3-2.el6_8.i686.rpm</filename><sum type="sha256">98904ced1e2ea2fe4ad60d28b6f2b190ea0dea0f0a553ca53f6522a9a646c814</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_8" src="nss-util-3.21.3-1.el6_8.src.rpm" version="3.21.3"><filename>nss-util-devel-3.21.3-1.el6_8.x86_64.rpm</filename><sum type="sha256">a0b4fef4b479f761d4e7796f011a0d80ff2ff228859863fd82d3056d7c69fc8a</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_8" src="nss-util-3.21.3-1.el6_8.src.rpm" version="3.21.3"><filename>nss-util-devel-3.21.3-1.el6_8.i686.rpm</filename><sum type="sha256">07fc5f0159fbaef3550eceb3e720611e2d117bcf6a00b1ed84b65f83b9c22b57</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-pkcs11-devel-3.21.3-2.el6_8.x86_64.rpm</filename><sum type="sha256">d100aec92454b3c5a782c5bc6095366b90eb1976932d12c8f573a449384cad0e</sum></package><package arch="x86_64" name="nss" release="2.el6_8" src="nss-3.21.3-2.el6_8.src.rpm" version="3.21.3"><filename>nss-3.21.3-2.el6_8.x86_64.rpm</filename><sum type="sha256">36e041fa4c4d964697e4cdec0dbc4a9d052bd3ef8ab5c79532a949af13bf0a96</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" id="CVE-2016-2834" title="Nss: Multiple Security Flaws (Mfsa 2016-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" id="CVE-2016-5285" title="Nss: Missing Null Check In Pk11_Signwithsymkey / Ssl3_Computerecordmacconstanttime Causes Server Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" id="CVE-2016-8635" title="Nss: Small-Subgroups Attack Flaw" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2779" id="RHSA-2016:2779-1" title="Rhsa-2016:2779-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347908" id="1347908" title="Nss: Multiple Security Flaws (Mfsa 2016-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383883" id="1383883" title="Nss: Missing Null Check In Pk11_Signwithsymkey / Ssl3_Computerecordmacconstanttime Causes Server Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391818" id="1391818" title="Nss: Small-Subgroups Attack Flaw" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2780-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.5.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5296, CVE-2016-5297, CVE-2016-9066, CVE-2016-5291, CVE-2016-5290) 
* A flaw was found in the way Add-on update process was handled by Firefox. A Man-in-the-Middle attacker could use this flaw to install a malicious signed add-on update. (CVE-2016-9064)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.5.0-1.el6_8.src.rpm" version="45.5.0"><filename>firefox-45.5.0-1.el6_8.i686.rpm</filename><sum type="sha256">930a35ffaaaa27fafb95dce4e7e45cf1991fd6dbaaf20e544a7ca825b28b23bc</sum></package><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.5.0-1.el6_8.src.rpm" version="45.5.0"><filename>firefox-45.5.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">a39181a9e9bf8257be2701330cce84c3bcd2773d0e946ea46f0d89e4491e7eb9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" id="CVE-2016-5290" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" id="CVE-2016-5291" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" id="CVE-2016-5296" title="Mozilla: Heap-Buffer-Overflow Write In Rasterize_Edges_1 (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" id="CVE-2016-5297" title="Mozilla: Incorrect Argument Length Checking In Javascript (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" id="CVE-2016-9064" title="Mozilla: Addons Update Must Verify Ids Match Between Current And New Versions (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" id="CVE-2016-9066" title="Mozilla: Integer Overflow Leading To A Buffer Overflow In Nsscriptloadhandler (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2780" id="RHSA-2016:2780-1" title="Rhsa-2016:2780-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395055" id="1395055" title="Mozilla: Heap-Buffer-Overflow Write In Rasterize_Edges_1 (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395058" id="1395058" title="Mozilla: Incorrect Argument Length Checking In Javascript (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395060" id="1395060" title="Mozilla: Addons Update Must Verify Ids Match Between Current And New Versions (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395061" id="1395061" title="Mozilla: Integer Overflow Leading To A Buffer Overflow In Nsscriptloadhandler (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395065" id="1395065" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395066" id="1395066" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2820-1</id><title>Memcached</title><description>Security Fix(es): 
* Two integer overflow flaws, leading to heap-based buffer overflows, were found in the memcached binary protocol. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8704, CVE-2016-8705)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="memcached" release="3.el6_8.1" src="memcached-1.4.4-3.el6_8.1.src.rpm" version="1.4.4"><filename>memcached-1.4.4-3.el6_8.1.x86_64.rpm</filename><sum type="sha256">356138162f1711408c897efb232b4291bdd708459a30b993efc0e7bd8f5f107f</sum></package><package arch="x86_64" name="memcached-devel" release="3.el6_8.1" src="memcached-1.4.4-3.el6_8.1.src.rpm" version="1.4.4"><filename>memcached-devel-1.4.4-3.el6_8.1.x86_64.rpm</filename><sum type="sha256">fc0deb1c382171f3615a630c9ca30d9dac30144c575a5ec8095871defefb1682</sum></package><package arch="i686" name="memcached-devel" release="3.el6_8.1" src="memcached-1.4.4-3.el6_8.1.src.rpm" version="1.4.4"><filename>memcached-devel-1.4.4-3.el6_8.1.i686.rpm</filename><sum type="sha256">7fac4bb44e8640626fc40daae583b353d4dd159b4a74174cd62345accb3e8c5e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704" id="CVE-2016-8704" title="Memcached: Server Append/Prepend Remote Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705" id="CVE-2016-8705" title="Memcached: Server Update Remote Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2820" id="RHSA-2016:2820-1" title="Rhsa-2016:2820-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390510" id="1390510" title="Memcached: Server Append/Prepend Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390511" id="1390511" title="Memcached: Server Update Remote Code Execution" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2824-1</id><title>Expat</title><description>Security Fix(es): 
* An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="expat" release="13.el6_8" src="expat-2.0.1-13.el6_8.src.rpm" version="2.0.1"><filename>expat-2.0.1-13.el6_8.i686.rpm</filename><sum type="sha256">3615b8cb6c8d315466be6f524ff5308b3b20b9ab3475f16087bed07ac7aa139b</sum></package><package arch="x86_64" name="expat-devel" release="13.el6_8" src="expat-2.0.1-13.el6_8.src.rpm" version="2.0.1"><filename>expat-devel-2.0.1-13.el6_8.x86_64.rpm</filename><sum type="sha256">4d6eb1ab044c20313c79b57f05ef9045f9960d1f68cc8755aef6bf1c66659dd5</sum></package><package arch="x86_64" name="expat" release="13.el6_8" src="expat-2.0.1-13.el6_8.src.rpm" version="2.0.1"><filename>expat-2.0.1-13.el6_8.x86_64.rpm</filename><sum type="sha256">7771af7bccf7c70582eeb1407a2af4cb12018e71e9744efefa06d802b734657c</sum></package><package arch="i686" name="expat-devel" release="13.el6_8" src="expat-2.0.1-13.el6_8.src.rpm" version="2.0.1"><filename>expat-devel-2.0.1-13.el6_8.i686.rpm</filename><sum type="sha256">a6cb13a30fe68020f09d00adc104892c1f5aa1a76a07af92aaf556dccc230aab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" id="CVE-2016-0718" title="Expat: Out-Of-Bounds Heap Read On Crafted Input Causing Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2824" id="RHSA-2016:2824-1" title="Rhsa-2016:2824-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296102" id="1296102" title="Expat: Out-Of-Bounds Heap Read On Crafted Input Causing Crash" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2825-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.5.0 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5290)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.5.0-1.el6_8.src.rpm" version="45.5.0"><filename>thunderbird-45.5.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">10c277e19e08be5a73e8fcf1e9e181e10101d2e8bec0fe0070948a1bb1f99c68</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" id="CVE-2016-5290" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2825" id="RHSA-2016:2825-1" title="Rhsa-2016:2825-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395066" id="1395066" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2843-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.5.1 ESR. 
Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9079)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.5.1-1.el6_8.src.rpm" version="45.5.1"><filename>firefox-45.5.1-1.el6_8.x86_64.rpm</filename><sum type="sha256">729700cb23ae532639a93333d2ff9ac751fe3c1f690260eacf686fae56c9bbe8</sum></package><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.5.1-1.el6_8.src.rpm" version="45.5.1"><filename>firefox-45.5.1-1.el6_8.i686.rpm</filename><sum type="sha256">f03e0653b482f295c95cd751b4a9d85e82e1309ee4125daf3b537ba3f514efc6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" id="CVE-2016-9079" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2843" id="RHSA-2016:2843-1" title="Rhsa-2016:2843-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400376" id="1400376" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2850-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.5.1. 
Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9079)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.5.1-1.el6_8.src.rpm" version="45.5.1"><filename>thunderbird-45.5.1-1.el6_8.x86_64.rpm</filename><sum type="sha256">2945b5dda342455deb292fd4f361d03dabc04f12042623fd1afe4f91757d141a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" id="CVE-2016-9079" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2850" id="RHSA-2016:2850-1" title="Rhsa-2016:2850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400376" id="1400376" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2872-1</id><title>Sudo</title><description>Security Fix(es): 
* It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system(), popen(), or wordexp() C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use these flaws to execute arbitrary commands with elevated privileges. (CVE-2016-7032, CVE-2016-7076) 
These issues were discovered by Florian Weimer (Red Hat).</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sudo-devel" release="25.el6_8" src="sudo-1.8.6p3-25.el6_8.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-25.el6_8.x86_64.rpm</filename><sum type="sha256">1cc99173f573e9fa8308741af59c054c495a3fa65352b413a669d6aebf853d35</sum></package><package arch="x86_64" name="sudo" release="25.el6_8" src="sudo-1.8.6p3-25.el6_8.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-25.el6_8.x86_64.rpm</filename><sum type="sha256">77166a1bb59692573a518f221633dac41e60180a0da4378ea0f2d0019ab91b5b</sum></package><package arch="i686" name="sudo-devel" release="25.el6_8" src="sudo-1.8.6p3-25.el6_8.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-25.el6_8.i686.rpm</filename><sum type="sha256">ae50a8f2eca5f15dfc46c08a656d8fc35e28d83e19170844bd05bcf9c86eb35b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" id="CVE-2016-7032" title="Sudo: Noexec Bypass Via System() And Popen()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" id="CVE-2016-7076" title="Sudo: Noexec Bypass Via Wordexp()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2872" id="RHSA-2016:2872-1" title="Rhsa-2016:2872-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372830" id="1372830" title="Sudo: Noexec Bypass Via System() And Popen()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384982" id="1384982" title="Sudo: Noexec Bypass Via Wordexp()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2946-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.6.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9897, CVE-2016-9898, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9904, CVE-2016-9905)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.6.0-1.el6_8.src.rpm" version="45.6.0"><filename>firefox-45.6.0-1.el6_8.i686.rpm</filename><sum type="sha256">d64b021574d5adef0dea64203737609c4fab8d120e67e33ec17c4c880f41258f</sum></package><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.6.0-1.el6_8.src.rpm" version="45.6.0"><filename>firefox-45.6.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">137d7ec8cbc16a80ec07f4ee3f31bbb5ec78eee4e6c09f264d361531653832cc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" id="CVE-2016-9893" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" id="CVE-2016-9895" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" id="CVE-2016-9897" title="Mozilla: Memory Corruption In Libgles (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" id="CVE-2016-9898" title="Mozilla: Use-After-Free In Editor While Manipulating Dom Subtrees (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" id="CVE-2016-9899" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" id="CVE-2016-9900" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" id="CVE-2016-9901" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" id="CVE-2016-9902" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" id="CVE-2016-9904" title="Mozilla: Cross-Origin Information Leak In Shared Atoms (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" id="CVE-2016-9905" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2946" id="RHSA-2016:2946-1" title="Rhsa-2016:2946-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404083" id="1404083" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404086" id="1404086" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404087" id="1404087" title="Mozilla: Memory Corruption In Libgles (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404089" id="1404089" title="Mozilla: Use-After-Free In Editor While Manipulating Dom Subtrees (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404090" id="1404090" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404091" id="1404091" title="Mozilla: Cross-Origin Information Leak In Shared Atoms (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404094" id="1404094" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404096" id="1404096" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404358" id="1404358" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404359" id="1404359" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2972-1</id><title>Vim</title><description>Security Fix(es): 
* A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim. (CVE-2016-1248)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="vim-enhanced" release="5.el6_8.1" src="vim-7.4.629-5.el6_8.1.src.rpm" version="7.4.629"><filename>vim-enhanced-7.4.629-5.el6_8.1.x86_64.rpm</filename><sum type="sha256">3c3527462404f8c2820c5c99d961286f1cf21a1987797a706278c00b07a025b6</sum></package><package arch="x86_64" epoch="2" name="vim-filesystem" release="5.el6_8.1" src="vim-7.4.629-5.el6_8.1.src.rpm" version="7.4.629"><filename>vim-filesystem-7.4.629-5.el6_8.1.x86_64.rpm</filename><sum type="sha256">ae0593172179c3f7940d763cf8bd2b96e6cdd06bdba6e1c71f5ccb73e7205a24</sum></package><package arch="x86_64" epoch="2" name="vim-X11" release="5.el6_8.1" src="vim-7.4.629-5.el6_8.1.src.rpm" version="7.4.629"><filename>vim-X11-7.4.629-5.el6_8.1.x86_64.rpm</filename><sum type="sha256">13feb709de8e9592ee9516b6b506e7ef834140f0aa0a24baf5cebf56f3f19d1a</sum></package><package arch="x86_64" epoch="2" name="vim-common" release="5.el6_8.1" src="vim-7.4.629-5.el6_8.1.src.rpm" version="7.4.629"><filename>vim-common-7.4.629-5.el6_8.1.x86_64.rpm</filename><sum type="sha256">f9583f9f958b089da972fc428eec078feb1e98684166901cf5e062922abf51a6</sum></package><package arch="x86_64" epoch="2" name="vim-minimal" release="5.el6_8.1" src="vim-7.4.629-5.el6_8.1.src.rpm" version="7.4.629"><filename>vim-minimal-7.4.629-5.el6_8.1.x86_64.rpm</filename><sum type="sha256">0d9364987391735749523aeb0232be02e510759facb5a61a3fd23ad8191c511f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" id="CVE-2016-1248" title="Vim: Lack Of Validation Of Values For Few Options Results In Code Exection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2972" id="RHSA-2016:2972-1" title="Rhsa-2016:2972-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398227" id="1398227" title="Vim: Lack Of Validation Of Values For Few Options Results In Code Exection" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2973-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.6.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9905)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.6.0-1.el6_8.src.rpm" version="45.6.0"><filename>thunderbird-45.6.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">88d76725098f763649937dd531faecbd85a5111a591bec703401295eadb53082</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" id="CVE-2016-9893" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" id="CVE-2016-9895" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" id="CVE-2016-9899" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" id="CVE-2016-9900" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" id="CVE-2016-9901" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" id="CVE-2016-9902" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" id="CVE-2016-9905" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2973" id="RHSA-2016:2973-1" title="Rhsa-2016:2973-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404083" id="1404083" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404086" id="1404086" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404090" id="1404090" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404094" id="1404094" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404096" id="1404096" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404358" id="1404358" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404359" id="1404359" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2974-1</id><title>Gstreamer-Plugins-Bad-Free</title><description>Security Fix(es): 
* An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9445) 
* A memory corruption flaw was found in GStreamer's Nintendo NSF music file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9447) 
Note: This updates removes the vulnerable Nintendo NSF plug-in.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="gstreamer-plugins-bad-free-devel-docs" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-devel-docs-0.10.19-5.el6_8.x86_64.rpm</filename><sum type="sha256">eddfe978ff7a0e97622e726151bffbd462520136f63d30f824274feba0c8f94f</sum></package><package arch="i686" name="gstreamer-plugins-bad-free" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-0.10.19-5.el6_8.i686.rpm</filename><sum type="sha256">fc2bf51e98dee113c79514423f4406cad455ce94ced094b0f3669809a5773ec2</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-extras" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-extras-0.10.19-5.el6_8.i686.rpm</filename><sum type="sha256">b65cb71d3aa7b9651be42750d675f2b7d80075ae4891b0976277c023a8a324e0</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-extras" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-extras-0.10.19-5.el6_8.x86_64.rpm</filename><sum type="sha256">fc570601b179478a33a2418809b5e11910e42f683beb7b5e8b7760665174521d</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-0.10.19-5.el6_8.x86_64.rpm</filename><sum type="sha256">9e77f3aa2f77eb717796d41a91c824304eb40a848318d25a7d26662f93553e63</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-devel-0.10.19-5.el6_8.x86_64.rpm</filename><sum type="sha256">3e3973cfd1b06a86a2588a1474783969f1b0ce5031263663773791da0b92ad1a</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-devel" release="5.el6_8" src="gstreamer-plugins-bad-free-0.10.19-5.el6_8.src.rpm" version="0.10.19"><filename>gstreamer-plugins-bad-free-devel-0.10.19-5.el6_8.i686.rpm</filename><sum type="sha256">c0033ff162bee6c56ab075d94081b70d8b0bbab385400b1258758b0ca618fd86</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" id="CVE-2016-9445" title="Gstreamer-Plugins-Bad-Free: Integer Overflow When Allocating Render Buffer In Vmnc Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9447" id="CVE-2016-9447" title="Gstreamer-Plugins-Bad-Free: Memory Corruption Flaw In Nsf Decoder" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2974" id="RHSA-2016:2974-1" title="Rhsa-2016:2974-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395126" id="1395126" title="Gstreamer-Plugins-Bad-Free: Memory Corruption Flaw In Nsf Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395767" id="1395767" title="Gstreamer-Plugins-Bad-Free: Integer Overflow When Allocating Render Buffer In Vmnc Decoder" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2975-1</id><title>Gstreamer-Plugins-Good</title><description>Security Fix(es): 
* Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9808) 
* An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9807) 
Note: This updates removes the vulnerable FLC/FLI/FLX plug-in.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gstreamer-plugins-good" release="4.el6_8" src="gstreamer-plugins-good-0.10.23-4.el6_8.src.rpm" version="0.10.23"><filename>gstreamer-plugins-good-0.10.23-4.el6_8.i686.rpm</filename><sum type="sha256">8bc4dedf738fc2398e740a11d420863167b67e436f616ae7eeb79047b94bf19d</sum></package><package arch="i686" name="gstreamer-plugins-good-devel" release="4.el6_8" src="gstreamer-plugins-good-0.10.23-4.el6_8.src.rpm" version="0.10.23"><filename>gstreamer-plugins-good-devel-0.10.23-4.el6_8.i686.rpm</filename><sum type="sha256">33844c31d90cfcf245f0abf778b9d84ba7a5fc666075c46cf0903eab0280dbcf</sum></package><package arch="x86_64" name="gstreamer-plugins-good-devel" release="4.el6_8" src="gstreamer-plugins-good-0.10.23-4.el6_8.src.rpm" version="0.10.23"><filename>gstreamer-plugins-good-devel-0.10.23-4.el6_8.x86_64.rpm</filename><sum type="sha256">d2c0236965af4fc4cdfbfa0359971c05c47d12b253a9680a490bc5a2766b30dd</sum></package><package arch="x86_64" name="gstreamer-plugins-good" release="4.el6_8" src="gstreamer-plugins-good-0.10.23-4.el6_8.src.rpm" version="0.10.23"><filename>gstreamer-plugins-good-0.10.23-4.el6_8.x86_64.rpm</filename><sum type="sha256">3490f647a4514e2a238301174e7a6d6e01d2ee88a0d72b12a4910296483b1c6b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" id="CVE-2016-9634" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" id="CVE-2016-9635" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" id="CVE-2016-9636" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" id="CVE-2016-9807" title="Gstreamer-Plugins-Good: Invalid Memory Read In Flx_Decode_Chunks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" id="CVE-2016-9808" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2975" id="RHSA-2016:2975-1" title="Rhsa-2016:2975-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397441" id="1397441" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401874" id="1401874" title="Gstreamer-Plugins-Good: Invalid Memory Read In Flx_Decode_Chunks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0014-1</id><title>Ghostscript</title><description>Security Fix(es): 
* It was found that the ghostscript functions getenv, filenameforall and .libfile did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could read environment variable, list directory and retrieve file content respectively, from the target. (CVE-2013-5653, CVE-2016-7977) 
* It was found that the ghostscript function .initialize_dsc_parser did not validate its parameter before using it, allowing a type confusion flaw. A specially crafted postscript document could cause a crash code execution in the context of the gs process. (CVE-2016-7979) 
* It was found that ghostscript did not sufficiently check the validity of parameters given to the .sethalftone5 function. A specially crafted postscript document could cause a crash, or execute arbitrary code in the context of the gs process. (CVE-2016-8602)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-01-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ghostscript-gtk" release="21.el6_8.1" src="ghostscript-8.70-21.el6_8.1.src.rpm" version="8.70"><filename>ghostscript-gtk-8.70-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">0a8972ff84814ec2fea93247bf3e57489c6d46007bddb66bc897988b33a49819</sum></package><package arch="x86_64" name="ghostscript-doc" release="21.el6_8.1" src="ghostscript-8.70-21.el6_8.1.src.rpm" version="8.70"><filename>ghostscript-doc-8.70-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">4515c15bf4c92dcd4ca8771a1e58f905b899845733d02c09cc26001f2536db16</sum></package><package arch="i686" name="ghostscript" release="21.el6_8.1" src="ghostscript-8.70-21.el6_8.1.src.rpm" version="8.70"><filename>ghostscript-8.70-21.el6_8.1.i686.rpm</filename><sum type="sha256">ba7ab42de9bd6463b1cb8ff35d0211533ce9c0618b2699cce0b4b5d0544ac452</sum></package><package arch="i686" name="ghostscript-devel" release="21.el6_8.1" src="ghostscript-8.70-21.el6_8.1.src.rpm" version="8.70"><filename>ghostscript-devel-8.70-21.el6_8.1.i686.rpm</filename><sum type="sha256">a579cf7eb48b385dd1a0452b986086958d69c0c46973c1e41b02d8963c25d34b</sum></package><package arch="x86_64" name="ghostscript-devel" release="21.el6_8.1" src="ghostscript-8.70-21.el6_8.1.src.rpm" version="8.70"><filename>ghostscript-devel-8.70-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">f8ea47fb82a66c7f4026b35c57205cb7bfe87bab6a6930de7073643e552c1d2c</sum></package><package arch="x86_64" name="ghostscript" release="21.el6_8.1" src="ghostscript-8.70-21.el6_8.1.src.rpm" version="8.70"><filename>ghostscript-8.70-21.el6_8.1.x86_64.rpm</filename><sum type="sha256">2abbfc8cdb83f46e9556520dabe035fca07bcca84f17f093e971b5abe805df95</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" id="CVE-2013-5653" title="Ghostscript: Getenv And Filenameforall Ignore -Dsafer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977" id="CVE-2016-7977" title="Ghostscript: .Libfile Does Not Honor -Dsafer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" id="CVE-2016-7979" title="Ghostscript: Type Confusion In .Initialize_Dsc_Parser Allows Remote Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" id="CVE-2016-8602" title="Ghostscript: Check For Sufficient Params In .Sethalftone5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0014" id="RHSA-2017:0014-1" title="Rhsa-2017:0014-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380327" id="1380327" title="Ghostscript: Getenv And Filenameforall Ignore -Dsafer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380415" id="1380415" title="Ghostscript: .Libfile Does Not Honor -Dsafer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382305" id="1382305" title="Ghostscript: Type Confusion In .Initialize_Dsc_Parser Allows Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383940" id="1383940" title="Ghostscript: Check For Sufficient Params In .Sethalftone5" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0036-1</id><title>Kernel</title><description>Security Fix(es): 
* A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) 
* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate) 
* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate) 
Bug Fix(es): 
* When parallel NFS returned a file layout, a kernel crash sometimes occurred. This update removes the call to the BUG_ON() function from a code path of a client that returns the file layout. As a result, the kernel no longer crashes in the described situation. 
* When a guest virtual machine (VM) on Microsoft Hyper-V was set to crash on a Nonmaskable Interrupt (NMI) that was injected from the host, this VM became unresponsive and did not create the vmcore dump file. This update applies a set of patches to the Virtual Machine Bus kernel driver (hv_vmbus) that fix this bug. As a result, the VM now first creates and saves the vmcore dump file and then reboots. 
* From Scientific Linux 6.6 to 6.8, the IPv6 routing cache occasionally showed incorrect values. This update fixes the DST_NOCOUNT mechanism, and the IPv6 routing cache now shows correct values. 
* When using the ixgbe driver and the software Fibre Channel over Ethernet (FCoE) stack, suboptimal performance in some cases occurred on systems with a large number of CPUs. This update fixes the fc_exch_alloc() function to try all the available exchange managers in the list for an available exchange ID. This change avoids failing allocations, which previously led to the host busy status. 
* When the vmwgfx kernel module loads, it overrides the boot resolution automatically. Consequently, users were not able to change the resolution by manual setting of the kernel's 'vga=' parameter in the /boot/grub/grub.conf file. This update adds the 'nomodeset' parameter, which can be set in the /boot/grub/grub.conf file. The 'nomodeset' parameter allows the users to prevent the vmwgfx driver from loading. As a result, the setting of the 'vga=' parameter works as expected, in case that vmwgfx does not load. 
* When Scientific Linux 6.8 was booted on SMBIOS 3.0 based systems, Desktop Management Interface (DMI) information, which is referenced by several applications, such as NEC server's memory RAS utility, was missing entries in the sysfs virtual file system. This update fixes the underlying source code, and sysfs now shows the DMI information as expected. 
* Previously, bonding mode active backup and the propagation of the media access control (MAC) address to a VLAN interface did not work in Scientific Linux 6.8, when the fail_over_mac bonding parameter was set to fail_over_mac=active. With this update, the underlying source code has been fixed so that the VLANs continue inheriting the MAC address of the active physical interface until the VLAN MAC address is explicitly set to any value. As a result, IPv6 EUI64 addresses for the VLAN can reflect any changes to the MAC address of the physical interface, and Duplicate Address Detection (DAD) behaves as expected.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.13.1.el6.noarch.rpm</filename><sum type="sha256">c171521ea01dd684e221c09c9805e1e5c82b3e6b9bc3e66bdbba918c42c9c19b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">5b89813f1f14bfc19d55e56f12189b8a81c9c48a6b788d46d7f1416ca3c36264</sum></package><package arch="x86_64" name="kernel-devel" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">d899131ffd822a98585dc96291cafcf338314438217c3846b425454c08ec98fa</sum></package><package arch="i686" name="kernel-debug-devel" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.13.1.el6.i686.rpm</filename><sum type="sha256">8b69f6c581df75030f040af001898b16380e127590214a8b6c55e18302e3e1f3</sum></package><package arch="x86_64" name="kernel" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">b975f3990139b0dae17b448a498c2644c1bdbd1389556d53587d02648bf59f18</sum></package><package arch="x86_64" name="kernel-debug" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">1a545f924ffaa3fd2163a32c606a174c202bcc152530e3de6d83d0ae8ef7eab2</sum></package><package arch="noarch" name="kernel-doc" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.13.1.el6.noarch.rpm</filename><sum type="sha256">9eec6c2154ee118fcd279dedd57c085b93496b2d11f1f213817579045a4a937a</sum></package><package arch="x86_64" name="kernel-headers" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">0b472bcbff513b4f84659cca8ffc456f27a50fb1a5d4c95289ab8c39477ae356</sum></package><package arch="x86_64" name="perf" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">0a3f8acb5ebe2529fdb8677abc450974f6fd558a136efdba27da9696e24864ce</sum></package><package arch="noarch" name="kernel-firmware" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.13.1.el6.noarch.rpm</filename><sum type="sha256">bf1ee812e5e093dfbc8426baa67d9a6451ebb7a8466076a74fd3b87cb185a6a4</sum></package><package arch="x86_64" name="python-perf" release="642.13.1.el6" src="kernel-2.6.32-642.13.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.13.1.el6.x86_64.rpm</filename><sum type="sha256">8e9b20beb95a9ba5a022a24f8efa0a43148092513d443772821665ee2fb81188</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998" id="CVE-2016-4998" title="Kernel: Out Of Bounds Reads When Processing Ipt_So_Set_Replace Setsockopt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" id="CVE-2016-6828" title="Kernel: Use After Free In Tcp_Xmit_Retransmit_Queue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" id="CVE-2016-7117" title="Kernel: Use-After-Free In The Recvmmsg Exit Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0036" id="RHSA-2017:0036-1" title="Rhsa-2017:0036-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349886" id="1349886" title="Kernel: Out Of Bounds Reads When Processing Ipt_So_Set_Replace Setsockopt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367091" id="1367091" title="Kernel: Use After Free In Tcp_Xmit_Retransmit_Queue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382268" id="1382268" title="Kernel: Use-After-Free In The Recvmmsg Exit Path" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0061-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.13.1.el6_8" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el6_8.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el6_8.x86_64.rpm</filename><sum type="sha256">21c2dc23f940dc7e97ec05df2b4729366cfa794e593158a293fd89f1ad5737ba</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.13.1.el6_8" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el6_8.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el6_8.x86_64.rpm</filename><sum type="sha256">c0695c1a4426c5adabd2aed3146cbb3676477612ddc46892553d988154d30158</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.13.1.el6_8" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el6_8.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el6_8.x86_64.rpm</filename><sum type="sha256">096eca761760aa8e49fe775d7340eb1ec78b79778a350953c4d0e2c642954272</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.13.1.el6_8" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el6_8.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el6_8.x86_64.rpm</filename><sum type="sha256">212f7570e2b9be2e2d1960172c9c5edb0b4388e1ad078b9918f031bba33ece29</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.13.1.el6_8" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el6_8.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el6_8.x86_64.rpm</filename><sum type="sha256">b839c3b1fed3f523344cfa8e9d24da316b9e6bf7d18cfcf0f73a65f3b4451ee3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0061" id="RHSA-2017:0061-1" title="Rhsa-2017:0061-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0063-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm</filename><sum type="sha256">9a27a3db4d42258757d79b06c6cfb01d28026e29d6d6e726df4877500547f2b4</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm</filename><sum type="sha256">b4aff172bbe56fd208971b6bfc448c200e54deea0e9802a8bb251746ff96202e</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm</filename><sum type="sha256">fed8e401b8f15878cf7684d147da0c9d132d9a72ee27eaf99d348259f2c14792</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm</filename><sum type="sha256">a79f1ca81e1ea9fcc5c8958ccbf0d806d7d93365bd6885a74f2ba16294c26c71</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm</filename><sum type="sha256">5803a60c64b30073d08097b7e2241c3cdaf1e02495672f8aedf48866a8109827</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm</filename><sum type="sha256">d99333129ffc6b353817405072b0ae6eef6165d6214d95baf88e1368281329a8</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm</filename><sum type="sha256">5bce375355e98a5b7928dd2bdf2e4194e1e387028dc70a178153e6627e857a7d</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.47.rc1.el6_8.4" src="bind-9.8.2-0.47.rc1.el6_8.4.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm</filename><sum type="sha256">59fb4d20172cda4b01c14b95df37ccd9c3a06ff4b621a11d37a57df2eb278f40</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" id="CVE-2016-9147" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0063" id="RHSA-2017:0063-1" title="Rhsa-2017:0063-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411367" id="1411367" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0180-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) 
This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. 
* Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) 
* A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) 
* It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) 
* It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) 
* It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) 
* It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) 
* It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) 
* Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) 
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite. 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-01-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">92d6a220e52423125530de02dc7d89f5ecd7b443eede93e3ccafcfced4088658</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el6_8.noarch.rpm</filename><sum type="sha256">c1138e7ae5a141f57bf2e1ca48ab14f8f0852b2cc2c1cfe0ea1750258007637e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">a01148ee52df04f5125f12f163930490f2960966d8cdb7c16bc80eeb076daeef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">e345dcd8279488f160ddb534e7b077b80edc6c3ea95cb34290ef00aca54010f6</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el6_8.noarch.rpm</filename><sum type="sha256">74fe19d2464fd21fda7d5477235c2c7576a05bcff7a7c3ff9b410691de5cfe3c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">401303e835c19c02117eae66f559da3864aa62db213474b936d075a55f93b16a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">fdae3e54699089bb9613a5c11494ef67713e43d12216b193a326bab6bdeaa4f6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">dce60e58d5971c62d42c2e87e6190368584987ad1237d364cbd70f05666ea0f4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">39fba38dbe6e30bd038df97bd3af508eb78ed3c1819c8f31f1876c345186a9ac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-src-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">096e407444e8d4522be5c85c7599e389878ce870b30a12fdea18777b172b8b7b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">aca9975bae8d12ad6bc32ad5605043ae47721001aa0746987fa7c75035327db6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b13.el6_8" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm</filename><sum type="sha256">f1d73ab6a31db88a09aa35e3fec964994a9ba8c5efcdcbce444509ea6825db5b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" id="CVE-2016-5546" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" id="CVE-2016-5547" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" id="CVE-2016-5548" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" id="CVE-2016-5552" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" id="CVE-2017-3231" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" id="CVE-2017-3241" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" id="CVE-2017-3252" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" id="CVE-2017-3253" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" id="CVE-2017-3261" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" id="CVE-2017-3272" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" id="CVE-2017-3289" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0180" id="RHSA-2017:0180-1" title="Rhsa-2017:0180-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413554" id="1413554" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413562" id="1413562" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413583" id="1413583" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413653" id="1413653" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413717" id="1413717" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413764" id="1413764" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413882" id="1413882" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413906" id="1413906" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413911" id="1413911" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413920" id="1413920" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413955" id="1413955" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0183-1</id><title>Squid34</title><description>Security Fix(es): 
* It was found that squid did not properly remove connection specific headers when answering conditional requests using a cached request. A remote attacker could send a specially crafted request to an HTTP server via the squid proxy and steal private data from other connections. (CVE-2016-10002)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-01-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid34" release="9.el6_8.4" src="squid34-3.4.14-9.el6_8.4.src.rpm" version="3.4.14"><filename>squid34-3.4.14-9.el6_8.4.x86_64.rpm</filename><sum type="sha256">ab30eb39b352bcd91cb2078e39c8dab20f42eac21fdc5b02a0b38b836cb8096d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10002" id="CVE-2016-10002" title="Squid: Information Disclosure In Http Request Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0183" id="RHSA-2017:0183-1" title="Rhsa-2017:0183-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405941" id="1405941" title="Squid: Information Disclosure In Http Request Processing" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0184-1</id><title>Mysql</title><description>Security Fix(es): 
* It was discovered that the MySQL logging functionality allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) 
* A race condition was found in the way MySQL performed MyISAM engine table repair. A database user with shell access to the server running mysqld could use this flaw to change permissions of arbitrary files writable by the mysql system user. (CVE-2016-6663, CVE-2016-5616)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="mysql-libs" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-libs-5.1.73-8.el6_8.i686.rpm</filename><sum type="sha256">3ae7749281395d87188923fc17a9e66871548f14f417203703dd07a0cd271a0b</sum></package><package arch="x86_64" name="mysql-bench" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-bench-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">7dfc3122434597386d650e04c9129621f95f9b6df4c45cb3ae243a93a667f4ca</sum></package><package arch="i686" name="mysql-embedded" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-embedded-5.1.73-8.el6_8.i686.rpm</filename><sum type="sha256">4254ef63aa37c4bfafff6c7a6f29b98271bc4a26a57191f8de0ec40caed2e725</sum></package><package arch="x86_64" name="mysql-libs" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-libs-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">2ce1fb8919f626c7bd7376c43df24048ae23730bac1cccc07754596ce0276e1a</sum></package><package arch="i686" name="mysql-devel" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-devel-5.1.73-8.el6_8.i686.rpm</filename><sum type="sha256">28a0929bdeec6c520eea383e9dc8f398a5572945528cee989287189b384f49a9</sum></package><package arch="x86_64" name="mysql-embedded-devel" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">83edab22b9d9eb4a2c472ad7aa7fcca95589fc2ba0a7f414414f281d5c1377fc</sum></package><package arch="x86_64" name="mysql-server" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-server-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">2370764742f243939d5e2d8fa53c5d7463336d89dd8c32eff2eef8aaa19e388f</sum></package><package arch="x86_64" name="mysql-test" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-test-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">28c2d644024db3708947ad92b652e50f300a2b1cf3b4365323d482baef35aa0d</sum></package><package arch="i686" name="mysql-embedded-devel" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm</filename><sum type="sha256">0ad1113c3e52b67a7f3fd05b3d7209c1f77b4a1bb6d35789bfe3d3dbe05577d0</sum></package><package arch="x86_64" name="mysql" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">83afdfe30dae3a365ea5608dbfa8f773cf803d29f1663a42920459792e52e143</sum></package><package arch="x86_64" name="mysql-embedded" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-embedded-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">ed0c15dcb63549f7870fe09aefb405acf8d130890d159d7b266bc88136c6dcee</sum></package><package arch="x86_64" name="mysql-devel" release="8.el6_8" src="mysql-5.1.73-8.el6_8.src.rpm" version="5.1.73"><filename>mysql-devel-5.1.73-8.el6_8.x86_64.rpm</filename><sum type="sha256">03a1d0d315ff4132e790294aa019b6733808b8c38e70d1a13adee75132b5349f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616" id="CVE-2016-5616" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Myisam (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" id="CVE-2016-6662" title="Mysql: General_Log Can Write To Configuration Files, Leading To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" id="CVE-2016-6663" title="Mysql: Race Condition While Setting Stats During Myisam Table Repair" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0184" id="RHSA-2017:0184-1" title="Rhsa-2017:0184-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375198" id="1375198" title="Mysql: General_Log Can Write To Configuration Files, Leading To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378936" id="1378936" title="Mysql: Race Condition While Setting Stats During Myisam Table Repair" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0190-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.7.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-01-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="2.el6_8" src="firefox-45.7.0-2.el6_8.src.rpm" version="45.7.0"><filename>firefox-45.7.0-2.el6_8.x86_64.rpm</filename><sum type="sha256">cc33e17b26b9cb8b8a8643947c3b2579b3ee341039eba147d815c9d866217f21</sum></package><package arch="i686" name="firefox" release="2.el6_8" src="firefox-45.7.0-2.el6_8.src.rpm" version="45.7.0"><filename>firefox-45.7.0-2.el6_8.i686.rpm</filename><sum type="sha256">13a5085b51a25f77ac34922ad8cc37c6183bdc09d1e69b845541a096d604a843</sum></package><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.7.0-1.el6_8.src.rpm" version="45.7.0"><filename>firefox-45.7.0-1.el6_8.i686.rpm</filename><sum type="sha256">c40e3121e4607e09acc8bba4aa3146a742297335cb2ef0d281fcf4937aa04b71</sum></package><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.7.0-1.el6_8.src.rpm" version="45.7.0"><filename>firefox-45.7.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">e1b6d209b0475bb797d7d30c4be2a3f63aa80f5dccd2d3c25f3e7fa6597da465</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" id="CVE-2017-5373" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" id="CVE-2017-5375" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" id="CVE-2017-5376" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" id="CVE-2017-5378" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" id="CVE-2017-5380" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" id="CVE-2017-5383" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" id="CVE-2017-5386" title="Mozilla: Webextensions Can Use Data: Protocol To Affect Other Extensions (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" id="CVE-2017-5390" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" id="CVE-2017-5396" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0190" id="RHSA-2017:0190-1" title="Rhsa-2017:0190-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415924" id="1415924" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416271" id="1416271" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416272" id="1416272" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416273" id="1416273" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416274" id="1416274" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416279" id="1416279" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416280" id="1416280" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416281" id="1416281" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416282" id="1416282" title="Mozilla: Webextensions Can Use Data: Protocol To Affect Other Extensions (Mfsa 2017-02)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0225-1</id><title>Libtiff</title><description>Security Fix(es): 
* Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2016-9533, CVE-2016-9534, CVE-2016-9535) 
* Multiple flaws have been discovered in various libtiff tools (tiff2pdf, tiffcrop, tiffcp, bmp2tiff). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2015-8870, CVE-2016-5652, CVE-2016-9540, CVE-2016-9537, CVE-2016-9536)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-02-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libtiff-devel" release="21.el6_8" src="libtiff-3.9.4-21.el6_8.src.rpm" version="3.9.4"><filename>libtiff-devel-3.9.4-21.el6_8.x86_64.rpm</filename><sum type="sha256">f4c18643aaca64f969a7b03c98bd349551ff48ccda6dd351dd0c390161266b84</sum></package><package arch="x86_64" name="libtiff" release="21.el6_8" src="libtiff-3.9.4-21.el6_8.src.rpm" version="3.9.4"><filename>libtiff-3.9.4-21.el6_8.x86_64.rpm</filename><sum type="sha256">d0e46fdfe7f7de71cf221ce04c9ebe2ad9a819900d1d9ff4d2dc1dd850eccce3</sum></package><package arch="i686" name="libtiff" release="21.el6_8" src="libtiff-3.9.4-21.el6_8.src.rpm" version="3.9.4"><filename>libtiff-3.9.4-21.el6_8.i686.rpm</filename><sum type="sha256">33d18b53a5c280266dba99dd5c4dfe8f83c919dcf987c7bd332f2241c5354921</sum></package><package arch="x86_64" name="libtiff-static" release="21.el6_8" src="libtiff-3.9.4-21.el6_8.src.rpm" version="3.9.4"><filename>libtiff-static-3.9.4-21.el6_8.x86_64.rpm</filename><sum type="sha256">a4ac5a5ceac776dae06a5a8c5809e96508b6587b76d8b09d68a86a6feeaad617</sum></package><package arch="i686" name="libtiff-devel" release="21.el6_8" src="libtiff-3.9.4-21.el6_8.src.rpm" version="3.9.4"><filename>libtiff-devel-3.9.4-21.el6_8.i686.rpm</filename><sum type="sha256">bb284ebfc72c3b084d881df484aec2e5e1f41e908b29c2f08cec66489ba12220</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8870" id="CVE-2015-8870" title="Libtiff: Integer Overflow In Tools/Bmp2Tiff.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" id="CVE-2016-5652" title="Libtiff: Tiff2Pdf Jpeg Compression Tables Heap Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" id="CVE-2016-9533" title="Libtiff: Pixarlog Horizontaldifference Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" id="CVE-2016-9534" title="Libtiff: Tiffflushdata1 Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" id="CVE-2016-9535" title="Libtiff: Predictor Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" id="CVE-2016-9536" title="Libtiff: T2P_Process_Jpeg_Strip Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" id="CVE-2016-9537" title="Libtiff: Out-Of-Bounds Write Vulnerabilities In Tools/Tiffcrop.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" id="CVE-2016-9540" title="Libtiff: Cpstriptotile Heap-Buffer-Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0225" id="RHSA-2017:0225-1" title="Rhsa-2017:0225-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389222" id="1389222" title="Libtiff: Tiff2Pdf Jpeg Compression Tables Heap Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397751" id="1397751" title="Libtiff: Tiffflushdata1 Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397755" id="1397755" title="Libtiff: Predictor Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397758" id="1397758" title="Libtiff: T2P_Process_Jpeg_Strip Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397760" id="1397760" title="Libtiff: Out-Of-Bounds Write Vulnerabilities In Tools/Tiffcrop.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397768" id="1397768" title="Libtiff: Cpstriptotile Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397769" id="1397769" title="Libtiff: Pixarlog Horizontaldifference Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402778" id="1402778" title="Libtiff: Integer Overflow In Tools/Bmp2Tiff.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0238-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.7.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, CVE-2017-5396)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-02-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.7.0-1.el6_8.src.rpm" version="45.7.0"><filename>thunderbird-45.7.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">d5251731f9bce5ca6efc7d233d51a005f576bd5d482078a61683fac6b4f7b9aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" id="CVE-2017-5373" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" id="CVE-2017-5375" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" id="CVE-2017-5376" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" id="CVE-2017-5378" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" id="CVE-2017-5380" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" id="CVE-2017-5383" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" id="CVE-2017-5390" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" id="CVE-2017-5396" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0238" id="RHSA-2017:0238-1" title="Rhsa-2017:0238-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415924" id="1415924" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416271" id="1416271" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416272" id="1416272" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416273" id="1416273" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416274" id="1416274" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416279" id="1416279" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416280" id="1416280" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416281" id="1416281" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0252-1</id><title>Ntp</title><description>Security Fix(es): 
* It was found that when ntp is configured with rate limiting for all associations the limits are also applied to responses received from its configured sources. A remote attacker who knows the sources can cause a denial of service by preventing ntpd from accepting valid responses from its sources. (CVE-2016-7426) 
* A flaw was found in the control mode functionality of ntpd. A remote attacker could send a crafted control mode packet which could lead to information disclosure or result in DDoS amplification attacks. (CVE-2016-9310) 
* A flaw was found in the way ntpd implemented the trap service. A remote attacker could send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service. (CVE-2016-9311) 
* A flaw was found in the way ntpd running on a host with multiple network interfaces handled certain server responses. A remote attacker could use this flaw which would cause ntpd to not synchronize with the source. (CVE-2016-7429) 
* A flaw was found in the way ntpd calculated the root delay. A remote attacker could send a specially-crafted spoofed packet to cause denial of service or in some special cases even crash. (CVE-2016-7433)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-02-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntp-perl" release="10.el6_8.2" src="ntp-4.2.6p5-10.el6_8.2.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-10.el6_8.2.x86_64.rpm</filename><sum type="sha256">1dbde138144c10e426d902a2aab5cf65bcca9c68b24d134c70d2cceb1fede24c</sum></package><package arch="x86_64" name="ntpdate" release="10.el6_8.2" src="ntp-4.2.6p5-10.el6_8.2.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-10.el6_8.2.x86_64.rpm</filename><sum type="sha256">6dcba1152f191fbae24ba457176b86bac4345e8c90de62b7071b5b751b3d7673</sum></package><package arch="noarch" name="ntp-doc" release="10.el6_8.2" src="ntp-4.2.6p5-10.el6_8.2.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-10.el6_8.2.noarch.rpm</filename><sum type="sha256">efe173af8e9ca6f18d31e7258f7d3632c16d68a10755e8e03d0fb3c19f594553</sum></package><package arch="x86_64" name="ntp" release="10.el6_8.2" src="ntp-4.2.6p5-10.el6_8.2.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-10.el6_8.2.x86_64.rpm</filename><sum type="sha256">eaeb4f427801b2e7ff88d2d210b8f644f29d468240c869dfb54051ac45bd4e24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" id="CVE-2016-7426" title="Ntp: Client Rate Limiting And Server Responses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" id="CVE-2016-7429" title="Ntp: Attack On Interface Selection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" id="CVE-2016-7433" title="Ntp: Broken Initial Sync Calculations Regression" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" id="CVE-2016-9310" title="Ntp: Mode 6 Unauthenticated Trap Information Disclosure And Ddos Vector" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" id="CVE-2016-9311" title="Ntp: Null Pointer Dereference When Trap Service Is Enabled" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0252" id="RHSA-2017:0252-1" title="Rhsa-2017:0252-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397319" id="1397319" title="Ntp: Mode 6 Unauthenticated Trap Information Disclosure And Ddos Vector" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397341" id="1397341" title="Ntp: Attack On Interface Selection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397345" id="1397345" title="Ntp: Client Rate Limiting And Server Responses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397347" id="1397347" title="Ntp: Broken Initial Sync Calculations Regression" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398350" id="1398350" title="Ntp: Null Pointer Dereference When Trap Service Is Enabled" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0253-1</id><title>Spice-Server</title><description>Security Fix(es): 
* A vulnerability was discovered in spice in the server's protocol handling. An authenticated attacker could send crafted messages to the spice server causing a heap overflow leading to a crash or possible code execution. (CVE-2016-9577) 
* A vulnerability was discovered in spice in the server's protocol handling. An attacker able to connect to the spice server could send crafted messages which would cause the process to crash. (CVE-2016-9578)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-02-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="13.el6_8.2" src="spice-server-0.12.4-13.el6_8.2.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-13.el6_8.2.x86_64.rpm</filename><sum type="sha256">07b1cd1a82720a2af0f1e5874e8aa49cfece4bd309d843b5423962894f026339</sum></package><package arch="x86_64" name="spice-server" release="13.el6_8.2" src="spice-server-0.12.4-13.el6_8.2.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-13.el6_8.2.x86_64.rpm</filename><sum type="sha256">86baffc74e060ac4d33844d76c9db8f3c7e64628829e13c31a571d0966b4ce04</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" id="CVE-2016-9577" title="Spice: Buffer Overflow In Main_Channel_Alloc_Msg_Rcv_Buf When Reading Large Messages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" id="CVE-2016-9578" title="Spice: Remote Dos Via Crafted Message" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0253" id="RHSA-2017:0253-1" title="Rhsa-2017:0253-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399566" id="1399566" title="Spice: Remote Dos Via Crafted Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401603" id="1401603" title="Spice: Buffer Overflow In Main_Channel_Alloc_Msg_Rcv_Buf When Reading Large Messages" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0269-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) 
This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. 
* Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) 
* A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) 
* It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) 
* It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) 
* It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) 
* It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) 
* It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) 
* Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) 
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-02-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.9.0.el6_8" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el6_8.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el6_8.x86_64.rpm</filename><sum type="sha256">95a23a810e0e07d2fd938233e8f8747415e5388aca72ffd544d1ddb42f6f4c6a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.9.0.el6_8" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el6_8.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el6_8.x86_64.rpm</filename><sum type="sha256">d2862ec5f08c2524717bad91669f1f946d7cb93777d46cb15b73d7f84a71c596</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.9.0.el6_8" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el6_8.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el6_8.x86_64.rpm</filename><sum type="sha256">c5c1a1a1e332b69ecfabb031aa263da5cb66ec6dba303a1a4bf3105cb23a64ce</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.9.0.el6_8" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el6_8.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el6_8.noarch.rpm</filename><sum type="sha256">cec52da5b4651e98942f333978cc8e2adf6706b747e796c6a442642658caa563</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.9.0.el6_8" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el6_8.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el6_8.x86_64.rpm</filename><sum type="sha256">b7fb855ba23ba40002fbb6ecc9d080e2a969f9c3de7ddbfdee5c922a45ffb6ef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" id="CVE-2016-5546" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" id="CVE-2016-5547" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" id="CVE-2016-5548" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" id="CVE-2016-5552" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" id="CVE-2017-3231" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" id="CVE-2017-3241" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" id="CVE-2017-3252" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" id="CVE-2017-3253" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" id="CVE-2017-3261" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" id="CVE-2017-3272" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" id="CVE-2017-3289" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0269" id="RHSA-2017:0269-1" title="Rhsa-2017:0269-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413554" id="1413554" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413562" id="1413562" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413583" id="1413583" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413653" id="1413653" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413717" id="1413717" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413764" id="1413764" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413882" id="1413882" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413906" id="1413906" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413911" id="1413911" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413920" id="1413920" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413955" id="1413955" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0286-1</id><title>Openssl</title><description>Security Fix(es): 
* An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731) 
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssl" release="48.sl6_8.4" src="openssl-1.0.1e-48.sl6_8.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.sl6_8.4.x86_64.rpm</filename><sum type="sha256">dd258ab9fc22694e8a7c0f6d7ceb671a358e4f75c67db86d144af895bae8b056</sum></package><package arch="i686" name="openssl-devel" release="48.sl6_8.4" src="openssl-1.0.1e-48.sl6_8.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.sl6_8.4.i686.rpm</filename><sum type="sha256">6b20c4cb87c930ca05a0fdd8830a5df4c45f86f25baf25143a804a5f9f40bbcb</sum></package><package arch="i686" name="openssl" release="48.sl6_8.4" src="openssl-1.0.1e-48.sl6_8.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.sl6_8.4.i686.rpm</filename><sum type="sha256">e12f8db124e6f308c5cdbf2af112999317a6789d82c3a04f6d46fea56b7b6f25</sum></package><package arch="x86_64" name="openssl-perl" release="48.el6_8.4" src="openssl-1.0.1e-48.el6_8.4.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-48.el6_8.4.x86_64.rpm</filename><sum type="sha256">fc60fdfecd866be901961c3c20d932e801123679540dff24ecf6c744c6e91e50</sum></package><package arch="x86_64" name="openssl-static" release="48.sl6_8.4" src="openssl-1.0.1e-48.sl6_8.4.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-48.sl6_8.4.x86_64.rpm</filename><sum type="sha256">1f0bd605ce5915fd8b790a4a6b66e6b136f409acc56b5328103f675568ac3c09</sum></package><package arch="x86_64" name="openssl-devel" release="48.sl6_8.4" src="openssl-1.0.1e-48.sl6_8.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.sl6_8.4.x86_64.rpm</filename><sum type="sha256">ccf2ee4d618e72b865fc268e36bc5c2e29380332ca88937d1700751cec6e7f78</sum></package><package arch="i686" name="openssl" release="48.el6_8.4" src="openssl-1.0.1e-48.el6_8.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.el6_8.4.i686.rpm</filename><sum type="sha256">3cb71a00f3b543c77c6e32ae43f09f77a6ec1a9035af3b25f81f2e9d1baac0c7</sum></package><package arch="i686" name="openssl-devel" release="48.el6_8.4" src="openssl-1.0.1e-48.el6_8.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.el6_8.4.i686.rpm</filename><sum type="sha256">eb2e349ba79aa7252233dfbaffe89865dcfc4b88c1e7fe65f157be77ce030da5</sum></package><package arch="x86_64" name="openssl" release="48.el6_8.4" src="openssl-1.0.1e-48.el6_8.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-48.el6_8.4.x86_64.rpm</filename><sum type="sha256">0dd5f611b06364e8c3e496160d397940ad4cf1a8edc0b96cea3036bdc0ebccfa</sum></package><package arch="x86_64" name="openssl-perl" release="48.sl6_8.4" src="openssl-1.0.1e-48.sl6_8.4.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-48.sl6_8.4.x86_64.rpm</filename><sum type="sha256">ad6a90f86effac4f6dedacbd6a1fed598c00d02154bc960c3f1b9143f46f78ff</sum></package><package arch="x86_64" name="openssl-devel" release="48.el6_8.4" src="openssl-1.0.1e-48.el6_8.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-48.el6_8.4.x86_64.rpm</filename><sum type="sha256">68f49fad48857714b4cfd5ea6a2cf2c8efb84e150ffe5aaec433c15127e371ad</sum></package><package arch="x86_64" name="openssl-static" release="48.el6_8.4" src="openssl-1.0.1e-48.el6_8.4.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-48.el6_8.4.x86_64.rpm</filename><sum type="sha256">dda3e7cb91a96c132f431d27d9213a85dc5f63dcbb54fb2c2e00dca7d2d432f9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" id="CVE-2016-8610" title="Ssl/Tls: Malformed Plain-Text Alert Packets Could Cause Remote Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" id="CVE-2017-3731" title="Openssl: Truncated Packet Could Crash Via Oob Read" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0286" id="RHSA-2017:0286-1" title="Rhsa-2017:0286-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384743" id="1384743" title="Ssl/Tls: Malformed Plain-Text Alert Packets Could Cause Remote Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416852" id="1416852" title="Openssl: Truncated Packet Could Crash Via Oob Read" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0293-1</id><title>Kernel</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">31f14229137cc160b6578e4e9ef3fd1fefba9e5953cbe52a03aa8ef7cb36fc33</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm</filename><sum type="sha256">6e7dc601051e6b4e615e8475cfe4a0423612c2999e4387b8d6cb9d90bf8cca95</sum></package><package arch="noarch" name="kernel-firmware" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm</filename><sum type="sha256">46dba8452717d1b061f24f66bb13b68e1b70b1c575810c0b3938adaf0d0b765b</sum></package><package arch="x86_64" name="python-perf" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">62d30dbdb431b11f96cab5c4e6d6b70b3b95383148a23e5d864839130871cb72</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">2cea911885afed63a7326b3bb44d866635c33a3cedabfb199bc1d85b9f3ef2c6</sum></package><package arch="x86_64" name="perf" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">8366faa4bdee149dca26a1403f3172a31e68aaadb3827929523657a8777405d3</sum></package><package arch="x86_64" name="kernel-devel" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">2a621d007d34f2a313787f90040b87c5a21c254fd0fe44fc67e39dbdcf5c5dc7</sum></package><package arch="x86_64" name="kernel" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">37b7ab82c6b638ea965cc5e52be20e039b8b91cd5382837189cc7f42bbddc2bd</sum></package><package arch="x86_64" name="kernel-headers" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm</filename><sum type="sha256">070a7766db41fb171b7c6fe0679a594ba0d227353f5516e1d550abdac9be2e2f</sum></package><package arch="noarch" name="kernel-doc" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.13.2.el6.noarch.rpm</filename><sum type="sha256">4c4c832078f635becb5dc2d09f6970ac567226b1e8bb9060e9eedda24bc4e9ac</sum></package><package arch="i686" name="kernel-debug-devel" release="642.13.2.el6" src="kernel-2.6.32-642.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm</filename><sum type="sha256">2d61d4b48c47e8a139d556e23acaf968fc7c9da1184062d2ba55a94aa61e90a1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" id="CVE-2017-6074" title="Kernel: Use After Free In Dccp Protocol" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0293" id="RHSA-2017:0293-1" title="Rhsa-2017:0293-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1423071" id="1423071" title="Kernel: Use After Free In Dccp Protocol" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0307-1</id><title>Kernel</title><description>Security Fix(es): 
* When creating audit records for parameters to executed children processes, an attacker can convince the Linux kernel audit subsystem can create corrupt records which may allow an attacker to misrepresent or evade logging of executing commands. (CVE-2016-6136, Moderate) 
* A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate) 
Bug Fix(es): 
* The qlnic driver previously attempted to fetch pending transmission descriptors before all writes were complete, which lead to firmware hangs. With this update, the qlcnic driver has been fixed to complete all writes before the hardware fetches any pending transmission descriptors. As a result, the firmware no longer hangs with the qlcnic driver. 
* Previously, when a NFS share was mounted, the file-system (FS) cache was incorrectly enabled even when the "-o fsc" option was not used in the mount command. Consequently, the cachefilesd service stored files in the NFS share even when not instructed to by the user. With this update, NFS does not use the FS cache if not instructed by the "-o fsc" option. As a result, NFS no longer enables caching if the "-o fsc" option is not used. 
* Previously, an NFS client and NFS server got into a NFS4 protocol loop involving a WRITE action and a NFS4ERR_EXPIRED response when the current_fileid counter got to the wraparound point by overflowing the value of 32 bits. This update fixes the NFS server to handle the current_fileid wraparound. As a result, the described NFS4 protocol loop no longer occurs. 
* Previously, certain configurations of the Hewlett Packard Smart Array (HPSA) devices caused hardware to be set offline incorrectly when the HPSA driver was expected to wait for existing I/O operations to complete. Consequently, a kernel panic occurred. This update prevents the described problem. As a result, the kernel panic no longer occurs. 
* Previously, memory corruption by copying data into the wrong memory locations sometimes occurred, because the __copy_tofrom_user() function was returning incorrect values. This update fixes the __copy_tofrom_user() function so that it no longer returns larger values than the number of bytes it was asked to copy. As a result, memory corruption no longer occurs in he described scenario. 
* Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances. 
* When the "punching hole" feature of the fallocate utility was used on an ext4 file system inode with extent depth of 1, the extent tree of the inode sometimes became corrupted. With this update, the underlying source code has been fixed, and extent tree corruption no longer occurs in the described situation.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="kernel-debug-devel" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm</filename><sum type="sha256">89aca47288e7d6f37aafb9bdc583b11f82eabe1a3d490ab8bc255f20b3a34ba3</sum></package><package arch="noarch" name="kernel-doc" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.15.1.el6.noarch.rpm</filename><sum type="sha256">78485a3ef75c1070d0d9a3c3586359679bb62c923b0d2e6636224e1cc9bb4e4b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">69916e965c8291b8fd694f7dd9229676271be38f7a203e8807c83d5450bb9365</sum></package><package arch="x86_64" name="perf" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">4f366f0292e8465237a898df9a599a7b2b96e7ad1747bbd01ca5d73244e46d76</sum></package><package arch="noarch" name="kernel-firmware" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.15.1.el6.noarch.rpm</filename><sum type="sha256">ea7a83c7ad39c16c1778763d04ec50f47b625db07bb32549755d6356c6be723f</sum></package><package arch="x86_64" name="kernel-devel" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">6100e8e2bf74c47b7b21cf7e79b9d84ed2fe9f8b36062598dacf46903ca6903e</sum></package><package arch="x86_64" name="python-perf" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">89fafbb00efd7cfaa52d7cc47b2a2919d4db7b1c4584f47706db29517e516c7d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.15.1.el6.noarch.rpm</filename><sum type="sha256">d8772a5a713ccd8ccf66504653e2693f9be9aa993b2c89aa1ea7c9090e27ba0c</sum></package><package arch="x86_64" name="kernel-debug" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">b0adb7bf9846f0e6154006c3251f09fa732fb2785bc8194d1a8eb3bad9156b2d</sum></package><package arch="x86_64" name="kernel-headers" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">60ace0c44f57e8bbf48c4d3f9df0e811b6c47c660d7833de09b84377bfe88426</sum></package><package arch="x86_64" name="kernel" release="642.15.1.el6" src="kernel-2.6.32-642.15.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.15.1.el6.x86_64.rpm</filename><sum type="sha256">4ceb0824a680551ee839124d993c2c01923ff0d73d9a1390632fbce8ca4a11ef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" id="CVE-2016-6136" title="Kernel: Race Condition Vulnerability In Execve Argv Arguments" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" id="CVE-2016-9555" title="Kernel: Slab Out-Of-Bounds Access In Sctp_Sf_Ootb()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0307" id="RHSA-2017:0307-1" title="Rhsa-2017:0307-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353533" id="1353533" title="Kernel: Race Condition Vulnerability In Execve Argv Arguments" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397930" id="1397930" title="Kernel: Slab Out-Of-Bounds Access In Sctp_Sf_Ootb()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0309-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on the host with privileges of Qemu process on the host. (CVE-2017-2615) 
* An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet's checksum, because a QEMU function used the packet's payload length without checking against the data buffer's size. A user inside a guest could use this flaw to crash the QEMU process (denial of service). (CVE-2016-2857) 
This update also fixes the following bug: 
* Previously, rebooting a guest virtual machine more than 128 times in a short period of time caused the guest to shut down instead of rebooting, because the virtqueue was not cleaned properly. This update ensures that the virtqueue is cleaned more reliably, which prevents the described problem from occurring. 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.491.el6_8.6" src="qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.491.el6_8.6.x86_64.rpm</filename><sum type="sha256">c686896ad1c07c34a76de43b1e1daaf26fb9320a586fb753d136a8f6e4349b6d</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.491.el6_8.6" src="qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.491.el6_8.6.x86_64.rpm</filename><sum type="sha256">6dd910afcf8960599df0a235be76d30a36f0480a3dfea8509eecee8a53d64b93</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.491.el6_8.6" src="qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.491.el6_8.6.x86_64.rpm</filename><sum type="sha256">f5072b6e83f19159fd1d49931005ee123640e5854fc6ced8c6f41e46786f8b6d</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.491.el6_8.6" src="qemu-kvm-0.12.1.2-2.491.el6_8.6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.491.el6_8.6.x86_64.rpm</filename><sum type="sha256">a3bc6536bd765785eb0e504f0e94ae917c8404c2cf06b54ac4770f92d0a65cbc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857" id="CVE-2016-2857" title="Qemu: Net: Out Of Bounds Read In Net_Checksum_Calculate()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" id="CVE-2017-2615" title="Qemu: Display: Cirrus: Oob Access While Doing Bitblt Copy Backward Mode" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0309" id="RHSA-2017:0309-1" title="Rhsa-2017:0309-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296567" id="1296567" title="Qemu: Net: Out Of Bounds Read In Net_Checksum_Calculate()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1408389" id="1408389" title="[Rhel6.8.Z] Kvm Guest Shuts Itself Down After 128Th Reboot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418200" id="1418200" title="Qemu: Display: Cirrus: Oob Access While Doing Bitblt Copy Backward Mode" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0352-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-03-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.491.el6_8.7" src="qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.491.el6_8.7.x86_64.rpm</filename><sum type="sha256">1c20793c80053429418d0522c6614716090eff16cc0449f65e3cdecb3ac2e92a</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.491.el6_8.7" src="qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.491.el6_8.7.x86_64.rpm</filename><sum type="sha256">fe8428bd685249e91bb56329283eff53dde3598bfb42b8de3f3e13037ef7dd57</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.491.el6_8.7" src="qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.491.el6_8.7.x86_64.rpm</filename><sum type="sha256">9fd047912a1f0b9219f3687b837a504e399962a3e73466b3cc451bcd558e7c97</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.491.el6_8.7" src="qemu-kvm-0.12.1.2-2.491.el6_8.7.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.491.el6_8.7.x86_64.rpm</filename><sum type="sha256">918ad7ef73d337be9256eeb063b6cfaaa5432d482c00561209a3f43445c1a4a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" id="CVE-2017-2620" title="Qemu: Display: Cirrus: Potential Arbitrary Code Execution Via Cirrus_Bitblt_Cputovideo" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0352" id="RHSA-2017:0352-1" title="Rhsa-2017:0352-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420484" id="1420484" title="Qemu: Display: Cirrus: Potential Arbitrary Code Execution Via Cirrus_Bitblt_Cputovideo" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0459-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.8.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-03-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="2.el6_8" src="firefox-45.8.0-2.el6_8.src.rpm" version="45.8.0"><filename>firefox-45.8.0-2.el6_8.i686.rpm</filename><sum type="sha256">3ad7d36bab185466f081fa6bf23a5dfd65dda49d4b79e0acbf9ee88dd6e08ff1</sum></package><package arch="x86_64" name="firefox" release="2.el6_8" src="firefox-45.8.0-2.el6_8.src.rpm" version="45.8.0"><filename>firefox-45.8.0-2.el6_8.x86_64.rpm</filename><sum type="sha256">f24a9987710288e3cd4ec6bf2120e17ea7fdda259d98b0ffe1af60d9ed55be43</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" id="CVE-2017-5398" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" id="CVE-2017-5400" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" id="CVE-2017-5401" title="Mozilla: Memory Corruption When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" id="CVE-2017-5402" title="Mozilla: Use-After-Free Working With Events In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" id="CVE-2017-5404" title="Mozilla: Use-After-Free Working With Ranges In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" id="CVE-2017-5405" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" id="CVE-2017-5407" title="Mozilla: Pixel And History Stealing Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" id="CVE-2017-5408" title="Mozilla: Cross-Origin Reading Of Video Captions " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" id="CVE-2017-5410" title="Mozilla: Memory Corruption During Javascript " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0459" id="RHSA-2017:0459-1" title="Rhsa-2017:0459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429778" id="1429778" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429779" id="1429779" title="Mozilla: Memory Corruption When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429780" id="1429780" title="Mozilla: Use-After-Free Working With Events In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429781" id="1429781" title="Mozilla: Use-After-Free Working With Ranges In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429782" id="1429782" title="Mozilla: Pixel And History Stealing Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429783" id="1429783" title="Mozilla: Memory Corruption During Javascript " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429784" id="1429784" title="Mozilla: Cross-Origin Reading Of Video Captions " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429785" id="1429785" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429786" id="1429786" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0498-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.8.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-03-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_8" src="thunderbird-45.8.0-1.el6_8.src.rpm" version="45.8.0"><filename>thunderbird-45.8.0-1.el6_8.x86_64.rpm</filename><sum type="sha256">463bfd46a9d6852eee16b1083f4dd8a4b593896e079fad91a14190872f843fe0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" id="CVE-2017-5398" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" id="CVE-2017-5400" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" id="CVE-2017-5401" title="Mozilla: Memory Corruption When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" id="CVE-2017-5402" title="Mozilla: Use-After-Free Working With Events In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" id="CVE-2017-5404" title="Mozilla: Use-After-Free Working With Ranges In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" id="CVE-2017-5405" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" id="CVE-2017-5407" title="Mozilla: Pixel And History Stealing Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" id="CVE-2017-5408" title="Mozilla: Cross-Origin Reading Of Video Captions " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" id="CVE-2017-5410" title="Mozilla: Memory Corruption During Javascript " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0498" id="RHSA-2017:0498-1" title="Rhsa-2017:0498-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429778" id="1429778" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429779" id="1429779" title="Mozilla: Memory Corruption When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429780" id="1429780" title="Mozilla: Use-After-Free Working With Events In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429781" id="1429781" title="Mozilla: Use-After-Free Working With Ranges In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429782" id="1429782" title="Mozilla: Pixel And History Stealing Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429783" id="1429783" title="Mozilla: Memory Corruption During Javascript " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429784" id="1429784" title="Mozilla: Cross-Origin Reading Of Video Captions " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429785" id="1429785" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429786" id="1429786" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0527-1</id><title>Tomcat6</title><description>Security Fix(es): 
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816) 
Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. 
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-03-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-servlet-2.5-api" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">e377d5e4a3074598c9687e30471c4ef45312d40d5ed8b494a562c8b59e7e6c3d</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">5b1e9173f10acc133e4b2423a69dae930825e7ce85fdae97d86dcc9e1820fa26</sum></package><package arch="noarch" name="tomcat6-javadoc" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">ea8016853a7d1a78e745768c32ec8750afa8ece6463756abe5c320ea25e72358</sum></package><package arch="noarch" name="tomcat6" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">a1e705a5ee7246db14182cbceeefea237e7d09d626ff7fb9ce5709eeeafe7440</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">83bf6794daa975bd0300c84411c602d6ede6046cb50bd74ca913934c81c0c3a4</sum></package><package arch="noarch" name="tomcat6-lib" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">2280198b9fd68113650bcdf121632458836d8c63a4a95266322908b424efef88</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">d9c68e6aa964d99eb100026f27c342d9773a1b1927aff08aee291d38cd0d2a06</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">8e35a1f4b7cd8ca05549622fe14522ebdd0be5ced4405d39f2d44d0bcd3af74b</sum></package><package arch="noarch" name="tomcat6-webapps" release="105.el6_8" src="tomcat6-6.0.24-105.el6_8.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-105.el6_8.noarch.rpm</filename><sum type="sha256">cc1ea43866eb7afe17d93428824316ab8093463ad18c185042dafc16ac1a9a00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816" id="CVE-2016-6816" title="Tomcat: Http Request Smuggling Vulnerability Due To Permitting Invalid Character In Http Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745" id="CVE-2016-8745" title="Tomcat: Information Disclosure Due To Incorrect Processor Sharing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0527" id="RHSA-2017:0527-1" title="Rhsa-2017:0527-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397484" id="1397484" title="Tomcat: Http Request Smuggling Vulnerability Due To Permitting Invalid Character In Http Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403824" id="1403824" title="Tomcat: Information Disclosure Due To Incorrect Processor Sharing" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0559-1</id><title>Openjpeg</title><description>Security Fix(es): 
* Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in OpenJPEG. A specially crafted JPEG2000 image could cause an application using OpenJPEG to crash or, potentially, execute arbitrary code. (CVE-2016-5139, CVE-2016-5158, CVE-2016-5159, CVE-2016-7163) 
* A vulnerability was found in the patch for CVE-2013-6045 for OpenJPEG. A specially crafted JPEG2000 image, when read by an application using OpenJPEG, could cause heap-based buffer overflows leading to a crash or, potentially, arbitrary code execution. (CVE-2016-9675)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-03-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openjpeg-devel" release="16.el6_8" src="openjpeg-1.3-16.el6_8.src.rpm" version="1.3"><filename>openjpeg-devel-1.3-16.el6_8.i686.rpm</filename><sum type="sha256">4f3a1a2e2df881c6bc043fa6972b2b4de259a2aab0ed9daef968a936362018b0</sum></package><package arch="x86_64" name="openjpeg" release="16.el6_8" src="openjpeg-1.3-16.el6_8.src.rpm" version="1.3"><filename>openjpeg-1.3-16.el6_8.x86_64.rpm</filename><sum type="sha256">502163ae48a4b15698f6365f2d2c85d0b63d4e1146661f8c7a9e205279a43092</sum></package><package arch="x86_64" name="openjpeg-devel" release="16.el6_8" src="openjpeg-1.3-16.el6_8.src.rpm" version="1.3"><filename>openjpeg-devel-1.3-16.el6_8.x86_64.rpm</filename><sum type="sha256">167d8a4053bc59cdffdbce5f584312df24924c2e72ace3b7061bff47e1feab49</sum></package><package arch="x86_64" name="openjpeg-libs" release="16.el6_8" src="openjpeg-1.3-16.el6_8.src.rpm" version="1.3"><filename>openjpeg-libs-1.3-16.el6_8.x86_64.rpm</filename><sum type="sha256">a39801c11e63c05307950083ac97613a92688ca7bfc2a8ffcc01404a1ef3ec80</sum></package><package arch="i686" name="openjpeg-libs" release="16.el6_8" src="openjpeg-1.3-16.el6_8.src.rpm" version="1.3"><filename>openjpeg-libs-1.3-16.el6_8.i686.rpm</filename><sum type="sha256">4441a6964c015cac4c9a4bdecdd962dafaec44be84769df2bffaeb8aa78bfb44</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139" id="CVE-2016-5139" title="Chromium-Browser: Heap Overflow In Pdfium" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" id="CVE-2016-5158" title="Chromium-Browser: Heap Overflow In Pdfium" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" id="CVE-2016-5159" title="Chromium-Browser: Heap Overflow In Pdfium" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" id="CVE-2016-7163" title="Openjpeg: Integer Overflow In Opj_Pi_Create_Decode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9675" id="CVE-2016-9675" title="Openjpeg: Incorrect Fix For Cve-2013-6045" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0559" id="RHSA-2017:0559-1" title="Rhsa-2017:0559-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363982" id="1363982" title="Chromium-Browser: Heap Overflow In Pdfium" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372219" id="1372219" title="Chromium-Browser: Heap Overflow In Pdfium" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372220" id="1372220" title="Chromium-Browser: Heap Overflow In Pdfium" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374329" id="1374329" title="Openjpeg: Integer Overflow In Opj_Pi_Create_Decode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382202" id="1382202" title="Openjpeg: Incorrect Fix For Cve-2013-6045" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0564-1</id><title>Libguestfs</title><description>Security Fix(es): 
* An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) 
Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="python-libguestfs" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>python-libguestfs-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">17c22735e836ea1f24c65d7c1b0f3dead21b507e8b1b1a804a864be255932c47</sum></package><package arch="x86_64" epoch="1" name="libguestfs-java" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-java-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">b571e601d979c1193ef0adab755ff737f6f870af53b712f3cf7d47ba07b44a64</sum></package><package arch="x86_64" epoch="1" name="libguestfs-tools-c" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-tools-c-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">d1cd4a1f782a1e714e0db0c1a9aa397336139e2eb448665bb33207db01c342f2</sum></package><package arch="x86_64" epoch="1" name="perl-Sys-Guestfs" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>perl-Sys-Guestfs-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">49fdcb80229ccb788953992e081c914a1c3bc196567d4f4439c4169e85888af1</sum></package><package arch="x86_64" epoch="1" name="libguestfs-java-devel" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-java-devel-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">f1b2a81457565d9aad5331fa2ff6f826a4498d6d3d7f485046e7d20fbefe3372</sum></package><package arch="x86_64" epoch="1" name="libguestfs-tools" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-tools-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">b799d14a829acda820fa53e96ddc268a4a55e10de4d8706b0a6394b91b21ea86</sum></package><package arch="x86_64" epoch="1" name="ocaml-libguestfs" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>ocaml-libguestfs-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">925821361b40a6f511d4b4705e7c8a565152e17427686eceb5e9b32ca859f40a</sum></package><package arch="x86_64" epoch="1" name="libguestfs-devel" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-devel-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">97b448181017534d25c4128bd47944b636f58883a070373038998cb8ae4d67a1</sum></package><package arch="x86_64" epoch="1" name="libguestfs" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">7c02bba1d1acb23f9a3d73ce21207e2a576e9904bf1789b69ecfc0429ff7ad4d</sum></package><package arch="x86_64" epoch="1" name="ruby-libguestfs" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>ruby-libguestfs-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">7026384d2f18566a3b6dbb8b34a10d0e7e8b3881ea5fe3b1f73667fb272e0763</sum></package><package arch="x86_64" epoch="1" name="ocaml-libguestfs-devel" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>ocaml-libguestfs-devel-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">3f99155b5297aa589ca28dc6521c01bcb5ffc105248d961d680fad39dc240df1</sum></package><package arch="x86_64" epoch="1" name="libguestfs-javadoc" release="20.el6" src="libguestfs-1.20.11-20.el6.src.rpm" version="1.20.11"><filename>libguestfs-javadoc-1.20.11-20.el6.x86_64.rpm</filename><sum type="sha256">177616770248b0816ae112ac05954e0ec417399373852a42803ec99a1229265f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" id="CVE-2015-8869" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0564" id="RHSA-2017:0564-1" title="Rhsa-2017:0564-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319086" id="1319086" title="Libguestfs-Java: Mismatch Class Version Vs Java Dependency" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332090" id="1332090" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388407" id="1388407" title="Virt-Sysprep Will Fail Detecting Os If &quot;/Usr&quot; Is A Distinct Partition Mounted In &quot;/&quot; Via Fstab" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0565-1</id><title>Ocaml</title><description>Security Fix(es): 
* An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ocaml-camlp4-devel" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-camlp4-devel-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">9107e52c51bb3197f32fd198bd8f864515f12ccea5198e408272213e8badd744</sum></package><package arch="x86_64" name="ocaml-labltk-devel" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-labltk-devel-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">c3f17c92e40448d2508e5b0fa6df4456b33dc4b4610f271091185d419322910d</sum></package><package arch="x86_64" name="ocaml-camlp4" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-camlp4-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">c227e3f1c6b22a2a36e459bfb30f652564378181c20d11147e698c98bf5afaf6</sum></package><package arch="x86_64" name="ocaml" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">97727831dc1c0c548a061d98ccb3b052778c71c7a1cf740638d67e03ea425399</sum></package><package arch="x86_64" name="ocaml-docs" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-docs-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">e8862e1670aee27458884a54dc31f3d65008362314d354f41e3fcec87baf596f</sum></package><package arch="x86_64" name="ocaml-labltk" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-labltk-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">eef7ae51321f5e61878928018083d36c302040cc61702f9ca04c4f3d925aa566</sum></package><package arch="x86_64" name="ocaml-ocamldoc" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-ocamldoc-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">adc47aaec1028def7eb619bef441dd2d47a430f682464dab3a8a93213ef29e67</sum></package><package arch="x86_64" name="ocaml-emacs" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-emacs-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">14c06ff52dac1371e3d66c9b3db3a44a9e1c41e684b329422a9a3c960e02de23</sum></package><package arch="i686" name="ocaml-camlp4-devel" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-camlp4-devel-3.11.2-5.el6.i686.rpm</filename><sum type="sha256">da48a898e242736acaca10bb5852ab2b45ae45785412926e8d53478c5e6f4f9d</sum></package><package arch="x86_64" name="ocaml-source" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-source-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">9482a7fa15e0acfd6c7ec1589d084e02522ef94d0821178e445b1ed42fe87692</sum></package><package arch="x86_64" name="ocaml-x11" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-x11-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">daf19cb13bf4aeab1ff5afaf52e0cfcc5efbccd43d459735aa2bde70536356ea</sum></package><package arch="x86_64" name="ocaml-runtime" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-runtime-3.11.2-5.el6.x86_64.rpm</filename><sum type="sha256">03980ff555d8239b808b794ee5ec2cf8b8e34836342ab3dcea584ec5c57e293b</sum></package><package arch="i686" name="ocaml-labltk-devel" release="5.el6" src="ocaml-3.11.2-5.el6.src.rpm" version="3.11.2"><filename>ocaml-labltk-devel-3.11.2-5.el6.i686.rpm</filename><sum type="sha256">3800a804af0f57446953e11743d40670c035fb3c0d8dd233dc4c7959a37a48c5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" id="CVE-2015-8869" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0565" id="RHSA-2017:0565-1" title="Rhsa-2017:0565-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332090" id="1332090" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0574-1</id><title>Gnutls</title><description>The following packages have been upgraded to a later upstream version: gnutls (2.12.23). 
Security Fix(es): 
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610) 
* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gnutls-guile" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-guile-2.12.23-21.el6.i686.rpm</filename><sum type="sha256">e2f7bb53da9778cb790fae9dd22a7a4357f2ae344f475aa4e32aa861ee0e1e55</sum></package><package arch="x86_64" name="gnutls-guile" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-guile-2.12.23-21.el6.x86_64.rpm</filename><sum type="sha256">199b6c346447f4cbbe42dc9c711e3a593dac67410b801cd04c19f3b6fd928f48</sum></package><package arch="x86_64" name="gnutls-devel" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-devel-2.12.23-21.el6.x86_64.rpm</filename><sum type="sha256">e9a1801ea4ad56031de381a2f6ed4b790307a81f5edaca730ed12a3d2defd545</sum></package><package arch="i686" name="gnutls-devel" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-devel-2.12.23-21.el6.i686.rpm</filename><sum type="sha256">58ad8689a956cffd92e6ecbf798190a140fe9d66a473bb1d08251f949fc17778</sum></package><package arch="x86_64" name="gnutls" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-2.12.23-21.el6.x86_64.rpm</filename><sum type="sha256">058a57510905ca0decc6166c67e6cd176d07146ab4137fd7408c5ac795168a47</sum></package><package arch="i686" name="gnutls" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-2.12.23-21.el6.i686.rpm</filename><sum type="sha256">f9b79851ccdbb61f7279a79ea398de57be9129ad14645802717cecb233c3a2d1</sum></package><package arch="x86_64" name="gnutls-utils" release="21.el6" src="gnutls-2.12.23-21.el6.src.rpm" version="2.12.23"><filename>gnutls-utils-2.12.23-21.el6.x86_64.rpm</filename><sum type="sha256">3c764341dcc1ab0a46040461446e76060b7418901843957bf312b59c1c5a61a8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" id="CVE-2016-8610" title="Ssl/Tls: Malformed Plain-Text Alert Packets Could Cause Remote Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" id="CVE-2017-5335" title="Gnutls: Out Of Memory While Parsing Crafted Openpgp Certificate" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" id="CVE-2017-5336" title="Gnutls: Stack Overflow In Cdk_Pk_Get_Keyid" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" id="CVE-2017-5337" title="Gnutls: Heap Read Overflow In Read-Packet.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0574" id="RHSA-2017:0574-1" title="Rhsa-2017:0574-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320982" id="1320982" title="Assert Failure In Gnutls-Cli-Debug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1321112" id="1321112" title="Dhe_Dss Ciphers Don'T Work With Client Certificates And Openssl Using Tlsv1.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323215" id="1323215" title="Gnutls-Serv --Http Crashes With Client Certificates With Nss Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326073" id="1326073" title="Gnutls Prefers Sha-1 Signatures In Tlsv1.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326389" id="1326389" title="Gnutls Server Does Not Accept Sha-384 And Sha-512 Certificate Verify Signatures Despite Advertising Support For Them" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326886" id="1326886" title="Gnutls Server Rejects Connections That Do Not Advertise Support For Sha-1 Signature Algorithms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327656" id="1327656" title="Gnutls-Serv: Closing Connection Without Sending An Alert Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328205" id="1328205" title="Gnutls-Cli Won'T Send Certificates That Don'T Match Hashes In Certificate Request" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333521" id="1333521" title="Provide Ability To Set The Expected Server Name In Gnutls-Serv Utility" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335924" id="1335924" title="Gnutls: Disable Tls Connections With Less Than 1024-Bit Dh Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337460" id="1337460" title="Disable/Remove Export Ciphersuites In Gnutls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384743" id="1384743" title="Ssl/Tls: Malformed Plain-Text Alert Packets Could Cause Remote Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411836" id="1411836" title="Gnutls: Heap Read Overflow In Read-Packet.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412235" id="1412235" title="Gnutls: Out Of Memory While Parsing Crafted Openpgp Certificate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412236" id="1412236" title="Gnutls: Stack Overflow In Cdk_Pk_Get_Keyid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415682" id="1415682" title="Changes Introduced By Rebase To 2.12.23 Break Api And Abi Compatibility For Some Libraries" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0621-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance. (CVE-2016-3712)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.503.el6" src="qemu-kvm-0.12.1.2-2.503.el6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.503.el6.x86_64.rpm</filename><sum type="sha256">e5d6958df40bc4873ce9ca0624955ef27183187f1555116da6de0734cdf28351</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.503.el6" src="qemu-kvm-0.12.1.2-2.503.el6.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.503.el6.x86_64.rpm</filename><sum type="sha256">d69f3757dc4bcba67f756e03cfce2219283049ca42f12311e01c437845e8c578</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.503.el6" src="qemu-kvm-0.12.1.2-2.503.el6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.503.el6.x86_64.rpm</filename><sum type="sha256">5f115e1eea0458cfb09f58e9242688719660795da8862339f382d9b0a70d758e</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.503.el6" src="qemu-kvm-0.12.1.2-2.503.el6.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.503.el6.x86_64.rpm</filename><sum type="sha256">76c2bdf327779973fd910d724e4932c141133815693cf3604bbf7ec8fded3fd4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" id="CVE-2016-3712" title="Qemu-Kvm: Out-Of-Bounds Read When Creating Weird Vga Screen Surface" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0621" id="RHSA-2017:0621-1" title="Rhsa-2017:0621-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281713" id="1281713" title="System_Reset Should Clear Pending Request For Error (Ide)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292678" id="1292678" title="Qemu Should Report Error When Cmdline Set Threads=2 In Amd Host" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294941" id="1294941" title="Qemu Crash On Snapshot Revert When Using Cirrus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297653" id="1297653" title="&quot;Qemu-Img Convert&quot; Can'T  Create A Fully Allocated Image Passed A &quot;-S 0&quot; Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300626" id="1300626" title="E1000/Rtl8139: Qemu Mac Address Can Not Be Changed Via Set The Hardware Address In Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318712" id="1318712" title="Qemu-Kvm: Out-Of-Bounds Read When Creating Weird Vga Screen Surface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320066" id="1320066" title="Qemu Should Not Report Error When Cmdline Set Threads=2 In Intel Host" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333697" id="1333697" title="Qemu-Kvm: /Builddir/Build/Build/Qemu-Kvm-0.12.1.2/Hw/Virtio-Scsi.C:724: Virtio_Scsi_Push_Event: Assertion `Event == 0' Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356924" id="1356924" title="Rtl8139 Driver Hangs In Widows Guests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361490" id="1361490" title="System_Reset Should Clear Pending Request For Error (Virtio-Blk)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392287" id="1392287" title="Core Dump Occurs When Query Qtree After Migration With &quot;-Vga Cirrus&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392520" id="1392520" title="[Rhel6.9] Kvm Guest Shuts Itself Down After 128Th Reboot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=876993" id="876993" title="Qemu-Kvm: Vm'S Become Non-Responsive During Migrate Disk Load From 2 Domains To A 3Ed" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0630-1</id><title>Tigervnc</title><description>Security Fix(es): 
* A denial of service flaw was found in the TigerVNC's Xvnc server. A remote unauthenticated attacker could use this flaw to make Xvnc crash by terminating the TLS handshake process early. (CVE-2016-10207) 
* A buffer overflow flaw, leading to memory corruption, was found in TigerVNC viewer. A remote malicious VNC server could use this flaw to crash the client vncviewer process resulting in denial of service. (CVE-2017-5581)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tigervnc-server-applet" release="24.el6" src="tigervnc-1.1.0-24.el6.src.rpm" version="1.1.0"><filename>tigervnc-server-applet-1.1.0-24.el6.noarch.rpm</filename><sum type="sha256">c205bf42bb39388fde4e9bd15f777a9b805804c84da095fe21d437ec9227f8b8</sum></package><package arch="x86_64" name="tigervnc" release="24.el6" src="tigervnc-1.1.0-24.el6.src.rpm" version="1.1.0"><filename>tigervnc-1.1.0-24.el6.x86_64.rpm</filename><sum type="sha256">dc031585c4c4267cb2df17dcefc1c54e20617097cb3120db90b9a29c39a4162d</sum></package><package arch="x86_64" name="tigervnc-server" release="24.el6" src="tigervnc-1.1.0-24.el6.src.rpm" version="1.1.0"><filename>tigervnc-server-1.1.0-24.el6.x86_64.rpm</filename><sum type="sha256">5280bfa826e5da4cc08b0bf20d6847d31e9040f2d891a94ec8fab41eef607104</sum></package><package arch="x86_64" name="tigervnc-server-module" release="24.el6" src="tigervnc-1.1.0-24.el6.src.rpm" version="1.1.0"><filename>tigervnc-server-module-1.1.0-24.el6.x86_64.rpm</filename><sum type="sha256">38ab60296e4a3b6f15b3f2780794fac84ff839ed67431f185fd4d8d252cb29e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207" id="CVE-2016-10207" title="Tigervnc: Vnc Server Can Crash When Tls Handshake Terminates Early" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581" id="CVE-2017-5581" title="Tigervnc: Buffer Overflow In Modifiablepixelbuffer::Fillrect" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0630" id="RHSA-2017:0630-1" title="Rhsa-2017:0630-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323065" id="1323065" title="Tigervnc Cannot Build Against Xorg-X11-Server-Source" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378922" id="1378922" title="Tigervnc-Server Needs To Be Rebuilt To Re-Enable Listen-On-Tcp Behavior In Rhel 6.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390458" id="1390458" title="New Version Of Tigervnc-Server Disconnects Xsession When Initiated From Xinetd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415712" id="1415712" title="Tigervnc: Buffer Overflow In Modifiablepixelbuffer::Fillrect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418761" id="1418761" title="Tigervnc: Vnc Server Can Crash When Tls Handshake Terminates Early" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0631-1</id><title>Wireshark</title><description>Security Fix(es): 
* Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2015-3811, CVE-2015-3812, CVE-2015-3813, CVE-2013-4075)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="wireshark-devel" release="25.el6" src="wireshark-1.8.10-25.el6.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-25.el6.x86_64.rpm</filename><sum type="sha256">8079a3e5c2f3b94a182c8f1b6f37407cb3e5e91bc4071dadd5b0916ba7fee788</sum></package><package arch="i686" name="wireshark" release="25.el6" src="wireshark-1.8.10-25.el6.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-25.el6.i686.rpm</filename><sum type="sha256">27962e02447cecd1532d96cf8f7877ea48e145a841fa42eb74883d68425ebe20</sum></package><package arch="i686" name="wireshark-devel" release="25.el6" src="wireshark-1.8.10-25.el6.src.rpm" version="1.8.10"><filename>wireshark-devel-1.8.10-25.el6.i686.rpm</filename><sum type="sha256">e31eed6cf9ab619d37a461785ece2bc469151944bd163e22ba7be7ad33376310</sum></package><package arch="x86_64" name="wireshark" release="25.el6" src="wireshark-1.8.10-25.el6.src.rpm" version="1.8.10"><filename>wireshark-1.8.10-25.el6.x86_64.rpm</filename><sum type="sha256">e4cd65bde4e5564c0b043df7b69dbbb452a16a4e964547af03223d7a914df5c4</sum></package><package arch="x86_64" name="wireshark-gnome" release="25.el6" src="wireshark-1.8.10-25.el6.src.rpm" version="1.8.10"><filename>wireshark-gnome-1.8.10-25.el6.x86_64.rpm</filename><sum type="sha256">9136de493042f0b381380e098e41f1d302982ff05e6e7c6219543e9143c21778</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075" id="CVE-2013-4075" title="Wireshark: Dos (Crash) In The Gmr-1 Bcch Dissector (Wnpa-Sec-2013-33)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" id="CVE-2015-3811" title="Wireshark: Wcp Dissector Crash (Wnpa-Sec-2015-14)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" id="CVE-2015-3812" title="Wireshark: X11 Memory Leak (Wnpa-Sec-2015-15)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" id="CVE-2015-3813" title="Wireshark: Reassembly Memory Leak (Wnpa-Sec-2015-16)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0631" id="RHSA-2017:0631-1" title="Rhsa-2017:0631-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222436" id="1222436" title="Wireshark: Wcp Dissector Crash (Wnpa-Sec-2015-14)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222437" id="1222437" title="Wireshark: X11 Memory Leak (Wnpa-Sec-2015-15)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222438" id="1222438" title="Wireshark: Reassembly Memory Leak (Wnpa-Sec-2015-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222895" id="1222895" title="Problems Decoding Tls Server Key Exchange Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222902" id="1222902" title="Encrypt-Then-Mac Tls Extension Unrecognised" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1238166" id="1238166" title="Tshark -F Option Fails To Create Capture Files In .Pcap Format." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1240675" id="1240675" title="No Dissection Of The Tls Certificate Verify Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=972680" id="972680" title="Wireshark: Dos (Crash) In The Gmr-1 Bcch Dissector (Wnpa-Sec-2013-33)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0641-1</id><title>Openssh</title><description>Security Fix(es): 
* It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program. In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root. (CVE-2015-8325)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssh-server" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-122.el6.x86_64.rpm</filename><sum type="sha256">cb4d4f39a1a02ddee8f186b00a3d68cfeea6ac65071aea4af1b584f20f22f90f</sum></package><package arch="x86_64" name="openssh" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="5.3p1"><filename>openssh-5.3p1-122.el6.x86_64.rpm</filename><sum type="sha256">1622eafa106c9cabe7e144500add4d62c91c76e0d257b4b57d81f70b1e5adef8</sum></package><package arch="x86_64" name="openssh-ldap" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-122.el6.x86_64.rpm</filename><sum type="sha256">e2b25c7af2027f6beb54f80c9e03deddaee65a1c67ab5a4f3af8a47134439882</sum></package><package arch="x86_64" name="openssh-clients" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-122.el6.x86_64.rpm</filename><sum type="sha256">cf67d3ef9bcdbe1900da2e37baf20d3e536aa60de551196fe2ad82dc827e1f31</sum></package><package arch="x86_64" name="openssh-askpass" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-122.el6.x86_64.rpm</filename><sum type="sha256">d151021897665b666d4aa16f56c26ab3eb5cde365a06a1142191d7b4ec0194f3</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-122.el6.x86_64.rpm</filename><sum type="sha256">518dbc26ffb56d596a7c3036274566ab537055fb39fd7d0cb43a87b304112a5b</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="122.el6" src="openssh-5.3p1-122.el6.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-122.el6.i686.rpm</filename><sum type="sha256">543cde734e09fc76a49702474e0708778a7272ff7047b94ed32817eefc474d45</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" id="CVE-2015-8325" title="Openssh: Privilege Escalation Via User'S Pam Environment And Uselogin=Yes" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0641" id="RHSA-2017:0641-1" title="Rhsa-2017:0641-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218424" id="1218424" title="Infinite Loop, At 100% Cpu In Ssh If ^Z Is Pressed At Password Prompt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327547" id="1327547" title="Ssh-Copy-Id Fails With Shells Unaware Of ~/" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328012" id="1328012" title="Openssh: Privilege Escalation Via User'S Pam Environment And Uselogin=Yes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341747" id="1341747" title="Sftp -M Doesn'T Work As Advertised" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353359" id="1353359" title="5.3P1-117.El6 Breaks Gss-Group1-Sha1- Key Exchange Algorithm For Gssapikeyexchange Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353410" id="1353410" title="[Ssh-Copy-Id] Add &quot;The Agent Has No Identities.&quot; In Remote ~/.Ssh/Authorized_Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373836" id="1373836" title="Remove Rc4 Cipher And Questionable Macs Enabled By Default From Openssh" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397547" id="1397547" title="Ssh Does Not Use The Ibmca Crypto Hardware" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0654-1</id><title>Coreutils</title><description>Security Fix(es): 
* A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="coreutils" release="46.el6" src="coreutils-8.4-46.el6.src.rpm" version="8.4"><filename>coreutils-8.4-46.el6.x86_64.rpm</filename><sum type="sha256">8ddb6717a3435ee65b55d154c05b5fe7f66112828f857f7e2ed61ed8f1107198</sum></package><package arch="x86_64" name="coreutils-libs" release="46.el6" src="coreutils-8.4-46.el6.src.rpm" version="8.4"><filename>coreutils-libs-8.4-46.el6.x86_64.rpm</filename><sum type="sha256">9712ad5837a1ace8590b3e30df6a716d6c06aed36e6ae4fb8bfc87c3aa71229e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" id="CVE-2017-2616" title="Util-Linux: Sending Sigkill To Other Processes With Root Privileges Via Su" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0654" id="RHSA-2017:0654-1" title="Rhsa-2017:0654-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418710" id="1418710" title="Util-Linux: Sending Sigkill To Other Processes With Root Privileges Via Su" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0662-1</id><title>Samba</title><description>Security Fix(es): 
* It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) 
* A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-domainjoin-gui" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">8092f20ca0a5163a414b64929f4ace092a4fd55bf9ff33d5679e15b17f41b59f</sum></package><package arch="i686" name="libsmbclient" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-41.el6.i686.rpm</filename><sum type="sha256">4a0002aa8a816a6c268a074466461530b88929e2488cdbc8022a585330f8de59</sum></package><package arch="x86_64" name="libsmbclient" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">fe97104c205308e6910d724560620c7042fdb6c71294fa9f92597d84b8ea127c</sum></package><package arch="x86_64" name="samba-client" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">8a7c10b2a6d4a4435b0a6fc7242be811dd7a8deb5eb3644299a2e398b05cacd5</sum></package><package arch="x86_64" name="samba-glusterfs" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">ab109bfa73bc73005123441a139bd448ad24499d5aa6648c9f480a8322b97674</sum></package><package arch="i686" name="libsmbclient-devel" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-41.el6.i686.rpm</filename><sum type="sha256">a5368298e5623b69446a5746cfc72a8ec904db29682b022c5e8739fa90945c0d</sum></package><package arch="i686" name="samba-winbind-devel" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-41.el6.i686.rpm</filename><sum type="sha256">d9fc9a47a5ba98b9b5622f85cb787b1c6c2cf9db7d8c798bfb5f61c01e311730</sum></package><package arch="x86_64" name="samba-swat" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">4829f585d34ae77de08392ff592493c46d1755edab2b86c69c9bf1d445271b53</sum></package><package arch="i686" name="samba-common" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-41.el6.i686.rpm</filename><sum type="sha256">b449d5c1a6a393e880e39c5634aad6690ecdaa567c864203c3f5a7d974ababa7</sum></package><package arch="x86_64" name="samba-doc" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">9d72e5f7f0a94fadbeb91d39acb071033353df7fd63710e1c6bfe410b8679194</sum></package><package arch="x86_64" name="libsmbclient-devel" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">16c346822db0cbb503b7d8c658013781f136b86a43ecc6138d984355e3c816f4</sum></package><package arch="x86_64" name="samba-winbind-devel" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">bde761521ba41450710105a0657c05d206eafad4827136cbb4c5987ae28c357e</sum></package><package arch="i686" name="samba-winbind-clients" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-41.el6.i686.rpm</filename><sum type="sha256">746097bac4bb6d4c1b8b2a310d4a47631cdaf29be1bf6c959dbd65c589d0e11c</sum></package><package arch="x86_64" name="samba-common" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">4aef8df838908df293a8e1f3a531646104d0546d597ae8431cc95f53e9140fc1</sum></package><package arch="x86_64" name="samba" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">d24f1c240529cde6a3bc6f34636ab3fa231f64c83e1c1c6ba7ee192a4ac216b8</sum></package><package arch="x86_64" name="samba-winbind" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">3b3aafaaef35e1df9b1ad83d74c2730cb09c7ba453a4a37d32f88028607e3c70</sum></package><package arch="x86_64" name="samba-winbind-clients" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">bab4345da5681a2a373a02ef5014d5b7b026dc8afda011655c1d9a95c313b33a</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="41.el6" src="samba-3.6.23-41.el6.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-41.el6.x86_64.rpm</filename><sum type="sha256">556dab947a8269adfb4720381f7339209fe52abf9a7610f5afa0e2d530206b51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" id="CVE-2016-2125" title="Samba: Unconditional Privilege Delegation To Kerberos Servers In Trusted Realms" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" id="CVE-2016-2126" title="Samba: Flaws In Kerberos Pac Validation Can Trigger Privilege Elevation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0662" id="RHSA-2017:0662-1" title="Rhsa-2017:0662-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327697" id="1327697" title="Schannel Connections Fail To The Dc Because Netlogon Credentials Are Not Updated Correctly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372611" id="1372611" title="Netapp Smb Servers Don'T Negotiate Ntlmssp_Sign For Session Key Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403114" id="1403114" title="Samba: Unconditional Privilege Delegation To Kerberos Servers In Trusted Realms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403115" id="1403115" title="Samba: Flaws In Kerberos Pac Validation Can Trigger Privilege Elevation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413672" id="1413672" title="Badlock Regression: Member Fails To Authenticate Against Nt4_Dc, If The Member Changes It Secret" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0680-1</id><title>Glibc</title><description>Security Fix(es): 
* A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) 
* It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) 
* An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) 
* A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glibc" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">1fd33393730d411c8adbb89e99301f76105fafcdb8431eb3b5863a4b88ee3c7f</sum></package><package arch="x86_64" name="glibc-headers" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">bd2af058bfc2b404c689190f2b340f8dd1a96f41476fff8301e609a076fae5c4</sum></package><package arch="x86_64" name="glibc-common" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-common-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">e2c50e8f6066995e38722b282e110d7592306c32e0fdd066b2574568e9c09d23</sum></package><package arch="x86_64" name="glibc-utils" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">af6dfeca16331db8c048323686a6ee1b076bf77e1b0bef3619395d71cb0dabd6</sum></package><package arch="x86_64" name="glibc-static" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-static-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">6b9fd2e625de61c585c1c0a795babf0143a8aee1b09b7d1f2389ca7246327190</sum></package><package arch="i686" name="glibc" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-2.12-1.209.el6.i686.rpm</filename><sum type="sha256">19ee5487de898c28918b5c2f782361ae7241736c8d98303510008c956ea0fe68</sum></package><package arch="i686" name="glibc-devel" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.209.el6.i686.rpm</filename><sum type="sha256">e7b5e0b047ce56d4ca7a8b6e208df8e68a07a5663c543b3178ac6138559783bf</sum></package><package arch="i686" name="glibc-static" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-static-2.12-1.209.el6.i686.rpm</filename><sum type="sha256">dcd5c6984fa68879783e0c99970ace2b6054cfec8f300d65aeee865799ee4ecb</sum></package><package arch="x86_64" name="glibc-devel" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">1d632a8c91fef07f5ca5a647e3254770f5191359f857f09f3b7dff98548a0048</sum></package><package arch="x86_64" name="nscd" release="1.209.el6" src="glibc-2.12-1.209.el6.src.rpm" version="2.12"><filename>nscd-2.12-1.209.el6.x86_64.rpm</filename><sum type="sha256">deff1c06c116817b74f9df1a1494eab704eb1053daea6c84ae52d9534ce4e194</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" id="CVE-2014-9761" title="Glibc: Unbounded Stack Allocation In Nan* Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" id="CVE-2015-8776" title="Glibc: Segmentation Fault Caused By Passing Out-Of-Range Data To Strftime()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" id="CVE-2015-8778" title="Glibc: Integer Overflow In Hcreate And Hcreate_R" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" id="CVE-2015-8779" title="Glibc: Unbounded Stack Allocation In Catopen Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0680" id="RHSA-2017:0680-1" title="Rhsa-2017:0680-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1012343" id="1012343" title="Thread Issue In Glibc Can Cause The Application To Not Get Any Identity Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1101858" id="1101858" title="Glibc: Add El_Gr@Euro, Ur_In, And Wal_Et Locales" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223095" id="1223095" title="Access To Uninitialized Memory In Getaddrinfo If Nscd Is Running" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270950" id="1270950" title="Getaddrinfo() Takes Long Time When Lots Of Ip Addresses Are Configured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300299" id="1300299" title="Glibc: Segmentation Fault Caused By Passing Out-Of-Range Data To Strftime()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300303" id="1300303" title="Glibc: Integer Overflow In Hcreate And Hcreate_R" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300310" id="1300310" title="Glibc: Unbounded Stack Allocation In Nan* Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300312" id="1300312" title="Glibc: Unbounded Stack Allocation In Catopen Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373646" id="1373646" title="Tzdata-Update Uses Default Umask" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416496" id="1416496" title="Getaddrinfo() Call Returns Wrong Ipv6 Address If Nscd Is Used" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0698-1</id><title>Subscription-Manager</title><description>Security Fix(es): 
* It was found that subscription-manager set weak permissions on files in /var/lib/rhsm/, causing an information disclosure. A local, unprivileged user could use this flaw to access sensitive data that could potentially be used in a social engineering attack. (CVE-2016-4455)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="subscription-manager-plugin-container" release="1.el6" src="subscription-manager-1.18.10-1.el6.src.rpm" version="1.18.10"><filename>subscription-manager-plugin-container-1.18.10-1.el6.x86_64.rpm</filename><sum type="sha256">3496a314e13428c344e0ebccd6082ae5111e33a36f9ba73aeff4cfa3745dcad8</sum></package><package arch="x86_64" name="python-rhsm-certificates" release="1.el6" src="python-rhsm-1.18.6-1.el6.src.rpm" version="1.18.6"><filename>python-rhsm-certificates-1.18.6-1.el6.x86_64.rpm</filename><sum type="sha256">e9d8d0308ea057107988c6a695fa29f5f72b25d98b6d7cbf07ced18c8ce87dc3</sum></package><package arch="x86_64" name="subscription-manager-gui" release="1.el6" src="subscription-manager-1.18.10-1.el6.src.rpm" version="1.18.10"><filename>subscription-manager-gui-1.18.10-1.el6.x86_64.rpm</filename><sum type="sha256">7160e7259a429375a226e9d92d6a31f5b8f6656b774e2f9cf6d43aa9dab5dc7e</sum></package><package arch="x86_64" name="python-rhsm" release="1.el6" src="python-rhsm-1.18.6-1.el6.src.rpm" version="1.18.6"><filename>python-rhsm-1.18.6-1.el6.x86_64.rpm</filename><sum type="sha256">972a64684f701ee6fe21fe8fba78a9693778050f453c2e7b9c0b62376e64dad5</sum></package><package arch="x86_64" name="subscription-manager" release="1.el6" src="subscription-manager-1.18.10-1.el6.src.rpm" version="1.18.10"><filename>subscription-manager-1.18.10-1.el6.x86_64.rpm</filename><sum type="sha256">c646d81f838cf1d1f52b7275c84b3350cbb75d2c438f5ac8e9d8a86df3e6f6cd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4455" id="CVE-2016-4455" title="Subscription-Manager: Sensitive World Readable Files In /Var/Lib/Rhsm/" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0698" id="RHSA-2017:0698-1" title="Rhsa-2017:0698-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176219" id="1176219" title="Subscription-Manager Repos --List With Bad Proxy Options Is Silently Using Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185914" id="1185914" title="[Rfe] Rhn-Migrate-Classic-To-Rhsm Should Give The Option To Remove Rhn Classic Related Packages / Daemons" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1232472" id="1232472" title="Rhel-X86_64-Server-Sap-Hana-6 Channel Maps Are Missing From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283749" id="1283749" title="Some Gui Dialogs Which Should Be Error Dialogs Are Information Dialogs, Breaking Automated Testing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286842" id="1286842" title="'Rhel-X86_64-Server-6-Rh-Gluster-3-Samba-Debuginfo' Channel Map Is Missing From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287925" id="1287925" title="/Bin/Sh /Etc/Cron.Daily/Rhsmd Does Not Stop." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298140" id="1298140" title="There Is No Proper Icon In License Window Nor In Date Selection Window For Subscription-Manager-Gui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301215" id="1301215" title="The Cmd &quot;Repos --List --Proxy&quot; With A Fake Proxy Server Url Will Not Stop Running." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315591" id="1315591" title="Gui : No Network Is Thrown When You Try To Remove A Subscription On The System With No Network" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317613" id="1317613" title="Typo In Src/Subscription_Manager/Gui/Data/Ui/Selectsla.Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320507" id="1320507" title="Wrong Prefix Prompts When Register Using Serverurl Without Prefix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320597" id="1320597" title="Rhel-X86_64-Server-Hpn-Fastrack-6 Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320607" id="1320607" title="Rhel-X86_64-Server-Hpn-6 Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320647" id="1320647" title="Rhn Channels 'Rhel-Arch-Workstation-6-Thirdparty-Oracle-Java-Beta' Should Maps To The Beta Product Cert, Not The Ga Cert." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1321831" id="1321831" title="When Consumer Id Has Been Deleted, The Back Button And Next Button Should Be Disabled In Attaching Window." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323276" id="1323276" title="Proxy Dialog Displays None:{None,3128} In Field &quot;Proxy Location&quot; In Some Cases" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327179" id="1327179" title="Subscription Manager Cannot Start When Entitlement Server Is Unreachable In Case A Proxy Connection Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337817" id="1337817" title="The 'Start-End Date' Of Expired Subscription Is Not In Red Status When The Subscription Expired." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340525" id="1340525" title="Subscription-Manager: Sensitive World Readable Files In /Var/Lib/Rhsm/" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351009" id="1351009" title="Error When Disable All Repos By 'Subscription-Manager Repos --Disable=*'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367128" id="1367128" title="[Rfe] Upload Fqdn With Facts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382355" id="1382355" title="Cli Does Not Display Error Message When Auto-Attach Has Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383475" id="1383475" title="Rebase Subscription-Manager Component To The Latest Upstream Branch For Rhel 6.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385382" id="1385382" title="Rebase Python-Rhsm Component To The Latest Upstream Branch For Rhel 6.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385446" id="1385446" title="Rebase Subscription-Manager-Migration-Data Component To The Latest Upstream Branch For Rhel 6.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389559" id="1389559" title="Logging To /Var/Log/Rhsm/Rhsm.Log Ceases After Upgrade From Rhel6.8 To Rhel6.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390258" id="1390258" title="Rhn-Migrate-Classic-To-Rhsm --Keep --Remove-Rhn-Packages Should Error Out Due To Conflicting Options" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390341" id="1390341" title="Rhn-Migrate-Classic-To-Rhsm Is Failing To Stop And Disable Services" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390688" id="1390688" title="Global Name 'Socket' Is Not Defined" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390712" id="1390712" title="Man Page For Rhn-Migrate-Classic-To-Rhsm Needs A Description For New Option --Remove-Rhn-Packages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391681" id="1391681" title="Zanata Translations For Subscription-Manager 1.18 Are Not 100%" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393573" id="1393573" title="Subscription-Manager-Migration-Data For Rhel6.9 Needs Rhel6.9 Product Certs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394351" id="1394351" title="'Module' Object Has No Attribute 'Proxy_Authentication_Required'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394776" id="1394776" title="Registration Fails With Remoteserverexception: Server Error Attempting A Get To /Subscription/Users/Stage_Test_Rhel69/Owners Returned Status 404" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395659" id="1395659" title="Firstboot : Exception Occurs While Trying To Register Via Auth Proxy With Invalid Credentials" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395662" id="1395662" title="Firstboot: Exception Occured While Trying To Register The System Using Activation-Key With  Org And Activation-Key Field Empty" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395684" id="1395684" title="Gui: No Error Dialogue When You Try To Register Via Auth Proxy Without Selecting &quot;Use Authentication With Http Proxy&quot; Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395794" id="1395794" title="/Usr/Libexec/Rhsmd Is Failing With Importerror: No Module Named Decorator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396405" id="1396405" title="Message &quot;An Integer Is Required&quot; Is Displayed When Tired To List Release Versions Against Stage Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397201" id="1397201" title="Attributeerror: 'Module' Object Has No Attribute 'Badstatusline'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400719" id="1400719" title="Attributeerror: 'Contentconnection' Object Has No Attribute 'Proxy_Host'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401078" id="1401078" title="Unrepeatable &quot;Badstatusline&quot; Tracebacks Are Silently Encountered When Stage Testing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402009" id="1402009" title="Subscription-Manager Stdout Contains Esc[?1034H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403387" id="1403387" title="There Is An Error In Processing The Specified Proxy Arguments Versus Proxy Configurations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404930" id="1404930" title="Unable To Launch Subscription-Manager Gui When Configure Invalid Proxy In Proxy Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417731" id="1417731" title="[Ko][Pt_Br] Pofilter Endwhitespace Test Fails For Subscription-Manager 1.18.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417736" id="1417736" title="[Pt_Br][Fr][Ja] Pofilter Accelerators Test Fails For Subscription-Manager 1.18.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417740" id="1417740" title="[Ko] Pofilter Startwhitespace Test Fails For Subscription-Manager 1.18.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417746" id="1417746" title="[It][Fr][Es_Es][Pt_Br] Pofilter Unchanged Test Fails For Subscription-Manager 1.18.X" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0725-1</id><title>Bash</title><description>Security Fix(es): 
* An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances. (CVE-2016-0634) 
* An arbitrary command injection flaw was found in the way bash processed the SHELLOPTS and PS4 environment variables. A local, authenticated attacker could use this flaw to exploit poorly written setuid programs to elevate their privileges under certain circumstances. (CVE-2016-7543) 
* A denial of service flaw was found in the way bash handled popd commands. A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session. (CVE-2016-9401)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="bash" release="48.el6" src="bash-4.1.2-48.el6.src.rpm" version="4.1.2"><filename>bash-4.1.2-48.el6.x86_64.rpm</filename><sum type="sha256">557c501c2850f1d1786d44f9957d3f3f03c1ee50ca53d1e861ffb37dbed3e42b</sum></package><package arch="x86_64" name="bash-doc" release="48.el6" src="bash-4.1.2-48.el6.src.rpm" version="4.1.2"><filename>bash-doc-4.1.2-48.el6.x86_64.rpm</filename><sum type="sha256">83b08129f9e069188525cd7ce0ad2ed264bebe712590d59d2d256c2a692efb96</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" id="CVE-2016-0634" title="Bash: Arbitrary Code Execution Via Malicious Hostname" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" id="CVE-2016-7543" title="Bash: Specially Crafted Shellopts+Ps4 Variables Allows Command Substitution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" id="CVE-2016-9401" title="Bash: Popd Controlled Free" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0725" id="RHSA-2017:0725-1" title="Rhsa-2017:0725-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377613" id="1377613" title="Bash: Arbitrary Code Execution Via Malicious Hostname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379630" id="1379630" title="Bash: Specially Crafted Shellopts+Ps4 Variables Allows Command Substitution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396383" id="1396383" title="Bash: Popd Controlled Free" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0744-1</id><title>Samba4</title><description>Security Fix(es): 
* It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) 
* A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-winbind" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">a0cb3696716d6ef2a292056ada2f7c1affd6055c18a5a20b4908cf8f0d958076</sum></package><package arch="x86_64" name="samba4" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">69e04a2f10fa9aac733b0f9c65d9fdfd76a642350f46ca493ccee22a49890ffb</sum></package><package arch="x86_64" name="samba4-dc" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">a4ecdaa102e8fe555ff9b37422bfd2e8bc820877e6f7527f91bf1ff3f9f62ee7</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">28c07fe3940dd927f98bf78c6d83ef5d2d73066d410d970efc21bfe9a3fab17b</sum></package><package arch="x86_64" name="samba4-pidl" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">21e4b9ee94f6db7c77c9a9234c0a085b64f8420d79aae15db04497f572a05ce1</sum></package><package arch="x86_64" name="samba4-client" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">09aceb2f07917136d6344a745d1f0d531e0d87c6b6e0dbfe27c08471805bee43</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">494f43f4d83da2652d99a5b6714a71eca10653b8ddb8ded5e3ae64cd57b6d222</sum></package><package arch="x86_64" name="samba4-libs" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">a3a9de2f0738c78d1adb21b5845afb211f3e8a74148fdffaad0adf7ef3ff78df</sum></package><package arch="x86_64" name="samba4-devel" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">9ab15850a6d9dc1ce7a79e161c5cdb93661d640d6458000d2b50a5fdc546a0d9</sum></package><package arch="x86_64" name="samba4-test" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">81ae50339f91c0c43c145c98aa4ef25cc6713367572f0a05a0b96f05bd86138d</sum></package><package arch="x86_64" name="samba4-python" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">399fd139f0aaf96ac27947a398feff2ca2b360bf5d02a4283354be2c763d2d93</sum></package><package arch="x86_64" name="samba4-common" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">1d59073e7a72b97562e705308eab7edf0358ca4450b23070e2bb706711e111c1</sum></package><package arch="x86_64" name="samba4-dc-libs" release="9.el6" src="samba4-4.2.10-9.el6.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-9.el6.x86_64.rpm</filename><sum type="sha256">ca4015b5613f49bd7f7c82ec24dfcd7adf755092f30ab4d92e01c59f402b5bff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" id="CVE-2016-2125" title="Samba: Unconditional Privilege Delegation To Kerberos Servers In Trusted Realms" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" id="CVE-2016-2126" title="Samba: Flaws In Kerberos Pac Validation Can Trigger Privilege Elevation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0744" id="RHSA-2017:0744-1" title="Rhsa-2017:0744-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403114" id="1403114" title="Samba: Unconditional Privilege Delegation To Kerberos Servers In Trusted Realms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403115" id="1403115" title="Samba: Flaws In Kerberos Pac Validation Can Trigger Privilege Elevation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0794-1</id><title>Quagga</title><description>Security Fix(es): 
* A stack-based buffer overflow flaw was found in the way Quagga handled IPv6 router advertisement messages. A remote attacker could use this flaw to crash the zebra daemon resulting in denial of service. (CVE-2016-1245) 
* A stack-based buffer overflow flaw was found in the way the Quagga BGP routing daemon (bgpd) handled Labeled-VPN SAFI routes data. A remote attacker could use this flaw to crash the bgpd daemon resulting in denial of service. (CVE-2016-2342) 
* A denial of service flaw was found in the Quagga BGP routing daemon (bgpd). Under certain circumstances, a remote attacker could send a crafted packet to crash the bgpd daemon resulting in denial of service. (CVE-2016-4049) 
* A denial of service flaw affecting various daemons in Quagga was found. A remote attacker could use this flaw to cause the various Quagga daemons, which expose their telnet interface, to crash. (CVE-2017-5495) 
* A stack-based buffer overflow flaw was found in the way the Quagga OSPFD daemon handled LSA (link-state advertisement) packets. A remote attacker could use this flaw to crash the ospfd daemon resulting in denial of service. (CVE-2013-2236)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="quagga" release="14.el6" src="quagga-0.99.15-14.el6.src.rpm" version="0.99.15"><filename>quagga-0.99.15-14.el6.x86_64.rpm</filename><sum type="sha256">62a0ace592f6eae348725a7b4f7434a792def0f006dcd879c9e36ed2c3dc74fc</sum></package><package arch="i686" name="quagga-devel" release="14.el6" src="quagga-0.99.15-14.el6.src.rpm" version="0.99.15"><filename>quagga-devel-0.99.15-14.el6.i686.rpm</filename><sum type="sha256">a701c3d18347bfc83ddad14e2bebe8851e487940d7ed01dd29876209fa3b2b65</sum></package><package arch="x86_64" name="quagga-devel" release="14.el6" src="quagga-0.99.15-14.el6.src.rpm" version="0.99.15"><filename>quagga-devel-0.99.15-14.el6.x86_64.rpm</filename><sum type="sha256">efec956e32ac8da8216b880e1fc59f7d6efcd28775f772cbe2fa218a132c95a5</sum></package><package arch="x86_64" name="quagga-contrib" release="14.el6" src="quagga-0.99.15-14.el6.src.rpm" version="0.99.15"><filename>quagga-contrib-0.99.15-14.el6.x86_64.rpm</filename><sum type="sha256">e097b54ecf49f093838eec4e2e1c9a982ed191af162d96afe0b96518736dbed6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236" id="CVE-2013-2236" title="Quagga: Ospfd Potential Remote Code Exec (Stack Based Buffer Overflow)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1245" id="CVE-2016-1245" title="Quagga: Buffer Overflow In Ipv6 Ra Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342" id="CVE-2016-2342" title="Quagga: Vpnv4 Nlri Parser Memcpys To Stack On Unchecked Length" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4049" id="CVE-2016-4049" title="Quagga: Denial Of Service Vulnerability In Bgp Routing Daemon" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5495" id="CVE-2017-5495" title="Quagga: Telnet Interface Input Buffer Allocates Unbounded Amounts Of Memory" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0794" id="RHSA-2017:0794-1" title="Rhsa-2017:0794-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316571" id="1316571" title="Quagga: Vpnv4 Nlri Parser Memcpys To Stack On Unchecked Length" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331372" id="1331372" title="Quagga: Denial Of Service Vulnerability In Bgp Routing Daemon" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386109" id="1386109" title="Quagga: Buffer Overflow In Ipv6 Ra Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416013" id="1416013" title="Quagga: Telnet Interface Input Buffer Allocates Unbounded Amounts Of Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=674862" id="674862" title="Add Missing Man Pages In Quagga Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=770731" id="770731" title="Interface Prefix Advertisement Declaration Prevents Ospf6D From Starting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=839620" id="839620" title="/Etc/Sysconfig/Quagga Defines Qconfdir, Init Scripts Do Not Use It" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=842308" id="842308" title="Quagga Daemon Pidfiles Remain After Daemons Are Stopped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=862826" id="862826" title="Correct Spec To Add Watchquagga" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=981124" id="981124" title="Quagga: Ospfd Potential Remote Code Exec (Stack Based Buffer Overflow)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0817-1</id><title>Kernel</title><description>Security Fix(es): 
* It was discovered that a remote attacker could leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and could subsequently perform any type of a fragmentation- based attack against legacy IPv6 nodes that do not implement RFC6946. (CVE-2016-10142, Moderate) 
* A flaw was discovered in the way the Linux kernel dealt with paging structures. When the kernel invalidated a paging structure that was not in use locally, it could, in principle, race against another CPU that is switching to a process that uses the paging structure in question. A local user could use a thread running with a stale cached virtual-&gt;physical translation to potentially escalate their privileges if the translation in question were writable and the physical page got reused for something critical (for example, a page table). (CVE-2016-2069, Moderate) 
* A race condition flaw was found in the ioctl_send_fib() function in the Linux kernel's aacraid implementation. A local attacker could use this flaw to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value. (CVE-2016-6480, Moderate) 
* It was found that when the gcc stack protector was enabled, reading the /proc/keys file could cause a panic in the Linux kernel due to stack corruption. This happened because an incorrect buffer size was used to hold a 64-bit timeout value rendered as weeks. (CVE-2016-7042, Moderate) 
* It was found that when file permissions were modified via chmod and the user modifying them was not in the owning group or capable of CAP_FSETID, the setgid bit would be cleared. Setting a POSIX ACL via setxattr sets the file permissions as well as the new ACL, but doesn't clear the setgid bit in a similar way. This could allow a local user to gain group privileges via certain setgid applications. (CVE-2016-7097, Moderate) 
* A flaw was found in the Linux networking subsystem where a local attacker with CAP_NET_ADMIN capabilities could cause an out-of-bounds memory access by creating a smaller-than-expected ICMP header and sending to its destination via sendto(). (CVE-2016-8399, Moderate) 
* It was found that the blk_rq_map_user_iov() function in the Linux kernel's block device implementation did not properly restrict the type of iterator, which could allow a local attacker to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging write access to a /dev/sg device. (CVE-2016-9576, CVE-2016-10088, Moderate) 
* A flaw was found in the USB-MIDI Linux kernel driver: a double-free error could be triggered for the 'umidi' object. An attacker with physical access to the system could use this flaw to escalate their privileges. (CVE-2016-2384, Low)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">03c194a8259f62fcb8cf8376a004bb49a6db8019606dde154e6e1b8384ffd042</sum></package><package arch="x86_64" name="kernel-debug" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">11c6f31cdf311ec4104e43275836048c48f0f8383b67f78eaf716dbb65cb68ed</sum></package><package arch="noarch" name="kmod-openafs" release="1.SL69.sl6" src="kmod-openafs-1.6.20-1.SL69.sl6.src.rpm" version="1.6.20"><filename>kmod-openafs-1.6.20-1.SL69.sl6.noarch.rpm</filename><sum type="sha256">992d75a446ba1607f4c3c150da54734fdfd64ba16f3ef628e65ca949388786bc</sum></package><package arch="noarch" name="kernel-firmware" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.el6.noarch.rpm</filename><sum type="sha256">0c6698e1d158e5a5fc4bb241e1f330c8167ecff0ddddf6cd67d4f9e8c526f4ae</sum></package><package arch="x86_64" name="kernel-devel" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">e84321083f69425895df13802bbea0c3bdbc384b9bbf0c18442a86d31be80afe</sum></package><package arch="x86_64" name="python-perf" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">5a7b609eb8203cec4a60e6df355e75945e3265b259cc5b991888d1ebf612b0b3</sum></package><package arch="x86_64" name="kernel-headers" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">656d0efe4f5279bc24aac792ce48d76a388eeba8491408a63e07ceb114f9f749</sum></package><package arch="x86_64" name="kmod-openafs-696" release="256.sl6.696" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>kmod-openafs-696-1.6.20-256.sl6.696.x86_64.rpm</filename><sum type="sha256">f374ee737e15faa39fc0c81ed2a11d35654bedca731746415b37cb3c18fd2037</sum></package><package arch="x86_64" name="perf" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">36da3e23c29f89dd9589bafc60e2d3b527bd2e5ca3392b65b97f2c4edd4caf06</sum></package><package arch="i686" name="kernel-debug-devel" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.el6.i686.rpm</filename><sum type="sha256">25a8e77adb41b97b7239edc9eec0d389a081cc3615710d7489a1649c27734e2c</sum></package><package arch="noarch" name="kernel-doc" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.el6.noarch.rpm</filename><sum type="sha256">fb228f439e308f22fe95bb40c8040aa48aa10b1e9beab156632186a49bd5ab01</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.el6.noarch.rpm</filename><sum type="sha256">373fc25e40b0055243999fdc6accdcee6af21e033ba3fa8a2d898d300a535185</sum></package><package arch="x86_64" name="kernel" release="696.el6" src="kernel-2.6.32-696.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.el6.x86_64.rpm</filename><sum type="sha256">f48b42d12bf2d367963e9361a275d813ae727a74b04d2a6087e9cc15a1e31680</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" id="CVE-2016-10088" title="Kernel: Use After Free In Scsi Generic Device Interface (Cve-2016-9576 Regression)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10142" id="CVE-2016-10142" title="Kernel - Ipv6 Fragmentation Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" id="CVE-2016-2069" title=" Kernel: Race Condition In The Tlb Flush Logic" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" id="CVE-2016-2384" title="Kernel: Double-Free In Usb-Audio Triggered By Invalid Usb Descriptor" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" id="CVE-2016-6480" title="Kernel: Scsi: Aacraid: Double Fetch In Ioctl_Send_Fib()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" id="CVE-2016-7042" title="Kernel: Stack Corruption While Reading /Proc/Keys When Gcc Stack Protector Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" id="CVE-2016-7097" title="Kernel: Setting A Posix Acl Via Setxattr Doesn'T Clear The Setgid Bit" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399" id="CVE-2016-8399" title="Kernel: Net: Out Of Bounds Stack Read In Memcpy_Fromiovec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" id="CVE-2016-9576" title="Kernel: Use After Free In Scsi Generic Device Interface" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0817" id="RHSA-2017:0817-1" title="Rhsa-2017:0817-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301893" id="1301893" title=" Kernel: Race Condition In The Tlb Flush Logic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308444" id="1308444" title="Kernel: Double-Free In Usb-Audio Triggered By Invalid Usb Descriptor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325766" id="1325766" title="Rhel6.7: Nfsv3 Client Performance Regression Where Ls -L Takes Too Long With &quot;Aggressive Readdirplus&quot; Commit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362466" id="1362466" title="Kernel: Scsi: Aacraid: Double Fetch In Ioctl_Send_Fib()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368938" id="1368938" title="Kernel: Setting A Posix Acl Via Setxattr Doesn'T Clear The Setgid Bit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373966" id="1373966" title="Kernel: Stack Corruption While Reading /Proc/Keys When Gcc Stack Protector Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403145" id="1403145" title="Kernel: Use After Free In Scsi Generic Device Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403833" id="1403833" title="Kernel: Net: Out Of Bounds Stack Read In Memcpy_Fromiovec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412210" id="1412210" title="Kernel: Use After Free In Scsi Generic Device Interface (Cve-2016-9576 Regression)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415908" id="1415908" title="Kernel - Ipv6 Fragmentation Flaw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=847106" id="847106" title="Ext2 Tests Hang While Running Fsfuzzer" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0847-1</id><title>Curl</title><description>Security Fix(es): 
* It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. (CVE-2017-2628)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libcurl" release="53.el6_9" src="curl-7.19.7-53.el6_9.src.rpm" version="7.19.7"><filename>libcurl-7.19.7-53.el6_9.i686.rpm</filename><sum type="sha256">5bbc01fe12b11dcaff88c84555839fa0d8ced7475befb2ef0645fe82c53d72fa</sum></package><package arch="i686" name="libcurl-devel" release="53.el6_9" src="curl-7.19.7-53.el6_9.src.rpm" version="7.19.7"><filename>libcurl-devel-7.19.7-53.el6_9.i686.rpm</filename><sum type="sha256">b723bd289740d91c37ead4ad92e9ee01d201e59e0d10944afff717028d913729</sum></package><package arch="x86_64" name="libcurl" release="53.el6_9" src="curl-7.19.7-53.el6_9.src.rpm" version="7.19.7"><filename>libcurl-7.19.7-53.el6_9.x86_64.rpm</filename><sum type="sha256">f42d050a0dbcaf125f8f6b6517cee7c6786a6a8c73cd995415251c6c701a208d</sum></package><package arch="x86_64" name="curl" release="53.el6_9" src="curl-7.19.7-53.el6_9.src.rpm" version="7.19.7"><filename>curl-7.19.7-53.el6_9.x86_64.rpm</filename><sum type="sha256">7271cc38759b352c355189a96454a71b791ba06c12390202651202c5cf1a9e57</sum></package><package arch="x86_64" name="libcurl-devel" release="53.el6_9" src="curl-7.19.7-53.el6_9.src.rpm" version="7.19.7"><filename>libcurl-devel-7.19.7-53.el6_9.x86_64.rpm</filename><sum type="sha256">a659acd33e19b7b3da63f3392545cb0deb2f0d557cbf02b7220b0e81fd5251d7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628" id="CVE-2017-2628" title="Curl: Negotiate Not Treated As Connection-Oriented (Incomplete Fix For Cve-2015-3148)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0847" id="RHSA-2017:0847-1" title="Rhsa-2017:0847-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422464" id="1422464" title="Curl: Negotiate Not Treated As Connection-Oriented (Incomplete Fix For Cve-2015-3148)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0892-1</id><title>Kernel</title><description>Security Fix(es): 
* A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system. (CVE-2017-2636, Important) 
* A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation. (CVE-2016-7910, Moderate) 
Bug Fix(es): 
* Previously, Chelsio firmware included an incorrectly-formatted firmware bin file. As a consequence, the firmware could not be flashed. This update provides a firmware bin file that is formatted correctly. As a result, Chelsio firmware can now be flashed successfully. 
* When multiple simultaneous processes attempted to read from the /proc/stat file, spinlock overhead was generated on Non-Uniform Memory Access (NUMA) systems. Consequently, a large amount of CPU was consumed. With this update, the underlying source code has been fixed to avoid taking spinlock when the interrupt line does not exist. As a result, the spinlock overhead is now generated less often, and multiple simultaneous processes can now read /proc/stat without consuming a large amount of CPU.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-04-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="perf" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">b60d13645139400267e29ed532a883c58688468a6c77671e5e56116d413b2f83</sum></package><package arch="noarch" name="kernel-firmware" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.1.1.el6.noarch.rpm</filename><sum type="sha256">99251ff0907542bd7fd8bf2bd89548df6ab158d06b2591dc834cdf5c3146fc01</sum></package><package arch="i686" name="kernel-debug-devel" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.1.1.el6.i686.rpm</filename><sum type="sha256">152b8060c254955fe8c240f1050ac698518e1f35a10c3532f226aae117dcedba</sum></package><package arch="x86_64" name="kernel-debug" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">e5b7c502325fdf981012d79c7dacb5b303ba3a606b0cef3e4511e3e3571f4f76</sum></package><package arch="x86_64" name="kernel-headers" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">f9f6456c4dc9ab2154f9523999c37ea385e37c97cfe5e22993d1481660103c38</sum></package><package arch="noarch" name="kernel-doc" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.1.1.el6.noarch.rpm</filename><sum type="sha256">260f9ad642f08d9100a572a96305a661ca619add94c6c9ef3e8141460f185366</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">d9b47532c86dff6945d0a548c6340d6acaa5ad09c58c82944eba1552cb1d5f83</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.1.1.el6.noarch.rpm</filename><sum type="sha256">05d7b53bb95ca3ad750e6d569f27a6531b3e50979592ab0f0f9c6e15bf0921cc</sum></package><package arch="x86_64" name="kernel" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">f1067bf44ae2b65e9b75d6cae3ed8d77a5b1b68a76ba3a87e324c1c3aa27da23</sum></package><package arch="x86_64" name="kernel-devel" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">95319c7365296664493fcd9232a1f7cb1bca0092195c82267f578ad46a6a70d2</sum></package><package arch="x86_64" name="python-perf" release="696.1.1.el6" src="kernel-2.6.32-696.1.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.1.1.el6.x86_64.rpm</filename><sum type="sha256">fcc18e2e8c4c44f32049e9e05d0771e7a4cf4d308c79421ef1afdf0633525e9f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" id="CVE-2016-7910" title="Kernel: Use After Free In Seq File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" id="CVE-2017-2636" title="Kernel: Race Condition Access To N_Hdlc.Tbuf Causes Double Free In N_Hdlc_Release()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0892" id="RHSA-2017:0892-1" title="Rhsa-2017:0892-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399727" id="1399727" title="Kernel: Use After Free In Seq File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428319" id="1428319" title="Kernel: Race Condition Access To N_Hdlc.Tbuf Causes Double Free In N_Hdlc_Release()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0893-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) 
Bug Fix(es): 
* Previously, the "deref" plug-in failed to dereference attributes that use distinguished name (DN) syntax, such as "uniqueMember". With this patch, the "deref" plug-in can dereference such attributes and additionally "Name and Optional UID" syntax. As a result, the "deref" plug-in now supports any syntax.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-04-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base-devel" release="91.el6_9" src="389-ds-base-1.2.11.15-91.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-91.el6_9.x86_64.rpm</filename><sum type="sha256">740712276da2a2ae987fec916dcf6bba3f6d3f4eeffb1bf682e35dda90d9ee3c</sum></package><package arch="x86_64" name="389-ds-base-libs" release="91.el6_9" src="389-ds-base-1.2.11.15-91.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-91.el6_9.x86_64.rpm</filename><sum type="sha256">7395a9fe5f157e4888a7de0fe8784d028220c3f61e416baffa4ff667ad8486c0</sum></package><package arch="i686" name="389-ds-base-devel" release="91.el6_9" src="389-ds-base-1.2.11.15-91.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-91.el6_9.i686.rpm</filename><sum type="sha256">472cc03be66eccdccc246531706b5b3c02dd4c4358294f1b0fed36f63055a7d1</sum></package><package arch="x86_64" name="389-ds-base" release="91.el6_9" src="389-ds-base-1.2.11.15-91.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-91.el6_9.x86_64.rpm</filename><sum type="sha256">b0e0597dc690bafc02fb72127e6c8b106a62b1e1ff4d08b75368bd2ffc245183</sum></package><package arch="i686" name="389-ds-base-libs" release="91.el6_9" src="389-ds-base-1.2.11.15-91.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-91.el6_9.i686.rpm</filename><sum type="sha256">b3fd82a5f4c54bf59adfbe3d51349111e872806340e2bfbdb27b76e40e55cd0f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2668" id="CVE-2017-2668" title="389-Ds-Base: Remote Crash Via Crafted Ldap Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0893" id="RHSA-2017:0893-1" title="Rhsa-2017:0893-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1435365" id="1435365" title="Unable To Dereference Unqiemember Attribute Because It Is Dn [#Uid] Not Dn Syntax" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436575" id="1436575" title="389-Ds-Base: Remote Crash Via Crafted Ldap Messages" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0979-1</id><title>Libreoffice</title><description>Security Fix(es): 
* It was found that LibreOffice disclosed contents of a file specified in an embedded object's preview. An attacker could potentially use this flaw to expose details of a system running LibreOffice as an online service via a crafted document. (CVE-2017-3157)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="autocorr-cs" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-cs-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">2154934563d2380e3b827a156f8621ae84f697ea4f4a757b0c2aaf812367c3ba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ru-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">98b2b25d46002ad8c0f96e7877571ac306802ecf5975464c7ee60f545cd44051</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-glade-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">13fd8e61572672dbc82d4222dc25a4ee5f6bda4a9bbd938cbdd7f5b45b86e2d9</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-ro-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">069b7f785f4fff02f70970193e0a2c9c7e09c4f5131b09d83d3786a22dcb0edb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-eu-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">4e53d306b30e4b3c859c5310bc4f8e5844eeb0a89d74fd4a6d41e52046711e48</sum></package><package arch="x86_64" epoch="1" name="libreoffice-headless" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-headless-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">4e092919e5a8a19c2af11821941e0ef694f774043a0591bf19c1b23e5e2f3b92</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nr-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">3a5bd2c56609647688c98b42f115df4334d8bf4a16d4fb1c4f0ada7669f212db</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-mai-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">7f568824fdda40a63044e72dc2e4f9905d0a0b7456d5c27adbe5f104d1754151</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ss-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">df1633923a87944a7f555ac4b042219bbfe2a34591df6162a57f53388627da49</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-el-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">2ff8a0895b0c2e5622a1eed38dcd4183bd304eb295213add8c984403f0dfe9bd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-core-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">3739d4861d6b19177325931a4f24a5c997898a1732dfe83d5aaf2cb2f01be04f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ta-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">7e2bb7c736ff006dd9aba498132154cf10b7d547b3d8d7e1605f7af6eafde2a5</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-bg-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">64033fac639e2edd9b6c8e1a7e63c369cb1fff881df021472fe1c13b8aece486</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-uk-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">a5f3a9964d888ead375fff7f5b31bc12b4884ce5eedb5376a4f67cae10d12d4b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-he-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">5bf41eeb6f4e52867e18eb6dc70be4896cb3117f0c0262fb7c17e7ed4aa9c934</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-hu-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">531b3b4aa2a290b9566d22f51164807b7f4362fccb4bcb2bf8e561c1044e16d5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ms" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ms-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">0272b47fb1496aa6baa18610ebad4b184b35df2a64a25b81c024bf8f946d6d30</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-officebean-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">811d7a108887fd8828d62911de06fe016590ec4fa72f846f5787d326d4abf68f</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-af-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">1c2f4cb40ca90b5c5a70d20b2b6d6c61b0daa9e0c7b9e9de4a59e1843e71b1cc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ve-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">794f0396c62b4ee6d43f1abb6619648d7c0d697cd344e28e656e1708e7d8c587</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-te-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">9ddb0de2e2ea292b333b04c1016e8852216e42406bcb29884c69418bcce2c20c</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-sr-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">398180ec0adc988cbe0d8151add86acd6c29c8a6db379ef56e20599b72f93164</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nl-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">307930c4457be86820f2eea999982d40ea78d7cd437db9d60684262b48898a76</sum></package><package arch="i686" epoch="1" name="libreoffice-gdb-debug-support" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-gdb-debug-support-4.3.7.2-2.el6_9.1.i686.rpm</filename><sum type="sha256">7b3afd43e8fb2ee32149e9c20afd31b989e127434cb0ede1290c4e82ff40bd27</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-sdk-doc-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">8bb15a958a5a15d56f132ad94d707bec8b8616abc933915a3238a5a970ee7241</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-impress-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">dc8c58b2f8c2194611eebb72162197342e3143eccd80c8252ad483e6efbca6eb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-bg-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">06539c279450f9e22ee097614e1453777a8ddb4c74c34c0fcbacc79c5563abef</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-pyuno-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">e4f842be2f42886e06f6def901fac5ea8df6781b02da57afceed85348de6e884</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-lt-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">99de06d17dfd0cb005b6ac27b71deda2afa783467d04511285653a25171b748a</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-sv-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">4f05489a659db751a27aa5e9a06896326f9afd04779148d969a414fa665d9eca</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-gu-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">523a141d0f136bfe2434c2642890798a3eb66ade899d1b478be442ade9241ced</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-base-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">5bbd973f751a980411e6a959afa79f1ed59b953e944b138663dbf889acf8e5fb</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-is-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">50b80dd7b0ef8b80e7b38d43dbe3240544911af61475098f7e40abd02938dc7e</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-fi-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">5b11a0f1cb83bde880b62e187dbdfdddc9ec5f0a23f6c4352ee0abefe139a3d8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-kn-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">b973143af84fb4f3317be24a2185b784869e4019819734b34a0e5a949093808f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ja-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">bd108fd843cc258848e1b850c16bb9e24c968a5469c1fd98e475edef7c58381b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-filters-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">c5670ff390668563f64d1fd4039176f964d42e1cce609139f794fd0b998cbbee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-et-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">64117f825d8ccdf7cf6043b3f559665c16bb79ed504e75e3462ed35669668dba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nb-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">848a4df7abef5fb4391dc6bd0b7c2b6c3a25371879cacb41e318686b06f6b748</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-graphicfilter-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">d6e9a2563a5cb5749ab59a9c8aff9aad870b8f30e8b0045dfba33bbe6de1b098</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-pdfimport-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">88b1e3c35dbbdc5c74f929b89f787d8c87a8629364a1e35f8e613d4effe32b9c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sl-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">9f908a450381b0b2471a937f046cabaffb45427cdf53716cb381878d0ee24518</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zh-Hans-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">128e33a2f46273cf166ca1417176de66ff0645fa604741683a62ecb029ee19bf</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-pl-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">ad322e797da44d9709da666b83e2f2ef764584bb76843a9b34b483c874245ae5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-es-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">de4d9dbc0acb18012857f6d7667b9f42e7db0759f46753df5075fcf7454e95c8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sv-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">96787c995e8c5b0a5d4152193a0151640d09241b254300978306c2e4430e5a55</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-da-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">1f6c058ed50f920d7140cfcbc48dc74ef852db014d3ee608133b2a7c5d5da914</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pl-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">5fc2658b463131cc5affcbcf3c53c7d64d4e542bc808f811b3b90270aa9ecd20</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-nlpsolver-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">bb70ebb137bd916abf7f54c039d7818b35d1350034230183657b84f9a65e453d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zh-Hant-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">5aef935429c9c2d468bf57fcbc52a983684da85a75f97246d0aa3cbd38b77968</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-bn-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">a3822f490e2e48dd86324af29b58a63ffd10daf435ffe2503c8a813b7963efc5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ur" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ur-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">67c103595e071272cbf0a9bf7ec081c5c738af514dd05a2c83ba1de1e35cc21c</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-vi-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">3cfbf3b3afe292e05482014e9fc6b0f58da4f19389a6e9e1f78d58d8876149ea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hu-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">9bf3bb01f24cfc717245467b0f32e21136b79e29657b8270c1563036aff61cb7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-draw-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">e798b559161703a6b1356527fb1c30f2a0112e372d4c88d818a465cbc95db226</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-math-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">223adae39ea4b37d3aec566ca4baea00de3193825412908c84a817d4f373a349</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-it-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">95d95a26541b13ff8d4de01cde064a01164e5d6265fcd4e1e5122db096f95235</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ar-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">0e77a22833f5af41e9ddf9d63a348d0740611a64abe6971bdaa4863220f079b7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fi-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">931b49fa65c0ff544a5ca6bdf372e835deadab9bd8e8b5aba05aacfb1b8599e2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nn-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">aa14d5633880a7300b6d8ab5ec4f9b9b1111da0270456cff00aee4f97ec6ef81</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ro-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">0324c8f7d406d588c1e9a7c83f3c4a01ac6fdd62c46b077111900ddf940e4eb7</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-ca-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">df1032de82277a7a7101dc0d05ea1b97ec12bfd6b2d00652616a8036813401dc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ml-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">6658ecfc5b73ef6f291c550efcdf8c03e0a1c5364479fa9a87f8aec156f67d15</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-xsltfilter-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">19ba827816002d5e7b2cd989eb5c334530e7dd9b99c7f338845ef5dbf14925b5</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-pt-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">9b89a93a9d29b3701a96029d9193124271ca8bdaf1804d178daa5e96e329317e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ts-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">b1dd83b612c2af1a394c1f2840a961aeee14fb4bd13cf6a624a7533b1cfcb502</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-nl-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">d403e2cfdabfee3bc9c450bd3267c749cc020137a87b04cf69fb9f3fdecc98c1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-dz-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">0306f05cbd0f64247ad48be2de54f94bbc480dea453893d5b9f2475c047ac612</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ko-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">92f95c0d5ac263b1e39bde859c180aa35149605e36fec521a2e3ff7fb10e27fe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-bsh-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">88fb81e1605b6a96d53fbce4ff2b93f34f116ae53da893f0b833a65546f9cd38</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-cs-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">05b5d57e7dc0b134519d777098e14f4426caa95fe6c9fb2f896ca63608049275</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-lb-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">6018a4afe121ba4d9ea2e037a3e9d0de4f9589c371e4aee331e28ab1d5a34ed9</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-mn-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">9a10d7f1895eca409cd71ad0d0dbf8d841e86742804bd76d9fbe838d228fe850</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-da-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">fab318f93e0d14c5edbd33794e164d8c096cc181e914da77a15133b430fbb897</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-tr-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">ce60697f8aaece914e0964d8254f1cfa0f9e6e7c39d0f5a65f5e31c9fbe11e07</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-fr-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">a880ddb5e3a6293a08744d314f0bfea84d7cff371733b75b26003139b89f4961</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-it-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">9611af45cfe4668aeef6d5477d36abf1212bd1b87d43a91b4fd9f854bdf39b2b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-xh-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">09432f069a67613467c9fc7efd93d91fe13e4adb8f8a0dfa1a3c0ee05ebf50a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">b4647d8eb5e24c6c57637115486c98a674211eb11fb1775458e5e9299102871d</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-sl-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">110df20e48f93c1eb7ee281e397c7318dac41bb9b473c4c36fe792af57844fd5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-gdb-debug-support-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">1d1e91d092cbecdfc91761ad331beadf35d9ed0fa50dbefce4097ccfb940ee4e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sk-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">555a6dc2e593bf0c50de75f80ab1fa0e13ab65d1d910406dbec773814670eff5</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-zh-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">b4e0ae19e5f630e77f41d06b2681c7475fadfb8fd100b6d36f55b4f17e95f8f3</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-sk-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">ce7974e9a0c5ec4f4d10ae2a20493c42945c6d2517bb07e3058c530fff3e923c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-st-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">832832b5f1d45f2b43bce895ab0a4edb8a45902c7b1a7c92c18062bf0e819250</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-mr-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">ae3b7b76e6cfd0d7baa5df117cfe170a91c5fe453acad20081238b29ff24bfc0</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-opensymbol-fonts-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">1191cc77a91c3df807a36005a7952c3118e995532ad8c13c3bdf9a657bf6c29b</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-ga-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">2826ca3d0def0e03bda200f522eb61eec278b0ae1ab41c08c1c79f8cce9c6d70</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-hr-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">3f2e3896b81581e93ab5df96850e9546c3a4021f047f079ff61d40503fc0575d</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-de-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">d1abca34872ddcfe0084e55d8a3f7a6c4d7ab0878660c13d431e7b79cda60e5b</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-fa-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">0a1d3714cc91b7fd173dce175de1764c20777f40366f98fd21da67ade7e7b2b5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nso-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">22886825ab90c21ab25b6dab48ed221704d316be7d7efad3139989b7565d5ad8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fr-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">b3cbc0ffdf99b82daa8d6daa4b80f025f2a7c1b135d731e4eb90f62d80c6fa23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-de-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">6cfa0db59987dbaa655577988997beb72186db61f66c3b85e7d0854c4a3adb8d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-tr-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">16188943ef3449c18ca32f31f716183454591023248140a5f6db168fbd3fd992</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-tn-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">d28a41d8f0a6029b60d007908cf92ea6f50a19fe889a84663ce71c8b7ed20842</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-or-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">717c9e71ff33151c0f819c9e119a95c99f4672a42f665435e011b0573c715aff</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-ure-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">afdeb3dffaa340bb9eec8f815635d156cb3c089fb5538ed4774c8dc3a953fe67</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-sdk-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">ac92f281359a3a0f61f58639cc9774ba88af0223f394a0539c5a7821dab4c115</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-ru-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">b49204e083a263ce3d1305c37d2fef050949010ac2cd81c47333a91bd375d659</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-en-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">75a7cd41c017f985b53a1b017955003d50aaa289b431cf8a017ce8e1c5ec441e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-ogltrans-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">59cee9cbd2a5c91e6fe66268887cf77412f2a63328a6a7fc7eb4709c93f57a9a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pa-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">e445ddddbbb92a91e935679cc5905acf79774a4e9d168a17aa36b4fd10f20c39</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-en-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">5122068eb99a46a7bb2b435fc6f6a2696fc3a7f6d53463b38b2fc412f6f3039b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hr-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">7e6bcc14d0f6013188426a6e2758b971c235c8f9bf8ac84ed9fa9b8f6f71923c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-th-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">c236fd1d36f965ce9141274c8409b50b1b83bd8aee2909cacd28a74d6881d513</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ca-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">1cf054370ad284e42a958c53033d546b2606e41433fd4bb74b048db60babdcf0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pt-BR-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">6f5672a0f118b19635eeb21a0aa42d7a9f638a96edf95b37e6d355e0d140f0b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hi-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">8d5a4afb514b743b731206030c0c4b625d7d1d87ad9fd2081280859c1cfa8d1f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-calc-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">822e672a117b77c4d3df25f8fd0ca9e37a1425625ef8efd69891f0c8b519f5b7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-rhino-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">1345df8e77eef47bde96864f85210617f1d481e1e14d84a9e6c072de4fe1a1f3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-cy-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">d29473de0b1f9d5fd4a62ba6d719a415d5847f9d33413a5f78fd6fec3390a9dc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-gl-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">4a5e3b8a4fc5de715b817e8712bbf84ac30b06352f5ea909d379a2ea9a55e357</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-emailmerge-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">1f6b032d09c5fb55dc668694cc07a45e8928cb2cf2b392869c3d3c636419530e</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-lt-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">efda3860a2142487504c79780d1654a0fe9bd3a3ffadfbe3cc381423930bb825</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-ja-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">5a67147b4e9dc4b93db0dbc20d581665ec9afa6c55ea51791afe6746fc4340ed</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-ko-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">9e235e3d7432cac5f596e789f12a399a0c5ad997c235e0a87aff692118c8aa29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-writer-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">2837f60456ec329808487a16f7da9a2c0af9a2d957236919a972413350145c8b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-wiki-publisher-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">769d6956ee36477f0425a069d0697213779896fc61019b138ff8db6a52195738</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pt-PT-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">788ed46fa2f741a465eb75fa5b2f5fb0e75848e336bc4a9a2dd28fde4325affe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ga-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">b096d3065a5fb3f845f8007343f1538d10a840eb6bd852b534c6622c81265772</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-af-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">f4d51308b414a15a7080c7a3b8a7b5ed58b20f4f6c42af062788480df6cf29d1</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>autocorr-es-4.3.7.2-2.el6_9.1.noarch.rpm</filename><sum type="sha256">ad834f03e60d4aa6661daa0f2fc8e7b0de0e6de454712189d687f7ec08f8605d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zu-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">3469cf8dcb32e61de2e7a05ccd77699ea3a809a927e5d0489e575297b1f1af8f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sr-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">934016a84d416aeb1cfe4c53cd28ddf09d69a66a08a0b027a753cbc8be14e09e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-librelogo-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">ffd9e0747fb966fd869c467594f9cd2e926a9ed215c6e3af411c5526abc9865c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="2.el6_9.1" src="libreoffice-4.3.7.2-2.el6_9.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-as-4.3.7.2-2.el6_9.1.x86_64.rpm</filename><sum type="sha256">f9a98a6aa6b7249d663fb32da4deb9584f26891dd1d71a684365fee9255cba7d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157" id="CVE-2017-3157" title="Libreoffice: Arbitrary File Disclosure In Calc " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0979" id="RHSA-2017:0979-1" title="Rhsa-2017:0979-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425844" id="1425844" title="Libreoffice: Arbitrary File Disclosure In Calc " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1100-1</id><title>Nss And Nss-Util</title><description>The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. 
The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). 
Security Fix(es): 
* An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-04-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-pkcs11-devel" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-1.el6_9.i686.rpm</filename><sum type="sha256">61935696953f1d5b878e854c59245ded87a1bb771c82814cd6b617124c9c7641</sum></package><package arch="i686" name="nss-util-devel" release="1.el6_9" src="nss-util-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-util-devel-3.28.4-1.el6_9.i686.rpm</filename><sum type="sha256">d2bdde78314d6652a0966773abf7703510bb2f9d4efa53b2b91387d73c61347e</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">b1d300a98b97f4b6378582acff7e9846b73fbabe9fd57c4e27f3361e2bd61bcc</sum></package><package arch="i686" name="nss" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-3.28.4-1.el6_9.i686.rpm</filename><sum type="sha256">341424f107605e2efa56ea377f9da8108ae2db0ab0832e49c85ffc8568c9d84f</sum></package><package arch="x86_64" name="nss-tools" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">a253afef79c41863428e06cc692ba5bc11b5f80f723d7f56684f649249da9943</sum></package><package arch="x86_64" name="nss-sysinit" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">33efda80534bb55d132217bc2ff2ed2105e0a9dd86bf6352b6ff2b2eb01fc456</sum></package><package arch="x86_64" name="nss" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">bca2f0cf51f1b7b6d87b22369d5b4125e9269d42d6a3b3eb95e30a603c4a4292</sum></package><package arch="i686" name="nss-util" release="1.el6_9" src="nss-util-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-util-3.28.4-1.el6_9.i686.rpm</filename><sum type="sha256">03323817a4f703171f29d59953383e72e2347a8efdb81079716033b48f2a46db</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el6_9" src="nss-util-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-util-devel-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">c000cb1426332a1715ebd79276ef42617b7b0072be8742c2dce37c2097a4d9d4</sum></package><package arch="x86_64" name="nss-util" release="1.el6_9" src="nss-util-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-util-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">936591e9b6c22501658066f19d79a1430a28e3f8d5a44181be0aece4e519fa6d</sum></package><package arch="i686" name="nss-devel" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-1.el6_9.i686.rpm</filename><sum type="sha256">162d85a3cba111cacafb841c6c71583a0e5c191ef3737455bbe74252f607b210</sum></package><package arch="x86_64" name="nss-devel" release="1.el6_9" src="nss-3.28.4-1.el6_9.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-1.el6_9.x86_64.rpm</filename><sum type="sha256">46dbfb7ccfd4c7724ded4ec94d5414978348f5d6f3bc9bc3af3be344488ea940</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" id="CVE-2017-5461" title="Nss: Write Beyond Bounds Caused By Bugs In Base64 De/Encoding In Nssb64D.C And Nssb64E.C (Mfsa 2017-10)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1100" id="RHSA-2017:1100-1" title="Rhsa-2017:1100-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440080" id="1440080" title="Nss: Write Beyond Bounds Caused By Bugs In Base64 De/Encoding In Nssb64D.C And Nssb64E.C (Mfsa 2017-10)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1104-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.1.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5429, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-04-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="2.el6_9" src="firefox-52.1.0-2.el6_9.src.rpm" version="52.1.0"><filename>firefox-52.1.0-2.el6_9.i686.rpm</filename><sum type="sha256">49e7f0ff9785650d857af6d3a14a5975a41fcfaf412be3badebe9c7ee3d717b8</sum></package><package arch="x86_64" name="firefox" release="2.el6_9" src="firefox-52.1.0-2.el6_9.src.rpm" version="52.1.0"><filename>firefox-52.1.0-2.el6_9.x86_64.rpm</filename><sum type="sha256">cef4ea0c711af9861d8aa405309d1057471df0aa54f360c4700c111510258900</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" id="CVE-2017-5429" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" id="CVE-2017-5432" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" id="CVE-2017-5433" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" id="CVE-2017-5434" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" id="CVE-2017-5435" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" id="CVE-2017-5436" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" id="CVE-2017-5437" title="Mozilla: Vulnerabilities In Libevent Library (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" id="CVE-2017-5438" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" id="CVE-2017-5439" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" id="CVE-2017-5440" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" id="CVE-2017-5441" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" id="CVE-2017-5442" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" id="CVE-2017-5443" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" id="CVE-2017-5444" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" id="CVE-2017-5445" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" id="CVE-2017-5446" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" id="CVE-2017-5447" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" id="CVE-2017-5448" title="Mozilla: Out-Of-Bounds Write In Clearkeydecryptor (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" id="CVE-2017-5449" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" id="CVE-2017-5459" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" id="CVE-2017-5460" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" id="CVE-2017-5464" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" id="CVE-2017-5465" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" id="CVE-2017-5469" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1104" id="RHSA-2017:1104-1" title="Rhsa-2017:1104-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443298" id="1443298" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443299" id="1443299" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443301" id="1443301" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443303" id="1443303" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443304" id="1443304" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443308" id="1443308" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443310" id="1443310" title="Mozilla: Out-Of-Bounds Write In Clearkeydecryptor (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443311" id="1443311" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443312" id="1443312" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443313" id="1443313" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443314" id="1443314" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443315" id="1443315" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443317" id="1443317" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443322" id="1443322" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443323" id="1443323" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443324" id="1443324" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443325" id="1443325" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443326" id="1443326" title="Mozilla: Vulnerabilities In Libevent Library (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443327" id="1443327" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443328" id="1443328" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443329" id="1443329" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443330" id="1443330" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443332" id="1443332" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443333" id="1443333" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1105-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3137) 
* A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3136)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-04-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-sdb" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.62.rc1.el6_9.1.x86_64.rpm</filename><sum type="sha256">073e4e39152348c8a8bf706383b90118c950fefa14c608f9a1259f69c1d33414</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.1.i686.rpm</filename><sum type="sha256">86e74bc8ea7ac4c4263bd4acaa823a3c3534eab4b69b09f6ff26a10c0d615473</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.62.rc1.el6_9.1.x86_64.rpm</filename><sum type="sha256">c89e00c20c0b163e14dfa4f1dbe51c1ca733deb3c3dbf0165b26616fb3f0867a</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.62.rc1.el6_9.1.x86_64.rpm</filename><sum type="sha256">490d2a2bd2f58bce416137c7485371a5c799dcd2fc9253a314dff264996e2ed8</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.1.x86_64.rpm</filename><sum type="sha256">ed8ec1fa16a83f2c41f0f6b919dc8bc8715caa1bdc253a086fc3dc4d9d8695f3</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.62.rc1.el6_9.1.x86_64.rpm</filename><sum type="sha256">b219574fac57b83e79d91b06e48e404eb8e27e509754a0b54564fcff26da38ad</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.1.i686.rpm</filename><sum type="sha256">94cded554f19814271e13b43b5bfe065537432243caba3ea5635fc07c67c32d4</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.1" src="bind-9.8.2-0.62.rc1.el6_9.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.1.x86_64.rpm</filename><sum type="sha256">1f4f81f04eff41988a5b25ad80ffc7b3505c9d9e7f4b8d4e80b9a039212174c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" id="CVE-2017-3136" title="Bind: Incorrect Error Handling Causes Assertion Failure When Using Dns64 With &quot;Break-Dnssec Yes;&quot;" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" id="CVE-2017-3137" title="Bind: Processing A Response Containing Cname Or Dname With Unusual Order Can Crash Resolver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1105" id="RHSA-2017:1105-1" title="Rhsa-2017:1105-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441125" id="1441125" title="Bind: Incorrect Error Handling Causes Assertion Failure When Using Dns64 With &quot;Break-Dnssec Yes;&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441133" id="1441133" title="Bind: Processing A Response Containing Cname Or Dname With Unusual Order Can Crash Resolver" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1109-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511) 
* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526) 
* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509) 
Note: This update adds support for the "jdk.ntlm.cache" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default. 
* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539) 
Note: This updates extends the fix for CVE-2016-5542 released as part of the SLSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property. 
* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-04-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-javadoc-1.8.0.131-0.b11.el6_9.noarch.rpm</filename><sum type="sha256">ce541104c6e4a6030f161c2d0ed33e3ff9ab496b53bd53cb24a2b42d1197a437</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-debug-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">f054a3c73bcbe7b5f25316f84bf1c98e153b5a13d5395562c748537dc6135e9b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-headless-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">e0472562e16f99a473e80a7435d887c29482fcb37c3ba3cad6b9952c5390f3cb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.131-0.b11.el6_9.noarch.rpm</filename><sum type="sha256">6792d0d9d325b69638e6f32bc56b5c0ba832df1026f52cb848665d423c566ff9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">4b85f596d9c050dd4821ac9f9fe370e01881527f3fbb3795f96e518c203f2e7c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-devel-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">0ca3c96cc33c8ded22556a2cc250f4b330a20bfe771cc9c8690039453b6e2036</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">7fb250bbfcdb00281ce75deec5eff1f751b4156ec5e5cbb2eb618bf6e334ad02</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-src-debug-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">aef066b9725bf9c5ab7519617f64f349d0c45e556562d83b435f799b0b6a7614</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">67c1f189aea5dd25e4ff2b492b592c533a949b0ea3a1814399bf0a4548156e1b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-src-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">ef1ec2deb8cc65af10f4a88751fb20e8b2d28e766ce07570ff6de55c20b0eee5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-demo-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">6eb2ad157c1b69395cd1a6d0c607fb7aab67a4a3400c7a5b91e4f435b020c66a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b11.el6_9" src="java-1.8.0-openjdk-1.8.0.131-0.b11.el6_9.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.131-0.b11.el6_9.x86_64.rpm</filename><sum type="sha256">4a1a47edf237ebf3d5f164f60f82c3094faf4e9b2025ef0555ef626ccbccc595</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" id="CVE-2017-3509" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" id="CVE-2017-3511" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" id="CVE-2017-3526" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" id="CVE-2017-3533" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" id="CVE-2017-3539" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" id="CVE-2017-3544" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1109" id="RHSA-2017:1109-1" title="Rhsa-2017:1109-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443007" id="1443007" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443052" id="1443052" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443068" id="1443068" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443083" id="1443083" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443097" id="1443097" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443252" id="1443252" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1201-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.1.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5429, CVE-2017-5433, CVE-2017-5435, CVE-2017-5436, CVE-2017-5459, CVE-2017-5466, CVE-2017-5432, CVE-2017-5434, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5446, CVE-2017-5447, CVE-2017-5454, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469, CVE-2016-10195, CVE-2016-10196, CVE-2017-5445, CVE-2017-5449, CVE-2017-5451, CVE-2017-5467, CVE-2016-10197)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.1.0-1.el6_9.src.rpm" version="52.1.0"><filename>thunderbird-52.1.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">8322ce4dcebc48f922b9f70f085af3fa0db8f9cefdbdd872d2cd0d38d1e5c9d4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195" id="CVE-2016-10195" title="Libevent: Stack-Buffer Overflow In The Name_Parse() Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196" id="CVE-2016-10196" title="Libevent: Stack-Buffer Overflow In Evutil_Parse_Sockaddr_Port()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197" id="CVE-2016-10197" title="Libevent: Out-Of-Bounds Read In Search_Make_New()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" id="CVE-2017-5429" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" id="CVE-2017-5432" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" id="CVE-2017-5433" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" id="CVE-2017-5434" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" id="CVE-2017-5435" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" id="CVE-2017-5436" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" id="CVE-2017-5438" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" id="CVE-2017-5439" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" id="CVE-2017-5440" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" id="CVE-2017-5441" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" id="CVE-2017-5442" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" id="CVE-2017-5443" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" id="CVE-2017-5444" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" id="CVE-2017-5445" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" id="CVE-2017-5446" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" id="CVE-2017-5447" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" id="CVE-2017-5449" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" id="CVE-2017-5451" title="Mozilla: Addressbar Spoofing With Onblur Event (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" id="CVE-2017-5454" title="Mozilla: Sandbox Escape Allowing File System Read Access Through File Picker (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" id="CVE-2017-5459" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" id="CVE-2017-5460" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" id="CVE-2017-5464" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" id="CVE-2017-5465" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" id="CVE-2017-5466" title="Mozilla: Origin Confusion When Reloading Isolated Data:Text/Html Url (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" id="CVE-2017-5467" title="Mozilla: Memory Corruption When Drawing Skia Content (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" id="CVE-2017-5469" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1201" id="RHSA-2017:1201-1" title="Rhsa-2017:1201-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418608" id="1418608" title="Libevent: Stack-Buffer Overflow In The Name_Parse() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418611" id="1418611" title="Libevent: Stack-Buffer Overflow In Evutil_Parse_Sockaddr_Port()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418612" id="1418612" title="Libevent: Out-Of-Bounds Read In Search_Make_New()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443298" id="1443298" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443299" id="1443299" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443301" id="1443301" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443303" id="1443303" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443304" id="1443304" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443305" id="1443305" title="Mozilla: Origin Confusion When Reloading Isolated Data:Text/Html Url (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443307" id="1443307" title="Mozilla: Memory Corruption When Drawing Skia Content (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443308" id="1443308" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443311" id="1443311" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443312" id="1443312" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443313" id="1443313" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443314" id="1443314" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443315" id="1443315" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443317" id="1443317" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443322" id="1443322" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443323" id="1443323" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443324" id="1443324" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443325" id="1443325" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443327" id="1443327" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443328" id="1443328" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443329" id="1443329" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443330" id="1443330" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443332" id="1443332" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443333" id="1443333" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443338" id="1443338" title="Mozilla: Sandbox Escape Allowing File System Read Access Through File Picker (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443340" id="1443340" title="Mozilla: Addressbar Spoofing With Onblur Event (Mfsa 2017-12)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1202-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3139) 
Note: This issue affected only the BIND versions as shipped with EL6.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm</filename><sum type="sha256">6f63c9b6c4a109a877926976ff58312efbf1ffe85615142d5b242217be0bed01</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm</filename><sum type="sha256">0c5e1a7d2b186b7094617900111d48e58dbf40651c1fba64517ee6bc1284e34c</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm</filename><sum type="sha256">f3921412b7067329233234e98c27eb27c8c72f82e28a6a786677d2d438d41564</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm</filename><sum type="sha256">6a74feaa7a32823cf00e773ac5b2b08c6d399f6a5ca5305fdd4b05c7b8c2ff4a</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm</filename><sum type="sha256">09a6c72e36ad1647e6329c39c96b7e92153dfd12a7837334e8e81b88a2515e10</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm</filename><sum type="sha256">a7ac26544dd1521f8ac8d263f72c4b50a630399195e924bd86a0b4aed772c76c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm</filename><sum type="sha256">28d60a8c90201a5af60ef07d087ca36b50a201ddcaedbc9d8a2124c1adbec37d</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.62.rc1.el6_9.2" src="bind-9.8.2-0.62.rc1.el6_9.2.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm</filename><sum type="sha256">8bca54bc384b459d177b31e0c11e110282ed4929381eded649e02b9f32a4e32f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3139" id="CVE-2017-3139" title="Bind: Assertion Failure In Dnssec Validation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1202" id="RHSA-2017:1202-1" title="Rhsa-2017:1202-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1447743" id="1447743" title="Bind: Assertion Failure In Dnssec Validation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1204-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511) 
* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526) 
* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509) 
Note: This update adds support for the "jdk.ntlm.cache" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default. 
* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539) 
Note: This updates extends the fix for CVE-2016-5542 released as part of the SLSA-2016:2658 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property. 
* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-05-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.10.1.el6_9" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el6_9.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el6_9.x86_64.rpm</filename><sum type="sha256">50d0d5db7abacfe83c263d70e166eeaf71606b25df14a05caae060c73ca74025</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.10.1.el6_9" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el6_9.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el6_9.x86_64.rpm</filename><sum type="sha256">47f6f0cc9611751746c6a7707d441c551515943d977aa7eb544a8fca9d9377f9</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.10.1.el6_9" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el6_9.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el6_9.noarch.rpm</filename><sum type="sha256">a93ef7cabb7ebfbce94b8018fadf4524e08de64d9b6ef3026e1d25e9f3b7a3b5</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.10.1.el6_9" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el6_9.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el6_9.x86_64.rpm</filename><sum type="sha256">59d06a6fce4f8d5e9ecd46b4b0cb3dcdb5e51516b37cc1ad5998b2fdc6744462</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.10.1.el6_9" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el6_9.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el6_9.x86_64.rpm</filename><sum type="sha256">6f1f2337d4f80436fd4b82bc4f4a0ea8f37cdb07a3b85f2a0ac0781e89736cb5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" id="CVE-2017-3509" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" id="CVE-2017-3511" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" id="CVE-2017-3526" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" id="CVE-2017-3533" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" id="CVE-2017-3539" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" id="CVE-2017-3544" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1204" id="RHSA-2017:1204-1" title="Rhsa-2017:1204-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443007" id="1443007" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443052" id="1443052" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443068" id="1443068" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443083" id="1443083" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443097" id="1443097" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443252" id="1443252" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1206-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2016-9603) 
* An out-of-bounds r/w access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data via various bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2017-7980) 
* An out-of-bounds memory access issue was found in QEMU's VNC display driver support. The vulnerability could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user/process inside a guest could use this flaw to crash the QEMU process, resulting in a denial of service. (CVE-2017-2633) 
* An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service. (CVE-2017-7718)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.503.el6_9.3" src="qemu-kvm-0.12.1.2-2.503.el6_9.3.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.503.el6_9.3.x86_64.rpm</filename><sum type="sha256">b1454d91afb439651911d45267f238ccad3347c1ca2dae402798ddb44d371865</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.503.el6_9.3" src="qemu-kvm-0.12.1.2-2.503.el6_9.3.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.503.el6_9.3.x86_64.rpm</filename><sum type="sha256">034c690ee6a2ac1b8a7bec63ba0ae4e14093ba564e1e2376131a208f32d11c84</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.503.el6_9.3" src="qemu-kvm-0.12.1.2-2.503.el6_9.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.503.el6_9.3.x86_64.rpm</filename><sum type="sha256">8afe2458413464884e6639dbdff994d3cd04bd9aa2c4bdfc2ea5466e4c0806ca</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.503.el6_9.3" src="qemu-kvm-0.12.1.2-2.503.el6_9.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.503.el6_9.3.x86_64.rpm</filename><sum type="sha256">30ab722e7422a5efc2076cdc4ac49ec02cf5884221bee78332d6fd328f8a1a2f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603" id="CVE-2016-9603" title="Qemu: Cirrus: Heap Buffer Overflow Via Vnc Connection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" id="CVE-2017-2633" title="Qemu-Kvm Coredump In Vnc_Refresh_Server_Surface " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718" id="CVE-2017-7718" title="Qemu: Display: Cirrus: Oob Read Access Issue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" id="CVE-2017-7980" title="Qemu: Display: Cirrus: Oob R/W Access Issues In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1206" id="RHSA-2017:1206-1" title="Rhsa-2017:1206-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400438" id="1400438" title="Qemu-Kvm Coredump In Vnc_Refresh_Server_Surface " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425939" id="1425939" title="Qemu: Vnc: Memory Corruption Due To Unchecked " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430056" id="1430056" title="Qemu: Cirrus: Heap Buffer Overflow Via Vnc Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1437060" id="1437060" title="Fails To Build In Brew" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443441" id="1443441" title="Qemu: Display: Cirrus: Oob Read Access Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444371" id="1444371" title="Qemu: Display: Cirrus: Oob R/W Access Issues In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1208-1</id><title>Jasper</title><description>Security Fix(es): 
Multiple flaws were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2016-8654, CVE-2016-9560, CVE-2016-10249, CVE-2015-5203, CVE-2015-5221, CVE-2016-1577, CVE-2016-8690, CVE-2016-8693, CVE-2016-8884, CVE-2016-8885, CVE-2016-9262, CVE-2016-9591) 
Multiple flaws were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. (CVE-2016-1867, CVE-2016-2089, CVE-2016-2116, CVE-2016-8691, CVE-2016-8692, CVE-2016-8883, CVE-2016-9387, CVE-2016-9388, CVE-2016-9389, CVE-2016-9390, CVE-2016-9391, CVE-2016-9392, CVE-2016-9393, CVE-2016-9394, CVE-2016-9583, CVE-2016-9600, CVE-2016-10248, CVE-2016-10251)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="jasper-utils" release="21.el6_9" src="jasper-1.900.1-21.el6_9.src.rpm" version="1.900.1"><filename>jasper-utils-1.900.1-21.el6_9.x86_64.rpm</filename><sum type="sha256">31d8bc483796d04d6b5847ea2a0ac1023bc6fd743c56175881dbface07ea73cb</sum></package><package arch="i686" name="jasper-libs" release="21.el6_9" src="jasper-1.900.1-21.el6_9.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-21.el6_9.i686.rpm</filename><sum type="sha256">c0ee5699ea0363145c3c19a02b99d78b065e0d56a6089038977efc3b78d4d1bd</sum></package><package arch="x86_64" name="jasper" release="21.el6_9" src="jasper-1.900.1-21.el6_9.src.rpm" version="1.900.1"><filename>jasper-1.900.1-21.el6_9.x86_64.rpm</filename><sum type="sha256">358acd1220770f3621260a8f8f7796de8717aa7ae6895974c8ecbdcc4fe05bd9</sum></package><package arch="i686" name="jasper-devel" release="21.el6_9" src="jasper-1.900.1-21.el6_9.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-21.el6_9.i686.rpm</filename><sum type="sha256">65b167d8fc691b4a23358e74b4293733a7f713e6f490eb964281358ee83b21a7</sum></package><package arch="x86_64" name="jasper-libs" release="21.el6_9" src="jasper-1.900.1-21.el6_9.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-21.el6_9.x86_64.rpm</filename><sum type="sha256">e4e6075004fbea7d3e098c6f942ae9c9fcbb826f94776b8937e9b43bf3283574</sum></package><package arch="x86_64" name="jasper-devel" release="21.el6_9" src="jasper-1.900.1-21.el6_9.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-21.el6_9.x86_64.rpm</filename><sum type="sha256">1577f76ef407ed7ff0b8245ab12b861a271ecfe199f6024532c1c6adacadec44</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" id="CVE-2015-5203" title="Jasper: Integer Overflow In Jas_Image_Cmpt_Create()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" id="CVE-2015-5221" title="Jasper: Use-After-Free And Double-Free Flaws In Mif_Process_Cmpt()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10248" id="CVE-2016-10248" title="Jasper: Null Pointer Dereference In Jpc_Tsfb_Synthesize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10249" id="CVE-2016-10249" title="Jasper: Integer Overflow In Jas_Matrix_Create()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" id="CVE-2016-10251" title="Jasper: Integer Overflow In Jpc_Pi_Nextcprl(), Leading To Out-Of-Bounds Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" id="CVE-2016-1577" title="Jasper: Double Free Issue In Jas_Iccattrval_Destroy()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" id="CVE-2016-1867" title="Jasper: Out-Of-Bounds Read In Jpc_Pi_Nextcprl()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" id="CVE-2016-2089" title="Jasper: Matrix Rows_ Null Pointer Dereference In Jas_Matrix_Clip()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" id="CVE-2016-2116" title="Jasper: Memory Leak In Jas_Iccprof_Createfrombuf()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" id="CVE-2016-8654" title="Jasper: Heap-Based Buffer Overflow In Qmfb Code In Jpc Codec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" id="CVE-2016-8690" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" id="CVE-2016-8691" title="Jasper: Missing Siz Marker Segment Xrsiz And Yrsiz Fields Range Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" id="CVE-2016-8692" title="Jasper: Missing Siz Marker Segment Xrsiz And Yrsiz Fields Range Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" id="CVE-2016-8693" title="Jasper: Incorrect Handling Of Bufsize 0 In Mem_Resize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" id="CVE-2016-8883" title="Jasper: Reachable Asserts In Jpc_Dec_Tiledecode()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" id="CVE-2016-8884" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" id="CVE-2016-8885" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9262" id="CVE-2016-9262" title="Jasper: Integer Truncation In Jas_Image_Cmpt_Create()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9387" id="CVE-2016-9387" title="Jasper: Integer Overflow In Jpc_Dec_Process_Siz()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9388" id="CVE-2016-9388" title="Jasper: Reachable Assertions In Ras Encoder/Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9389" id="CVE-2016-9389" title="Jasper: Reachable Assertions Caused By Insufficient Component Domains Checks In Ict/Rct In Jpc Codec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9390" id="CVE-2016-9390" title="Jasper: Insufficient Siz Marker Tilexoff And Tileyoff Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9391" id="CVE-2016-9391" title="Jasper: Reachable Assertions In The Jpc Bitstream Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9392" id="CVE-2016-9392" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9393" id="CVE-2016-9393" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9394" id="CVE-2016-9394" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" id="CVE-2016-9560" title="Jasper: Stack-Based Buffer Overflow In Jpc_Dec_Tileinit()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" id="CVE-2016-9583" title="Jasper: Integer Overflows Leading To Out Of Bounds Read In Packet Iterators In Jpc Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" id="CVE-2016-9591" title="Jasper: Use-After-Free / Double-Free In Jpc Encoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" id="CVE-2016-9600" title="Jasper: Jp2 Encoder Null Pointer Dereference Due To Uninitialized Cmprof_" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1208" id="RHSA-2017:1208-1" title="Rhsa-2017:1208-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254242" id="1254242" title="Jasper: Integer Overflow In Jas_Image_Cmpt_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255710" id="1255710" title="Jasper: Use-After-Free And Double-Free Flaws In Mif_Process_Cmpt()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298135" id="1298135" title="Jasper: Out-Of-Bounds Read In Jpc_Pi_Nextcprl()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302636" id="1302636" title="Jasper: Matrix Rows_ Null Pointer Dereference In Jas_Matrix_Clip()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314466" id="1314466" title="Jasper: Double Free Issue In Jas_Iccattrval_Destroy()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314472" id="1314472" title="Jasper: Memory Leak In Jas_Iccprof_Createfrombuf()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385499" id="1385499" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385502" id="1385502" title="Jasper: Missing Siz Marker Segment Xrsiz And Yrsiz Fields Range Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385507" id="1385507" title="Jasper: Incorrect Handling Of Bufsize 0 In Mem_Resize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388840" id="1388840" title="Jasper: Integer Overflow In Jas_Matrix_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388870" id="1388870" title="Jasper: Reachable Asserts In Jpc_Dec_Tiledecode()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393882" id="1393882" title="Jasper: Integer Truncation In Jas_Image_Cmpt_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396959" id="1396959" title="Jasper: Integer Overflow In Jpc_Dec_Process_Siz()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396962" id="1396962" title="Jasper: Reachable Assertions In Ras Encoder/Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396963" id="1396963" title="Jasper: Reachable Assertions Caused By Insufficient Component Domains Checks In Ict/Rct In Jpc Codec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396965" id="1396965" title="Jasper: Insufficient Siz Marker Tilexoff And Tileyoff Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396967" id="1396967" title="Jasper: Reachable Assertions In The Jpc Bitstream Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396971" id="1396971" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398256" id="1398256" title="Jasper: Stack-Based Buffer Overflow In Jpc_Dec_Tileinit()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399167" id="1399167" title="Jasper: Heap-Based Buffer Overflow In Qmfb Code In Jpc Codec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405148" id="1405148" title="Jasper: Integer Overflows Leading To Out Of Bounds Read In Packet Iterators In Jpc Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406405" id="1406405" title="Jasper: Use-After-Free / Double-Free In Jpc Encoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1410026" id="1410026" title="Jasper: Jp2 Encoder Null Pointer Dereference Due To Uninitialized Cmprof_" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434447" id="1434447" title="Jasper: Null Pointer Dereference In Jpc_Tsfb_Synthesize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434461" id="1434461" title="Jasper: Integer Overflow In Jpc_Pi_Nextcprl(), Leading To Out-Of-Bounds Read" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1230-1</id><title>Ghostscript</title><description>Security Fix(es): 
* It was found that ghostscript did not properly validate the parameters passed to the .rsdparams and .eqproc functions. During its execution, a specially crafted PostScript document could execute code in the context of the ghostscript process, bypassing the -dSAFER protection. (CVE-2017-8291)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="ghostscript-devel" release="23.el6_9.2" src="ghostscript-8.70-23.el6_9.2.src.rpm" version="8.70"><filename>ghostscript-devel-8.70-23.el6_9.2.i686.rpm</filename><sum type="sha256">76c92134d302df9ecbb0d6b39a6d465823ddafbc64c785d4563eb4ded2a5e95a</sum></package><package arch="x86_64" name="ghostscript-doc" release="23.el6_9.2" src="ghostscript-8.70-23.el6_9.2.src.rpm" version="8.70"><filename>ghostscript-doc-8.70-23.el6_9.2.x86_64.rpm</filename><sum type="sha256">dd9ff8e807b1cf27f60d3d011fc0a0a20051cda7f398646ec696a2b570da8d49</sum></package><package arch="x86_64" name="ghostscript-gtk" release="23.el6_9.2" src="ghostscript-8.70-23.el6_9.2.src.rpm" version="8.70"><filename>ghostscript-gtk-8.70-23.el6_9.2.x86_64.rpm</filename><sum type="sha256">c46823f9caabeae96166b5a4abc59acf61566c260e2556be0720392800eb9152</sum></package><package arch="i686" name="ghostscript" release="23.el6_9.2" src="ghostscript-8.70-23.el6_9.2.src.rpm" version="8.70"><filename>ghostscript-8.70-23.el6_9.2.i686.rpm</filename><sum type="sha256">edd23ed3c5c3160501c57a020fb028d50e6d96c10a9e6e99708696d5cd263edc</sum></package><package arch="x86_64" name="ghostscript" release="23.el6_9.2" src="ghostscript-8.70-23.el6_9.2.src.rpm" version="8.70"><filename>ghostscript-8.70-23.el6_9.2.x86_64.rpm</filename><sum type="sha256">18676e8cf4263a9237030d785458b8b6c20b9dd312099894416476fef0ccc358</sum></package><package arch="x86_64" name="ghostscript-devel" release="23.el6_9.2" src="ghostscript-8.70-23.el6_9.2.src.rpm" version="8.70"><filename>ghostscript-devel-8.70-23.el6_9.2.x86_64.rpm</filename><sum type="sha256">a0925b72d06e4fcc103479e685901a3fc941e12bef32c5b0b0cc0a0557e6ad98</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" id="CVE-2017-8291" title="Ghostscript: Corruption Of Operand Stack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1230" id="RHSA-2017:1230-1" title="Rhsa-2017:1230-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446063" id="1446063" title="Ghostscript: Corruption Of Operand Stack" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1267-1</id><title>Rpcbind</title><description>Security Fix(es): 
* It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="rpcbind" release="13.el6_9" src="rpcbind-0.2.0-13.el6_9.src.rpm" version="0.2.0"><filename>rpcbind-0.2.0-13.el6_9.x86_64.rpm</filename><sum type="sha256">5797f1fd0d32ff70d244826604781377830727e521555491414fe626969b3e9f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" id="CVE-2017-8779" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1267" id="RHSA-2017:1267-1" title="Rhsa-2017:1267-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448124" id="1448124" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1268-1</id><title>Libtirpc</title><description>Security Fix(es): 
* It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libtirpc-devel" release="13.el6_9" src="libtirpc-0.2.1-13.el6_9.src.rpm" version="0.2.1"><filename>libtirpc-devel-0.2.1-13.el6_9.x86_64.rpm</filename><sum type="sha256">5848753bbfb108cb49fbfc69637850d722afed50f325b67f5bb5781cfa63e937</sum></package><package arch="x86_64" name="libtirpc" release="13.el6_9" src="libtirpc-0.2.1-13.el6_9.src.rpm" version="0.2.1"><filename>libtirpc-0.2.1-13.el6_9.x86_64.rpm</filename><sum type="sha256">21374758246fc4eea3c5f2ca6e06a0ded433f1545351870797a80997fc220ed3</sum></package><package arch="i686" name="libtirpc" release="13.el6_9" src="libtirpc-0.2.1-13.el6_9.src.rpm" version="0.2.1"><filename>libtirpc-0.2.1-13.el6_9.i686.rpm</filename><sum type="sha256">673b0dd782da045e1e013bd47f73ad01f66d95aca5118e470dff63ea35c28311</sum></package><package arch="i686" name="libtirpc-devel" release="13.el6_9" src="libtirpc-0.2.1-13.el6_9.src.rpm" version="0.2.1"><filename>libtirpc-devel-0.2.1-13.el6_9.i686.rpm</filename><sum type="sha256">4da519285cdc69064862f451b80aad849653f092b821989e379548946bf293cd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" id="CVE-2017-8779" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1268" id="RHSA-2017:1268-1" title="Rhsa-2017:1268-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448124" id="1448124" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1270-1</id><title>Samba</title><description>Security Fix(es): 
* A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. (CVE-2017-7494)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-domainjoin-gui" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">79e4393aef7f19f54ca376cbb449ba176c99bbc90c7a198553912dbada34d4f2</sum></package><package arch="i686" name="libsmbclient" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-43.el6_9.i686.rpm</filename><sum type="sha256">36045e2dd5b21702320d4b72e9f0af22ac29c5680250d06c54f192bd486f468e</sum></package><package arch="x86_64" name="samba-doc" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">6a0df5ec8323a0d4a1ce0692fd29b47db5abd78f447a9ea84e118481ff5c8be6</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">9710cfd0ac639610045846e75bd434fcade99bf14ae2c77e7e1fc93098898eec</sum></package><package arch="x86_64" name="samba" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">22be15714b6d058dd486f8ae6561d646d5167c1697867a91d534ea29bff80552</sum></package><package arch="x86_64" name="samba-winbind-devel" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">cd1a83ad197dd8ccde0f462c30471da1951a03a5df5935587b8c64d8273b2cdb</sum></package><package arch="x86_64" name="samba-client" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">291e4468a900962938271b7581f0b0cfad43a2ada814e45a563eadfc4e2ff756</sum></package><package arch="x86_64" name="samba-common" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">b88d4b21a6fffae92831ae7e56cadb40072f1ce274fb3713acc024caf480b8d4</sum></package><package arch="x86_64" name="libsmbclient" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">bc18fa36d504a91e234d37f73de50e4127440ba54d8e3bfaa6a02ae69a08a9ff</sum></package><package arch="x86_64" name="libsmbclient-devel" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">350be06ec845e6d052c779a03b7486423feed093f089b7a0980490f4e830ab19</sum></package><package arch="x86_64" name="samba-winbind" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">576bb81a119ba19648767ef80413cc509a14e7287f00b9411bacc279aee6c443</sum></package><package arch="i686" name="samba-common" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-43.el6_9.i686.rpm</filename><sum type="sha256">90aa765cb2dace8f239e9c44f1bab699480c37fcf63e55075c41687d8a8b4ccf</sum></package><package arch="i686" name="samba-winbind-devel" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-43.el6_9.i686.rpm</filename><sum type="sha256">0c90057193778be53e1312e38c9dae2a58b52be4cd9431bd07c728e398d24901</sum></package><package arch="x86_64" name="samba-winbind-clients" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">2df707911c1f85f765e03f4cc22e489406661ecc63d9db357fce5f376b0f880e</sum></package><package arch="x86_64" name="samba-glusterfs" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">4ff749060bf46a0db928a3110da8d1a2b7d45703c34ab27253825f08fd71f549</sum></package><package arch="i686" name="samba-winbind-clients" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-43.el6_9.i686.rpm</filename><sum type="sha256">d6511ed0b340ebf232c3281794612d3a49aa910654be491cc3a1f78d5953be08</sum></package><package arch="x86_64" name="samba-swat" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-43.el6_9.x86_64.rpm</filename><sum type="sha256">87b7423e134aaed7294bd26854bafd0412eb27eb62e51419fc5203452d468fc8</sum></package><package arch="i686" name="libsmbclient-devel" release="43.el6_9" src="samba-3.6.23-43.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-43.el6_9.i686.rpm</filename><sum type="sha256">86e6d69a152889610144d8448772078da53bc421e15367aa3c36898f59b07fb7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" id="CVE-2017-7494" title="Samba: Loading Shared Modules From Any Path In The System Leading To Rce" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1270" id="RHSA-2017:1270-1" title="Rhsa-2017:1270-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450347" id="1450347" title="Samba: Loading Shared Modules From Any Path In The System Leading To Rce" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1271-1</id><title>Samba4</title><description>Security Fix(es): 
* A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. (CVE-2017-7494)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-05-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-winbind" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">d1347a04299b255988f08666b9a49dc3ca8dd8c5c86f93077a961224eb88599f</sum></package><package arch="x86_64" name="samba4-dc-libs" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">0530a0f012a0aa19d8ea322a0990a344a9cf2eac1cccff43ce897077d3c76a96</sum></package><package arch="x86_64" name="samba4-libs" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">564d927d79e254e9ddb559043613c2c43007d0c019fbe7210188c458ec66bd9c</sum></package><package arch="x86_64" name="samba4-test" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">b941a5147de2902520b3344d1032a13e40c0093359aa734098f1b0b5f53d0164</sum></package><package arch="x86_64" name="samba4-dc" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">ac16dc6aa30e65bdd2e607c1df33448024821f0ed029ab8d021cdf1076598f3d</sum></package><package arch="x86_64" name="samba4-python" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">d77c0e8c1dc99ec6ecd3d985cb92ef9bc698962deda4d7870fe2b080af58fed1</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">b02ca462c41270296b42f0c29f3e378e1768757c9a652b9d4fd2032938e8287e</sum></package><package arch="x86_64" name="samba4-common" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">5b73ca8a361df1cd5975da901a2fe223a0e8534a932399b210ef159ea759f18f</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">87303057ff35f06d594478d94ae08586461b604bfdbf24c952b9aa7ffbc7c516</sum></package><package arch="x86_64" name="samba4" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">bb0da22e20e04ea1bf0dbb3644988d63c2d71e5442a02453d3085866671773cb</sum></package><package arch="x86_64" name="samba4-devel" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">a99810a37dfdfc1bb80a7add8815e1f81fff2f56ed3278fb03f067162a5b1426</sum></package><package arch="x86_64" name="samba4-pidl" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">4251bb4934d90dfaf83cc2b904c33af2e47b8bfc3fe6515c1d417c9adeb20e2e</sum></package><package arch="x86_64" name="samba4-client" release="10.el6_9" src="samba4-4.2.10-10.el6_9.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-10.el6_9.x86_64.rpm</filename><sum type="sha256">f69df3fe1c2494a0bd98dae2b2f13c1349e9ae61c41d539554e3d6d024f7958d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" id="CVE-2017-7494" title="Samba: Loading Shared Modules From Any Path In The System Leading To Rce" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1271" id="RHSA-2017:1271-1" title="Rhsa-2017:1271-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450347" id="1450347" title="Samba: Loading Shared Modules From Any Path In The System Leading To Rce" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1364-1</id><title>Nss</title><description>Security Fix(es): 
* A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) 
Bug Fix(es): 
* The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, consider installing the updated CA list on June 12, 2017.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-06-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-3.28.4-3.el6_9.i686.rpm</filename><sum type="sha256">940c84198fcb3cb475c933f37cde222d15063ac62f6d07ae2755573b1bc52a5a</sum></package><package arch="x86_64" name="nss-devel" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-3.el6_9.x86_64.rpm</filename><sum type="sha256">e6a90545d7a9c80427f0d8229a2791af6adcce0a87de66c1f4a993afe1f36829</sum></package><package arch="x86_64" name="nss-tools" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-3.el6_9.x86_64.rpm</filename><sum type="sha256">01a18bb1a846a306caf929e37dc8bef9e492d6ab092794be346ed6930bee5bad</sum></package><package arch="i686" name="nss-devel" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-3.el6_9.i686.rpm</filename><sum type="sha256">b1866c36523619b7f0b6e2d01029b4102c185368fa29fcd9bf9fb5adab41956d</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-3.el6_9.i686.rpm</filename><sum type="sha256">7e7b4c5e7627985d759cda289ab28108389fb43545d4192b9aaf41a3b282e939</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-3.el6_9.x86_64.rpm</filename><sum type="sha256">ca75f4a29ce42abe3d729ed980b52144dbd7dfe295a03ce845102244958680c4</sum></package><package arch="x86_64" name="nss" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-3.28.4-3.el6_9.x86_64.rpm</filename><sum type="sha256">1c347362013c0ec20560a538bf0599574fdb74f43f6e1c5cf22698780eb8ac3a</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el6_9" src="nss-3.28.4-3.el6_9.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-3.el6_9.x86_64.rpm</filename><sum type="sha256">965d0c4a746ad84e638a1a4de535167677110b7a8bad7801db2d3b4ce6cbd76e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502" id="CVE-2017-7502" title="Nss: Null Pointer Dereference When Handling Empty Sslv2 Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1364" id="RHSA-2017:1364-1" title="Rhsa-2017:1364-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446631" id="1446631" title="Nss: Null Pointer Dereference When Handling Empty Sslv2 Messages" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1372-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality can allow a remote attacker to force the kernel to enter a condition in which it can loop indefinitely. (CVE-2017-6214, Moderate) 
Bug Fix(es): 
* When executing certain Hadoop jobs, a kernel panic occasionally occurred on multiple nodes of a cluster. This update fixes the kernel scheduler, and the kernel panic no longer occurs under the described circumstances. 
* Previously, memory leak of the struct cred data structure and related data structures occasionally occurred. Consequently, system performance was suboptimal with the symptoms of high I/O operations wait and small amount of free memory. This update fixes the reference counter of the struct slab cache to no longer cause imbalance between the calls to the get_cred() function and the put_cred() function. As a result, the memory leak no longer occurs under the described circumstances. 
* Previously, the be2net driver could not detect the link status properly on IBM Power Systems. Consequently, the link status was always reported as disconnected. With this update, be2net has been fixed, and the Network Interface Cards (NICs) now report the link status correctly. 
* Previously, the RFF_ID and RFT_ID commands in the lpfc driver were issued in an incorrect order. Consequently, users were not able to access Logical Unit Numbers (LUNs). With this update, lpfc has been fixed to issue RFT_ID before RFF_ID, which is the correct order. As a result, users can now access LUNs as expected. 
* Previously, the kdump mechanism was trying to get the lock by the vmalloc_sync_all() function during a kernel panic. Consequently, a deadlock occurred, and the crashkernel did not boot. This update fixes the vmalloc_sync_all() function to avoid synchronizing the vmalloc area on the crashing CPU. As a result, the crashkernel parameter now boots as expected, and the kernel dump is collected successfully under the described circumstances.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-06-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="perf" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">5ec91499eb2b65e8b4f6d6808b9c3a0a4a50f904809d09ed50c0d10f7f2330ac</sum></package><package arch="i686" name="kernel-debug-devel" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.3.1.el6.i686.rpm</filename><sum type="sha256">acf128c56cf7a31c4fb9e4369501f3ebc1400e5332b0dbf6df235da8cf7bd4bf</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.3.1.el6.noarch.rpm</filename><sum type="sha256">683a058363b16779571de85ae065c7c60f5af8624324c1a70bb0f7fccd5f7852</sum></package><package arch="noarch" name="kernel-doc" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.3.1.el6.noarch.rpm</filename><sum type="sha256">794b66a512de1cad923e8b0e7a37c67dd111a401da93a3f6b7ececed26226e15</sum></package><package arch="x86_64" name="kernel-debug" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">fabd88bd90aa44dc65bba150719253fe01e7c7439cabfe173128931e49e3e416</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">6a0356eb6887f6565e2ec17cb740888fab9289ada3994c54b4e7fc82dcb6b752</sum></package><package arch="x86_64" name="python-perf" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">9b95ae347f85ecfb7a9ea56b3999144a1c195f7a3a8996368282e42f5e4cbcfa</sum></package><package arch="x86_64" name="kernel-headers" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">bd48e209a5d6ed6107c0a90239def4f802cd8a50d2af5e32a198aaf9dad4459c</sum></package><package arch="noarch" name="kernel-firmware" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.3.1.el6.noarch.rpm</filename><sum type="sha256">f54db38dee3a387fb1dd12286c3ef1d803d4b04c3aabb8ed933dc8c1cc3bb536</sum></package><package arch="x86_64" name="kernel-devel" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">bbc7b178d7ba7f7dbc9ca2099d16372d066d3510cab79a22d305571b95b91c76</sum></package><package arch="x86_64" name="kernel" release="696.3.1.el6" src="kernel-2.6.32-696.3.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.3.1.el6.x86_64.rpm</filename><sum type="sha256">f86dbc5f1360b1d484db2dd964c6b2d5e2dbfb7974feda49350568ab7ce8dfd0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" id="CVE-2017-6214" title="Kernel: Ipv4/Tcp: Infinite Loop In Tcp_Splice_Read()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1372" id="RHSA-2017:1372-1" title="Rhsa-2017:1372-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1426542" id="1426542" title="Kernel: Ipv4/Tcp: Infinite Loop In Tcp_Splice_Read()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1382-1</id><title>Sudo</title><description>Security Fix(es): 
* A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. (CVE-2017-1000367)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-06-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sudo-devel" release="28.el6_9" src="sudo-1.8.6p3-28.el6_9.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-28.el6_9.x86_64.rpm</filename><sum type="sha256">32a7d3788d4b89a0a668ddcc6b70d33fc2071d5d6f4bf25920f9684dabce9b2c</sum></package><package arch="x86_64" name="sudo" release="28.el6_9" src="sudo-1.8.6p3-28.el6_9.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-28.el6_9.x86_64.rpm</filename><sum type="sha256">41bac38beb0b8d598ef03580c1db289e5b25b18265dcc91cb9387c2844ee4cca</sum></package><package arch="i686" name="sudo-devel" release="28.el6_9" src="sudo-1.8.6p3-28.el6_9.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-28.el6_9.i686.rpm</filename><sum type="sha256">d2c6c906d65f024de1d046ca8d7b74bc53dc6db16dd1975bf30eaeb67c08df46</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367" id="CVE-2017-1000367" title=" Sudo: Privilege Escalation In Via Improper " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1382" id="RHSA-2017:1382-1" title="Rhsa-2017:1382-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1453074" id="1453074" title=" Sudo: Privilege Escalation In Via Improper " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1440-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.2.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7751, CVE-2017-7756, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, CVE-2017-7750, CVE-2017-7752, CVE-2017-7754, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-06-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.2.0-1.el6_9.src.rpm" version="52.2.0"><filename>firefox-52.2.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">3675ee6553aa5a3f00889ed0613d320e406e81edc129b89c0c9ee93bc0579d28</sum></package><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.2.0-1.el6_9.src.rpm" version="52.2.0"><filename>firefox-52.2.0-1.el6_9.i686.rpm</filename><sum type="sha256">abe4597ec5e1d5972051d961c2278f4ca0ace5bd506fe20ab21dcdf7057b080c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" id="CVE-2017-5470" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" id="CVE-2017-5472" title="Mozilla: Use-After-Free Using Destroyed Node " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" id="CVE-2017-7749" title="Mozilla: Use-After-Free During Docshell " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" id="CVE-2017-7750" title="Mozilla: Use-After-Free With Track Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" id="CVE-2017-7751" title="Mozilla: Use-After-Free With Content Viewer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" id="CVE-2017-7752" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" id="CVE-2017-7754" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" id="CVE-2017-7756" title="Mozilla: Use-After-Free And Use-After-Scope " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" id="CVE-2017-7757" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" id="CVE-2017-7758" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" id="CVE-2017-7764" title="Mozilla: Domain Spoofing With Combination Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771" id="CVE-2017-7771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772" id="CVE-2017-7772" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773" id="CVE-2017-7773" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" id="CVE-2017-7778" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1440" id="RHSA-2017:1440-1" title="Rhsa-2017:1440-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461252" id="1461252" title="Mozilla: Use-After-Free Using Destroyed Node " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461253" id="1461253" title="Mozilla: Use-After-Free During Docshell " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461254" id="1461254" title="Mozilla: Use-After-Free With Track Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461255" id="1461255" title="Mozilla: Use-After-Free With Content Viewer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461256" id="1461256" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461257" id="1461257" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461258" id="1461258" title="Mozilla: Use-After-Free And Use-After-Scope " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461259" id="1461259" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461260" id="1461260" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461261" id="1461261" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461262" id="1461262" title="Mozilla: Domain Spoofing With Combination Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461264" id="1461264" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1480-1</id><title>Glibc</title><description>Security Fix(es): 
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-06-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glibc-static" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-static-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">53d86e8181145e718501feadb0a93e68791c825f2c368e89cc4feaf4cd80c909</sum></package><package arch="i686" name="glibc" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-2.12-1.209.el6_9.2.i686.rpm</filename><sum type="sha256">2879a6d162ef5ee2ad14c6d2efd95e7bc52cecb037f2d5f49d9f20f61fdd3868</sum></package><package arch="i686" name="glibc-static" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-static-2.12-1.209.el6_9.2.i686.rpm</filename><sum type="sha256">5600e76f459cbe3e393ae7a2c65ec1ca71135b4668f2f6245c45d1bf36987c85</sum></package><package arch="x86_64" name="glibc-devel" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">a22ebf96ec23d52dc58ef5bdd58ec568d81d2c3b83a2c715498b939983e5e5b6</sum></package><package arch="i686" name="glibc-devel" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.209.el6_9.2.i686.rpm</filename><sum type="sha256">649668f2da4e931cc2faedfe0d2ec69dc6ce7ff4c752f74e794f97a8de066bbb</sum></package><package arch="x86_64" name="glibc-utils" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">710bc752f7003fef8b44b26ee2c48386a9161675c6d00d22fc809f4aee3177ba</sum></package><package arch="x86_64" name="nscd" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>nscd-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">83b9c1a5df9eb158c4f8fd2aadb3e4768981cb25370514b0134483c848c9a99f</sum></package><package arch="x86_64" name="glibc" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">b169831dd220d522db5538e848f9dff7ae4c498dc1927f893741472e29e5ddb3</sum></package><package arch="x86_64" name="glibc-common" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-common-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">7a1f0533c84aa9c090fb60a65618267282a836031731402f1be66924b5144dc1</sum></package><package arch="x86_64" name="glibc-headers" release="1.209.el6_9.2" src="glibc-2.12-1.209.el6_9.2.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.209.el6_9.2.x86_64.rpm</filename><sum type="sha256">6fe6a635ebaecfcc36f26a0dec926a406f347421b4cf1db8705d41625ee4b9bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" id="CVE-2017-1000366" title="Glibc: Heap/Stack Gap Jumping Via Unbounded " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1480" id="RHSA-2017:1480-1" title="Rhsa-2017:1480-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452543" id="1452543" title="Glibc: Heap/Stack Gap Jumping Via Unbounded " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1486-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-06-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.3.2.el6.noarch.rpm</filename><sum type="sha256">d4278db0a1770006bc79d268bec9eb12a67cde174c4956eb8bd1966f5dee59e0</sum></package><package arch="x86_64" name="kernel-debug" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">bb0ba1e08436b2a9ef38f68119466f941fc7dd93e438fb36547921eab0590b71</sum></package><package arch="x86_64" name="kernel-devel" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">b4122ca466f38c72fe4dd8d3baa16b28603443250d084763c8f1e62d8428ac5a</sum></package><package arch="x86_64" name="perf" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">11fadaec5369bfd9fa3b0c45cb3792626d340752f5bb9c7146c8820025b979f0</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.3.2.el6.noarch.rpm</filename><sum type="sha256">3567a866bc5265483c14065a7f3d0b67dff9989351f1040f3c2ac4ed752324fd</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">c3a280df754bc3680ad8cab88ec3694ecf12e691829b8b5420099557d798783f</sum></package><package arch="x86_64" name="kernel-headers" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">0a56b143e64c05cc3cfb1a25d5a7f14ab2a06655528f0aa081f79c3dc7769bb3</sum></package><package arch="i686" name="kernel-debug-devel" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.3.2.el6.i686.rpm</filename><sum type="sha256">c1ad349d10953758e9718cffacad19c3653ce42f0aaa8e0dc6b18c612d63a51c</sum></package><package arch="x86_64" name="kernel" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">a5b23b1b8538f73723677876aa632dc79f94de30fcbf001eb6b2dab6eb0c86f6</sum></package><package arch="noarch" name="kernel-firmware" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.3.2.el6.noarch.rpm</filename><sum type="sha256">dfc8a64b1f5db453560506f2fc67d398d837cd5b8c46c9faaeb3d2762547ff6b</sum></package><package arch="x86_64" name="python-perf" release="696.3.2.el6" src="kernel-2.6.32-696.3.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.3.2.el6.x86_64.rpm</filename><sum type="sha256">4ef7ded449dd41d5180877d5c4622cd8116f4e803a1ae2ef631dfa0748dd551d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" id="CVE-2017-1000364" title="Kernel: Heap/Stack Gap Jumping Via Unbounded " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1486" id="RHSA-2017:1486-1" title="Rhsa-2017:1486-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461333" id="1461333" title="Kernel: Heap/Stack Gap Jumping Via Unbounded " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1561-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.2.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7756, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, CVE-2017-7752, CVE-2017-7754, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-06-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.2.0-1.el6_9.src.rpm" version="52.2.0"><filename>thunderbird-52.2.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">366cb3e9de88037c77f2e2444dd57df66160f6695224694d8fb117ae1e8d5c7e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" id="CVE-2017-5470" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" id="CVE-2017-5472" title="Mozilla: Use-After-Free Using Destroyed Node " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" id="CVE-2017-7749" title="Mozilla: Use-After-Free During Docshell " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" id="CVE-2017-7750" title="Mozilla: Use-After-Free With Track Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" id="CVE-2017-7751" title="Mozilla: Use-After-Free With Content Viewer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" id="CVE-2017-7752" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" id="CVE-2017-7754" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" id="CVE-2017-7756" title="Mozilla: Use-After-Free And Use-After-Scope " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" id="CVE-2017-7757" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" id="CVE-2017-7758" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" id="CVE-2017-7764" title="Mozilla: Domain Spoofing With Combination Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771" id="CVE-2017-7771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772" id="CVE-2017-7772" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773" id="CVE-2017-7773" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" id="CVE-2017-7778" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1561" id="RHSA-2017:1561-1" title="Rhsa-2017:1561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461252" id="1461252" title="Mozilla: Use-After-Free Using Destroyed Node " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461253" id="1461253" title="Mozilla: Use-After-Free During Docshell " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461254" id="1461254" title="Mozilla: Use-After-Free With Track Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461255" id="1461255" title="Mozilla: Use-After-Free With Content Viewer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461256" id="1461256" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461257" id="1461257" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461258" id="1461258" title="Mozilla: Use-After-Free And Use-After-Scope " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461259" id="1461259" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461260" id="1461260" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461261" id="1461261" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461262" id="1461262" title="Mozilla: Domain Spoofing With Combination Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461264" id="1461264" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1574-1</id><title>Sudo</title><description>Security Fix(es): 
* It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. (CVE-2017-1000368)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-06-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sudo" release="29.el6_9" src="sudo-1.8.6p3-29.el6_9.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-29.el6_9.x86_64.rpm</filename><sum type="sha256">88cc9cc9e5c3aacf934f90e78562c749310ee6114bd69b25e7eb1aec28386460</sum></package><package arch="i686" name="sudo-devel" release="29.el6_9" src="sudo-1.8.6p3-29.el6_9.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-29.el6_9.i686.rpm</filename><sum type="sha256">efe6b03ba8feb43d659f2d2941094ee653b38a0014e0342c0e23f95a26c55594</sum></package><package arch="x86_64" name="sudo-devel" release="29.el6_9" src="sudo-1.8.6p3-29.el6_9.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-29.el6_9.x86_64.rpm</filename><sum type="sha256">05d7a3d2fedcfca7dd80c4243cf0f688ae9e85fb84e44285cf5186223696be5b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368" id="CVE-2017-1000368" title="Sudo: Privilege Escalation Via Improper " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1574" id="RHSA-2017:1574-1" title="Rhsa-2017:1574-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459152" id="1459152" title="Sudo: Privilege Escalation Via Improper " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1576-1</id><title>Mercurial</title><description>Security Fix(es): 
* A flaw was found in the way "hg serve --stdio" command in Mercurial handled command-line options. A remote, authenticated attacker could use this flaw to execute arbitrary code on the Mercurial server by using specially crafted command-line options. (CVE-2017-9462)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-07-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mercurial" release="5.el6_9" src="mercurial-1.4-5.el6_9.src.rpm" version="1.4"><filename>mercurial-1.4-5.el6_9.x86_64.rpm</filename><sum type="sha256">2525a59f18d894548e8bc571aab08e74a7b87c5f8b78a0883db9f7cda586bdcc</sum></package><package arch="x86_64" name="mercurial-hgk" release="5.el6_9" src="mercurial-1.4-5.el6_9.src.rpm" version="1.4"><filename>mercurial-hgk-1.4-5.el6_9.x86_64.rpm</filename><sum type="sha256">c068a76bf8bb55350fbdd76312ee50bde4b2b761773eb364f780cba09c6505c7</sum></package><package arch="x86_64" name="emacs-mercurial-el" release="5.el6_9" src="mercurial-1.4-5.el6_9.src.rpm" version="1.4"><filename>emacs-mercurial-el-1.4-5.el6_9.x86_64.rpm</filename><sum type="sha256">27bf5a95d9ce6440298a0bbce2eea1eb47b279f3e869446cb93d6cceab818ea7</sum></package><package arch="x86_64" name="emacs-mercurial" release="5.el6_9" src="mercurial-1.4-5.el6_9.src.rpm" version="1.4"><filename>emacs-mercurial-1.4-5.el6_9.x86_64.rpm</filename><sum type="sha256">e77710754ce14935c953bdd1db945bb363d53d96ed1bd44441aa7ad665544e0f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9462" id="CVE-2017-9462" title="Mercurial: Python Debugger Accessible To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1576" id="RHSA-2017:1576-1" title="Rhsa-2017:1576-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459482" id="1459482" title="Mercurial: Python Debugger Accessible To " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1679-1</id><title>Bind</title><description>Security Fix(es): 
* A flaw was found in the way BIND handled TSIG authentication for dynamic updates. A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request. (CVE-2017-3143) 
* A flaw was found in the way BIND handled TSIG authentication of AXFR requests. A remote attacker, able to communicate with an authoritative BIND server, could use this flaw to view the entire contents of a zone by sending a specially constructed request packet. (CVE-2017-3142) 
Bug Fix(es): 
* ICANN is planning to perform a Root Zone DNSSEC Key Signing Key (KSK) rollover during October 2017. Maintaining an up-to-date KSK, by adding the new root zone KSK, is essential for ensuring that validating DNS resolvers continue to function following the rollover.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-07-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-sdb" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.62.rc1.el6_9.4.x86_64.rpm</filename><sum type="sha256">a1baa68e61665963fcd4a1e729c16c360dc398f082947b5995cdd4748d035a56</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.4.i686.rpm</filename><sum type="sha256">2454c0d0285180ad8ca8372e62b55b07481136101654fda9188eeee5f0ec8873</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.62.rc1.el6_9.4.x86_64.rpm</filename><sum type="sha256">d4d21d70411345dac79f0c39a6fe7f8d3e7189b8be7c866f9e9c5ea37d668e82</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.4.x86_64.rpm</filename><sum type="sha256">6b84dbe84794bef39ab8628d5a0887d03d8b3ae8d6a2a9d15ac3d74678ae8d07</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.62.rc1.el6_9.4.x86_64.rpm</filename><sum type="sha256">51f87c1808461187998b7b4a17ebedb0599a40bccd5eb1388e5d1f5b13177cd7</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.62.rc1.el6_9.4.x86_64.rpm</filename><sum type="sha256">3003c03266608f748eee9d7570f491890bb85251b5dae5cff46acd33eb8c3179</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.4.x86_64.rpm</filename><sum type="sha256">adc1a5e462373f2886e026aa81ce453f53f66faba487a9cdb48f10c03050cd22</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.4" src="bind-9.8.2-0.62.rc1.el6_9.4.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.4.i686.rpm</filename><sum type="sha256">82626875853d1935405e18ae07d07485c4c79eb7697f58bd76ecf02246e30e42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142" id="CVE-2017-3142" title="Bind: An Error In Tsig Authentication Can Permit " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143" id="CVE-2017-3143" title="Bind: An Error In Tsig Authentication Can Permit " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1679" id="RHSA-2017:1679-1" title="Rhsa-2017:1679-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466189" id="1466189" title="Bind: An Error In Tsig Authentication Can Permit " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466193" id="1466193" title="Bind: An Error In Tsig Authentication Can Permit " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1721-1</id><title>Httpd</title><description>Security Fix(es): 
* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743) 
Note: The fix for the CVE-2016-8743 issue causes httpd to return "400 Bad Request" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive "HttpProtocolOptions Unsafe" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue. 
Bug Fix(es): 
* Previously, httpd was unable to correctly check a boundary of an array, and in rare cases it attempted to access an element of an array that was out of bounds. Consequently, httpd terminated unexpectedly with a segmentation fault at proxy_util.c. With this update, bounds checking has been fixed, and httpd no longer crashes.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-07-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="httpd-devel" release="60.sl6.4" src="httpd-2.2.15-60.sl6.4.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-60.sl6.4.i686.rpm</filename><sum type="sha256">03fa344fe3f011171803b6c899275a6f4e6b232b8dd4a78f346361a34ce90651</sum></package><package arch="x86_64" name="httpd-devel" release="60.sl6.4" src="httpd-2.2.15-60.sl6.4.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-60.sl6.4.x86_64.rpm</filename><sum type="sha256">3e8d7833d156dbb17d7121b1228430799011869ea85b9b35b2b2d95323f79036</sum></package><package arch="x86_64" name="httpd" release="60.sl6.4" src="httpd-2.2.15-60.sl6.4.src.rpm" version="2.2.15"><filename>httpd-2.2.15-60.sl6.4.x86_64.rpm</filename><sum type="sha256">0fd3a0f06d047606778ac7b19333e32d94ed5f0ff07111bd905ee4f026de6993</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="60.sl6.4" src="httpd-2.2.15-60.sl6.4.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-60.sl6.4.x86_64.rpm</filename><sum type="sha256">88680a0c7835c3c9a1f44db0ba5521906a73470c5d6698de19199033cdd1d8a1</sum></package><package arch="noarch" name="httpd-manual" release="60.sl6.4" src="httpd-2.2.15-60.sl6.4.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-60.sl6.4.noarch.rpm</filename><sum type="sha256">7b92fb6e1e3f4c3c243d028da0aa8412d23b4dfcadc2c3ce6dc8b2aa328ff0df</sum></package><package arch="x86_64" name="httpd-tools" release="60.sl6.4" src="httpd-2.2.15-60.sl6.4.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-60.sl6.4.x86_64.rpm</filename><sum type="sha256">838dfe7b46090bac44123def99f7cb9b554614b5fc799f5740c9f302dafca5da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743" id="CVE-2016-8743" title="Httpd: Apache Http Request Parsing Whitespace " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1721" id="RHSA-2017:1721-1" title="Rhsa-2017:1721-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406822" id="1406822" title="Httpd: Apache Http Request Parsing Whitespace " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463354" id="1463354" title="Segfault In Ap_Proxy_Set_Scoreboard_Lb" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1723-1</id><title>Kernel</title><description>Security Fix(es): 
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important) 
Bug Fix(es): 
* If several file operations were started after a mounted NFS share had got idle and its Transmission Control Protocol (TCP) connection had therefore been terminated, these operations could cause multiple TCP SYN packets coming from the NFS client instead of one. With this update, the reconnection logic has been fixed, and only one TCP SYN packet is now sent in the described situation. 
* When the ixgbe driver was loaded for a backplane-connected network card, a kernel panic could occur, because the ops.setup_fc function pointer was used before the initialization. With this update, ops.setup_fc is initialized earlier. As a result, ixgbe no longer panics on load. 
* When setting an Access Control List (ACL) with 190 and more Access Control Entries (ACEs) on a NFSv4 directory, a kernel crash could previously occur. This update fixes the nfs4_getfacl() function, and the kernel no longer crashes under the described circumstances. 
* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. 
* When a program receives IPv6 packets using the raw socket, the ioctl(FIONREAD) and ioctl(SIOCINQ) functions can incorrectly return zero waiting bytes. This update fixes the ip6_input_finish() function to check the raw payload size properly. As a result, the ioctl() function now returns bytes waiting in the raw socket correctly. 
* Previously, listing a directory on a non-standard XFS filesystem (with non-default multi-fsb directory blocks) could lead to a soft lock up due to array index overrun in the xfs_dir2_leaf_readbuf() function. This update fixes xfs_dir2_leaf_readbuf(), and the soft lock up no longer occurs under the described circumstances. 
* Previously, aborts from the array after the Storage Area Network (SAN) fabric back-pressure led to premature reuse of still valid sequence with the same OX_ID. Consequently, an error message and data corruption could occur. This update fixes the libfc driver to isolate the timed out OX_IDs, thus fixing this bug. 
* Previously, a kernel panic occurred when the mcelog daemon executed a huge page memory offline. This update fixes the HugeTLB feature of the Linux kernel to check for the Page Table Entry (PTE) NULL pointer in the page_check_address() function. As a result, the kernel panic no longer occurs under the described circumstances.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-07-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.6.3.el6.noarch.rpm</filename><sum type="sha256">019f193d68652c61bc6b27688c42ea3351e25697123e80177f92d53d6205bb88</sum></package><package arch="x86_64" name="python-perf" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">eb72737767f7bc7674cb01a399c3fa831329fc62b44cb5387cc03419d1e74272</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">d5a477639e214a775f98298352c5d52f732bbaa781cfaa731d160ad37082d1c6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.6.3.el6.noarch.rpm</filename><sum type="sha256">59740baee481bd15f0d3a56065838dee04694822d164aeacb8e941b2070ce96d</sum></package><package arch="x86_64" name="perf" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">03af5752105d9fae8167c5a0ec7036f1de75c2c8ec9edf5bcb22c2ddaa913f68</sum></package><package arch="i686" name="kernel-debug-devel" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.6.3.el6.i686.rpm</filename><sum type="sha256">e365b975854fa172e36c48af77f3f1b1fb6bbcf67672b304b9d2b828fb1767f2</sum></package><package arch="x86_64" name="kernel-devel" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">780ff32321e5806799f765d814eeb703fee476f14e04121c92bb3798ed5ab67d</sum></package><package arch="x86_64" name="kernel" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">e4f070873c78f8e0126aecce7a36cc0d466b1c5846aa2afef2d8fd8616e77ce6</sum></package><package arch="x86_64" name="kernel-headers" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">9bfffb75565bd90ff7feb75e5f0121ce4054e85aa827104057267e07b51282a2</sum></package><package arch="noarch" name="kernel-firmware" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.6.3.el6.noarch.rpm</filename><sum type="sha256">9b8bfe574c3d0ab35c79b62c1f70699b0e98d3e99f57bc15527ca8007bdae1df</sum></package><package arch="x86_64" name="kernel-debug" release="696.6.3.el6" src="kernel-2.6.32-696.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.6.3.el6.x86_64.rpm</filename><sum type="sha256">bb058ab36c933de7785965b74079d28d6e56aa6cfe1c1732a33942fa0b7fe4d6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" id="CVE-2017-7895" title="Kernel: Nfsv3 Server Does Not Properly Handle " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1723" id="RHSA-2017:1723-1" title="Rhsa-2017:1723-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446103" id="1446103" title="Kernel: Nfsv3 Server Does Not Properly Handle " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1759-1</id><title>Freeradius</title><description>Security Fix(es): 
* An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10979) 
* An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978) 
* Multiple memory leak flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to cause the FreeRADIUS server to consume an increasing amount of memory resources over time, possibly leading to a crash due to memory exhaustion, by sending specially crafted DHCP packets. (CVE-2017-10980, CVE-2017-10981) 
* Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10982, CVE-2017-10983)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-07-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="freeradius-mysql" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-mysql-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">01ef8fd471b85c58ae6b56d0e1e3ca1fb2b62529e3a652e3784c19e2cda150e2</sum></package><package arch="x86_64" name="freeradius-krb5" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-krb5-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">28f737fe61833aa7d983540fdcce5859002dc3620afe00b865a0b6197b677489</sum></package><package arch="x86_64" name="freeradius" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">abcc95e5053330ae9fb91d24eac9623146501d38ced38d44caeaca70ef6df75c</sum></package><package arch="x86_64" name="freeradius-python" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-python-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">e1aff379a2230b82ff5e2a19653f360cafc275b69d800a73a3f265c8d56485cd</sum></package><package arch="x86_64" name="freeradius-utils" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-utils-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">033b3f06d08a751bf677edad737f5de379a6d1910c54878d5c9d2b4b74e1f33e</sum></package><package arch="x86_64" name="freeradius-postgresql" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-postgresql-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">975d5cb799149bfbcb7ae83beab48c363b7e0c02124cd806db71f3d505491ed7</sum></package><package arch="x86_64" name="freeradius-perl" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-perl-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">e82e7bddfce542702b04f8968ce0483fa7a9c60a66a5d3e5a9537661bae24411</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-unixODBC-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">abe332f75e432c2c796319f8b3b2dfde67352f85521d3cc20dbbd4f02fac5369</sum></package><package arch="x86_64" name="freeradius-ldap" release="7.el6_9" src="freeradius-2.2.6-7.el6_9.src.rpm" version="2.2.6"><filename>freeradius-ldap-2.2.6-7.el6_9.x86_64.rpm</filename><sum type="sha256">1eb961cf44f93d211123a9271390a801c24ae534acbbd48547d12407bed421ce</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10978" id="CVE-2017-10978" title="Freeradius: Out-Of-Bounds Read/Write Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10979" id="CVE-2017-10979" title="Freeradius: Out-Of-Bounds Write In Rad_Coalesce()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10980" id="CVE-2017-10980" title="Freeradius: Memory Leak In Decode_Tlv()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10981" id="CVE-2017-10981" title="Freeradius: Memory Leak In Fr_Dhcp_Decode()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10982" id="CVE-2017-10982" title="Freeradius: Out-Of-Bounds Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10983" id="CVE-2017-10983" title="Freeradius: Out-Of-Bounds Read In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1759" id="RHSA-2017:1759-1" title="Rhsa-2017:1759-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468487" id="1468487" title="Freeradius: Out-Of-Bounds Read/Write Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468490" id="1468490" title="Freeradius: Out-Of-Bounds Write In Rad_Coalesce()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468493" id="1468493" title="Freeradius: Memory Leak In Decode_Tlv()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468495" id="1468495" title="Freeradius: Memory Leak In Fr_Dhcp_Decode()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468498" id="1468498" title="Freeradius: Out-Of-Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468503" id="1468503" title="Freeradius: Out-Of-Bounds Read In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1789-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) 
* Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10111, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) 
* It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) 
* It was discovered that the Nashorn JavaScript engine in the Scripting component of OpenJDK could allow scripts to access Java APIs even when access to Java APIs was disabled. An untrusted JavaScript executed by Nashorn could use this flaw to bypass intended restrictions. (CVE-2017-10078) 
* It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. (CVE-2017-10198) 
* A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) 
* A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) 
* It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) 
* Multiple flaws were found in the Hotspot and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-10081, CVE-2017-10193) 
* It was discovered that the JPEGImageReader implementation in the 2D component of OpenJDK would, in certain cases, read all image data even if it was not used later. A specially crafted image could cause a Java application to temporarily use an excessive amount of CPU and memory. (CVE-2017-10053) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-07-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">21e725c57feb16c2a83201f41a325191b77cc92d62c5a5dc6143b0c030469e14</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">29813d80a2cf45773b09fb180a4a69232b62cb1256b167033cedc77f0ed1fd79</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-demo-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">903e8cd19c1dfb85f23e93907fd18f1f509d298dff217ecf664c00de18254ed1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">0ab6541ee7ba2255656234ca37c7e653ab0a2f5513fc3299685919ccad881530</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">9de30e5a42d8d2ab84d03203d1fcd1c511ea5c40c3889d3def40c55933497cf5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">61019a0a484e19b483db129f1c5ece7f0927c5eaa1905f23e12bee3b51aebd5f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-src-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">08fbf256be7f38dcdc10a6677261eb92b4c05cededc03f1608b1120cea0868d3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.141-2.b16.el6_9.noarch.rpm</filename><sum type="sha256">794ba7f05c7b6d58f930c97c5b28eaba76d889e7492726ce452fbc77fbcac6ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-src-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">a0a142f4fc20c91a28b92675865bd8f963700c510a9bcf4bb671b9d221fbb284</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-devel-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">ec0df78d0e2b036a4c74db5d8dbb93156cde5a2ded040c42b61fbb51859ff996</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-javadoc-1.8.0.141-2.b16.el6_9.noarch.rpm</filename><sum type="sha256">f5276bae78af56c2eadfde442ab3f5f2859aac229815e8e7c507b381517a8eac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.b16.el6_9" src="java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-headless-1.8.0.141-2.b16.el6_9.x86_64.rpm</filename><sum type="sha256">49315ac410c972715ae23d6f33229536760b3bbcc2630930a8d02660fd204f30</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" id="CVE-2017-10053" title="Openjdk: Reading Of Unprocessed Image Data In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" id="CVE-2017-10067" title="Openjdk: Jar Verifier Incorrect Handling Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" id="CVE-2017-10074" title="Openjdk: Integer Overflows In Range Check Loop " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078" id="CVE-2017-10078" title="Openjdk: Nashorn Incompletely Blocking Access " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" id="CVE-2017-10081" title="Openjdk: Incorrect Bracket Processing In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" id="CVE-2017-10087" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" id="CVE-2017-10089" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" id="CVE-2017-10090" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" id="CVE-2017-10096" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" id="CVE-2017-10101" title="Openjdk: Unrestricted Access To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" id="CVE-2017-10102" title="Openjdk: Incorrect Handling Of References In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" id="CVE-2017-10107" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" id="CVE-2017-10108" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" id="CVE-2017-10109" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" id="CVE-2017-10110" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111" id="CVE-2017-10111" title="Openjdk: Incorrect Range Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" id="CVE-2017-10115" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" id="CVE-2017-10116" title="Openjdk: Ldapcertstore Following Referrals To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" id="CVE-2017-10135" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" id="CVE-2017-10193" title="Openjdk: Incorrect Key Size Constraint Check " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" id="CVE-2017-10198" title="Openjdk: Incorrect Enforcement Of Certificate " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1789" id="RHSA-2017:1789-1" title="Rhsa-2017:1789-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471266" id="1471266" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471270" id="1471270" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471517" id="1471517" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471521" id="1471521" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471523" id="1471523" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471526" id="1471526" title="Openjdk: Incorrect Range Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471527" id="1471527" title="Openjdk: Unrestricted Access To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471528" id="1471528" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471534" id="1471534" title="Openjdk: Integer Overflows In Range Check Loop " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471535" id="1471535" title="Openjdk: Jar Verifier Incorrect Handling Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471670" id="1471670" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471711" id="1471711" title="Openjdk: Incorrect Bracket Processing In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471715" id="1471715" title="Openjdk: Incorrect Key Size Constraint Check " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471738" id="1471738" title="Openjdk: Ldapcertstore Following Referrals To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471851" id="1471851" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471871" id="1471871" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471888" id="1471888" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471889" id="1471889" title="Openjdk: Reading Of Unprocessed Image Data In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471898" id="1471898" title="Openjdk: Nashorn Incompletely Blocking Access " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472320" id="1472320" title="Openjdk: Incorrect Enforcement Of Certificate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472345" id="1472345" title="Openjdk: Incorrect Handling Of References In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2424-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) 
* Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) 
* It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) 
* It was discovered that the wsdlimport tool in the JAX-WS component of OpenJDK did not use secure XML parser settings when parsing WSDL XML documents. A specially crafted WSDL document could cause wsdlimport to use an excessive amount of CPU and memory, open connections to other hosts, or leak information. (CVE-2017-10243) 
* A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) 
* A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) 
* It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) 
* A flaw was found in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2017-10081) 
* It was discovered that the JPEGImageReader implementation in the 2D component of OpenJDK would, in certain cases, read all image data even if it was not used later. A specially crafted image could cause a Java application to temporarily use an excessive amount of CPU and memory. (CVE-2017-10053)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-08-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.11.0.el6_9" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-src-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm</filename><sum type="sha256">e879707abd8c8b5a4720c21dddd736a94934a81376e346be7969db2e7c7c295d</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.11.0.el6_9" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.0.el6_9.noarch.rpm</filename><sum type="sha256">d4d32441041b1eac71510bd2b9ad86ca681654ff613c2adfac682744786f4f18</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.11.0.el6_9" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm</filename><sum type="sha256">7a7524c372da19150c83c559d6bd52b6ecfaef458b3820e7423c1693ada54364</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.11.0.el6_9" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm</filename><sum type="sha256">47b9e486461c12bcef023640f39b0f4c2c4bf22a5b292d96e357edf4168df182</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.11.0.el6_9" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm</filename><sum type="sha256">6eda53fe606b203b47b03159cba3a295bf1b90f614297fdcba568c47c3a4e454</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" id="CVE-2017-10053" title="Openjdk: Reading Of Unprocessed Image Data In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" id="CVE-2017-10067" title="Openjdk: Jar Verifier Incorrect Handling Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" id="CVE-2017-10074" title="Openjdk: Integer Overflows In Range Check Loop " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" id="CVE-2017-10081" title="Openjdk: Incorrect Bracket Processing In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" id="CVE-2017-10087" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" id="CVE-2017-10089" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" id="CVE-2017-10090" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" id="CVE-2017-10096" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" id="CVE-2017-10101" title="Openjdk: Unrestricted Access To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" id="CVE-2017-10102" title="Openjdk: Incorrect Handling Of References In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" id="CVE-2017-10107" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" id="CVE-2017-10108" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" id="CVE-2017-10109" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" id="CVE-2017-10110" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" id="CVE-2017-10115" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" id="CVE-2017-10116" title="Openjdk: Ldapcertstore Following Referrals To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" id="CVE-2017-10135" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243" id="CVE-2017-10243" title="Openjdk: Insecure Xml Parsing In Wsdlimport " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2424" id="RHSA-2017:2424-1" title="Rhsa-2017:2424-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471266" id="1471266" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471270" id="1471270" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471517" id="1471517" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471521" id="1471521" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471523" id="1471523" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471527" id="1471527" title="Openjdk: Unrestricted Access To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471528" id="1471528" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471534" id="1471534" title="Openjdk: Integer Overflows In Range Check Loop " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471535" id="1471535" title="Openjdk: Jar Verifier Incorrect Handling Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471670" id="1471670" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471711" id="1471711" title="Openjdk: Incorrect Bracket Processing In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471738" id="1471738" title="Openjdk: Ldapcertstore Following Referrals To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471851" id="1471851" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471871" id="1471871" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471888" id="1471888" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471889" id="1471889" title="Openjdk: Reading Of Unprocessed Image Data In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472345" id="1472345" title="Openjdk: Incorrect Handling Of References In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472666" id="1472666" title="Openjdk: Insecure Xml Parsing In Wsdlimport " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2456-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.3.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7779, CVE-2017-7798, CVE-2017-7800, CVE-2017-7801, CVE-2017-7753, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7792, CVE-2017-7802, CVE-2017-7807, CVE-2017-7809, CVE-2017-7791, CVE-2017-7803)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-08-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="3.el6_9" src="firefox-52.3.0-3.el6_9.src.rpm" version="52.3.0"><filename>firefox-52.3.0-3.el6_9.x86_64.rpm</filename><sum type="sha256">d507be75db5cec2db21aa112cf1e2d4a727b668be66ad9dc8941d1e549656e8b</sum></package><package arch="i686" name="firefox" release="3.el6_9" src="firefox-52.3.0-3.el6_9.src.rpm" version="52.3.0"><filename>firefox-52.3.0-3.el6_9.i686.rpm</filename><sum type="sha256">08a111757cf923ec9a076cb91eddfa426e65197f4c7dc5878906ae04c2231008</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" id="CVE-2017-7753" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" id="CVE-2017-7779" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" id="CVE-2017-7784" title="Mozilla: Use-After-Free With Image Observers " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" id="CVE-2017-7785" title="Mozilla: Buffer Overflow Manipulating Aria " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" id="CVE-2017-7786" title="Mozilla: Buffer Overflow While Painting " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" id="CVE-2017-7787" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" id="CVE-2017-7791" title="Mozilla: Spoofing Following Page Navigation With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" id="CVE-2017-7792" title="Mozilla: Buffer Overflow Viewing Certificates " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798" id="CVE-2017-7798" title="Mozilla: Xul Injection In The Style Editor In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" id="CVE-2017-7800" title="Mozilla: Use-After-Free In Websockets During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" id="CVE-2017-7801" title="Mozilla: Use-After-Free With Marquee During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" id="CVE-2017-7802" title="Mozilla: Use-After-Free Resizing Image Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" id="CVE-2017-7803" title="Mozilla: Csp Directives Improperly Applied With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" id="CVE-2017-7807" title="Mozilla: Domain Hijacking Through Appcache " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809" id="CVE-2017-7809" title="Mozilla: Use-After-Free While Deleting Attached " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2456" id="RHSA-2017:2456-1" title="Rhsa-2017:2456-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479188" id="1479188" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479191" id="1479191" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479201" id="1479201" title="Mozilla: Use-After-Free With Image Observers " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479203" id="1479203" title="Mozilla: Buffer Overflow Manipulating Aria " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479205" id="1479205" title="Mozilla: Buffer Overflow While Painting " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479206" id="1479206" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479209" id="1479209" title="Mozilla: Spoofing Following Page Navigation With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479210" id="1479210" title="Mozilla: Buffer Overflow Viewing Certificates " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479213" id="1479213" title="Mozilla: Xul Injection In The Style Editor In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479218" id="1479218" title="Mozilla: Use-After-Free In Websockets During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479223" id="1479223" title="Mozilla: Use-After-Free With Marquee During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479224" id="1479224" title="Mozilla: Use-After-Free Resizing Image Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479225" id="1479225" title="Mozilla: Csp Directives Improperly Applied With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479227" id="1479227" title="Mozilla: Domain Hijacking Through Appcache " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479650" id="1479650" title="Mozilla: Use-After-Free While Deleting Attached " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2478-1</id><title>Httpd</title><description>Security Fix(es): 
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788) 
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167) 
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169) 
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-08-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="httpd-tools" release="60.sl6.5" src="httpd-2.2.15-60.sl6.5.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-60.sl6.5.x86_64.rpm</filename><sum type="sha256">77085caf6c98063d4e8c8fc2af9ba152914c0e937a1b588c846b6fef272c5f7c</sum></package><package arch="x86_64" name="httpd" release="60.sl6.5" src="httpd-2.2.15-60.sl6.5.src.rpm" version="2.2.15"><filename>httpd-2.2.15-60.sl6.5.x86_64.rpm</filename><sum type="sha256">778506534edbc2cf7454bc0a533f688d96b86d34d297123ec0e711c8aa4c3ce0</sum></package><package arch="noarch" name="httpd-manual" release="60.sl6.5" src="httpd-2.2.15-60.sl6.5.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-60.sl6.5.noarch.rpm</filename><sum type="sha256">d03ca4fc6e03e40ea424387af2958d6ad01ef200f9436a9b5477c955c2caebc0</sum></package><package arch="x86_64" name="httpd-devel" release="60.sl6.5" src="httpd-2.2.15-60.sl6.5.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-60.sl6.5.x86_64.rpm</filename><sum type="sha256">fd1d67b5269a7c8de0bda51cef4182214abf9e260dd6100f1dcba9d9f3c7d781</sum></package><package arch="i686" name="httpd-devel" release="60.sl6.5" src="httpd-2.2.15-60.sl6.5.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-60.sl6.5.i686.rpm</filename><sum type="sha256">137c1093c87f3de665495ed007f85252257201e99dc9ebb20f62c3f0ae11cc51</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="60.sl6.5" src="httpd-2.2.15-60.sl6.5.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-60.sl6.5.x86_64.rpm</filename><sum type="sha256">8c87d9a32002987377788f5a5d81ada2de39af3d34c8fbd97367c7323c4e9eeb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167" id="CVE-2017-3167" title="Httpd: Ap_Get_Basic_Auth_Pw() Authentication Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169" id="CVE-2017-3169" title="Httpd: Mod_Ssl Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679" id="CVE-2017-7679" title="Httpd: Mod_Mime Buffer Overread" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788" id="CVE-2017-9788" title="Httpd: Uninitialized Memory Reflection In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2478" id="RHSA-2017:2478-1" title="Rhsa-2017:2478-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463194" id="1463194" title="Httpd: Ap_Get_Basic_Auth_Pw() Authentication Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463197" id="1463197" title="Httpd: Mod_Ssl Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463207" id="1463207" title="Httpd: Mod_Mime Buffer Overread" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470748" id="1470748" title="Httpd: Uninitialized Memory Reflection In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2485-1</id><title>Git</title><description>Security Fix(es): 
* A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000117)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-08-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="git-all" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-all-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">f57299c2664c0f172ac8c60ab6bb031f94aa4f0182a8597b997090fa5478ae4f</sum></package><package arch="noarch" name="gitweb" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>gitweb-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">156ee25ee26379f29336ae5169ac2eb6325953c7c644daaac89be7995925059c</sum></package><package arch="noarch" name="gitk" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>gitk-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">0816ee686d718b9a5c815cb3c562d16912734e395cdcfb1bc3cc05bfa30f065d</sum></package><package arch="x86_64" name="git-daemon" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-daemon-1.7.1-9.el6_9.x86_64.rpm</filename><sum type="sha256">38315710f0573b3155c4ffe2dcaab85af6b3df5e56a91ed28737f35e8760d142</sum></package><package arch="noarch" name="perl-Git" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>perl-Git-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">afced2cc89763349fe540271abef9c11c526e6816c379c684dfbedec70a334f5</sum></package><package arch="noarch" name="git-svn" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-svn-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">0ba3f49eabcf16e124bdec19b0744826068ef26b4f28fab8725551ed564c0745</sum></package><package arch="noarch" name="git-cvs" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-cvs-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">7d523d7dae6efd912fbe112c2fb6c626db4c7de003e8385b2fcee10b64927288</sum></package><package arch="x86_64" name="git" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-1.7.1-9.el6_9.x86_64.rpm</filename><sum type="sha256">e61c2dd25ebfa46bc8995f0ffd0359eba1ee34943759ef46661ccc6d138a3948</sum></package><package arch="noarch" name="git-email" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-email-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">2f44f1162208c93efa13ca52caef5d27a33d3b5b022b02500983ed475831fa52</sum></package><package arch="noarch" name="emacs-git-el" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>emacs-git-el-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">d353cea62b28beb6d3cf2a1510b11c0d5be2c2f36a3cc42b7c1d7af8608a7cae</sum></package><package arch="noarch" name="emacs-git" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>emacs-git-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">6d0468a0928c6487bc078044232e1371c9c049b8e52ea992dce3f8c53a494528</sum></package><package arch="noarch" name="git-gui" release="9.el6_9" src="git-1.7.1-9.el6_9.src.rpm" version="1.7.1"><filename>git-gui-1.7.1-9.el6_9.noarch.rpm</filename><sum type="sha256">ff376cf7dc5f042c35046d308767d7454f2e146741eb7a5e1c4add5600ffc1f3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117" id="CVE-2017-1000117" title="Git: Command Injection Via Malicious Ssh Urls" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2485" id="RHSA-2017:2485-1" title="Rhsa-2017:2485-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480386" id="1480386" title="Git: Command Injection Via Malicious Ssh Urls" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2534-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.3.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7779, CVE-2017-7800, CVE-2017-7801, CVE-2017-7753, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7792, CVE-2017-7802, CVE-2017-7807, CVE-2017-7809, CVE-2017-7791, CVE-2017-7803)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-08-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.3.0-1.el6_9.src.rpm" version="52.3.0"><filename>thunderbird-52.3.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">3d0426e94c7b83f89a42c888a469adc6d99c4b381b9496a55afbfff245ba560b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" id="CVE-2017-7753" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" id="CVE-2017-7779" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" id="CVE-2017-7784" title="Mozilla: Use-After-Free With Image Observers " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" id="CVE-2017-7785" title="Mozilla: Buffer Overflow Manipulating Aria " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" id="CVE-2017-7786" title="Mozilla: Buffer Overflow While Painting " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" id="CVE-2017-7787" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" id="CVE-2017-7791" title="Mozilla: Spoofing Following Page Navigation With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" id="CVE-2017-7792" title="Mozilla: Buffer Overflow Viewing Certificates " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" id="CVE-2017-7800" title="Mozilla: Use-After-Free In Websockets During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" id="CVE-2017-7801" title="Mozilla: Use-After-Free With Marquee During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" id="CVE-2017-7802" title="Mozilla: Use-After-Free Resizing Image Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" id="CVE-2017-7803" title="Mozilla: Csp Directives Improperly Applied With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" id="CVE-2017-7807" title="Mozilla: Domain Hijacking Through Appcache " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809" id="CVE-2017-7809" title="Mozilla: Use-After-Free While Deleting Attached " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2534" id="RHSA-2017:2534-1" title="Rhsa-2017:2534-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479188" id="1479188" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479191" id="1479191" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479201" id="1479201" title="Mozilla: Use-After-Free With Image Observers " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479203" id="1479203" title="Mozilla: Buffer Overflow Manipulating Aria " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479205" id="1479205" title="Mozilla: Buffer Overflow While Painting " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479206" id="1479206" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479209" id="1479209" title="Mozilla: Spoofing Following Page Navigation With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479210" id="1479210" title="Mozilla: Buffer Overflow Viewing Certificates " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479218" id="1479218" title="Mozilla: Use-After-Free In Websockets During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479223" id="1479223" title="Mozilla: Use-After-Free With Marquee During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479224" id="1479224" title="Mozilla: Use-After-Free Resizing Image Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479225" id="1479225" title="Mozilla: Csp Directives Improperly Applied With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479227" id="1479227" title="Mozilla: Domain Hijacking Through Appcache " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479650" id="1479650" title="Mozilla: Use-After-Free While Deleting Attached " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2550-1</id><title>Poppler</title><description>Security Fix(es): 
* An integer overflow leading to heap-based buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash, or potentially execute arbitrary code when opened. (CVE-2017-9776)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-09-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="poppler-qt4-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt4-devel-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">484d59e0a9c448def0bf3855c845ceaa5c77b2c7b59cf1892305c3b6109124fb</sum></package><package arch="x86_64" name="poppler" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">4bd152db726737c66355dd524c7af5f0de22822186ccb8feff611ed1398af897</sum></package><package arch="x86_64" name="poppler-utils" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-utils-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">66989fd08aa0e42e9da8890d915ea695f613d12176de13a2476694eb6ff92200</sum></package><package arch="i686" name="poppler-qt4" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt4-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">d2a4ffc5c89465dbe868e7f5965bdc62db441cd9ad7fa4afd058e6fbff0517a0</sum></package><package arch="x86_64" name="poppler-qt" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">dca134843dcb80a9dad489b93f73f9d290eb88aaf394d8c5f50ea8b336e2cbe5</sum></package><package arch="x86_64" name="poppler-qt4-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt4-devel-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">ee8b5e98292b9da01d24c3d5d28369dc71ca90c10639c44f14d1f6f11729eb11</sum></package><package arch="i686" name="poppler" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">668c1d99c9731bc89b25f720a9047dc476e4e631606ffca9a6ca674fa39d5c04</sum></package><package arch="x86_64" name="poppler-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-devel-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">82ad39c573ea1801cafc8f1a22694e53e4acf2db88630e8b971b46b5b6bff0c3</sum></package><package arch="x86_64" name="poppler-qt-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt-devel-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">90cb83e2aacf1dac049fe1277fce7a8693c0636f2c1ccc1bdd468c65398b20bd</sum></package><package arch="x86_64" name="poppler-glib" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-glib-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">703e1e5083228a5b8fe6897dba5e89cb75f7f616761778099c9f5a8982014162</sum></package><package arch="i686" name="poppler-qt-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt-devel-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">6d4ac572510baa6b3efdb9f38e402da73bcfb84dfca4f68f4f6c1468d68b53be</sum></package><package arch="i686" name="poppler-glib-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-glib-devel-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">4b4ef472476fe5217c4fba49a60863914da0574aa881af681c89dec67002e371</sum></package><package arch="i686" name="poppler-qt" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">769553248ebd397368a8fe20322e95eac43403518c389abf8578b958dfc0bb64</sum></package><package arch="x86_64" name="poppler-glib-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-glib-devel-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">d14f4ccaa85692e2086e783338963b0bc80e3f12d0a01d8b88cfe1195bb2afe9</sum></package><package arch="i686" name="poppler-glib" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-glib-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">9957e273c5f421fd6b765380af4f7bd4a657f8765365ed5acfcf7b87e67f1ca9</sum></package><package arch="i686" name="poppler-devel" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-devel-0.12.4-12.el6_9.i686.rpm</filename><sum type="sha256">4f4a0fad120358511b53a193d59ef9050645f3385e283e2fbbac621a583c263a</sum></package><package arch="x86_64" name="poppler-qt4" release="12.el6_9" src="poppler-0.12.4-12.el6_9.src.rpm" version="0.12.4"><filename>poppler-qt4-0.12.4-12.el6_9.x86_64.rpm</filename><sum type="sha256">7d7438155da183e33c4f448e22909454786a41b4bb7ec506fe721cd84eb8e4e1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776" id="CVE-2017-9776" title="Poppler: Integer Overflow In Jbig2Stream.Cc" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2550" id="RHSA-2017:2550-1" title="Rhsa-2017:2550-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466443" id="1466443" title="Poppler: Integer Overflow In Jbig2Stream.Cc" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2563-1</id><title>Openssh</title><description>Security Fix(es): 
* A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users. A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses. (CVE-2016-6210)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-09-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssh-ldap" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-123.el6_9.x86_64.rpm</filename><sum type="sha256">83f4fcaff751c8bf0c487d7b8a7638840f6175dff1406cd3c1022e1e5900f29a</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-123.el6_9.x86_64.rpm</filename><sum type="sha256">9b5e75c7763fe25827e5deb19de3da628e71aae9f148e6f4149e0db22923943b</sum></package><package arch="x86_64" name="openssh" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="5.3p1"><filename>openssh-5.3p1-123.el6_9.x86_64.rpm</filename><sum type="sha256">e52d6a25b833663ba9becbc63ed638e9da15bd7ef53743c7b264adc1281a417c</sum></package><package arch="x86_64" name="openssh-clients" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-123.el6_9.x86_64.rpm</filename><sum type="sha256">89e3b5d2f3606b6965e1c9cfef465cce58b4210f7fceb5555290e5ff1f8b4a88</sum></package><package arch="x86_64" name="openssh-server" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-123.el6_9.x86_64.rpm</filename><sum type="sha256">c611c454ad3c1095c3ad4beb8d18d0685b8573484e83576157c48ff70cf3e308</sum></package><package arch="x86_64" name="openssh-askpass" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-123.el6_9.x86_64.rpm</filename><sum type="sha256">903c3cc3e1fe5e7cdb1c4559d0ef9dc8305a8f5b3f4e3bd7d6f2a2628afef108</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="123.el6_9" src="openssh-5.3p1-123.el6_9.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-123.el6_9.i686.rpm</filename><sum type="sha256">0d3b4f07827f28ab885f94552df147e81a91bf37a07e4c2068b95146c1df6cf9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" id="CVE-2016-6210" title="Openssh: User Enumeration Via Covert Timing Channel" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2563" id="RHSA-2017:2563-1" title="Rhsa-2017:2563-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357442" id="1357442" title="Openssh: User Enumeration Via Covert Timing Channel" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2681-1</id><title>Kernel</title><description>Security Fix(es): 
* A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client. On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other than s390x and ppc64[le]), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to crash the system. Due to the nature of the stack protection feature, code execution cannot be fully ruled out, although we believe it is unlikely. On systems without the stack protection feature (ppc64[le]; the Bluetooth modules are not built on s390x), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to remotely execute arbitrary code on the system with ring 0 (kernel) privileges. (CVE-2017-1000251, Important)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-09-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">c4c51727cff7bb860b185e75fbe6f5cad01a845ad73f444bd4146b314005822e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">08c0f39a12f6e0d3f8231b64aaa8fec7d8ae1720383c92a10b4d0c1681e8dfb5</sum></package><package arch="noarch" name="kernel-doc" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.10.2.el6.noarch.rpm</filename><sum type="sha256">8ba9a17c87744ab3b5edd58b5a827b280655e1feb60f0c3eaf8298dc9774515d</sum></package><package arch="x86_64" name="python-perf" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">962ccb7fc13d9752a6552f00fb3e9da272cc2e4e7f59121a54facd28cceb6d34</sum></package><package arch="noarch" name="kernel-firmware" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.10.2.el6.noarch.rpm</filename><sum type="sha256">9594c4e6cc6c4d4945adf98516408763aac60dc405d8544f3b426cc0b9e7980e</sum></package><package arch="x86_64" name="kernel-debug" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">8efafc9de5da80fc9c38b74706147583a3e8145d1447a68e10dba6ce5cb977b8</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.10.2.el6.noarch.rpm</filename><sum type="sha256">611b9a684051af5e4cced48c671c88d2ea4df4a2470bfe2731e16436ef5c15be</sum></package><package arch="i686" name="kernel-debug-devel" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.10.2.el6.i686.rpm</filename><sum type="sha256">b1270330476a39f015b90ca3f9766c5e06bf84385f307974f19d9c9dd4ac2bf1</sum></package><package arch="x86_64" name="kernel-devel" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">4a7a8f857f2898bc288b4d2864bbf5c2dda171634d2494549931a3e123a88952</sum></package><package arch="x86_64" name="perf" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">5e2b0fc5f2c4c8b0f780fa12700d9a70ee3adb80141d5bff00f09e72d22fc2b7</sum></package><package arch="x86_64" name="kernel-headers" release="696.10.2.el6" src="kernel-2.6.32-696.10.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.10.2.el6.x86_64.rpm</filename><sum type="sha256">6a9da1fde2911a942a74b456a54af8e1d3b9303b6022e37810f9a09000c28503</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" id="CVE-2017-1000251" title="Kernel: Stack Buffer Overflow In The Native " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2681" id="RHSA-2017:2681-1" title="Rhsa-2017:2681-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489716" id="1489716" title="Kernel: Stack Buffer Overflow In The Native " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2685-1</id><title>Bluez</title><description>Security Fix(es): 
* An information-disclosure flaw was found in the bluetoothd implementation of the Service Discovery Protocol (SDP). A specially crafted Bluetooth device could, without prior pairing or user interaction, retrieve portions of the bluetoothd process memory, including potentially sensitive information such as Bluetooth encryption keys. (CVE-2017-1000250)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-09-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="bluez-gstreamer" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-gstreamer-4.66-2.el6_9.i686.rpm</filename><sum type="sha256">40c417ebb3ee9e5367e06a606d0cad2ae5135297b04085d0916bd87964d3dfae</sum></package><package arch="i686" name="bluez-alsa" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-alsa-4.66-2.el6_9.i686.rpm</filename><sum type="sha256">9ee76fcc7239a5ddbeb04c312ea0febb1c66bfac89fb041ffe87b481f3218f18</sum></package><package arch="x86_64" name="bluez" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">8d43530d1be6b1760715bf8aba9b6f8db4f5ac686fd3166c7b218909258ad2a1</sum></package><package arch="i686" name="bluez-libs-devel" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-libs-devel-4.66-2.el6_9.i686.rpm</filename><sum type="sha256">a4b907bab21cfb79ecba7c5c8bb54eaf57d5e16a4672f7ca36124e724bdc26c8</sum></package><package arch="i686" name="bluez-libs" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-libs-4.66-2.el6_9.i686.rpm</filename><sum type="sha256">7bcac087a22a9f93c8768c7001d23a15381831c3d2e61a666180f537f1294c46</sum></package><package arch="x86_64" name="bluez-gstreamer" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-gstreamer-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">4b0e7d49bafc0d0c2d5a34e86d0ebb7f0fb45c96725aff98d7e3e18b9d2fa1a7</sum></package><package arch="x86_64" name="bluez-compat" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-compat-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">905541f4720864bf7c1fde0307c20577c9238673d82183adcd13a9c83f6d8e12</sum></package><package arch="x86_64" name="bluez-cups" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-cups-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">0bf3e5ea90d0c1ddeb61ec638b381297f077647ab7411bdeb9f4307832162f92</sum></package><package arch="x86_64" name="bluez-alsa" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-alsa-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">685bded55ccb125ead44d8e9efd7082e685f4e007bd3f42ef831d0d167901685</sum></package><package arch="x86_64" name="bluez-libs" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-libs-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">bc7fd88651091079a38dd3014a2e20d03be40eac206ef4c29ed0af5dea279fbf</sum></package><package arch="x86_64" name="bluez-libs-devel" release="2.el6_9" src="bluez-4.66-2.el6_9.src.rpm" version="4.66"><filename>bluez-libs-devel-4.66-2.el6_9.x86_64.rpm</filename><sum type="sha256">91b235ff964ee562279707d0de2c2242458ffccf39f54e33dddbd5c64341ff2f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" id="CVE-2017-1000250" title="Cve-2017-1000250" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2685" id="RHSA-2017:2685-1" title="Rhsa-2017:2685-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489446" id="1489446" title="Bluez: Out-Of-Bounds Heap Read In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2789-1</id><title>Samba</title><description>Security Fix(es): 
* A race condition was found in samba server. A malicious samba client could use this flaw to access files and directories in areas of the server file system not exported under the share definitions. (CVE-2017-2619) 
* It was found that samba did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man- in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150) 
* An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-09-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-domainjoin-gui" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">a335e482fe91ebe7d78b42a77b5cbd93bcc3c50df93e8c23247003d9245d8d92</sum></package><package arch="i686" name="libsmbclient" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-45.el6_9.i686.rpm</filename><sum type="sha256">9317c294344b61baeb5c01ab76b2c758ac63d957965a9734f31e72dad4c30fd9</sum></package><package arch="x86_64" name="samba-winbind-devel" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">414e49eba44ca9fd79e963f84102961ad20a1ec9f81fbf5e5456b407c8eb19d0</sum></package><package arch="i686" name="samba-winbind-clients" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-45.el6_9.i686.rpm</filename><sum type="sha256">3598f4b0b89b863899ad5b262022f60cdd811fe7dbb6c44400c1c8ef4362caf7</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">9c4ef5e053f2b64d818489114e52af0ce878f4cfbaf7ad6b3481320d19d4862b</sum></package><package arch="x86_64" name="samba-common" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">3a6e08ccf4c2e87618b3a7ec5a8ca46f9f1eb22a8d4295f10f6879332e204fb1</sum></package><package arch="x86_64" name="libsmbclient" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">580c690b30daf2bf875321a6f6b0f159539ee16155c7344660c334c5cc2fe59d</sum></package><package arch="i686" name="libsmbclient-devel" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-45.el6_9.i686.rpm</filename><sum type="sha256">ec930cec2f3b8b4eecda96b461ac66c07f9104bb93695d286c7f493cf1b87ca6</sum></package><package arch="i686" name="samba-winbind-devel" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-45.el6_9.i686.rpm</filename><sum type="sha256">dcbb0d8e0b1d6c3615aefd477c766189799bfe3739777c3b310c281d8c54d4ab</sum></package><package arch="x86_64" name="samba-winbind" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">628c5c4f6f1c9c1e82da34e07c7770b5c4d59da309487f396daeb814d64bda35</sum></package><package arch="i686" name="samba-common" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-45.el6_9.i686.rpm</filename><sum type="sha256">7246b1ba5729bc259b17e6a40cf5341ff442ab140bfa0944caa209fa77ef09a6</sum></package><package arch="x86_64" name="libsmbclient-devel" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">863a9e7c3da29e9ef77f405ce17ce8097dbe6f2bf562a07985b7271e4c4d0559</sum></package><package arch="x86_64" name="samba-winbind-clients" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">9d350fb1c8c8f6dad679d54b741e94e828975961b26381355cbc18b585919d24</sum></package><package arch="x86_64" name="samba" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">856a573b3cad6f1fc9368c69d1f3f61c762753fa0200d2644fc000cbc58a0dde</sum></package><package arch="x86_64" name="samba-doc" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">88c3afbe9777dd254735c9b716868de7366233b5fae7457ff3471ada77fa18df</sum></package><package arch="x86_64" name="samba-swat" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">275bc3f2fc7596441ad8d4bef1fb8bfaad41e3534c41e380f7f2ee4de0dd6b69</sum></package><package arch="x86_64" name="samba-glusterfs" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">4c0832bc00ec67ed6b2d2a0fa0c7677786f7f7135ccfb743dde49cd9c91ff2cf</sum></package><package arch="x86_64" name="samba-client" release="45.el6_9" src="samba-3.6.23-45.el6_9.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-45.el6_9.x86_64.rpm</filename><sum type="sha256">c0310959115be09f7f5f752c16c7fe1e4428d6d83f1f428f46006cbf6e628b34</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" id="CVE-2017-12150" title="Samba: Some Code Path Don'T Enforce Smb " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" id="CVE-2017-12163" title="Samba: Server Memory Information Leak Over Smb1" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" id="CVE-2017-2619" title="Samba: Symlink Race Permits Opening Files Outside Share Directory" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2789" id="RHSA-2017:2789-1" title="Rhsa-2017:2789-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429472" id="1429472" title="Samba: Symlink Race Permits Opening Files Outside Share Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488400" id="1488400" title="Samba: Some Code Path Don'T Enforce Smb " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491206" id="1491206" title="Samba: Server Memory Information Leak Over Smb1" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2791-1</id><title>Samba4</title><description>Security Fix(es): 
* It was found that samba did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man- in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150) 
* An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-09-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-winbind" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">98e09b6d2872b172d6a6e0f8fc26eeb00121607bada6ac15d6a66c976818f1c6</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">03dd98f7ec52c58d8af044bde2ad7eba87df886bfbb409912fe0039ad47f2eab</sum></package><package arch="x86_64" name="samba4-devel" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">de299c75e70f9c2afff044955b989fef600c6e18a29f1ed34dae8ab8dbbf8d3e</sum></package><package arch="x86_64" name="samba4-dc-libs" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">06eccfeef2dfc85a2e6c8cc6c11e081c556997f8b89c4f39032bad74781b1e4b</sum></package><package arch="x86_64" name="samba4-python" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">45759e9030c2e07e49663e8196a307fbd7249fffb5df30096498780a99040ed8</sum></package><package arch="x86_64" name="samba4-libs" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">8c42dede0f929d3fa975e1282f3f62d183d7da1055822c3dd6538fa312382586</sum></package><package arch="x86_64" name="samba4" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">2ca4cfb6d18562fe00c36fab4e3c8e234bed5c695b11ab2b76e929daa060e3cc</sum></package><package arch="x86_64" name="samba4-dc" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">569c90779b345cb5978f73bd6b1cc7377bba378875c1fbf29757de17b142cba2</sum></package><package arch="x86_64" name="samba4-client" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">9cd2e6b407cde3dfe673da31a366cf01b3e78d428fb988b2861e5deeb4362752</sum></package><package arch="x86_64" name="samba4-test" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">63df6e2f3e8ee5b9f56a660926c0dbe1150d635b7423e3a0be237ce20a191bd9</sum></package><package arch="x86_64" name="samba4-pidl" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">23a4738c8d6bb981115f5a6b03e3eb1dc51385042f61cf1abfebe841177283e8</sum></package><package arch="x86_64" name="samba4-common" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">29b1ec0ebb2378db67066e43aa9ef6788a0045a8b142a369afe13e0a00cc8176</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="11.el6_9" src="samba4-4.2.10-11.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-11.el6_9.x86_64.rpm</filename><sum type="sha256">6fe1dcc154243db90dd4cf278272d38befb978e529714f1e212d1724989e0fe0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" id="CVE-2017-12150" title="Samba: Some Code Path Don'T Enforce Smb " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" id="CVE-2017-12163" title="Samba: Server Memory Information Leak Over Smb1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2791" id="RHSA-2017:2791-1" title="Rhsa-2017:2791-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488400" id="1488400" title="Samba: Some Code Path Don'T Enforce Smb " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491206" id="1491206" title="Samba: Server Memory Information Leak Over Smb1" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2795-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system. (CVE-2017-1000253, Important)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-10-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">88466ad5e66c397a7039bb1c7bb83b9ab57765b5d88dca2813c2fafc93307c4c</sum></package><package arch="noarch" name="kernel-doc" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.10.3.el6.noarch.rpm</filename><sum type="sha256">60886710a0f0435284b4c641f536b5d8cc3600966355a67c88c7ddeb594c814f</sum></package><package arch="noarch" name="kernel-firmware" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.10.3.el6.noarch.rpm</filename><sum type="sha256">a371ac93bb7655a3a4772cf1b19c4c83a10c261516039d28d008b0383871ca49</sum></package><package arch="x86_64" name="kernel" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">b5b01320b20cf54f92a5ab485b6b69488e8eba979bf4480e424bf0c14cadc56d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">7f0d2fe374422ea9d650f2df4ad5a90e155936a9ca22c323be6c835c8b647f35</sum></package><package arch="x86_64" name="perf" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">58d86c641afc79675dbd28cff590c2468117be826fa935e1fa3a821daf8360e3</sum></package><package arch="i686" name="kernel-debug-devel" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.10.3.el6.i686.rpm</filename><sum type="sha256">ca92d408a34683677e2f8ce7ec4639179a7786098705ad809aa090854516c9cd</sum></package><package arch="x86_64" name="kernel-devel" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">fb6e6e9a2540c50486e6a286f896e8451a0eeac2cb29750c8c2dce8a325e5685</sum></package><package arch="x86_64" name="python-perf" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">f8f02a98074dc27005e4c3712d269e27bff0c3db1d3a661f898adbcef17eac23</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.10.3.el6.noarch.rpm</filename><sum type="sha256">e34a595d77f857d0a722d324b850c209f41491244a41def1408ae4866dea6db4</sum></package><package arch="x86_64" name="kernel-headers" release="696.10.3.el6" src="kernel-2.6.32-696.10.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.10.3.el6.x86_64.rpm</filename><sum type="sha256">4aed8c65a559ac256a1899aa32a2195b7a445e0bc61fea46bfc2a6bc0196a896</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253" id="CVE-2017-1000253" title="Kernel: Load_Elf_ Binary() Does Not Take " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2795" id="RHSA-2017:2795-1" title="Rhsa-2017:2795-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492212" id="1492212" title="Kernel: Load_Elf_ Binary() Does Not Take " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2831-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.4.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-10-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.4.0-1.el6_9.src.rpm" version="52.4.0"><filename>firefox-52.4.0-1.el6_9.i686.rpm</filename><sum type="sha256">6c8fe24f282e69deb493b438a7825f73e523c9b4ad8a0ba39a1efc7d60702065</sum></package><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.4.0-1.el6_9.src.rpm" version="52.4.0"><filename>firefox-52.4.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">cd88d4455e307cd771975f9837e3f1a49d6494c9f40c32dc71af4568d7990dd4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" id="CVE-2017-7793" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" id="CVE-2017-7810" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" id="CVE-2017-7814" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" id="CVE-2017-7818" title="Mozilla: Use-After-Free During Aria Array " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" id="CVE-2017-7819" title="Mozilla: Use-After-Free While Resizing Images In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" id="CVE-2017-7823" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" id="CVE-2017-7824" title="Mozilla: Buffer Overflow When Drawing And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2831" id="RHSA-2017:2831-1" title="Rhsa-2017:2831-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496649" id="1496649" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496651" id="1496651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496652" id="1496652" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496653" id="1496653" title="Mozilla: Use-After-Free During Aria Array " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496654" id="1496654" title="Mozilla: Use-After-Free While Resizing Images In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496655" id="1496655" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496656" id="1496656" title="Mozilla: Buffer Overflow When Drawing And " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2832-1</id><title>Nss</title><description>Security Fix(es): 
* A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application. (CVE-2017-7805)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-10-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nss-tools" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-4.el6_9.x86_64.rpm</filename><sum type="sha256">1b68c4e4a258d5c90452dc756be84753bce93f0884fa8718f364da57ca0058df</sum></package><package arch="i686" name="nss-devel" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-4.el6_9.i686.rpm</filename><sum type="sha256">953584e75a9b917aa31170dd53aee2f08fdcf6e780ed443943db8c923eb4fe9e</sum></package><package arch="x86_64" name="nss-sysinit" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-4.el6_9.x86_64.rpm</filename><sum type="sha256">b0f9cacdb3b731c4141df6f6c86512c94a185b969d29fabea5260d533af822f1</sum></package><package arch="i686" name="nss" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-3.28.4-4.el6_9.i686.rpm</filename><sum type="sha256">e2fa4797d2e8604936ee0cd028f74d80384fbbd2c33e1655aa39110c70fb212c</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-4.el6_9.i686.rpm</filename><sum type="sha256">42e593d054692a06568abb413b86d6fa3fa686520cd215efc4cc820bcbcf1df6</sum></package><package arch="x86_64" name="nss" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-3.28.4-4.el6_9.x86_64.rpm</filename><sum type="sha256">7154d5e1091383d1c8431ddecfd40c3389ae1409a0f04289c45f6f26f486a6f8</sum></package><package arch="x86_64" name="nss-devel" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-4.el6_9.x86_64.rpm</filename><sum type="sha256">de5d978e8682db961d501fb1ea7982907d76a3040aca22efdc65d14ff894ca79</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el6_9" src="nss-3.28.4-4.el6_9.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-4.el6_9.x86_64.rpm</filename><sum type="sha256">3eb7e49f3c6d180fe4316201b65f89ad3d42c5e82859675938c52df607fba8c1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805" id="CVE-2017-7805" title="Nss: Potential Use-After-Free In Tls 1.2 Server " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2832" id="RHSA-2017:2832-1" title="Rhsa-2017:2832-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471171" id="1471171" title="Nss: Potential Use-After-Free In Tls 1.2 Server " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2838-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-10-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="dnsmasq" release="18.el6_9" src="dnsmasq-2.48-18.el6_9.src.rpm" version="2.48"><filename>dnsmasq-2.48-18.el6_9.x86_64.rpm</filename><sum type="sha256">f4a31c19fdc8883d346054fa7a01c1b2621aa94f15271111e7852eb7cd616629</sum></package><package arch="x86_64" name="dnsmasq-utils" release="18.el6_9" src="dnsmasq-2.48-18.el6_9.src.rpm" version="2.48"><filename>dnsmasq-utils-2.48-18.el6_9.x86_64.rpm</filename><sum type="sha256">c448200eac936625d4c09e69f113be358a253f370632d60c29f0318d1d14e5ca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491" id="CVE-2017-14491" title="Dnsmasq: Heap Overflow In The Code Responsible " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2838" id="RHSA-2017:2838-1" title="Rhsa-2017:2838-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495409" id="1495409" title="Dnsmasq: Heap Overflow In The Code Responsible " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2860-1</id><title>Postgresql</title><description>Security Fix(es): 
* It was found that authenticating to a PostgreSQL database account with an empty password was possible despite libpq's refusal to send an empty password. A remote attacker could potentially use this flaw to gain access to database accounts with empty passwords. (CVE-2017-7546)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-10-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="postgresql-pltcl" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-pltcl-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">673d6aa73c5caf0766c3202e96c388027e77687ce39e1626bd4fdc6b52f5e898</sum></package><package arch="i686" name="postgresql-libs" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-8.el6_9.i686.rpm</filename><sum type="sha256">d3f2be0ffc5a570cc7a08eea2c18edc89b8864bda4721d4ad4cba9db1322d6b7</sum></package><package arch="x86_64" name="postgresql-test" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-test-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">4944e54fd501283f504edac9b944d7031361fd54ab68718fa53a98787cf226ba</sum></package><package arch="i686" name="postgresql" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-8.el6_9.i686.rpm</filename><sum type="sha256">beef0ce70fa1450cdf658ec058a1b0393cde05b98729ae5b0d81abc528c85317</sum></package><package arch="x86_64" name="postgresql-docs" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-docs-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">029cff6e6b145223e13a39fbdf7d907f05b4d4ed4c1401563cf7cede493c4ba4</sum></package><package arch="i686" name="postgresql-devel" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-8.el6_9.i686.rpm</filename><sum type="sha256">1cf596c4e3319289c9aed8a47cbe224ed4e14450fbbd2ccdcef6f64e45d292b6</sum></package><package arch="x86_64" name="postgresql-libs" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-libs-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">b28d435f4667072494439407f613fb84d3220c5a6ea0215f3f802b1ae8989c04</sum></package><package arch="x86_64" name="postgresql-devel" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-devel-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">63fd13af37d885da749f2c7be5437140ea884e9a84dd232511e06f9d48ac3ab2</sum></package><package arch="x86_64" name="postgresql-server" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-server-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">f9b26f2640711100d52f0a72305d0e4c8aef580595f0389c7f4dc5c1060a4796</sum></package><package arch="x86_64" name="postgresql-plpython" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-plpython-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">741092232c7958dfe47f34d6d0a5610bd3c0d06efd9c8929dff57ac730af2c99</sum></package><package arch="x86_64" name="postgresql-plperl" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-plperl-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">021f22da75c58f49ec986633db2f9a05dbbde224502e689eb130ba70b9b3dd61</sum></package><package arch="x86_64" name="postgresql" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">b8cc36f2875ce0ff031b47ac9f751e184dc4e5b5ff6fb035b743b34ab0ba613f</sum></package><package arch="x86_64" name="postgresql-contrib" release="8.el6_9" src="postgresql-8.4.20-8.el6_9.src.rpm" version="8.4.20"><filename>postgresql-contrib-8.4.20-8.el6_9.x86_64.rpm</filename><sum type="sha256">a0a23ec00812db748594c12dfcfaaf0162801292dd157de2059f1f043ac3b305</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" id="CVE-2017-7546" title="Postgresql: Empty Password Accepted In Some " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2860" id="RHSA-2017:2860-1" title="Rhsa-2017:2860-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1477184" id="1477184" title="Postgresql: Empty Password Accepted In Some " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2863-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel memory corruption due to a buffer overflow was found in brcmf_cfg80211_mgmt_tx() function in Linux kernels from v3.9-rc1 to v4.13-rc1. The vulnerability can be triggered by sending a crafted NL80211_CMD_FRAME packet via netlink. This flaw is unlikely to be triggered remotely as certain userspace code is needed for this. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely. (CVE-2017-7541, Moderate) 
Bug Fix(es): 
* Previously, removal of a rport during ISCSI target scanning could cause a kernel panic. This was happening because addition of STARGET_REMOVE to the rport state introduced a race condition to the SCSI code. This update adds the STARGET_CREATED_REMOVE state as a possible state of the rport and appropriate handling of that state, thus fixing the bug. As a result, the kernel panic no longer occurs under the described circumstances. 
* Previously, GFS2 contained multiple bugs where the wrong inode was assigned to GFS2 cluster-wide locks (glocks), or the assigned inode was cleared incorrectly. Consequently, kernel panic could occur when using GFS2. With this update, GFS2 has been fixed, and the kernel no longer panics due to those bugs. 
* Previously, VMs with memory larger than 64GB running on Hyper-V with Windows Server hosts reported potential memory size of 4TB and more, but could not use more than 64GB. This was happening because the Memory Type Range Register (MTRR) for memory above 64GB was omitted. With this update, the /proc/mtrr file has been fixed to show correct base/size if they are more than 44 bit wide. As a result, the whole size of memory is now available as expected under the described circumstances.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-10-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-headers" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">92de60bfc26b152c19c89024cdacf5d64280deb17debaa02dd6aeb48a6027b41</sum></package><package arch="noarch" name="kernel-doc" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.13.2.el6.noarch.rpm</filename><sum type="sha256">50a672a034c33c8f2c70b5260c034c684df6e9138f0caf37d12ee517f654b001</sum></package><package arch="i686" name="kernel-debug-devel" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.13.2.el6.i686.rpm</filename><sum type="sha256">f668a3121357d0228fb667495ce7618c2a204a9703856b81e55c6334519226cf</sum></package><package arch="x86_64" name="perf" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">6e00858f6bbb3c1e5865c4cd9e748ca2f138dbcd6b5c170b717d1119574916e3</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.13.2.el6.noarch.rpm</filename><sum type="sha256">c94591d676e929fac6d314ff61c2c90146696b40ab75ba3ecd230d798daaa2f3</sum></package><package arch="x86_64" name="kernel-debug" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">c8408dae41345f3aa38e26590533c071ad52978d0bc9afaa59a1b3079508cc73</sum></package><package arch="x86_64" name="kernel-devel" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">3e10f6a4a1ba55355ca9a75296367bb0ce99a37817959b36d0dab83c763a6b63</sum></package><package arch="x86_64" name="python-perf" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">1decf968c9998aae01311e6edfc87930005d7888a29238832b670074d0405b69</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">f3b64c46a235993cbd61d8d5e4f3f648a3c7763b6d24b25958d9fe910a578c89</sum></package><package arch="noarch" name="kernel-firmware" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.13.2.el6.noarch.rpm</filename><sum type="sha256">4aafa206050bfcd23af7a4e16e482a52c2e87dd3720204d08e8d1fd75e3d37f7</sum></package><package arch="x86_64" name="kernel" release="696.13.2.el6" src="kernel-2.6.32-696.13.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.13.2.el6.x86_64.rpm</filename><sum type="sha256">d105bdf2ce3453c2a3447fd80cb7748a0e119c30ec7a147799e9a0b713b2f2bf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" id="CVE-2017-7541" title="Kernel: Possible Heap Buffer Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2863" id="RHSA-2017:2863-1" title="Rhsa-2017:2863-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473198" id="1473198" title="Kernel: Possible Heap Buffer Overflow In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2885-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.4.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-10-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_9" src="thunderbird-52.4.0-2.el6_9.src.rpm" version="52.4.0"><filename>thunderbird-52.4.0-2.el6_9.x86_64.rpm</filename><sum type="sha256">4cc05b63ab8b533d7d225c350a1d88d93d4e5c81ce2618ab8c7a6cb2c7139b75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" id="CVE-2017-7793" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" id="CVE-2017-7810" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" id="CVE-2017-7814" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" id="CVE-2017-7818" title="Mozilla: Use-After-Free During Aria Array " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" id="CVE-2017-7819" title="Mozilla: Use-After-Free While Resizing Images In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" id="CVE-2017-7823" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" id="CVE-2017-7824" title="Mozilla: Buffer Overflow When Drawing And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2885" id="RHSA-2017:2885-1" title="Rhsa-2017:2885-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496649" id="1496649" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496651" id="1496651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496652" id="1496652" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496653" id="1496653" title="Mozilla: Use-After-Free During Aria Array " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496654" id="1496654" title="Mozilla: Use-After-Free While Resizing Images In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496655" id="1496655" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496656" id="1496656" title="Mozilla: Buffer Overflow When Drawing And " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2911-1</id><title>Wpa_Supplicant</title><description>Security Fix(es): * A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13087)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-10-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="9.el6_9.2" src="wpa_supplicant-0.7.3-9.el6_9.2.src.rpm" version="0.7.3"><filename>wpa_supplicant-0.7.3-9.el6_9.2.x86_64.rpm</filename><sum type="sha256">4391ccca7a1283c40152048fa9924eca708d29a5da62f0ce88407ad8d369ad2e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077" id="CVE-2017-13077" title="Wpa_Supplicant: Reinstallation Of The Pairwise " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" id="CVE-2017-13078" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" id="CVE-2017-13080" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" id="CVE-2017-13087" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2911" id="RHSA-2017:2911-1" title="Rhsa-2017:2911-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491692" id="1491692" title="Wpa_Supplicant: Reinstallation Of The Pairwise " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491693" id="1491693" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491696" id="1491696" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500303" id="1500303" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2972-1</id><title>Httpd</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798) 
* A regression was found in the Scientific Linux 6.9 version of httpd, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource. (CVE-2017-12171)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-10-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="httpd-devel" release="60.sl6.6" src="httpd-2.2.15-60.sl6.6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-60.sl6.6.x86_64.rpm</filename><sum type="sha256">66b0fd35a16410b211f16a98bbf4a9b1a790758ba49a4fc61ef856a54d26ebcb</sum></package><package arch="i686" name="httpd-devel" release="60.sl6.6" src="httpd-2.2.15-60.sl6.6.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-60.sl6.6.i686.rpm</filename><sum type="sha256">a941364a85c9e9019cd612d4a201a9673ffc1102d71195db9cb7c4a22db27654</sum></package><package arch="x86_64" name="httpd-tools" release="60.sl6.6" src="httpd-2.2.15-60.sl6.6.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-60.sl6.6.x86_64.rpm</filename><sum type="sha256">c088e6b04c8faed91c4304afba87342b18e19e8a4f2fb17d17d7a969b029f4e3</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="60.sl6.6" src="httpd-2.2.15-60.sl6.6.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-60.sl6.6.x86_64.rpm</filename><sum type="sha256">25fee440063edbf2275d668258d2f93fb1fdb8aeeb96d609045f6bc65842a6c4</sum></package><package arch="x86_64" name="httpd" release="60.sl6.6" src="httpd-2.2.15-60.sl6.6.src.rpm" version="2.2.15"><filename>httpd-2.2.15-60.sl6.6.x86_64.rpm</filename><sum type="sha256">d78e807790a3502508b347057935bd0e88aab6d4f7067e365dfa82a29a0cf2f0</sum></package><package arch="noarch" name="httpd-manual" release="60.sl6.6" src="httpd-2.2.15-60.sl6.6.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-60.sl6.6.noarch.rpm</filename><sum type="sha256">f6a98b36d518261d39834d10f98d2d9b8c712ddeab2254d101807779104914a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12171" id="CVE-2017-12171" title="Httpd: # Character Matches All Ips" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798" id="CVE-2017-9798" title="Httpd: Use-After-Free By Limiting Unregistered " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2972" id="RHSA-2017:2972-1" title="Rhsa-2017:2972-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490344" id="1490344" title="Httpd: Use-After-Free By Limiting Unregistered " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493056" id="1493056" title="Httpd: # Character Matches All Ips" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2998-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10285, CVE-2017-10346) 
* It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply message. A man-in-the- middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients. (CVE-2017-10388) 
* It was discovered that the Security component of OpenJDK generated weak password-based encryption keys used to protect private keys stored in key stores. This made it easier to perform password guessing attacks to decrypt stored keys if an attacker could gain access to a key store. (CVE-2017-10356) 
* A flaw was found in the Smart Card IO component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2017-10274) 
* It was found that the FtpClient implementation in the Networking component of OpenJDK did not set connect and read timeouts by default. A malicious FTP server or a man-in-the-middle attacker could use this flaw to block execution of a Java application connecting to an FTP server. (CVE-2017-10355) 
* It was found that the HttpURLConnection and HttpsURLConnection classes in the Networking component of OpenJDK failed to check for newline characters embedded in URLs. An attacker able to make a Java application perform an HTTP request using an attacker provided URL could possibly inject additional headers into the request. (CVE-2017-10295) 
* It was discovered that multiple classes in the JAXP, Serialization, Libraries, and JAX-WS components of OpenJDK did not limit the amount of memory allocated when creating object instances from the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. (CVE-2017-10349, CVE-2017-10357, CVE-2017-10347, CVE-2017-10281, CVE-2017-10345, CVE-2017-10348, CVE-2017-10350) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-10-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el6_9.noarch.rpm</filename><sum type="sha256">cded3938597dd71d3b8447cd66192496c952a91d12b8422daa5973a25c69f5cc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">133bf839775c7cd8ca20674654bd8778efc7895c7066686a5a3cbdf1854092f3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el6_9.noarch.rpm</filename><sum type="sha256">8db9cf01a9cf2b418d088b04ea6a5077a3be113b7cd1c4e77e6caf34c5e599e1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">b2d3e1eaa2906ff9b6222a2d29e74fd73ad7ea9b2f0ba0ad6345b3044e76d013</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">fc8aae29244d01aca3ec3099bee76e79c98146f03b5ea4620de97133c8458cf2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">bc401003c005593603990d54889084dcf4def4910ef357d94c1272544b3a1d60</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">6a0f2f7cafe70eaf649a6e2971b6ace5a3ed9e47b69ea3d6e81dc6fc1e355252</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">2e3bd7d1958ed2042abca4c6b1e5ce63021a5737bec921d05fdbf2f61ac1df82</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">6516c1bb6f3ec602ca4b6ff8d271fe02af5d0f4f587ceac69fc3c1f214d02440</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">9f018de9a38cc160f6f30fc0def2054c6f552daabfb8d5b5a4b00ced538e64ab</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-src-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">a73ea68937daecb9338aa0fec3569b746da8891ba1572598c1f2147123293a56</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b12.el6_9" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el6_9.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el6_9.x86_64.rpm</filename><sum type="sha256">0db528d8212a85e1bbb5bc41ca04df424a325fc6e4780f2477d3fc813bb8620c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" id="CVE-2017-10274" title="Openjdk: Cardimpl Incorrect State Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" id="CVE-2017-10281" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" id="CVE-2017-10285" title="Openjdk: Incorrect Privilege Use When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" id="CVE-2017-10295" title="Openjdk: Http Client Insufficient Check For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" id="CVE-2017-10345" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" id="CVE-2017-10346" title="Openjdk: Insufficient Loader Constraints Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" id="CVE-2017-10347" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" id="CVE-2017-10348" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" id="CVE-2017-10349" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" id="CVE-2017-10350" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" id="CVE-2017-10355" title="Openjdk: No Default Network Operations Timeouts " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" id="CVE-2017-10356" title="Openjdk: Weak Protection Of Key Stores Against " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" id="CVE-2017-10357" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" id="CVE-2017-10388" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2998" id="RHSA-2017:2998-1" title="Rhsa-2017:2998-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501868" id="1501868" title="Openjdk: Incorrect Privilege Use When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501873" id="1501873" title="Openjdk: Insufficient Loader Constraints Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502038" id="1502038" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502053" id="1502053" title="Openjdk: Cardimpl Incorrect State Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502611" id="1502611" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502614" id="1502614" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502629" id="1502629" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502632" id="1502632" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502640" id="1502640" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502649" id="1502649" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502687" id="1502687" title="Openjdk: Http Client Insufficient Check For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502858" id="1502858" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502869" id="1502869" title="Openjdk: No Default Network Operations Timeouts " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503169" id="1503169" title="Openjdk: Weak Protection Of Key Stores Against " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3071-1</id><title>Ntp</title><description>Security Fix(es): 
* Two vulnerabilities were discovered in the NTP server's parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message. (CVE-2017-6463, CVE-2017-6464) 
* A vulnerability was found in NTP, in the parsing of packets from the /dev/datum device. A malicious device could send crafted messages, causing ntpd to crash. (CVE-2017-6462)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2017-10-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntp-perl" release="12.el6_9.1" src="ntp-4.2.6p5-12.el6_9.1.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-12.el6_9.1.x86_64.rpm</filename><sum type="sha256">b8316133064eb15e07c1efb471e3866d8cf097540fc891544a6f013049a0ca37</sum></package><package arch="x86_64" name="ntp" release="12.el6_9.1" src="ntp-4.2.6p5-12.el6_9.1.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-12.el6_9.1.x86_64.rpm</filename><sum type="sha256">aaebc7bbb3fbfa93012b57fe375cd77ef0d08bb68e05e12aae5f05ce63ecd0c1</sum></package><package arch="noarch" name="ntp-doc" release="12.el6_9.1" src="ntp-4.2.6p5-12.el6_9.1.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-12.el6_9.1.noarch.rpm</filename><sum type="sha256">c25d5ae9eb12cd8f5903eab7de6b201d70035b4343ddeaf5c3c6575899d780e9</sum></package><package arch="x86_64" name="ntpdate" release="12.el6_9.1" src="ntp-4.2.6p5-12.el6_9.1.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-12.el6_9.1.x86_64.rpm</filename><sum type="sha256">6562dc8d1ecb9710c02c45fd4e60958cbc6c46575ef3f606b557667a3c4d725e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" id="CVE-2017-6462" title="Ntp: Buffer Overflow In Dpts Clock" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" id="CVE-2017-6463" title="Ntp: Authenticated Dos Via Malicious Config Option" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" id="CVE-2017-6464" title="Ntp: Denial Of Service Via Malformed Config" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3071" id="RHSA-2017:3071-1" title="Rhsa-2017:3071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433987" id="1433987" title="Ntp: Denial Of Service Via Malformed Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433995" id="1433995" title="Ntp: Buffer Overflow In Dpts Clock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434002" id="1434002" title="Ntp: Authenticated Dos Via Malicious Config Option" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3080-1</id><title>Tomcat6</title><description>Security Fix(es): 
* A vulnerability was discovered in Tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647) 
* A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664) 
* Two vulnerabilities were discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615, CVE-2017-12617)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-11-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-el-2.1-api" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">a242e04823176bb9a30a1932b0e9aa0f534faf13bdb9155fe66f2deebd27d227</sum></package><package arch="noarch" name="tomcat6-javadoc" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">d92cd24c3791076fe5d4220d3db6eec296de2fb0501e9935c0b672fc535bf7fc</sum></package><package arch="noarch" name="tomcat6-lib" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">70df8a6bfa699bce9f5d0c0c61a70e9e862ffdca4465ecdb0da239bc54c43fa7</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">4801abedcb8a8aead259080473f95ce08a49dda6b960c1a66deeb17b7ad1c243</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">4a24723c75d4f6e6db258de8fd76ed277395ed575fe955f6145da0f295a03ddd</sum></package><package arch="noarch" name="tomcat6-webapps" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">9ebf33fcc9990522d5a4d32dbaa116cedbac8b40c04d01ff2922e9fd23e95750</sum></package><package arch="noarch" name="tomcat6" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">c26fdc8896543d7817670148450f37c6cfc3c25908a29dd8a794a38b423f7ae2</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">8708517cbfe8ee1077fb7ac81870a410274b8d6e94b4369a230186ec5255fcd2</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="111.el6_9" src="tomcat6-6.0.24-111.el6_9.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-111.el6_9.noarch.rpm</filename><sum type="sha256">2cb699feacba802bd8b22e797994513874296ea630c508ce2efc3f3284641404</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12615" id="CVE-2017-12615" title="Tomcat: Remote Code Execution Via Jsp Upload" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617" id="CVE-2017-12617" title="Tomcat: Remote Code Execution Bypass For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647" id="CVE-2017-5647" title="Tomcat: Incorrect Handling Of Pipelined Requests " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664" id="CVE-2017-5664" title="Tomcat: Security Constrained Bypass In Error " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3080" id="RHSA-2017:3080-1" title="Rhsa-2017:3080-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441205" id="1441205" title="Tomcat: Incorrect Handling Of Pipelined Requests " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459158" id="1459158" title="Tomcat: Security Constrained Bypass In Error " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461851" id="1461851" title="The Tomcat6 Build Is Incompatible With The Ecj Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493220" id="1493220" title="Tomcat: Remote Code Execution Via Jsp Upload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494283" id="1494283" title="Tomcat: Remote Code Execution Bypass For " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3200-1</id><title>Kernel</title><description>Security Fix(es): 
* A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets are implemented in the Linux kernel networking subsystem handling synchronization. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2017-1000111, Important) 
* An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges. (CVE-2017-1000112, Important) 
* A divide-by-zero vulnerability was found in the __tcp_select_window function in the Linux kernel. This can result in a kernel panic causing a local denial of service. (CVE-2017-14106, Moderate) 
Bug Fix(es): 
* When the operating system was booted with RHEV/oVirt, and the eh_deadline sysfs parameter was set to 10s, the Storage Area Network (SAN) issues caused eh_deadline to trigger with no handler. Consequently, a kernel panic occurred. This update fixes the lpfc driver, thus preventing the kernel panic under described circumstances. 
* When an NFS server returned the NFS4ERR_BAD_SEQID error to an OPEN request, the open-owner was removed from the state_owners rbtree. Consequently, NFS4 client infinite loop that required a reboot to recover occurred. This update changes NFS4ERR_BAD_SEQID handling to leave the open-owner in the state_owners rbtree by updating the create_time parameter so that it looks like a new open-owner. As a result, an NFS4 client is now able to recover without falling into the infinite recovery loop after receiving NFS4ERR_BAD_SEQID. 
* If an NFS client attempted to mount NFSv3 shares from an NFS server exported directly to the client's IP address, and this NFS client had already mounted other shares that originated from the same server but were exported to the subnetwork which this client was part of, the auth.unix.ip cache expiration was not handled correctly. Consequently, the client received the 'stale file handle' errors when trying to mount the share. This update fixes handling of the cache expiration, and the NFSv3 shares now mount as expected without producing the 'stale file handle' errors. 
* When running a script that raised the tx ring count to its maximum value supported by the Solarflare Network Interface Controller (NIC) driver, the EF10 family NICs allowed the settings exceeding the hardware's capability. Consequently, the Solarflare hardware became unusable with Scientific Linux 6. This update fixes the sfc driver, so that the tx ring can have maximum 2048 entries for all EF10 NICs. As a result, the Solarflare hardware no longer becomes unusable.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-11-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.16.1.el6.noarch.rpm</filename><sum type="sha256">0af4b1ab5e56d14bd8d74131ac1e4a6014b577980ae7741af5f70544354792f0</sum></package><package arch="x86_64" name="kernel-debug" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">56afae0140242483b45787b910117bf6e1c2ff2fd460f96b6f27e10966515fcf</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">c1587130feef352a52c94496fdb661ba0318a84bae4151d55712b575b238d456</sum></package><package arch="x86_64" name="kernel" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">52d525c763fd649fb1adbf9f0a1e63159cb46cae72fbd6ba571f8775fe63ff58</sum></package><package arch="noarch" name="kernel-firmware" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.16.1.el6.noarch.rpm</filename><sum type="sha256">282cf7cf8d7501c367bda3adc1a4e44b35848ed17c9c1eb2eff1a63c946a13aa</sum></package><package arch="x86_64" name="kernel-devel" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">9d42c082718011984c2fac0c1e24ff00322a7488759e069fb9dbcaf324dc76f9</sum></package><package arch="x86_64" name="python-perf" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">6af5e87d98fa8e086ec8e87f0f3b05fc9b647ee067f37608c0db3b50f0bd8803</sum></package><package arch="noarch" name="kernel-doc" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.16.1.el6.noarch.rpm</filename><sum type="sha256">1f4f2c2a62a42d515e7ae0255c3f9a2a7d44a1751f93a4f93aacbd57c80eead0</sum></package><package arch="x86_64" name="perf" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">b632ff17103219152738ef2d4fa0ac6f80468e698853d3385f7ffe481e49ba40</sum></package><package arch="x86_64" name="kernel-headers" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.16.1.el6.x86_64.rpm</filename><sum type="sha256">08f0fbd96cd9593cec69ad4e3774d97e6d5eeab3d1e7296e58e3a85767a47c94</sum></package><package arch="i686" name="kernel-debug-devel" release="696.16.1.el6" src="kernel-2.6.32-696.16.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm</filename><sum type="sha256">12fce8b6da30a42427117e9b2cc36160cfba0ac2fcbc7b2744bac9dc5e33f81b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111" id="CVE-2017-1000111" title="Kernel: Heap Out-Of-Bounds In Af_Packet Sockets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" id="CVE-2017-1000112" title="Kernel: Exploitable Memory Corruption Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" id="CVE-2017-14106" title="Kernel: Divide-By-Zero In __Tcp_Select_Window" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3200" id="RHSA-2017:3200-1" title="Rhsa-2017:3200-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479304" id="1479304" title="Kernel: Heap Out-Of-Bounds In Af_Packet Sockets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479307" id="1479307" title="Kernel: Exploitable Memory Corruption Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487295" id="1487295" title="Kernel: Divide-By-Zero In __Tcp_Select_Window" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3247-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.5.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-11-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.5.0-1.el6_9.src.rpm" version="52.5.0"><filename>firefox-52.5.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">c477ea4ae93b8cecda79df0598015a6bb6002a359e83abb2570470a6763dfc3e</sum></package><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.5.0-1.el6_9.src.rpm" version="52.5.0"><filename>firefox-52.5.0-1.el6_9.i686.rpm</filename><sum type="sha256">0f6f5df535b0a99473466e27223d8e6acd0cb38be4b7ca5d5dea7230168438e9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" id="CVE-2017-7826" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" id="CVE-2017-7828" title="Mozilla: Use-After-Free Of Pressshell While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" id="CVE-2017-7830" title="Mozilla: Cross-Origin Url Information Leak " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3247" id="RHSA-2017:3247-1" title="Rhsa-2017:3247-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513308" id="1513308" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513310" id="1513310" title="Mozilla: Use-After-Free Of Pressshell While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513311" id="1513311" title="Mozilla: Cross-Origin Url Information Leak " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3270-1</id><title>Apr</title><description>Security Fix(es): 
* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-12-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="apr-devel" release="5.el6_9.1" src="apr-1.3.9-5.el6_9.1.src.rpm" version="1.3.9"><filename>apr-devel-1.3.9-5.el6_9.1.i686.rpm</filename><sum type="sha256">a9c97028a603580d611bb9017851234fc3fe7e13f205dba3ec79b1360004c6f4</sum></package><package arch="i686" name="apr" release="5.el6_9.1" src="apr-1.3.9-5.el6_9.1.src.rpm" version="1.3.9"><filename>apr-1.3.9-5.el6_9.1.i686.rpm</filename><sum type="sha256">ac520e8990617bfb66ac8eeb6d0eb4def426d90f5d722b7e61ef811083775d29</sum></package><package arch="x86_64" name="apr-devel" release="5.el6_9.1" src="apr-1.3.9-5.el6_9.1.src.rpm" version="1.3.9"><filename>apr-devel-1.3.9-5.el6_9.1.x86_64.rpm</filename><sum type="sha256">45fcd0885e71519e4d820b5ed01727effc622abc922b2a3f3bb945bfb91e2a27</sum></package><package arch="x86_64" name="apr" release="5.el6_9.1" src="apr-1.3.9-5.el6_9.1.src.rpm" version="1.3.9"><filename>apr-1.3.9-5.el6_9.1.x86_64.rpm</filename><sum type="sha256">a9ae85030d5c0638adf9411de2d021aea673602b034d006008b65e03a76cbe85</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613" id="CVE-2017-12613" title="Apr: Out-Of-Bounds Array Deref In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3270" id="RHSA-2017:3270-1" title="Rhsa-2017:3270-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506523" id="1506523" title="Apr: Out-Of-Bounds Array Deref In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3278-1</id><title>Samba4</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code. (CVE-2017-14746) 
* A memory disclosure flaw was found in samba. An attacker could retrieve parts of server memory, which could contain potentially sensitive data, by sending specially-crafted requests to the samba server. (CVE-2017-15275)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-12-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-dc-libs" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">4968f038452791c26bbd57ca050f04c46c1335d303d4c3fd643855d116ff8f84</sum></package><package arch="x86_64" name="samba4-dc" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">fc35f7a4a83a5fdb4ee5c0801baf00db5d87c01b972f7d49ff53ac8f2970c3d9</sum></package><package arch="x86_64" name="samba4-libs" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">8b7f086507f47597a42a6d4a5ff2c1ebb11faa42f178da5f305f9a37df0e02bb</sum></package><package arch="x86_64" name="samba4-client" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">7b183f6fe6eb725dbbd5943f31a55d7668f9ef067081926cadd76d1a21a893e9</sum></package><package arch="x86_64" name="samba4" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">335a00b192e63715a76a85e2e4962092283db76c33a9af6f9f405240ad3ddb76</sum></package><package arch="x86_64" name="samba4-test" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">dd954d069272761f3afbf606043112999e0eb403827163912ffda29f50dd6517</sum></package><package arch="x86_64" name="samba4-python" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">48f918bb679041fbe8bd22ab0a7d15544dad446c44e68a306e8785e01b79496e</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">f8b351d6fbe8e5ec5891de8ad58acc13c0422e45e8c9fce8df483625e260156c</sum></package><package arch="x86_64" name="samba4-common" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">27571fce0a169f39a0b0facc053cf672868402d3a06d8ec82dbedab5eb1bfaec</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">d903b9f9a53b076fae24f0a370750d65e43ed2937c8e59a384e274d5f782a7d8</sum></package><package arch="x86_64" name="samba4-pidl" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">a3d0b87c1798e26c4f9636c86a6b55aa9d6b3f1d90fad4cce647f0b3ad50fad2</sum></package><package arch="x86_64" name="samba4-winbind" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">54f796c3496a8a6dda5b5da8c283ce50c82b71cfd9457a04559310dbd197c6e6</sum></package><package arch="x86_64" name="samba4-devel" release="12.el6_9" src="samba4-4.2.10-12.el6_9.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-12.el6_9.x86_64.rpm</filename><sum type="sha256">3c9b5814e956b30c4b8a47aafa5ecefdf82568131dc4cc836466d849a0e93228</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" id="CVE-2017-14746" title="Samba: Use-After-Free In Processing Smb1 Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" id="CVE-2017-15275" title="Samba: Server Heap-Memory Disclosure" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3278" id="RHSA-2017:3278-1" title="Rhsa-2017:3278-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511899" id="1511899" title="Samba: Use-After-Free In Processing Smb1 Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1512465" id="1512465" title="Samba: Server Heap-Memory Disclosure" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3372-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.5.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-12-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.5.0-1.el6_9.src.rpm" version="52.5.0"><filename>thunderbird-52.5.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">f68c286a22a6b878b8b4a52f97be464797a07bed7da712e9c21cadac9bcb0004</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" id="CVE-2017-7826" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" id="CVE-2017-7828" title="Mozilla: Use-After-Free Of Pressshell While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" id="CVE-2017-7830" title="Mozilla: Cross-Origin Url Information Leak " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3372" id="RHSA-2017:3372-1" title="Rhsa-2017:3372-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513308" id="1513308" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513310" id="1513310" title="Mozilla: Use-After-Free Of Pressshell While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513311" id="1513311" title="Mozilla: Cross-Origin Url Information Leak " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3382-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.5.1 ESR. 
Security Fix(es): 
* A privacy flaw was discovered in Firefox. In Private Browsing mode, a web worker could write persistent data to IndexedDB, which was not cleared when exiting and would persist across multiple sessions. A malicious website could exploit the flaw to bypass private-browsing protections and uniquely fingerprint visitors. (CVE-2017-7843)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-12-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.5.1-1.el6_9.src.rpm" version="52.5.1"><filename>firefox-52.5.1-1.el6_9.i686.rpm</filename><sum type="sha256">9e71dc27fea2298deb8b2d4d285f2221def7abf3772c7c3993da937037251d5d</sum></package><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.5.1-1.el6_9.src.rpm" version="52.5.1"><filename>firefox-52.5.1-1.el6_9.x86_64.rpm</filename><sum type="sha256">6051ed256b7086dc705ffa9c8f61f06a3ae4660cb45ab1190d9650a50c95f458</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7843" id="CVE-2017-7843" title="Mozilla: Web Worker In Private Browsing Mode Can " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3382" id="RHSA-2017:3382-1" title="Rhsa-2017:3382-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1518566" id="1518566" title="Mozilla: Web Worker In Private Browsing Mode Can " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3392-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10285, CVE-2017-10346) 
* It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply message. A man-in-the- middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients. (CVE-2017-10388) 
* It was discovered that the Security component of OpenJDK generated weak password-based encryption keys used to protect private keys stored in key stores. This made it easier to perform password guessing attacks to decrypt stored keys if an attacker could gain access to a key store. (CVE-2017-10356) 
* Multiple flaws were found in the Smart Card IO and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-10274, CVE-2017-10193) 
* It was found that the FtpClient implementation in the Networking component of OpenJDK did not set connect and read timeouts by default. A malicious FTP server or a man-in-the-middle attacker could use this flaw to block execution of a Java application connecting to an FTP server. (CVE-2017-10355) 
* It was found that the HttpURLConnection and HttpsURLConnection classes in the Networking component of OpenJDK failed to check for newline characters embedded in URLs. An attacker able to make a Java application perform an HTTP request using an attacker provided URL could possibly inject additional headers into the request. (CVE-2017-10295) 
* It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. (CVE-2017-10198) 
* It was discovered that multiple classes in the JAXP, Serialization, Libraries, and JAX-WS components of OpenJDK did not limit the amount of memory allocated when creating object instances from the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. (CVE-2017-10349, CVE-2017-10357, CVE-2017-10347, CVE-2017-10281, CVE-2017-10345, CVE-2017-10348, CVE-2017-10350) 
Bug Fix(es): 
* Previously, OpenJDK could not handle situations when the kernel blocked on a read even when polling the socket indicated that a read is possible. As a consequence, OpenJDK could hang indefinitely. With this update, OpenJDK polls with a timeout and performs a non-blocking read on success, and it no longer hangs in these situations.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-12-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.12.0.el6_9" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el6_9.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el6_9.x86_64.rpm</filename><sum type="sha256">567e63008ceae46cb86fa859b565c7c8cff04c77c4536a1aa9bfdd8d39124407</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.12.0.el6_9" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el6_9.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el6_9.noarch.rpm</filename><sum type="sha256">0546099399c7a1e7f1a31e39884d901b09a424aa4cfe1c778714a9e6e527e7b2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.12.0.el6_9" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el6_9.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el6_9.x86_64.rpm</filename><sum type="sha256">1b395d3860959a10db5177637a6d589473c7d15020358f1dd2bb8eed3e7803fe</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.12.0.el6_9" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el6_9.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el6_9.x86_64.rpm</filename><sum type="sha256">1f359e3f2fa729a42ed0bab200d24ac73d45408f95aa635b3e99173021271e18</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.12.0.el6_9" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el6_9.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el6_9.x86_64.rpm</filename><sum type="sha256">12feeb29976247aab21af38064c6bb41865b84b959bf7f0023fe80a877fce566</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" id="CVE-2017-10193" title="Openjdk: Incorrect Key Size Constraint Check " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" id="CVE-2017-10198" title="Openjdk: Incorrect Enforcement Of Certificate " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" id="CVE-2017-10274" title="Openjdk: Cardimpl Incorrect State Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" id="CVE-2017-10281" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" id="CVE-2017-10285" title="Openjdk: Incorrect Privilege Use When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" id="CVE-2017-10295" title="Openjdk: Http Client Insufficient Check For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" id="CVE-2017-10345" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" id="CVE-2017-10346" title="Openjdk: Insufficient Loader Constraints Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" id="CVE-2017-10347" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" id="CVE-2017-10348" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" id="CVE-2017-10349" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" id="CVE-2017-10350" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" id="CVE-2017-10355" title="Openjdk: No Default Network Operations Timeouts " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" id="CVE-2017-10356" title="Openjdk: Weak Protection Of Key Stores Against " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" id="CVE-2017-10357" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" id="CVE-2017-10388" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3392" id="RHSA-2017:3392-1" title="Rhsa-2017:3392-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471715" id="1471715" title="Openjdk: Incorrect Key Size Constraint Check " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472320" id="1472320" title="Openjdk: Incorrect Enforcement Of Certificate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501868" id="1501868" title="Openjdk: Incorrect Privilege Use When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501873" id="1501873" title="Openjdk: Insufficient Loader Constraints Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502038" id="1502038" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502053" id="1502053" title="Openjdk: Cardimpl Incorrect State Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502611" id="1502611" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502614" id="1502614" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502629" id="1502629" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502632" id="1502632" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502640" id="1502640" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502649" id="1502649" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502687" id="1502687" title="Openjdk: Http Client Insufficient Check For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502858" id="1502858" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502869" id="1502869" title="Openjdk: No Default Network Operations Timeouts " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503169" id="1503169" title="Openjdk: Weak Protection Of Key Stores Against " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0008-1</id><title>Kernel</title><description>Security Fix(es): 
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. 
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. The performance impact of these patches may vary considerably based on workload and hardware configuration. 
In this update mitigations for x86-64 architecture are provided. 
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important) 
Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important) 
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important) 
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">8f6f62e5c3ac9c6ab5e120145ab63cbe17f5744e4f8974a605b1f411752ced87</sum></package><package arch="x86_64" name="kernel-headers" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">ef983206c6529426b2425d5381008565e5f00fae491fe321dcce39038f9ffdc6</sum></package><package arch="i686" name="kernel-debug-devel" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm</filename><sum type="sha256">960a36ac27e122c13b8571ad7752ffd6b830592219f1a2826155c1c8aac26f78</sum></package><package arch="x86_64" name="kernel-devel" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">4a46825a86bf8bdbef957d7ef13bfd82e3b83805fd18c736818a213a2e8ef637</sum></package><package arch="x86_64" name="python-perf" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">862f2d0c97e3d1fe5a996dfbb01865e160b8ab78d3ef3b5ed5280c1cac5a1d64</sum></package><package arch="noarch" name="kernel-doc" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.18.7.el6.noarch.rpm</filename><sum type="sha256">38165086edde4ebb7d2022909e3e4173c327f9870a69e788cb3e5cb54e6c2068</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">7ef5346641d744e0e5e8be206c1e424130685101ed08ed29178546b66fac0143</sum></package><package arch="x86_64" name="kernel" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">7192cd5472a5e49d7ae87dc506f06e2120b8c94c3718d92ea41df07cf0616981</sum></package><package arch="x86_64" name="perf" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.18.7.el6.x86_64.rpm</filename><sum type="sha256">902a21cb4a514d610cbdf20cdf2b505670d3680bcd05c5b86d3c0c250b32f964</sum></package><package arch="noarch" name="kernel-firmware" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm</filename><sum type="sha256">f6a846095d12822036604909ee078ed1de46aa50ce5038e93335a868b331cc4a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.18.7.el6" src="kernel-2.6.32-696.18.7.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm</filename><sum type="sha256">ea8f54717c1b946365f59c6c7dd52181bd0e9ec7328e4cb2a75454053e7c4d19</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" id="CVE-2017-5753" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" id="CVE-2017-5754" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0008" id="RHSA-2018:0008-1" title="Rhsa-2018:0008-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519778" id="1519778" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519781" id="1519781" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0013-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the microcode counterpart of the CVE-2017-5715 kernel mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="microcode_ctl" release="25.2.el6_9" src="microcode_ctl-1.17-25.2.el6_9.src.rpm" version="1.17"><filename>microcode_ctl-1.17-25.2.el6_9.x86_64.rpm</filename><sum type="sha256">b2f168095934368cf4a32ea164deef10ef5e243c4ec3d361a68f5dab7e124fee</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0013" id="RHSA-2018:0013-1" title="Rhsa-2018:0013-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0024-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the qemu-kvm side of the CVE-2017-5715 mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.503.el6_9.4" src="qemu-kvm-0.12.1.2-2.503.el6_9.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.503.el6_9.4.x86_64.rpm</filename><sum type="sha256">b9111f615ed00b16598ed70b6886ead500a77fadac0c3bdabf76f614d72996b5</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.503.el6_9.4" src="qemu-kvm-0.12.1.2-2.503.el6_9.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.503.el6_9.4.x86_64.rpm</filename><sum type="sha256">621c289c07e9f4ecd79ecd2b2e3cfe83e5ec62fa81399f19dad22fd9a9d4fd0c</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.503.el6_9.4" src="qemu-kvm-0.12.1.2-2.503.el6_9.4.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.503.el6_9.4.x86_64.rpm</filename><sum type="sha256">a4fd19f22e361db3aa4704cde5616aa6de26880a5c54789599ae1aeabdd3b166</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.503.el6_9.4" src="qemu-kvm-0.12.1.2-2.503.el6_9.4.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.503.el6_9.4.x86_64.rpm</filename><sum type="sha256">3376af6b24b2fa3e954e229cf91b17aba866044273ec6fa9b8bcfa003fdcde8b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0024" id="RHSA-2018:0024-1" title="Rhsa-2018:0024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0030-1</id><title>Libvirt</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the libvirt side of the CVE-2017-5715 mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt-lock-sanlock" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-62.el6_9.1.x86_64.rpm</filename><sum type="sha256">8c3075e664ed1ee4613909e3bcdf40ac106481b8623a068a82b6b98c1448e938</sum></package><package arch="x86_64" name="libvirt" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-62.el6_9.1.x86_64.rpm</filename><sum type="sha256">6319a5930c7bf6082ba81c1d082d56feacb4df0cba573cc7e0a13d3da73d9cc3</sum></package><package arch="i686" name="libvirt-client" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-62.el6_9.1.i686.rpm</filename><sum type="sha256">0c214f9dc23f74366e7b81ec6a83481470a248fd63856b733fb3683515a4406b</sum></package><package arch="i686" name="libvirt-devel" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-62.el6_9.1.i686.rpm</filename><sum type="sha256">2c8093d006167a5a5603b0a421cd0c04fdac1f373a41396a829e1af085e95805</sum></package><package arch="x86_64" name="libvirt-client" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-62.el6_9.1.x86_64.rpm</filename><sum type="sha256">1ab9d21e80aaf6f840478316c2dc88d38a45b65a8286440c0eb3a4c560a1c8ba</sum></package><package arch="x86_64" name="libvirt-python" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-62.el6_9.1.x86_64.rpm</filename><sum type="sha256">18b8f079ef7a1d98ccdda1f63632166670755a44a9926b12584cf11cf8f18d20</sum></package><package arch="x86_64" name="libvirt-devel" release="62.el6_9.1" src="libvirt-0.10.2-62.el6_9.1.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-62.el6_9.1.x86_64.rpm</filename><sum type="sha256">a0f029afd8833b80d4b283ffb3c08419fd9d85fe09ce348f123d5c58b4b59672</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0030" id="RHSA-2018:0030-1" title="Rhsa-2018:0030-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0061-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.5.2. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7846, CVE-2017-7847, CVE-2017-7848, CVE-2017-7829)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.5.2-1.el6_9.src.rpm" version="52.5.2"><filename>thunderbird-52.5.2-1.el6_9.x86_64.rpm</filename><sum type="sha256">b3b6adfae0f9749847863bb8f344a21cf07fedecfc5b2a3148072ed653bd9062</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7829" id="CVE-2017-7829" title="Mozilla: From Address With Encoded Null Character Is Cut Off In Message Header Display" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7846" id="CVE-2017-7846" title="Mozilla: Javascript Execution Via Rss In Mailbox:// Origin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7847" id="CVE-2017-7847" title="Mozilla: Local Path String Can Be Leaked From Rss Feed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7848" id="CVE-2017-7848" title="Mozilla: Rss Feed Vulnerable To New Line Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0061" id="RHSA-2018:0061-1" title="Rhsa-2018:0061-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530187" id="1530187" title="Mozilla: Javascript Execution Via Rss In Mailbox:// Origin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530190" id="1530190" title="Mozilla: Local Path String Can Be Leaked From Rss Feed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530192" id="1530192" title="Mozilla: Rss Feed Vulnerable To New Line Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530195" id="1530195" title="Mozilla: From Address With Encoded Null Character Is Cut Off In Message Header Display" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0093-1</id><title>Microcode_Ctl</title><description>This update supersedes the previous microcode update provided with the CVE-2017-5715 (Spectre) CPU branch injection vulnerability mitigation. Further testing has uncovered problems with the microcode provided along with the Spectre mitigation that could lead to system instabilities. 
As a result, this microcode update reverts to the last known good microcode version dated before 03 January 2018. 
You should contact your hardware provider for the latest microcode updates. 
IMPORTANT: If you are using Intel Skylake-, Broadwell-, and Haswell-based platforms, obtain and install updated microcode from your hardware vendor immediately. The "Spectre" mitigation requires both an updated kernel and updated microcode from your hardware vendor.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="microcode_ctl" release="25.4.el6_9" src="microcode_ctl-1.17-25.4.el6_9.src.rpm" version="1.17"><filename>microcode_ctl-1.17-25.4.el6_9.x86_64.rpm</filename><sum type="sha256">4adde7e3694a811a1ae42a94d4d8eb65ed5aac28261393c493c04a98e513aa96</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0093" id="RHSA-2018:0093-1" title="Rhsa-2018:0093-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0095-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were found in the Hotspot and AWT components of OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2018-2582, CVE-2018-2641) 
* It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data. (CVE-2018-2633) 
* The JGSS component of OpenJDK ignores the value of the javax.security.auth.useSubjectCredsOnly property when using HTTP/SPNEGO authentication and always uses global credentials. It was discovered that this could cause global credentials to be unexpectedly used by an untrusted Java application. (CVE-2018-2634) 
* It was discovered that the JMX component of OpenJDK failed to properly set the deserialization filter for the SingleEntryRegistry in certain cases. A remote attacker could possibly use this flaw to bypass intended deserialization restrictions. (CVE-2018-2637) 
* It was discovered that the LDAP component of OpenJDK failed to properly encode special characters in user names when adding them to an LDAP search query. A remote attacker could possibly use this flaw to manipulate LDAP queries performed by the LdapLoginModule class. (CVE-2018-2588) 
* It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries. (CVE-2018-2599) 
* It was discovered that the I18n component of OpenJDK could use an untrusted search path when loading resource bundle classes. A local attacker could possibly use this flaw to execute arbitrary code as another local user by making their Java application load an attacker controlled class file. (CVE-2018-2602) 
* It was discovered that the Libraries component of OpenJDK failed to sufficiently limit the amount of memory allocated when reading DER encoded input. A remote attacker could possibly use this flaw to make a Java application use an excessive amount of memory if it parsed attacker supplied DER encoded input. (CVE-2018-2603) 
* It was discovered that the key agreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break data encryption by attacking key agreement rather than the encryption using the negotiated secret. (CVE-2018-2618) 
* It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use a previously freed context. (CVE-2018-2629) 
* It was discovered that multiple classes in the Libraries, AWT, and JNDI components of OpenJDK did not sufficiently validate input when creating object instances from the serialized form. A specially-crafted input could cause a Java application to create objects with an inconsistent state or use an excessive amount of memory when deserialized. (CVE-2018-2663, CVE-2018-2677, CVE-2018-2678) 
* It was discovered that multiple encryption key classes in the Libraries component of OpenJDK did not properly synchronize access to their internal data. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of the use of a key that was zeroed out. (CVE-2018-2579) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">49e15e91fa11b1e22a8701ff969ba274d90114db38a063ad3ade21223de8f949</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">9e14100dad0d72ddb0f8b10935aac4c78d44c58cf835311f52fe0cdb634ac5a9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-demo-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">62a97d6eeffeb65d03c171a889ae9b91bdc609ef2edc6e6e6efcdcc392286cb0</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-javadoc-1.8.0.161-3.b14.el6_9.noarch.rpm</filename><sum type="sha256">fcd6546b6a231dc626409c62df1f3ae0c9342ae9429f77162e7feb191b5f445c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">fbb8cf7c9bc8a29dde3069cc766265c5f50ad87fa3bf6d6a85a0eac7ee41de11</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">b4621e839c2dbf27034caebbe9b4899c98c267a68153cdbc81cd12589d61fad2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-devel-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">51b3ddf9887f13019e8572dd3c089bf6e84503ef8a936ab0fe77da23dc79e42c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-src-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">1e05e172b10ee9ab06c56ac6874b7fc51e274c5bf920aa1690ef690dcc8ccfb7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-headless-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">47f1437c1c5b2847d176bc1c01ad940d3b77aeab7b2c9ae1278497196611b1f7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.161-3.b14.el6_9.noarch.rpm</filename><sum type="sha256">c9a147b638abf5482928cb63bd2951ea59ba835e9952131bb37687043e9741f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">337e753688d5fdbd7fca5ec441f3d8e1e3c9f5e386e20842a26c21de9658dea2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b14.el6_9" src="java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-src-1.8.0.161-3.b14.el6_9.x86_64.rpm</filename><sum type="sha256">6f8ae3f75f04f7dbc1b4200280c21149e3ed8a2d499fc7141405e2edbefe2ae6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" id="CVE-2018-2579" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582" id="CVE-2018-2582" title="Openjdk: Insufficient Validation Of The Invokeinterface Instruction (Hotspot, 8174962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" id="CVE-2018-2588" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" id="CVE-2018-2599" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" id="CVE-2018-2602" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" id="CVE-2018-2603" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" id="CVE-2018-2618" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" id="CVE-2018-2629" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" id="CVE-2018-2633" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" id="CVE-2018-2634" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" id="CVE-2018-2637" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" id="CVE-2018-2641" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" id="CVE-2018-2663" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" id="CVE-2018-2677" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" id="CVE-2018-2678" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0095" id="RHSA-2018:0095-1" title="Rhsa-2018:0095-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534263" id="1534263" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534288" id="1534288" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534296" id="1534296" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534298" id="1534298" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534299" id="1534299" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534525" id="1534525" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534543" id="1534543" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534553" id="1534553" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534625" id="1534625" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534762" id="1534762" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534766" id="1534766" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534768" id="1534768" title="Openjdk: Insufficient Validation Of The Invokeinterface Instruction (Hotspot, 8174962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534943" id="1534943" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534970" id="1534970" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535036" id="1535036" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0101-1</id><title>Bind</title><description>Security Fix(es): 
* A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.5.i686.rpm</filename><sum type="sha256">b7adb73279c3161ea0cbcfbeb610fc17f115f56026c35c0768f68a0598cec7a0</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.62.rc1.el6_9.5.x86_64.rpm</filename><sum type="sha256">5eeb04ba9e59811ff036b6bf4f5cdf393e08f97870a877e04b5dce75a9ad66dd</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.62.rc1.el6_9.5.x86_64.rpm</filename><sum type="sha256">beaf524822333f9b128c4f8ae76820988454cab5956cf9abf5d17cf3be35ad33</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.62.rc1.el6_9.5.x86_64.rpm</filename><sum type="sha256">2d0f49ae0bf052b9fb82d98b3f75a179344c5485d20527ebb840a08831609235</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.62.rc1.el6_9.5.x86_64.rpm</filename><sum type="sha256">c0bd04c88a59c0a666cacc29f4ce965d84a6f3bb271c427c4b5a52697744e928</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.62.rc1.el6_9.5.x86_64.rpm</filename><sum type="sha256">c2b2c6216eef03b745eac668a4f3ff06b5bde9858d41fbdb562e31dcad0fcc8e</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.5.x86_64.rpm</filename><sum type="sha256">c04eb327e12cd569a5e9f57526c22146e3e100e4778b5a9a3a57e23b85f42236</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.62.rc1.el6_9.5" src="bind-9.8.2-0.62.rc1.el6_9.5.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.62.rc1.el6_9.5.i686.rpm</filename><sum type="sha256">9058d8aee3ab3f6558003d95fdb7fb54591e32e45845d816e4564714c3991457</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145" id="CVE-2017-3145" title="Bind: Improper Fetch Cleanup Sequencing In The Resolver Can Cause Named To Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0101" id="RHSA-2018:0101-1" title="Rhsa-2018:0101-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534812" id="1534812" title="Bind: Improper Fetch Cleanup Sequencing In The Resolver Can Cause Named To Crash" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0122-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.6.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2018-5089, CVE-2018-5091, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117) 
* To mitigate timing-based side-channel attacks similar to "Spectre" and "Meltdown", the resolution of performance.now() has been reduced from 5s to 20s.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-01-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.6.0-1.el6_9.src.rpm" version="52.6.0"><filename>firefox-52.6.0-1.el6_9.i686.rpm</filename><sum type="sha256">5eaee715e80a9dd15bc26733071cca07e4eb56786c5ddc7853c3f33f6ed536dd</sum></package><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.6.0-1.el6_9.src.rpm" version="52.6.0"><filename>firefox-52.6.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">b5d7dadaaa68f55ef0e225bf087c3aeccc2e230e71e889ef4681738d2a20ce7b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" id="CVE-2018-5089" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5091" id="CVE-2018-5091" title="Mozilla: Use-After-Free With Dtmf Timers (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" id="CVE-2018-5095" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" id="CVE-2018-5096" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" id="CVE-2018-5097" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" id="CVE-2018-5098" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" id="CVE-2018-5099" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" id="CVE-2018-5102" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" id="CVE-2018-5103" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" id="CVE-2018-5104" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" id="CVE-2018-5117" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0122" id="RHSA-2018:0122-1" title="Rhsa-2018:0122-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537417" id="1537417" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537814" id="1537814" title="Mozilla: Use-After-Free With Dtmf Timers (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537817" id="1537817" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537818" id="1537818" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537819" id="1537819" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537820" id="1537820" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537821" id="1537821" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537822" id="1537822" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537823" id="1537823" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537824" id="1537824" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537825" id="1537825" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0169-1</id><title>Kernel</title><description>Security Fix(es): 
* An integer overflow vulnerability in ip6_find_1stfragopt() function was found. A local attacker that has privileges (of CAP_NET_RAW) to open raw socket can cause an infinite loop inside the ip6_find_1stfragopt() function. (CVE-2017-7542, Moderate) 
* The IPv6 fragmentation implementation in the Linux kernel does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely. (CVE-2017-9074, Moderate) 
* A use-after-free flaw was found in the Netlink functionality of the Linux kernel networking subsystem. Due to the insufficient cleanup in the mq_notify function, a local attacker could potentially use this flaw to escalate their privileges on the system. (CVE-2017-11176, Moderate) 
Bug Fix(es): 
* Previously, the default timeout and retry settings in the VMBus driver were insufficient in some cases, for example when a Hyper-V host was under a significant load. Consequently, in Windows Server 2016, Hyper-V Server 2016, and Windows Azure Platform, when running a Scientific Linux Guest on the Hyper-V hypervisor, the guest failed to boot or booted with certain Hyper-V devices missing. This update alters the timeout and retry settings in VMBus, and Scientific Linux guests now boot as expected under the described conditions. 
* Previously, an incorrect external declaration in the be2iscsi driver caused a kernel panic when using the systool utility. With this update, the external declaration in be2iscsi has been fixed, and the kernel no longer panics when using systool. 
* Under high usage of the NFSD file system and memory pressure, if many tasks in the Linux kernel attempted to obtain the global spinlock to clean the Duplicate Reply Cache (DRC), these tasks stayed in an active wait in the nfsd_reply_cache_shrink() function for up to 99% of time. Consequently, a high load average occurred. This update fixes the bug by separating the DRC in several parts, each with an independent spinlock. As a result, the load and CPU utilization is no longer excessive under the described circumstances. 
* When attempting to attach multiple SCSI devices simultaneously, Scientific Linux 6.9 on IBM z Systems sometimes became unresponsive. This update fixes the zfcp device driver, and attaching multiple SCSI devices simultaneously now works as expected in the described scenario. 
* On IBM z Systems, the tiqdio_call_inq_handlers() function in the Linux kernel incorrectly cleared the device state change indicator (DSCI) for the af_iucv devices using the HiperSockets transport with multiple input queues. Consequently, queue stalls on such devices occasionally occurred. With this update, tiqdio_call_inq_handlers() has been fixed to clear the DSCI only once, prior to scanning the queues. As a result, queue stalls for af_iucv devices using the HiperSockets transport no longer occur under the described circumstances. 
* Previously, small data chunks caused the Stream Control Transmission Protocol (SCTP) to account the receiver_window (rwnd) values incorrectly when recovering from a "zero-window situation". As a consequence, window updates were not sent to the peer, and an artificial growth of rwnd could lead to packet drops. This update properly accounts such small data chunks and ignores the rwnd pressure values when reopening a window. As a result, window updates are now sent, and the announced rwnd reflects better the real state of the receive buffer.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-01-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm</filename><sum type="sha256">98ebd887b572ae5f9cb3c3ce9459836e59fbacde6bfa2cc21ea0c874c00dce7a</sum></package><package arch="x86_64" name="perf" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">fa172fccba132d280e1267ba3f8674b50ed4f6527c9b50e9794e11a5069cbb87</sum></package><package arch="i686" name="kernel-debug-devel" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm</filename><sum type="sha256">d7a56b2c86d150d20d3d149e0311bd675585062a572a8290c2ed9e8eae3966f2</sum></package><package arch="x86_64" name="kernel-headers" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">4b8ec2b9f5f9fed44fb651018ccf2e25d77d14d5477d828ca7a714293972ac91</sum></package><package arch="noarch" name="kernel-doc" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.20.1.el6.noarch.rpm</filename><sum type="sha256">98dcda697b4a49fa6e429456dc1f7cb4d66e4e9afeb255dda140d714073163dc</sum></package><package arch="x86_64" name="kernel-debug" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">87d4e4450e6081e254e90d1d1a7300d41ad8d45a8c9c087b77924ef2b23f2e55</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm</filename><sum type="sha256">ebae57cf0e3745f917ff6c403181cd9f995ff43e0a46e4a8f70a1e000f2ad87a</sum></package><package arch="x86_64" name="kernel" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">9f3d3b3e4e06c34b89dd4633d1729b03ccdb5f0ea5e39db2359750b193607261</sum></package><package arch="x86_64" name="python-perf" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">3c279ea8cd16f262f73b04828d55e423a05d1768889c3b5117d431381d379cb4</sum></package><package arch="x86_64" name="kernel-devel" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">281274af423f3b616e5155a0c9b90df22ea2f872e57416f00e67089679f8cab9</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.20.1.el6" src="kernel-2.6.32-696.20.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.20.1.el6.x86_64.rpm</filename><sum type="sha256">415303b93e346d02d85a2a600fcefdb30d8e623403aa9413ebb4fb87298a7b32</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" id="CVE-2017-11176" title="Kernel: Use-After-Free In Sys_Mq_Notify()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" id="CVE-2017-7542" title="Kernel: Integer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" id="CVE-2017-9074" title="Kernel: Net: Ipv6 Fragmentation Implementation " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0169" id="RHSA-2018:0169-1" title="Rhsa-2018:0169-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452679" id="1452679" title="Kernel: Net: Ipv6 Fragmentation Implementation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470659" id="1470659" title="Kernel: Use-After-Free In Sys_Mq_Notify()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473649" id="1473649" title="Kernel: Integer Overflow In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0262-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.6.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-02-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.6.0-1.el6_9.src.rpm" version="52.6.0"><filename>thunderbird-52.6.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">2c8c21d0b9a18f782deeb63bd80f9a7db32c01755f7792a35e4954132bf50192</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" id="CVE-2018-5089" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" id="CVE-2018-5095" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" id="CVE-2018-5096" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" id="CVE-2018-5097" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" id="CVE-2018-5098" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" id="CVE-2018-5099" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" id="CVE-2018-5102" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" id="CVE-2018-5103" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" id="CVE-2018-5104" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" id="CVE-2018-5117" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0262" id="RHSA-2018:0262-1" title="Rhsa-2018:0262-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537417" id="1537417" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537817" id="1537817" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537818" id="1537818" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537819" id="1537819" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537820" id="1537820" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537821" id="1537821" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537822" id="1537822" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537823" id="1537823" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537824" id="1537824" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537825" id="1537825" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0349-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* A flaw was found in the AWT component of OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2018-2641) 
* It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data. (CVE-2018-2633) 
* The JGSS component of OpenJDK ignores the value of the javax.security.auth.useSubjectCredsOnly property when using HTTP/SPNEGO authentication and always uses global credentials. It was discovered that this could cause global credentials to be unexpectedly used by an untrusted Java application. (CVE-2018-2634) 
* It was discovered that the JMX component of OpenJDK failed to properly set the deserialization filter for the SingleEntryRegistry in certain cases. A remote attacker could possibly use this flaw to bypass intended deserialization restrictions. (CVE-2018-2637) 
* It was discovered that the LDAP component of OpenJDK failed to properly encode special characters in user names when adding them to an LDAP search query. A remote attacker could possibly use this flaw to manipulate LDAP queries performed by the LdapLoginModule class. (CVE-2018-2588) 
* It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries. (CVE-2018-2599) 
* It was discovered that the I18n component of OpenJDK could use an untrusted search path when loading resource bundle classes. A local attacker could possibly use this flaw to execute arbitrary code as another local user by making their Java application load an attacker controlled class file. (CVE-2018-2602) 
* It was discovered that the Libraries component of OpenJDK failed to sufficiently limit the amount of memory allocated when reading DER encoded input. A remote attacker could possibly use this flaw to make a Java application use an excessive amount of memory if it parsed attacker supplied DER encoded input. (CVE-2018-2603) 
* It was discovered that the key agreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break data encryption by attacking key agreement rather than the encryption using the negotiated secret. (CVE-2018-2618) 
* It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use a previously freed context. (CVE-2018-2629) 
* It was discovered that multiple classes in the Libraries, AWT, and JNDI components of OpenJDK did not sufficiently validate input when creating object instances from the serialized form. A specially-crafted input could cause a Java application to create objects with an inconsistent state or use an excessive amount of memory when deserialized. (CVE-2018-2663, CVE-2018-2677, CVE-2018-2678) 
* It was discovered that multiple encryption key classes in the Libraries component of OpenJDK did not properly synchronize access to their internal data. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of the use of a key that was zeroed out. (CVE-2018-2579)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-03-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.13.0.el6_9" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el6_9.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el6_9.x86_64.rpm</filename><sum type="sha256">3c3a19325378d567133430f0d0f6bb75122ad2928a552298b8f15ce1ef4b237f</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.13.0.el6_9" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el6_9.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el6_9.noarch.rpm</filename><sum type="sha256">5c27343a2890e6dec0a67673878033699d26c2463f0b0cc8012219c70256ff31</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.13.0.el6_9" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el6_9.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el6_9.x86_64.rpm</filename><sum type="sha256">567941aabb6d7af5184834681a5092d0ce1a8e6d0a6b14a0b1bb418da4bc933e</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.13.0.el6_9" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el6_9.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el6_9.x86_64.rpm</filename><sum type="sha256">6d003bb2557ae91259178085eaecc4ec5c6a99a5b21d9a7c0bb6820e84c2c754</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.13.0.el6_9" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el6_9.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el6_9.x86_64.rpm</filename><sum type="sha256">dee91c2d675bd7321bd1ea7152ac0e92b9afcbeaf8fb0462a456f95af1d7a0a9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" id="CVE-2018-2579" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" id="CVE-2018-2588" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" id="CVE-2018-2599" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" id="CVE-2018-2602" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" id="CVE-2018-2603" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" id="CVE-2018-2618" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" id="CVE-2018-2629" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" id="CVE-2018-2633" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" id="CVE-2018-2634" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" id="CVE-2018-2637" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" id="CVE-2018-2641" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" id="CVE-2018-2663" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" id="CVE-2018-2677" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" id="CVE-2018-2678" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0349" id="RHSA-2018:0349-1" title="Rhsa-2018:0349-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534263" id="1534263" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534288" id="1534288" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534296" id="1534296" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534298" id="1534298" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534299" id="1534299" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534525" id="1534525" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534543" id="1534543" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534553" id="1534553" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534625" id="1534625" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534762" id="1534762" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534766" id="1534766" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534943" id="1534943" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534970" id="1534970" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535036" id="1535036" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0469-1</id><title>Dhcp</title><description>Security Fix(es): 
* dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server (CVE-2018-5732) 
* dhcp: Reference count overflow in dhcpd allows denial of service (CVE-2018-5733)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-03-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="12" name="dhcp-common" release="53.P1.el6_9.3" src="dhcp-4.1.1-53.P1.el6_9.3.src.rpm" version="4.1.1"><filename>dhcp-common-4.1.1-53.P1.el6_9.3.x86_64.rpm</filename><sum type="sha256">6a70e3310b2351f52c9d0c22746f83518bf00429c0080a66e2e82baf4176ce2a</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="53.P1.el6_9.3" src="dhcp-4.1.1-53.P1.el6_9.3.src.rpm" version="4.1.1"><filename>dhclient-4.1.1-53.P1.el6_9.3.x86_64.rpm</filename><sum type="sha256">a163b120f4bacfbccdc3829b2f8a0c69fc020fed8151264d54ae231a7f932d65</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="53.P1.el6_9.3" src="dhcp-4.1.1-53.P1.el6_9.3.src.rpm" version="4.1.1"><filename>dhcp-devel-4.1.1-53.P1.el6_9.3.i686.rpm</filename><sum type="sha256">3a3ad35eef197bdb31d2155b6ed114088448c6e7ce63b6ef40124c2e1b81fbea</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="53.P1.el6_9.3" src="dhcp-4.1.1-53.P1.el6_9.3.src.rpm" version="4.1.1"><filename>dhcp-devel-4.1.1-53.P1.el6_9.3.x86_64.rpm</filename><sum type="sha256">b723d791eb0d6d30a697dccba2b176470e3e74df50f5fa5a7a52416d1ca33aab</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="53.P1.el6_9.3" src="dhcp-4.1.1-53.P1.el6_9.3.src.rpm" version="4.1.1"><filename>dhcp-4.1.1-53.P1.el6_9.3.x86_64.rpm</filename><sum type="sha256">1dea3966265e9dc514d1e1f82a2655b9703a8d23a9eff50f928f0869ae05b059</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732" id="CVE-2018-5732" title="Dhcp: Buffer Overflow In Dhclient Possibly" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733" id="CVE-2018-5733" title="Dhcp: Reference Count Overflow In Dhcpd Allows" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0469" id="RHSA-2018:0469-1" title="Rhsa-2018:0469-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549960" id="1549960" title="Dhcp: Buffer Overflow In Dhclient Possibly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549961" id="1549961" title="Dhcp: Reference Count Overflow In Dhcpd Allows" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0504-1</id><title>Mailman</title><description>Security Fix(es): 
* mailman: Cross-site scripting (XSS) vulnerability in web UI (CVE-2018-5950)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-03-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="3" name="mailman" release="26.el6_9.3" src="mailman-2.1.12-26.el6_9.3.src.rpm" version="2.1.12"><filename>mailman-2.1.12-26.el6_9.3.x86_64.rpm</filename><sum type="sha256">8a2b12497c92e879dd6672b6b661b0e26938780fabce95443030515744d59e34</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950" id="CVE-2018-5950" title="Mailman: Cross-Site Scripting (Xss) Vulnerability In Web Ui" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0504" id="RHSA-2018:0504-1" title="Rhsa-2018:0504-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537941" id="1537941" title="Mailman: Cross-Site Scripting (Xss) Vulnerability In Web Ui" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0512-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: cpu: speculative execution branch target injection (s390-only) (CVE-2017-5715, Important) 
* hw: cpu: speculative execution bounds-check bypass (s390 and powerpc) (CVE-2017-5753, Important) 
* hw: cpu: speculative execution permission faults handling (powerpc-only) (CVE-2017-5754) 
Bug Fixes: 
* If a fibre channel (FC) switch was powered down and then powered on again, the SCSI device driver stopped permanently the SCSI device's request queue. Consequently, the FC port login failed, leaving the port state as "Bypassed" instead of "Online", and users had to reboot the operating system. This update fixes the driver to avoid the permanent stop of the request queue. As a result, SCSI device now continues working as expected after power cycling the FC switch. 
* Previously, on final close or unlink of a file, the find_get_pages() function in the memory management sometimes found no pages even if there were some pages left to save. Consequently, a kernel crash occurred when attempting to enter the unlink() function. This update fixes the find_get_pages() function in the memory management code to not return 0 too early. As a result, the kernel no longer crashes due to this behavior. 
* Using IPsec connections under a heavy load could previously lead to a network performance degradation, especially when using the aesni-intel module. This update fixes the issue by making the cryptd queue length configurable so that it can be increased to prevent an overflow and packet drop. As a result, using IPsec under a heavy load no longer reduces network performance. 
* Previously, a deadlock in the bnx2fc driver caused all adapters to block and the SCSI error handler to become unresponsive. As a result, data transferring through the adapter was sometimes blocked. This update fixes bnx2fc, and data transferring through the adapter is no longer blocked due to this behavior. 
* If an NFSv3 client mounted a subdirectory of an exported file system, a directory entry to the mount hosting the export was incorrectly held even after clearing the cache. Consequently, attempts to unmount the subdirectory with the umount command failed with the EBUSY error. With this update, the underlying source code has been fixed, and the unmount operation now succeeds as expected in the described situation. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-03-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.23.1.el6.noarch.rpm</filename><sum type="sha256">a83b458e5aab21dc60e2b8d864343aa78eb60f7eedb1325a08c932ca825e6a1c</sum></package><package arch="x86_64" name="kernel" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">0464ecd1d2621b151ba1e88fcd0eeb4201ef056df3560aae9ea8da4a84d1051b</sum></package><package arch="i686" name="kernel-debug-devel" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.23.1.el6.i686.rpm</filename><sum type="sha256">fde2f0cc19ac1cccfcdf15aad251c519b0e25ad3fb1b138bd5c02da24dad8452</sum></package><package arch="x86_64" name="kernel-debug" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">57974079a85dbe44fb364ccdadf5809946416a736779f90beb709a3f9c2743c5</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">9324a1852941616c29e93b2cdf1fa9a171cf1fffa0e48ddd36b79fc0b8f23658</sum></package><package arch="x86_64" name="python-perf" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">6e450110528df6a66aa46738e485e282a3b61167809e61f5a42b1cafb6fec8aa</sum></package><package arch="x86_64" name="kernel-devel" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">0ce53338fda2a32768e1a76ce5f435c8b8b18f6c69c1b14700535329acb7373d</sum></package><package arch="noarch" name="kernel-firmware" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.23.1.el6.noarch.rpm</filename><sum type="sha256">3b84545e6af8f07a12faf5f1655d90f9a92ffc91184849d0401a8eb586c216c3</sum></package><package arch="x86_64" name="perf" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">58eceb78a58eab4d5c5f76c381c7e817ce535c31e26ad974d01b83a9780690f8</sum></package><package arch="x86_64" name="kernel-headers" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.23.1.el6.x86_64.rpm</filename><sum type="sha256">00f9402eb1db11077a060725b1da7c2383bac212b31f63d97f97047f5b7336b6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.23.1.el6" src="kernel-2.6.32-696.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.23.1.el6.noarch.rpm</filename><sum type="sha256">37b3ae0497a465b631ccd3984a2a3e9cc798728ed94591faddb5a2a5154e75a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" id="CVE-2017-5753" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" id="CVE-2017-5754" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0512" id="RHSA-2018:0512-1" title="Rhsa-2018:0512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519778" id="1519778" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519781" id="1519781" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0515-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c (CVE-2018-1054) 
* 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (CVE-2017-15135)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-03-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base" release="94.el6_9" src="389-ds-base-1.2.11.15-94.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-94.el6_9.x86_64.rpm</filename><sum type="sha256">20caeebb3b8c53ec47b3523adf59e59c65568d2383a421bb0dfc523c4a2fe4cf</sum></package><package arch="i686" name="389-ds-base-libs" release="94.el6_9" src="389-ds-base-1.2.11.15-94.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-94.el6_9.i686.rpm</filename><sum type="sha256">e821576eb92d2d0421b1ce1d07a901ee4eab4f2b13b8c79da6b288eb2d70d686</sum></package><package arch="i686" name="389-ds-base-devel" release="94.el6_9" src="389-ds-base-1.2.11.15-94.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-94.el6_9.i686.rpm</filename><sum type="sha256">a870a25f0129f999de2c4038ff747b36272bcc38273ec4adf33f55f189b2c4c7</sum></package><package arch="x86_64" name="389-ds-base-libs" release="94.el6_9" src="389-ds-base-1.2.11.15-94.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-94.el6_9.x86_64.rpm</filename><sum type="sha256">86d1f077b831cfe08cd7fd9a8b026476b9a967d9dd9138497b40579d79695637</sum></package><package arch="x86_64" name="389-ds-base-devel" release="94.el6_9" src="389-ds-base-1.2.11.15-94.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-94.el6_9.x86_64.rpm</filename><sum type="sha256">67d0f4c1077604fde86f4d6f7ab3632a0b43eaa56121cda29c647d670941bf3c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15135" id="CVE-2017-15135" title="389-Ds-Base: Authentication Bypass Due To Lack Of Size Check In Slapi_Ct_Memcmp Function In Ch_Malloc.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1054" id="CVE-2018-1054" title="389-Ds-Base: Remote Denial Of Service (Dos) Via Search Filters In Setunicodestringfromutf_8 In Collate.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0515" id="RHSA-2018:0515-1" title="Rhsa-2018:0515-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525628" id="1525628" title="389-Ds-Base: Authentication Bypass Due To Lack Of Size Check In Slapi_Ct_Memcmp Function In Ch_Malloc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537314" id="1537314" title="389-Ds-Base: Remote Denial Of Service (Dos) Via Search Filters In Setunicodestringfromutf_8 In Collate.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0516-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Qemu: cirrus: OOB access issue in mode4and5 write functions (CVE-2017-15289)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-03-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.503.el6_9.5" src="qemu-kvm-0.12.1.2-2.503.el6_9.5.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.503.el6_9.5.x86_64.rpm</filename><sum type="sha256">347bae3226b80cbb25cb315f14f95c9c1c9bc7d32f4079dc028d023f2e074d49</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.503.el6_9.5" src="qemu-kvm-0.12.1.2-2.503.el6_9.5.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.503.el6_9.5.x86_64.rpm</filename><sum type="sha256">6f99f27c902118d0681cd097616f163da4ba32ccd781a70bb3cb5c7e6f5ddad6</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.503.el6_9.5" src="qemu-kvm-0.12.1.2-2.503.el6_9.5.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.503.el6_9.5.x86_64.rpm</filename><sum type="sha256">ff98e2c4b887a94a8d7124f5799c8003c360f24518fce776298c88386357736e</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.503.el6_9.5" src="qemu-kvm-0.12.1.2-2.503.el6_9.5.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.503.el6_9.5.x86_64.rpm</filename><sum type="sha256">f1a2d7e30ec93f72fe44ac93e0ab364731aca9dd7c6df8e28adf464e6e237e2a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" id="CVE-2017-15289" title="Qemu: Cirrus: Oob Access Issue In Mode4And5 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0516" id="RHSA-2018:0516-1" title="Rhsa-2018:0516-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501290" id="1501290" title="Qemu: Cirrus: Oob Access Issue In Mode4And5 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0517-1</id><title>Libreoffice</title><description>Security Fix(es): 
* libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula (CVE-2018-6871)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-03-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="libreoffice-langpack-ur" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ur-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">0b53b7319158281cb39a68e6a24d5c956dbcc55cff33ac10b041e18b014ed7b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-wiki-publisher-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">2a4f9f082c6c9a50d3a10d7aa3bb5f2a2eda6eeee33f4d4e8a5de61ec3826f91</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-pdfimport-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">6443c97cff42dcbd6a6c2e46481f804a30e7df19e4b1967cc33e5639ce6ccb48</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-core-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">47dde7a5367bb8033407ea32bde4573e5810d58f1f8572665ef412bf19506a9e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-el-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">48fc9da74e8bd049d04e1526d5e1e361d75bbac27bf6f95a538cb398f959d2d0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zh-Hans-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">0b7c629750ac746cdd4ba9aa9bf3996da57e9cdffe5eac904f082cf76dbce0d0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-as-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">116f58c75ad789f0c10c217bf57710a81f56a793dec45ff71b44f06c55a95674</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-de-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">6779b0b0d27dd4a3f07f8d808cd8d8fd40cd091752f8bb425f84dcfc1c9e2657</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-impress-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">dae957cac7942eea2c6636219f96bf6066d3e748b41d907c225585c5526ec3d9</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-sv-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">00e3eb4af210f5cc15bac4cdea98b586180608f10d9cfd7fb31fab14360f8cdf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-sdk-doc-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">29d99a221d3cccf618d751e7ae8ede110c6bb675d0856ccfda85681d1f208a8e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-te-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">090aab56cb8cb1528e18a7d77ad92c6f4bb6bce7376cc27cbb91da71ba6ad33a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-th-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">ad8c597d8b8aeede9610b8e876d934e28e3db4ac62460d4b9cd55c4a19762c6f</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-da-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">f28eddacdd774794afabc519000d144813a26dbf2c369060b74dab097e3c0a23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ve-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">523a8d23b755a13fb968fb90e4ad8c5fc2d3de44fd1ae5d0866918c57c5345f0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-pyuno-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">77e50080a9d13110394c245c9e644d647dad8db73e2d65675125c41069e633d4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ms" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ms-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">238c4a0574112eaa0d43233625432750933b65b8351058b08be528e16f914aef</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ja-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">27cda1421e1aa155d31bc3b4b0091f34bb9592f3292120345e70b2eba756239e</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-sr-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">9f7dfca069fb4910d291bcef31817de150c33c4411319bead5a0109bb65ee31f</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-sl-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">3212c04e361fa5ea8766337dfecae30c980db089b83ff8a30b0ffc2472fa01d8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ca-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">c75219a8d6f2ebc766178b11ca48497b505db8b6a48ee125ff39143e4100f1e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ml-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">e5fcb8dc206d5de8bed7bf7ca79389bd537736db32542fc00c69cc360977d54f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-xsltfilter-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">f23cbdf6ec389920321137cb39a639c450bfe64426b9d5cdb077fcf5934e9fb1</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-zh-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">fa2d9941d28e6cb34e5a0bb598e8d641c6e9671a9e7d3b1080c29d487590dd45</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-en-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">5e8b3d4c8c4ecbb091b52384ef443c157d01b80375355017f98945af1a17cb1b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-gl-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">021c041c5dd93648f766cf5dc2d71f3c12743cd122f2ad711facbdf452dd4c8b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nso-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">e0473f843632f65982c9d5e8141f3c975414f711e7f16a3bc4de5453b7f15e6d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-gdb-debug-support-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">d257164b79445aed4046010a6da4fd19507c036e83fc23ca9a2d67c03b35b7e3</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-opensymbol-fonts-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">02e0a9c46fa554aa4ef70ee9575008af88152c8fb9726eb6eafa92e44240bc34</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-en-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">bee77b4492e988c1a7ff3d2b67d00dbcdd65cada1fe9d2e5f3a7d2728ece466c</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-ja-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">c5f940e92cb5cf5bd6a95aa33ae30984916d2d28d58ce1b26850c66bd400d4c5</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-ca-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">8a1e8d9bbd091699026e11ec9549b5d1c0a12c5d158c78e095c7092165c2436a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-bn-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">0bb9ae24acf77f29be9e69abcbc56b67590f24e2789244d8f470d97caeba37e3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-es-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">f92931e1c40a79e9353dd183a21a5ccc6c18303d4d581e1ba7f0b41ae12ce975</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-writer-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">b544ed9c0b4427a937504c25fa447eb3f1cf7d97817ad2eda8e45c76c0f34a79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pt-BR-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">acb8a7e0417f63b537dfe55b200925fcc22628ecaa14283b12a2ff5bad8547d4</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-hr-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">966c01897c9f59773e12e949df00f6931e4fc1c322f57ab0f0db43321168304c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-glade-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">a8358a0f21132255d833263e398f0ccbfc733f6acdff04c0aea6446e1ff2fe0d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-uk-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">d0ff1ef369fbb414bd40a20fbebc3ca86fbd75a52a71d92081c42a047d455777</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sl-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">d1b06a0b0f59a8a89da3262806ec2f970479d52df720e94a2034737f41782e90</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-lt-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">dbf371a17db800bacf08a1e0ac0abcffa959c8f4af7434558eff61417069707b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-filters-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">72bdded8b58d72cbc518083162902974259a9cc77c3084112036ac2f8179471f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-ure-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">bcc48daf4057ed3bfb9ffbab0188a4036982ae8352be4468b0fbd2f935f0f4e6</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-sk-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">2435c49dfacae726996d7cb99ae65ae58ca2a9799aa669fddd105c89d36af4a1</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-fa-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">0866460539d922b1b78168ab2fc3ce40a44fbb2740445811017741cdc41828c4</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-es-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">2cd0b0ffebe54ad00994e75d4119d006d2418fa103466b460a53888867764573</sum></package><package arch="i686" epoch="1" name="libreoffice-gdb-debug-support" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-gdb-debug-support-4.3.7.2-2.el6_9.2.i686.rpm</filename><sum type="sha256">bfb1bc193f33dd22c13450c5e948a53560880519420198b9c326ae1112c49248</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nl-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">3be5658570cc8314e0abe651e4fac8148f8cf6cccf23fded835cd836bc1428ec</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ta-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">b0d8f0c973b782ef48ff4c7fa650ef9522f42c8aded8c1bff55c5acae02a68d9</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-mn-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">1e89ce10c05e0ef3bf34984e0b1a8b6848a586f91c0df2b185f36165c348ea66</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-bsh-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">98d7e2a341c886e481782f224429da4a118352a803f149bb9bd7e6a91ec344e9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pt-PT-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">136c3427255a62287113d18fbac69d24d009f8c4d76a575aadb629b0e1291c3c</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-af-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">1779f02445472502c8dd0aba04c1f045c6fef5bbad42a191811ec0d059e5def4</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-ga-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">93b019125f117ab97b371211177f4c9cb9b8344abfff5f3fe79b5a2ae9987fb0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ro-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">146664c68c2f95cd2a731781e582ea8a765edb21775985d3358499b4fbb13355</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-tr-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">ce0648ee5cb5156b6ed08d63fa1bce12e41c667db9e718e25b7300b17f9ac8eb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-graphicfilter-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">487e43c0a70407fb394b63869ea1bb0d54894a503de2afba3796842ad95a0c58</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-or-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">10899ad3fc6f26e94767651efb970bd94907c64581005bf1d04c16d599459879</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-ro-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">3ec716faa7e738d98a9317ec32c9d6b5825dee13f4072918cb18f3b3f39b7596</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-sdk-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">1e0d268d939b7d30647770cf8437c17b979ab87fdade964acec1f427947cc171</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-de-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">8bbe98676251c1133100612384b5379108ceec52e64f0080f116baafbeb70d79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-kn-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">d5c195f2ec37037e7a6d75c990066184670d8150de61381b96c290c5bd2dcb5d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-tr-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">5c6748f628d9add0afb07506f2398d2aabcb0aab3454b434cd6135148b7ea0ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hr-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">6d7a4f04e7dd913f7f0b49191e5e26902e5a7dedd94315556e5f69ec278de026</sum></package><package arch="x86_64" epoch="1" name="libreoffice-headless" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-headless-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">1b2601dad447ccc25d57b82ec6df61c35f1d44706cb27be7b49a1a524a381825</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-eu-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">78ede41ecf5b1395e99b41a3362bd3b76caba8210b75fb7f253365ecdef5280c</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-fi-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">5c77988f644c65ccabc585552a5bce739a7e2e4d878231eda221f6682added82</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nn-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">869d6589f026f13d374ad4882d8072a5a8d52ef525b7d381a0c3a3ddd0c4b359</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zh-Hant-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">b416155d976bfd324d4ffea1ad42bdfaa219974d41dff1b91f96395b02dc094d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-dz-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">1cad4e4e2b2d42cb826117ba9d8c7e52b805cafe57002c9218b0e4dc6aaa3320</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-cs-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">899318dab871b62869f0545ad4b623e7705c4d5050bdd936ba67e3c7f623c01e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sv-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">e85c30f0233b988bf1f9e9ec211acf5719e7cb00a7335f80e229634335064c78</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-nl-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">b9cd37beae376871174296dfca9fa1e5fdd1a27eef92357e6e2092fb919c1a2e</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">86d66e000678f88cc954d61413430fb494178a4686a5c47bc6b1685691860f9c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-mr-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">4baf65674ead37226fde0bdebfb0b20f7d0c8dd3e9c1506cfd1fac5f2cbe3209</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-rhino-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">606f334cf348fbf4590fa3b7c4a81011a91716fe43895bd6ac91fa689a0d96f2</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-hu-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">fc3459db7defd86d9b3746aff76c5d03fd74202c732b0b9e4803bfa43e24f1ed</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-math-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">92b9eb40a7f8bceb3730a1818be89d2e9a39cad0c63a6adf724ad8a0ad51293d</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-pl-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">87e5ca390955a352a38f4987a80419577ad6cbda41a434daf836093b0e70e7bc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-tn-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">efeaf5cbf739200420b8409547cde426876f226e53b9f5ca196795903f21d3ad</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-ko-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">cdf61029bbdcca5094c5edcf105d5904e606e05c0d7acccd29b1e79da9714561</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-cs-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">f4ef59f9659b61d63c90c1ff2205c0e3070423446aa54bd379dc2f18c78736df</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-officebean-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">f0e389c18bb79714afb21983f4af9a487528843180829581fcc951b9b830ba20</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-lt-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">ca4a92227919a5711fff6b6db4a1d378d5fe7582e37fb945c4bfe65ab712b8e8</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-bg-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">92db82a8e8c950155b8571cbc7ebd26d0348972eaf7f4725b366201ad89d304b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pa-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">038ef5902bde75fc9ebbef6a811b7dad03c8366fb8f7a2621c2ce5442a319c59</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ru-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">9f35feab30290188624cd38b61c006e116f133187f20f9d19e7b3341e2930c90</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hi-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">91ba2b276baaada72b631112582ba69b6bba542936ea7aea2c3e27f6e03addb4</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-pt-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">0edb19bf9e8fb5c204fb417db185de2e01d6a8bdef07976cd612407d81b3564e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fr-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">90fd16f043a2f40ffc9ff6a35f7b3f8afdc59f8c97f66a9fcc1c9f50aa967f48</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hu-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">74b5ef6cce45e98448e5597e90ffb92ca3e3a178ab0d75ec12d7b3e40d001c48</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-et-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">4e5c23092e6965bd3f21116eda4766a0dd0f8433505479be1d2a5c89679b7bf0</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-is-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">771a4ce81d0cc1cd9c098e7cb4c9a19982f305d75a9032ad6c8dafe0cae08ee7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ts-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">48bb95999817124df1134e46cfb5795ba2b32e607c07f65d5aa1331602bb27b5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-base-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">724cffbf811130bbf2e9df699e96624d40813bb76058b1282cad58a215b97120</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ar-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">cabe7e5a06cba1e2d5ca5740b2019cd31ff09e03ecfa0d2d294fa6fae5a1899c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pl-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">c90dafc255e688bb733b263955628c79e12a361a83dd566157d4afaf054f84fa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-ogltrans-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">6c90804e8d86df80ae6834eced582b00079027c810b9c7ac7f05cff7eba00f22</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-vi-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">e61e6e0bfa61c1660b319ba2cad568580874ecd1fd205cc7b4d9e4d36c0a539d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-draw-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">3d1361daf7f5c72eeb5c12eb9f570c705295c9e1dd23bb6d5debb5296f19ee7d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sk-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">3ffee3bbaec3774d7d8d26e46d80406bbc74af2df52ddb61fb15980cd63517de</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-xh-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">8edd05da9eadcaf884a18da5b0f434d512f275a9dfb57d6241774ca907d1f518</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-ru-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">5a9268a8d11cc4fab8c7354cbc0f259fbff7a7e4a54049d09d514d41c62e0f48</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-emailmerge-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">3a562dc40ef3d1bdb3f958272156a4864a2d6d9c6ee9fc1920a7ea0b72409793</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-nlpsolver-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">2fbb6e29a496e80eb17229f8dd33dd3ee0838f0e9414ad57dca190d972040417</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-af-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">83fa6077661bfeec4d36ac3fb0291874a4281c13e460bc391f45b466e6e17141</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-lb-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">e882fabad6bd7f861272db588eca579f183d33a4168c74d2f47543b7a3662462</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-it-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">9f3ec06d354e14d8a2abc5c9f701257791d90e2a2c87728d3fb103b46f937e00</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sr-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">00d6b752600b20818fefc1d2e74760210ffbcc9f4f923e6d508f06344e3d349c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-calc-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">d598b2cd21831f42fb13c94b2547670b1c3de65fc4a4035d131028086af16b27</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-st-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">51681ca2fbd0449f6133a99174c483d5e6fddd57ac8b602e09715cf2d9ec9691</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-he-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">6937a108a8d0a098bbcf950086fce5a4f8b3b41987883a9c02e1ceea6ab60442</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nr-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">aab9485ce0675e6d8e30cf007b99826b5c818db7aa4540750617ad6e00c0e929</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fi-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">7aa2ba3248756a85d71f56c729baae638749da57407d00d49c9a8c7c38aa07f3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-cy-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">476fef15e077f7699024feb2c39b5ed773721c09576985207317463de83135a7</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>autocorr-fr-4.3.7.2-2.el6_9.2.noarch.rpm</filename><sum type="sha256">5b3338887a92651835381ae29f0f3b6bd7d4ddd97c73ff91ed8be0e1e7aeb975</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ko-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">c8a41a009fcbfe9fdf7fa0221f64fa4b8345b07826cb852936d4687da3de459f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zu-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">ca53a14d2e8afb284525d239996f0cf6e5bad97e96aa4460ee29b44c723582f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-mai-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">46134f0a34bd1e8dd3f23b0f36aafb6b28dc20899004f0b794aebfd178990d97</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-librelogo-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">41bb6fdb7afa5d13b2dfaeee00f8548ce9682fa1b8d0bcfe66f60eb18e6ebfbb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nb-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">e1f518bafe5eb07d051f1ec5fa2ad31c2a282a783cb7c8587b637cf08d25d79c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-gu-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">2ba301e04876cfe067006ccf350186bb374461e5b2e1323ec10cac946a3e0faa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-it-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">baa5eeb101474ff96e61e9f995ff36cc3356b806c2d01995f0ebe479230b6274</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ga-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">2d5564f7eee12c6e2668aad40323717623b5eb5be67f61e8e7967544297a7222</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-da-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">4427283473adff0f7b3b166810ae37cefeb74a90e501c1cbde68d10a3ea44147</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-bg-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">308f55c997aceb415f559465ead90963ac1f29f208423af88cc54b188d1758f3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="2.el6_9.2" src="libreoffice-4.3.7.2-2.el6_9.2.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ss-4.3.7.2-2.el6_9.2.x86_64.rpm</filename><sum type="sha256">d1f2f930385219790675aee45a59798d416df498044cedc06525508aabca411c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6871" id="CVE-2018-6871" title="Libreoffice: Remote Arbitrary File Disclosure Vulnerability Via Webservice Formula" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0517" id="RHSA-2018:0517-1" title="Rhsa-2018:0517-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1543120" id="1543120" title="Libreoffice: Remote Arbitrary File Disclosure Vulnerability Via Webservice Formula" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0526-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.7.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) 
* Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) 
* Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) 
* Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) 
* Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) 
* Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-03-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.7.0-1.el6_9.src.rpm" version="52.7.0"><filename>firefox-52.7.0-1.el6_9.i686.rpm</filename><sum type="sha256">4201d53f3c1a865a056ce4dafaea019acf711a771912664fb02ea4a350fddc60</sum></package><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.7.0-1.el6_9.src.rpm" version="52.7.0"><filename>firefox-52.7.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">c015e0579feacd95e22743170daea120486955bd925027e61a37a56328b31113</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" id="CVE-2018-5125" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" id="CVE-2018-5127" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" id="CVE-2018-5129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5130" id="CVE-2018-5130" title="Mozilla: Mismatched Rtp Payload Type Can Trigger Memory Corruption (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5131" id="CVE-2018-5131" title="Mozilla: Fetch Api Improperly Returns Cached Copies Of No-Store/No-Cache Resources (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" id="CVE-2018-5144" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" id="CVE-2018-5145" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0526" id="RHSA-2018:0526-1" title="Rhsa-2018:0526-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555127" id="1555127" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555128" id="1555128" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555129" id="1555129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555130" id="1555130" title="Mozilla: Mismatched Rtp Payload Type Can Trigger Memory Corruption (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555131" id="1555131" title="Mozilla: Fetch Api Improperly Returns Cached Copies Of No-Store/No-Cache Resources (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555132" id="1555132" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555133" id="1555133" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0549-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.7.2 ESR. 
Security Fix(es): 
* Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-03-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.7.2-1.el6_9.src.rpm" version="52.7.2"><filename>firefox-52.7.2-1.el6_9.x86_64.rpm</filename><sum type="sha256">e4192d6c84a53def245a16e1a8fbafbddecd5aa7ce69341c349a14e3cae2da84</sum></package><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.7.2-1.el6_9.src.rpm" version="52.7.2"><filename>firefox-52.7.2-1.el6_9.i686.rpm</filename><sum type="sha256">fc5b3d8818d9055493251c433d07946942e3c7cd9ad2b604ed70172833bf7864</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" id="CVE-2018-5146" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0549" id="RHSA-2018:0549-1" title="Rhsa-2018:0549-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557221" id="1557221" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0647-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.7.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) 
* Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) 
* Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) 
* Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) 
* Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-04-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_9" src="thunderbird-52.7.0-1.el6_9.src.rpm" version="52.7.0"><filename>thunderbird-52.7.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">c2560db5647cb5f9c9067d0170b4e56672f01502958940b7fa2a1e0537d072b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" id="CVE-2018-5125" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" id="CVE-2018-5127" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" id="CVE-2018-5129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" id="CVE-2018-5144" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" id="CVE-2018-5145" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" id="CVE-2018-5146" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0647" id="RHSA-2018:0647-1" title="Rhsa-2018:0647-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555127" id="1555127" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555128" id="1555128" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555129" id="1555129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555132" id="1555132" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555133" id="1555133" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557221" id="1557221" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0649-1</id><title>Libvorbis</title><description>Security Fix(es): 
* Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-04-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="libvorbis-devel" release="5.el6_9.1" src="libvorbis-1.2.3-5.el6_9.1.src.rpm" version="1.2.3"><filename>libvorbis-devel-1.2.3-5.el6_9.1.x86_64.rpm</filename><sum type="sha256">e5c442b6eef3ca9c525eba53110d70ac1fb5e61fbd591d7abdc0e882d6a2fe76</sum></package><package arch="x86_64" epoch="1" name="libvorbis" release="5.el6_9.1" src="libvorbis-1.2.3-5.el6_9.1.src.rpm" version="1.2.3"><filename>libvorbis-1.2.3-5.el6_9.1.x86_64.rpm</filename><sum type="sha256">3572c0f516d971e1a698f23274edfe03e968ba3c1f140e99ab56357a3dee5a60</sum></package><package arch="i686" epoch="1" name="libvorbis" release="5.el6_9.1" src="libvorbis-1.2.3-5.el6_9.1.src.rpm" version="1.2.3"><filename>libvorbis-1.2.3-5.el6_9.1.i686.rpm</filename><sum type="sha256">6bae94f8d08ae08fb3da67090ee61204e786c79ef6ea6425e22425ea31b424c6</sum></package><package arch="noarch" epoch="1" name="libvorbis-devel-docs" release="5.el6_9.1" src="libvorbis-1.2.3-5.el6_9.1.src.rpm" version="1.2.3"><filename>libvorbis-devel-docs-1.2.3-5.el6_9.1.noarch.rpm</filename><sum type="sha256">e933d99a851c5f2e5b684c348d8c6d9936c3cf4bcb0a6b8feefaaafe2746e2a1</sum></package><package arch="i686" epoch="1" name="libvorbis-devel" release="5.el6_9.1" src="libvorbis-1.2.3-5.el6_9.1.src.rpm" version="1.2.3"><filename>libvorbis-devel-1.2.3-5.el6_9.1.i686.rpm</filename><sum type="sha256">800568f1205d4d9954c1b2fe6abf010836dc4482cd691dcf59da2c756bcb5664</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" id="CVE-2018-5146" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0649" id="RHSA-2018:0649-1" title="Rhsa-2018:0649-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557221" id="1557221" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1098-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.7.3 ESR. 
Security Fix(es): 
* firefox: Use-after-free in compositor potentially allows code execution (CVE-2018-5148)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-04-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.7.3-1.el6_9.src.rpm" version="52.7.3"><filename>firefox-52.7.3-1.el6_9.i686.rpm</filename><sum type="sha256">a09fca73677c6fe4c2b12be583ba6c92c7dba6a04d0ddf55b82d8247731509a9</sum></package><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.7.3-1.el6_9.src.rpm" version="52.7.3"><filename>firefox-52.7.3-1.el6_9.x86_64.rpm</filename><sum type="sha256">eebaba950771df2cf4277a5bab6880018d724f19d8a3a2dac76f1d85774f1017</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5148" id="CVE-2018-5148" title="Firefox: Use-After-Free In Compositor Potentially Allows Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1098" id="RHSA-2018:1098-1" title="Rhsa-2018:1098-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560928" id="1560928" title="Firefox: Use-After-Free In Compositor Potentially Allows Code Execution" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1124-1</id><title>Python-Paramiko</title><description>Security Fix(es): 
* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-04-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-paramiko" release="4.el6_9" src="python-paramiko-1.7.5-4.el6_9.src.rpm" version="1.7.5"><filename>python-paramiko-1.7.5-4.el6_9.noarch.rpm</filename><sum type="sha256">12b0d3f739598adc24cc4c8f3da4a5cd0e86de68fd66c22507a500a789df4690</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7750" id="CVE-2018-7750" title="Python-Paramiko: Authentication Bypass In Transport.Py" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1124" id="RHSA-2018:1124-1" title="Rhsa-2018:1124-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557130" id="1557130" title="Python-Paramiko: Authentication Bypass In Transport.Py" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1188-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814) 
* OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794) 
* OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795) 
* OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796) 
* OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797) 
* OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798) 
* OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799) 
* OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800) 
* OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815) 
* OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-04-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">2930c9a23fca719fd84b2d384e653f7a5dee7bf3695d49c3c31a97a6a4b70b09</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">8563d2e3a0d1c7080764aaea46920dc862a20aede643d186dd2fea8ba5d3d8ec</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">8242c51f35c62cfb1c9a214bf3dc6df81952f3f8e202a1d1d367c862c88d24f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">43f8a1ca1e0260600a7e41309ee0c17020bf2d7aecdc589ee79bf2a27a23e843</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">e329c85e1f6b30d8a080e9d115bf24da9f7b0fe278861066bf2508731fd01884</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.171-3.b10.el6_9.noarch.rpm</filename><sum type="sha256">26836c5f40cf4d75552ded8f602f0e3da735ae21c0ad6c31536f9f28d921cfbd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">6b80307e3cbba27e1960d85d8a0e8e3028ad5eca47c5b98d81b6d618edf1dba2</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-1.8.0.171-3.b10.el6_9.noarch.rpm</filename><sum type="sha256">24b3f44d102792a3d5e5da9911924e5260175376124f67e6a2824271e01159d6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">9614ab4b5a2a7106d8d17c2f134e6f8e9588871ef463d47975adf9e6177bac58</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">a630f95c63508cd2f6a6f4b3b40115b5f52f286eecc4da27746a8c8338332bad</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">6434067ff9bd9c0b6392ca825521b7c222f75baa3c9c9bea310b15a070cd11c8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-3.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-debug-1.8.0.171-3.b10.el6_9.x86_64.rpm</filename><sum type="sha256">b80f6b7825a6a1ddb17100021e2987130717dc5637c81919c5ea172a77f0cdf2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" id="CVE-2018-2790" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" id="CVE-2018-2794" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" id="CVE-2018-2795" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" id="CVE-2018-2796" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" id="CVE-2018-2797" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" id="CVE-2018-2798" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" id="CVE-2018-2799" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" id="CVE-2018-2800" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" id="CVE-2018-2814" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" id="CVE-2018-2815" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1188" id="RHSA-2018:1188-1" title="Rhsa-2018:1188-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567121" id="1567121" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567126" id="1567126" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567351" id="1567351" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567537" id="1567537" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567542" id="1567542" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567543" id="1567543" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567545" id="1567545" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567546" id="1567546" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568163" id="1568163" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568515" id="1568515" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1199-1</id><title>Patch</title><description>Patch should be installed because it is a common way of upgrading applications. 
Security Fix(es): 
* patch: Malicious patch files cause ed to execute arbitrary commands (CVE-2018-1000156)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="patch" release="8.el6_9" src="patch-2.6-8.el6_9.src.rpm" version="2.6"><filename>patch-2.6-8.el6_9.x86_64.rpm</filename><sum type="sha256">a7a172af3b79c6e569efa06e2fd34838474415b39c263e2608787e13328c988d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156" id="CVE-2018-1000156" title="Patch: Malicious Patch Files Cause Ed To Execute Arbitrary Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1199" id="RHSA-2018:1199-1" title="Rhsa-2018:1199-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564326" id="1564326" title="Patch: Malicious Patch Files Cause Ed To Execute Arbitrary Commands" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1225-1</id><title>Librelp</title><description>Security Fix(es): 
* librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c (CVE-2018-1000140)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-05-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="librelp-devel" release="3.el6_9.1" src="librelp-1.2.7-3.el6_9.1.src.rpm" version="1.2.7"><filename>librelp-devel-1.2.7-3.el6_9.1.i686.rpm</filename><sum type="sha256">9acda4ddbc02530ecfbc5e7a779fbf429b2fd0ea3ae728f8a85561e2d3fcff12</sum></package><package arch="x86_64" name="librelp-devel" release="3.el6_9.1" src="librelp-1.2.7-3.el6_9.1.src.rpm" version="1.2.7"><filename>librelp-devel-1.2.7-3.el6_9.1.x86_64.rpm</filename><sum type="sha256">274271a69d4436cb2d7c3f57739653b4d1373590ac370a96060e21be24e8f607</sum></package><package arch="x86_64" name="librelp" release="3.el6_9.1" src="librelp-1.2.7-3.el6_9.1.src.rpm" version="1.2.7"><filename>librelp-1.2.7-3.el6_9.1.x86_64.rpm</filename><sum type="sha256">d8dba2cfc6ca8165f4723e09c83851f94a8c6ff34c735a9ffc77f22377d78068</sum></package><package arch="i686" name="librelp" release="3.el6_9.1" src="librelp-1.2.7-3.el6_9.1.src.rpm" version="1.2.7"><filename>librelp-1.2.7-3.el6_9.1.i686.rpm</filename><sum type="sha256">f010f33f7c239107289afc57ba1a727114df6ac8f0fcf11136ef9a0de49b19af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000140" id="CVE-2018-1000140" title="Librelp: Stack-Based Buffer Overflow In Relptcpchkpeername Function In Src/Tcp.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1225" id="RHSA-2018:1225-1" title="Rhsa-2018:1225-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560084" id="1560084" title="Librelp: Stack-Based Buffer Overflow In Relptcpchkpeername Function In Src/Tcp.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1270-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814) 
* OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794) 
* OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795) 
* OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796) 
* OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797) 
* OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798) 
* OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799) 
* OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800) 
* OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815) 
* OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.14.1.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.1.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.1.el6_9.x86_64.rpm</filename><sum type="sha256">0344a003993ac0736dc60f6b411fffddd2c188fb763f092f407a413fb9a09ad7</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.14.1.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.1.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.1.el6_9.noarch.rpm</filename><sum type="sha256">a6fc3f473c1ba129b72cb00bfcd1763fe1ffa88a14cc68f030a8d1ab3bed5684</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.14.1.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.1.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.1.el6_9.x86_64.rpm</filename><sum type="sha256">7904a54a4471cf6cc22ab497b9902fb3702d096094ef6adc3ffc180684b4ebea</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.14.1.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.1.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-1.7.0.181-2.6.14.1.el6_9.x86_64.rpm</filename><sum type="sha256">a01d75037611581d26d5e468da2aeffde1aee6fd5751242a295074ae98e41d4c</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.14.1.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.1.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-src-1.7.0.181-2.6.14.1.el6_9.x86_64.rpm</filename><sum type="sha256">93d293bc34d804a215797ac9e9d939429a22fd7632a76ad532e24d047b6f39dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" id="CVE-2018-2790" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" id="CVE-2018-2794" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" id="CVE-2018-2795" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" id="CVE-2018-2796" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" id="CVE-2018-2797" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" id="CVE-2018-2798" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" id="CVE-2018-2799" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" id="CVE-2018-2800" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" id="CVE-2018-2814" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" id="CVE-2018-2815" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1270" id="RHSA-2018:1270-1" title="Rhsa-2018:1270-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567121" id="1567121" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567126" id="1567126" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567351" id="1567351" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567537" id="1567537" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567542" id="1567542" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567543" id="1567543" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567545" id="1567545" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567546" id="1567546" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568163" id="1568163" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568515" id="1568515" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1319-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: cpu: speculative execution permission faults handling (CVE-2017-5754) 
* Kernel: error in exception handling leads to DoS (CVE-2018-8897) 
* kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645) 
* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824) 
* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166) 
* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017) 
* kernel: Stack information leak in the EFS element (CVE-2017-1000410)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">64be88f8a9b003b6146091c5656f13608fcab44e396d8a9fc077baca7e5ae5c3</sum></package><package arch="noarch" name="kernel-doc" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.28.1.el6.noarch.rpm</filename><sum type="sha256">003c50cde22c363878d37d01366349a19d4acaa164be8a6d1146db6716312965</sum></package><package arch="x86_64" name="perf" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">ea928f295a07e9a34e8321acb4cd1eb1c1fbbb19c80261b9fb83a8724ae6241a</sum></package><package arch="x86_64" name="kernel-headers" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">890cee9a36658a4fde7374ca088f0c0711e2af2ab76ac04971f761a348fcb280</sum></package><package arch="x86_64" name="kernel-debug" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">7fe3d478358fcac0493ba3e0ce758f1c9fa3ec80e9cd081ab89732fa6a2ebcd1</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpm</filename><sum type="sha256">b87cc02e2060ed38c25bc43969183e3a1280510a55bff57d9adaa9847a7f426c</sum></package><package arch="x86_64" name="python-perf" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">e060534b8f2ee11a0be5548eb078c2f744585cb9a9c3538ca1801224ffc01f20</sum></package><package arch="x86_64" name="kernel-devel" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">089719939c8f9c1eadaf89fd6e84acd4d718b3a873dcce4bc15ccce795b97f88</sum></package><package arch="noarch" name="kernel-firmware" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm</filename><sum type="sha256">9fc57ca05209098a97c89b731751d8cd2b1bce16397550c932bb3d07b222611c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm</filename><sum type="sha256">a0299aa22b2be57361ff34b6485622b4dc0d228ce3db528bada7a836b0082be4</sum></package><package arch="i686" name="kernel-debug-devel" release="696.28.1.el6" src="kernel-2.6.32-696.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpm</filename><sum type="sha256">d114698c004b569573741b86e6ce507f9d102383d71e35e05aa201411455aa74</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" id="CVE-2017-1000410" title="Kernel: Stack Information Leak In The Efs Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" id="CVE-2017-13166" title="Kernel: V4L2: Disabled Memory Access Protection Mechanism Allowing Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" id="CVE-2017-18017" title="Kernel: Netfilter: Use-After-Free In Tcpmss_Mangle_Packet Function In Net/Netfilter/Xt_Tcpmss.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" id="CVE-2017-5754" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" id="CVE-2017-7645" title="Kernel: Nfsd: Incorrect Handling Of Long Rpc Replies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" id="CVE-2017-8824" title="Kernel: Use-After-Free Vulnerability In Dccp Socket" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" id="CVE-2018-8897" title="Kernel: Error In Exception Handling Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1319" id="RHSA-2018:1319-1" title="Rhsa-2018:1319-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443615" id="1443615" title="Kernel: Nfsd: Incorrect Handling Of Long Rpc Replies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519160" id="1519160" title="Kernel: Stack Information Leak In The Efs Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519591" id="1519591" title="Kernel: Use-After-Free Vulnerability In Dccp Socket" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519781" id="1519781" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1531135" id="1531135" title="Kernel: Netfilter: Use-After-Free In Tcpmss_Mangle_Packet Function In Net/Netfilter/Xt_Tcpmss.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548412" id="1548412" title="Kernel: V4L2: Disabled Memory Access Protection Mechanism Allowing Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567074" id="1567074" title="Kernel: Error In Exception Handling Leads To Dos" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1364-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: ns-slapd crash via large filter value in ldapsearch (CVE-2018-1089)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="389-ds-base-libs" release="95.el6_9" src="389-ds-base-1.2.11.15-95.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-95.el6_9.i686.rpm</filename><sum type="sha256">8ba998d1ded9611278827da587eee7aa6bd26f943998ff7a476cc32d4b50980c</sum></package><package arch="x86_64" name="389-ds-base-devel" release="95.el6_9" src="389-ds-base-1.2.11.15-95.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-95.el6_9.x86_64.rpm</filename><sum type="sha256">5fd616727b853f8388fc383a356e6d3503a92bcdcec96508951bef5c8291f4f0</sum></package><package arch="x86_64" name="389-ds-base-libs" release="95.el6_9" src="389-ds-base-1.2.11.15-95.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-95.el6_9.x86_64.rpm</filename><sum type="sha256">514db51249d46e8a4f65ea2408dcf0085f9bef1c372bdf0b521b7f060e69a98b</sum></package><package arch="i686" name="389-ds-base-devel" release="95.el6_9" src="389-ds-base-1.2.11.15-95.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-95.el6_9.i686.rpm</filename><sum type="sha256">c0cd6119beb9aa7e9846a5f34a021707f6eecd94ac7ce4416658e08c443e973d</sum></package><package arch="x86_64" name="389-ds-base" release="95.el6_9" src="389-ds-base-1.2.11.15-95.el6_9.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-95.el6_9.x86_64.rpm</filename><sum type="sha256">1303279cb28487c5a04c088f6780a1483f6631891b588ba7b01f8adde19fbc33</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1089" id="CVE-2018-1089" title="389-Ds-Base: Ns-Slapd Crash Via Large Filter Value In Ldapsearch" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1364" id="RHSA-2018:1364-1" title="Rhsa-2018:1364-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559802" id="1559802" title="389-Ds-Base: Ns-Slapd Crash Via Large Filter Value In Ldapsearch" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1414-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.8.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (CVE-2018-5150) 
* Mozilla: Backport critical security fixes in Skia (CVE-2018-5183) 
* Mozilla: Use-after-free with SVG animations and clip paths (CVE-2018-5154) 
* Mozilla: Use-after-free with SVG animations and text paths (CVE-2018-5155) 
* Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files (CVE-2018-5157) 
* Mozilla: Malicious PDF can inject JavaScript into PDF Viewer (CVE-2018-5158) 
* Mozilla: Integer overflow and out-of-bounds write in Skia (CVE-2018-5159) 
* Mozilla: Lightweight themes can be installed without user interaction (CVE-2018-5168) 
* Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (CVE-2018-5178)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_9" src="firefox-52.8.0-1.el6_9.src.rpm" version="52.8.0"><filename>firefox-52.8.0-1.el6_9.i686.rpm</filename><sum type="sha256">b75131c0c26b4e995d2c4784f009bdb10e98f74fa1ccdfcfcd2d191f10b54e0c</sum></package><package arch="x86_64" name="firefox" release="1.el6_9" src="firefox-52.8.0-1.el6_9.src.rpm" version="52.8.0"><filename>firefox-52.8.0-1.el6_9.x86_64.rpm</filename><sum type="sha256">72507e7ea1ee12f566056de17f6638cde0484d151a9d4b51d795c999c4564e08</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" id="CVE-2018-5150" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" id="CVE-2018-5154" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" id="CVE-2018-5155" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157" id="CVE-2018-5157" title="Mozilla: Same-Origin Bypass Of Pdf Viewer To View Protected Pdf Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158" id="CVE-2018-5158" title="Mozilla: Malicious Pdf Can Inject Javascript Into Pdf Viewer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" id="CVE-2018-5159" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" id="CVE-2018-5168" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" id="CVE-2018-5178" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" id="CVE-2018-5183" title="Mozilla: Backport Critical Security Fixes In Skia" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1414" id="RHSA-2018:1414-1" title="Rhsa-2018:1414-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576250" id="1576250" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576255" id="1576255" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576257" id="1576257" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576258" id="1576258" title="Mozilla: Same-Origin Bypass Of Pdf Viewer To View Protected Pdf Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576259" id="1576259" title="Mozilla: Malicious Pdf Can Inject Javascript Into Pdf Viewer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576260" id="1576260" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576269" id="1576269" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576278" id="1576278" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576283" id="1576283" title="Mozilla: Backport Critical Security Fixes In Skia" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1454-1</id><title>Dhcp</title><description>Security Fix(es): 
* A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Scientific Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol. (CVE-2018-1111)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="12" name="dhcp-devel" release="53.P1.el6_9.4" src="dhcp-4.1.1-53.P1.el6_9.4.src.rpm" version="4.1.1"><filename>dhcp-devel-4.1.1-53.P1.el6_9.4.x86_64.rpm</filename><sum type="sha256">1288100fe6f4776b8243a35106e69fd941903b57199987082cefb7bf74511e4e</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="53.P1.el6_9.4" src="dhcp-4.1.1-53.P1.el6_9.4.src.rpm" version="4.1.1"><filename>dhcp-4.1.1-53.P1.el6_9.4.x86_64.rpm</filename><sum type="sha256">305d1bd16149443526b339cb977fc9e05221b2daf4a4a70b47395b420e9b959e</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="53.P1.el6_9.4" src="dhcp-4.1.1-53.P1.el6_9.4.src.rpm" version="4.1.1"><filename>dhcp-common-4.1.1-53.P1.el6_9.4.x86_64.rpm</filename><sum type="sha256">c9dce1f9f9c830a47294a8fab9738e36a5d9c3910ee0284504baa8220554c167</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="53.P1.el6_9.4" src="dhcp-4.1.1-53.P1.el6_9.4.src.rpm" version="4.1.1"><filename>dhclient-4.1.1-53.P1.el6_9.4.x86_64.rpm</filename><sum type="sha256">59466e5cce78cee1ff8eb54d6e715c0eea370a06e5c9a6388727f108dbd54414</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="53.P1.el6_9.4" src="dhcp-4.1.1-53.P1.el6_9.4.src.rpm" version="4.1.1"><filename>dhcp-devel-4.1.1-53.P1.el6_9.4.i686.rpm</filename><sum type="sha256">10a54c59ebfe3895bc787bb77829e875a0cbfab53bd61f118f6793b0a17e6f7c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111" id="CVE-2018-1111" title="Dhcp: Command Injection Vulnerability In The Dhcp Client Networkmanager Integration Script" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1454" id="RHSA-2018:1454-1" title="Rhsa-2018:1454-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567974" id="1567974" title="Dhcp: Command Injection Vulnerability In The Dhcp Client Networkmanager Integration Script" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1647-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.14.8.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.el6_9.x86_64.rpm</filename><sum type="sha256">b5b14e6c45eb411f47b38eeca31d76fb707ae2013e84092aa92dc657e7e01eac</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.14.8.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.el6_9.x86_64.rpm</filename><sum type="sha256">03ee8578192ea0cb8c794bdaf5f1f5da68e2b927cda3f591ec979b19a38083d1</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.14.8.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el6_9.x86_64.rpm</filename><sum type="sha256">73083d0c2b3a717ec2630f780aaa4a6d4d9185b4c4876cabf644af3f082cafb2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.14.8.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.el6_9.x86_64.rpm</filename><sum type="sha256">bb93475e390863b4b42db7cbd601c79faab60c236cabbbeece0385a116e93072</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.14.8.el6_9" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el6_9.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.el6_9.noarch.rpm</filename><sum type="sha256">d618206ce0642907785f6d04977208dfc0ddf89ce50e08f2a1dc8d4171de651a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1647" id="RHSA-2018:1647-1" title="Rhsa-2018:1647-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1650-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">bae5ec4d0b94d00e6ef7ed65734712d24f94bc8abc1d51e7715a1c10ba25e077</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">db0c243af007a35c70d7eb048ee1453ecb691c101ddd71dc96a863adec6ca7ee</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">8baf02be106e1d5a052c39cdb7c878b0ec66d8cfe7c1923b9d72370006d0f2b8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">1dd5a651cbf2b514378cacdd56a07976c012e14124aaa48eed76aec53d0775c8</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el6_9.noarch.rpm</filename><sum type="sha256">b4635c1643c713287a9f1402e2a49489414ac01cb9114f8395e5636e9709499a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">a96b81fb732383e7393d2115f55cd2f6e4ceede6e015875cd0ad5ce891292443</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">400c22e69ca8f655db9eec462988ea7cdf3b75f0e9a74c5673bb74f50899f053</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">d1effb8e4eefdc1a8aecf1b343ce0e32c30f59c3dceb8a70178d3afc27c11598</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">c204696e7bdcd2d3e58b5a59f3ea22a3d33e6d370951055b831f7013d7fd5658</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">7f455409dea29fa59753fb47b2f094643c59f56d8cab2fdeb9237ea00e6c1135</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el6_9.noarch.rpm</filename><sum type="sha256">d1c6cccbc93d9665b0cb82acfea1a3a0ac6bc07365e5332b63b89bc1aea35113</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="8.b10.el6_9" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-1.8.0.171-8.b10.el6_9.x86_64.rpm</filename><sum type="sha256">2f6988162e2badab8b27f38d660c5ea217eacef02be9f1b6de30ff82348a97ca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1650" id="RHSA-2018:1650-1" title="Rhsa-2018:1650-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1651-1</id><title>Kernel</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. 
In this update mitigations for x86 (both 32 and 64 bit) architecture are provided. 
Bug Fix(es): 
* Previously, an erroneous code in the x86 kexec system call path caused a memory corruption. As a consequence, the system became unresponsive with the following kernel stack trace: 
'WARNING: CPU: 13 PID: 36409 at lib/list_debug.c:59 __list_del_entry+0xa1/0xd0 list_del corruption. prev-&gt;next should be ffffdd03fddeeca0, but was (null)' 
This update ensures that the code does not corrupt memory. As a result, the operating system no longer hangs.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-696.30.1.el6.noarch.rpm</filename><sum type="sha256">035109327ad79de0d63188a9f5fedd072e2901be667e75c609240155bea334de</sum></package><package arch="noarch" name="kernel-firmware" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-696.30.1.el6.noarch.rpm</filename><sum type="sha256">e1e041051fd43c93d0ceea9d42b32ddf16016f7062b6c34bf7fa497780a0e92f</sum></package><package arch="x86_64" name="kernel-debug-devel" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">ca662933fae2447051e1f38702c313b21cb8309525cca3eb8d645dbb1c16bbc8</sum></package><package arch="x86_64" name="kernel-debug" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">13a7521d0bed7e6395e728d04a2b1ddb222d9d93480be6836f1e28d89bd64829</sum></package><package arch="i686" name="kernel-debug-devel" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-696.30.1.el6.i686.rpm</filename><sum type="sha256">8d8fdb858b3f4cc2c9c580aa96a24eef82a4bfa77716468148791e3286256812</sum></package><package arch="x86_64" name="kernel-devel" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">ae8d9ae35f533794b4d57f00815f0684a09e27817e024353e1f3727382e56747</sum></package><package arch="x86_64" name="python-perf" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">83ca89194d7c202d037cbe8c7b7aebc1f2af1179355c2b816f9e11d3788162a5</sum></package><package arch="x86_64" name="kernel" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">b62406c83632f9456150a4c2ca593879e82108aa3f2faf52e402bce7b30f59fa</sum></package><package arch="x86_64" name="perf" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">1471a03f2f6194a461676acb185efb2e833486cbe87745143894daba4719c473</sum></package><package arch="x86_64" name="kernel-headers" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-696.30.1.el6.x86_64.rpm</filename><sum type="sha256">17e3936b34392d1fb7fce9605dd8094aa3418504a1909ac072636d359eb376cd</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="696.30.1.el6" src="kernel-2.6.32-696.30.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-696.30.1.el6.noarch.rpm</filename><sum type="sha256">03931ad87cd7a18b1f355ea0b9865a6e6aa9f0a98756a15e95965ae86f2c07c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1651" id="RHSA-2018:1651-1" title="Rhsa-2018:1651-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1660-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.503.el6_9.6" src="qemu-kvm-0.12.1.2-2.503.el6_9.6.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.503.el6_9.6.x86_64.rpm</filename><sum type="sha256">7317fc5bf3d91e56118b00f87668f7f4cb4c147078ba02b1e98094aae8932cc2</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.503.el6_9.6" src="qemu-kvm-0.12.1.2-2.503.el6_9.6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.503.el6_9.6.x86_64.rpm</filename><sum type="sha256">e634e8bedb98bbbebdd8bb7a712c6c9ee0bdc1cf51eab668096e30d54af4142c</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.503.el6_9.6" src="qemu-kvm-0.12.1.2-2.503.el6_9.6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.503.el6_9.6.x86_64.rpm</filename><sum type="sha256">1005e5dbb2d97b8706d4f0212aeb77d2f3efe74ea4ea7ff8e9ae211074c6d510</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.503.el6_9.6" src="qemu-kvm-0.12.1.2-2.503.el6_9.6.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.503.el6_9.6.x86_64.rpm</filename><sum type="sha256">dc143a8c04c3046361c453b819c63ccada3089c1b6235280c619114d4acb78e7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1660" id="RHSA-2018:1660-1" title="Rhsa-2018:1660-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1669-1</id><title>Libvirt</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the libvirt side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt-lock-sanlock" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-62.el6_9.2.x86_64.rpm</filename><sum type="sha256">307e5691c7650989aa8a3eb43c8f1f3a42f27ab0a8f1070d22c160c4aecc7670</sum></package><package arch="x86_64" name="libvirt-python" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-62.el6_9.2.x86_64.rpm</filename><sum type="sha256">dae94a89d38ddb0ac2db7b123e6066ca739b0c26b0781e22a1091cdd7f5a0704</sum></package><package arch="x86_64" name="libvirt-devel" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-62.el6_9.2.x86_64.rpm</filename><sum type="sha256">16f0f9a035d7164625e758087f71df68629c67377e0a2feb10a18583e0b863a3</sum></package><package arch="i686" name="libvirt-client" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-62.el6_9.2.i686.rpm</filename><sum type="sha256">1c16b142cefa444632757eb3c83d9a1e0b58e0ecf0e25c85a8537c15afb040b4</sum></package><package arch="i686" name="libvirt-devel" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-62.el6_9.2.i686.rpm</filename><sum type="sha256">383835676f08a1c3f7027d2e9f0e353724670baf70e920c34255ad9e48d94b3d</sum></package><package arch="x86_64" name="libvirt" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-62.el6_9.2.x86_64.rpm</filename><sum type="sha256">1afdc13c967a4d16052c5684eef1a70f663fb8fa2ae866d78e3dc2158f651c9d</sum></package><package arch="x86_64" name="libvirt-client" release="62.el6_9.2" src="libvirt-0.10.2-62.el6_9.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-62.el6_9.2.x86_64.rpm</filename><sum type="sha256">a20035c53fb3f29725d90f143fa8ba0b5570930981f90038c157bb566871d5cb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1669" id="RHSA-2018:1669-1" title="Rhsa-2018:1669-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1726-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.8.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (CVE-2018-5150) 
* Mozilla: Backport critical security fixes in Skia (CVE-2018-5183) 
* Mozilla: Use-after-free with SVG animations and clip paths (CVE-2018-5154) 
* Mozilla: Use-after-free with SVG animations and text paths (CVE-2018-5155) 
* Mozilla: Integer overflow and out-of-bounds write in Skia (CVE-2018-5159) 
* Mozilla: Full plaintext recovery in S/MIME via chosen-ciphertext attack (CVE-2018-5184) 
* Mozilla: Hang via malformed headers (CVE-2018-5161) 
* Mozilla: Encrypted mail leaks plaintext through src attribute (CVE-2018-5162) 
* Mozilla: Lightweight themes can be installed without user interaction (CVE-2018-5168) 
* Mozilla: Filename spoofing for external attachments (CVE-2018-5170) 
* Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (CVE-2018-5178) 
* Mozilla: Leaking plaintext through HTML forms (CVE-2018-5185)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-05-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_9" src="thunderbird-52.8.0-2.el6_9.src.rpm" version="52.8.0"><filename>thunderbird-52.8.0-2.el6_9.x86_64.rpm</filename><sum type="sha256">0870134dcd4ee8a693125bc136c0bc0a5f484ce365d999e0fed56f6f452cdc7b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" id="CVE-2018-5150" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" id="CVE-2018-5154" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" id="CVE-2018-5155" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" id="CVE-2018-5159" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5161" id="CVE-2018-5161" title="Mozilla: Hang Via Malformed Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5162" id="CVE-2018-5162" title="Mozilla: Encrypted Mail Leaks Plaintext Through Src Attribute" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" id="CVE-2018-5168" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5170" id="CVE-2018-5170" title="Mozilla: Filename Spoofing For External Attachments" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" id="CVE-2018-5178" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" id="CVE-2018-5183" title="Mozilla: Backport Critical Security Fixes In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5184" id="CVE-2018-5184" title="Mozilla: Full Plaintext Recovery In S/Mime Via Chosen-Ciphertext Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5185" id="CVE-2018-5185" title="Mozilla: Leaking Plaintext Through Html Forms" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1726" id="RHSA-2018:1726-1" title="Rhsa-2018:1726-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576250" id="1576250" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576255" id="1576255" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576257" id="1576257" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576260" id="1576260" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576269" id="1576269" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576278" id="1576278" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576283" id="1576283" title="Mozilla: Backport Critical Security Fixes In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580236" id="1580236" title="Mozilla: Full Plaintext Recovery In S/Mime Via Chosen-Ciphertext Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580237" id="1580237" title="Mozilla: Hang Via Malformed Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580239" id="1580239" title="Mozilla: Encrypted Mail Leaks Plaintext Through Src Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580240" id="1580240" title="Mozilla: Filename Spoofing For External Attachments" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580241" id="1580241" title="Mozilla: Leaking Plaintext Through Html Forms" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1777-1</id><title>Procps</title><description>Security Fix(es): 
* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124) 
* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-06-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="procps" release="45.el6_9.3" src="procps-3.2.8-45.el6_9.3.src.rpm" version="3.2.8"><filename>procps-3.2.8-45.el6_9.3.i686.rpm</filename><sum type="sha256">b88c8138f44cf91edff2d1ea09b2f5de6bb73694d607ab3b84ca12b4ff0dc710</sum></package><package arch="i686" name="procps-devel" release="45.el6_9.3" src="procps-3.2.8-45.el6_9.3.src.rpm" version="3.2.8"><filename>procps-devel-3.2.8-45.el6_9.3.i686.rpm</filename><sum type="sha256">309227022a473b7ab01f647a7375eca48fe7e92650193b3cff540830cd652242</sum></package><package arch="x86_64" name="procps-devel" release="45.el6_9.3" src="procps-3.2.8-45.el6_9.3.src.rpm" version="3.2.8"><filename>procps-devel-3.2.8-45.el6_9.3.x86_64.rpm</filename><sum type="sha256">b0c754b5a7efb38982a41fb2279b8fb7c6315129141b80a4feb5ba3f9337c6df</sum></package><package arch="x86_64" name="procps" release="45.el6_9.3" src="procps-3.2.8-45.el6_9.3.src.rpm" version="3.2.8"><filename>procps-3.2.8-45.el6_9.3.x86_64.rpm</filename><sum type="sha256">b8716545b938e138f7dae4d30fcd9f4d486a44d6eed3c426b5d05f737d1569e4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" id="CVE-2018-1124" title="Procps-Ng, Procps: Integer Overflows Leading To Heap Overflow In File2Strvec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" id="CVE-2018-1126" title="Procps-Ng, Procps: Incorrect Integer Size In Proc/Alloc.* Leading To Truncation / Integer Overflow Issues" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1777" id="RHSA-2018:1777-1" title="Rhsa-2018:1777-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575465" id="1575465" title="Procps-Ng, Procps: Integer Overflows Leading To Heap Overflow In File2Strvec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575853" id="1575853" title="Procps-Ng, Procps: Incorrect Integer Size In Proc/Alloc.* Leading To Truncation / Integer Overflow Issues" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1779-1</id><title>Xmlrpc3</title><description>Security Fix(es): 
* xmlrpc: Deserialization of untrusted Java object through &lt;ex:serializable&gt; tag (CVE-2016-5003)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-06-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="xmlrpc3-javadoc" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-javadoc-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">92394cf322f88556706316499fe137f282aa67a31252745d600d6eaae6413dfe</sum></package><package arch="noarch" name="xmlrpc3-client-devel" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-client-devel-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">fad43ed14d17c02069b65e51ce40fdbaf6ce4333cb659542d48f6a0b67f71cb9</sum></package><package arch="noarch" name="xmlrpc3-server" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-server-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">7134f5d218f3ee8468fd3224ec373172c78cf0051fb15b32329d7b25650066f0</sum></package><package arch="noarch" name="xmlrpc3-client" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-client-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">78813af9513e91f82e540b35f15d85ddd266daf6b9a02a0d5656d3c8d5984fca</sum></package><package arch="noarch" name="xmlrpc3-common" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-common-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">5ab2504dae5743662d03fdb824cf5947aca23424a667951b1e0236eb7f1c3777</sum></package><package arch="noarch" name="xmlrpc3-common-devel" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-common-devel-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">a6a4631645e71b66da9d849fbe454a721fbb1cee550b624158b3c3ecdfac58a5</sum></package><package arch="noarch" name="xmlrpc3-server-devel" release="4.17.el6_9" src="xmlrpc3-3.0-4.17.el6_9.src.rpm" version="3.0"><filename>xmlrpc3-server-devel-3.0-4.17.el6_9.noarch.rpm</filename><sum type="sha256">eb836512ef5a81cc550d7e8642663c429e7e049c06af9b6d7f4cfd7c2e8b7aea</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5003" id="CVE-2016-5003" title="Xmlrpc: Deserialization Of Untrusted Java Object Through &lt;Ex:Serializable&gt; Tag" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1779" id="RHSA-2018:1779-1" title="Rhsa-2018:1779-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508123" id="1508123" title="Xmlrpc: Deserialization Of Untrusted Java Object Through &lt;Ex:Serializable&gt; Tag" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1854-1</id><title>Kernel</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC) 
* kernel: net/packet: overflow in check for priv area size (CVE-2017-7308) 
* kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701) 
* kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) 
* kernel: Null pointer dereference via keyctl (CVE-2016-8650) 
* kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671) 
* kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001) 
* kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616) 
* kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889) 
* kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890) 
* kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075) 
* kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076) 
* kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077) 
* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190) 
* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121) 
* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203) 
* kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130) 
* kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">ddcb594fc8fe595d065e53100c32750b9366eb9f91362f330bce61f986bde546</sum></package><package arch="x86_64" name="kernel-headers" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">843e7b90bbcc962f5ce389cfee255c2e7a2acf7dfa777a67588f54129f399827</sum></package><package arch="x86_64" name="perf" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">bcc6d4f319540fffa3b477974dc7fc09fc9fbdf3527842cbaa35b9a492f23d66</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.el6.noarch.rpm</filename><sum type="sha256">d17fc0ef81add36966c5ad1a52e1ac12d36f7779b6df5d691cc0a59a61415abe</sum></package><package arch="x86_64" name="python-perf" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">fd8848d9408ef1e08c1c051f040fb1cdfcf307c8c8d48f20e44860c89f57f169</sum></package><package arch="noarch" name="kernel-firmware" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.el6.noarch.rpm</filename><sum type="sha256">7a17694fb784fd788cd409fd6cd60db8997f9977b902d1262403f61b797a7250</sum></package><package arch="i686" name="kernel-debug-devel" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.el6.i686.rpm</filename><sum type="sha256">b6a454d1ace13f3472144a435b0cd76cdfe9e4724138cbef947085af70b77003</sum></package><package arch="x86_64" name="kernel-debug" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">d942facb8030ccea418d38309a0e7a59e1aff9c83e71a7b228bcc477214b6497</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">d368cec4df6faf2dc8e37013023a9c5c86b184e7811d6a98be518e81c64f6ea3</sum></package><package arch="noarch" name="kernel-doc" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.el6.noarch.rpm</filename><sum type="sha256">bcab6f050c1497c8639cff2e9864bcb1fb473d29ce480038cc4c713ee447b8b3</sum></package><package arch="x86_64" name="kernel" release="754.el6" src="kernel-2.6.32-754.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.el6.x86_64.rpm</filename><sum type="sha256">b7afe12b8f0374340a51636372ced152b9f3e155ef23e1029f0f9ef8fea94d89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6701" id="CVE-2012-6701" title="Kernel: Aio Interface Didn'T Use Rw_Verify_Area() For Checking Mandatory Locking On Files And Size Of Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" id="CVE-2015-8830" title="Kernel: Aio Write Triggers Integer Overflow In Some Protocols" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" id="CVE-2016-8650" title="Kernel: Null Pointer Dereference Via Keyctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" id="CVE-2017-12190" title="Kernel: Memory Leak When Merging Buffers In Scsi Io Vectors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121" id="CVE-2017-15121" title="Kernel: Vfs: Bug In Truncate_Inode_Pages_Range() And Fuse Client" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" id="CVE-2017-18203" title="Kernel: Race Condition In Drivers/Md/Dm.C:Dm_Get_From_Kobject() Allows Local Users To Cause A Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" id="CVE-2017-2671" title="Kernel: Ping Socket / Af_Llc Connect() " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" id="CVE-2017-6001" title="Kernel: Race Condition Between Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" id="CVE-2017-7308" title="Kernel: Net/Packet: Overflow In Check For Priv Area Size" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" id="CVE-2017-7616" title="Kernel: Incorrect Error Handling In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" id="CVE-2017-7889" title="Kernel: Mm Subsystem Does Not Properly Enforce " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" id="CVE-2017-8890" title="Kernel: Double Free In The Inet_Csk_Clone_Lock " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" id="CVE-2017-9075" title="Kernel: Net: Sctp_V6_Create_Accept_Sk Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" id="CVE-2017-9076" title="Kernel: Net: Ipv6 Dccp Implementation Mishandles " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" id="CVE-2017-9077" title="Kernel: Net: Tcp_V6_Syn_Recv_Sock Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" id="CVE-2018-1130" title="Kernel: A Null Pointer Dereference In Net/Dccp/Output.C:Dccp_Write_Xmit() Leads To A System Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" id="CVE-2018-5803" title="Kernel: Missing Length Check Of Payload In Net/Sctp/Sm_Make_Chunk.C:_Sctp_Make_Chunk() Function Allows Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1854" id="RHSA-2018:1854-1" title="Rhsa-2018:1854-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314275" id="1314275" title="Kernel: Aio Write Triggers Integer Overflow In Some Protocols" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314288" id="1314288" title="Kernel: Aio Interface Didn'T Use Rw_Verify_Area() For Checking Mandatory Locking On Files And Size Of Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395187" id="1395187" title="Kernel: Null Pointer Dereference Via Keyctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422825" id="1422825" title="Kernel: Race Condition Between Multiple " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436649" id="1436649" title="Kernel: Ping Socket / Af_Llc Connect() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1437404" id="1437404" title="Kernel: Net/Packet: Overflow In Check For Priv Area Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441088" id="1441088" title="Kernel: Incorrect Error Handling In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444493" id="1444493" title="Kernel: Mm Subsystem Does Not Properly Enforce " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448170" id="1448170" title="Rhel6.9: Sunrpc Reconnect Logic Now May Trigger A Syn Storm When A Tcp Connection Drops And A Burst Of Rpc Commands Hit The Transport" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450972" id="1450972" title="Kernel: Double Free In The Inet_Csk_Clone_Lock " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452688" id="1452688" title="Kernel: Net: Ipv6 Dccp Implementation Mishandles " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452691" id="1452691" title="Kernel: Net: Sctp_V6_Create_Accept_Sk Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452744" id="1452744" title="Kernel: Net: Tcp_V6_Syn_Recv_Sock Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495089" id="1495089" title="Kernel: Memory Leak When Merging Buffers In Scsi Io Vectors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1497152" id="1497152" title="Systool Causes Panic On 2.6.32-696.6.3.El6.X86_64 Using Be2Iscsi" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520893" id="1520893" title="Kernel: Vfs: Bug In Truncate_Inode_Pages_Range() And Fuse Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550811" id="1550811" title="Kernel: Race Condition In Drivers/Md/Dm.C:Dm_Get_From_Kobject() Allows Local Users To Cause A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551051" id="1551051" title="Kernel: Missing Length Check Of Payload In Net/Sctp/Sm_Make_Chunk.C:_Sctp_Make_Chunk() Function Allows Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560494" id="1560494" title="I686: Using Invpcid_Flush_All_Nonglobals() Can Cause User-Space Panic On .I686" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576419" id="1576419" title="Kernel: A Null Pointer Dereference In Net/Dccp/Output.C:Dccp_Write_Xmit() Leads To A System Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=869942" id="869942" title="Kernel Crashes On Reading An Acl Containing 190 Aces Over Nfsv4" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1860-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Null pointer indirection in printer server process (CVE-2018-1050)</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-client" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">52182fee761ce3c98bcf35263df52347f6d9602c379c69d77a7b9d15f03741e0</sum></package><package arch="i686" name="libsmbclient-devel" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-51.el6.i686.rpm</filename><sum type="sha256">ce2339c8bdb1b8d766c28a20286859134d906dbd8c337ede594227f78c5fc624</sum></package><package arch="x86_64" name="samba" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">131f0c23da72b2def8c4f034a13f4c47bd3772abe4d8fc1b0828e8ef73af9d77</sum></package><package arch="x86_64" name="samba-common" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">b837587af8571ed17d6f1a1cc3ced2924225b0f64fc2f5ef0388f42f8f9aaf1b</sum></package><package arch="i686" name="libsmbclient" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-51.el6.i686.rpm</filename><sum type="sha256">67c3f47bb100258ea8f95f5e2d10aeb2e2debab02712eeaa5835835a580a8b14</sum></package><package arch="x86_64" name="samba-glusterfs" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">fba99f64d2873f69d9f782f33992cde203bc3416721c2b43f9e0666dc8a7db43</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">1de2643cb969998b355f2826e2684da595ba50e82779baacd2cc76db2b3f4cac</sum></package><package arch="x86_64" name="libsmbclient-devel" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">898871af1b1fa701077e33578a6a8068739e25ce62140bade1f52ee7467347c4</sum></package><package arch="x86_64" name="samba-swat" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">ad20f7c122b1308b6f361d604e18fa4c097b23a644d23d037128008b0b5c0286</sum></package><package arch="x86_64" name="samba-doc" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">7d5b8b7196b274f0316aa34cf3693023a69ab1866826de14a5cc00b8a356def3</sum></package><package arch="i686" name="samba-winbind-clients" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-51.el6.i686.rpm</filename><sum type="sha256">dfdb41aede3e4d11b49ccf2ab720152da659e2f3c4c077230466a4729decf721</sum></package><package arch="x86_64" name="samba-winbind-clients" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">225d5d96edbff089def73ebd0e2ab71482c471224385a0677ff2a4c8670b2a1d</sum></package><package arch="x86_64" name="samba-winbind" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">0b843aff3ddc055688f123495e4498968ffe8d07ad2fd35c9e768ccde1453759</sum></package><package arch="x86_64" name="libsmbclient" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">05efb00c3564ce8068ec5cb0e6e7ccc9c8f322cea2895142ef526e76248eb2cc</sum></package><package arch="x86_64" name="samba-winbind-devel" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">8d294a28b82730f6e686ac21e0fb874fb902b555d2b47cb4d10817f209735b5f</sum></package><package arch="i686" name="samba-winbind-devel" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-51.el6.i686.rpm</filename><sum type="sha256">e6bc473335acd0f7504939501ea8ee12219cc3114291da2dad44db70b03b663c</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-51.el6.x86_64.rpm</filename><sum type="sha256">61ec4d9fd6bc6c73994e8049f001878eee895660a66fc968d0aa0c86fccf6666</sum></package><package arch="i686" name="samba-common" release="51.el6" src="samba-3.6.23-51.el6.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-51.el6.i686.rpm</filename><sum type="sha256">d69ce3ed23a672d751699e73b4f6d41a0f062771a5622a5eee8bd989f7d20359</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" id="CVE-2017-2619" title="Samba: Symlink Race Permits Opening Files Outside Share Directory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" id="CVE-2018-1050" title="Samba: Null Pointer Indirection In Printer Server Process" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1860" id="RHSA-2018:1860-1" title="Rhsa-2018:1860-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413484" id="1413484" title="Unable To Connect Windows Server 2012 Servers To Samba-3.6.23-36 With Out Disabling Smb Signing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1431000" id="1431000" title="Winbind Core Dumps When Attempting To Login As A Disabled User In Ad" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1467395" id="1467395" title="Winbind Does Not Close Sockets And Eventually Hits Clients Limit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513877" id="1513877" title="Regression: Winbind Leaks Memory After Upgrade" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519884" id="1519884" title="Winbind Core Dumps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536053" id="1536053" title="Regression With Non-Wide Symlinks To Directories" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538771" id="1538771" title="Samba: Null Pointer Indirection In Printer Server Process" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1877-1</id><title>Sssd And Ding-Libs</title><description>The ding-libs packages contain a set of libraries used by the System Security Services Daemon (SSSD) as well as other projects, and provide functions to manipulate file system path names (libpath_utils), a hash table to manage storage and access time properties (libdhash), a data type to collect data in a hierarchical structure (libcollection), a dynamically growing, reference-counted array (libref_array), and a library to process configuration files in initialization format (INI) into a library collection data structure (libini_config). 
Security Fix(es): 
* sssd: unsanitized input when searching in local cache database (CVE-2017-12173)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libcollection-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-13.el6.x86_64.rpm</filename><sum type="sha256">b9e5e08db1bd9cefa113a107c4925d1310b81102306eb414b42577d612a9a0b5</sum></package><package arch="x86_64" name="sssd-ldap" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-ldap-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">28782fa83692c0a19265e3e0dd44f1aa51e5f23cc2b6c0ac27472e7655197919</sum></package><package arch="x86_64" name="libbasicobjects" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-13.el6.x86_64.rpm</filename><sum type="sha256">5eeecf2bf4e0fb52ce1790714d0a63a69701aaa4d46c430dfd5f4c96dab96149</sum></package><package arch="x86_64" name="libref_array" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.4"><filename>libref_array-0.1.4-13.el6.x86_64.rpm</filename><sum type="sha256">c09e06997fc2966267f7d8ff9332b51271715d515dc04458e23aa72b18cde524</sum></package><package arch="x86_64" name="python-sss" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>python-sss-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">9c47d08a657a99b31aefd37a01768e8d76569a940405dedb48943c716f261ed0</sum></package><package arch="x86_64" name="sssd-krb5" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-krb5-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">aa0290fe33e9cc6b8b4f7db56f6664df83d3fa7ad1c7068b63794988ef46e87e</sum></package><package arch="i686" name="libref_array" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.4"><filename>libref_array-0.1.4-13.el6.i686.rpm</filename><sum type="sha256">d71021432eb17e2ef574e7cb0590d839d20d79087658c114dbf8b7067cffa2b1</sum></package><package arch="x86_64" name="libdhash-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-13.el6.x86_64.rpm</filename><sum type="sha256">0853bf7863cf66958af5a2b8da405b5d7ffebd7b86679df8e774f3d4651b77e6</sum></package><package arch="noarch" name="python-sssdconfig" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>python-sssdconfig-1.13.3-60.el6.noarch.rpm</filename><sum type="sha256">79638968776b02d9dc79e64fb23da603d9bdc4c868d8f8d658c60d74d5171d36</sum></package><package arch="x86_64" name="libini_config" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="1.1.0"><filename>libini_config-1.1.0-13.el6.x86_64.rpm</filename><sum type="sha256">1f5fddb91ae76107c4fbecb80746e61a2f492cf930976400771cd5e1523d553a</sum></package><package arch="i686" name="libini_config" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="1.1.0"><filename>libini_config-1.1.0-13.el6.i686.rpm</filename><sum type="sha256">01cef74903ff483de6c4500b261f04a95713f0c0d2bfa1bc22703ba6c76c272e</sum></package><package arch="i686" name="libsss_idmap" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_idmap-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">cdc10f09e6f423127d9488075ff911ba1b5003d9df1e8f7a642220697257edf0</sum></package><package arch="i686" name="libcollection" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-13.el6.i686.rpm</filename><sum type="sha256">f08224d5daa0b4954a4859f875943889a12ce17510efd1106b452c3198a1cf2a</sum></package><package arch="x86_64" name="libini_config-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="1.1.0"><filename>libini_config-devel-1.1.0-13.el6.x86_64.rpm</filename><sum type="sha256">27f3b0a7c7b8c8a530973b46081698916d54577b7309a352d098c9ae39e06cde</sum></package><package arch="i686" name="sssd-common" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-common-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">b8eb00d6d2943e6fca6c9d1c5c280c2e2f187d877e602329e0aabdea3e7c4228</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libipa_hbac-devel-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">e8b65b3d4385e1e6159969d6979db9b3ef772781fd2622b0a73dee603731bd78</sum></package><package arch="x86_64" name="sssd-common-pac" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-common-pac-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">255c41c94d5aead4c4a736318bd66a1efeead83e9b11af0c7aec85b4b038f2d9</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_idmap-devel-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">d343059e80712ec3abb1bf5d9e3f3c7b06f102da1e3fa05232739e64bfb63c85</sum></package><package arch="x86_64" name="libsss_simpleifp" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">01fcaa0f8e3f496b969a79547236d181c4f52d9f98f7d62d5a462a47350aa0fe</sum></package><package arch="x86_64" name="sssd-tools" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-tools-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">7dae00cbcceff9d4c2c0623d8c3d07a9c44b25b9d02b787a80d4758212aa7a03</sum></package><package arch="i686" name="libsss_nss_idmap" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">c5f12552619f7f16738987ea98eec9f98950df9efbe6f3e1ef36638c647b6965</sum></package><package arch="x86_64" name="sssd-client" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-client-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">ba0615ef7074e1cc531abcc8f3cff19411e3e7747d5f79d9342660a1924cce1f</sum></package><package arch="i686" name="libini_config-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="1.1.0"><filename>libini_config-devel-1.1.0-13.el6.i686.rpm</filename><sum type="sha256">768cab28447cc0e6b09607f85bb9d3ec386b76cd70112a4a3df10495c8922323</sum></package><package arch="x86_64" name="libpath_utils" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-13.el6.x86_64.rpm</filename><sum type="sha256">b157a6e66bda75b439d424d9e481c607a97b3803a670e7c9759458307d7de96d</sum></package><package arch="x86_64" name="libipa_hbac" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libipa_hbac-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">04268c9f1ff7eb65c228a8530b96d74357717b517e192c18f15c4409d93c6223</sum></package><package arch="x86_64" name="sssd" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">0c61f96960cfb64e20f204a123e604d7618567801e8a901c1932c16abf3cfebd</sum></package><package arch="i686" name="libcollection-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-13.el6.i686.rpm</filename><sum type="sha256">50d721a6318f8d3f60d56700a2a7166d1ac3e3b96500ab77c09f3acc61fddec0</sum></package><package arch="x86_64" name="libref_array-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.4"><filename>libref_array-devel-0.1.4-13.el6.x86_64.rpm</filename><sum type="sha256">ff08e2b391c81ce15e1d530afb70577c75673b2a9ebbe71b381d30a4fa551648</sum></package><package arch="x86_64" name="libbasicobjects-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-13.el6.x86_64.rpm</filename><sum type="sha256">5278a4712846c29c32a57bbfeee32f76988a2ad7fa5a39b3ea8b64ec4d8bb34c</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>python-libsss_nss_idmap-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">3e6d5535e68a43464c262e11624e9691ed8d8706224c933eb4498a7c0514e3bf</sum></package><package arch="x86_64" name="libdhash" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-13.el6.x86_64.rpm</filename><sum type="sha256">6e3fb6ed1f41c6f8e6fb7b2b600e2ea6c176ae75661883cc046ccc53d05618f0</sum></package><package arch="x86_64" name="sssd-proxy" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-proxy-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">6659ec07175920701eaf89a2bff46d5be2c0129177cb190ffdafba9edebc291a</sum></package><package arch="x86_64" name="sssd-ad" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-ad-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">9008ddc9bbbb0689acabfe07c8832948a633dd2e8d2ee08a0713d22a6706ab7d</sum></package><package arch="x86_64" name="libsss_idmap" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_idmap-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">1d9d8afcdf9f365c2c79b36ac72f1e9483bf972d6585a8c0ef3f9e30a3638f00</sum></package><package arch="x86_64" name="python-libipa_hbac" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>python-libipa_hbac-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">5318752c43ed9e06aa47dd37257dd06e4398cac4e5c6d434c3c6cacb8b6fafdd</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-devel-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">516d9c664f1ab8b2bf02a3b00131f1e3d0d5a6cc8e1421b4675b88b5a591a440</sum></package><package arch="x86_64" name="sssd-common" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-common-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">b1485042d6b84caf12c8c764ee540c0ce4609262deea049dcaf04a04467089ab</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-devel-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">1b06ffd8e51a6d6b6c00bbdad484f42a575fb4195f23b191352f7527ee546c02</sum></package><package arch="i686" name="libbasicobjects-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-13.el6.i686.rpm</filename><sum type="sha256">5ebd0accaaac4bdb4152afb870fadac8d4f9c9f1a9bd7cffb5b9e0ff15903596</sum></package><package arch="x86_64" name="sssd-ipa" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-ipa-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">fad5dd9371c9ed5fedd68f9c5b659f2f007d4f6981ddefce1ffb46f60ee449c6</sum></package><package arch="x86_64" name="libpath_utils-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-13.el6.x86_64.rpm</filename><sum type="sha256">8c8e9cabdaf80fb83dae2b0b9c1e5c97d6be7857b4b4ae77e55d32e1c717eb73</sum></package><package arch="i686" name="libpath_utils" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-13.el6.i686.rpm</filename><sum type="sha256">72b48cfdcda7f1099ec1cc389bc25de0b447180d842933ead9c26fc0a9b45f92</sum></package><package arch="i686" name="libdhash-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-13.el6.i686.rpm</filename><sum type="sha256">af8bc0fad701bbf1c52b18aaabe7cb47ded7d5fb465b7a00921f15480b287413</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-devel-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">3606b9513e98189a575f0635e749688b1b558b9a475802531b359514c993442b</sum></package><package arch="x86_64" name="sssd-dbus" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-dbus-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">73a53f63186a2dd5f9ddb203032085608aee09fd1e94a321069f6c464d52234e</sum></package><package arch="i686" name="libbasicobjects" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-13.el6.i686.rpm</filename><sum type="sha256">fee246e907116b83200a9581793848a9fbfd868413c345e03bc491bd8dc7a060</sum></package><package arch="i686" name="libipa_hbac-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libipa_hbac-devel-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">e7addd4a7e53765d1a51539fc7cd2d74ab19a36567a892b16f1fcf86db60f701</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">2ab99e958512d2c308f6fa00917abeff08d82ed4526dd42c345563ee983b86a9</sum></package><package arch="x86_64" name="sssd-krb5-common" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-krb5-common-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">120cbec1a2512b25a764182d0be784f42a4b28c1a678bd3bb351e4341c50d8e6</sum></package><package arch="i686" name="libsss_idmap-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_idmap-devel-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">f5228b6ebacd741b0a3332e5342172611ebd46e86a40463548de537c6235919e</sum></package><package arch="x86_64" name="python-sss-murmur" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>python-sss-murmur-1.13.3-60.el6.x86_64.rpm</filename><sum type="sha256">73c7895406d3b455e8894d6cbc0c0b676f71cb90da80efa8929364f97c3bfa40</sum></package><package arch="i686" name="libipa_hbac" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libipa_hbac-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">b2ea9419477416c827a1455ddf43b38cfc856557241fe08e740f1831b3cdf329</sum></package><package arch="i686" name="libpath_utils-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-13.el6.i686.rpm</filename><sum type="sha256">4f1f22ca45e0cb670ff892f0404086918ffea02ccc4624b95845ed226af56d50</sum></package><package arch="x86_64" name="libcollection" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-13.el6.x86_64.rpm</filename><sum type="sha256">aa9fd47f04114c67d25260a9c2448c4a246cca0b726ee33cf5aab409dc7f6df9</sum></package><package arch="i686" name="libdhash" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-13.el6.i686.rpm</filename><sum type="sha256">ede915479152cf110a58d829c14cb9b91d3c575fedaba1bdbb9e5879ce17401b</sum></package><package arch="i686" name="libref_array-devel" release="13.el6" src="ding-libs-0.4.0-13.el6.src.rpm" version="0.1.4"><filename>libref_array-devel-0.1.4-13.el6.i686.rpm</filename><sum type="sha256">5aef64408024aee64de86cf459f7a6b18b054f90140844252116e5655fadb7e8</sum></package><package arch="i686" name="libsss_simpleifp" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">cd147312cd12904812e7bb40c1bbaf80efecb403675a55728b4b0a76171cfc26</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-devel-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">7f4e769c220302573f0da9d326735ed8442241035778e4f776191d782f9f2a31</sum></package><package arch="i686" name="sssd-client" release="60.el6" src="sssd-1.13.3-60.el6.src.rpm" version="1.13.3"><filename>sssd-client-1.13.3-60.el6.i686.rpm</filename><sum type="sha256">eff75ce817bc89f6867bc1a1f74e401a15b3bc9702b72e890ce9544d116df78f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12173" id="CVE-2017-12173" title="Sssd: Unsanitized Input When Searching In Local " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1877" id="RHSA-2018:1877-1" title="Rhsa-2018:1877-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401546" id="1401546" title="Please Back-Port Fast Failover From Sssd 1.14 On Rhel 7 Into Sssd 1.13 On Rhel 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438360" id="1438360" title="The Originalmemberof Attribute Disappears From The Cache, Causing Intermittent Hbac Issues" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1442703" id="1442703" title="Smart Cards: Certificate In The Id View" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487040" id="1487040" title="Sssd Does Not Evaluate Ad Upn Suffixes Which Results In Failed User Logins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1498173" id="1498173" title="Sssd: Unsanitized Input When Searching In Local " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1879-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: Buffer overflow in glob with GLOB_TILDE (CVE-2017-15670) 
* glibc: Buffer overflow during unescaping of user names with the ~ operator (CVE-2017-15804)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="nscd" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>nscd-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">2328b2e2e56ab345a0fc14235632e526e5c996bf00f65700e5bad35750749946</sum></package><package arch="x86_64" name="glibc-utils" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">9424078757046b1066373cbc8c7c3793af01ce8b0e8c82b141dc08c011412d98</sum></package><package arch="x86_64" name="glibc-common" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-common-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">8cbc6faf0fc0e8cac35827f1fbff2d6559625ff5ed319bc7ae20dfe93d2d5064</sum></package><package arch="x86_64" name="glibc" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">dd360d904c8415ec6950dbf57e8be5a42cb1e6c2d3adbeb6cc317cd5bbc614aa</sum></package><package arch="i686" name="glibc" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-2.12-1.212.el6.i686.rpm</filename><sum type="sha256">b3a917a07554eeecfdba21b178d1065641520d2344fe959531764f4dd7c6b212</sum></package><package arch="i686" name="glibc-static" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-static-2.12-1.212.el6.i686.rpm</filename><sum type="sha256">8ff061c5b0f08f533149e6b5865b3e4c757937bb2ca452cd5a442e1ff8ea746c</sum></package><package arch="x86_64" name="glibc-devel" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">cb1867aef5a8d08d8eadcb70c4813e3046b0c679cc3faa1091aea35ffb814e7a</sum></package><package arch="x86_64" name="glibc-static" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-static-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">02597aab5933bc6ae87de29115242bb0b9a9e1367bf48c33c9c159e9e931e900</sum></package><package arch="i686" name="glibc-devel" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.212.el6.i686.rpm</filename><sum type="sha256">ddce190c61321dd829b9ebd171d1c1da4ac0302162de96c44853ca793b48aaa7</sum></package><package arch="x86_64" name="glibc-headers" release="1.212.el6" src="glibc-2.12-1.212.el6.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.212.el6.x86_64.rpm</filename><sum type="sha256">9950c8bffb8b23bf4650712f1003344ba6464be1d9cad560f89c9c333b5b6d03</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" id="CVE-2017-15670" title="Glibc: Buffer Overflow In Glob With Glob_Tilde" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" id="CVE-2017-15804" title="Glibc: Buffer Overflow During Unescaping Of User Names With The ~ Operator" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1879" id="RHSA-2018:1879-1" title="Rhsa-2018:1879-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1437147" id="1437147" title="Fix For Thread Cancellation Of Idm Functions Incorrect In Rhel-6.9." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1504804" id="1504804" title="Glibc: Buffer Overflow In Glob With Glob_Tilde" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505298" id="1505298" title="Glibc: Buffer Overflow During Unescaping Of User Names With The ~ Operator" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1883-1</id><title>Samba4</title><description>Security Fix(es): 
* samba: Null pointer indirection in printer server process (CVE-2018-1050)</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba4-common" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-common-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">1bc5ba344373d71eb6054ff1c917cdd4cb397b6a1ee039a2c62e661bf1125325</sum></package><package arch="x86_64" name="samba4-winbind-krb5-locator" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-winbind-krb5-locator-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">07f9de467ed8c03080a09e2a80616d411210aa1bb3f0deb9ebf81bc86d3905f3</sum></package><package arch="x86_64" name="samba4-test" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-test-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">3a171a3e02e71b10ea9b69c5c05f66162a9f4ed4b9fcf280f928dcb97987cf86</sum></package><package arch="x86_64" name="samba4-dc" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-dc-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">8d9b6bf08d6198ec57c9a471c600a902a06fbd2f87ce4a32d005b6f4f65c8cfe</sum></package><package arch="x86_64" name="samba4-dc-libs" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-dc-libs-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">f2e6d1a2b950ba6dd090b28f35e89e47896f2defbc97feb9fd70b40ef2ead2c0</sum></package><package arch="x86_64" name="samba4" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">daa75130f0607b45310b77c7bfef8588c6c1dd0f9612ef408ff21f5dc150bf11</sum></package><package arch="x86_64" name="samba4-pidl" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-pidl-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">7bddb75130a140ff3ee43971c075e16dc0a8fdfc163fda2b716a0fee63f4ff99</sum></package><package arch="x86_64" name="samba4-winbind-clients" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-winbind-clients-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">e613ce912da16f91842d7180fd4a31b79a0f379773ba23cfcf4e9a5ea394c0b9</sum></package><package arch="x86_64" name="samba4-devel" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-devel-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">10425d9852e2d12759e46b48773b3444e3f438e431d645ae53362465d417dd7a</sum></package><package arch="x86_64" name="samba4-client" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-client-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">606c209994e0772467d78d56d4173f6e278737b7f829331b2dab9f3ce6bed881</sum></package><package arch="x86_64" name="samba4-winbind" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-winbind-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">10c65c2f0b2687f0f1d8b53318f1dd840e9b296ada55cf752dfdc7080ee2e557</sum></package><package arch="x86_64" name="samba4-libs" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-libs-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">178a7602d2884c60be56aa6fa96d3678ceaf3a39e4f475561eaa3250521b4e2d</sum></package><package arch="x86_64" name="samba4-python" release="15.el6" src="samba4-4.2.10-15.el6.src.rpm" version="4.2.10"><filename>samba4-python-4.2.10-15.el6.x86_64.rpm</filename><sum type="sha256">d74b1b25eebb43d9d3762513a8a4eb3323be49769ccbef517f41b68698660ca0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" id="CVE-2018-1050" title="Samba: Null Pointer Indirection In Printer Server Process" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1883" id="RHSA-2018:1883-1" title="Rhsa-2018:1883-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492780" id="1492780" title="Samba4: Recompile Without Bind_Now Due To Ifunc Relocation Issue On Ppc64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538771" id="1538771" title="Samba: Null Pointer Indirection In Printer Server Process" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1927-1</id><title>Pcs</title><description>Security Fix(es): 
* pcs: Debug parameter removal bypass, allowing information disclosure (CVE-2018-1086)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pcs" release="3.el6" src="pcs-0.9.155-3.el6.src.rpm" version="0.9.155"><filename>pcs-0.9.155-3.el6.x86_64.rpm</filename><sum type="sha256">74e181e6c1bb959bce50988a24c08f6fdbc0de1e591bdf53ded1eb651424c0e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086" id="CVE-2018-1086" title="Pcs: Debug Parameter Removal Bypass, Allowing Information Disclosure" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1927" id="RHSA-2018:1927-1" title="Rhsa-2018:1927-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557366" id="1557366" title="Pcs: Debug Parameter Removal Bypass, Allowing Information Disclosure" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1929-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: Resource exhaustion via qemuMonitorIORead() method (CVE-2018-5748) 
* libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent (CVE-2018-1064)</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-64.el6.x86_64.rpm</filename><sum type="sha256">0c7ee7b6208ff70e109af0cc5a7e27e054f312ec61dd558808ff52496f33c708</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-64.el6.x86_64.rpm</filename><sum type="sha256">f5a8aec0a0640e790e73c95fd81f1c16461e8d0fea1655c9bdfafc88fdfb33ed</sum></package><package arch="x86_64" name="libvirt-devel" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-64.el6.x86_64.rpm</filename><sum type="sha256">2384affaf55cbf0f10a2c4cef3e9dfbd7eaa096736a8494f23e205e1b155419f</sum></package><package arch="x86_64" name="libvirt-python" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-64.el6.x86_64.rpm</filename><sum type="sha256">d9660e5f1a601e73537dae027246767e915614b1fb632b77961ed141a7af00b1</sum></package><package arch="x86_64" name="libvirt-client" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-64.el6.x86_64.rpm</filename><sum type="sha256">b7e020bcc90058305dadf9a8fa3a1dfec9380cf8c746d87d9d32e61682800535</sum></package><package arch="i686" name="libvirt-devel" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-64.el6.i686.rpm</filename><sum type="sha256">267f287954964264c2736ab4d4b8a78f812c05af4b3cfe3ca374f230bb0e225c</sum></package><package arch="i686" name="libvirt-client" release="64.el6" src="libvirt-0.10.2-64.el6.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-64.el6.i686.rpm</filename><sum type="sha256">49866f2a628c34692feb0d8a43aad8ccb92aa31fdc5b296ffabc73e4afe3e63a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" id="CVE-2018-1064" title="Libvirt: Incomplete Fix For Cve-2018-5748 Triggered By Qemu Guest Agent" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" id="CVE-2018-5748" title="Libvirt: Resource Exhaustion Via Qemumonitorioread() Method" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1929" id="RHSA-2018:1929-1" title="Rhsa-2018:1929-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528396" id="1528396" title="Libvirt: Resource Exhaustion Via Qemumonitorioread() Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550672" id="1550672" title="Libvirt: Incomplete Fix For Cve-2018-5748 Triggered By Qemu Guest Agent" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1932-1</id><title>Zsh</title><description>Security Fix(es): 
* zsh: Stack-based buffer overflow in gen_matches_files() at compctl.c (CVE-2018-1083) 
* zsh: buffer overflow when scanning very long directory paths for symbolic links (CVE-2014-10072) 
* zsh: buffer overrun in symlinks (CVE-2017-18206) 
* zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution (CVE-2018-1100)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-07-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="zsh" release="8.el6" src="zsh-4.3.11-8.el6.src.rpm" version="4.3.11"><filename>zsh-4.3.11-8.el6.x86_64.rpm</filename><sum type="sha256">08f2ae804ba11d4e0bf5464bef376b3e5bea3fcdba1ea51e0f17d8d3d8af6b36</sum></package><package arch="x86_64" name="zsh-html" release="8.el6" src="zsh-4.3.11-8.el6.src.rpm" version="4.3.11"><filename>zsh-html-4.3.11-8.el6.x86_64.rpm</filename><sum type="sha256">f8c4919da4d0b9d82b3975713af2081a0d8fcb246e14a93e6d046b517f149c0c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10072" id="CVE-2014-10072" title="Zsh: Buffer Overflow When Scanning Very Long Directory Paths For Symbolic Links" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206" id="CVE-2017-18206" title="Zsh: Buffer Overrun In Symlinks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083" id="CVE-2018-1083" title="Zsh: Stack-Based Buffer Overflow In Gen_Matches_Files() At Compctl.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1100" id="CVE-2018-1100" title="Zsh: Buffer Overflow In Utils.C:Checkmailpath() Can Lead To Local Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1932" id="RHSA-2018:1932-1" title="Rhsa-2018:1932-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549836" id="1549836" title="Zsh: Buffer Overflow When Scanning Very Long Directory Paths For Symbolic Links" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549861" id="1549861" title="Zsh: Buffer Overrun In Symlinks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557382" id="1557382" title="Zsh: Stack-Based Buffer Overflow In Gen_Matches_Files() At Compctl.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563395" id="1563395" title="Zsh: Buffer Overflow In Utils.C:Checkmailpath() Can Lead To Local Arbitrary Code Execution" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2112-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.1.0 ESR. 
Many older firefox extensions must be updated to work with this new release. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) 
* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) 
* Mozilla: Use-after-free using focus() (CVE-2018-12360) 
* Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156) 
* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126) 
* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) 
* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) 
* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) 
* Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762) 
* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) 
* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-07-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="sl-indexhtml" release="10.sl6" src="sl-indexhtml-6-10.sl6.src.rpm" version="6"><filename>sl-indexhtml-6-10.sl6.noarch.rpm</filename><sum type="sha256">0f82668f4f3c98b676cee0160a8cc705afac62e804119a22f492639b351ae5e3</sum></package><package arch="i686" name="firefox" release="5.el6" src="firefox-60.1.0-5.el6.src.rpm" version="60.1.0"><filename>firefox-60.1.0-5.el6.i686.rpm</filename><sum type="sha256">52352fe1da4c80f585189ac6340a75ddc8cda3cb01ccc5767690c8d1f93604c4</sum></package><package arch="x86_64" name="firefox" release="5.el6" src="firefox-60.1.0-5.el6.src.rpm" version="60.1.0"><filename>firefox-60.1.0-5.el6.x86_64.rpm</filename><sum type="sha256">78b6cc1cd9de013f8ff351ff6bc096c58f402dfe233b8851ed4dd2ce28c448e4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7762" id="CVE-2017-7762" title="Mozilla: Address Bar Username And Password Spoofing In Reader Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" id="CVE-2018-12359" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" id="CVE-2018-12360" title="Mozilla: Use-After-Free Using Focus()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" id="CVE-2018-12362" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" id="CVE-2018-12363" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" id="CVE-2018-12364" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" id="CVE-2018-12365" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" id="CVE-2018-12366" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156" id="CVE-2018-5156" title="Mozilla: Media Recorder Segmentation Fault When Track Type Is Changed During Capture" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" id="CVE-2018-5188" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126" id="CVE-2018-6126" title="Chromium-Browser: Heap Buffer Overflow In Skia" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2112" id="RHSA-2018:2112-1" title="Rhsa-2018:2112-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584035" id="1584035" title="Chromium-Browser: Heap Buffer Overflow In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590493" id="1590493" title="Mozilla: Address Bar Username And Password Spoofing In Reader Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595024" id="1595024" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595025" id="1595025" title="Mozilla: Use-After-Free Using Focus()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595027" id="1595027" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595028" id="1595028" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595029" id="1595029" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595030" id="1595030" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595031" id="1595031" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595037" id="1595037" title="Mozilla: Media Recorder Segmentation Fault When Track Type Is Changed During Capture" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595040" id="1595040" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2162-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation. 
* QEMU: cirrus: OOB access when updating VGA display (CVE-2018-7858) 
* QEMU: vga: OOB read access during display update (CVE-2017-13672) 
* Qemu: Out-of-bounds read in vga_draw_text routine (CVE-2018-5683)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-07-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.1" src="qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.1.x86_64.rpm</filename><sum type="sha256">3a4cf3e149a747a4464dfe61cf9c34c853e0f2de95aa061e1ffa50c4d44e463f</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.1" src="qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.1.x86_64.rpm</filename><sum type="sha256">5ac367817427426407bab1603875f38fff238afb96cb33013c8f8367c35db3b7</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.1" src="qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.1.x86_64.rpm</filename><sum type="sha256">a97a2d1e366e7b920dba687a09b4e70646f56d163976d7a4b2eabe924931728e</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.1" src="qemu-kvm-0.12.1.2-2.506.el6_10.1.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.1.x86_64.rpm</filename><sum type="sha256">2c73126b7f633b62b2990d749ba449a7debbbe70c752051ca35c2aa0ce3ab360</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" id="CVE-2017-13672" title="Qemu: Vga: Oob Read Access During Display Update" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" id="CVE-2018-5683" title="Qemu: Out-Of-Bounds Read In Vga_Draw_Text Routine" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858" id="CVE-2018-7858" title="Qemu: Cirrus: Oob Access When Updating Vga Display" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2162" id="RHSA-2018:2162-1" title="Rhsa-2018:2162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486560" id="1486560" title="Qemu: Vga: Oob Read Access During Display Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530356" id="1530356" title="Qemu: Out-Of-Bounds Read In Vga_Draw_Text Routine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553402" id="1553402" title="Qemu: Cirrus: Oob Access When Updating Vga Display" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2164-1</id><title>Kernel</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD) 
* kernel: Use-after-free vulnerability in mm/mempolicy.c:do_get_mempolicy function allows local denial of service or other unspecified impact (CVE-2018-10675) 
* Kernel: FPU state information leakage via lazy FPU restore (CVE-2018-3665) 
* kernel: error in exception handling leads to DoS (CVE-2018-8897 regression) (CVE-2018-10872) 
Bug Fix(es): 
* Previously, microcode updates on 32 and 64-bit AMD and Intel architectures were not synchronized. As a consequence, it was not possible to apply the microcode updates. This fix adds the synchronization to the microcode updates so that processors of the stated architectures receive updates at the same time. As a result, microcode updates are now synchronized.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-07-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.2.1.el6.noarch.rpm</filename><sum type="sha256">fdc54d149663e61aca9ddf3d71cc911c62f56856622efa647788d5344231de07</sum></package><package arch="x86_64" name="perf" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">5af6b973ee645f37c07f71e09498f736b940d458a214646e3571b710fceb66d9</sum></package><package arch="x86_64" name="kernel" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">2b3f8fa1f5defa180886a9c1cba2a251fe84d003932a19390117b7003928d6f1</sum></package><package arch="i686" name="kernel-debug-devel" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.2.1.el6.i686.rpm</filename><sum type="sha256">821b5d489d85af46b0385712904182a1012cdf892b079e77767c5c74150ea5ad</sum></package><package arch="x86_64" name="kernel-devel" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">f1bb4a841cf0ea4424ca109ef3b5ada0ddddaea6261ce443b87d5d8f2ee513c8</sum></package><package arch="x86_64" name="python-perf" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">7360a07e71cde6680c4791414e5412f84d768c800e2c9f4fd25fabf89dd85d0e</sum></package><package arch="x86_64" name="kernel-headers" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">8610ae061af63510629e221d5847c08b65af95076d0f41ea851f7e064e24f046</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">9b96e28ef090e38151db7cab0aaec62a52d5037665bfc99727935f999c1588af</sum></package><package arch="noarch" name="kernel-doc" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.2.1.el6.noarch.rpm</filename><sum type="sha256">e29f995b78509d2d04f34728442ebb8c7ba9dc1f6a99b3c35086f2039082b75f</sum></package><package arch="x86_64" name="kernel-debug" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.2.1.el6.x86_64.rpm</filename><sum type="sha256">21ae885152f3e1b27d3a4e544b7232681e609b51da7679af4952314de30ac3c2</sum></package><package arch="noarch" name="kernel-firmware" release="754.2.1.el6" src="kernel-2.6.32-754.2.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.2.1.el6.noarch.rpm</filename><sum type="sha256">6f98f13f8960365ad13a81c46a408d7c40089e966c557c0ee8261ca2b27356e5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10675" id="CVE-2018-10675" title="Kernel: Use-After-Free Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10872" id="CVE-2018-10872" title="Kernel: Error In Exception Handling Leads To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" id="CVE-2018-3665" title="Kernel: Fpu State Information Leakage Via Lazy Fpu Restore" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2164" id="RHSA-2018:2164-1" title="Rhsa-2018:2164-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575065" id="1575065" title="Kernel: Use-After-Free Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585011" id="1585011" title="Kernel: Fpu State Information Leakage Via Lazy Fpu Restore" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596094" id="1596094" title="Kernel: Error In Exception Handling Leads To " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2180-1</id><title>Gnupg2</title><description>Security Fix(es): 
* gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification (CVE-2018-12020)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-07-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="gnupg2-smime" release="9.el6_10" src="gnupg2-2.0.14-9.el6_10.src.rpm" version="2.0.14"><filename>gnupg2-smime-2.0.14-9.el6_10.x86_64.rpm</filename><sum type="sha256">33ad34ad370f24a36ad9b5bfcaaad85e800bbc5fb0613a1ae40e7805f6eca2d5</sum></package><package arch="x86_64" name="gnupg2" release="9.el6_10" src="gnupg2-2.0.14-9.el6_10.src.rpm" version="2.0.14"><filename>gnupg2-2.0.14-9.el6_10.x86_64.rpm</filename><sum type="sha256">aa359b0609cc8ca4efe000156ee36f83cd543eb2aee1b6cce359450627eb736f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" id="CVE-2018-12020" title="Gnupg2: Improper Sanitization Of Filenames " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2180" id="RHSA-2018:2180-1" title="Rhsa-2018:2180-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589620" id="1589620" title="Gnupg2: Improper Sanitization Of Filenames " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2241-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-07-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-debug-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">537ec6960444885662b16b7e2f1c67f366a77ccc26f4f0b95dec188ef01827ee</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">304007f8b36b0cb9ff426080dee80fbf94712a093cd81ca25b9d04b63dcfbdf0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">c4175f77615227e44bc4db494cff16abefc1025a02bdfb4edbe94321e75fcde3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-demo-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">715e67847fb90b59857d555516fef7872f519d2a8eadd64896f8e03d817be4ac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">5b7a7af03c3969c262a11502c69c38649ac6e3e4fcd0e5fdf4a99f6ee3fb53b8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-src-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">895f6af65922cbcf542a0e3bc16a2c0672fcd7e7cb7e1802f1f4c3c28cdb4b99</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">67877dbb6a0ef9e45e4c99cb4b825e23a9209433df0e53442112840a9a75b5c2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-headless-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">f4b9ec708d180cbee338bfa1bdfc7cbb5d6716ae85a8a1fd0f7990f966b06d50</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.181-3.b13.el6_10.noarch.rpm</filename><sum type="sha256">2691bd4f9a84b729590e87d8b2c30540cefefd7b7e41908a4abb1b2c9b2a5702</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">78f95416d6c5f0adb9b758404f9762400a5ac627952ca3715512743c3f4ad51c</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-javadoc-1.8.0.181-3.b13.el6_10.noarch.rpm</filename><sum type="sha256">62b560057b715e4ce12cf994734a899432bbc8cfc32a1f9f015c2c7777c38ad9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b13.el6_10" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-1.8.0.181-3.b13.el6_10.x86_64.rpm</filename><sum type="sha256">237fba255dea7de8fd25c51a911f388b64ddb28e8ffb7fd7b4a4033491f5429c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" id="CVE-2018-2952" title="Openjdk: Insufficient Index Validation In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2241" id="RHSA-2018:2241-1" title="Rhsa-2018:2241-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600925" id="1600925" title="Openjdk: Insufficient Index Validation In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2251-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.9.1. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) 
* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) 
* Mozilla: Use-after-free using focus() (CVE-2018-12360) 
* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) 
* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) 
* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) 
* thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails (CVE-2018-12372) 
* thunderbird: S/MIME plaintext can be leaked through HTML reply/forward (CVE-2018-12373) 
* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) 
* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366) 
* thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field (CVE-2018-12374)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-07-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6" src="thunderbird-52.9.1-1.el6.src.rpm" version="52.9.1"><filename>thunderbird-52.9.1-1.el6.x86_64.rpm</filename><sum type="sha256">e2046c829910549880bc2b05d25453f23186c9f3ddef01110f96014d3b98536e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" id="CVE-2018-12359" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" id="CVE-2018-12360" title="Mozilla: Use-After-Free Using Focus()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" id="CVE-2018-12362" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" id="CVE-2018-12363" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" id="CVE-2018-12364" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" id="CVE-2018-12365" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" id="CVE-2018-12366" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372" id="CVE-2018-12372" title="Thunderbird: S/Mime And Pgp Decryption Oracles " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373" id="CVE-2018-12373" title="Thunderbird: S/Mime Plaintext Can Be Leaked " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374" id="CVE-2018-12374" title="Thunderbird: Using Form To Exfiltrate Encrypted " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" id="CVE-2018-5188" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2251" id="RHSA-2018:2251-1" title="Rhsa-2018:2251-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595024" id="1595024" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595025" id="1595025" title="Mozilla: Use-After-Free Using Focus()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595027" id="1595027" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595028" id="1595028" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595029" id="1595029" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595030" id="1595030" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595031" id="1595031" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595040" id="1595040" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598529" id="1598529" title="Thunderbird: S/Mime Plaintext Can Be Leaked " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598538" id="1598538" title="Thunderbird: S/Mime And Pgp Decryption Oracles " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598543" id="1598543" title="Thunderbird: Using Form To Exfiltrate Encrypted " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2283-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-08-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.15.4.el6_10" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el6_10.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-src-1.7.0.191-2.6.15.4.el6_10.x86_64.rpm</filename><sum type="sha256">04fe87af0fb65b2125472f2d3d87adea5d8a4c4e73411925cc41ccaa8f4442a7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.15.4.el6_10" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el6_10.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el6_10.x86_64.rpm</filename><sum type="sha256">d31014b96830853291293a6c81f2f03a5b0e31d49aea392d2abbb3f16be48f2b</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.15.4.el6_10" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el6_10.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-demo-1.7.0.191-2.6.15.4.el6_10.x86_64.rpm</filename><sum type="sha256">277900ba0706f072b7dbf4cff360d60447164a33bca673a78a6fc0989cf657b9</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.15.4.el6_10" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el6_10.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-javadoc-1.7.0.191-2.6.15.4.el6_10.noarch.rpm</filename><sum type="sha256">1413de66858fffd7be69dd4f496177c1ee21b8875cc20df1bcf3a99c75a5c83a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.15.4.el6_10" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el6_10.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-devel-1.7.0.191-2.6.15.4.el6_10.x86_64.rpm</filename><sum type="sha256">0184f001f089e3fa8ddaceb92a0187789d704988fcb6b5d221ee34955eb28b25</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" id="CVE-2018-2952" title="Openjdk: Insufficient Index Validation In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2283" id="RHSA-2018:2283-1" title="Rhsa-2018:2283-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600925" id="1600925" title="Openjdk: Insufficient Index Validation In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2284-1</id><title>Yum-Utils</title><description>Security Fix(es): 
* yum-utils: reposync: improper path validation may lead to directory traversal (CVE-2018-10897)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-08-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="yum-plugin-show-leaves" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-show-leaves-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">4d6e9b1612c1a8a46b4024fdcd055cd17c3f6b727989bdaadac1a36a3c877845</sum></package><package arch="noarch" name="yum-plugin-rpm-warm-cache" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-rpm-warm-cache-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">204c3746eeb040ef109e09b076d07100c42f458a7297faed226effda8e9b441f</sum></package><package arch="noarch" name="yum-plugin-tmprepo" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-tmprepo-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">e99f7e126faa01a980cada21f07895e5bd5d33784469e6fe9cd34bbd9cd932e3</sum></package><package arch="noarch" name="yum-plugin-verify" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-verify-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">3594f07f96de23e75358d99dbed6b8ca651c3a2b17e263b177713874665ca69a</sum></package><package arch="noarch" name="yum-utils" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-utils-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">18964c5dd295e7517a568d1ace3e4b04e9ce7fbb6edff47875a516137ed1017f</sum></package><package arch="noarch" name="yum-plugin-post-transaction-actions" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-post-transaction-actions-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">0021690dfd14c3f7467073e75a1f3a819e7096facd6e31d52bfc3745e91461fd</sum></package><package arch="noarch" name="yum-plugin-list-data" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-list-data-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">adc02f3944c0b94cd4d6aae3317cb6bc768e57377b127c3e925946c1e4e8025d</sum></package><package arch="noarch" name="yum-plugin-fastestmirror" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-fastestmirror-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">6035740076674b34195a8a0b8541cf3d6a8d05bd3f3b091cbe5558d753c6041d</sum></package><package arch="noarch" name="yum-plugin-aliases" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-aliases-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">23c0431eb9c10d6232b1a1d403ef164c46e86591565c6d0bc69f07178dccb3f4</sum></package><package arch="noarch" name="yum-plugin-ovl" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-ovl-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">945e680bb51d2c9613a3fa5917bc23de86a5185b24ca1d192440577f7244aa0e</sum></package><package arch="noarch" name="yum-plugin-tsflags" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-tsflags-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">d88ad93aa065d7d0801b05d47667a6480a02b8150babb245d2d81276aeea1bf1</sum></package><package arch="noarch" name="yum-updateonboot" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-updateonboot-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">744439503c7cdd6fabcba5c8b3659c211493fcdc37200d43a378eeb7da68511a</sum></package><package arch="noarch" name="yum-plugin-priorities" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-priorities-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">837d4a10ca94d64886123262f0b7f7d434ea42119c1203b2df0f8067ac0b81d6</sum></package><package arch="noarch" name="yum-plugin-remove-with-leaves" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-remove-with-leaves-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">8445db17196626778735605a35ad2feaead7a76acef3f5d118bae40fde566dce</sum></package><package arch="noarch" name="yum-plugin-fs-snapshot" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-fs-snapshot-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">ca64823750caeae7b80c25c339523a3cea8884fadb895d717888be1ef731bde9</sum></package><package arch="noarch" name="yum-NetworkManager-dispatcher" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-NetworkManager-dispatcher-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">ab14ca9d1d021286724d0690feb09a42d10824510d27e1c3b9956189739b8f37</sum></package><package arch="noarch" name="yum-plugin-security" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-security-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">536069961e8b456087d562ee5cd1ce95b948bd2194e8e27ee9b41a109941eb60</sum></package><package arch="noarch" name="yum-plugin-protectbase" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-protectbase-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">840a8471f6157337b1eb3d5263f5c4723b189f56cdac886d5077775ba2b1dc76</sum></package><package arch="noarch" name="yum-plugin-auto-update-debug-info" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-auto-update-debug-info-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">461825b165262e31b7ac3cc738089bdf3b722fbea899e1350232cebb4fbea934</sum></package><package arch="noarch" name="yum-plugin-local" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-local-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">5438236b802e01a19009fc09e8fca032e8c18fbabfd5ec531e95f844360fc301</sum></package><package arch="noarch" name="yum-plugin-changelog" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-changelog-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">88bdf6618ba1041b898fafd1a92a23dada85a1f912e211ac81f9ea983f2281f7</sum></package><package arch="noarch" name="yum-plugin-versionlock" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-versionlock-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">d5c89381cb35629175ca08ae3d9967109f67d8ace618a63da20448aef577245e</sum></package><package arch="noarch" name="yum-plugin-merge-conf" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-merge-conf-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">7df9ba9a494a6fe20519be5845cbd5d60d05276737171caaa1a95a92a50a360c</sum></package><package arch="noarch" name="yum-plugin-upgrade-helper" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-upgrade-helper-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">14eb4dcd3bfe045e929c6a10d1540acc1857b5c1bed834079683d13d021770c5</sum></package><package arch="noarch" name="yum-plugin-ps" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-ps-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">384f6815b3d7299017f9fcf07a7a6a96ffb18e66d414385548fc808342e0a472</sum></package><package arch="noarch" name="yum-plugin-filter-data" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-filter-data-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">20b47fc4d9cde1c35fdd3555b7cd4737fa865e9ad0f4edeb53a391c083c31f39</sum></package><package arch="noarch" name="yum-plugin-keys" release="42.el6_10" src="yum-utils-1.1.30-42.el6_10.src.rpm" version="1.1.30"><filename>yum-plugin-keys-1.1.30-42.el6_10.noarch.rpm</filename><sum type="sha256">76b09d70a6e94ca3d894d2f8c4c97eee95fe118df28fd9a5f9d0598c593ddb9d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10897" id="CVE-2018-10897" title="Yum-Utils: Reposync: Improper Path Validation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2284" id="RHSA-2018:2284-1" title="Rhsa-2018:2284-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600221" id="1600221" title="Yum-Utils: Reposync: Improper Path Validation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2308-1</id><title>Openslp</title><description>Security Fix(es): 
* openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution (CVE-2017-17833)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-08-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="1" name="openslp" release="3.el6" src="openslp-2.0.0-3.el6.src.rpm" version="2.0.0"><filename>openslp-2.0.0-3.el6.i686.rpm</filename><sum type="sha256">1e9cc6032c5455e42fb331cee2d74c8c458b74194292f926bb5baf6173c15181</sum></package><package arch="x86_64" epoch="1" name="openslp-server" release="3.el6" src="openslp-2.0.0-3.el6.src.rpm" version="2.0.0"><filename>openslp-server-2.0.0-3.el6.x86_64.rpm</filename><sum type="sha256">9c7007f3bd14abe5eb6a75348a03221ac5d23a8b6fd7178ad236f2e2b8fcc1b8</sum></package><package arch="i686" epoch="1" name="openslp-devel" release="3.el6" src="openslp-2.0.0-3.el6.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-3.el6.i686.rpm</filename><sum type="sha256">cad2281b0054d0180d87e9187643325f0bd1bc8e5695dbb1281f25c01049dea2</sum></package><package arch="x86_64" epoch="1" name="openslp-devel" release="3.el6" src="openslp-2.0.0-3.el6.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-3.el6.x86_64.rpm</filename><sum type="sha256">bef068007850f78d595a7a228fef89016e9f0e7d58d1ea0d270506408365c15a</sum></package><package arch="x86_64" epoch="1" name="openslp" release="3.el6" src="openslp-2.0.0-3.el6.src.rpm" version="2.0.0"><filename>openslp-2.0.0-3.el6.x86_64.rpm</filename><sum type="sha256">039f6d295b3f3f493ef618f73437ff3783eb647ae5ef5c754f71133d19cb9836</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" id="CVE-2017-17833" title="Openslp: Heap Memory Corruption In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17833" id="CVE-2018-17833" title="Openslp: Heap Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2308" id="RHSA-2018:2308-1" title="Rhsa-2018:2308-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1572116" id="1572116" title="Openslp: Heap Memory Corruption" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2390-1</id><title>Kernel</title><description>Security Fix(es): 
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side- channel attacks. (CVE-2018-3693) 
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901) 
* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) 
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265) 
* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566) 
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004) 
Bug Fix(es): 
* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-08-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">4c2d90b5c62123121c28c88eae5c8c9533d7789cf0c3b9919eb11ed492c0816a</sum></package><package arch="noarch" name="kernel-doc" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.3.5.el6.noarch.rpm</filename><sum type="sha256">2d1d37b8b04c2b61f0c281324a1443f485fb142c57e294571ba002db7dc579e2</sum></package><package arch="x86_64" name="python-perf" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">925f9ed690fad6eca53ebf7116a50f93e0905186e68ae05dd7dfe6158471b7bd</sum></package><package arch="x86_64" name="kernel-devel" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">539b998a2f7e7fa4ea0200fa101c635aabb8b285b269cfe4d01b11337e30d90a</sum></package><package arch="x86_64" name="kernel-headers" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">4bc4cd93aea722c8864ed151f62d57779a2abfef021dd56290402d4b7cf9598f</sum></package><package arch="x86_64" name="kernel" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">0f29163741889d87f463e528f951816afd8241c9f6737fa99a323169e66a8437</sum></package><package arch="noarch" name="kernel-firmware" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.3.5.el6.noarch.rpm</filename><sum type="sha256">ea0a5bf9299f4878da671349438e1e1bcc90eeb8e49a93994345b5e7a9add988</sum></package><package arch="i686" name="kernel-debug-devel" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.3.5.el6.i686.rpm</filename><sum type="sha256">2645c0d03833a757032aaed00226b95613411d8e48bfb9ec0b169afde88e85e3</sum></package><package arch="x86_64" name="kernel-debug" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">cb3356bb0be1ce7e4329b5e7ef3093d6b710866286d4f3a4bbf8418b3f434861</sum></package><package arch="x86_64" name="perf" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.3.5.el6.x86_64.rpm</filename><sum type="sha256">af7e3d794268e9d5d0ff99d938ef17ea79bf1004cff5a2252bceca1621a98c59</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.3.5.el6" src="kernel-2.6.32-754.3.5.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.3.5.el6.noarch.rpm</filename><sum type="sha256">3caaa45863cdd17ad054c15fe8bd32c7b1dae1a82bb3f7c7e95ec8ebc61b5e07</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" id="CVE-2017-0861" title="Kernel: Use-After-Free In Snd_Pcm_Info Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" id="CVE-2017-15265" title="Kernel: Use-After-Free In Snd_Seq_Ioctl_Create_Port()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" id="CVE-2018-1000004" title="Kernel: Race Condition In Sound System Can Lead To Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10901" id="CVE-2018-10901" title="Kernel: Kvm: Vmx: Host Gdt Limit Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" id="CVE-2018-3646" title="Kernel: Hw: Cpu: L1 Terminal Fault (L1Tf)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3693" id="CVE-2018-3693" title="Kernel: Speculative Bounds Check Bypass Store" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" id="CVE-2018-7566" title="Kernel: Race Condition In Snd_Seq_Write() May " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2390" id="RHSA-2018:2390-1" title="Rhsa-2018:2390-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501878" id="1501878" title="Kernel: Use-After-Free In Snd_Seq_Ioctl_Create_Port()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535315" id="1535315" title="Kernel: Race Condition In Sound System Can Lead To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550142" id="1550142" title="Kernel: Race Condition In Snd_Seq_Write() May " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563994" id="1563994" title="Kernel: Use-After-Free In Snd_Pcm_Info Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581650" id="1581650" title="Kernel: Speculative Bounds Check Bypass Store" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585005" id="1585005" title="Kernel: Hw: Cpu: L1 Terminal Fault (L1Tf)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601849" id="1601849" title="Kernel: Kvm: Vmx: Host Gdt Limit Corruption" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2526-1</id><title>Mutt</title><description>Security Fix(es): 
* mutt: Remote code injection vulnerability to an IMAP mailbox (CVE-2018-14354) 
* mutt: Remote Code Execution via backquote characters (CVE-2018-14357) 
* mutt: POP body caching path traversal vulnerability (CVE-2018-14362)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-08-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="5" name="mutt" release="9.20091214hg736b6a.el6" src="mutt-1.5.20-9.20091214hg736b6a.el6.src.rpm" version="1.5.20"><filename>mutt-1.5.20-9.20091214hg736b6a.el6.x86_64.rpm</filename><sum type="sha256">fa902145c18aefb81117cbf466f54bd9079a539fbd92da11cdab0840c868516a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354" id="CVE-2018-14354" title="Mutt: Remote Code Injection Vulnerability To An " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357" id="CVE-2018-14357" title="Mutt: Remote Code Execution Via Backquote " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362" id="CVE-2018-14362" title="Mutt: Pop Body Caching Path Traversal Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2526" id="RHSA-2018:2526-1" title="Rhsa-2018:2526-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602069" id="1602069" title="Mutt: Remote Code Injection Vulnerability To An " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602079" id="1602079" title="Mutt: Pop Body Caching Path Traversal Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602915" id="1602915" title="Mutt: Remote Code Execution Via Backquote " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2571-1</id><title>Bind</title><description>Security Fix(es): 
* bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service (CVE-2018-5740)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-09-04 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-sdb" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.68.rc1.el6_10.1.x86_64.rpm</filename><sum type="sha256">d0d0b46f15278e4c5a7b85763a9068b5b7ebcc185c4f37dd0de6ca376c59cc95</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.68.rc1.el6_10.1.x86_64.rpm</filename><sum type="sha256">30d6f78ef1a742d40bd973ebe4e4c974dae0f7c08d3fe91287ce50d042a67157</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.1.x86_64.rpm</filename><sum type="sha256">e2ab23a24ad97f1b2b9c668eb029f429612ed3ac89103d7e0aa511abc918e862</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.1.x86_64.rpm</filename><sum type="sha256">2c0234bf1d22cd721f1ad4972f38767c736e95ed031d3f2b0de0b4122e95387a</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.68.rc1.el6_10.1.x86_64.rpm</filename><sum type="sha256">ceee9f4b1da65dfc49721f936064f1681ccf5edcd106a612f14ea7b44986ca81</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.1.i686.rpm</filename><sum type="sha256">20c898d58c1d3548fe3fc6e1401e5d3ed4354f0cbf1f8870afd6320fa8764562</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.1.i686.rpm</filename><sum type="sha256">8ce80c47c82c6fce7ca1492c1d901606ed4384cfc5a4e446e86ab5d2c4a60c55</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.68.rc1.el6_10.1" src="bind-9.8.2-0.68.rc1.el6_10.1.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.68.rc1.el6_10.1.x86_64.rpm</filename><sum type="sha256">ca4535e8a75afed686936359e558abcb55c25dff9411d964ece5fa4a70690f2f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" id="CVE-2018-5740" title="Bind: Processing Of Certain Records When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2571" id="RHSA-2018:2571-1" title="Rhsa-2018:2571-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613595" id="1613595" title="Bind: Processing Of Certain Records When " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2693-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.2.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376) 
* Mozilla: Use-after-free in driver timers (CVE-2018-12377) 
* Mozilla: Use-after-free in IndexedDB (CVE-2018-12378) 
* Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541) 
* Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-09-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6" src="firefox-60.2.0-1.el6.src.rpm" version="60.2.0"><filename>firefox-60.2.0-1.el6.i686.rpm</filename><sum type="sha256">fc7e928e9c453e79c09e798b2caac48e04658f30ce9e92dbf677d37f223b5b1f</sum></package><package arch="x86_64" name="firefox" release="1.el6" src="firefox-60.2.0-1.el6.src.rpm" version="60.2.0"><filename>firefox-60.2.0-1.el6.x86_64.rpm</filename><sum type="sha256">2a0886d149b8957bd7e551786054e11ade817c7e9598bf13941396a11e25499d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" id="CVE-2017-16541" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" id="CVE-2018-12376" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" id="CVE-2018-12377" title="Mozilla: Use-After-Free In Driver Timers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" id="CVE-2018-12378" title="Mozilla: Use-After-Free In Indexeddb" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" id="CVE-2018-12379" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2693" id="RHSA-2018:2693-1" title="Rhsa-2018:2693-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510816" id="1510816" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625525" id="1625525" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625526" id="1625526" title="Mozilla: Use-After-Free In Driver Timers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625527" id="1625527" title="Mozilla: Use-After-Free In Indexeddb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625528" id="1625528" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2732-1</id><title>Spice-Gtk And Spice-Server</title><description>The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. 
Security Fix(es): 
* spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service (CVE-2018-10873) 
This issue was discovered by Frediano Ziglio (Red Hat).</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-09-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="16.el6_10.1" src="spice-server-0.12.4-16.el6_10.1.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-16.el6_10.1.x86_64.rpm</filename><sum type="sha256">601dda98ecea4aea380323be6fad5e1abfd3c779d04a2ab63ab69613d3826b74</sum></package><package arch="i686" name="spice-gtk" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-gtk-0.26-8.el6_10.1.i686.rpm</filename><sum type="sha256">f498ddff72f578e1f08d7f17a2920c61e628788b155890025e873091d083dbc4</sum></package><package arch="i686" name="spice-glib" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-glib-0.26-8.el6_10.1.i686.rpm</filename><sum type="sha256">11d26abf0cf2fb5589e1ee5a6a30d906ddfb559245e27792ac88a0f2852f7b7c</sum></package><package arch="x86_64" name="spice-gtk-tools" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-gtk-tools-0.26-8.el6_10.1.x86_64.rpm</filename><sum type="sha256">f06c93303d063e4e81215887e94d7d401b248f06cb5231848f67fe51cd5c64e3</sum></package><package arch="i686" name="spice-gtk-devel" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-gtk-devel-0.26-8.el6_10.1.i686.rpm</filename><sum type="sha256">25694d9d13130b79f690f404deb9fdcedf976d0fea0735640398901b93ad8055</sum></package><package arch="x86_64" name="spice-gtk-python" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-gtk-python-0.26-8.el6_10.1.x86_64.rpm</filename><sum type="sha256">79cc4b09520c1f8f0b84a7a4deee12f25988c588c488e5bc6b2236763dbfdfe7</sum></package><package arch="x86_64" name="spice-glib-devel" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-glib-devel-0.26-8.el6_10.1.x86_64.rpm</filename><sum type="sha256">df26d91344b0eba6efbe9649edb5344b29ae21cc477d36ec1f099062c36c13c4</sum></package><package arch="i686" name="spice-glib-devel" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-glib-devel-0.26-8.el6_10.1.i686.rpm</filename><sum type="sha256">d4c82853d9281db4f2e00e222c7ca23abe1d6f6ddee41ebc8b7280fa40ec3f10</sum></package><package arch="x86_64" name="spice-gtk-devel" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-gtk-devel-0.26-8.el6_10.1.x86_64.rpm</filename><sum type="sha256">0fa235912aaf80c86071776519540710d4db1402fe402e31e7f10f291de846ff</sum></package><package arch="x86_64" name="spice-glib" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-glib-0.26-8.el6_10.1.x86_64.rpm</filename><sum type="sha256">5d967d41a6c33a0cf93c14aa02240619296b6ddf9ef9238263926d3aaba9182d</sum></package><package arch="x86_64" name="spice-gtk" release="8.el6_10.1" src="spice-gtk-0.26-8.el6_10.1.src.rpm" version="0.26"><filename>spice-gtk-0.26-8.el6_10.1.x86_64.rpm</filename><sum type="sha256">56c2e74eeb3a989df472eb0d6bb1a606558a616532911b485070b429b88158e7</sum></package><package arch="x86_64" name="spice-server" release="16.el6_10.1" src="spice-server-0.12.4-16.el6_10.1.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-16.el6_10.1.x86_64.rpm</filename><sum type="sha256">5434ce66a5077483c9c0a7dc783724c61ecff9d6eeac821a9e06215235a41116</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873" id="CVE-2018-10873" title="Spice: Missing Check In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2732" id="RHSA-2018:2732-1" title="Rhsa-2018:2732-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596008" id="1596008" title="Spice: Missing Check In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2737-1</id><title>Mod_Perl</title><description>Security Fix(es): 
* mod_perl: arbitrary Perl code execution in the context of the user account via a user-owned .htaccess (CVE-2011-2767)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-10-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mod_perl-devel" release="12.el6_10" src="mod_perl-2.0.4-12.el6_10.src.rpm" version="2.0.4"><filename>mod_perl-devel-2.0.4-12.el6_10.x86_64.rpm</filename><sum type="sha256">fa2b8d0025a777ad7ed6fd285d84e7d209f388064fb27fd26e7515e2231fd0b1</sum></package><package arch="i686" name="mod_perl-devel" release="12.el6_10" src="mod_perl-2.0.4-12.el6_10.src.rpm" version="2.0.4"><filename>mod_perl-devel-2.0.4-12.el6_10.i686.rpm</filename><sum type="sha256">998c1f690955ed5f658eff6d8d2da9c4b49b1684ca58a4096641a1bd30c920e7</sum></package><package arch="x86_64" name="mod_perl" release="12.el6_10" src="mod_perl-2.0.4-12.el6_10.src.rpm" version="2.0.4"><filename>mod_perl-2.0.4-12.el6_10.x86_64.rpm</filename><sum type="sha256">dca1577c553e85b47bffbd728b4592bea2845aca8667d3d21b5d065ac4f6f685</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2767" id="CVE-2011-2767" title="Mod_Perl: Arbitrary Perl Code Execution In The " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2737" id="RHSA-2018:2737-1" title="Rhsa-2018:2737-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623265" id="1623265" title="Mod_Perl: Arbitrary Perl Code Execution In The " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2834-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.2.1 ESR. 
Security Fix(es): 
* Mozilla: Crash in TransportSecurityInfo due to cached data (CVE-2018-12385) 
* Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords (CVE-2018-12383)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-10-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6" src="firefox-60.2.1-1.el6.src.rpm" version="60.2.1"><filename>firefox-60.2.1-1.el6.i686.rpm</filename><sum type="sha256">5a70c501ef2c715ba42dfd476980bd937d8ed361b3bf82350ec58c9dae40c048</sum></package><package arch="x86_64" name="firefox" release="1.el6" src="firefox-60.2.1-1.el6.src.rpm" version="60.2.1"><filename>firefox-60.2.1-1.el6.x86_64.rpm</filename><sum type="sha256">2fed6a0264f9c02c956299c5fd204d46c9cda7ca4b6e69a30d35ed87e36647c8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" id="CVE-2018-12383" title="Mozilla: Setting A Master Password Post-Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" id="CVE-2018-12385" title="Mozilla: Crash In Transportsecurityinfo Due To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2834" id="RHSA-2018:2834-1" title="Rhsa-2018:2834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625531" id="1625531" title="Mozilla: Setting A Master Password Post-Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632062" id="1632062" title="Mozilla: Crash In Transportsecurityinfo Due To " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2846-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) 
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-10-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.6.3.el6.noarch.rpm</filename><sum type="sha256">182217b470b386612c394ee7b2a7a50a8431b8d552728b89ad0ae1bcd7d7d2e2</sum></package><package arch="x86_64" name="python-perf" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">8a2354afc4ab457d8b8050a54c39f591b8a6de09aa6f60fe428c20e3446e0cc7</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">823ada3a0ba5a42608a0ccfb18033783a3527daee5ed35b042075cd6c26aba8b</sum></package><package arch="x86_64" name="kernel" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">97fa6f7609b1f85b760e78ec6bd7d20be8ab90d60078fec511104f0a4378c406</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.6.3.el6.noarch.rpm</filename><sum type="sha256">5587939ade25cd387c7990abf181594c3f39b44be7e296cb0ec1a216d2b7ae6a</sum></package><package arch="noarch" name="kernel-firmware" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.6.3.el6.noarch.rpm</filename><sum type="sha256">e05690d00b11e3e32c33a30a04d257becd8c0c616f57233eb27840f3ae8b02fb</sum></package><package arch="x86_64" name="kernel-debug" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">439e540c64eacda2b5c2fce3e14c58159ccb7c5df59314e6501e4431d9d473be</sum></package><package arch="i686" name="kernel-debug-devel" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.6.3.el6.i686.rpm</filename><sum type="sha256">112065ba5c38cd113c9e5bbadccb95de839b11f00317bfa78039cb2bbc088c62</sum></package><package arch="x86_64" name="kernel-devel" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">ec5ead4ce1fa28ebb1d9a30044938a0a58d11001a4ee0e139c7494b9bcb87541</sum></package><package arch="x86_64" name="perf" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">e0ea8ee4ab8abae3fd7eaae1766d1b705620949f6e290d465c49454f6ed3469c</sum></package><package arch="x86_64" name="kernel-headers" release="754.6.3.el6" src="kernel-2.6.32-754.6.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.6.3.el6.x86_64.rpm</filename><sum type="sha256">46f1d686e85e878b2ecab874470e20b8b6e7a585cc719f853ca5a336e6e52698</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14634" id="CVE-2018-14634" title="Kernel: Integer Overflow In Linux'S " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391" id="CVE-2018-5391" title="Kernel: Ip Fragments With Random Offsets Allow A " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2846" id="RHSA-2018:2846-1" title="Rhsa-2018:2846-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609664" id="1609664" title="Kernel: Ip Fragments With Random Offsets Allow A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1616397" id="1616397" title="Kernel-2.6.32-754.3.5.El6.X86_64 Crash On Dell Inc. Poweredge 1950" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624498" id="1624498" title="Kernel: Integer Overflow In Linux'S " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2881-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.2.2 ESR. 
Security Fix(es): 
* Mozilla: type confusion in JavaScript (CVE-2018-12386) 
* Mozilla: stack out-of-bounds read in Array.prototype.push (CVE-2018-12387)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-10-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6" src="firefox-60.2.2-1.el6.src.rpm" version="60.2.2"><filename>firefox-60.2.2-1.el6.x86_64.rpm</filename><sum type="sha256">5daf21c6b811127b7810e996581ec66cf9197c4a466283c3bf403de36781658f</sum></package><package arch="i686" name="firefox" release="1.el6" src="firefox-60.2.2-1.el6.src.rpm" version="60.2.2"><filename>firefox-60.2.2-1.el6.i686.rpm</filename><sum type="sha256">1411366e742c9d32691a57851fac7eae3416623c65060256b2215f43fb56eb78</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386" id="CVE-2018-12386" title="Mozilla: Type Confusion In Javascript" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387" id="CVE-2018-12387" title="Mozilla: Stack Out-Of-Bounds Read In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2881" id="RHSA-2018:2881-1" title="Rhsa-2018:2881-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635451" id="1635451" title="Mozilla: Type Confusion In Javascript" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635452" id="1635452" title="Mozilla: Stack Out-Of-Bounds Read In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2892-1</id><title>Glusterfs</title><description>The glusterfs packages have been upgraded to upstream version 3.12.2, which provides a number of bug fixes over the previous version. 
Security Fix(es): 
* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-10-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="glusterfs-rdma" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-rdma-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">f08b4a88ea1de4986d54dc708f623346a208a4c8f53acfc1555d04892a1bb690</sum></package><package arch="x86_64" name="glusterfs-geo-replication" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-geo-replication-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">9367c51cf6ab886b9fdd00c32d29783710e463fcaa124fc7ff44f3bfedffa22e</sum></package><package arch="noarch" name="glusterfs-resource-agents" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-resource-agents-3.12.2-18.el6.noarch.rpm</filename><sum type="sha256">ff311f800b71530e8a787d20200ef3274dac73f1cf5491d0b718b3bd0acff238</sum></package><package arch="x86_64" name="glusterfs-server" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-server-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">ec8307725118282dff8ba900e706d18ed54e4bb6b57ded2238e76c9ca8b9b21b</sum></package><package arch="x86_64" name="glusterfs-api-devel" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-api-devel-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">a6ee4556d073f030db73bcffd5a8873d4102c62c0496aaaf43514d7a1499d8a0</sum></package><package arch="x86_64" name="glusterfs-devel" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-devel-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">af04636fa8a93230bbe384e3ac11817d27fde619516827cf547b25aafe5a2da9</sum></package><package arch="x86_64" name="glusterfs-cli" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-cli-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">29dc8506ead36061bbf40ff670c297fa8f0690e0d82debf3c6ab21bffecfc5a9</sum></package><package arch="x86_64" name="glusterfs-ganesha" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-ganesha-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">017e4aa77ee157b80502dd18a5ec99812da7633c9972b7eaf075d173512d49e0</sum></package><package arch="x86_64" name="glusterfs-events" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-events-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">db698040ad937ad4549fff73f3f55201e46a088608091bc7e7ef2354cf11423b</sum></package><package arch="x86_64" name="glusterfs-libs" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-libs-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">91338b4fb9e47a9fec2c994fcad01de824640e72195134cfc7fa5c085f16af8c</sum></package><package arch="x86_64" name="glusterfs" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">0264edf30f023d21f3072aa7c7b3c1530b4804e3d4621601b8f085c55ffed399</sum></package><package arch="x86_64" name="glusterfs-api" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-api-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">429c18196c6a5461673a892b4610ec49afbdb29409f4b9d1ad742f27b1737aab</sum></package><package arch="x86_64" name="python2-gluster" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>python2-gluster-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">1dfa20bb008a479a0c45078997a976aed8cdab54396f9e973420d343549c6247</sum></package><package arch="x86_64" name="glusterfs-fuse" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-fuse-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">af15e43c5fac9982e2e98cfa917b2e8a17f46c26918fb6073350c87243341be9</sum></package><package arch="x86_64" name="glusterfs-client-xlators" release="18.el6" src="glusterfs-3.12.2-18.el6.src.rpm" version="3.12.2"><filename>glusterfs-client-xlators-3.12.2-18.el6.x86_64.rpm</filename><sum type="sha256">4ac2513297579f7392efea34d483b169001fc14affde2f7a0e98da277cc88833</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911" id="CVE-2018-10911" title="Glusterfs: Improper Deserialization In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2892" id="RHSA-2018:2892-1" title="Rhsa-2018:2892-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594203" id="1594203" title="Update Glusterfs Client Rpms To The Latest At Rhel 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601657" id="1601657" title="Glusterfs: Improper Deserialization In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2898-1</id><title>Nss</title><description>Security Fix(es): 
* nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2018-10-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-devel" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-9.el6_10.i686.rpm</filename><sum type="sha256">8a0df9c1531aeccfb5512a9380b92512e4d267f4af0f49e87015027b9b928758</sum></package><package arch="x86_64" name="nss-sysinit" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-sysinit-3.36.0-9.el6_10.x86_64.rpm</filename><sum type="sha256">8302e0c9023a39f6809f6790437c56c1094d97e58ad5ca55897f97076e9c6428</sum></package><package arch="i686" name="nss-pkcs11-devel" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-9.el6_10.i686.rpm</filename><sum type="sha256">3955ebf933c501f7a77618de261c00ee4bff49630be140505a1914ab5cd7f869</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-9.el6_10.x86_64.rpm</filename><sum type="sha256">c85e37ea75a89d657760adac7eb9af26fff13c23a860447f92bfc15f605ef62f</sum></package><package arch="x86_64" name="nss-devel" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-9.el6_10.x86_64.rpm</filename><sum type="sha256">e85065a01e1fb4c825589b04369db6876b296c9d05625da0096aa28625002d3c</sum></package><package arch="x86_64" name="nss" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-3.36.0-9.el6_10.x86_64.rpm</filename><sum type="sha256">6ac4e372276e34df71c107a12c35dc1f5742483ed8a1713d9c74d5bfabe2e0ca</sum></package><package arch="x86_64" name="nss-tools" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-tools-3.36.0-9.el6_10.x86_64.rpm</filename><sum type="sha256">84def6c5413733e74b410f689d9d6651a0e1505b8426327a1672aa0a18e2aa8a</sum></package><package arch="i686" name="nss" release="9.el6_10" src="nss-3.36.0-9.el6_10.src.rpm" version="3.36.0"><filename>nss-3.36.0-9.el6_10.i686.rpm</filename><sum type="sha256">7653e2279deb2dca7db6a62952c1008fc94f45b10823b0f4f645c6b986e62d97</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384" id="CVE-2018-12384" title="Nss: Serverhello.Random Is All Zeros When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2898" id="RHSA-2018:2898-1" title="Rhsa-2018:2898-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1622089" id="1622089" title="Nss: Serverhello.Random Is All Zeros When " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2943-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) 
* OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) (CVE-2018-3183) 
* OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) 
* OpenJDK: Incorrect handling of unsigned attributes in singed Jar manifests (Security, 8194534) (CVE-2018-3136) 
* OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) 
* OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) 
* OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-10-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">1feb04fb2601fe3b72eacd8176e880ee422a7d65ed94ef276ce72e10bbab957d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">a6daf0b8a30aa663fa957eb3e1f65e589e1edfab9375c9dddc45bde520b0436d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el6_10.noarch.rpm</filename><sum type="sha256">af8a7b0dc3e8686e78fd3f011c1214989d10cc3a1be001ba28a674f4565c3f95</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">0b4ab499d27602abd97e5f1065a7014cfb8af84393940974445310997a311e43</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-src-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">ad5fbe27aff694e894165615e743db650779e52cbd2d4d4b7667dee994a162f9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">37bf151842a0b96621a9e8f4328a12c66008f1369ba29d81a82e4d229f258c2e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el6_10.noarch.rpm</filename><sum type="sha256">b07a7e71ec39b7739030e24ab6ca6fae8f952e55307db94146ce31b6da7ccfea</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">3ab5b12b29f79d516500e6d132b33491dd0bfa6e070e8a792ee429d898fdb949</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">a536cdca5037d46f69c8100e40bcda55016a6a8e9cd137544401414f121f27c6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">3723ce1849e0689db3d49595c35d653346607b0c5a61706d4a028455975ada62</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">e240dea22481cbf0ee4afb3bea9594df0aee8de87fdb7795d59c2667e6bdb169</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el6_10.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el6_10.x86_64.rpm</filename><sum type="sha256">6f158d85d7eb852e83b06984fec7cc060e4dcf30ace97eb5ba784d5921fefd2d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" id="CVE-2018-3136" title="Openjdk: Incorrect Handling Of Unsigned " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" id="CVE-2018-3139" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" id="CVE-2018-3149" title="Openjdk: Incomplete Enforcement Of The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" id="CVE-2018-3169" title="Openjdk: Improper Field Access Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" id="CVE-2018-3180" title="Openjdk: Missing Endpoint Identification " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" id="CVE-2018-3183" title="Openjdk: Unrestricted Access To Scripting Engine " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" id="CVE-2018-3214" title="Openjdk: Infinite Loop In Riff Format Reader " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2943" id="RHSA-2018:2943-1" title="Rhsa-2018:2943-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639268" id="1639268" title="Openjdk: Unrestricted Access To Scripting Engine " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639293" id="1639293" title="Openjdk: Improper Field Access Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639301" id="1639301" title="Openjdk: Infinite Loop In Riff Format Reader " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639442" id="1639442" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639484" id="1639484" title="Openjdk: Missing Endpoint Identification " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639755" id="1639755" title="Openjdk: Incorrect Handling Of Unsigned " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639834" id="1639834" title="Openjdk: Incomplete Enforcement Of The " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3006-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.3.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) 
* Mozilla: Crash with nested event loops (CVE-2018-12392) 
* Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) 
* Mozilla: WebExtension bypass of domain restrictions through header rewriting (CVE-2018-12395) 
* Mozilla: WebExtension content scripts can execute in disallowed contexts (CVE-2018-12396) 
* Mozilla: WebExtension local file permission check bypass (CVE-2018-12397) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-10-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6" src="firefox-60.3.0-1.el6.src.rpm" version="60.3.0"><filename>firefox-60.3.0-1.el6.x86_64.rpm</filename><sum type="sha256">de03c0ab404e2af5a29bd1e574cf425f7c07486091083949eaea88242c36182f</sum></package><package arch="i686" name="firefox" release="1.el6" src="firefox-60.3.0-1.el6.src.rpm" version="60.3.0"><filename>firefox-60.3.0-1.el6.i686.rpm</filename><sum type="sha256">ede778eb071ce9650c5042c641e0759b5d32660591eb490b128a86fe88ee6db8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" id="CVE-2018-12389" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" id="CVE-2018-12390" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" id="CVE-2018-12392" title="Mozilla: Crash With Nested Event Loops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" id="CVE-2018-12393" title="Mozilla: Integer Overflow During Unicode " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395" id="CVE-2018-12395" title="Mozilla: Webextension Bypass Of Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396" id="CVE-2018-12396" title="Mozilla: Webextension Content Scripts Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397" id="CVE-2018-12397" title="Mozilla: Webextension Local File Permission " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3006" id="RHSA-2018:3006-1" title="Rhsa-2018:3006-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642179" id="1642179" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642180" id="1642180" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642182" id="1642182" title="Mozilla: Crash With Nested Event Loops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642183" id="1642183" title="Mozilla: Integer Overflow During Unicode " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642185" id="1642185" title="Mozilla: Webextension Bypass Of Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642186" id="1642186" title="Mozilla: Webextension Content Scripts Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642187" id="1642187" title="Mozilla: Webextension Local File Permission " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3403-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.2.1. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376) 
* Mozilla: Use-after-free in driver timers (CVE-2018-12377) 
* Mozilla: Use-after-free in IndexedDB (CVE-2018-12378) 
* Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541) 
* Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379) 
* Mozilla: Crash in TransportSecurityInfo due to cached data (CVE-2018-12385) 
* Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords (CVE-2018-12383) 
Note: All of the above issues cannot be exploited in Thunderbird by a specially crafted HTML mail, as JavaScript is disabled for mail messages and cannot be enabled. They could be exploited another way in Thunderbird, for example, when viewing the remote content of an RSS feed.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-11-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="5.el6" src="thunderbird-60.2.1-5.el6.src.rpm" version="60.2.1"><filename>thunderbird-60.2.1-5.el6.x86_64.rpm</filename><sum type="sha256">5c39ed21b5310b7d7f7ca6ba9836ab7f4c7155e9c21489f20a590b967420f164</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" id="CVE-2017-16541" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" id="CVE-2018-12376" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" id="CVE-2018-12377" title="Mozilla: Use-After-Free In Driver Timers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" id="CVE-2018-12378" title="Mozilla: Use-After-Free In Indexeddb" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" id="CVE-2018-12379" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" id="CVE-2018-12383" title="Mozilla: Setting A Master Password Post-Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" id="CVE-2018-12385" title="Mozilla: Crash In Transportsecurityinfo Due To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3403" id="RHSA-2018:3403-1" title="Rhsa-2018:3403-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510816" id="1510816" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625525" id="1625525" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625526" id="1625526" title="Mozilla: Use-After-Free In Driver Timers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625527" id="1625527" title="Mozilla: Use-After-Free In Indexeddb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625528" id="1625528" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625531" id="1625531" title="Mozilla: Setting A Master Password Post-Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632062" id="1632062" title="Mozilla: Crash In Transportsecurityinfo Due To " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3406-1</id><title>Python-Paramiko</title><description>Security Fix(es): 
* python-paramiko: Authentication bypass in auth_handler.py (CVE-2018-1000805)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2018-11-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="python-paramiko" release="5.el6_10" src="python-paramiko-1.7.5-5.el6_10.src.rpm" version="1.7.5"><filename>python-paramiko-1.7.5-5.el6_10.noarch.rpm</filename><sum type="sha256">2e9f7c86a90e9f28294513a3fd9189703ff0597aa1014af580528606a2938f30</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805" id="CVE-2018-1000805" title="Python-Paramiko: Authentication Bypass In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3406" id="RHSA-2018:3406-1" title="Rhsa-2018:3406-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1637263" id="1637263" title="Python-Paramiko: Authentication Bypass In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3409-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) 
* OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) 
* OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) 
* OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) 
* OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) 
* OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-11-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.16.0.el6_10" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.0.el6_10.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.0.el6_10.x86_64.rpm</filename><sum type="sha256">65ae6a0f0079bf463145c73f50c5f80ab115cc585324d2c3fd80f9f5d16e54f4</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.16.0.el6_10" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.0.el6_10.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-1.7.0.201-2.6.16.0.el6_10.x86_64.rpm</filename><sum type="sha256">dbfea160b883af781ab701a7b435603a87a004f491070d3d99e4453347c447c9</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.16.0.el6_10" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.0.el6_10.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.0.el6_10.noarch.rpm</filename><sum type="sha256">3a7a1024d765008366cde1ecbd58089d9d79f3bbe478ee161bf79d239f7f0cd4</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.16.0.el6_10" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.0.el6_10.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-src-1.7.0.201-2.6.16.0.el6_10.x86_64.rpm</filename><sum type="sha256">01f070eff92d06d3b221ce6f5efcb5a62654f3c491519311ee16543d5d378a87</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.16.0.el6_10" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.0.el6_10.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.0.el6_10.x86_64.rpm</filename><sum type="sha256">1e40563cd0ba9c5a697e027b5b4abd2d525ce2e7cc36bbddb44e5c140371cfe5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" id="CVE-2018-3136" title="Openjdk: Incorrect Handling Of Unsigned " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" id="CVE-2018-3139" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" id="CVE-2018-3149" title="Openjdk: Incomplete Enforcement Of The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" id="CVE-2018-3169" title="Openjdk: Improper Field Access Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" id="CVE-2018-3180" title="Openjdk: Missing Endpoint Identification " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" id="CVE-2018-3214" title="Openjdk: Infinite Loop In Riff Format Reader " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3409" id="RHSA-2018:3409-1" title="Rhsa-2018:3409-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639293" id="1639293" title="Openjdk: Improper Field Access Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639301" id="1639301" title="Openjdk: Infinite Loop In Riff Format Reader " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639442" id="1639442" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639484" id="1639484" title="Openjdk: Missing Endpoint Identification " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639755" id="1639755" title="Openjdk: Incorrect Handling Of Unsigned " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639834" id="1639834" title="Openjdk: Incomplete Enforcement Of The " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3522-1</id><title>Spice-Server</title><description>Security Fix(es): 
* spice: Possible buffer overflow via invalid monitor configurations (CVE-2017-7506)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-11-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="16.el6_10.2" src="spice-server-0.12.4-16.el6_10.2.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-16.el6_10.2.x86_64.rpm</filename><sum type="sha256">af07d4973132e31e3742334677f8a2520d5dc7bc40fd7a22f18f2dbb1f99d952</sum></package><package arch="x86_64" name="spice-server" release="16.el6_10.2" src="spice-server-0.12.4-16.el6_10.2.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-16.el6_10.2.x86_64.rpm</filename><sum type="sha256">e9133830a9b291592c2f5cbac459a3986bbcea4db3e396a9655620a9a579cb13</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506" id="CVE-2017-7506" title="Spice: Possible Buffer Overflow Via Invalid " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3522" id="RHSA-2018:3522-1" title="Rhsa-2018:3522-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452606" id="1452606" title="Spice: Possible Buffer Overflow Via Invalid " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3531-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.3.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) 
* Mozilla: Crash with nested event loops (CVE-2018-12392) 
* Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-11-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6" src="thunderbird-60.3.0-1.el6.src.rpm" version="60.3.0"><filename>thunderbird-60.3.0-1.el6.x86_64.rpm</filename><sum type="sha256">a0251fca81c575827ec28631f058bac04a66757f363bcd14063ef0db5b881951</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" id="CVE-2018-12389" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" id="CVE-2018-12390" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" id="CVE-2018-12392" title="Mozilla: Crash With Nested Event Loops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" id="CVE-2018-12393" title="Mozilla: Integer Overflow During Unicode " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3531" id="RHSA-2018:3531-1" title="Rhsa-2018:3531-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642179" id="1642179" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642180" id="1642180" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642182" id="1642182" title="Mozilla: Crash With Nested Event Loops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642183" id="1642183" title="Mozilla: Integer Overflow During Unicode " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3760-1</id><title>Ghostscript</title><description>Security Fix(es): 
* It was discovered that the ghostscript /invalidaccess checks fail under certain conditions. An attacker could possibly exploit this to bypass the - -dSAFER protection and, for example, execute arbitrary shell commands via a specially crafted PostScript document. (CVE-2018-16509)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2018-12-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ghostscript-devel" release="24.el6_10.2" src="ghostscript-8.70-24.el6_10.2.src.rpm" version="8.70"><filename>ghostscript-devel-8.70-24.el6_10.2.x86_64.rpm</filename><sum type="sha256">ff93d6e9e1d9a79285ed2f052de7c38e975816a8081ed2beb48087228c8dd5c3</sum></package><package arch="i686" name="ghostscript-devel" release="24.el6_10.2" src="ghostscript-8.70-24.el6_10.2.src.rpm" version="8.70"><filename>ghostscript-devel-8.70-24.el6_10.2.i686.rpm</filename><sum type="sha256">e6d50f05d18c2768306b1daa02c4639bff52828e0954b9b359d92e8aa0771390</sum></package><package arch="x86_64" name="ghostscript" release="24.el6_10.2" src="ghostscript-8.70-24.el6_10.2.src.rpm" version="8.70"><filename>ghostscript-8.70-24.el6_10.2.x86_64.rpm</filename><sum type="sha256">6c002e4b07af5581a989d6adce9bf0bd9893788e3febdd6bbe991f59b26b815f</sum></package><package arch="x86_64" name="ghostscript-doc" release="24.el6_10.2" src="ghostscript-8.70-24.el6_10.2.src.rpm" version="8.70"><filename>ghostscript-doc-8.70-24.el6_10.2.x86_64.rpm</filename><sum type="sha256">cfcda1c11d0d7f13c7dcdc795235267266cbb47d8436f7e23238b3ed07ee50e8</sum></package><package arch="x86_64" name="ghostscript-gtk" release="24.el6_10.2" src="ghostscript-8.70-24.el6_10.2.src.rpm" version="8.70"><filename>ghostscript-gtk-8.70-24.el6_10.2.x86_64.rpm</filename><sum type="sha256">6b0516475f254ce2782c8f234eeb3749bafda61a75a19751712d59d58bc2cbcf</sum></package><package arch="i686" name="ghostscript" release="24.el6_10.2" src="ghostscript-8.70-24.el6_10.2.src.rpm" version="8.70"><filename>ghostscript-8.70-24.el6_10.2.i686.rpm</filename><sum type="sha256">19129067bd969ead4890e0d7385f09a971b91ca103df9f06c6250cfe105a0347</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509" id="CVE-2018-16509" title="Ghostscript: /Invalidaccess Bypass After Failed " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3760" id="RHSA-2018:3760-1" title="Rhsa-2018:3760-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619748" id="1619748" title="Ghostscript: /Invalidaccess Bypass After Failed " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3831-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.4.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) 
* Mozilla: Memory corruption in Angle (CVE-2018-17466) 
* Mozilla: Use-after-free with select element (CVE-2018-18492) 
* Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) 
* Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) 
* Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-01-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6" src="firefox-60.4.0-1.el6.src.rpm" version="60.4.0"><filename>firefox-60.4.0-1.el6.x86_64.rpm</filename><sum type="sha256">bde0990b4494c747c48a248844a72402eb9381400dc175b38aa8ca431be0c3ed</sum></package><package arch="i686" name="firefox" release="1.el6" src="firefox-60.4.0-1.el6.src.rpm" version="60.4.0"><filename>firefox-60.4.0-1.el6.i686.rpm</filename><sum type="sha256">7e6a8856fa03774af2ede19dbb0e0e2ca404150ac76ce5cfec37b42bd0131003</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" id="CVE-2018-12405" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" id="CVE-2018-17466" title="Cve-2018-17466" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" id="CVE-2018-18492" title="Mozilla: Use-After-Free With Select Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" id="CVE-2018-18493" title="Mozilla: Buffer Overflow In Accelerated 2D" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" id="CVE-2018-18494" title="Mozilla: Same-Origin Policy Violation Using" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" id="CVE-2018-18498" title="Mozilla: Integer Overflow When Calculating" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3831" id="RHSA-2018:3831-1" title="Rhsa-2018:3831-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640102" id="1640102" title="Chromium-Browser, Firefox: Memory Corruption In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658397" id="1658397" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658399" id="1658399" title="Mozilla: Use-After-Free With Select Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658400" id="1658400" title="Mozilla: Buffer Overflow In Accelerated 2D" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658401" id="1658401" title="Mozilla: Same-Origin Policy Violation Using" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658402" id="1658402" title="Mozilla: Integer Overflow When Calculating" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3854-1</id><title>Ntp</title><description>Security Fix(es): 
* ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution (CVE-2018-12327)</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2019-01-08 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ntp-perl" release="15.el6_10" src="ntp-4.2.6p5-15.el6_10.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-15.el6_10.x86_64.rpm</filename><sum type="sha256">0f775f51e349b63d4888472bf574cfbdcc77b7a32c06812707da4158da3c67b3</sum></package><package arch="x86_64" name="ntpdate" release="15.el6_10" src="ntp-4.2.6p5-15.el6_10.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-15.el6_10.x86_64.rpm</filename><sum type="sha256">9d7821b33af7d4bf8d0a2637552e442ebdf9f04c290a479eddb26fa9efbc1ddf</sum></package><package arch="noarch" name="ntp-doc" release="15.el6_10" src="ntp-4.2.6p5-15.el6_10.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-15.el6_10.noarch.rpm</filename><sum type="sha256">c82ee0772e881ec69ac19e51fb9e2360f223af9f4237a25309f13eed8ffae94d</sum></package><package arch="x86_64" name="ntp" release="15.el6_10" src="ntp-4.2.6p5-15.el6_10.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-15.el6_10.x86_64.rpm</filename><sum type="sha256">7968b98835763a81367618f4e8fe7d1ab7da7bc5b23c1743ac510f6850a1077a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327" id="CVE-2018-12327" title="Ntp: Stack-Based Buffer Overflow In Ntpq And" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3854" id="RHSA-2018:3854-1" title="Rhsa-2018:3854-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593580" id="1593580" title="Ntp: Stack-Based Buffer Overflow In Ntpq And" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0159-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.4.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) 
* chromium-browser, firefox: Memory corruption in Angle (CVE-2018-17466) 
* Mozilla: Use-after-free with select element (CVE-2018-18492) 
* Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) 
* Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) 
* Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-02-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6" src="thunderbird-60.4.0-1.el6.src.rpm" version="60.4.0"><filename>thunderbird-60.4.0-1.el6.x86_64.rpm</filename><sum type="sha256">237b801770cf613cdca06c2e959a0e2e9243c476916515546c9a7aa0446f5ce2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" id="CVE-2018-12405" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" id="CVE-2018-17466" title="Cve-2018-17466" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" id="CVE-2018-18492" title="Mozilla: Use-After-Free With Select Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" id="CVE-2018-18493" title="Mozilla: Buffer Overflow In Accelerated 2D" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" id="CVE-2018-18494" title="Mozilla: Same-Origin Policy Violation Using" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" id="CVE-2018-18498" title="Mozilla: Integer Overflow When Calculating" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0159" id="RHSA-2019:0159-1" title="Rhsa-2019:0159-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640102" id="1640102" title="Chromium-Browser, Firefox: Memory Corruption In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658397" id="1658397" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658399" id="1658399" title="Mozilla: Use-After-Free With Select Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658400" id="1658400" title="Mozilla: Buffer Overflow In Accelerated 2D" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658401" id="1658401" title="Mozilla: Same-Origin Policy Violation Using" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658402" id="1658402" title="Mozilla: Integer Overflow When Calculating" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0218-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.5.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) 
* Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) 
* Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-02-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="2.el6" src="firefox-60.5.0-2.el6.src.rpm" version="60.5.0"><filename>firefox-60.5.0-2.el6.i686.rpm</filename><sum type="sha256">c249145e8254b9f684b3ad1c923e23d371deb91ce64390a5a4a8a73a997c30e6</sum></package><package arch="x86_64" name="firefox" release="2.el6" src="firefox-60.5.0-2.el6.src.rpm" version="60.5.0"><filename>firefox-60.5.0-2.el6.x86_64.rpm</filename><sum type="sha256">2c4542c403e1c64eb2eb3df3a3181f60a43ca99d2e87dd78a6ddd6fdf899bedc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" id="CVE-2018-18500" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" id="CVE-2018-18501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" id="CVE-2018-18505" title="Mozilla: Privilege Escalation Through Ipc " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0218" id="RHSA-2019:0218-1" title="Rhsa-2019:0218-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670631" id="1670631" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670632" id="1670632" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670633" id="1670633" title="Mozilla: Privilege Escalation Through Ipc " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0232-1</id><title>Spice-Server</title><description>Security Fix(es): 
* spice: Off-by-one error in array access in spice/server/memslot.c (CVE-2019-3813)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-02-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-server-devel" release="16.el6_10.3" src="spice-server-0.12.4-16.el6_10.3.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-16.el6_10.3.x86_64.rpm</filename><sum type="sha256">b17aff06c5035ea336ddafba63036ff1e9eafd036e49f0028defc276826a0db4</sum></package><package arch="x86_64" name="spice-server" release="16.el6_10.3" src="spice-server-0.12.4-16.el6_10.3.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-16.el6_10.3.x86_64.rpm</filename><sum type="sha256">6f6758bdcd6ff7db3a74366dc8b4fcd777481819a738f58aa7ac6f07ee30ba67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813" id="CVE-2019-3813" title="Spice: Off-By-One Error In Array Access In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0232" id="RHSA-2019:0232-1" title="Rhsa-2019:0232-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665371" id="1665371" title="Spice: Off-By-One Error In Array Access In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0269-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.5.0. 
Security Fix(es): 
* Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) 
* Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) 
* Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) 
* libical: Multiple use-after-free vulnerabilities (CVE-2016-5824)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-02-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-60.5.0-1.el6_10.src.rpm" version="60.5.0"><filename>thunderbird-60.5.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">94671acaf2a4eb803304f1f3a806190dcc2d3ce620a0590c0a6d692c1287d8ab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5824" id="CVE-2016-5824" title="Libical: Multiple Use-After-Free Vulnerabilities" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" id="CVE-2018-18500" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" id="CVE-2018-18501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" id="CVE-2018-18505" title="Mozilla: Privilege Escalation Through Ipc " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0269" id="RHSA-2019:0269-1" title="Rhsa-2019:0269-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375120" id="1375120" title="Libical: Multiple Use-After-Free Vulnerabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670631" id="1670631" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670632" id="1670632" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670633" id="1670633" title="Mozilla: Privilege Escalation Through Ipc " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0373-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.5.1 ESR. 
Security Fix(es): 
* chromium-browser, mozilla: Use after free in Skia (CVE-2018-18356) 
* mozilla: Integer overflow in Skia (CVE-2019-5785)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-02-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-60.5.1-1.el6_10.src.rpm" version="60.5.1"><filename>firefox-60.5.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">de59a5952e479376b5bc8a6741674809694e503d22e2236f7d3036d2dcec0034</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-60.5.1-1.el6_10.src.rpm" version="60.5.1"><filename>firefox-60.5.1-1.el6_10.i686.rpm</filename><sum type="sha256">8bfd2157ce8a1ab01f51be795ec16e763cf09b3b56142705e67cf0ddd0a01d9c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356" id="CVE-2018-18356" title="Cve-2018-18356" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785" id="CVE-2019-5785" title="Mozilla: Integer Overflow In Skia" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0373" id="RHSA-2019:0373-1" title="Rhsa-2019:0373-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656570" id="1656570" title="Chromium-Browser, Mozilla: Use After Free In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676991" id="1676991" title="Mozilla: Integer Overflow In Skia" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0415-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) 
Bug Fix(es): 
* Previously backported upstream patch caused a change in the behavior of page fault handler. As a consequence, applications compiled through GNU Compiler Collection (GCC) version 4.4.7 sometimes generated stack access exceeding the 64K limit. Running such applications subsequently triggered a segmentation fault. With this update, the 64k limit check in the page fault handler has been removed. As a result, running the affected applications no longer triggers the segmentation fault in the described scenario. 
Note that removing the limit check does not impact the integrity of the kernel itself.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-03-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.11.1.el6.noarch.rpm</filename><sum type="sha256">6da6a9ef8b3191e30759860513dca99e2fc644f59c9afd6027e603e4aa905583</sum></package><package arch="noarch" name="kernel-doc" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.11.1.el6.noarch.rpm</filename><sum type="sha256">d9cd89b5755552488aa295527afcdfafb0f25d456b87a9200463a95bb864aa91</sum></package><package arch="x86_64" name="kernel-headers" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">d8dca60393c63951f2badecb1f564ef0cf82bd54d55af55b15172e93159b9c0e</sum></package><package arch="x86_64" name="kernel-debug" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">988219a2d9856015390ab37ac8d527c72d34e32711aaab297edc415ed2a11f01</sum></package><package arch="i686" name="kernel-debug-devel" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.11.1.el6.i686.rpm</filename><sum type="sha256">da396184e8a0aedfc08fe4f9243afaea08ad5f54c1660dee3a073b6492166704</sum></package><package arch="x86_64" name="perf" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">b6b5daaf78c761a48a940aeeef1c4356f95617c5236d03a2b604bbc225e7c683</sum></package><package arch="x86_64" name="kernel-devel" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">604a497eb81084392ae179de4bbbd5752be018baa2691ad3cab4d55b6b5f5ea8</sum></package><package arch="x86_64" name="python-perf" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">29e92254961657bac92d6d3a0ca5f14443ed276a42f3687fa79d9e45afe60b27</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">4e93c2ce6c56c13e638585b8773717feadf0b632b7e6cd2bf28dd2bd86e1cf82</sum></package><package arch="noarch" name="kernel-firmware" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.11.1.el6.noarch.rpm</filename><sum type="sha256">80afe0e5dbe79721c10b46ba211e4b4738b6af7cbe3834fff0f9ab456f91d044</sum></package><package arch="x86_64" name="kernel" release="754.11.1.el6" src="kernel-2.6.32-754.11.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.11.1.el6.x86_64.rpm</filename><sum type="sha256">9c7731903788f1f512bad504024a48ccec7e60d1eae57116856406ef91b692b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902" id="CVE-2018-10902" title="Kernel: Midi Driver Race Condition Leads To A " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0415" id="RHSA-2019:0415-1" title="Rhsa-2019:0415-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590720" id="1590720" title="Kernel: Midi Driver Race Condition Leads To A " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0416-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-03-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">998c32fec0cb15833509793528d0e7b7f880f5c160048e90782b1c05c2121f68</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">3d69ff8ffaa1e3f8c6789e21ad9c67b8a940386f26ce9124c1821d4931817d94</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-src-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">756703ba23691b9a7490c987805a7e9d5bbfb9465ec972eaace6432c1e219381</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">875f2873996fc351e22ebdb32aad727c3addfe6fc2d38156caa94295473251a6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">ce3dc933d6e16a3acbcf7db7fc2ff7e8099d4375128423129d7fd9b5ba5edc18</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">041024be9a806e0ba1547c2c6546fea56558b6c8e38d71e0d92b935a36111b9d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.201.b09-1.el6_10.noarch.rpm</filename><sum type="sha256">b8a63a9bfb16fdf95ea239b84718079685034acb094344208834a3920928c079</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">7e9f189a40835e96d58973ab8cf6317a4b651946e8c9acc47e11f91d24aa0581</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">49d82df37d2344ad9940c36c49275a175438d6a26c9f6005a63ccb252463a9de</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">056d71b7deac0a3791f456e6ee303b9b5db2874670cc4e153a8de990dd942dc5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">8440867c3978d9847b96687f8442e290eb73d6d8b2f626d0e035913b873a9c83</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.201.b09-1.el6_10.noarch.rpm</filename><sum type="sha256">686fe9f40b9b7974ae00e73a7f9a08dcb962961d815734f2567ccf87889d0018</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" id="CVE-2019-2422" title="Openjdk: Memory Disclosure In Filechannelimpl " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0416" id="RHSA-2019:0416-1" title="Rhsa-2019:0416-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665945" id="1665945" title="Openjdk: Memory Disclosure In Filechannelimpl " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0420-1</id><title>Polkit</title><description>Security Fix(es): 
* polkit: Temporary auth hijacking via PID reuse and non-atomic fork (CVE-2019-6133)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-03-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="polkit-devel" release="11.el6_10.1" src="polkit-0.96-11.el6_10.1.src.rpm" version="0.96"><filename>polkit-devel-0.96-11.el6_10.1.i686.rpm</filename><sum type="sha256">ed349855c2dc321bc9394ddfa3a5ddfeb4d32ec04c6cbcd0f0e7e8eae36575e7</sum></package><package arch="x86_64" name="polkit-docs" release="11.el6_10.1" src="polkit-0.96-11.el6_10.1.src.rpm" version="0.96"><filename>polkit-docs-0.96-11.el6_10.1.x86_64.rpm</filename><sum type="sha256">e8016913ed89ea1cf1a60d9f838154416eadaf8bad0624d0a5365b337bdfc3da</sum></package><package arch="i686" name="polkit" release="11.el6_10.1" src="polkit-0.96-11.el6_10.1.src.rpm" version="0.96"><filename>polkit-0.96-11.el6_10.1.i686.rpm</filename><sum type="sha256">569f6e45bd66cc5d945a5dca4b8fcfff70032e44c7a937a416fe38d2778e7141</sum></package><package arch="noarch" name="polkit-desktop-policy" release="11.el6_10.1" src="polkit-0.96-11.el6_10.1.src.rpm" version="0.96"><filename>polkit-desktop-policy-0.96-11.el6_10.1.noarch.rpm</filename><sum type="sha256">509556641a226de36aa3bd79158e79e8e14588a42a5c568566c0b959785fb2d4</sum></package><package arch="x86_64" name="polkit-devel" release="11.el6_10.1" src="polkit-0.96-11.el6_10.1.src.rpm" version="0.96"><filename>polkit-devel-0.96-11.el6_10.1.x86_64.rpm</filename><sum type="sha256">52fefe0cbcbbaf6f4820feade3ab457604b8827e584e508311a5514ab751f3e1</sum></package><package arch="x86_64" name="polkit" release="11.el6_10.1" src="polkit-0.96-11.el6_10.1.src.rpm" version="0.96"><filename>polkit-0.96-11.el6_10.1.x86_64.rpm</filename><sum type="sha256">326a1efbbce9796afda94b805a1c4540a98a2ddd39f1d5b110f0851b34e4ff32</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" id="CVE-2019-6133" title="Polkit: Temporary Auth Hijacking Via Pid Reuse " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0420" id="RHSA-2019:0420-1" title="Rhsa-2019:0420-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664212" id="1664212" title="Polkit: Temporary Auth Hijacking Via Pid Reuse " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0462-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-03-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.17.1.el6_10" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el6_10.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el6_10.x86_64.rpm</filename><sum type="sha256">14edca4b36c17e64423a996b5548ecb90ebf9b72155c795c27829498baad2f45</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.17.1.el6_10" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el6_10.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.el6_10.x86_64.rpm</filename><sum type="sha256">df99e24892ca82d28b2e766f0b3cf9435a95d06557b3a1bd4de5e1e23b9fbd89</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.17.1.el6_10" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el6_10.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-src-1.7.0.211-2.6.17.1.el6_10.x86_64.rpm</filename><sum type="sha256">aad9933e49a88515f80d0d95a0c92c79da0b017e9c3cd3fb3599ae6fc6103f06</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.17.1.el6_10" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el6_10.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-demo-1.7.0.211-2.6.17.1.el6_10.x86_64.rpm</filename><sum type="sha256">2bc6b110eaae80521330188f70a336bdf921b8a936fb29c00a740d5b1faf3228</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.17.1.el6_10" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el6_10.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-javadoc-1.7.0.211-2.6.17.1.el6_10.noarch.rpm</filename><sum type="sha256">0d7fc07ee894fd26c35ae8e74cc26708df8cf01a326b86efd7806193b8a60f67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" id="CVE-2019-2422" title="Openjdk: Memory Disclosure In Filechannelimpl " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0462" id="RHSA-2019:0462-1" title="Rhsa-2019:0462-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665945" id="1665945" title="Openjdk: Memory Disclosure In Filechannelimpl " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0623-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.6.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) 
* Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) 
* Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) 
* Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) 
* Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) 
* Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) 
* Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) 
* Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-03-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="3.el6_10" src="firefox-60.6.0-3.el6_10.src.rpm" version="60.6.0"><filename>firefox-60.6.0-3.el6_10.x86_64.rpm</filename><sum type="sha256">a13cffaabfe7117ee8dbecc5a1913d0d9e37d4ead209d910c370a33eb05dd525</sum></package><package arch="i686" name="firefox" release="3.el6_10" src="firefox-60.6.0-3.el6_10.src.rpm" version="60.6.0"><filename>firefox-60.6.0-3.el6_10.i686.rpm</filename><sum type="sha256">6e7308e77335ae44c84d98147143d202fbfcffadbfa662aed531acf62f0f4db3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" id="CVE-2018-18506" title="Mozilla: Proxy Auto-Configuration File Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" id="CVE-2019-9788" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" id="CVE-2019-9790" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" id="CVE-2019-9791" title="Mozilla: Type Inference Is Incorrect For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" id="CVE-2019-9792" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" id="CVE-2019-9793" title="Mozilla: Improper Bounds Checks When Spectre " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" id="CVE-2019-9795" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" id="CVE-2019-9796" title="Mozilla: Use-After-Free With Smil Animation " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0623" id="RHSA-2019:0623-1" title="Rhsa-2019:0623-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690673" id="1690673" title="Mozilla: Proxy Auto-Configuration File Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690674" id="1690674" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690675" id="1690675" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690676" id="1690676" title="Mozilla: Type Inference Is Incorrect For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690677" id="1690677" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690678" id="1690678" title="Mozilla: Improper Bounds Checks When Spectre " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690680" id="1690680" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690681" id="1690681" title="Mozilla: Use-After-Free With Smil Animation " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0672-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.6.1 ESR. 
Security Fix(es): 
* Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) 
* Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-04-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-60.6.1-1.el6_10.src.rpm" version="60.6.1"><filename>firefox-60.6.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">1b978a9d016cd74c5b207d031c6336f34980fd2478f7ba4bedfb999a19f2632d</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-60.6.1-1.el6_10.src.rpm" version="60.6.1"><filename>firefox-60.6.1-1.el6_10.i686.rpm</filename><sum type="sha256">34a5d43d2f9fd082108b1f6e5494390bae27763b4bf1d27300d81a43265e5736</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" id="CVE-2019-9810" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" id="CVE-2019-9813" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0672" id="RHSA-2019:0672-1" title="Rhsa-2019:0672-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692181" id="1692181" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692182" id="1692182" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0680-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) 
* Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) 
* Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) 
* Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) 
* Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) 
* Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813) 
* Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) 
* Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) 
* Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) 
* Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-04-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-60.6.1-1.el6_10.src.rpm" version="60.6.1"><filename>thunderbird-60.6.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">fd03b0f0c41d902ee6dce831622726e791285740b9dacc6cdbe14cdfecedeb10</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" id="CVE-2018-18506" title="Mozilla: Proxy Auto-Configuration File Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" id="CVE-2019-9788" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" id="CVE-2019-9790" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" id="CVE-2019-9791" title="Mozilla: Type Inference Is Incorrect For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" id="CVE-2019-9792" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" id="CVE-2019-9793" title="Mozilla: Improper Bounds Checks When Spectre " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" id="CVE-2019-9795" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" id="CVE-2019-9796" title="Mozilla: Use-After-Free With Smil Animation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" id="CVE-2019-9810" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" id="CVE-2019-9813" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0680" id="RHSA-2019:0680-1" title="Rhsa-2019:0680-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690673" id="1690673" title="Mozilla: Proxy Auto-Configuration File Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690674" id="1690674" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690675" id="1690675" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690676" id="1690676" title="Mozilla: Type Inference Is Incorrect For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690677" id="1690677" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690678" id="1690678" title="Mozilla: Improper Bounds Checks When Spectre " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690680" id="1690680" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690681" id="1690681" title="Mozilla: Use-After-Free With Smil Animation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692181" id="1692181" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692182" id="1692182" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0711-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: User enumeration via malformed packets in authentication requests (CVE-2018-15473)</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2019-04-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="openssh-askpass" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-124.el6_10.x86_64.rpm</filename><sum type="sha256">120a5084e41eb8dd93322b6385ea8997a6d2d70b181b7ad7b2f8878b4d157a6e</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-124.el6_10.i686.rpm</filename><sum type="sha256">c5a4a171ed4c435001e686aa8986e8d9609c60c7e898524a2431e16b735a730d</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-124.el6_10.x86_64.rpm</filename><sum type="sha256">90b4af6110c1ec419aa7273a6a8d61b3f36507a76e5e621c345fcc807d765301</sum></package><package arch="x86_64" name="openssh-ldap" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-124.el6_10.x86_64.rpm</filename><sum type="sha256">3e4e3a51da469cdbb1790fcb415112d472ad7544c66090e223f164893a60795b</sum></package><package arch="x86_64" name="openssh-clients" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-124.el6_10.x86_64.rpm</filename><sum type="sha256">6100cf837b568f8ce86c7320448db3af58a36a40f21113996fa6a46956a8e698</sum></package><package arch="x86_64" name="openssh" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="5.3p1"><filename>openssh-5.3p1-124.el6_10.x86_64.rpm</filename><sum type="sha256">f2ccecfdc823a918c60717b38bd57357336ff2e8fc50581276da584731539f47</sum></package><package arch="x86_64" name="openssh-server" release="124.el6_10" src="openssh-5.3p1-124.el6_10.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-124.el6_10.x86_64.rpm</filename><sum type="sha256">4b8c136b73964b1ae712a476c691babf49f1d95b88e5e6c88fb5ec71ddacd56c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" id="CVE-2018-15473" title="Openssh: User Enumeration Via Malformed Packets " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0711" id="RHSA-2019:0711-1" title="Rhsa-2019:0711-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619063" id="1619063" title="Openssh: User Enumeration Via Malformed Packets " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0717-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-04-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="kernel-debug-devel" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.12.1.el6.i686.rpm</filename><sum type="sha256">32dc06f0f09f8fc2ff4f92063a276c883c01d83a5b68f04c168d129cc9c82b0d</sum></package><package arch="x86_64" name="kernel-debug" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">fae686c4840b1caf15af6432fa01c10b278c298a98bb05e6b4120be2fd266187</sum></package><package arch="x86_64" name="perf" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">a81980dd62af375ad7980b2929c7e91baf93c90f3a9baa6497f8cfbd42f17ceb</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">2328cd09cc999c36ef74525e5f3a4f9dbcb56cc43646ec75c888100cc2f76271</sum></package><package arch="x86_64" name="kernel" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">73e1cd3905ed92b01585fdfa3cb41770fbc3e94f20a09d6b6698691eea7e1566</sum></package><package arch="noarch" name="kernel-firmware" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.12.1.el6.noarch.rpm</filename><sum type="sha256">ee86cd43a1dd0122b2e726d8fe7f004c17c33156993e7fbfdc95e5ab8c231ae5</sum></package><package arch="noarch" name="kernel-doc" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.12.1.el6.noarch.rpm</filename><sum type="sha256">a06acfb19b7f582876446695b744f6f1921ef89a21033acd79d355a5bb3dfb63</sum></package><package arch="x86_64" name="python-perf" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">95ebbea14e01e2e970a97a879e218786ca4a1571998bf65a330ce515f73d2a16</sum></package><package arch="x86_64" name="kernel-devel" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">8ae19246ba4e807b59d1ae89fc3eda9a9895c18083c92e3f7efde504ee4d4eb7</sum></package><package arch="x86_64" name="kernel-headers" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.12.1.el6.x86_64.rpm</filename><sum type="sha256">2446b7dc71b2dd09f59510c802e193cfca4b932db338a6a84315a82f0e8f0f22</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.12.1.el6" src="kernel-2.6.32-754.12.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.12.1.el6.noarch.rpm</filename><sum type="sha256">dc23144ede380cce63aac7b9a4e1d2d003a6a4461db292ec0e27b80cec4ea6f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" id="CVE-2018-13405" title="Kernel: Missing Check In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0717" id="RHSA-2019:0717-1" title="Rhsa-2019:0717-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599161" id="1599161" title="Kernel: Missing Check In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0774-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) 
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) 
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684) 
Bug Fix(es): 
* assert failure in coalesce.cpp: attempted to spill a non-spillable item</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-04-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">c5b18d643a2fdaf284308966b1e1f9283b8bb18d4df2fe5aeeba2eed85e71bed</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-src-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">1fd61ad01957668292d63ec545536d7f1aaa26409d2046d1051b0c78926d46cb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">a4baf68abeab41bd5cd757671f0bfe3c3b1fad496dcc736057bb45e57c81dd0c</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el6_10.noarch.rpm</filename><sum type="sha256">b9e34add24aa6012a59e8fa5445fc73fb62574efe902c3f2be44db65af51e39d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">c3c36239d601fa4e502ea6b5bba53c3294c673ab36842d1c4ed88eb7a27d756f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">4f11c48a07f43f144de22958c4637ead3f6d71d0618ce848aa2ccf4b2e3db6c5</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el6_10.noarch.rpm</filename><sum type="sha256">ce2c81654331538cd7001842aebb8e0511f3ba871ed7ed27f3e4533510f652eb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">bde812187a5af4bc2d27fb2bcf76367a225eb36d549a081fdf85040558da669e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">59b6cac9620e10327f8592ad7d0464d678cfc665a9732595402adc6f3882c57c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">7b7fe8f5f1a5062e6852e59697bd9b0f04727d538112381740844af34881d2fa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">c7cce7d3e964001d2954b4e616b01e48f2fa18aa9d34799fea04eaac297a4032</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el6_10.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el6_10.x86_64.rpm</filename><sum type="sha256">4fca220ab706ffa96ff01dfe3a9a84a3e40f52ae3ace712120f9cffe9922a2a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" id="CVE-2019-2602" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" id="CVE-2019-2684" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" id="CVE-2019-2698" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0774" id="RHSA-2019:0774-1" title="Rhsa-2019:0774-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640127" id="1640127" title="Assert Failure In Coalesce.Cpp: Attempted To Spill A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700440" id="1700440" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700447" id="1700447" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700564" id="1700564" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0790-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) 
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) 
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-04-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.18.0.el6_10" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el6_10.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el6_10.noarch.rpm</filename><sum type="sha256">f1a9617fd9bfb764a9f48d351d70fe472c97c42d4bca1f9708466c2fc5302605</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.18.0.el6_10" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el6_10.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el6_10.x86_64.rpm</filename><sum type="sha256">f7a97b8c75c457060c39c90c3a502fefa86f0f388623e5a96418601d985a58f9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.18.0.el6_10" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el6_10.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el6_10.x86_64.rpm</filename><sum type="sha256">fe405cd709b817fbac9b4218b2e303f0fb2f7f674f4ea8b68b52f60f812932cd</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.18.0.el6_10" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el6_10.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el6_10.x86_64.rpm</filename><sum type="sha256">6f3206947c283d31a6d2ac34119753258e6cce026a7acda482c36e550fdff009</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.18.0.el6_10" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el6_10.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el6_10.x86_64.rpm</filename><sum type="sha256">b8ba57479da96cc8ae7bb47e0ca46a054d01cdafb5bc4164ecdb18a936e1632c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" id="CVE-2019-2602" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" id="CVE-2019-2684" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" id="CVE-2019-2698" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0790" id="RHSA-2019:0790-1" title="Rhsa-2019:0790-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700440" id="1700440" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700447" id="1700447" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700564" id="1700564" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1169-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) 
* Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) 
* Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) 
* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091) 
Bug Fix(es): 
* aio O_DIRECT writes to non-page-aligned file locations on ext4 can result in the overlapped portion of the page containing zeros 
* Tolerate new s390x crypto hardware for migration</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-05-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.14.2.el6.noarch.rpm</filename><sum type="sha256">95f00d7149fadae050b00249aea12b631ec171ca2c0cc8bff24a315623a627b7</sum></package><package arch="x86_64" name="python-perf" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">2653544e0477530586ab1d138e6772cb3c9063ea2c3d12b2540995687dcd8b4c</sum></package><package arch="x86_64" name="kernel-headers" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">120fc6f401a78f3b2599943eb3187b91c81b7be50fe8cfee5faa621487e0cca9</sum></package><package arch="noarch" name="kernel-doc" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.14.2.el6.noarch.rpm</filename><sum type="sha256">9195910ccd4222d609c3ba9b0408915876688f2649237f41161c9824a7484f72</sum></package><package arch="x86_64" name="kernel" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">78b34ad5ce130a8a51a1bd0b0812aa57c2b8106568cd9e0f37ced3ba4fee1c78</sum></package><package arch="x86_64" name="perf" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">ec27cbde9b2aee702104b7f8533029305a649716f0bd5d0e8bae86e8fd2e61a1</sum></package><package arch="x86_64" name="kernel-devel" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">d33dd4979e07ee14cce2baa01c3f2e81279bc4a73d29047153076f66c1269b83</sum></package><package arch="x86_64" name="kernel-debug" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">11ac09285566f0bb5510c8741ecd7d008600202ca623153585eb92bcf424d189</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.14.2.el6.x86_64.rpm</filename><sum type="sha256">e20641082c9486699e5bb7908a32e54acfffe9f31a3565105127f67a5b64b231</sum></package><package arch="i686" name="kernel-debug-devel" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.14.2.el6.i686.rpm</filename><sum type="sha256">30029142d7213320a92ccf28d348669ded539d9a5e361c9ac95f4c8ab9f029f7</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.14.2.el6" src="kernel-2.6.32-754.14.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.14.2.el6.noarch.rpm</filename><sum type="sha256">0bcc855f096a25fd1e07c9e070496a15965acc391856870436dc4d3c8d525960</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" id="CVE-2018-12126" title="Hardware: Microarchitectural Store Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" id="CVE-2018-12127" title="Hardware: Micro-Architectural Load Port Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" id="CVE-2018-12130" title="Hardware: Microarchitectural Fill Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" id="CVE-2019-11091" title="Hardware: Microarchitectural Data Sampling " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1169" id="RHSA-2019:1169-1" title="Rhsa-2019:1169-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646781" id="1646781" title="Hardware: Microarchitectural Store Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646784" id="1646784" title="Hardware: Microarchitectural Fill Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667782" id="1667782" title="Hardware: Micro-Architectural Load Port Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705312" id="1705312" title="Hardware: Microarchitectural Data Sampling " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1180-1</id><title>Libvirt</title><description>Security Fix(es): 
* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) 
* Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) 
* Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) 
* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-05-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt-client" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm</filename><sum type="sha256">02c01c5e114e72c0ccd1f2c979a951ca2d6e7a260b135d34cfe61df935466ba9</sum></package><package arch="x86_64" name="libvirt-devel" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm</filename><sum type="sha256">f829029c7b7a2ef579df550bdfb832300ba52460f86129cd9ae4ecedd5d61ce1</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm</filename><sum type="sha256">bfdb950e2c2bfdb18011ec0c592ca56caa69f5a2050ec0968c4f2668deac1e5e</sum></package><package arch="i686" name="libvirt-devel" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-64.el6_10.1.i686.rpm</filename><sum type="sha256">52a0b76a3c42f4f89feb1774130ba9c24c1b2586d708e52f6e93c9b7544c8415</sum></package><package arch="x86_64" name="libvirt-python" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm</filename><sum type="sha256">b09321a2b2f590a2d77aee9293d494e531e775d46065c010cdc657eb5429fa40</sum></package><package arch="x86_64" name="libvirt" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-64.el6_10.1.x86_64.rpm</filename><sum type="sha256">09f52705f081cd668a197f29902b768b4a1545a58a11c6f23a9f61c8f32f0efe</sum></package><package arch="i686" name="libvirt-client" release="64.el6_10.1" src="libvirt-0.10.2-64.el6_10.1.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-64.el6_10.1.i686.rpm</filename><sum type="sha256">2db665f301963c18e699bf6de58d71d46d9b58615941f95892aaffd80705d476</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" id="CVE-2018-12126" title="Hardware: Microarchitectural Store Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" id="CVE-2018-12127" title="Hardware: Micro-Architectural Load Port Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" id="CVE-2018-12130" title="Hardware: Microarchitectural Fill Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" id="CVE-2019-11091" title="Hardware: Microarchitectural Data Sampling " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1180" id="RHSA-2019:1180-1" title="Rhsa-2019:1180-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646781" id="1646781" title="Hardware: Microarchitectural Store Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646784" id="1646784" title="Hardware: Microarchitectural Fill Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667782" id="1667782" title="Hardware: Micro-Architectural Load Port Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705312" id="1705312" title="Hardware: Microarchitectural Data Sampling " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1181-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) 
* Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) 
* Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) 
* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-05-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.3" src="qemu-kvm-0.12.1.2-2.506.el6_10.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.3.x86_64.rpm</filename><sum type="sha256">686bc35d4c0cf2d475e362472b8e2266a81d480c936aa13f8345d719f3e0cacb</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.3" src="qemu-kvm-0.12.1.2-2.506.el6_10.3.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.3.x86_64.rpm</filename><sum type="sha256">a7dbe66028e1330476004d5c9b8849ee5c335dbf45240aeb45cf2e7336555c3c</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.3" src="qemu-kvm-0.12.1.2-2.506.el6_10.3.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.3.x86_64.rpm</filename><sum type="sha256">32312e8c8f9f845daf401d64cd8c962ddc854cb52663c4e574811f6bc2b5e21c</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.3" src="qemu-kvm-0.12.1.2-2.506.el6_10.3.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.3.x86_64.rpm</filename><sum type="sha256">02c1d4c24d77628a89316b69800ce2da12aa7a2618fe7c3a5342ec9dcf2c9cfb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" id="CVE-2018-12126" title="Hardware: Microarchitectural Store Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" id="CVE-2018-12127" title="Hardware: Micro-Architectural Load Port Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" id="CVE-2018-12130" title="Hardware: Microarchitectural Fill Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" id="CVE-2019-11091" title="Hardware: Microarchitectural Data Sampling " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1181" id="RHSA-2019:1181-1" title="Rhsa-2019:1181-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646781" id="1646781" title="Hardware: Microarchitectural Store Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646784" id="1646784" title="Hardware: Microarchitectural Fill Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667782" id="1667782" title="Hardware: Micro-Architectural Load Port Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705312" id="1705312" title="Hardware: Microarchitectural Data Sampling " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1267-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) 
* Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) 
* Mozilla: Type confusion with object groups and UnboxedObjects (CVE-2019-9816) 
* Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) 
* Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) 
* Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) 
* Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) 
* Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) 
* Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) 
* mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) 
* chromium-browser: Out of bounds read in Skia (CVE-2019-5798) 
* Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) 
* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-05-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_10" src="firefox-60.7.0-1.el6_10.src.rpm" version="60.7.0"><filename>firefox-60.7.0-1.el6_10.i686.rpm</filename><sum type="sha256">f9b6070513611a29f87cbaee4f54f91eb13ca6ed35c086d2896078e056b46c0c</sum></package><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-60.7.0-1.el6_10.src.rpm" version="60.7.0"><filename>firefox-60.7.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">61d59fb2f6d9cc2a10c17a5d13732bae2beba8094a2f8838e72319ebc7cebdc5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1267" id="RHSA-2019:1267-1" title="Rhsa-2019:1267-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1310-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) 
* Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) 
* Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) 
* Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) 
* Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) 
* Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) 
* Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) 
* Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) 
* mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) 
* chromium-browser: Out of bounds read in Skia (CVE-2019-5798) 
* Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) 
* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-06-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-60.7.0-1.el6_10.src.rpm" version="60.7.0"><filename>thunderbird-60.7.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">40874a273d1dbb5d572234059b0f1972e556e6cc17b4737e773d6617d6b2486e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1310" id="RHSA-2019:1310-1" title="Rhsa-2019:1310-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1467-1</id><title>Python</title><description>Security Fix(es): 
* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-06-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-tools" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-tools-2.6.6-68.el6_10.x86_64.rpm</filename><sum type="sha256">ae60a0a67b28649fdfccf47e82cf7a1478ef4366470b7ba7e2ef6d66d4e476b0</sum></package><package arch="x86_64" name="python-libs" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-libs-2.6.6-68.el6_10.x86_64.rpm</filename><sum type="sha256">4bd26b0459506c5af78a160e863f483039a9aa5006de65793ff5c619815acf55</sum></package><package arch="i686" name="python-libs" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-libs-2.6.6-68.el6_10.i686.rpm</filename><sum type="sha256">31002791d54f57f740486204cb5198c111cb893ba0b7745a995e32c48f59619f</sum></package><package arch="i686" name="python" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-2.6.6-68.el6_10.i686.rpm</filename><sum type="sha256">2d4f74517c2184a4b67e00d75c93c273542f429a4658807dfec57f69c94cc6e3</sum></package><package arch="x86_64" name="python-test" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-test-2.6.6-68.el6_10.x86_64.rpm</filename><sum type="sha256">0d34dfc1b5ae9bbf61946e72020e078b1233e846a6a623be7d2c09837ab4f8d1</sum></package><package arch="i686" name="python-devel" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-devel-2.6.6-68.el6_10.i686.rpm</filename><sum type="sha256">72c2b019f40d91a9280ca52c10eac6fc8b2b6fd040e8e1c1b453f6bccccd530c</sum></package><package arch="x86_64" name="tkinter" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>tkinter-2.6.6-68.el6_10.x86_64.rpm</filename><sum type="sha256">9481c91914d979e50cee319c720fe7d055d904497da5e34ad9580f7aa7d13675</sum></package><package arch="x86_64" name="python" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-2.6.6-68.el6_10.x86_64.rpm</filename><sum type="sha256">b76f77316cc83c52486a8ef2e2f2d8b7fd42e003237ccedd3d8e1e5435faf470</sum></package><package arch="x86_64" name="python-devel" release="68.el6_10" src="python-2.6.6-68.el6_10.src.rpm" version="2.6.6"><filename>python-devel-2.6.6-68.el6_10.x86_64.rpm</filename><sum type="sha256">a2c91f917bd4cf7443bdaa0ef4bf803bcd046a890af7cbac41343233afaca74e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" id="CVE-2019-9636" title="Python: Information Disclosure Due To Urlsplit " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1467" id="RHSA-2019:1467-1" title="Rhsa-2019:1467-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688543" id="1688543" title="Python: Information Disclosure Due To Urlsplit " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1488-1</id><title>Kernel</title><description>Security Fix(es): 
* An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477) 
* kernel: Double free in lib/idr.c (CVE-2019-3896) 
* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478) 
* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479) 
Bug Fix(es): 
* MDS mitigations not enabled on Intel Skylake CPUs 
* kernel does not disable SMT with mds=full,nosmt 
* md_clear flag missing from /proc/cpuinfo</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-06-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.15.3.el6.noarch.rpm</filename><sum type="sha256">ebc1974ea07e5755fbff09deae0fe3511b2e96901867d6021b82e0570b3ca9a6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">dc009ba34c389d2f25c344021fff92af1b816b9ac78b57da6a28b2253477951c</sum></package><package arch="x86_64" name="perf" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">d47bdb6212850ddaad8cb59bbaf3ce2a842b81704cee9eb890bd6fbb01a9c52a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm</filename><sum type="sha256">a6bd088a6af90b68ba2988cb9577c87fd8f3c8e70587cff1a947bd9cb463c346</sum></package><package arch="x86_64" name="kernel-debug" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">26ec5d33e15f4f104ef01350deb8a07263e53bb9ad50af100ba97f50ee8f63fa</sum></package><package arch="x86_64" name="kernel-devel" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">839e341ec09a85dcb82922d83eba238616715458d782203557cc6faec107333c</sum></package><package arch="x86_64" name="python-perf" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">634933fc2a2088408fd6256e65c2d3c24cafb47bbf869957ce3f272aa46d7888</sum></package><package arch="x86_64" name="kernel-headers" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">73fd68abc73b0e3f1635da32a222ad0f307a01aa0ae0fd8e395c76f4f5bba99e</sum></package><package arch="noarch" name="kernel-firmware" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.15.3.el6.noarch.rpm</filename><sum type="sha256">6881f3ef3f48f6dfea8966f8b9c718ae4977ad23147944724c96415ba17ac068</sum></package><package arch="x86_64" name="kernel" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.15.3.el6.x86_64.rpm</filename><sum type="sha256">d69e5f5287f5036eca22f731c7774acaaa00c33c33039b7745645876c1ebae66</sum></package><package arch="i686" name="kernel-debug-devel" release="754.15.3.el6" src="kernel-2.6.32-754.15.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm</filename><sum type="sha256">c2784c078288ec70c7e7c53b7e95b49e439fe6ab903231d09a223d345ed381c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" id="CVE-2019-11477" title="Kernel: Tcp: Integer Overflow While Processing " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" id="CVE-2019-11478" title="Kernel: Tcp: Excessive Resource Consumption " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" id="CVE-2019-11479" title="Kernel: Tcp: Excessive Resource Consumption For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3896" id="CVE-2019-3896" title="Kernel: Double Free In Lib/Idr.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1488" id="RHSA-2019:1488-1" title="Rhsa-2019:1488-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1694812" id="1694812" title="Kernel: Double Free In Lib/Idr.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719123" id="1719123" title="Kernel: Tcp: Integer Overflow While Processing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719128" id="1719128" title="Kernel: Tcp: Excessive Resource Consumption " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719129" id="1719129" title="Kernel: Tcp: Excessive Resource Consumption For " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1492-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-06-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.3.x86_64.rpm</filename><sum type="sha256">506dfbc7fe56aea41a049c3463c1e47a082cbc7436a64706df1e471188914a61</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.3.x86_64.rpm</filename><sum type="sha256">ce02fc6b94a2476b19a7e746f47dcbde8eb46a91a49851ba40f328601b304282</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.68.rc1.el6_10.3.x86_64.rpm</filename><sum type="sha256">68003ee824b304d31f04a4a2f621cf52e8dcbb803eebc3c25cb428f1aa7c69de</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.3.i686.rpm</filename><sum type="sha256">81e8d339af4aee612849cbe1a162857657db5094cbfd905e339d3b621f835caa</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.68.rc1.el6_10.3.x86_64.rpm</filename><sum type="sha256">b064ccc680761c37ac3514b87ed91c0bb4ad73bf5ba1668c3fe2206b170179d2</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.3.i686.rpm</filename><sum type="sha256">b2bc7d8dd364662b9c9ec772603791be17092ecb3bcbbba8dd4d3088a967c928</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.68.rc1.el6_10.3.x86_64.rpm</filename><sum type="sha256">a53de58950130026b5ab35fb9e385a4c41b00e528ab6e54796a08cc91e525bcc</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.68.rc1.el6_10.3" src="bind-9.8.2-0.68.rc1.el6_10.3.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.68.rc1.el6_10.3.x86_64.rpm</filename><sum type="sha256">0d6bb2816ca766866af7ccae2ad2bfee9ad3e2a5b77def20c7c244f13b95493a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" id="CVE-2018-5743" title="Bind: Limiting Simultaneous Tcp Clients Is " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1492" id="RHSA-2019:1492-1" title="Rhsa-2019:1492-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702541" id="1702541" title="Bind: Limiting Simultaneous Tcp Clients Is " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1578-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) 
* libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) 
* libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) 
* libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-06-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libvirt" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-64.el6_10.2.x86_64.rpm</filename><sum type="sha256">a781e7ebb345513661f7df2a7f623cb28ec1120f09a1870e67ef5af6f36a7600</sum></package><package arch="x86_64" name="libvirt-python" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-64.el6_10.2.x86_64.rpm</filename><sum type="sha256">159f03f0fb66e57445d82f0d6e42f0db9b0a0be9969f6f7908c587d9b261717d</sum></package><package arch="i686" name="libvirt-devel" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-64.el6_10.2.i686.rpm</filename><sum type="sha256">7bae2df5101efc072b5dbe4af4e4f92796e251ca6be203da6416bedddab07232</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-64.el6_10.2.x86_64.rpm</filename><sum type="sha256">71864aba08db302e4feccecd2fd5c1f852a1a2874e7e98aa0136fbc4e0fd0e0c</sum></package><package arch="x86_64" name="libvirt-client" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-64.el6_10.2.x86_64.rpm</filename><sum type="sha256">0e95566e997ae431ac79c2137b600f5ed506938393be2c046e4a5c5d58b29604</sum></package><package arch="x86_64" name="libvirt-devel" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-64.el6_10.2.x86_64.rpm</filename><sum type="sha256">f25616b793dd3a94b53d8434d303adefff1968d4f10106461f0dbabf942f232a</sum></package><package arch="i686" name="libvirt-client" release="64.el6_10.2" src="libvirt-0.10.2-64.el6_10.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-64.el6_10.2.i686.rpm</filename><sum type="sha256">615765410c7a433b2bcca369eb4185b0bcbca4778ab1cf17badd1437f92f329e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" id="CVE-2019-10161" title="Libvirt: Arbitrary File Read/Exec Via " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1578" id="RHSA-2019:1578-1" title="Rhsa-2019:1578-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720115" id="1720115" title="Libvirt: Arbitrary File Read/Exec Via " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1604-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Type confusion in Array.pop (CVE-2019-11707) 
* Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-07-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_10" src="firefox-60.7.2-1.el6_10.src.rpm" version="60.7.2"><filename>firefox-60.7.2-1.el6_10.i686.rpm</filename><sum type="sha256">5762907e1106ae6354abc19222c247d1aedf8819e1e65e692af50549da91050a</sum></package><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-60.7.2-1.el6_10.src.rpm" version="60.7.2"><filename>firefox-60.7.2-1.el6_10.x86_64.rpm</filename><sum type="sha256">ff88b66d8d50de2216877ea630e00d564e9ca2cf7720d9f1297ea3e47423c40d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1604" id="RHSA-2019:1604-1" title="Rhsa-2019:1604-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1624-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Type confusion in Array.pop (CVE-2019-11707) 
* thunderbird: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c (CVE-2019-11705) 
* Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708) 
* thunderbird: Heap buffer over read in icalparser.c parser_get_next_char (CVE-2019-11703) 
* thunderbird: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c (CVE-2019-11704) 
* thunderbird: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c (CVE-2019-11706)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-07-02 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_10" src="thunderbird-60.7.2-2.el6_10.src.rpm" version="60.7.2"><filename>thunderbird-60.7.2-2.el6_10.x86_64.rpm</filename><sum type="sha256">7d4917505c5b40eec30c965fc4ee23580efb9d89d781c648932ccd01b0749c78</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1624" id="RHSA-2019:1624-1" title="Rhsa-2019:1624-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1650-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)</description><severity>low</severity><release>Scientific Linux Fermi</release><issued date="2019-07-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.4" src="qemu-kvm-0.12.1.2-2.506.el6_10.4.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.4.x86_64.rpm</filename><sum type="sha256">bf9a60570b2d7824a26f8c1d271a116c9f5845a2c220b96c3eadccf2982f64d6</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.4" src="qemu-kvm-0.12.1.2-2.506.el6_10.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.4.x86_64.rpm</filename><sum type="sha256">e2ee69717810444b8c91026a0d476a465e8f675c3bc0aefd3c215be0f7901ebe</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.4" src="qemu-kvm-0.12.1.2-2.506.el6_10.4.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.4.x86_64.rpm</filename><sum type="sha256">8a6a1d17ed974161e7f061c5264e381f054e5a0afd1da09b2832d9088cc40265</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.4" src="qemu-kvm-0.12.1.2-2.506.el6_10.4.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.4.x86_64.rpm</filename><sum type="sha256">54a43dc9b8c2d8a1f9119e0ee7b2e080f9c1bb999db733ea7aecac7b0cdf7bf4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" id="CVE-2019-9824" title="Qemu: Slirp: Information Leakage In Tcp_Emu() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1650" id="RHSA-2019:1650-1" title="Rhsa-2019:1650-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1678515" id="1678515" title="Qemu: Slirp: Information Leakage In Tcp_Emu() " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1652-1</id><title>Libssh2</title><description>Security Fix(es): 
* libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855) 
* libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856) 
* libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857) 
* libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-07-09 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libssh2" release="3.el6_10.1" src="libssh2-1.4.2-3.el6_10.1.src.rpm" version="1.4.2"><filename>libssh2-1.4.2-3.el6_10.1.x86_64.rpm</filename><sum type="sha256">4096002e60ef612762224a3746f8561e89aa32734c7a4bde4cfe0e55f61637ef</sum></package><package arch="i686" name="libssh2-devel" release="3.el6_10.1" src="libssh2-1.4.2-3.el6_10.1.src.rpm" version="1.4.2"><filename>libssh2-devel-1.4.2-3.el6_10.1.i686.rpm</filename><sum type="sha256">c24fbf4975007cbc746bf3617fff9ef4f142f50a62f7b4d47da518835c79a1ae</sum></package><package arch="i686" name="libssh2" release="3.el6_10.1" src="libssh2-1.4.2-3.el6_10.1.src.rpm" version="1.4.2"><filename>libssh2-1.4.2-3.el6_10.1.i686.rpm</filename><sum type="sha256">237279527bd8da3b53a126e327aa5491f29e1ac8b0cd8f6ac37bbc1017ae4b63</sum></package><package arch="x86_64" name="libssh2-devel" release="3.el6_10.1" src="libssh2-1.4.2-3.el6_10.1.src.rpm" version="1.4.2"><filename>libssh2-devel-1.4.2-3.el6_10.1.x86_64.rpm</filename><sum type="sha256">9760bf3d1d273631d59429c84387bbd6061141f7a3be5ba855c355d7b548c3b6</sum></package><package arch="x86_64" name="libssh2-docs" release="3.el6_10.1" src="libssh2-1.4.2-3.el6_10.1.src.rpm" version="1.4.2"><filename>libssh2-docs-1.4.2-3.el6_10.1.x86_64.rpm</filename><sum type="sha256">af206f05e767c410b161c58779ba4bbc48b5e49fd1eda537d1046d173dba468c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" id="CVE-2019-3855" title="Libssh2: Integer Overflow In Transport Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" id="CVE-2019-3856" title="Libssh2: Integer Overflow In Keyboard " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" id="CVE-2019-3857" title="Libssh2: Integer Overflow In Ssh Packet " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" id="CVE-2019-3863" title="Libssh2: Integer Overflow In User Authenticate " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1652" id="RHSA-2019:1652-1" title="Rhsa-2019:1652-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687303" id="1687303" title="Libssh2: Integer Overflow In Transport Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687304" id="1687304" title="Libssh2: Integer Overflow In Keyboard " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687305" id="1687305" title="Libssh2: Integer Overflow In Ssh Packet " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687313" id="1687313" title="Libssh2: Integer Overflow In User Authenticate " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1726-1</id><title>Dbus</title><description>Security Fix(es): 
* dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-07-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="dbus" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-1.2.24-11.el6_10.x86_64.rpm</filename><sum type="sha256">f78ceed0bff4f65df92e5ac388f6be9277105fe4d0a324b302f6818e4311f248</sum></package><package arch="i686" epoch="1" name="dbus-devel" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-devel-1.2.24-11.el6_10.i686.rpm</filename><sum type="sha256">bb36e8baa228989d49c3fda19d44307151a34cbf14fedca4db2b0f266411a95f</sum></package><package arch="x86_64" epoch="1" name="dbus-x11" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-x11-1.2.24-11.el6_10.x86_64.rpm</filename><sum type="sha256">1950b835c40212a8eefac26115586a6283625d2004afb1937221317a7bd6b89d</sum></package><package arch="x86_64" epoch="1" name="dbus-devel" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-devel-1.2.24-11.el6_10.x86_64.rpm</filename><sum type="sha256">d020eb3f8dbec1a15a69299966f45a67fa55e931190ade4496db2bf5401db70f</sum></package><package arch="x86_64" epoch="1" name="dbus-libs" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-libs-1.2.24-11.el6_10.x86_64.rpm</filename><sum type="sha256">bba6d7011a2ff160668972c5f30153c9e86f55f63b5221c29ba8d0b906b54b78</sum></package><package arch="i686" epoch="1" name="dbus-libs" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-libs-1.2.24-11.el6_10.i686.rpm</filename><sum type="sha256">27c22a404a473302373f7dcc4da626e06c39ca936278d9812a20631eb9e7048a</sum></package><package arch="noarch" epoch="1" name="dbus-doc" release="11.el6_10" src="dbus-1.2.24-11.el6_10.src.rpm" version="1.2.24"><filename>dbus-doc-1.2.24-11.el6_10.noarch.rpm</filename><sum type="sha256">7e9688be22663b7e530f0c2a1771ee68259e26b3844abb638b7b01cd0b9bf396</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" id="CVE-2019-12749" title="Dbus: Dbusserver Dbus_Cookie_Sha1 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1726" id="RHSA-2019:1726-1" title="Rhsa-2019:1726-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719344" id="1719344" title="Dbus: Dbusserver Dbus_Cookie_Sha1 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1765-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.8.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) 
* Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) 
* Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) 
* Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) 
* Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) 
* Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) 
* Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) 
* Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-07-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-60.8.0-1.el6_10.src.rpm" version="60.8.0"><filename>firefox-60.8.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">ec778924fc40f29cd2d196fbcb1ccd841da212e901e88ceb214837353119d732</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-60.8.0-1.el6_10.src.rpm" version="60.8.0"><filename>firefox-60.8.0-1.el6_10.i686.rpm</filename><sum type="sha256">2ab292bd861025002d2e6cf98cc65bec3154d5654cc07b18be7f005d43d6a3ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" id="CVE-2019-11709" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" id="CVE-2019-11711" title="Mozilla: Script Injection Within Domain Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" id="CVE-2019-11712" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" id="CVE-2019-11713" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" id="CVE-2019-11715" title="Mozilla: Html Parsing Error Can Contribute To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" id="CVE-2019-11717" title="Mozilla: Caret Character Improperly Escaped In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" id="CVE-2019-11730" title="Mozilla: Same-Origin Policy Treats All Files In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" id="CVE-2019-9811" title="Mozilla: Sandbox Escape Via Installation Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1765" id="RHSA-2019:1765-1" title="Rhsa-2019:1765-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728430" id="1728430" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728431" id="1728431" title="Mozilla: Script Injection Within Domain Through " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728432" id="1728432" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728433" id="1728433" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728434" id="1728434" title="Mozilla: Html Parsing Error Can Contribute To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728435" id="1728435" title="Mozilla: Caret Character Improperly Escaped In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728438" id="1728438" title="Mozilla: Same-Origin Policy Treats All Files In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728439" id="1728439" title="Mozilla: Sandbox Escape Via Installation Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1774-1</id><title>Vim</title><description>Security Fix(es): 
* vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-07-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="vim-common" release="5.el6_10.2" src="vim-7.4.629-5.el6_10.2.src.rpm" version="7.4.629"><filename>vim-common-7.4.629-5.el6_10.2.x86_64.rpm</filename><sum type="sha256">d940d207c4306479b8fd5b62cbe610d304916f976c02024880c1287c1a7b5e09</sum></package><package arch="x86_64" epoch="2" name="vim-filesystem" release="5.el6_10.2" src="vim-7.4.629-5.el6_10.2.src.rpm" version="7.4.629"><filename>vim-filesystem-7.4.629-5.el6_10.2.x86_64.rpm</filename><sum type="sha256">d2af667c8a90ec7ee4b5bfc7c9452275c4f569ec01e4bb94a4e2b5b4ba14ead8</sum></package><package arch="x86_64" epoch="2" name="vim-minimal" release="5.el6_10.2" src="vim-7.4.629-5.el6_10.2.src.rpm" version="7.4.629"><filename>vim-minimal-7.4.629-5.el6_10.2.x86_64.rpm</filename><sum type="sha256">3a1414cb65d4c8e42b08cbe7237436712167cd772fb3a3b4ecab178a0edc2250</sum></package><package arch="x86_64" epoch="2" name="vim-X11" release="5.el6_10.2" src="vim-7.4.629-5.el6_10.2.src.rpm" version="7.4.629"><filename>vim-X11-7.4.629-5.el6_10.2.x86_64.rpm</filename><sum type="sha256">8b215eeca633e3baf0450e2c3f27f98af032a568d75e286cc7ed91cde98c26ee</sum></package><package arch="x86_64" epoch="2" name="vim-enhanced" release="5.el6_10.2" src="vim-7.4.629-5.el6_10.2.src.rpm" version="7.4.629"><filename>vim-enhanced-7.4.629-5.el6_10.2.x86_64.rpm</filename><sum type="sha256">b529967e49d68a3381c4a1f30953d9357284c175b7bfe40a0c039f128f3b6af8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" id="CVE-2019-12735" title="Vim/Neovim: ':Source!' Command Allows Arbitrary " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1774" id="RHSA-2019:1774-1" title="Rhsa-2019:1774-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718308" id="1718308" title="Vim/Neovim: ':Source!' Command Allows Arbitrary " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1777-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.8.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) 
* Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) 
* Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) 
* Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) 
* Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) 
* Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) 
* Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) 
* Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-07-23 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-60.8.0-1.el6_10.src.rpm" version="60.8.0"><filename>thunderbird-60.8.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">c4628a4fc17acc8f2f970e279da872eb08fa96b89f29ab49868beb7fe09559ee</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" id="CVE-2019-11709" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" id="CVE-2019-11711" title="Mozilla: Script Injection Within Domain Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" id="CVE-2019-11712" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" id="CVE-2019-11713" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" id="CVE-2019-11715" title="Mozilla: Html Parsing Error Can Contribute To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" id="CVE-2019-11717" title="Mozilla: Caret Character Improperly Escaped In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" id="CVE-2019-11730" title="Mozilla: Same-Origin Policy Treats All Files In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" id="CVE-2019-9811" title="Mozilla: Sandbox Escape Via Installation Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1777" id="RHSA-2019:1777-1" title="Rhsa-2019:1777-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728430" id="1728430" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728431" id="1728431" title="Mozilla: Script Injection Within Domain Through " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728432" id="1728432" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728433" id="1728433" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728434" id="1728434" title="Mozilla: Html Parsing Error Can Contribute To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728435" id="1728435" title="Mozilla: Caret Character Improperly Escaped In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728438" id="1728438" title="Mozilla: Same-Origin Policy Treats All Files In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728439" id="1728439" title="Mozilla: Sandbox Escape Via Installation Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1811-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) 
* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) 
* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) 
* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) 
* OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) 
* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-08-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el6_10.noarch.rpm</filename><sum type="sha256">7fcf1eab81210329d4ec323669b49cbb86320a0315e6fe9f00846ac538081cd2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">80c5d825f04dcb17a8e42f7548df416905fdabb2aec5626a432f09350918e465</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">3d8fc8a15c2759a7a2a1b2b378d5fcbc1e496b9e8a4427f579c011db7bb7670a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">e3661e9e32b1d091bcddfaf05b91384383c7a1e9b713466d57868db34adc9fcc</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el6_10.noarch.rpm</filename><sum type="sha256">fedb7e6431bb0d13c67dfc05556ad81b3a96f3df5baa7ee90f2cd87b474e042d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-src-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">6c7a9ce19acccabd719ff1d4f463832a509ddaf1df3884edd23e186827558689</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">a0ff1ac5da218cf670beebd3b9b2e546b22791df37801c0a24a70c4f131aaa16</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">a2e1aa563812a1246136453e85437d786a732c4bce3e6fd09456f8820b160af6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">d55c6c07d6edaf525730f8993464277168922dc698e01dffaecec1202111c26d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">8ef3b55312b835ca5df831827320181642cdb26ec2a0954cd0ac4dc039bf8114</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">ed88351bc763f814525fb4b342d6886cfc826cf927b17c861fa56d053db41957</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-1.8.0.222.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">2f6b6bcb52eeff83c026b70b25493fcbd9c85d8e54f62b605293bc5377f8c540</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" id="CVE-2019-2745" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" id="CVE-2019-2762" title="Openjdk: Insufficient Checks Of Suppressed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" id="CVE-2019-2769" title="Openjdk: Unbounded Memory Allocation During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" id="CVE-2019-2786" title="Openjdk: Insufficient Restriction Of Privileges " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" id="CVE-2019-2816" title="Openjdk: Missing Url Format Validation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" id="CVE-2019-2842" title="Openjdk: Missing Array Bounds Check In Crypto " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1811" id="RHSA-2019:1811-1" title="Rhsa-2019:1811-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730056" id="1730056" title="Openjdk: Unbounded Memory Allocation During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730099" id="1730099" title="Openjdk: Missing Url Format Validation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730110" id="1730110" title="Openjdk: Missing Array Bounds Check In Crypto " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730255" id="1730255" title="Openjdk: Insufficient Restriction Of Privileges " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730411" id="1730411" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730415" id="1730415" title="Openjdk: Insufficient Checks Of Suppressed " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1840-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) 
* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) 
* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) 
* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) 
* OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) 
* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-08-06 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.19.1.el6_10" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el6_10.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el6_10.x86_64.rpm</filename><sum type="sha256">3b8e64e17ecc820b4e503be60a56415e80ad1dba7751a862931611b385722cf5</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.19.1.el6_10" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el6_10.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el6_10.x86_64.rpm</filename><sum type="sha256">404880502c6ceb4d0143cec2f79477e4ff836f26d385ccf9e458e452b7f2e564</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.19.1.el6_10" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el6_10.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el6_10.x86_64.rpm</filename><sum type="sha256">e0099a7709997d1956a246e24f12ce71b9cef9b9e879f8686b0dfc0d3c12faf8</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.19.1.el6_10" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el6_10.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el6_10.x86_64.rpm</filename><sum type="sha256">07fe7c07c8a5b78b01c7fe65afead6ce48bf8293fc1dad5208414e503e1797a8</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.19.1.el6_10" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el6_10.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el6_10.noarch.rpm</filename><sum type="sha256">1deac5b3b6d3b2b55bdcb848981c61d8f4196eb01b23fdb2de3e5ee47e7a10f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" id="CVE-2019-2745" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" id="CVE-2019-2762" title="Openjdk: Insufficient Checks Of Suppressed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" id="CVE-2019-2769" title="Openjdk: Unbounded Memory Allocation During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" id="CVE-2019-2786" title="Openjdk: Insufficient Restriction Of Privileges " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" id="CVE-2019-2816" title="Openjdk: Missing Url Format Validation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" id="CVE-2019-2842" title="Openjdk: Missing Array Bounds Check In Crypto " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1840" id="RHSA-2019:1840-1" title="Rhsa-2019:1840-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730056" id="1730056" title="Openjdk: Unbounded Memory Allocation During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730099" id="1730099" title="Openjdk: Missing Url Format Validation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730110" id="1730110" title="Openjdk: Missing Array Bounds Check In Crypto " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730255" id="1730255" title="Openjdk: Insufficient Restriction Of Privileges " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730411" id="1730411" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730415" id="1730415" title="Openjdk: Insufficient Checks Of Suppressed " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2471-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: 0-byte record padding oracle (CVE-2019-1559) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-08-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="openssl" release="58.el6_10" src="openssl-1.0.1e-58.el6_10.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-58.el6_10.i686.rpm</filename><sum type="sha256">f72d77100dd96a17ebac2a4f1c9dfebe87ddb6058c9c53ec5e0159a7563c0039</sum></package><package arch="x86_64" name="openssl-devel" release="58.el6_10" src="openssl-1.0.1e-58.el6_10.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-58.el6_10.x86_64.rpm</filename><sum type="sha256">cf5b36712c10e435f4126e8a2fcfba86c2bf5067f44e2f2eae9e552b43213b57</sum></package><package arch="x86_64" name="openssl-static" release="58.el6_10" src="openssl-1.0.1e-58.el6_10.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-58.el6_10.x86_64.rpm</filename><sum type="sha256">c41035964a649103c08f4ffdf7cc250a510e4e3c2e36608815cd9a0e3ae08355</sum></package><package arch="i686" name="openssl-devel" release="58.el6_10" src="openssl-1.0.1e-58.el6_10.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-58.el6_10.i686.rpm</filename><sum type="sha256">d96d5fd130f2ef9e60e1959f2913cf9c1b77059ff37edd1b17afb10ad4ca1a7a</sum></package><package arch="x86_64" name="openssl-perl" release="58.el6_10" src="openssl-1.0.1e-58.el6_10.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-58.el6_10.x86_64.rpm</filename><sum type="sha256">d56a24c0d129c1e224230124e1e1ca9e3e8e918e6a1c453aafb4da5a38f5dd4c</sum></package><package arch="x86_64" name="openssl" release="58.el6_10" src="openssl-1.0.1e-58.el6_10.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-58.el6_10.x86_64.rpm</filename><sum type="sha256">862bceed662e0b09478d130137d5ffb82a5d3cd560a0580c4493f8173b337640</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" id="CVE-2019-1559" title="Cve-2019-1559" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2471" id="RHSA-2019:2471-1" title="Rhsa-2019:2471-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683804" id="1683804" title="Cve-2019-1559 Openssl: 0-Byte Record Padding Oracle" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2473-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: page cache side channel attacks (CVE-2019-5489) 
* kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service (CVE-2017-17805) 
* kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) 
* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE  
Bug Fix(es): 
* OOPS with Null Pointer exception in v4l2_ctrl_query_menu when second arg of function is NULL 
* Another SL 6 hang in congestion_wait() 
* kernel crash after running user space script 
* SL-6.10: Don't report the use of retpoline on Skylake as vulnerable 
* Bad pagetable: 000f &#8220;*pdpt = 0000000000000000 *pde = 0000000000000000&#8221; SL 6 32bit 
* fs/binfmt_misc.c: do not allow offset overflow [6.10.z] 
* Wrong spectre backport causing linux headers to break compilation of 3rd party packages</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-08-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpm</filename><sum type="sha256">40f7bc1add242616107d74280208eb47229e5b1cff19a8501290290d24201872</sum></package><package arch="x86_64" name="kernel-debug" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">f4deb38d1f4777e01f3cc72348ac151406437e33aaa6764839884532b01e21ea</sum></package><package arch="x86_64" name="kernel-devel" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">3b6a12fe8f337ae43eafc06339ac5c9133d7f8fe3a465290db43ba28a18ef5b9</sum></package><package arch="x86_64" name="python-perf" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">68ed3febf5aebb422b4997c864681fbdba7813aa4e6bf3a1a6242bdfad642e29</sum></package><package arch="x86_64" name="kernel-headers" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">cc6d12ad6883585432e80a8fa5d142388086a4aeff815969f6b6dedfb4f7101f</sum></package><package arch="x86_64" name="perf" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">923d34203dacc0959948dd4072fe1f9bb37aa2bb77c23d3c03690b031d183dbc</sum></package><package arch="i686" name="kernel-debug-devel" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm</filename><sum type="sha256">f76919575011397b851f03fb1e220b0ff25da5766707255f5c7de9fcacfb2f80</sum></package><package arch="noarch" name="kernel-doc" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.18.2.el6.noarch.rpm</filename><sum type="sha256">8c87207a6731978c78d7cb69b184947d8e529594b3a2992a7c1569e930693d04</sum></package><package arch="noarch" name="kernel-firmware" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm</filename><sum type="sha256">b4249a50dc5aff45878a137f33c62879f22ff8466f84d3efe29106adb5725164</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">894f4169c4374a634687643f035483a964698d5d0156898d47d61b5ba935f7c2</sum></package><package arch="x86_64" name="kernel" release="754.18.2.el6" src="kernel-2.6.32-754.18.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.18.2.el6.x86_64.rpm</filename><sum type="sha256">b28e5bd36aa4a50c08e1ce16852afbd0e95f151bb5e52cbbe9d2176a4c2adca1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" id="CVE-2017-17805" title="Kernel: Salsa20 Encryption Algorithm Does Not " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972" id="CVE-2018-17972" title="Kernel: Unprivileged Users Able To Inspect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" id="CVE-2019-1125" title="Cve-2019-1125" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" id="CVE-2019-5489" title="Cve-2019-5489" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2473" id="RHSA-2019:2473-1" title="Rhsa-2019:2473-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528312" id="1528312" title="Kernel: Salsa20 Encryption Algorithm Does Not " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636349" id="1636349" title="Kernel: Unprivileged Users Able To Inspect " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664110" id="1664110" title="Cve-2019-5489 Kernel: Page Cache Side Channel Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724389" id="1724389" title="Kernel: Hw: Spectre Swapgs Gadget Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2694-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Sandbox escape through Firefox Sync (CVE-2019-9812) 
* Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) 
* Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) 
* Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) 
* Mozilla: Use-after-free while manipulating video (CVE-2019-11746) 
* Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) 
* firefox: stored passwords in 'Saved Logins' can be copied without master password entry (CVE-2019-11733) 
* Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-09-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_10" src="firefox-60.9.0-1.el6_10.src.rpm" version="60.9.0"><filename>firefox-60.9.0-1.el6_10.i686.rpm</filename><sum type="sha256">18b7756ef97146864408131e251fc019c3d636f163f0a6abd317d9e5ae088605</sum></package><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-60.9.0-1.el6_10.src.rpm" version="60.9.0"><filename>firefox-60.9.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">d3dff21bcb67ae834d94a3bdf5912a37c1c251dedca0903a8571854ddf3ecfbf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11733" id="CVE-2019-11733" title="Firefox: Stored Passwords In 'Saved Logins' Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" id="CVE-2019-11740" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" id="CVE-2019-11742" title="Mozilla: Same-Origin Policy Violation With Svg " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" id="CVE-2019-11743" title="Mozilla: Cross-Origin Access To Unload Event " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" id="CVE-2019-11744" title="Mozilla: Xss By Breaking Out Of Title And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" id="CVE-2019-11746" title="Mozilla: Use-After-Free While Manipulating Video" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" id="CVE-2019-11752" title="Mozilla: Use-After-Free While Extracting A Key " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" id="CVE-2019-9812" title="Mozilla: Sandbox Escape Through Firefox Sync" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2694" id="RHSA-2019:2694-1" title="Rhsa-2019:2694-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1745687" id="1745687" title="Firefox: Stored Passwords In 'Saved Logins' Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748652" id="1748652" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748653" id="1748653" title="Mozilla: Same-Origin Policy Violation With Svg " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748654" id="1748654" title="Mozilla: Cross-Origin Access To Unload Event " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748655" id="1748655" title="Mozilla: Xss By Breaking Out Of Title And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748656" id="1748656" title="Mozilla: Use-After-Free While Manipulating Video" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748657" id="1748657" title="Mozilla: Use-After-Free While Extracting A Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748660" id="1748660" title="Mozilla: Sandbox Escape Through Firefox Sync" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2736-1</id><title>Kernel</title><description>Security Fix(es):          * kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)          * kernel: a NULL pointer dereference in     drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)          Bug Fix(es):          * fragmented packets timing out          * Backport TCP follow-up for small buffers</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-09-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">02143d476dd70b09abe2ba61f783a129760dc5e33cfca3eb5f7fb7cceb4642e7</sum></package><package arch="noarch" name="kernel-firmware" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.22.1.el6.noarch.rpm</filename><sum type="sha256">dbdc8a9cb94f0610c942238f40ca385f25a2c6ef786bb3ca740f3f334275739f</sum></package><package arch="noarch" name="kernel-doc" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.22.1.el6.noarch.rpm</filename><sum type="sha256">f6e8d330c588d48a1aea904943f917501bdad44202571e24def6df88cdde299c</sum></package><package arch="x86_64" name="python-perf" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">ce939d3c187014ef3b8d40eaae8913142e0020d8f0908d3a5be12c156d05f8a9</sum></package><package arch="x86_64" name="kernel-headers" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">0c218121c4a29e072b9a9d30a372bb56f1765e29e10fb059832381132a8114ce</sum></package><package arch="i686" name="kernel-debug-devel" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.22.1.el6.i686.rpm</filename><sum type="sha256">2ed5c02faaf280d97208fb8a5782976c9969eff337539a58d8ddf2da02107724</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">def0d2cad76b852b93bdc84ac97ff7345203a4f65fa1a6c9970b6d89d58a94d1</sum></package><package arch="x86_64" name="kernel" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">47c1d7cfe351fe3263eb2cfe30a345f73bcd9f8d78440ba18bfb88472525446d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.22.1.el6.noarch.rpm</filename><sum type="sha256">28a86a186d10f19e5545509ced59f132c75fc6e984ce77dcd7737d129d6b6264</sum></package><package arch="x86_64" name="kernel-debug" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">3a6ec1d45fe1c050ccd670fce5a07912ab1eb97eb994bb738159c4ad8e7e8644</sum></package><package arch="x86_64" name="perf" release="754.22.1.el6" src="kernel-2.6.32-754.22.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.22.1.el6.x86_64.rpm</filename><sum type="sha256">83840421f0fa0e96c1993bddc40386fed73a0fe709d521b329f44759268f1ab5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:2736" id="RHSA-2019:2736-1" title="Rhsa-2019:2736-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2807-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.9.0. 
Security Fix(es): 
* Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message (CVE-2019-11739) 
* Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) 
* Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) 
* Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) 
* Mozilla: Use-after-free while manipulating video (CVE-2019-11746) 
* Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) 
* Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-09-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-60.9.0-1.el6_10.src.rpm" version="60.9.0"><filename>thunderbird-60.9.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">77af7f68807931327f3e68614ee41384442e88321a8015e1553eb55254191fc2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11739" id="CVE-2019-11739" title="Mozilla: Covert Content Attack On S/Mime " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" id="CVE-2019-11740" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" id="CVE-2019-11742" title="Mozilla: Same-Origin Policy Violation With Svg " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" id="CVE-2019-11743" title="Mozilla: Cross-Origin Access To Unload Event " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" id="CVE-2019-11744" title="Mozilla: Xss By Breaking Out Of Title And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" id="CVE-2019-11746" title="Mozilla: Use-After-Free While Manipulating Video" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" id="CVE-2019-11752" title="Mozilla: Use-After-Free While Extracting A Key " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2807" id="RHSA-2019:2807-1" title="Rhsa-2019:2807-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748652" id="1748652" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748653" id="1748653" title="Mozilla: Same-Origin Policy Violation With Svg " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748654" id="1748654" title="Mozilla: Cross-Origin Access To Unload Event " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748655" id="1748655" title="Mozilla: Xss By Breaking Out Of Title And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748656" id="1748656" title="Mozilla: Use-After-Free While Manipulating Video" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748657" id="1748657" title="Mozilla: Use-After-Free While Extracting A Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752307" id="1752307" title="Mozilla: Covert Content Attack On S/Mime " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2863-1</id><title>Kernel</title><description>Security Fix(es): 
* A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-10-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-abi-whitelists" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.23.1.el6.noarch.rpm</filename><sum type="sha256">30b641fcb0fac4e7afafe495efa54ce97cf00e08a8d20f4282d627cb4778bef3</sum></package><package arch="x86_64" name="kernel" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">fe3063123520e027e434aaa4556c3a823556883d9758ee24190d5b717288cdcb</sum></package><package arch="noarch" name="kernel-doc" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.23.1.el6.noarch.rpm</filename><sum type="sha256">fc5f56359a8e3dc1ed19f769803abccf8a3545537655b039d66bdf0bc1223dd4</sum></package><package arch="i686" name="kernel-debug-devel" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.23.1.el6.i686.rpm</filename><sum type="sha256">287692bea8f530aa95d329c4c8c2e3f2ec62a408fa9ece7df2137e89d1bc7ad9</sum></package><package arch="x86_64" name="python-perf" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">d9516e951ac3c990e40dab6b1ec44322f348b3b1ab34330dff206e0040a39786</sum></package><package arch="x86_64" name="kernel-devel" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">f21bc73477acdec2174071288b26802cb9b48d0a543f4b7ca5f0352c4d1bbff0</sum></package><package arch="x86_64" name="kernel-debug" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">cfc89754e9df101453c43cb07330a4a7f79a5272cb84809cdc000f51fde01c72</sum></package><package arch="x86_64" name="perf" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">ff64c885a5a81643ef445e4fdcf0d01dd4b42634cb9c8f06e8145ae945e94162</sum></package><package arch="noarch" name="kernel-firmware" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.23.1.el6.noarch.rpm</filename><sum type="sha256">dbc6d52137509ae28af877af780e07dce4b2cc4d9f370bece38af6e7fb4fea54</sum></package><package arch="x86_64" name="kernel-headers" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">3c726244d5f13547d1b2eb2cec2a233e107c7befa0051cde169604a09648ca9d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.23.1.el6" src="kernel-2.6.32-754.23.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.23.1.el6.x86_64.rpm</filename><sum type="sha256">d4576c253fb5e49b0be3c9aedf9799d9c65f6074eff74b34d9f1078ea220dc43</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835" id="CVE-2019-14835" title="Kernel: Vhost-Net: Guest To Host Kernel Escape " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2863" id="RHSA-2019:2863-1" title="Rhsa-2019:2863-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1750727" id="1750727" title="Kernel: Vhost-Net: Guest To Host Kernel Escape " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2885-1</id><title>Dovecot</title><description>* dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes (CVE-2019-11500)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-10-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" epoch="1" name="dovecot" release="22.el6_10.1" src="dovecot-2.0.9-22.el6_10.1.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-22.el6_10.1.i686.rpm</filename><sum type="sha256">e181d5a3a17fdd37c0911bf8495ded4c46b035c7459ac38fdc2c7041c83fea23</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="22.el6_10.1" src="dovecot-2.0.9-22.el6_10.1.src.rpm" version="2.0.9"><filename>dovecot-pigeonhole-2.0.9-22.el6_10.1.x86_64.rpm</filename><sum type="sha256">f86c2a5d5631dfacabe2cc8284aa345cd1f8307c8978fc156c760b8e74057a1d</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="22.el6_10.1" src="dovecot-2.0.9-22.el6_10.1.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-22.el6_10.1.x86_64.rpm</filename><sum type="sha256">bb1cda5df35131a8ffa698f266e26c840e39a4ddfca14a2f89c4e070597002be</sum></package><package arch="x86_64" epoch="1" name="dovecot-devel" release="22.el6_10.1" src="dovecot-2.0.9-22.el6_10.1.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-22.el6_10.1.x86_64.rpm</filename><sum type="sha256">8c3c06844ae1d5bb68148980fbc1be94a6fcf616f256461267aa9c07b3cd8cf1</sum></package><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="22.el6_10.1" src="dovecot-2.0.9-22.el6_10.1.src.rpm" version="2.0.9"><filename>dovecot-pgsql-2.0.9-22.el6_10.1.x86_64.rpm</filename><sum type="sha256">ac50497add8c533d5ce6d3f1234a25beb9f0f31e632e77a443f4e7c565d5f18c</sum></package><package arch="x86_64" epoch="1" name="dovecot-mysql" release="22.el6_10.1" src="dovecot-2.0.9-22.el6_10.1.src.rpm" version="2.0.9"><filename>dovecot-mysql-2.0.9-22.el6_10.1.x86_64.rpm</filename><sum type="sha256">b0b6773e02517450b9d060c3ef5fa0074429fdc7ed3d3cd4f691bf208ec323d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11500" id="CVE-2019-11500" title="Dovecot: Improper Null Byte Handling In Imap " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2885" id="RHSA-2019:2885-1" title="Rhsa-2019:2885-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1741141" id="1741141" title="Dovecot: Improper Null Byte Handling In Imap " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2892-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams (CVE-2018-11806) 
* QEMU: slirp: heap buffer overflow in tcp_emu() (CVE-2019-6778) 
* QEMU: ne2000: integer overflow leads to buffer overflow issue (CVE-2018-10839) 
* QEMU: pcnet: integer overflow leads to buffer overflow (CVE-2018-17962) 
* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-10-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.5" src="qemu-kvm-0.12.1.2-2.506.el6_10.5.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.5.x86_64.rpm</filename><sum type="sha256">2d64f3d46858e6deef062ddbc83761b8567e432584907db9b640bff29acb949a</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.5" src="qemu-kvm-0.12.1.2-2.506.el6_10.5.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.5.x86_64.rpm</filename><sum type="sha256">c9a9a4051b5c2583d3892e237bff35d222ea7fd327f00f31b32c6f5a015f7410</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.5" src="qemu-kvm-0.12.1.2-2.506.el6_10.5.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.5.x86_64.rpm</filename><sum type="sha256">db39ac6e8b3cb1ec0399d7bc58cfbbe7f2ad3b431c881e3bb6ce3a91b15551b2</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.5" src="qemu-kvm-0.12.1.2-2.506.el6_10.5.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.5.x86_64.rpm</filename><sum type="sha256">fb32d1617bc78b502d035cd08a124802f05389e9dad110cfd7cd8abd8f6f0bcc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839" id="CVE-2018-10839" title="Qemu: Ne2000: Integer Overflow Leads To Buffer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" id="CVE-2018-11806" title="Qemu: Slirp: Heap Buffer Overflow While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962" id="CVE-2018-17962" title="Qemu: Pcnet: Integer Overflow Leads To Buffer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" id="CVE-2019-12155" title="Qemu: Qxl: Null Pointer Dereference While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" id="CVE-2019-6778" title="Qemu: Slirp: Heap Buffer Overflow In Tcp_Emu()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2892" id="RHSA-2019:2892-1" title="Rhsa-2019:2892-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581013" id="1581013" title="Qemu: Ne2000: Integer Overflow Leads To Buffer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1586245" id="1586245" title="Qemu: Slirp: Heap Buffer Overflow While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636773" id="1636773" title="Qemu: Pcnet: Integer Overflow Leads To Buffer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664205" id="1664205" title="Qemu: Slirp: Heap Buffer Overflow In Tcp_Emu()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712670" id="1712670" title="Qemu: Qxl: Null Pointer Dereference While " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3136-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) 
* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) 
* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) 
* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) 
* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) 
* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) 
* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) 
* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) 
* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) 
* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) 
* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) 
* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) 
* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) 
* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-10-22 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">70a858434757339e660f7959f20f763405a5c6a97a34392eba6856937d6e388a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">352f46e622eb074f396c5c1300bb0f4e409401365278505258ecf1e5bfd1c633</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">0532495ba9e50ef9430be36f5f606bc695dc2e6113f3a2b8b676dbbac269cefd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">fcb8abbd34e4be3eea09ff6b551ad0fb1d39c44a4b5b52843c0713a86696d45a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">d877a81250515dcc0cf802f4b3fdafa64c975b3a1bc2b3d8aa0b40c17898f4be</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">c1bb5c63ab75d34b27915da5fbab908b238cf6fb18366024effe41740688ff49</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">cbdb58aa7978a5449c97a09ada185b736a981246ddb7a1743f4d7b9e39da7662</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-src-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">3ecd6e0b50bc2efc1b0a5432412ba9729395bc0e4c2cd72330fc17058463c4c9</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-1.el6_10.noarch.rpm</filename><sum type="sha256">c8fdb685e302cef81cc332755ca32e0b51f62b01a23cae319b773fc4117fec52</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">1707e53296048275f30323b319cf8c4b71a2098aee1f3d9daf60403f64981d16</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.x86_64.rpm</filename><sum type="sha256">0cbaf1f66f271eb5cb66357d70bdb5fa746cb8b21c07581f7adcf84d87de0cfb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.232.b09-1.el6_10.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.232.b09-1.el6_10.noarch.rpm</filename><sum type="sha256">980bf7a6a1d786f686158f80532419d0bfbc7bfa4f1a441c956f96ae81670d31</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945" id="CVE-2019-2945" title="Openjdk: Missing Restrictions On Use Of Custom " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949" id="CVE-2019-2949" title="Openjdk: Improper Handling Of Kerberos Proxy " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962" id="CVE-2019-2962" title="Openjdk: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964" id="CVE-2019-2964" title="Openjdk: Unexpected Exception Thrown By Pattern " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973" id="CVE-2019-2973" title="Openjdk: Unexpected Exception Thrown By " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975" id="CVE-2019-2975" title="Openjdk: Unexpected Exception Thrown During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978" id="CVE-2019-2978" title="Openjdk: Incorrect Handling Of Nested Jar: Urls " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981" id="CVE-2019-2981" title="Openjdk: Unexpected Exception Thrown By Xpath " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983" id="CVE-2019-2983" title="Openjdk: Unexpected Exception Thrown During Font " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987" id="CVE-2019-2987" title="Openjdk: Missing Glyph Bitmap Image Dimension " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988" id="CVE-2019-2988" title="Openjdk: Integer Overflow In Bounds Check In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989" id="CVE-2019-2989" title="Openjdk: Incorrect Handling Of Http Proxy " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992" id="CVE-2019-2992" title="Openjdk: Excessive Memory Allocation In Cmap " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999" id="CVE-2019-2999" title="Openjdk: Insufficient Filtering Of Html Event " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3136" id="RHSA-2019:3136-1" title="Rhsa-2019:3136-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760963" id="1760963" title="Openjdk: Unexpected Exception Thrown By Pattern " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760969" id="1760969" title="Openjdk: Unexpected Exception Thrown During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760978" id="1760978" title="Openjdk: Unexpected Exception Thrown By " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760980" id="1760980" title="Openjdk: Unexpected Exception Thrown By Xpath " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760992" id="1760992" title="Openjdk: Insufficient Filtering Of Html Event " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760999" id="1760999" title="Openjdk: Integer Overflow In Bounds Check In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761006" id="1761006" title="Openjdk: Incorrect Handling Of Nested Jar: Urls " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761146" id="1761146" title="Openjdk: Excessive Memory Allocation In Cmap " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761149" id="1761149" title="Openjdk: Missing Glyph Bitmap Image Dimension " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761262" id="1761262" title="Openjdk: Unexpected Exception Thrown During Font " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761266" id="1761266" title="Openjdk: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761594" id="1761594" title="Openjdk: Improper Handling Of Kerberos Proxy " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761596" id="1761596" title="Openjdk: Missing Restrictions On Use Of Custom " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1761601" id="1761601" title="Openjdk: Incorrect Handling Of Http Proxy " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3158-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es):          * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler     (Networking, 8223892) (CVE-2019-2978)          * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection     (Networking, 8225298) (CVE-2019-2989)          * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking,     8218573) (CVE-2019-2945)          * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690)     (CVE-2019-2962)          * OpenJDK: Unexpected exception thrown by Pattern processing crafted     regular expression (Concurrency, 8222684) (CVE-2019-2964)          * OpenJDK: Unexpected exception thrown by XPathParser processing crafted     XPath expression (JAXP, 8223505) (CVE-2019-2973)          * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath     expression (JAXP, 8224532) (CVE-2019-2981)          * OpenJDK: Unexpected exception thrown during Font object deserialization     (Serialization, 8224915) (CVE-2019-2983)          * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler     (2D, 8225286) (CVE-2019-2987)          * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292)     (CVE-2019-2988)          * OpenJDK: Excessive memory allocation in CMap when reading TrueType font     (2D, 8225597) (CVE-2019-2992)          * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc     (Javadoc, 8226765) (CVE-2019-2999)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2019-10-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.20.0.el6_10" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el6_10.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el6_10.x86_64.rpm</filename><sum type="sha256">1a3fdb908e3889240d7f63ffe79347a7b6aed026861eca00a4968ab6f0d947dc</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.20.0.el6_10" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el6_10.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el6_10.x86_64.rpm</filename><sum type="sha256">3d226f5f0a53b699ceb7328b9fa53cf8a1ccd55bf0c159c90cec7286605bb458</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.20.0.el6_10" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el6_10.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el6_10.x86_64.rpm</filename><sum type="sha256">1e1e306165999c9e395d101ccf96676164cce3f99c794aec2101d43d1bde9c7d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.20.0.el6_10" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el6_10.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el6_10.x86_64.rpm</filename><sum type="sha256">85a24f638b0903877576b24cacfe05cf777aaa047e538c90422ba318a5b0880d</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.20.0.el6_10" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el6_10.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el6_10.noarch.rpm</filename><sum type="sha256">f11b5f289c40d212ad78b789e0c87076e9f30223cbe579418314a29139678cbb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3158" id="RHSA-2019:3158-1" title="Rhsa-2019:3158-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3281-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) 
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) 
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) 
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) 
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) 
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) 
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) 
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-11-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="4.el6_10" src="firefox-68.2.0-4.el6_10.src.rpm" version="68.2.0"><filename>firefox-68.2.0-4.el6_10.i686.rpm</filename><sum type="sha256">e2732af72e80e34ad78f7ff963c9f33d9ecccb956047d7fdeaa722cdb62360a7</sum></package><package arch="x86_64" name="firefox" release="4.el6_10" src="firefox-68.2.0-4.el6_10.src.rpm" version="68.2.0"><filename>firefox-68.2.0-4.el6_10.x86_64.rpm</filename><sum type="sha256">730a27d3f505918b9109901fcf37b1d3583a1425304d84cda6cf3cfad539d841</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" id="CVE-2019-11757" title="Mozilla: Use-After-Free When Creating Index " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" id="CVE-2019-11758" title="Mozilla: Potentially Exploitable Crash Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" id="CVE-2019-11759" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" id="CVE-2019-11760" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" id="CVE-2019-11761" title="Mozilla: Unintended Access To A Privileged " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" id="CVE-2019-11762" title="Mozilla: Document.Domain-Based Origin Isolation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" id="CVE-2019-11763" title="Mozilla: Incorrect Html Parsing Results In Xss " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" id="CVE-2019-11764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3281" id="RHSA-2019:3281-1" title="Rhsa-2019:3281-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764438" id="1764438" title="Mozilla: Use-After-Free When Creating Index " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764439" id="1764439" title="Mozilla: Potentially Exploitable Crash Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764440" id="1764440" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764441" id="1764441" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764442" id="1764442" title="Mozilla: Unintended Access To A Privileged " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764443" id="1764443" title="Mozilla: Document.Domain-Based Origin Isolation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764444" id="1764444" title="Mozilla: Incorrect Html Parsing Results In Xss " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764446" id="1764446" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3287-1</id><title>Php</title><description>Security Fix(es): 
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-11-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="php-devel" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">2efc8ada4d0f6bd15952e35daea4fe3699b2c6411afecf58234504244b91ec27</sum></package><package arch="x86_64" name="php" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">09a61aa1d74eabc9118259f4fc5d545fbdc563d32b43ca0883cd132d21070828</sum></package><package arch="x86_64" name="php-soap" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">282dedd428f952be72e73f215536259e140ce4399ce44d5dcc420c6c8ad4dfc0</sum></package><package arch="x86_64" name="php-ldap" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">983b66a76cc2c89e8de67a831c8729bfdbeeac10d4d8b1071974f640a512f488</sum></package><package arch="x86_64" name="php-imap" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">d3c8f8aa03d7e10cc32bdfb04c30eb8edf3682845ce26a56d6bd2847676c350a</sum></package><package arch="x86_64" name="php-dba" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">29ac19570cf44c55c50c4b57b4b1e9f8fa4f753f3e2f8f8f08ad6ddd439122a0</sum></package><package arch="x86_64" name="php-pdo" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">da57400c8267c1f6a0f29b9cc02c31ee2528be0b494893ad5a41b67f4a8f839d</sum></package><package arch="x86_64" name="php-intl" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">80a2199aadd92dcb4dd19d9067c1d796cb604ccf812d909a4852fe87f11bbac8</sum></package><package arch="x86_64" name="php-mbstring" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">c64b85d6c8d464155160fee0f87de2c4cdd781e84b98517956d56feafcbbbb93</sum></package><package arch="x86_64" name="php-recode" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">933d5f81cbb898ee9ab110c7711ad31076ac4ab65913e3c0bfb11d7d4dda5435</sum></package><package arch="x86_64" name="php-pspell" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">27bc4dbc6bdc37ff097f52e0a9f7163f2a4b7d4e7b1ad480fd6c48236db4713a</sum></package><package arch="x86_64" name="php-mysql" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">80b9aa8e6efa47167e95fdb4bd0a5aaef3b66232a461e2ff8df1ba4d3920bcdf</sum></package><package arch="x86_64" name="php-embedded" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">269ab8cbf6329ccd6c1def5a84f73b861e405d46538f398287dfc4514ba9835a</sum></package><package arch="x86_64" name="php-cli" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">6166d565eb0b5d88dc5e3d0fe580b2f9e80492c6ffb28a0f8c2fc130ba5db42b</sum></package><package arch="x86_64" name="php-pgsql" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">d8a85a3d01086d1cd32d0b9fb1cbc61f6085fbcd5a80a643f0b922497f513628</sum></package><package arch="x86_64" name="php-xmlrpc" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">f811864e3e05e4d3c5a0ff9104664b2350f4108ddd577a36e0405a00aa630749</sum></package><package arch="x86_64" name="php-tidy" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">65e4841da4dafe4936cf3c456e604316c141c2e2c234e94ba1154219f874ffc2</sum></package><package arch="x86_64" name="php-zts" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">6c080e8d43d5f82ee5c7db5b2cfec13dbe16d2181042bae97d7598d38cbf294b</sum></package><package arch="x86_64" name="php-enchant" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">4ec35da47c8612f49971430b10d5ebc9ada8f41d18d1c5fdd66d4db3fdbb89ed</sum></package><package arch="x86_64" name="php-bcmath" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">81d54e80df98a76d4648094a433e063969e0b95ee1fb097428189736db9bbdc7</sum></package><package arch="x86_64" name="php-snmp" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">89392573dae341b732536dc1efb4b824ca24ed0bf86a3cd2cdd6a68dc4eca86b</sum></package><package arch="x86_64" name="php-fpm" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">711f704be7c6093c333eadaff940a43e631e72d86440ecf40c6735ba39a8e192</sum></package><package arch="x86_64" name="php-xml" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">29d98c2b3264ff03c575c8f8ea46feff907253836721d3552bd040c7126103c1</sum></package><package arch="x86_64" name="php-process" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-process-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">461b8acaab6e5572e35e8285691b1ec3f431867fde8caba94b8b31433bd55446</sum></package><package arch="x86_64" name="php-gd" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">24042178795cd124f19e74eb772c30a0b362337e1e5e72f23e073bf70199c19b</sum></package><package arch="x86_64" name="php-odbc" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">1648349aa9659312e05399ecfb44d9c4297e4b486d939a5c9d62f2ac4ee98c55</sum></package><package arch="x86_64" name="php-common" release="50.el6_10" src="php-5.3.3-50.el6_10.src.rpm" version="5.3.3"><filename>php-common-5.3.3-50.el6_10.x86_64.rpm</filename><sum type="sha256">e89cbd68595eca2f82280807eed98945c6e5ffce04cbcf822b98b2a940a3cf83</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043" id="CVE-2019-11043" title="Php: Underflow In Env_Path_Info In Fpm_Main.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3287" id="RHSA-2019:3287-1" title="Rhsa-2019:3287-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766378" id="1766378" title="Php: Underflow In Env_Path_Info In Fpm_Main.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3755-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword (CVE-2019-14287)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-11-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sudo-devel" release="29.el6_10.2" src="sudo-1.8.6p3-29.el6_10.2.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-29.el6_10.2.x86_64.rpm</filename><sum type="sha256">a6c3693e9ff0ddd9ad768864f198b9929b54f280e16b3a81884e5bdfbb020284</sum></package><package arch="x86_64" name="sudo" release="29.el6_10.2" src="sudo-1.8.6p3-29.el6_10.2.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-29.el6_10.2.x86_64.rpm</filename><sum type="sha256">9604218222a11b1e52a63cb93b71fcb554a086bc19227d1f6964946f1a5b5632</sum></package><package arch="i686" name="sudo-devel" release="29.el6_10.2" src="sudo-1.8.6p3-29.el6_10.2.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-29.el6_10.2.i686.rpm</filename><sum type="sha256">62da827b90ab1c0cc3b28c1fa1eec0bd36c01c9491ee871e3d95a5317995e18a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" id="CVE-2019-14287" title="Sudo: Privilege Escalation Via 'Runas' " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3755" id="RHSA-2019:3755-1" title="Rhsa-2019:3755-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760531" id="1760531" title="Sudo: Privilege Escalation Via 'Runas' " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3756-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 68.2.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) 
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) 
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) 
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) 
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) 
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) 
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) 
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763) 
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-11-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_10" src="thunderbird-68.2.0-2.el6_10.src.rpm" version="68.2.0"><filename>thunderbird-68.2.0-2.el6_10.x86_64.rpm</filename><sum type="sha256">d6b2bc359d1312f47ba5720a832b1bbc5315f6755310be883ed469808a151816</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" id="CVE-2019-11757" title="Mozilla: Use-After-Free When Creating Index " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" id="CVE-2019-11758" title="Mozilla: Potentially Exploitable Crash Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" id="CVE-2019-11759" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" id="CVE-2019-11760" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" id="CVE-2019-11761" title="Mozilla: Unintended Access To A Privileged " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" id="CVE-2019-11762" title="Mozilla: Document.Domain-Based Origin Isolation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" id="CVE-2019-11763" title="Mozilla: Incorrect Html Parsing Results In Xss " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" id="CVE-2019-11764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" id="CVE-2019-15903" title="Expat: Heap-Based Buffer Over-Read Via Crafted " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3756" id="RHSA-2019:3756-1" title="Rhsa-2019:3756-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752592" id="1752592" title="Expat: Heap-Based Buffer Over-Read Via Crafted " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764438" id="1764438" title="Mozilla: Use-After-Free When Creating Index " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764439" id="1764439" title="Mozilla: Potentially Exploitable Crash Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764440" id="1764440" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764441" id="1764441" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764442" id="1764442" title="Mozilla: Unintended Access To A Privileged " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764443" id="1764443" title="Mozilla: Document.Domain-Based Origin Isolation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764444" id="1764444" title="Mozilla: Incorrect Html Parsing Results In Xss " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764446" id="1764446" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3836-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207) 
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) 
* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900) 
* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE  
Bug Fix(es): 
* [Intel 6.10 Bug] With mWait/C-states disabled, HT on, ibrs enabled, performance impact observed on user space benchmark 
* kernel-2.6.32-573.60.2.el6 hangs/resets during boot in efi_enter_virtual_mode() on Xeon v2 E7-2870 
* Slab leak: skbuff_head_cache slab object still allocated after mcast processes are stopped and "fragments dropped after timeout" errors are shown</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-11-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">010759b6ccefee7f9c8eccce57d1bd2d7c76a5b86510de4001d3765eef09ed6e</sum></package><package arch="i686" name="kernel-debug-devel" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm</filename><sum type="sha256">0bf43100e7d596cc3977f8255e7deef06fd111310c234fe499fcdeb40a63a296</sum></package><package arch="x86_64" name="perf" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">78f3ffaff7101240f2203a4da2a29d418217335d54a2e948896f1e0c1c05cdab</sum></package><package arch="noarch" name="kernel-firmware" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.24.2.el6.noarch.rpm</filename><sum type="sha256">eb0de1c5f5022dd369e4811d21203ec45af3e4f10fc031e66f3ec7a12556d466</sum></package><package arch="x86_64" name="kernel-debug" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">8db973e1277417321b7bb710e237c4f6f6695b65f25a11041118ddc6f294f2c0</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm</filename><sum type="sha256">e93510bebf7ae8913e1e229ca397f89a99a334264c845106e2b3d91da5ca8275</sum></package><package arch="x86_64" name="kernel" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">347aac75319d13e7880387522250d7788ea262f19dc252940d455f960f3c1bc2</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">11f751ace658fdc8c711d6dadf7b9c91d31147dd12d7c76dce0a2a82a9d8a4b7</sum></package><package arch="noarch" name="kernel-doc" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.24.2.el6.noarch.rpm</filename><sum type="sha256">aed7222ef4ac7cb673f27d39609ce38a716e3c5201ffc13c08119e771c07de57</sum></package><package arch="x86_64" name="python-perf" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">d236428c54e116997c745cd886997d72065e7e7ed48afc6d668ba02539ddb47b</sum></package><package arch="x86_64" name="kernel-headers" release="754.24.2.el6" src="kernel-2.6.32-754.24.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.24.2.el6.x86_64.rpm</filename><sum type="sha256">657e5af97578911888ddd23bf99bc93765fcdd9248b5ba3ef418b73201e11df1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3836" id="RHSA-2019:3836-1" title="Rhsa-2019:3836-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3878-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-11-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">2a7ca925614d632eeeb382d81d1841a3541fdb85d3aa66d22173349b2d69f674</sum></package><package arch="i686" name="kernel-debug-devel" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.24.3.el6.i686.rpm</filename><sum type="sha256">9aacbb5fabfee0e958cb74301576437f9251a53f553b5e6fc620331f2f8a474b</sum></package><package arch="x86_64" name="kernel-devel" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">acd1a4f637aa8ec3f21435f01dc5c35a84257efe91a73c6562b75e5274a14c3b</sum></package><package arch="x86_64" name="python-perf" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">d6beb1c10f32b586266a53f8c91433fce8d18e17510e743fc979a9fe5d41a929</sum></package><package arch="x86_64" name="kernel-headers" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">c1a8889c53566195c865ad4b53e3369019881caf8711ba2ce6281de43025cd2b</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.24.3.el6.noarch.rpm</filename><sum type="sha256">ed779305e6cd7a26cd34b413e9b5b4cbec4fba94750a4a358167acfc6741c4e3</sum></package><package arch="x86_64" name="kernel" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">0af117358df6a0bca8b8a01acb76f65d1b139c9515fdfca1b5ec7524de14c177</sum></package><package arch="x86_64" name="perf" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">a320303cbe84b2add283bd88ec1c03ae65fb1d9fffd1740ee6dc92455256611e</sum></package><package arch="noarch" name="kernel-doc" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.24.3.el6.noarch.rpm</filename><sum type="sha256">a86ec05a26576ff8c05d31335f8fcefbe0b42b7c93257472082a8466aff77643</sum></package><package arch="noarch" name="kernel-firmware" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.24.3.el6.noarch.rpm</filename><sum type="sha256">e548f8e9f393db3e2dd773ecd7670b4654fbc4008a41becdec8876c133399eb9</sum></package><package arch="x86_64" name="kernel-debug" release="754.24.3.el6" src="kernel-2.6.32-754.24.3.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.24.3.el6.x86_64.rpm</filename><sum type="sha256">7a05156d47cc9db8404fb1e6c798480e45535d764761d6ef955050b71a68a7ed</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3878" id="RHSA-2019:3878-1" title="Rhsa-2019:3878-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4108-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free in worker destruction (CVE-2019-17008) 
* Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3  (CVE-2019-17012)      * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) 
* Mozilla: Use-after-free when performing device orientation checks  (CVE-2019-17010) 
* Mozilla: Use-after-free when retrieving a document in antitracking  (CVE-2019-17011)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2019-12-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.3.0-1.el6_10.src.rpm" version="68.3.0"><filename>firefox-68.3.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">25c93b689d8a5cedaa05fc33d322d56deddeebcf591169d3e3848ccc79d88735</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.3.0-1.el6_10.src.rpm" version="68.3.0"><filename>firefox-68.3.0-1.el6_10.i686.rpm</filename><sum type="sha256">7feaa86c2116e03b1ff4f4fc7235405d8eaf1779d2ef6f508b6468785f23bdfb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" id="CVE-2019-17005" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" id="CVE-2019-17008" title="Mozilla: Use-After-Free In Worker Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" id="CVE-2019-17010" title="Mozilla: Use-After-Free When Performing Device " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" id="CVE-2019-17011" title="Mozilla: Use-After-Free When Retrieving A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" id="CVE-2019-17012" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4108" id="RHSA-2019:4108-1" title="Rhsa-2019:4108-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779431" id="1779431" title="Mozilla: Use-After-Free In Worker Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779434" id="1779434" title="Mozilla: Use-After-Free When Performing Device " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779435" id="1779435" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779436" id="1779436" title="Mozilla: Use-After-Free When Retrieving A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779437" id="1779437" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4152-1</id><title>Nss-Softokn</title><description>Security Fix(es): 
* nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-12-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-softokn-freebl" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-6.el6_10.i686.rpm</filename><sum type="sha256">70b6a495b8b23ee84cd4b9edf0b604356763656b1bcd51c6d3da401b2c880e2d</sum></package><package arch="i686" name="nss-softokn" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-6.el6_10.i686.rpm</filename><sum type="sha256">5e0e936804b3227ebd8b2d9b32ee55a2ea10c21e7d5fed428fd5e237c95f5e51</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-6.el6_10.i686.rpm</filename><sum type="sha256">f8e5626d1adbe04d2fdccf2581069434143452419c0079e25dc683f314fbf267</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-6.el6_10.x86_64.rpm</filename><sum type="sha256">9fe462086041f53fe7501099ee7803e95f79c8ab9c8e1bfd85b4dda5d5f3d0c8</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-6.el6_10.x86_64.rpm</filename><sum type="sha256">525cfd47e790ac19d47f484e1f89677a357411d5b431b33b34198365ccff11cd</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-6.el6_10.x86_64.rpm</filename><sum type="sha256">08064c338b58d598c87c332af0bcf5f853acc37cea4c8257f170ca528289cee7</sum></package><package arch="x86_64" name="nss-softokn" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-6.el6_10.x86_64.rpm</filename><sum type="sha256">4f259c0b34f7db341a2b4a58ec75f6aa38cd49c9817cf802e4ff2fd83de1dc24</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el6_10" src="nss-softokn-3.44.0-6.el6_10.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-6.el6_10.i686.rpm</filename><sum type="sha256">9fbf5c0a6e9c9cbc4f659846e88b70d70a4a73f63f16219baeb4659ff1cf98dd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745" id="CVE-2019-11745" title="Nss: Out-Of-Bounds Write When Passing An Output " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4152" id="RHSA-2019:4152-1" title="Rhsa-2019:4152-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774831" id="1774831" title="Nss: Out-Of-Bounds Write When Passing An Output " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4205-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 68.3.0. 
Security Fix(es): 
* Mozilla: Use-after-free in worker destruction (CVE-2019-17008) 
* Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) 
* Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) 
* Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) 
* Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2019-12-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="3.el6_10" src="thunderbird-68.3.0-3.el6_10.src.rpm" version="68.3.0"><filename>thunderbird-68.3.0-3.el6_10.x86_64.rpm</filename><sum type="sha256">38e05dfc136c36ba0917a1da91f540ab6b354a746e94343ade76dbb9af1379ea</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" id="CVE-2019-17005" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" id="CVE-2019-17008" title="Mozilla: Use-After-Free In Worker Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" id="CVE-2019-17010" title="Mozilla: Use-After-Free When Performing Device " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" id="CVE-2019-17011" title="Mozilla: Use-After-Free When Retrieving A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" id="CVE-2019-17012" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4205" id="RHSA-2019:4205-1" title="Rhsa-2019:4205-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779431" id="1779431" title="Mozilla: Use-After-Free In Worker Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779434" id="1779434" title="Mozilla: Use-After-Free When Performing Device " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779435" id="1779435" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779436" id="1779436" title="Mozilla: Use-After-Free When Retrieving A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779437" id="1779437" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4254-1</id><title>Freetype</title><description>Security Fix(es): 
* freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to information disclosure (CVE-2015-9381) 
* freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read (CVE-2015-9382)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-01-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="freetype-devel" release="19.el6_10" src="freetype-2.3.11-19.el6_10.src.rpm" version="2.3.11"><filename>freetype-devel-2.3.11-19.el6_10.i686.rpm</filename><sum type="sha256">6d7fd44af78ce088694751c24e283bdd9341945079d176925056be232849226d</sum></package><package arch="i686" name="freetype" release="19.el6_10" src="freetype-2.3.11-19.el6_10.src.rpm" version="2.3.11"><filename>freetype-2.3.11-19.el6_10.i686.rpm</filename><sum type="sha256">77703831c5562ac717a917552eea79e91f347d95dcb199859225515c94320c97</sum></package><package arch="x86_64" name="freetype" release="19.el6_10" src="freetype-2.3.11-19.el6_10.src.rpm" version="2.3.11"><filename>freetype-2.3.11-19.el6_10.x86_64.rpm</filename><sum type="sha256">d3ab181c411ee5bc5fe65dc9b1dfc2c1274c7c4d1b327911c31e6174abae0390</sum></package><package arch="x86_64" name="freetype-demos" release="19.el6_10" src="freetype-2.3.11-19.el6_10.src.rpm" version="2.3.11"><filename>freetype-demos-2.3.11-19.el6_10.x86_64.rpm</filename><sum type="sha256">539e2b7a36af75507399456d87a1c64b901534ab188a4654821b6f8bbe1aa1c6</sum></package><package arch="x86_64" name="freetype-devel" release="19.el6_10" src="freetype-2.3.11-19.el6_10.src.rpm" version="2.3.11"><filename>freetype-devel-2.3.11-19.el6_10.x86_64.rpm</filename><sum type="sha256">c91b50a27d8894f74e60ccdef1c12714430f77c608f8c193055a969984eaeec4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" id="CVE-2015-9381" title="Freetype: A Heap-Based Buffer Over-Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382" id="CVE-2015-9382" title="Freetype: Mishandling Ps_Parser_Skip_Ps_Token In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4254" id="RHSA-2019:4254-1" title="Rhsa-2019:4254-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752788" id="1752788" title="Freetype: A Heap-Based Buffer Over-Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763609" id="1763609" title="Freetype: Mishandling Ps_Parser_Skip_Ps_Token In " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4256-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) 
Bug Fix(es): 
* KEYS: prevent creating a different user's keyrings SL-6.10 
* BUG: unable to handle kernel NULL pointer dereference at (null) 
* long I/O stalls with bnx2fc from not masking off scope bits of retry delay value</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-01-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.25.1.el6.noarch.rpm</filename><sum type="sha256">34667f86a2fc275ba9f36d8f885840b5cff80bceeaaad217cb7768aff40cc203</sum></package><package arch="i686" name="kernel-debug-devel" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.25.1.el6.i686.rpm</filename><sum type="sha256">67e02e07f25c5f91e034b860e440fe9f99e19538caca3aa5f8dd6c37f9385c4f</sum></package><package arch="x86_64" name="python-perf" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">9d82c91e16bbc683477c0bb48740086afacc0130dd09bc13a7977018949e1f5a</sum></package><package arch="x86_64" name="kernel-devel" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">20efa025bc6fe7618b3e23e0091d47929b9f06874c027574fe373eae8a6eed73</sum></package><package arch="x86_64" name="kernel-headers" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">2b7161e70c94609c354a85f94829344cf59eaf9d8c2b511fb1731b8566fa808e</sum></package><package arch="x86_64" name="kernel" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">106d0762b182735bd121ff470567ad68b9b3e3bc7a5038ca8826334c401adaf7</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.25.1.el6.noarch.rpm</filename><sum type="sha256">780620108cc86ba9634200fdc2155ffa65ed82cd0979795eeec0f4370ef73075</sum></package><package arch="x86_64" name="perf" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">190bf0b4af4810de3323ea3cd5f130ea9a6d5dc152c8f841fc6bee4f2514f485</sum></package><package arch="noarch" name="kernel-doc" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.25.1.el6.noarch.rpm</filename><sum type="sha256">615fa351cd7986dafec501b533bc5891316d70d4728170b16447a59de9c8631d</sum></package><package arch="x86_64" name="kernel-debug" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">464ef77837933c8b55e8047a6f10f7c6806c8b31ffca0f00f3c6d9ec7cc64c7a</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.25.1.el6" src="kernel-2.6.32-754.25.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.25.1.el6.x86_64.rpm</filename><sum type="sha256">b89301e2f0f0172d4293e2d4c54603a4540ea1979652869bd63a9ba776faeb6a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821" id="CVE-2019-14821" title="Kernel: Kvm: Oob Memory Access Via Mmio Ring Buffer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4256" id="RHSA-2019:4256-1" title="Rhsa-2019:4256-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1746708" id="1746708" title="Kernel: Kvm: Oob Memory Access Via Mmio Ring Buffer" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0086-1</id><title>Firefox</title><description>This update upgrades Firefox to version 68.4.1 ESR. 
Security Fix(es): 
* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) 
* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) 
* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) 
* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) 
* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2020-01-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.4.1-1.el6_10.src.rpm" version="68.4.1"><filename>firefox-68.4.1-1.el6_10.i686.rpm</filename><sum type="sha256">b8ffce2947a42087edb763eb295b2ce65cb83ee7bf1da62113cebef59aa510a7</sum></package><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.4.1-1.el6_10.src.rpm" version="68.4.1"><filename>firefox-68.4.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">1db773e269bb41e5540933eed9647c1b69c49062367e24c1b50cc26a627c3553</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016" id="CVE-2019-17016" title="Mozilla: Bypass Of @Namespace Css Sanitization " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017" id="CVE-2019-17017" title="Mozilla: Type Confusion In Xpcvariant.Cpp" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022" id="CVE-2019-17022" title="Mozilla: Css Sanitization Does Not Escape Html Tags" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024" id="CVE-2019-17024" title="Mozilla: Memory Safety Bugs Fixed In Firefox 72 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026" id="CVE-2019-17026" title="Mozilla: Ionmonkey Type Confusion With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0086" id="RHSA-2020:0086-1" title="Rhsa-2020:0086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788723" id="1788723" title="Mozilla: Bypass Of @Namespace Css Sanitization " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788724" id="1788724" title="Mozilla: Type Confusion In Xpcvariant.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788726" id="1788726" title="Mozilla: Css Sanitization Does Not Escape Html Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788727" id="1788727" title="Mozilla: Memory Safety Bugs Fixed In Firefox 72 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789214" id="1789214" title="Mozilla: Ionmonkey Type Confusion With " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0123-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) 
* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) 
* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) 
* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) 
* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-01-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="2.el6_10" src="thunderbird-68.4.1-2.el6_10.src.rpm" version="68.4.1"><filename>thunderbird-68.4.1-2.el6_10.x86_64.rpm</filename><sum type="sha256">75444cb60fb3a32328cb563254f185f9adcb8c79f5d2604a8ca46eae1c468fdd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0123" id="RHSA-2020:0123-1" title="Rhsa-2020:0123-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0157-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) 
* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) 
* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) 
* OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) 
* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) 
* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) 
* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-01-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">d26fee7e50897ab13e30503d1699f4ae0cb3d103bf4c14d888dfebb966d35de6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">61c5552dba815e68cc5bf2f954b68d19dbcf8110a94b016736056bed1cc47e4a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">d45d247403b8b4c3274f907c2bd7fd257fe08da3d48d673d0d58e082b10e75fe</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">333ad472cdec6cb8e19cf81d44e846e363c35f8ddd3b7fa02056c2b10e0aa18f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">ff0aa8cd1079b74d8f76a096030d9b392f7fdbd7da94b88b4463eb4d216b1b8f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-src-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">226bc042cbb51d57776e4ed37ee8c4072929985ba16128310ca29a5c73d67266</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.242.b07-1.el6_10.noarch.rpm</filename><sum type="sha256">9cdd1d70e628db2c241753201cffeca47340f741c0548dc678a830bc7e322567</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">4e44abfd19e8e10d3d29cbc279e3596032a311c9ad592bd0e9a7059efcf3a9c1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">4cce2572598761329a6222f17b085104917848b646fc99b1cac7660d29170e1e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b07-1.el6_10.noarch.rpm</filename><sum type="sha256">f25b6db5c691786c378a77fb790b1546af5f9434a0533fdeeb637f0a8145ca6d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">ccbca076777ac90eb90b3ade950aa18598e1f77657cd1ae515551b809451d231</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el6_10" src="java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm" version="1.8.0.242.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.242.b07-1.el6_10.x86_64.rpm</filename><sum type="sha256">26143c9179ae675b8e5d99ce2764ea792d1b6562bcf97ac73e268fe83b2bfbb0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583" id="CVE-2020-2583" title="Openjdk: Incorrect Exception Processing During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590" id="CVE-2020-2590" title="Openjdk: Improper Checks Of Sasl Message " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593" id="CVE-2020-2593" title="Openjdk: Incorrect Isbuiltinstreamhandler " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601" id="CVE-2020-2601" title="Openjdk: Use Of Unsafe Rsa-Md5 Checkum In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604" id="CVE-2020-2604" title="Openjdk: Serialization Filter Changes Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654" id="CVE-2020-2654" title="Openjdk: Excessive Memory Usage In Oid " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659" id="CVE-2020-2659" title="Openjdk: Incomplete Enforcement Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0157" id="RHSA-2020:0157-1" title="Rhsa-2020:0157-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790444" id="1790444" title="Openjdk: Incorrect Exception Processing During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790556" id="1790556" title="Openjdk: Improper Checks Of Sasl Message " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790570" id="1790570" title="Openjdk: Use Of Unsafe Rsa-Md5 Checkum In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790884" id="1790884" title="Openjdk: Incorrect Isbuiltinstreamhandler " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790944" id="1790944" title="Openjdk: Serialization Filter Changes Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791217" id="1791217" title="Openjdk: Excessive Memory Usage In Oid " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791284" id="1791284" title="Openjdk: Incomplete Enforcement Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0197-1</id><title>Python-Reportlab</title><description>Security Fix(es): 
* python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-01-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-reportlab" release="3.el6_10.1" src="python-reportlab-2.3-3.el6_10.1.src.rpm" version="2.3"><filename>python-reportlab-2.3-3.el6_10.1.x86_64.rpm</filename><sum type="sha256">445898ca45496ff67cbb31b88700f8f85153239fbaccf8198341664c433985db</sum></package><package arch="noarch" name="python-reportlab-docs" release="3.el6_10.1" src="python-reportlab-2.3-3.el6_10.1.src.rpm" version="2.3"><filename>python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm</filename><sum type="sha256">6b3401b4a3265d0b2f86f0291bce38f1e05d99e2349774429f829346cf0345ab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17626" id="CVE-2019-17626" title="Python-Reportlab: Code Injection In Colors.Py " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0197" id="RHSA-2020:0197-1" title="Rhsa-2020:0197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769661" id="1769661" title="Python-Reportlab: Code Injection In Colors.Py " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0199-1</id><title>Openslp</title><description>Security Fix(es): 
* openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2020-01-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="openslp" release="4.el6_10" src="openslp-2.0.0-4.el6_10.src.rpm" version="2.0.0"><filename>openslp-2.0.0-4.el6_10.x86_64.rpm</filename><sum type="sha256">21633cd8e1c8ee838a26867b6e6d9b66318cbf57c7228f8d271bf5e78b15b448</sum></package><package arch="x86_64" epoch="1" name="openslp-server" release="4.el6_10" src="openslp-2.0.0-4.el6_10.src.rpm" version="2.0.0"><filename>openslp-server-2.0.0-4.el6_10.x86_64.rpm</filename><sum type="sha256">c3c1aa3f27817bcf7084ba689acbdb4794200e4a8e057f1179abf0e187c71a86</sum></package><package arch="i686" epoch="1" name="openslp-devel" release="4.el6_10" src="openslp-2.0.0-4.el6_10.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-4.el6_10.i686.rpm</filename><sum type="sha256">1f3373a88c9ebe30aee90f957eb32c43d230b47ba1baf50a0b4879b603f69081</sum></package><package arch="x86_64" epoch="1" name="openslp-devel" release="4.el6_10" src="openslp-2.0.0-4.el6_10.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-4.el6_10.x86_64.rpm</filename><sum type="sha256">b021fc03eb6ff368e384a9585950862112228c02dfac050d743b7fa428f35c9d</sum></package><package arch="i686" epoch="1" name="openslp" release="4.el6_10" src="openslp-2.0.0-4.el6_10.src.rpm" version="2.0.0"><filename>openslp-2.0.0-4.el6_10.i686.rpm</filename><sum type="sha256">5b52a1b6835e7c3b194075334dc126747b0bbcaff2bbcc0e64f6ec97180312a6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0199" id="RHSA-2020:0199-1" title="Rhsa-2020:0199-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0316-1</id><title>Git</title><description>Security Fix(es): 
* git: arbitrary code execution via .gitmodules (CVE-2018-17456)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-02-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="git-svn" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-svn-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">0f507a011aad8db7cff3e86620b31781d5e519481e518437a185f766dade76cc</sum></package><package arch="noarch" name="git-email" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-email-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">98bf71aa3ea11db0b4e173676775aca8fe26029da4b73fd9180d38be2827cb23</sum></package><package arch="noarch" name="git-gui" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-gui-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">a2d8cc8bb16834ee5002b88443b5546f636beb65b8c5d1a2fb024aa065b875b4</sum></package><package arch="noarch" name="gitk" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>gitk-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">4e820bf7c778b4bdebc67ac640a42ebc6fd2a4a06f29e06082f20a5404a1a415</sum></package><package arch="x86_64" name="git-daemon" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-daemon-1.7.1-10.el6_10.x86_64.rpm</filename><sum type="sha256">6de7c466fd1af4e9595cce08010306fffc40d1bdd07e8f856cb1ddf07618b85c</sum></package><package arch="x86_64" name="git" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-1.7.1-10.el6_10.x86_64.rpm</filename><sum type="sha256">a0afddd713a34eb67d45fd769503cf48ba4fa71aa82dc84c8532ecf44246fc81</sum></package><package arch="noarch" name="gitweb" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>gitweb-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">b7cdad0226d27a3422b16c2ba5d6ad38a1d41456fd9f278a5404966ed0edc0a0</sum></package><package arch="noarch" name="perl-Git" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>perl-Git-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">31d03187fdeb8ade325bcf18677794a75d3b3962b7c5c7fc77e7a0c4baf3ee14</sum></package><package arch="noarch" name="git-cvs" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-cvs-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">b8e082a5c273a8340ff1d8ae92ab732a755e57da3cbd67e9d0d998a5a96f8e24</sum></package><package arch="noarch" name="emacs-git-el" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>emacs-git-el-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">b34c2c7022314573cdc713354dbb516b14e24e3617c991ad8a5567d30179edd7</sum></package><package arch="noarch" name="emacs-git" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>emacs-git-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">a3f91a6e8abb6649c176ad4654abf2433136ece32a762652ed98d733474ff2ab</sum></package><package arch="noarch" name="git-all" release="10.el6_10" src="git-1.7.1-10.el6_10.src.rpm" version="1.7.1"><filename>git-all-1.7.1-10.el6_10.noarch.rpm</filename><sum type="sha256">3c2d43ecd8da11d50260f94bb334b0dc44d9457a30eed7ef6901791baa78b61e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0316" id="RHSA-2020:0316-1" title="Rhsa-2020:0316-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0471-1</id><title>Spice-Gtk</title><description>Security Fix(es): 
* spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows (CVE-2018-10893)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-02-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="spice-glib-devel" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-glib-devel-0.26-8.el6_10.2.x86_64.rpm</filename><sum type="sha256">949cd1a11bfbba54c4860f7a745291136d4e5320995a6723813472b847e325a3</sum></package><package arch="i686" name="spice-gtk" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-gtk-0.26-8.el6_10.2.i686.rpm</filename><sum type="sha256">150c7a4f9da15facdab9c1cec879d56d74c010d9cb4713d7384dd80ce67cae68</sum></package><package arch="x86_64" name="spice-gtk-tools" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-gtk-tools-0.26-8.el6_10.2.x86_64.rpm</filename><sum type="sha256">faed75a03ca59baed00265f865cc23f22a43002cf4f94be1442ddd4366a03115</sum></package><package arch="x86_64" name="spice-gtk" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-gtk-0.26-8.el6_10.2.x86_64.rpm</filename><sum type="sha256">6cf60f087d320862934148fc30aa879fa5cf0b59e202d99f2928a1887b82967f</sum></package><package arch="x86_64" name="spice-gtk-devel" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-gtk-devel-0.26-8.el6_10.2.x86_64.rpm</filename><sum type="sha256">15583f960f4521a2db743e13aa145ca61da4791cd6d9a431dc888de8f3113bf5</sum></package><package arch="x86_64" name="spice-gtk-python" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-gtk-python-0.26-8.el6_10.2.x86_64.rpm</filename><sum type="sha256">e561f260914552ce1f322c946b4ab223d246c7f9f48ce50a544397097dbdd6cd</sum></package><package arch="x86_64" name="spice-glib" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-glib-0.26-8.el6_10.2.x86_64.rpm</filename><sum type="sha256">77cc9f9e0044d7afbe79b7c8479b710b029e290760f9f8bc6e253063b9c55c32</sum></package><package arch="i686" name="spice-gtk-devel" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-gtk-devel-0.26-8.el6_10.2.i686.rpm</filename><sum type="sha256">2ff61cf3350e2df213116e84bb0e2027a0d5547e37a29ef3f72deb1f28cb5965</sum></package><package arch="i686" name="spice-glib-devel" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-glib-devel-0.26-8.el6_10.2.i686.rpm</filename><sum type="sha256">be2af02ed6b1bd65b96666c9ff2e356e655ecb3be7f1a89837013186a370d7ff</sum></package><package arch="i686" name="spice-glib" release="8.el6_10.2" src="spice-gtk-0.26-8.el6_10.2.src.rpm" version="0.26"><filename>spice-glib-0.26-8.el6_10.2.i686.rpm</filename><sum type="sha256">abdb8e54d36de48d4c70945da85a0e5e7c78eb37962b9429c8c73dca13b7a5d4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0471" id="RHSA-2020:0471-1" title="Rhsa-2020:0471-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0515-1</id><title>Ksh</title><description>Security Fix(es): 
* ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (CVE-2019-14868)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-02-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ksh" release="38.el6_10" src="ksh-20120801-38.el6_10.src.rpm" version="20120801"><filename>ksh-20120801-38.el6_10.x86_64.rpm</filename><sum type="sha256">07ca7178e51c6bee1bd196842e67d2573c109faf45be7894a8ed5949327907cb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0515" id="RHSA-2020:0515-1" title="Rhsa-2020:0515-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0521-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Missing bounds check on shared memory read in the parent process (CVE-2020-6796) 
* Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-02-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="2.el6_10" src="firefox-68.5.0-2.el6_10.src.rpm" version="68.5.0"><filename>firefox-68.5.0-2.el6_10.x86_64.rpm</filename><sum type="sha256">83f6f21ed4b869591e42a0507c4f61e51f114779e336afe7cfb4827326b9686d</sum></package><package arch="i686" name="firefox" release="2.el6_10" src="firefox-68.5.0-2.el6_10.src.rpm" version="68.5.0"><filename>firefox-68.5.0-2.el6_10.i686.rpm</filename><sum type="sha256">eaa61eaccc640698a594708a192d899872c14fa31adef4cf6198d32e4c5abe0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0521" id="RHSA-2020:0521-1" title="Rhsa-2020:0521-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0574-1</id><title>Thunderbird</title><description>Security Fix(es): 
Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) Mozilla: Out-of-bounds read when processing certain email messages (CVE-2020-6793) Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords (CVE-2020-6794) Mozilla: Crash processing S/MIME messages with multiple signatures (CVE-2020-6795) Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798) Mozilla: Message ID calculation was based on uninitialized data (CVE-2020-6792)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.5.0-1.el6_10.src.rpm" version="68.5.0"><filename>thunderbird-68.5.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">53f09978f889cb51849c1b98dcc849b729b237f6313467e59ae3e669a724ba59</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0574" id="RHSA-2020:0574-1" title="Rhsa-2020:0574-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0631-1</id><title>Ppp</title><description>Security Fix(es): 
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ppp" release="11.el6_10" src="ppp-2.4.5-11.el6_10.src.rpm" version="2.4.5"><filename>ppp-2.4.5-11.el6_10.x86_64.rpm</filename><sum type="sha256">0085f38b5d397c77f38dc06d9f76026dcd7240bb0c752af30799895ead275679</sum></package><package arch="x86_64" name="ppp-devel" release="11.el6_10" src="ppp-2.4.5-11.el6_10.src.rpm" version="2.4.5"><filename>ppp-devel-2.4.5-11.el6_10.x86_64.rpm</filename><sum type="sha256">6806c3338fe53d3df653525464099cb52baae001753ea2cc603ebc2086d6b4a9</sum></package><package arch="i686" name="ppp-devel" release="11.el6_10" src="ppp-2.4.5-11.el6_10.src.rpm" version="2.4.5"><filename>ppp-devel-2.4.5-11.el6_10.i686.rpm</filename><sum type="sha256">dbc8ac92000ed47d7c0e9f18cbf663640035f286226fa060f5e1411ed83e09bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597" id="CVE-2020-8597" title="Ppp: Buffer Overflow In The Eap_Request And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0631" id="RHSA-2020:0631-1" title="Rhsa-2020:0631-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800727" id="1800727" title="Ppp: Buffer Overflow In The Eap_Request And " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0632-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) 
* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) 
* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) 
* OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) 
* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) 
* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) 
* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-03 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.21.0.el6_10" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm</filename><sum type="sha256">fc591e43f7f3b5ec83a27e6186b12c8d1c4f2046519ee1c6c1a85f1db166a2be</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.21.0.el6_10" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm</filename><sum type="sha256">c18b947519d41a39c12cf864d6e60db6136c260dd49b25d1e24ae1fa955dac8d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.21.0.el6_10" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm</filename><sum type="sha256">294fdbb58f5119c49a99d411605868e6f380754808f9b4b5192b27972cf27ae5</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.21.0.el6_10" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm</filename><sum type="sha256">8d4d9c5771e5f5ac31fadaf50604113e8a00cb34ec403b184dd89113272b3c4d</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.21.0.el6_10" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el6_10.noarch.rpm</filename><sum type="sha256">a4fa4151a35710d667b1c09c3d00684f8d3c200b74e9075cfd08ddd15585e850</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583" id="CVE-2020-2583" title="Openjdk: Incorrect Exception Processing During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590" id="CVE-2020-2590" title="Openjdk: Improper Checks Of Sasl Message " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593" id="CVE-2020-2593" title="Openjdk: Incorrect Isbuiltinstreamhandler " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601" id="CVE-2020-2601" title="Openjdk: Use Of Unsafe Rsa-Md5 Checkum In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604" id="CVE-2020-2604" title="Openjdk: Serialization Filter Changes Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654" id="CVE-2020-2654" title="Openjdk: Excessive Memory Usage In Oid " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659" id="CVE-2020-2659" title="Openjdk: Incomplete Enforcement Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0632" id="RHSA-2020:0632-1" title="Rhsa-2020:0632-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790444" id="1790444" title="Openjdk: Incorrect Exception Processing During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790556" id="1790556" title="Openjdk: Improper Checks Of Sasl Message " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790570" id="1790570" title="Openjdk: Use Of Unsafe Rsa-Md5 Checkum In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790884" id="1790884" title="Openjdk: Incorrect Isbuiltinstreamhandler " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790944" id="1790944" title="Openjdk: Serialization Filter Changes Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791217" id="1791217" title="Openjdk: Excessive Memory Usage In Oid " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791284" id="1791284" title="Openjdk: Incomplete Enforcement Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0702-1</id><title>Xerces-C</title><description>Security Fix(es): 
* xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs (CVE-2018-1311)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="xerces-c-devel" release="21.el6_10" src="xerces-c-3.0.1-21.el6_10.src.rpm" version="3.0.1"><filename>xerces-c-devel-3.0.1-21.el6_10.i686.rpm</filename><sum type="sha256">299f5f4e4944cbd1b4b31bcf4287d85c7f4567477a07fbd7f7b4d7fa14959817</sum></package><package arch="noarch" name="xerces-c-doc" release="21.el6_10" src="xerces-c-3.0.1-21.el6_10.src.rpm" version="3.0.1"><filename>xerces-c-doc-3.0.1-21.el6_10.noarch.rpm</filename><sum type="sha256">d992f681dce12e5cc47b634455037596ff101ad2eebc66d459708ce5ac4679e9</sum></package><package arch="i686" name="xerces-c" release="21.el6_10" src="xerces-c-3.0.1-21.el6_10.src.rpm" version="3.0.1"><filename>xerces-c-3.0.1-21.el6_10.i686.rpm</filename><sum type="sha256">fe04f8540a3ed07b20d7c440a04b6cc71552b361b765125e13c7945342d22903</sum></package><package arch="x86_64" name="xerces-c-devel" release="21.el6_10" src="xerces-c-3.0.1-21.el6_10.src.rpm" version="3.0.1"><filename>xerces-c-devel-3.0.1-21.el6_10.x86_64.rpm</filename><sum type="sha256">fb1c1d8d412e610f4c2ada06556686ef1c35b40857da7d7de637ca870bce12fa</sum></package><package arch="x86_64" name="xerces-c" release="21.el6_10" src="xerces-c-3.0.1-21.el6_10.src.rpm" version="3.0.1"><filename>xerces-c-3.0.1-21.el6_10.x86_64.rpm</filename><sum type="sha256">67dfcdb57d42fd85c7acc29525084cda95196e250a4114811146dd5943e162f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311" id="CVE-2018-1311" title="Xerces-C: Xml Parser Contains A Use-After-Free Error Triggered During The Scanning Of External Dtds" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0702" id="RHSA-2020:0702-1" title="Rhsa-2020:0702-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788472" id="1788472" title="Xerces-C: Xml Parser Contains A Use-After-Free Error Triggered During The Scanning Of External Dtds" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0726-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="sudo-devel" release="29.el6_10.3" src="sudo-1.8.6p3-29.el6_10.3.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-29.el6_10.3.i686.rpm</filename><sum type="sha256">37a0c40da8624c01ccbcc4844414f61276b85999256950bce83258c049606f2c</sum></package><package arch="x86_64" name="sudo" release="29.el6_10.3" src="sudo-1.8.6p3-29.el6_10.3.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-29.el6_10.3.x86_64.rpm</filename><sum type="sha256">d27012052f72487ec77df1c260ca410a79c88ea1fadf1d35edddc9908fdd6ca7</sum></package><package arch="x86_64" name="sudo-devel" release="29.el6_10.3" src="sudo-1.8.6p3-29.el6_10.3.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-29.el6_10.3.x86_64.rpm</filename><sum type="sha256">fcf52d0fd341a53afb42ba8618c8529e8278d0370e45d33be4e0be925c3ffd66</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0726" id="RHSA-2020:0726-1" title="Rhsa-2020:0726-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0775-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) 
* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) 
* QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.6" src="qemu-kvm-0.12.1.2-2.506.el6_10.6.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.6.x86_64.rpm</filename><sum type="sha256">6bd1d1beee0d88cfd8828f7a4184c501fd85d5896b3ab68688d5c821930f511e</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.6" src="qemu-kvm-0.12.1.2-2.506.el6_10.6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.6.x86_64.rpm</filename><sum type="sha256">4bc8edde51ef38350b300c717542bb611556dba95c16f0837bc59c0bb787baef</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.6" src="qemu-kvm-0.12.1.2-2.506.el6_10.6.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.6.x86_64.rpm</filename><sum type="sha256">265d9f9805aa34cc4d8833615a5dbd79905bbedafb58958f6285f4deab8219a4</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.6" src="qemu-kvm-0.12.1.2-2.506.el6_10.6.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.6.x86_64.rpm</filename><sum type="sha256">8dd5c9352ceda7568f167ce33ebe77899c4b37aeac60cdf506aefad3b33aeae7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" id="CVE-2019-14378" title="Qemu: Slirp: Heap Buffer Overflow During Packet Reassembly" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890" id="CVE-2019-15890" title="Qemu: Slirp: Use-After-Free During Packet Reassembly" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039" id="CVE-2020-7039" title="Qemu: Slirp: Oob Buffer Access While Emulating Tcp Protocols In Tcp_Emu()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0775" id="RHSA-2020:0775-1" title="Rhsa-2020:0775-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734745" id="1734745" title="Qemu: Slirp: Heap Buffer Overflow During Packet Reassembly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749716" id="1749716" title="Qemu: Slirp: Use-After-Free During Packet Reassembly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791551" id="1791551" title="Qemu: Slirp: Oob Buffer Access While Emulating Tcp Protocols In Tcp_Emu()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0790-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless /wext-sme.c (CVE-2019-17133) 
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055) 
Bug Fix(es): 
* LACP bond does not function because bonding driver sees slave speed &amp; duplex as Unknown 
* ixgbevf guess causes excessive interrupts in hypervisor due to get link settings</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="kernel-debug-devel" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.28.1.el6.i686.rpm</filename><sum type="sha256">7baeb69b0cce2467013a56c324072bf0d9511b897f882d4425c899cb70348d83</sum></package><package arch="noarch" name="kernel-doc" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.28.1.el6.noarch.rpm</filename><sum type="sha256">bd7fcc9e693f1122eb8f6474f3ec7117e8d1ef0610ae4d429284353c2742db1d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">3601ebbece8776526cbde45dbdfd65f3e820a70dd282d643ff778397f88e9d9d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.28.1.el6.noarch.rpm</filename><sum type="sha256">b49136d71faf2a416f07485e49c4a72e816c2b0c7f5a5a0c2f7b5bd8e9dc0ec8</sum></package><package arch="x86_64" name="kernel-debug" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">5a9822d8acf5d1d5a0da548cc737b9c4a824037402f895ab9516f8162df74e92</sum></package><package arch="x86_64" name="kernel-devel" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">2f18e0e05e8d5c21fcd4fa5480db3c4d5ec1b4f301d0c0bc793d5921becb3322</sum></package><package arch="x86_64" name="python-perf" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">fd983a57e4cd9ef39a320f007894bc645f0e6be2bb37bb0b9d5105468539e9d0</sum></package><package arch="x86_64" name="perf" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">b2db08b81a68ffd4e46731ae03ef76a55ddbb7d4f82b6abce53db87e1cfce4e5</sum></package><package arch="x86_64" name="kernel-headers" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">2467ee63d7cb7422111f408ac86f674aafa310c80d776a56448424197c97ccdc</sum></package><package arch="noarch" name="kernel-firmware" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.28.1.el6.noarch.rpm</filename><sum type="sha256">5a96c1d62011f5cc7044a4079ab4c4d4b805bf97094eebdc7075e330079dbda2</sum></package><package arch="x86_64" name="kernel" release="754.28.1.el6" src="kernel-2.6.32-754.28.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.28.1.el6.x86_64.rpm</filename><sum type="sha256">8a476372c74eb3f1a92216e9a85fbd64c95d51ecf99e03bb19b9a66eee86f219</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055" id="CVE-2019-17055" title="Kernel: Unprivileged Users Able To Create Raw Sockets In Af_Isdn  Network Protocol." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133" id="CVE-2019-17133" title="Kernel: Buffer Overflow In Cfg80211_Mgd_Wext_Giwessid In Net/Wireless/Wext-Sme.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0790" id="RHSA-2020:0790-1" title="Rhsa-2020:0790-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758248" id="1758248" title="Kernel: Unprivileged Users Able To Create Raw Sockets In Af_Isdn  Network Protocol." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1771909" id="1771909" title="Kernel: Buffer Overflow In Cfg80211_Mgd_Wext_Giwessid In Net/Wireless/Wext-Sme.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0816-1</id><title>Firefox</title><description>This update upgrades Firefox to version 68.6.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) 
* Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) 
* Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) 
* Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) 
* Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) 
* Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website- controlled data, potentially leading to command injection (CVE-2020-6811) 
* Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.6.0-1.el6_10.src.rpm" version="68.6.0"><filename>firefox-68.6.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">4894ff68730cc869cacdd692f2b3c0056284d03655f13175da62d3962e5297f5</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.6.0-1.el6_10.src.rpm" version="68.6.0"><filename>firefox-68.6.0-1.el6_10.i686.rpm</filename><sum type="sha256">42e3aa25d642495bf090dea0eb1deed36d4d7f308b62a6078d755ce3ebdb3b51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503" id="CVE-2019-20503" title="Mozilla: Out Of Bounds Reads In Sctp_Load_Addresses_From_Init" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805" id="CVE-2020-6805" title="Mozilla: Use-After-Free When Removing Data About Origins" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806" id="CVE-2020-6806" title="Mozilla: Bodystream::Oninputstreamready Was Missing Protections Against State Confusion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807" id="CVE-2020-6807" title="Mozilla: Use-After-Free In Cubeb During Stream Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811" id="CVE-2020-6811" title="Mozilla: Devtools' 'Copy As Curl' Feature Did Not Fully Escape Website-Controlled Data, Potentially Leading To Command Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812" id="CVE-2020-6812" title="Mozilla: The Names Of Airpods With Personally Identifiable Information Were Exposed To Websites With Camera Or Microphone Permission" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814" id="CVE-2020-6814" title="Mozilla: Memory Safety Bugs Fixed In Firefox 74 And Firefox Esr 68.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0816" id="RHSA-2020:0816-1" title="Rhsa-2020:0816-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812199" id="1812199" title="Mozilla: Use-After-Free When Removing Data About Origins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812200" id="1812200" title="Mozilla: Bodystream::Oninputstreamready Was Missing Protections Against State Confusion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812201" id="1812201" title="Mozilla: Use-After-Free In Cubeb During Stream Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812202" id="1812202" title="Mozilla: Devtools' 'Copy As Curl' Feature Did Not Fully Escape Website-Controlled Data, Potentially Leading To Command Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812203" id="1812203" title="Mozilla: Out Of Bounds Reads In Sctp_Load_Addresses_From_Init" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812204" id="1812204" title="Mozilla: The Names Of Airpods With Personally Identifiable Information Were Exposed To Websites With Camera Or Microphone Permission" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812205" id="1812205" title="Mozilla: Memory Safety Bugs Fixed In Firefox 74 And Firefox Esr 68.6" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0892-1</id><title>Zsh</title><description>Security Fix(es): 
* zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="zsh" release="11.el6_10" src="zsh-4.3.11-11.el6_10.src.rpm" version="4.3.11"><filename>zsh-4.3.11-11.el6_10.x86_64.rpm</filename><sum type="sha256">a644b3ffb5758f66ff69c0f37ce3c2bcd1a3aafe355691c2de7110d4005aa756</sum></package><package arch="x86_64" name="zsh-html" release="11.el6_10" src="zsh-4.3.11-11.el6_10.src.rpm" version="4.3.11"><filename>zsh-html-4.3.11-11.el6_10.x86_64.rpm</filename><sum type="sha256">f9121ba3ec790e1837db9577391ecaacd31fcc6c5ff50faa17522998cff729a3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0892" id="RHSA-2020:0892-1" title="Rhsa-2020:0892-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0896-1</id><title>Icu</title><description>Security Fix(es): 
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libicu-devel" release="15.el6_10" src="icu-4.2.1-15.el6_10.src.rpm" version="4.2.1"><filename>libicu-devel-4.2.1-15.el6_10.x86_64.rpm</filename><sum type="sha256">ef1da90912a8bbf64a7ec0b967f395c8566520feec20b72068622170577a8507</sum></package><package arch="i686" name="libicu" release="15.el6_10" src="icu-4.2.1-15.el6_10.src.rpm" version="4.2.1"><filename>libicu-4.2.1-15.el6_10.i686.rpm</filename><sum type="sha256">9f6dd5d39417b489153c66e23c5aa4fc33766f5c6346715033feb549ce1bead0</sum></package><package arch="x86_64" name="libicu" release="15.el6_10" src="icu-4.2.1-15.el6_10.src.rpm" version="4.2.1"><filename>libicu-4.2.1-15.el6_10.x86_64.rpm</filename><sum type="sha256">8ef5ad8102141a011018261b421f3fdcd66b7f0a9b1143cdb28b30dc17be1947</sum></package><package arch="i686" name="libicu-devel" release="15.el6_10" src="icu-4.2.1-15.el6_10.src.rpm" version="4.2.1"><filename>libicu-devel-4.2.1-15.el6_10.i686.rpm</filename><sum type="sha256">04b271467d8f55f0a0dd1dd8140c1339c5cf90defa0d44599d795095deac8b04</sum></package><package arch="noarch" name="libicu-doc" release="15.el6_10" src="icu-4.2.1-15.el6_10.src.rpm" version="4.2.1"><filename>libicu-doc-4.2.1-15.el6_10.noarch.rpm</filename><sum type="sha256">eb4363fa5c07c028aa3ef1c29c7b7b76c301338ea9ca9ce73eb140cceef386e0</sum></package><package arch="x86_64" name="icu" release="15.el6_10" src="icu-4.2.1-15.el6_10.src.rpm" version="4.2.1"><filename>icu-4.2.1-15.el6_10.x86_64.rpm</filename><sum type="sha256">089874bb16b87c0fc18ec27e85ad3c840ba6d7dd8b9096054181029d167b90ef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0896" id="RHSA-2020:0896-1" title="Rhsa-2020:0896-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0898-1</id><title>Python-Imaging</title><description>Security Fix(es): 
* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-imaging-tk" release="20.el6_10" src="python-imaging-1.1.6-20.el6_10.src.rpm" version="1.1.6"><filename>python-imaging-tk-1.1.6-20.el6_10.x86_64.rpm</filename><sum type="sha256">01f7c9003d1a2cd8bb40e70dbda2ef3fa2fa187cc2d7d8e0932090a7981b3266</sum></package><package arch="x86_64" name="python-imaging-sane" release="20.el6_10" src="python-imaging-1.1.6-20.el6_10.src.rpm" version="1.1.6"><filename>python-imaging-sane-1.1.6-20.el6_10.x86_64.rpm</filename><sum type="sha256">3e2292827e757a0ce86bbb301da796f9caca0332cfd3f0c0407dbeec3439ab80</sum></package><package arch="x86_64" name="python-imaging-devel" release="20.el6_10" src="python-imaging-1.1.6-20.el6_10.src.rpm" version="1.1.6"><filename>python-imaging-devel-1.1.6-20.el6_10.x86_64.rpm</filename><sum type="sha256">68d5017809a147f70a0cdd88d9b1279dffb8cd6bce05087650d0d06a14f88e3d</sum></package><package arch="x86_64" name="python-imaging" release="20.el6_10" src="python-imaging-1.1.6-20.el6_10.src.rpm" version="1.1.6"><filename>python-imaging-1.1.6-20.el6_10.x86_64.rpm</filename><sum type="sha256">813a40fc8d9587dd5cbdb08c652558e633c7fa97f0a8a7c6b31e3a74342a1d4d</sum></package><package arch="i686" name="python-imaging-devel" release="20.el6_10" src="python-imaging-1.1.6-20.el6_10.src.rpm" version="1.1.6"><filename>python-imaging-devel-1.1.6-20.el6_10.i686.rpm</filename><sum type="sha256">6a20bc6a2e92a182be18ddbb8a79fc2d53c829b4f8f1a0e92966386e2f23cdff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0898" id="RHSA-2020:0898-1" title="Rhsa-2020:0898-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0912-1</id><title>Tomcat6</title><description>Security Fix(es): 
* tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability (CVE-2020-1938)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">e67c6d4b8ff53161a4042eaf73db125e581793fef161651e13cb59988f1fc6dc</sum></package><package arch="noarch" name="tomcat6-admin-webapps" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">a05f1b783d85bc1f7f64e7bb59d7b43698f9bb368d31e16d36a3ee271d83fdae</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">400c301bcb75cf7b39b7016f5e023c30efe45e3d25aa61236c63533edb733aae</sum></package><package arch="noarch" name="tomcat6-javadoc" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">5c1707db16c145ceb07eafe23966b012b420510d57599dd01709a2fb947c721b</sum></package><package arch="noarch" name="tomcat6-webapps" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">4ce45e27aa33def8fbf9e9e7d2c6e87562ae1abbabd962b0130a07c4da5e3003</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">be3c60a3ba52795cf7a62ce5fb4a7ac8dc9f1dd2254b1af2dba4681bfd1fa6bb</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">7bc43c2a6010849c4a713e025c2ffe605601df8cd3f5af5027c978b8da6c7c6f</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">26ce9c8aac1c86685dab7592ae4c24959f039e902114d6de2378052e97eb31e2</sum></package><package arch="noarch" name="tomcat6-lib" release="114.el6_10" src="tomcat6-6.0.24-114.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-114.el6_10.noarch.rpm</filename><sum type="sha256">e5f8748e8b5e9f488f39dc02b6fdcec0a2aaa655942fbb70bf83e2cc128fbaf5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0912" id="RHSA-2020:0912-1" title="Rhsa-2020:0912-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0914-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) 
* Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) 
* Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) 
* Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) 
* Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) 
* Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection (CVE-2020-6811) 
* Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-03-31 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.6.0-1.el6_10.src.rpm" version="68.6.0"><filename>thunderbird-68.6.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">c4e88dad2e40d442ddecf155120adec08feee5f8da7ef2c77ea1934574279897</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0914" id="RHSA-2020:0914-1" title="Rhsa-2020:0914-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1331-1</id><title>Ipmitool</title><description>Security Fix(es): 
* ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c (CVE-2020-5208)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ipmitool" release="3.el6_10" src="ipmitool-1.8.15-3.el6_10.src.rpm" version="1.8.15"><filename>ipmitool-1.8.15-3.el6_10.x86_64.rpm</filename><sum type="sha256">2e182a751e4523a33a84c771ddbd7034557b9fc467eafe6d65131739f310f83b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1331" id="RHSA-2020:1331-1" title="Rhsa-2020:1331-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1335-1</id><title>Telnet</title><description>Security Fix(es): 
* telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code (CVE-2020-10188)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="telnet" release="49.el6_10" src="telnet-0.17-49.el6_10.src.rpm" version="0.17"><filename>telnet-0.17-49.el6_10.x86_64.rpm</filename><sum type="sha256">dfd4f2e67da0c969fc49544fa8d07265de36d95787386055d5f9fd2ee604f7ef</sum></package><package arch="x86_64" epoch="1" name="telnet-server" release="49.el6_10" src="telnet-0.17-49.el6_10.src.rpm" version="0.17"><filename>telnet-server-0.17-49.el6_10.x86_64.rpm</filename><sum type="sha256">9ee028dd76710ec8cd4a90a7677aadf2a6951ab3f74a6a0f518590bffb51d121</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1335" id="RHSA-2020:1335-1" title="Rhsa-2020:1335-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1339-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819) 
* Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2020-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.6.1-1.el6_10.src.rpm" version="68.6.1"><filename>firefox-68.6.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">d1b1d470bebd7883e6081f7472b0cb24349ad0bbd7c5c8e953ae63f036723cc2</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.6.1-1.el6_10.src.rpm" version="68.6.1"><filename>firefox-68.6.1-1.el6_10.i686.rpm</filename><sum type="sha256">8ff4339baa2182e770b13ac184fd96c9931a1224cf68a4e9ed922a18184f0ced</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1339" id="RHSA-2020:1339-1" title="Rhsa-2020:1339-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1349-1</id><title>Krb5-Appl</title><description>Security Fix(es): 
* telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code (CVE-2020-10188)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="krb5-appl-clients" release="10.el6_10" src="krb5-appl-1.0.1-10.el6_10.src.rpm" version="1.0.1"><filename>krb5-appl-clients-1.0.1-10.el6_10.x86_64.rpm</filename><sum type="sha256">a4a8cc7c5ca0fb9ed73fd1289d55895380e3bc473d3dc69f5670259bb0a76368</sum></package><package arch="x86_64" name="krb5-appl-servers" release="10.el6_10" src="krb5-appl-1.0.1-10.el6_10.src.rpm" version="1.0.1"><filename>krb5-appl-servers-1.0.1-10.el6_10.x86_64.rpm</filename><sum type="sha256">4f7243da2587b8b2253b0af6bc856cdfd4b20b5b570f91204b33db73e95aef05</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1349" id="RHSA-2020:1349-1" title="Rhsa-2020:1349-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1403-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages 
Bug Fix(es): 
* QEMU: Slirp: disable emulation of tcp programs like ftp IRC etc. [rhel-6]</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.7" src="qemu-kvm-0.12.1.2-2.506.el6_10.7.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.7.x86_64.rpm</filename><sum type="sha256">9a815c56c55867c75987775efde007b697679b197e86fee08c4b172f5d43b1d2</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.7" src="qemu-kvm-0.12.1.2-2.506.el6_10.7.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.7.x86_64.rpm</filename><sum type="sha256">1c059e45489b612bcecc8132c9afe6754cd2961d92bdd07e23d2b808f1d45794</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.7" src="qemu-kvm-0.12.1.2-2.506.el6_10.7.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.7.x86_64.rpm</filename><sum type="sha256">51761e022be0e5be90b46a272cc274b94bd6524f4cea04c989ef8ca1a0bb1968</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.7" src="qemu-kvm-0.12.1.2-2.506.el6_10.7.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.7.x86_64.rpm</filename><sum type="sha256">fcec253f740936e289929679ecd0b9cc624d0825d81ca770587a0c02456c06a6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608" id="CVE-2020-8608" title="Qemu: Slirp: Potential Oob Access Due To Unsafe Snprintf() Usages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1403" id="RHSA-2020:1403-1" title="Rhsa-2020:1403-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798453" id="1798453" title="Qemu: Slirp: Potential Oob Access Due To Unsafe Snprintf() Usages" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1429-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) 
* Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) 
* Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="2.el6_10" src="firefox-68.7.0-2.el6_10.src.rpm" version="68.7.0"><filename>firefox-68.7.0-2.el6_10.x86_64.rpm</filename><sum type="sha256">a00250d6552c391b4b9e9fb0d3234711ad3397424be15cc8d6621b11a56c4b49</sum></package><package arch="i686" name="firefox" release="2.el6_10" src="firefox-68.7.0-2.el6_10.src.rpm" version="68.7.0"><filename>firefox-68.7.0-2.el6_10.i686.rpm</filename><sum type="sha256">ad728bcd2c4f76fcf472c16c6a85db811b9c7f71628cc434bd804e0100a5de05</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1429" id="RHSA-2020:1429-1" title="Rhsa-2020:1429-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1488-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819) 
* Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820) 
* Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) 
* Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) 
* Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.7.0-1.el6_10.src.rpm" version="68.7.0"><filename>thunderbird-68.7.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">af91ecd07df92005868b0db57f737bfac89a24cb8620f163431f4e39fc0f4080</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1488" id="RHSA-2020:1488-1" title="Rhsa-2020:1488-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1506-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) 
* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) 
* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) 
* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) 
* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) 
* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) 
* OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) 
* OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) 
* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) 
* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.252.b09-2.el6_10.noarch.rpm</filename><sum type="sha256">e19975268da987ac48575702799aead59f14f335ced187695be30aaec2cc5abb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-src-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">a3b8c44122715ab6022e9b01b5fa62ff4f851d7d8b4a0b7f6f0595fc509cdab4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">930ff7d46c1e87fdea89bde320aafc1d34a300e7121f3d8d596e55e265ca22b8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">8f2aa5a54befa4237be8fff9ae615360565f66a9e6eeb5310629f363f01d37ea</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">0b189b263b1503ef2103d171ce870d7a3b8d85f87d0a5eff0193f7c4302b1e75</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">8b81e14dd39c45376352d343cb4f004b57d1b35bc63e38283f9afa2f852e37f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">a7c6f9908f9336b2f5cb4d54a14792a16cc7840a03539f7c9a4086cf13b771ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">24e5603701b14ad55a9a3ec4cc0b580d5e97430e737df38ad947c2c490f32ff9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">bd3494a485bb99a8018b1b368992c7aee7ad32bea4a26f7fbbd35536a9d4064e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el6_10.noarch.rpm</filename><sum type="sha256">135085ccb7581891eea423fd6ef4d02cbc030b48e790aa48781d56271a8434ac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">df0372be296f609e4c256b6f24e6b583b8b62576bc063fe1de928fd7b53b9034</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el6_10" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el6_10.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.252.b09-2.el6_10.x86_64.rpm</filename><sum type="sha256">704b36e530c8859bbf9bf9f2a45352c1ee89c513a0d57eb52b06f6db719daace</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1506" id="RHSA-2020:1506-1" title="Rhsa-2020:1506-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1508-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) 
* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) 
* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) 
* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) 
* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) 
* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) 
* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) 
* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.22.1.el6_10" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.1.el6_10.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-src-1.7.0.261-2.6.22.1.el6_10.x86_64.rpm</filename><sum type="sha256">73c63e2b81de287aac5f7bf430eea852fc41da527684a817c579bce4248c7ff3</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.22.1.el6_10" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.1.el6_10.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.1.el6_10.x86_64.rpm</filename><sum type="sha256">dd9ff2660b45fae3a7d969b383e8c1ffeaff10de3d8286cd5bf81f3511e8c77b</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.22.1.el6_10" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.1.el6_10.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-1.7.0.261-2.6.22.1.el6_10.x86_64.rpm</filename><sum type="sha256">2cb171ded0d70794752e3325ae4d2465e91bd74af661dd6270c381ab0516c4c8</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.22.1.el6_10" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.1.el6_10.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.1.el6_10.noarch.rpm</filename><sum type="sha256">5b9f02ba2ad600fb3499389613ac77dc9176a41a7d9876768a59ed01fed443b1</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.22.1.el6_10" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.1.el6_10.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.1.el6_10.x86_64.rpm</filename><sum type="sha256">e979aa46fc8aef3407b4718ba644ba9e57f7734bd819710801d5c39fba167054</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1508" id="RHSA-2020:1508-1" title="Rhsa-2020:1508-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1524-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666) 
* kernel: offset2lib allows for the stack guard page to be jumped over (CVE-2017-1000371)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-04-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">f26a3bbb7c210b3f658b3d56c4b557f92c8eaa46641062b71be010ad0370d7f1</sum></package><package arch="x86_64" name="kernel" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">efa561c5f9d81e43174e76edf021e6cd721598cc0b71f97fc5a7d8817272d128</sum></package><package arch="noarch" name="kernel-firmware" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.29.1.el6.noarch.rpm</filename><sum type="sha256">bd4c2ee33949073a2178159e42b89a1c8c00fa0a4138d734a972ef527ce91efd</sum></package><package arch="i686" name="kernel-debug-devel" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.29.1.el6.i686.rpm</filename><sum type="sha256">6ba2d8062dfb47aa9fa2910f7981ef19987838a6c1a77143594b1c32a3909028</sum></package><package arch="noarch" name="kernel-doc" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.29.1.el6.noarch.rpm</filename><sum type="sha256">2defbde25423ad053033684cde92f7e36331c7358e7cef50faaa60613aaccd70</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">bca98da309af6a497c0b6415dd2f16fd845246e1ed1f331f1a17df285e33b6bc</sum></package><package arch="x86_64" name="kernel-headers" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">3928854001daf2aa1adac5270ea0a1a8adcb1261f695fa27864c512709f7560c</sum></package><package arch="x86_64" name="python-perf" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">73c51bbcf83983c22f1a55b5c3ac04401434fe046f62fe1651477a7504bdcf86</sum></package><package arch="x86_64" name="kernel-devel" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">e30525b62137d731b7438c26178c219b3fa8fec0d472860f4adbd2d449d491d7</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.29.1.el6.noarch.rpm</filename><sum type="sha256">21415c036c175c1ff223d933f78794efdd9bd62777ea5b32533bbe853dfb1a39</sum></package><package arch="x86_64" name="perf" release="754.29.1.el6" src="kernel-2.6.32-754.29.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.29.1.el6.x86_64.rpm</filename><sum type="sha256">10fe081158aec2aa56d68dbd2e097557f753fde5b36235e153d38dd4e6ed0a83</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1524" id="RHSA-2020:1524-1" title="Rhsa-2020:1524-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1962-1</id><title>Python-Twisted-Web</title><description>Security Fix(es): 
* python-twisted: HTTP request smuggling when presented with two Content-Length headers (CVE-2020-10108)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-05-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-twisted-web" release="6.el6_10" src="python-twisted-web-8.2.0-6.el6_10.src.rpm" version="8.2.0"><filename>python-twisted-web-8.2.0-6.el6_10.x86_64.rpm</filename><sum type="sha256">4b997567bac71f44fe6a36e51c1eddcedeb18e7813d51d869b08dd551559eef8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1962" id="RHSA-2020:1962-1" title="Rhsa-2020:1962-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2036-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) 
* Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) 
* Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831) 
* Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2020-05-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.8.0-1.el6_10.src.rpm" version="68.8.0"><filename>firefox-68.8.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">f61156ae80de43b3b04df36f0bde099750d56eb5c4e5bc26daa6d21cc329bf3b</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.8.0-1.el6_10.src.rpm" version="68.8.0"><filename>firefox-68.8.0-1.el6_10.i686.rpm</filename><sum type="sha256">ff969ec40b02b9b409cc49bc985aa45bcd464c72e5edee8463141ea0a97840b4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2036" id="RHSA-2020:2036-1" title="Rhsa-2020:2036-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2049-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) 
* Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) 
* usrsctp: Buffer overflow in AUTH chunk input validation (CVE-2020-6831) 
* Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392) 
* Mozilla: Sender Email Address Spoofing using encoded Unicode characters (CVE-2020-12397)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2020-05-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.8.0-1.el6_10.src.rpm" version="68.8.0"><filename>thunderbird-68.8.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">b016c1eb8a78241e4f41849341b6445947c92d315c22531c5211571649c89f33</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2049" id="RHSA-2020:2049-1" title="Rhsa-2020:2049-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2103-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-05-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.29.2.el6.noarch.rpm</filename><sum type="sha256">d5fc2eaa74a1164e87e0e4c89749626e01abb315781aa3723eef54d091cb717a</sum></package><package arch="x86_64" name="kernel" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">67822d2d9ffb06767fb130179ac4b232fc3478134d54f785ca5d0d1dc9d64f5b</sum></package><package arch="x86_64" name="kernel-devel" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">0eed25e8b1e7a725965a376be489ca942cb1d526e8bcf95a93bef6442f451e8c</sum></package><package arch="x86_64" name="python-perf" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">37b490f3f906e248f4eed6f0ecab0aae4fe8b45f5275d3408d194efc896f4398</sum></package><package arch="x86_64" name="kernel-headers" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">c920a16fa9050dd80f2a5a1c95667e4f60aa47f39195c0b1c07b372b24fe32ab</sum></package><package arch="x86_64" name="kernel-debug" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">a2e719080a6c128221f61dc84e3250e4903100fe8763bf6e6b0619ef56fcc7bb</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">5cc152c1fe431b6cd8426b89dcc95b248cc44186feb0e039bbeca9dc5b2b9f64</sum></package><package arch="x86_64" name="perf" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.29.2.el6.x86_64.rpm</filename><sum type="sha256">9dcdc836b765999535a2761568038ff8b285059242d5f5ea90ab0fc019be1c09</sum></package><package arch="i686" name="kernel-debug-devel" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.29.2.el6.i686.rpm</filename><sum type="sha256">c0253bd506d0754a0b06020c65c1c748b60f2bc25dfa40928e2d35b216dd414c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.29.2.el6.noarch.rpm</filename><sum type="sha256">0420598dca0abb270d088895439416fa07f685d4099807ee1b9683a815c292d6</sum></package><package arch="noarch" name="kernel-firmware" release="754.29.2.el6" src="kernel-2.6.32-754.29.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.29.2.el6.noarch.rpm</filename><sum type="sha256">c115cfac5d1f31547e415ce6299dd8df41c6a3343d6b1f45ed870a4098f1ecdb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2103" id="RHSA-2020:2103-1" title="Rhsa-2020:2103-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2378-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) 
* Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) 
* Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.9.0-1.el6_10.src.rpm" version="68.9.0"><filename>firefox-68.9.0-1.el6_10.i686.rpm</filename><sum type="sha256">c8492bbae72bdea59eb209ed09fdce0979d34a4510a76da61befda5fda11146d</sum></package><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.9.0-1.el6_10.src.rpm" version="68.9.0"><filename>firefox-68.9.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">55e18c2b26e5c1e8641bc1e7bd17a614725638b5fba0ff72fb4be7101afef48d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2378" id="RHSA-2020:2378-1" title="Rhsa-2020:2378-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2383-1</id><title>Bind</title><description>Security Fix(es): 
* bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) 
* bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-chroot" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.68.rc1.el6_10.7.x86_64.rpm</filename><sum type="sha256">52f6b135369251ae199f61610d307f3caf2be08bdc23d68c305ee6cde34ea077</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.7.x86_64.rpm</filename><sum type="sha256">1815c31a31e179561976f8fa93e2316ced088eb4ebda0f290edf0b9a5f5d6c19</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.7.x86_64.rpm</filename><sum type="sha256">e0c375f0a9243ce283a7535ec461582e093e008de261fc1ece147c704d672aed</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.68.rc1.el6_10.7.x86_64.rpm</filename><sum type="sha256">37f1379eb05e3e00e9cb64c8c66b8cac38224a3101939b30bb3a12eed9626b66</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.7.i686.rpm</filename><sum type="sha256">bd5e29847f28c681d00071493941add2c30d9ae99f4eb0469a22b89ee6873acf</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.68.rc1.el6_10.7.x86_64.rpm</filename><sum type="sha256">975cb2d7881d175ef5cb2f2756fca72fedc3339a54537ee85cd1ea96c3fdceb8</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.7.i686.rpm</filename><sum type="sha256">0260edc1e0c226c49f66583e3ca503f3c3976233210f54ae8139bbae52fe23af</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.68.rc1.el6_10.7" src="bind-9.8.2-0.68.rc1.el6_10.7.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.68.rc1.el6_10.7.x86_64.rpm</filename><sum type="sha256">78a7fcee699fa940b18fbc57b8797cc2a656e60851b89d1e6472d9b30a82325f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2383" id="RHSA-2020:2383-1" title="Rhsa-2020:2383-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2406-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c (CVE-2020-13398)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="freerdp" release="7.el6_10" src="freerdp-1.0.2-7.el6_10.src.rpm" version="1.0.2"><filename>freerdp-1.0.2-7.el6_10.x86_64.rpm</filename><sum type="sha256">382978ac6aa7c58dffe55467896dff6ec7f753b9d377803950c0d6caaf7b739c</sum></package><package arch="i686" name="freerdp-devel" release="7.el6_10" src="freerdp-1.0.2-7.el6_10.src.rpm" version="1.0.2"><filename>freerdp-devel-1.0.2-7.el6_10.i686.rpm</filename><sum type="sha256">eacfd27013b2bfdf41cd621abf469ac0aef2df7ad612db6da69bc6132b652730</sum></package><package arch="x86_64" name="freerdp-libs" release="7.el6_10" src="freerdp-1.0.2-7.el6_10.src.rpm" version="1.0.2"><filename>freerdp-libs-1.0.2-7.el6_10.x86_64.rpm</filename><sum type="sha256">3927d1e6cb98dacd45296f32f27d6500d30518ba63df4bc70d07a43af0466ccd</sum></package><package arch="x86_64" name="freerdp-devel" release="7.el6_10" src="freerdp-1.0.2-7.el6_10.src.rpm" version="1.0.2"><filename>freerdp-devel-1.0.2-7.el6_10.x86_64.rpm</filename><sum type="sha256">d2429368f35d36c98b6287bf3451fd701439e2ff72b09e5803f909ec91cd2a1a</sum></package><package arch="i686" name="freerdp-libs" release="7.el6_10" src="freerdp-1.0.2-7.el6_10.src.rpm" version="1.0.2"><filename>freerdp-libs-1.0.2-7.el6_10.i686.rpm</filename><sum type="sha256">a5baa62e16352b5b2ecd546ee16daf3567c42ef094f83f7f466cc12fd2a8c4f9</sum></package><package arch="x86_64" name="freerdp-plugins" release="7.el6_10" src="freerdp-1.0.2-7.el6_10.src.rpm" version="1.0.2"><filename>freerdp-plugins-1.0.2-7.el6_10.x86_64.rpm</filename><sum type="sha256">68efb6237f3b6a81a96f0132bf82897c1f0f8eb76df850650c3add70cbb5e59e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2406" id="RHSA-2020:2406-1" title="Rhsa-2020:2406-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2430-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: NULL pointer dereference due to KEYCTL_READ on negative key (CVE-2017-12192)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">e547a746e139188ef1fbdd4c9c989b6700d79d25268a8cdcdfa11c59deca8acc</sum></package><package arch="x86_64" name="python-perf" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">e1da983959062addad7af64808335fd166bbd1545f2e3c16cdeac90a987a7673</sum></package><package arch="x86_64" name="kernel-devel" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">d016358e5b83bade392d80a6c4e3c8e72eeadcdd6139a27faddd0ea593efbc77</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm</filename><sum type="sha256">730770d4ce0c67828244447ebc39d11243b6bfe40ddcd34224ab246ca84833d5</sum></package><package arch="x86_64" name="perf" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">832ae57dacc1a9f4369835c0c28c0083d3f4ccb5f67cfaea41df794309501533</sum></package><package arch="i686" name="kernel-debug-devel" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm</filename><sum type="sha256">f7c3d857729cb095d06af86f69412a2744053ad84aa50859ddfd0aa2abac566d</sum></package><package arch="noarch" name="kernel-doc" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.30.2.el6.noarch.rpm</filename><sum type="sha256">176c75f8d19c75db7f1c00844acd6777c12c2b16caa608896f6a369cdd48a785</sum></package><package arch="x86_64" name="kernel-headers" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">d2ed20835fe17dfaa1867ebe2dee997af754ce774fd740436e741414fbc71f40</sum></package><package arch="noarch" name="kernel-firmware" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm</filename><sum type="sha256">8a9d803a8bf4395aa75086a462f5a2f75457ae2c2bd2c4bc07a40a3e648defb9</sum></package><package arch="x86_64" name="kernel" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">dcc27f6867e38e6626886408b9c5e925bc69cf6d2e5f5e2684c415eb38ae9977</sum></package><package arch="x86_64" name="kernel-debug" release="754.30.2.el6" src="kernel-2.6.32-754.30.2.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.30.2.el6.x86_64.rpm</filename><sum type="sha256">c01e8dcbb1ec73428f4179c6661e06bae4cf7d2727f353e50f431df7d1df7c66</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2430" id="RHSA-2020:2430-1" title="Rhsa-2020:2430-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2433-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) 
* hw: L1D Cache Eviction Sampling (CVE-2020-0549) 
* hw: Vector Register Data Sampling (CVE-2020-0548)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="33.26.el6_10" src="microcode_ctl-1.17-33.26.el6_10.src.rpm" version="1.17"><filename>microcode_ctl-1.17-33.26.el6_10.x86_64.rpm</filename><sum type="sha256">b918dad1934cb5cd362758ddaab492d5fea16719bd11ce28bb66206b5b473b30</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2433" id="RHSA-2020:2433-1" title="Rhsa-2020:2433-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2516-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS (CVE-2020-13112)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libexif-devel" release="6.el6_10" src="libexif-0.6.21-6.el6_10.src.rpm" version="0.6.21"><filename>libexif-devel-0.6.21-6.el6_10.i686.rpm</filename><sum type="sha256">9879765aaf062b70cd05712af8a56585fe8b7183b876064046e3b52a00fb039b</sum></package><package arch="i686" name="libexif" release="6.el6_10" src="libexif-0.6.21-6.el6_10.src.rpm" version="0.6.21"><filename>libexif-0.6.21-6.el6_10.i686.rpm</filename><sum type="sha256">ace0d218fe2af9d4388e16cd74e56407fc84d7449c4734e5083f896cec0965a3</sum></package><package arch="x86_64" name="libexif-devel" release="6.el6_10" src="libexif-0.6.21-6.el6_10.src.rpm" version="0.6.21"><filename>libexif-devel-0.6.21-6.el6_10.x86_64.rpm</filename><sum type="sha256">0bd6502a2d401f3b05a7966e9d091fbe8bc03ac384b6613976be18294f73416c</sum></package><package arch="x86_64" name="libexif" release="6.el6_10" src="libexif-0.6.21-6.el6_10.src.rpm" version="0.6.21"><filename>libexif-0.6.21-6.el6_10.x86_64.rpm</filename><sum type="sha256">4eef4810aa5ffc7939f61e9c9ded81c18aac11695ef2b5078d2a0f3fb261e6ca</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2516" id="RHSA-2020:2516-1" title="Rhsa-2020:2516-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2529-1</id><title>Tomcat6</title><description>* tomcat: deserialization flaw in session persistence storage leading to RCE (CVE-2020-9484)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-06-16 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tomcat6-admin-webapps" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-admin-webapps-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">ab7257bf316de7c76f7c6f94963b25b7249b67eab8917d60658271ad54656af8</sum></package><package arch="noarch" name="tomcat6-webapps" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-webapps-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">c91a7a99212042e51aa337f876498052253ab3e7c8b92122d9f4bf8e3e78dbed</sum></package><package arch="noarch" name="tomcat6" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">f1b3b894b412ff6b21743ec297617202a22eef5f2b1ef6e897d14e2d17e73306</sum></package><package arch="noarch" name="tomcat6-docs-webapp" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-docs-webapp-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">1266db8f8dc17028c4ecf3a1e1ca909316d16467f2707a4d011c3a593f8ec9dd</sum></package><package arch="noarch" name="tomcat6-jsp-2.1-api" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-jsp-2.1-api-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">befc720145865fd7c2c8212e17ff455424fa5deb7121938b6aaec3cdbc744dfc</sum></package><package arch="noarch" name="tomcat6-javadoc" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-javadoc-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">6125b1df82d8470a1194b539578bab6a5b579b82d48b292677120b3b04a791e6</sum></package><package arch="noarch" name="tomcat6-el-2.1-api" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-el-2.1-api-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">5ba010b035d1372221917d23a762d5138648fb2669b799bc0806d7f2102bbcf2</sum></package><package arch="noarch" name="tomcat6-servlet-2.5-api" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-servlet-2.5-api-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">d8c8a740ba3cc36e91a74d7bbae6901df18ebe696ea3bbbeab47b0b0b4571e7e</sum></package><package arch="noarch" name="tomcat6-lib" release="115.el6_10" src="tomcat6-6.0.24-115.el6_10.src.rpm" version="6.0.24"><filename>tomcat6-lib-6.0.24-115.el6_10.noarch.rpm</filename><sum type="sha256">d6c3b2b895ffbcb24ce3002b1f7ada3852ef24da299fc828750bc1eb1b930991</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2529" id="RHSA-2020:2529-1" title="Rhsa-2020:2529-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2613-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage (CVE-2020-12398) 
* Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) 
* Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) 
* Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-06-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.9.0-1.el6_10.src.rpm" version="68.9.0"><filename>thunderbird-68.9.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">a99a2a5f4a7a5fad290b5552ee431ab1d74a13b2f753f819e2b594e344c67db4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2613" id="RHSA-2020:2613-1" title="Rhsa-2020:2613-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2640-1</id><title>Unbound</title><description>Security Fix(es): 
* unbound: amplification of an incoming query into a large number of queries directed to a target (CVE-2020-12662) 
* unbound: infinite loop via malformed DNS answers received from upstream servers (CVE-2020-12663)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-06-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="unbound-devel" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-devel-1.4.20-29.el6_10.1.x86_64.rpm</filename><sum type="sha256">1d4f92f44702fc7c904adf5df1a2ef62a908f70506749981cf2efea3e7eb036b</sum></package><package arch="i686" name="unbound-python" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-python-1.4.20-29.el6_10.1.i686.rpm</filename><sum type="sha256">24ed8af56ac67370ba105e9d738d0ecc654fa687460e129adfdf21af68f24218</sum></package><package arch="x86_64" name="unbound-python" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-python-1.4.20-29.el6_10.1.x86_64.rpm</filename><sum type="sha256">d1707938d7e15ba38cf01607b9bece57a4d64ace5291ccf3947128ab3b2a1f31</sum></package><package arch="i686" name="unbound-devel" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-devel-1.4.20-29.el6_10.1.i686.rpm</filename><sum type="sha256">1640c1c683df3635ae36acb42b5f14ecca4de9afafc02d2fc8ae56eec77367bf</sum></package><package arch="i686" name="unbound-libs" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-libs-1.4.20-29.el6_10.1.i686.rpm</filename><sum type="sha256">0be3da9d7576e4670c2a6779820fd9516c14d0be004c979b19adedae8eddead0</sum></package><package arch="x86_64" name="unbound-libs" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-libs-1.4.20-29.el6_10.1.x86_64.rpm</filename><sum type="sha256">18968c7d4b6430c66a42eefb5b100373786fa431711ffa59072638d522fa2a67</sum></package><package arch="x86_64" name="unbound" release="29.el6_10.1" src="unbound-1.4.20-29.el6_10.1.src.rpm" version="1.4.20"><filename>unbound-1.4.20-29.el6_10.1.x86_64.rpm</filename><sum type="sha256">466c7b780264ff6f47ebb44af6169cb1a1655224975f16020db57ac796cedd4d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2640" id="RHSA-2020:2640-1" title="Rhsa-2020:2640-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2824-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) 
* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) 
* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) 
* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-07-14 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.10.0-1.el6_10.src.rpm" version="68.10.0"><filename>firefox-68.10.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">356a5e1f0aae0c2bdeff5ffc239210604c68c31b7200fecca808c4deaa8d03d0</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.10.0-1.el6_10.src.rpm" version="68.10.0"><filename>firefox-68.10.0-1.el6_10.i686.rpm</filename><sum type="sha256">1804805bd0e916dcf89e3589374aaf5d1f06020b57373970e2ad0e3f3f01c681</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2824" id="RHSA-2020:2824-1" title="Rhsa-2020:2824-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2933-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure (CVE-2019-18660)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-07-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-firmware" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.31.1.el6.noarch.rpm</filename><sum type="sha256">7d3a2a63f1a3e7bbc67de2f0ca9c68e7c3daaf0640e4835f9b060961a70b9095</sum></package><package arch="x86_64" name="kernel-debug" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">52b70051b850207b166b44313808a03b04167353f5562d124de8b04c48f5598f</sum></package><package arch="x86_64" name="kernel-headers" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">6c0268f370b254d4eb8ae99b1e9122bad14773e073bf622398bc4025a50dd8e7</sum></package><package arch="noarch" name="kernel-doc" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.31.1.el6.noarch.rpm</filename><sum type="sha256">6917b2ed40d0db1bd3b8c8df73aac89cfcaf899404b5a011eac2f809b50955f1</sum></package><package arch="x86_64" name="perf" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">7846bfd191fb45b223c2fbee1c974a7d7b72dca8981d3002cad233f056764793</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.31.1.el6.noarch.rpm</filename><sum type="sha256">5a01513018c63477b395dfd3b566e36cb970039217f71703d35d01a9f49ef009</sum></package><package arch="i686" name="kernel-debug-devel" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.31.1.el6.i686.rpm</filename><sum type="sha256">423a5bcbfe1c0407b211abc3598b2c387670f59a3379a7710c824a55ca920132</sum></package><package arch="x86_64" name="kernel-devel" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">ab47cd221afa6fea564e7d67d593a9450261c9a562af71ed5f6aea7622bcd241</sum></package><package arch="x86_64" name="python-perf" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">0f4cbcc92017a2c8aefabb508ea138855003572bab7ba3a13588b6d7a5713afb</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">cac723d1aa1eae0b48952ea91f67c38659aa44c292b9090180729d2dc7be6224</sum></package><package arch="x86_64" name="kernel" release="754.31.1.el6" src="kernel-2.6.32-754.31.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.31.1.el6.x86_64.rpm</filename><sum type="sha256">f2b4e68218c5cd61018ec507191d9c24cee1484897ded4bccc2e7d74a5132e4c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2933" id="RHSA-2020:2933-1" title="Rhsa-2020:2933-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2966-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) 
* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) 
* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) 
* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-07-21 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.10.0-1.el6_10.src.rpm" version="68.10.0"><filename>thunderbird-68.10.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">5add26292dd2eddb823cfb34090ea6e7b94c3cd95f43b0c827ad37284057ad8c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2966" id="RHSA-2020:2966-1" title="Rhsa-2020:2966-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2985-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) 
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) 
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) 
* OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) (CVE-2020-14578) 
* OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) (CVE-2020-14579) 
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) 
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-07-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">43c5caca3ad62173c7c29bda5040153db67505e38a50f23a596dffa1fbdb9dbf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">15e836db4c53f5bb642c9310033d5a41404380ec8bf7370f4aa5361361d5d021</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">e986ee533e3db2f48d03dd4f678f8912607d8b7f7ae90bd859d61958a3b4ffd3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">1ec96fca88bb5b164f5bcc758a70a48eb7ccb2a0943c6317d486e9c79680b5bf</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.262.b10-0.el6_10.noarch.rpm</filename><sum type="sha256">d9add926a08b73c1a5202a99eacc399216cdeb39d52b5e2941285902e6bf4d58</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">4a910732ba6b00d9d3534361fe859534a371179777d4af967371e16a49c10c93</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">b466f0cf03e32161e753e65df8e73201f1e3046e57695b2b00421b7a43dbe26b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">400ec4bc198faa393bd5c21248553c1b6db9ea7a26bb5b86ed33e1feecb6ea0a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">a8e0ddd2c31bd91889ea66406591a8445780d957d41dd63158086499a61abc40</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">6a958747f126f1bbcc808192225e9c808aaa0cdf8b715e7d231cb8a1fae520a2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-src-1.8.0.262.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">84c16382b00f21e4c679db8d36b859284efc761839969856512ae70c88bc0cda</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el6_10.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el6_10.noarch.rpm</filename><sum type="sha256">f4bd52580595be5fb5245aed4860b1346bb6cb78963f1e7c4c0d896254c1b831</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2985" id="RHSA-2020:2985-1" title="Rhsa-2020:2985-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3233-1</id><title>Firefox</title><description>Security Fix(es): 
* chromium-browser: Use after free in ANGLE (CVE-2020-6463) 
* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) 
* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) 
* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-07-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.11.0-1.el6_10.src.rpm" version="68.11.0"><filename>firefox-68.11.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">a172839aa5d9391c700813e8e5c1531515cd9bb90c7957baf56999eb071c8b0c</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.11.0-1.el6_10.src.rpm" version="68.11.0"><filename>firefox-68.11.0-1.el6_10.i686.rpm</filename><sum type="sha256">17c09a311a7b229d3d205f635e6753b17d6da51e0fbc2f99264d5ca290d65323</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3233" id="RHSA-2020:3233-1" title="Rhsa-2020:3233-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3284-1</id><title>Postgresql-Jdbc</title><description>Security Fix(es): 
* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML (CVE-2020-13692)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-08-11 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="postgresql-jdbc" release="4.el6_10" src="postgresql-jdbc-8.4.704-4.el6_10.src.rpm" version="8.4.704"><filename>postgresql-jdbc-8.4.704-4.el6_10.noarch.rpm</filename><sum type="sha256">518995d76313e361af8511350b1dec10e78068f1851d168b4a8cda7456f71a39</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3284" id="RHSA-2020:3284-1" title="Rhsa-2020:3284-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3345-1</id><title>Thunderbird</title><description>Security Fix(es): 
* chromium-browser: Use after free in ANGLE (CVE-2020-6463) 
* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) 
* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) 
* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-08-25 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.11.0-1.el6_10.src.rpm" version="68.11.0"><filename>thunderbird-68.11.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">d47a7a6cbcc59666f7a275f9bd4ef19da093f8e9f0378cf9a9543412fb511213</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3345" id="RHSA-2020:3345-1" title="Rhsa-2020:3345-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3548-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Null pointer dereference in search_keyring (CVE-2017-2647) 
* kernel: heap-based buffer overflow in lbs_ibss_join_existing function in drivers/net/wireless/marvell/libertas/cfg.c (CVE-2019-14896)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-09-01 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="kernel-doc" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.33.1.el6.noarch.rpm</filename><sum type="sha256">89b9afcd74bc9bf1d0602ab37023b48695e0cea186a4612afb5a0697fd92cafa</sum></package><package arch="x86_64" name="kernel-debug" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">f5928642b57484b165a6f368616bdac53ec329c55614eb3506e56e081bfc7c9a</sum></package><package arch="noarch" name="kernel-firmware" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.33.1.el6.noarch.rpm</filename><sum type="sha256">d760d7286eca3b52ddd6765fe10afa6d88eceeb4dc85f1ce020cae7e7cc040f3</sum></package><package arch="i686" name="kernel-debug-devel" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.33.1.el6.i686.rpm</filename><sum type="sha256">52c94b1c7ab0197a72bef089969a663154c26bf7cd3c9f2ec945e1fd3b1e4a8a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.33.1.el6.noarch.rpm</filename><sum type="sha256">1c10f523013b858e8d2e5f087378a56c7f0794fd8d15df97649e51fc2e31fd1b</sum></package><package arch="x86_64" name="perf" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">336d7b947c7b64822090441d3f1bfa720a80407184085d5be0b9e0daa3f1ba29</sum></package><package arch="x86_64" name="kernel-headers" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">943d7c6f90f897a4307ea2b386da587dc9bc4fcf4f35fbcd92d6cc4b3a36f54a</sum></package><package arch="x86_64" name="kernel-devel" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">70b07ea3991a01cbcd87365e7df0c2b205ad2036b80d9c46e78f8a4c59409c0e</sum></package><package arch="x86_64" name="python-perf" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">9ea10871e5487c2bb26e9f2821210553277875edc64aaae2ee1ac9a66e8b00b6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">b73396b2dd5fc840b2d89c3a5dfc83d2f2e6a98cffac322ccfa89e5ad7396c94</sum></package><package arch="x86_64" name="kernel" release="754.33.1.el6" src="kernel-2.6.32-754.33.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.33.1.el6.x86_64.rpm</filename><sum type="sha256">830a36e34b85d43d6e8c4e52236a262fcadccf430a33707070c840740e8bb4bc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3548" id="RHSA-2020:3548-1" title="Rhsa-2020:3548-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3558-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664) 
* Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-09-01 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_10" src="firefox-68.12.0-1.el6_10.src.rpm" version="68.12.0"><filename>firefox-68.12.0-1.el6_10.i686.rpm</filename><sum type="sha256">023f3bb22b3cfba3d49d8262c6c3f3da0bfa7d1900c684eee1b0a343a568bfa2</sum></package><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-68.12.0-1.el6_10.src.rpm" version="68.12.0"><filename>firefox-68.12.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">d686b8cd28185eadb7e578973ea8b5e07312538069a81cd528c11ae732c4afd5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3558" id="RHSA-2020:3558-1" title="Rhsa-2020:3558-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3643-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664) 
* Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-09-15 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-68.12.0-1.el6_10.src.rpm" version="68.12.0"><filename>thunderbird-68.12.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">956a02dba47c9ee9669646ba512aa9b1c281789a6fc3bd9421fe387ff8b44f05</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3643" id="RHSA-2020:3643-1" title="Rhsa-2020:3643-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3835-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-10-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-78.3.0-1.el6_10.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">3d64e88fe9ce00a191a101ea6b99210c8dc027724572f1c25bdf659c74bb5ff4</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-78.3.0-1.el6_10.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el6_10.i686.rpm</filename><sum type="sha256">9aa64152a903a27623425043682949073834c68188e5a2f177ad87cbafbc645c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3835" id="RHSA-2020:3835-1" title="Rhsa-2020:3835-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4056-1</id><title>Qemu-Kvm</title><description>Security Fix(es):

* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-10-12 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="qemu-kvm" release="2.506.el6_10.8" src="qemu-kvm-0.12.1.2-2.506.el6_10.8.src.rpm" version="0.12.1.2"><filename>qemu-kvm-0.12.1.2-2.506.el6_10.8.x86_64.rpm</filename><sum type="sha256">79493faab3393d76903fa66483418b9a8c88cddb73061d0bf9ca7d99ce0204c5</sum></package><package arch="x86_64" epoch="2" name="qemu-kvm-tools" release="2.506.el6_10.8" src="qemu-kvm-0.12.1.2-2.506.el6_10.8.src.rpm" version="0.12.1.2"><filename>qemu-kvm-tools-0.12.1.2-2.506.el6_10.8.x86_64.rpm</filename><sum type="sha256">0dfa8bff99e94eb62e28cae9e6e3b655648e10db5ebae4d816ceff51f079453a</sum></package><package arch="x86_64" epoch="2" name="qemu-guest-agent" release="2.506.el6_10.8" src="qemu-kvm-0.12.1.2-2.506.el6_10.8.src.rpm" version="0.12.1.2"><filename>qemu-guest-agent-0.12.1.2-2.506.el6_10.8.x86_64.rpm</filename><sum type="sha256">74fdd6b189e6310f3ccecc8fd90cfc96e8d0a662b8830d7adc85a670b390fb55</sum></package><package arch="x86_64" epoch="2" name="qemu-img" release="2.506.el6_10.8" src="qemu-kvm-0.12.1.2-2.506.el6_10.8.src.rpm" version="0.12.1.2"><filename>qemu-img-0.12.1.2-2.506.el6_10.8.x86_64.rpm</filename><sum type="sha256">49582bab25552394e372d0bd82797d61e30413dd7c4099e4486411a14c7f0ba0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" id="CVE-2020-14364" title="Cve-2020-14364" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4056" id="RHSA-2020:4056-1" title="Rhsa-2020:4056-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869201" id="1869201" title="Cve-2020-14364 Qemu: Usb: Out-Of-Bounds R/W Access Issue While Processing Usb Packets" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4158-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-10-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-78.3.1-1.el6_10.src.rpm" version="78.3.1"><filename>thunderbird-78.3.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">593a3053072980885f159f570b670c8e1ea7581988f3cd7240db63a5907d9d53</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4158" id="RHSA-2020:4158-1" title="Rhsa-2020:4158-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4182-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-devel" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">cd62756df44ccd1d0f305777eb4b347f005145cfc52be91c267df44cbbc61a2e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-754.35.1.el6.noarch.rpm</filename><sum type="sha256">100e6fd09800c19d354b45d101ee8acf435ff3747dd55fa7c540336e22fa2856</sum></package><package arch="noarch" name="kernel-doc" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-754.35.1.el6.noarch.rpm</filename><sum type="sha256">3d2c718136637743613cca4a746e3a2db77f754e1fb8641560311ed6a1bb0e00</sum></package><package arch="x86_64" name="kernel" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">aa1b9a082e49c92f648f882317252148502f7534762d7e6c2a5abb47f7e3c9de</sum></package><package arch="x86_64" name="python-perf" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">b2eb54a99112bc0bd04280e9b5301339b810d3b93b0023428d533cabe88dbc09</sum></package><package arch="i686" name="kernel-debug-devel" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.35.1.el6.i686.rpm</filename><sum type="sha256">82911fc16c01b77d9ab57dbbaaacdc21489aa6c96bd204fa4138779315283f16</sum></package><package arch="x86_64" name="kernel-debug-devel" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">47ececa334eda69e484c2a899c6cab45d08857fd8c84f5c711f4064a2e2e4d1a</sum></package><package arch="x86_64" name="kernel-debug" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">215718a9ba3a5f6bdd195c05b9afc8537bf10fd584b597f188ebae4fc24efbed</sum></package><package arch="x86_64" name="kernel-headers" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">58421dd50c17f8a59633337a7b51cc66e6fe21b5953b4b59d21d1ff111111da7</sum></package><package arch="noarch" name="kernel-firmware" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-754.35.1.el6.noarch.rpm</filename><sum type="sha256">261ebda42bb7b07feafe9a41c9cd6496388092ad274663bda175b38075a9778b</sum></package><package arch="x86_64" name="perf" release="754.35.1.el6" src="kernel-2.6.32-754.35.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-754.35.1.el6.x86_64.rpm</filename><sum type="sha256">116e5d63b02f7a8b2977e93302695dad9429c61166df090eb5cea31b8800f0a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487" id="CVE-2019-11487" title="Kernel: Count Overflow In Fuse Request Leading To Use-After-Free Issues." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4182" id="RHSA-2020:4182-1" title="Rhsa-2020:4182-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703063" id="1703063" title="Kernel: Count Overflow In Fuse Request Leading To Use-After-Free Issues." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4183-1</id><title>Bind</title><description>Security Fix(es): 
* bind: truncated TSIG response can lead to an assertion failure (CVE-2020-8622)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="32" name="bind-sdb" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-sdb-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm</filename><sum type="sha256">7778fd4e617d6e75b840078e17746d0e61cb42ed85c5d2f9555232cd1489513e</sum></package><package arch="i686" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm</filename><sum type="sha256">96e44f398115d84ccab20b597896f01bf83641a97ab85850348fb9c9882d8066</sum></package><package arch="i686" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm</filename><sum type="sha256">f1d6c007de19e2138ddc190f7280255aec51331651f0077a2cb14883a9aaa193</sum></package><package arch="x86_64" epoch="32" name="bind" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm</filename><sum type="sha256">b0a12fd3a4802dddded6a9f85166cef183f596321c8123ca571e7cf57cd3c18a</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-utils-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm</filename><sum type="sha256">274692ef5bdb452cab90cb1975853a095b7af500df809e5e46bfecd5171754f1</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-chroot-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm</filename><sum type="sha256">2279a11285bfc7f37a26bfa39bc76534229fec1f70504c7f0150d8dcdb74e27a</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-devel-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm</filename><sum type="sha256">2a377d769b99b43bc534ffa2add1ee3848e0d502e82609b0bc65fbbb5c25f0f9</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="0.68.rc1.el6_10.8" src="bind-9.8.2-0.68.rc1.el6_10.8.src.rpm" version="9.8.2"><filename>bind-libs-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm</filename><sum type="sha256">c65c3a3b58cb6be99bc07a2235c6ddb77b9c8e84858e8fc917e7a89a048eb0f3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" id="CVE-2020-8622" title="Bind: Truncated Tsig Response Can Lead To An" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4183" id="RHSA-2020:4183-1" title="Rhsa-2020:4183-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869473" id="1869473" title="Bind: Truncated Tsig Response Can Lead To An" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4330-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="2.el6_10" src="firefox-78.4.0-2.el6_10.src.rpm" version="78.4.0"><filename>firefox-78.4.0-2.el6_10.x86_64.rpm</filename><sum type="sha256">34bab3186331584d74e21db2ba257f1328247a501a720553371c7202ccc8d0c1</sum></package><package arch="i686" name="firefox" release="2.el6_10" src="firefox-78.4.0-2.el6_10.src.rpm" version="78.4.0"><filename>firefox-78.4.0-2.el6_10.i686.rpm</filename><sum type="sha256">2ba2f4ee0d42c5c8f1f5814a9c6a21354292c95a1abf09b4ae6c91018cf49e0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4330" id="RHSA-2020:4330-1" title="Rhsa-2020:4330-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4348-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-11-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">9c0a5f98e62813b3e6a30ca8c903f3ee7088480dece25e32e9595ba5cb9807bf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">37eb2e53839940a82eea1c09b4a54e21601bcc8bafe883219b6c6c757fb257db</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">989998879ce0d251c9dd943fb7fff0406a04de126e700c3ba1052612236e3a70</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">95871a205effc2f6ba225ed6fa35f10f339bac0d9cf2f4f8f0796d5a3815f2c2</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.272.b10-0.el6_10.noarch.rpm</filename><sum type="sha256">3d848e9ca71e703304c558bb4843f6ac892c281d382699a33caf822871bc80a8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">1a9c8d446436d6aacd08c6093347bd23a26b05ed34b3154382d7ec32dcae1c63</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">628ebbab774ff7af8f16cd1fa473f6cb5c928f6432e9e33ba05cc55116cf8b7a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">7c49df596715a3bed201741bfb248c3ce43b328879c12a2829d022275cd9e489</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">586cbe80456e7375c2df56a5668012eab81e6721ddb185f6f862f65eb6d764f5</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-0.el6_10.noarch.rpm</filename><sum type="sha256">f80967b523dace32996e65a5aac40e1cfa2b2996f4f251493975e53c4f9620db</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">277b8bd054df66244ae8e3bd93d1961d6b5f114e820837b7cbb51c68157f9772</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el6_10" src="java-1.8.0-openjdk-1.8.0.272.b10-0.el6_10.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-0.el6_10.x86_64.rpm</filename><sum type="sha256">abc01626ea6ed927e2d715ce73d3d99ec2d82381e8d8e126c8850d6d80de5d85</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4348" id="RHSA-2020:4348-1" title="Rhsa-2020:4348-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4946-1</id><title>Libx11</title><description /><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-05 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libX11-devel" release="4.el6_10" src="libX11-1.6.4-4.el6_10.src.rpm" version="1.6.4"><filename>libX11-devel-1.6.4-4.el6_10.i686.rpm</filename><sum type="sha256">68f1dfbc7ea52eaaa0793c63f6f2488bab061f0e21af1c8cd8f88ad67b030d5e</sum></package><package arch="x86_64" name="libX11" release="4.el6_10" src="libX11-1.6.4-4.el6_10.src.rpm" version="1.6.4"><filename>libX11-1.6.4-4.el6_10.x86_64.rpm</filename><sum type="sha256">7028e20cc649831d81a87aaf48e3e16723db03f69977a74ab8b3de300c10b013</sum></package><package arch="x86_64" name="libX11-devel" release="4.el6_10" src="libX11-1.6.4-4.el6_10.src.rpm" version="1.6.4"><filename>libX11-devel-1.6.4-4.el6_10.x86_64.rpm</filename><sum type="sha256">d2bab073aebe6d9ef05d14ffa2b3a0bd27f0c850074aeec807070185143fdf0a</sum></package><package arch="noarch" name="libX11-common" release="4.el6_10" src="libX11-1.6.4-4.el6_10.src.rpm" version="1.6.4"><filename>libX11-common-1.6.4-4.el6_10.noarch.rpm</filename><sum type="sha256">cc943401aa5342763c1624d94045f07d846bcf5ed5f93b752144769100b82d9d</sum></package><package arch="i686" name="libX11" release="4.el6_10" src="libX11-1.6.4-4.el6_10.src.rpm" version="1.6.4"><filename>libX11-1.6.4-4.el6_10.i686.rpm</filename><sum type="sha256">f7b2e35a4af10b8d9346697dba79dda970f079c7a77ce54198f3596db2926259</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4946" id="RHSA-2020:4946-1" title="Rhsa-2020:4946-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4947-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-78.4.0-1.el6_10.src.rpm" version="78.4.0"><filename>thunderbird-78.4.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">39ea27354633b9b5939ee55fc6ef5da43085fe6c7775122862122d379822f306</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4947" id="RHSA-2020:4947-1" title="Rhsa-2020:4947-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4953-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) 
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) 
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) 
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-server-Xvfb" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xvfb-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">f52d59c9cdce91a21de04d9f681f8ad374ae71fe1a6c76f99450023871b95be4</sum></package><package arch="i686" name="xorg-x11-server-devel" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-devel-1.17.4-18.sl6_10.i686.rpm</filename><sum type="sha256">810b8bcc70516214184521857befce4baf6d3535e51e230b9c86140cd81517f7</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xdmx-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">131d150b19665a66f9be1d2fab4a9288eda475a0f867499d0837734c38d25a35</sum></package><package arch="noarch" name="xorg-x11-server-source" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-source-1.17.4-18.sl6_10.noarch.rpm</filename><sum type="sha256">15077b6f04e8b424e017e80f2ec3e2a25ae54c3cf3de956181a6a66326b0af21</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-common-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">e73edaf26a85603db1b55c2cd685fee1f31f71f54ec33780a6179eac30071a61</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-devel-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">7f70fd0a9de23e51a597962dee0794760aa766a86aa3f72f884ad2e04653004f</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xephyr-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">499fa86050c694c9dc455f53b84a93f15f22374cb96288eea4d65ce5eef9b404</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xorg-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">a82291850ab02a3950e609def882e951037dfe3442791976dd8989a3550e62cc</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="18.sl6_10" src="xorg-x11-server-1.17.4-18.sl6_10.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xnest-1.17.4-18.sl6_10.x86_64.rpm</filename><sum type="sha256">b29c5e68d7d03a4a696c9d280c22b811a3abd246e9c0649e6af6491bb67adb26</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4953" id="RHSA-2020:4953-1" title="Rhsa-2020:4953-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5084-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Vector Register Leakage-Active (CVE-2020-8696) 
* hw: Fast forward store predictor (CVE-2020-8698)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2020-11-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="33.31.el6_10" src="microcode_ctl-1.17-33.31.el6_10.src.rpm" version="1.17"><filename>microcode_ctl-1.17-33.31.el6_10.x86_64.rpm</filename><sum type="sha256">cdd345f1c05a89dbd9b20adcee0c411f0501700c47e7131cd41de0dd3b7e126c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5084" id="RHSA-2020:5084-1" title="Rhsa-2020:5084-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5104-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2020-11-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-78.4.1-1.el6_10.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el6_10.x86_64.rpm</filename><sum type="sha256">b01febe522d3456a286779a4691550e86e50e9af375a76e840ee42e952df9ef4</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-78.4.1-1.el6_10.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el6_10.i686.rpm</filename><sum type="sha256">d7a694205e09cdeb988f2f1dda108aa3093beb84ee59a0f4561893f0fba1d5cd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5104" id="RHSA-2020:5104-1" title="Rhsa-2020:5104-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5129-1</id><title>Net-Snmp</title><description>Security Fix(es): 
* net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="net-snmp-perl" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-perl-5.5-60.el6_10.2.x86_64.rpm</filename><sum type="sha256">173b7cbd3a9b7fd7004ed1593e160f569773e1b00b80db32c4015b109f14eaed</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-60.el6_10.2.i686.rpm</filename><sum type="sha256">c0c3aad58e11ebd52cd0a15fe50b7096ba65f974ce4c1210c4eeeb8816f9cdd5</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-60.el6_10.2.x86_64.rpm</filename><sum type="sha256">539b0f4ef0001707c1eb1427cdad7687d0eaa9746b2ca0a906cd4036a2d6f733</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-python-5.5-60.el6_10.2.x86_64.rpm</filename><sum type="sha256">2e20a0abd239594058a6e515e7a34d027a65beb9861dc86e3014facf018be2c9</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-5.5-60.el6_10.2.x86_64.rpm</filename><sum type="sha256">338e8a4931e9a2a73f450566b0c3db8866ef44b4702ac32922ff9c0b2043e696</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-utils-5.5-60.el6_10.2.x86_64.rpm</filename><sum type="sha256">00e9b8d61007fa0647a440ffc34557c07ee84ba14b3a55c57232cf675e51be07</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-60.el6_10.2.i686.rpm</filename><sum type="sha256">963c5bce27f67b465c2db63793d574a1902c50438dc012fcf8fa1ba803b4e02a</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="60.el6_10.2" src="net-snmp-5.5-60.el6_10.2.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-60.el6_10.2.x86_64.rpm</filename><sum type="sha256">153107c98ceec365cba080a5d95f0cc2e00e27957ae7896de121c1479ed61b0c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862" id="CVE-2020-15862" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5129" id="RHSA-2020:5129-1" title="Rhsa-2020:5129-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873038" id="1873038" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5164-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.4.3. 
Security Fix(es): 
* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-24 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-78.4.3-1.el6_10.src.rpm" version="78.4.3"><filename>thunderbird-78.4.3-1.el6_10.x86_64.rpm</filename><sum type="sha256">101b81ceba64abbdec6e7e0425b7fe0faefb2a8ccc63d70f0da7077dbd609e6c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" id="CVE-2020-26950" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5164" id="RHSA-2020:5164-1" title="Rhsa-2020:5164-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1896306" id="1896306" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5238-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.5.0. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="thunderbird" release="1.el6_10" src="thunderbird-78.5.0-1.el6_10.src.rpm" version="78.5.0"><filename>thunderbird-78.5.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">3bdacab79eee4666d5952ae904ed17bd61fdd482f690463dd12239367c0dee95</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5238" id="RHSA-2020:5238-1" title="Rhsa-2020:5238-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5257-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.5.0 ESR. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_10" src="firefox-78.5.0-1.el6_10.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el6_10.x86_64.rpm</filename><sum type="sha256">2fadd48ac9c380223899da3302f085c787f9d99fccf71d676dfe3a1bc8e731c2</sum></package><package arch="i686" name="firefox" release="1.el6_10" src="firefox-78.5.0-1.el6_10.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el6_10.i686.rpm</filename><sum type="sha256">1360465ffe212a59eec9eaaac5f0a255aa23eef3f5743794bc49bfb8683ad898</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5257" id="RHSA-2020:5257-1" title="Rhsa-2020:5257-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update></updates>