<?xml-stylesheet type="text/xsl" href="updateinfo.xsl"?>
<updates><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>CHG000000006261</id><title>Enhancement: Krb5-Fermi-Addons</title><description>Issue a new release of krb5-fermi-addons for both SLF5 and SLF6 with the following minor changes:
    - include new release of k5push updated by Bonnie King (also merge changes from Marc Mengel)
    - replace new-portal-ticket script with a "stub" since (a) not really needed for its original purpose and (b) the original used telnet which is no longer really used on any SLF systems by default (mostly superseded by SSH for most users)
    </description><release>Scientific Linux Fermi</release><issued date="2015-09-02 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="krb5-fermi-addons" release="1.slf5" src="krb5-fermi-addons-1.3-1.slf5.src.rpm" version="1.3"><filename>krb5-fermi-addons-1.3-1.slf5.i386.rpm</filename><sum type="sha">95c251d63bf861b8eb2f70f07de66c9c22514872</sum></package></collection></pkglist><references /></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:0669-1</id><title>Crash Bug Fix Update</title><release>Scientific Linux Fermi</release><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="crash" release="3.el5_11" src="crash-5.1.8-3.el5_11.src.rpm" version="5.1.8"><filename>crash-5.1.8-3.el5_11.i386.rpm</filename><sum type="sha">ad435e724d307901dafe6e2c30c853b9869d9b91</sum></package><package arch="i386" name="crash-devel" release="3.el5_11" src="crash-5.1.8-3.el5_11.src.rpm" version="5.1.8"><filename>crash-devel-5.1.8-3.el5_11.i386.rpm</filename><sum type="sha">69275a86b8c956c617be03cd7f2f6237a22f402c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0669" id="RHBA-2015:0669-1" title="Rhba-2015:0669-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1192396" id="1192396" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:0925-1</id><title>Nss And Nspr Bug Fix And Enhancement Update</title><description>The nss packages have been upgraded to upstream version 3.18.0, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release.</description><release>Scientific Linux Fermi</release><issued date="2015-06-09 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss" release="6.el5_11" src="nss-3.18.0-6.el5_11.src.rpm" version="3.18.0"><filename>nss-3.18.0-6.el5_11.i386.rpm</filename><sum type="sha">59cc5b4e5daa4701c43f784a59f618370baba6a7</sum></package><package arch="i386" name="nss-devel" release="6.el5_11" src="nss-3.18.0-6.el5_11.src.rpm" version="3.18.0"><filename>nss-devel-3.18.0-6.el5_11.i386.rpm</filename><sum type="sha">a7c78aaca29e670108edf9871834d537877625ae</sum></package><package arch="i386" name="nspr" release="1.el5_11" src="nspr-4.10.8-1.el5_11.src.rpm" version="4.10.8"><filename>nspr-4.10.8-1.el5_11.i386.rpm</filename><sum type="sha">e1a7a87251cde16af12a4eadafc866d9031a18b2</sum></package><package arch="i386" name="nspr-devel" release="1.el5_11" src="nspr-4.10.8-1.el5_11.src.rpm" version="4.10.8"><filename>nspr-devel-4.10.8-1.el5_11.i386.rpm</filename><sum type="sha">084a05c58069f6d27da99ce2df47b3d974d591b1</sum></package><package arch="i386" name="nss-pkcs11-devel" release="6.el5_11" src="nss-3.18.0-6.el5_11.src.rpm" version="3.18.0"><filename>nss-pkcs11-devel-3.18.0-6.el5_11.i386.rpm</filename><sum type="sha">d86fb6b67a89467adbd13a259e499797f4317671</sum></package><package arch="i386" name="nss-tools" release="6.el5_11" src="nss-3.18.0-6.el5_11.src.rpm" version="3.18.0"><filename>nss-tools-3.18.0-6.el5_11.i386.rpm</filename><sum type="sha">0182889cb4599698cd7960b118bb7933f495aadf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:0925" id="RHBA-2015:0925-1" title="Rhba-2015:0925-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1126-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancement:

* Morocco will suspend Daylight Saving Time (DST) from 2015-06-14 03:00 through 2015-07-19 02:00, not 2015-06-13 and 2015-07-18 as predicted. The tzdata packages have been adjusted to reflect this change.</description><release>Scientific Linux Fermi</release><issued date="2015-07-07 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2015e-1.el5.src.rpm" version="2015e"><filename>tzdata-2015e-1.el5.i386.rpm</filename><sum type="sha">c166c780503f7cb36a9438b7e4ae17f37f3f29fa</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2015e-1.el5.src.rpm" version="2015e"><filename>tzdata-java-2015e-1.el5.i386.rpm</filename><sum type="sha">e1b639769b35f61b0f37d8a9c6da41faf0e71aa2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1126" id="RHBA-2015:1126-1" title="Rhba-2015:1126-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229775" id="1229775" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229777" id="1229777" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229783" id="1229783" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229786" id="1229786" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1266-1</id><title>Tzdata Bug Fix Update</title><description>This update fixes the following bugs:

* In 2015, Egypt did not observe Daylight Savings Time (DST). However, in 2016, Egypt observes DST from July 7 at 24:00 to October 27 at 24:00. As a consequence of this change, the tzdata package had incorrect data regarding DST in Egypt in 2016. This has been fixed, and tzdata now has the correct data.</description><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016e-1.el5.src.rpm" version="2016e"><filename>tzdata-java-2016e-1.el5.i386.rpm</filename><sum type="sha">7e80376feb0e983411b8ec537da15a77887f4b87</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016e-1.el5.src.rpm" version="2016e"><filename>tzdata-2016e-1.el5.i386.rpm</filename><sum type="sha">d658ad8ed9423926aff0f2667d35b68173a31fde</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1266" id="RHBA-2016:1266-1" title="Rhba-2016:1266-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334677" id="1334677" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342553" id="1342553" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346423" id="1346423" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346424" id="1346424" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2096-1</id><title>Tzdata Bug Fix Update</title><description>This update fixes the following bug:

* This update fixes the daylight saving time (DST) date for Palestine. The correct date and time is October 29, 2016 at 01:00.</description><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016h-1.el5.src.rpm" version="2016h"><filename>tzdata-java-2016h-1.el5.i386.rpm</filename><sum type="sha">43b449a72d7fd00e0c27eab184ceebb017bfe8e8</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016h-1.el5.src.rpm" version="2016h"><filename>tzdata-2016h-1.el5.i386.rpm</filename><sum type="sha">a865d409f4cd5dbaa3e6fb8b296e7802b4ebdb36</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2096" id="RHBA-2016:2096-1" title="Rhba-2016:2096-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387368" id="1387368" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387374" id="1387374" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387416" id="1387416" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387419" id="1387419" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2660-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* A new time zone Asia/Famagusta has been created, which is a UTC+03 year round time zone. As of 2016-10-30, Cyprus split into two time zones. Northern Cyprus is now in the Asia/Famagusta time zone.

* The Pacific/Tongatapu time zone will reintroduce Daylight Saving Time (DST) on 2016-11-06.

* The Antarctica/Casey time zone has changed from UTC+08 to UTC+11 on 2016-10-22.</description><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016i-1.el5.src.rpm" version="2016i"><filename>tzdata-2016i-1.el5.i386.rpm</filename><sum type="sha">006e51b95cba6295867cd99f7f53cefceb74c290</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016i-1.el5.src.rpm" version="2016i"><filename>tzdata-java-2016i-1.el5.i386.rpm</filename><sum type="sha">d83cb4efd7f9e11984c4190a3450be1413785657</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2660" id="RHBA-2016:2660-1" title="Rhba-2016:2660-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391304" id="1391304" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391306" id="1391306" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391483" id="1391483" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391486" id="1391486" title="Tzdata-2016I Is Available" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2014:1299-1</id><title>Firefox Bug Fix And Enhancement Update</title><release>Scientific Linux Fermi</release><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="6.el5" src="firefox-31.1.0-6.el5.src.rpm" version="31.1.0"><filename>firefox-31.1.0-6.el5.i386.rpm</filename><sum type="sha">7b26a1a2bb725e49b9eaadd9792fa365622a7cb7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2014:1299" id="RHEA-2014:1299-1" title="Rhea-2014:1299-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1113929" id="1113929" title="[Rhel5] Rebase Mozilla Firefox  To 31-Esr After 24-Esr Is Eol" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2014:1733-1</id><title> Tzdata</title><description>This update adds an enhancement containing all changes implemented in tzdata-2014i, which includes the following changes that affect future time stamps:

* Pacific/Fiji will observe DST from November 02, 2014, 2 a.m. to January 18, 2015, 3 a.m.

* A new zone, Pacific/Bougainville, has been added for the part of Papua New Guinea that plans to switch from UTC+10 to UTC+11 on December 28, 2014, at 2 a.m.</description><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2014i-1.el5.src.rpm" version="2014i"><filename>tzdata-java-2014i-1.el5.i386.rpm</filename><sum type="sha">c447970bd79e17b0921cd8f5df68e02d16bfd8f1</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2014i-1.el5.src.rpm" version="2014i"><filename>tzdata-2014i-1.el5.i386.rpm</filename><sum type="sha">1dea7c564f7c22265b6ed753c9d0775168ddf1ba</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2014:1733" id="RHEA-2014:1733-1" title="Rhea-2014:1733-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155782" id="1155782" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155785" id="1155785" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155792" id="1155792" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155881" id="1155881" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:0141-1</id><title>Tzdata Enhancement Update</title><description>* Time reckoned by Earth's rotation drifts away from atomic time because of irregularities in the Earth's rate of rotation. For this reason, on 30 June 2015 at precisely 23:59:59, a leap second will be inserted (23:59:60), which will be followed by 00:00:00 the next day.</description><release>Scientific Linux Fermi</release><issued date="2014-02-11 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2015a-1.el5.src.rpm" version="2015a"><filename>tzdata-java-2015a-1.el5.i386.rpm</filename><sum type="sha">fa3e37ceeea9ef9d73c4d53106e6693dca3198b8</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2015a-1.el5.src.rpm" version="2015a"><filename>tzdata-2015a-1.el5.i386.rpm</filename><sum type="sha">3828389e62dfb8fbeeaad242ec1837ef3a079d5f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:0141" id="RHEA-2015:0141-1" title="Rhea-2015:0141-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180536" id="1180536" title="Extra Leap Second On 30Th Of June 2015 [6.6.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181933" id="1181933" title="Extra Leap Second On 30Th Of June 2015 [5.11]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181970" id="1181970" title="Extra Leap Second On 30Th Of June 2015" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181975" id="1181975" title="Extra Leap Second On 30Th Of June 2015" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:0717-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancements:

*  With this update, several changes have been made to the scheduling of Daylight Saving Time (DST) in the tzdata packages:

- Mongolia will start observing DST again this year, from the last Saturday in March at 02:00 to the last Saturday in September at 00:00. - Palestine will start DST on March 28, not March 27.  - The fall 2014 transition has been corrected from September 26 to October 24.</description><release>Scientific Linux Fermi</release><issued date="2015-04-14 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2015b-1.el5.src.rpm" version="2015b"><filename>tzdata-2015b-1.el5.i386.rpm</filename><sum type="sha">d99281645e523b7b827abe434814cf785fffb8fe</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2015b-1.el5.src.rpm" version="2015b"><filename>tzdata-java-2015b-1.el5.i386.rpm</filename><sum type="sha">e674324b1206115edb6e78e3658000a48090498b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:0717" id="RHEA-2015:0717-1" title="Rhea-2015:0717-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203327" id="1203327" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203329" id="1203329" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203331" id="1203331" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203333" id="1203333" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:0913-1</id><title> Tzdata</title><description>This update adds the following enhancement:

* Egypt will not observe daylight saving time (DST) in 2015. Potential suspension of the daylight saving system in Egypt for the following years is under consideration.</description><release>Scientific Linux Fermi</release><issued date="2015-05-05 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2015d-1.el5.src.rpm" version="2015d"><filename>tzdata-java-2015d-1.el5.i386.rpm</filename><sum type="sha">c8ef5b30cc92906846c80576ef0751e35b0c2490</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2015d-1.el5.src.rpm" version="2015d"><filename>tzdata-2015d-1.el5.i386.rpm</filename><sum type="sha">f91b2ea3146ddcac6d292084a985f04ef3f7f67c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:0913" id="RHEA-2015:0913-1" title="Rhea-2015:0913-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213913" id="1213913" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213916" id="1213916" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213922" id="1213922" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213925" id="1213925" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:1863-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2015g, which provides a number of enhancements over the previous version. Namely:

* Turkey's 2015 fall-back transition is scheduled for November 8, not October 25. * Norfolk moves from +1130 to +1100 on October 4, 2015 at 02:00 local time. * Fiji's 2016 fall-back transition is scheduled for January 17, not January 24. * Fort Nelson, British Columbia will not fall back on November 1, 2015. Also, British Colombia has effectively been on MST (-0700) since it advanced its clocks on March 8, 2015.</description><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2015g-1.el5.src.rpm" version="2015g"><filename>tzdata-2015g-1.el5.i386.rpm</filename><sum type="sha">cbcbfce9b8c0acbe8e0d38adf50aa9945bf897eb</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2015g-1.el5.src.rpm" version="2015g"><filename>tzdata-java-2015g-1.el5.i386.rpm</filename><sum type="sha">83714515e03e02b0cb702afafc4ab5aa61fa01b2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1863" id="RHEA-2015:1863-1" title="Rhea-2015:1863-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265766" id="1265766" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267710" id="1267710" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267712" id="1267712" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267716" id="1267716" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0154-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2016a, which provides a number of bug fixes and enhancements over the previous version, notably:

* Prior to this update, an incorrect assumption was made about the daylight saving time (DST) in the America/Cayman time zone this year, which was reflected in the code. The mentioned time zone will not have DST this year. To  the previous change has been reverted.

* The Asia/Chita time zone switches from +0800 to +0900 on 2016-03-27 at 02:00. This change has been implemented.

* The DST predictions for the Asia/Tehran time zone for the year 2038 and later are now March 21 00:00 to September 21 00:00. This premise has been implemented.

This update also fixes the following bug:

* Starting from 2027, the Java timezone generation tool would incorrectly calculate the Africa/Casablanca time transitions. This bug has been fixed, and the tool will calculate these transitions correctly.

In addition, this update adds the following enhancement:

* At present, in Scientific Linux 6, the /etc/localtime file is not preserved across package updates even when it is a symbolic link. This tzdata version contains preparatory work to support preserving /etc/localtime across package upgrades if it is a symbolic link. Currently, this change is inactive, and the time zone must still be configured through /etc/sysconfig/clock. The change will be supported by a future glibc update.</description><release>Scientific Linux Fermi</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016a-1.el5.src.rpm" version="2016a"><filename>tzdata-2016a-1.el5.i386.rpm</filename><sum type="sha">008eba1dc9e1bb82b8b1d29642acfa7d835b2ca8</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016a-1.el5.src.rpm" version="2016a"><filename>tzdata-java-2016a-1.el5.i386.rpm</filename><sum type="sha">769b753a0cb3886fe5e825c3ea97b516cad497cf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0154" id="RHEA-2016:0154-1" title="Rhea-2016:0154-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292833" id="1292833" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292837" id="1292837" title="S8051641: Africa/Casablanca Transitions Is Incorrectly Calculated Starting From 2027 [6.7.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302733" id="1302733" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302734" id="1302734" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302740" id="1302740" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302741" id="1302741" title="Tzdata-2016A Is Available" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0463-1</id><title>Tzdata</title><description>The tzdata packages have been upgraded to upstream version 2016b, which provides a number of enhancements over the previous version, notably:

* This update introduces a number of new time zones for several regions in the Russian Federation, which will switch time on 2016-03-27 at 02:00 local time: - The Europe/Astrakhan time zone for Astrakhan Oblast, which will switch from UTC +03 to +04. - The Europe/Ulyanovsk time zone for Ulyanovsk Oblast, which will likely switch from UTC +03 to +04. - The Asia/Barnaul time zone for Altai Krai and Altai Republic, which will likely switch from UTC +06 to +07.

* This update takes into account that the Asia/Sakhalin time zone will switch from UTC +10 to +11 on 2016-03-27 at 02:00 local time.

* This update takes into account that Haiti will not observe the Daylight Saving Time (DST) in 2016.

* This update takes into account that Palestine's spring-forward transition will happen on 2016-03-26 at 01:00 local time, not 00:00.</description><release>Scientific Linux Fermi</release><issued date="2016-03-28 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016b-1.el5.src.rpm" version="2016b"><filename>tzdata-2016b-1.el5.i386.rpm</filename><sum type="sha">bafad86e9e9a83d19407e5c50ef41c05fcc1e6cd</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016b-1.el5.src.rpm" version="2016b"><filename>tzdata-java-2016b-1.el5.i386.rpm</filename><sum type="sha">1131bb33a5f0893956da772dd4a12725f1c0e65d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0463" id="RHEA-2016:0463-1" title="Rhea-2016:0463-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317703" id="1317703" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317704" id="1317704" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317707" id="1317707" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317708" id="1317708" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0517-1</id><title>Tzdata</title><description>This update adds the following enhancement:

* This update takes into account that Azerbaijan will no longer observe Daylight Saving Time (DST), and that Chile changes from permanent DST to seasonal DST.</description><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016c-1.el5.src.rpm" version="2016c"><filename>tzdata-java-2016c-1.el5.i386.rpm</filename><sum type="sha">7b33c7a7b79e37ca3c36be3bc7208dcdaebc9211</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016c-1.el5.src.rpm" version="2016c"><filename>tzdata-2016c-1.el5.i386.rpm</filename><sum type="sha">0fe2feb975ef516be49e14e1e14ebccd392c76d7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0517" id="RHEA-2016:0517-1" title="Rhea-2016:0517-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319304" id="1319304" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319306" id="1319306" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319310" id="1319310" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319311" id="1319311" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0683-1</id><title>Tzdata</title><description>This update adds the following enhancements:

* Asia/Magadan will switch from UTC+10 to UTC+11 on April 24, 2016 at 02:00.

* America/Caracas will switch from UTC-0430 to UTC-04 on May 01, 2016 at 02:30.

* New zone Asia/Tomsk, split off from Asia/Novosibirsk. It covers Tomsk Oblast, Russia, which will switch from UTC+06 to UTC+07 on May 29, 2016 at 02:00.</description><release>Scientific Linux Fermi</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016d-1.el5.src.rpm" version="2016d"><filename>tzdata-2016d-1.el5.i386.rpm</filename><sum type="sha">163ef353a0cc926c124fd1208b03d9777752b614</sum></package><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016d-1.el5.src.rpm" version="2016d"><filename>tzdata-java-2016d-1.el5.i386.rpm</filename><sum type="sha">e42446fe85cd7bc085591240cb5b8507924cc009</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0683" id="RHEA-2016:0683-1" title="Rhea-2016:0683-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326484" id="1326484" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326486" id="1326486" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326490" id="1326490" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326491" id="1326491" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:1388-1</id><title>Tzdata Enhancement Update</title><description>Prior to this update, the data files provided by the tzdata package reflected the Egyptian government's plan to transition to daylight saving time (DST) on July 7, but the Egyptian government canceled the planned transition. This update provides tzdata data files that reflect the change of plans, and will thus provide correct time zone information.

This update also includes a time zone transition for Asia/Novosibirsk from +06 to +07 on 2016-07-24 at 02:00.</description><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016f-1.el5.src.rpm" version="2016f"><filename>tzdata-java-2016f-1.el5.i386.rpm</filename><sum type="sha">7ee38a2da982b9655108dbb05c4bb767f4ec0024</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016f-1.el5.src.rpm" version="2016f"><filename>tzdata-2016f-1.el5.i386.rpm</filename><sum type="sha">796ad67e881d5d25f819814b1f77497d417274bc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:1388" id="RHEA-2016:1388-1" title="Rhea-2016:1388-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:1982-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2016g, which provides a number of enhancements over the previous version, notably:

* This update takes into account that Turkey will not transition out of the DST (+03) time zone on 2016-10-30.

* A new leap second will be added on 2016-12-31 23:59:60 UTC, as specified in the IERS Bulletin C 52.</description><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata" release="2.el5" src="tzdata-2016g-2.el5.src.rpm" version="2016g"><filename>tzdata-2016g-2.el5.i386.rpm</filename><sum type="sha">37f57b7c531d2ffdf8306d1a962c69522fc83f2a</sum></package><package arch="i386" name="tzdata-java" release="2.el5" src="tzdata-2016g-2.el5.src.rpm" version="2016g"><filename>tzdata-java-2016g-2.el5.i386.rpm</filename><sum type="sha">83f27a7c67b59bc0ffae32a50b95ea18e7f8524d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:1982" id="RHEA-2016:1982-1" title="Rhea-2016:1982-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356223" id="1356223" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356224" id="1356224" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377711" id="1377711" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377715" id="1377715" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379602" id="1379602" title="A Positive Leap Second Will Be Added On 31St December 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379621" id="1379621" title="A Positive Leap Second Will Be Added On 31St December 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380476" id="1380476" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380481" id="1380481" title="Daylight Savings Time To Be Permanent In Turkey" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:2832-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* The Saratov region of Russia will transition from UTC+03 to UTC+04 on 2016-12-04, resulting in a new time zone Europe/Saratov.</description><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="tzdata-java" release="1.el5" src="tzdata-2016j-1.el5.src.rpm" version="2016j"><filename>tzdata-java-2016j-1.el5.i386.rpm</filename><sum type="sha">429988f7eacdeafaed0bb924c1f5e64f4f39c6f3</sum></package><package arch="i386" name="tzdata" release="1.el5" src="tzdata-2016j-1.el5.src.rpm" version="2016j"><filename>tzdata-2016j-1.el5.i386.rpm</filename><sum type="sha">107e5b5f00f2da6741a3679d0f2691802813fb4d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2832" id="RHEA-2016:2832-1" title="Rhea-2016:2832-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398363" id="1398363" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398364" id="1398364" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398378" id="1398378" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398379" id="1398379" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1255-1</id><title>Krb5</title><description>A buffer overflow was found in the KADM5 administration server (kadmind) when it was used with an LDAP back end for the KDC database. A remote, authenticated attacker could potentially use this flaw to execute arbitrary code on the system running kadmind. (CVE-2014-4345) 
After installing the updated packages, the krb5kdc and kadmind daemons will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-21 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="krb5-libs" release="80.el5.slf5" src="krb5-1.6.1-80.el5.slf5.src.rpm" version="1.6.1"><filename>krb5-libs-1.6.1-80.el5.slf5.i386.rpm</filename><sum type="sha">d1b8779a73b989a87bfa17d0264a78d30163655e</sum></package><package arch="i386" name="krb5-workstation" release="80.el5.slf5" src="krb5-1.6.1-80.el5.slf5.src.rpm" version="1.6.1"><filename>krb5-workstation-1.6.1-80.el5.slf5.i386.rpm</filename><sum type="sha">8fc652c5b1b30cbfbc48aecc7852d525bde7d1ed</sum></package><package arch="i386" name="krb5-server-ldap" release="80.el5.slf5" src="krb5-1.6.1-80.el5.slf5.src.rpm" version="1.6.1"><filename>krb5-server-ldap-1.6.1-80.el5.slf5.i386.rpm</filename><sum type="sha">c3d56956970c51e6b5ba6868b65e90fbde58cce3</sum></package><package arch="i386" name="krb5-libs" release="80.el5_11" src="krb5-1.6.1-80.el5_11.src.rpm" version="1.6.1"><filename>krb5-libs-1.6.1-80.el5_11.i386.rpm</filename><sum type="sha">964d7af1888530ed0895e5903e74550784f88789</sum></package><package arch="i386" name="krb5-devel" release="80.el5.slf5" src="krb5-1.6.1-80.el5.slf5.src.rpm" version="1.6.1"><filename>krb5-devel-1.6.1-80.el5.slf5.i386.rpm</filename><sum type="sha">988d1a6f5a58824ac530b722d90c7457623d7269</sum></package><package arch="i386" name="krb5-server-ldap" release="80.el5_11" src="krb5-1.6.1-80.el5_11.src.rpm" version="1.6.1"><filename>krb5-server-ldap-1.6.1-80.el5_11.i386.rpm</filename><sum type="sha">a9d5892f5f9b460ea173f0ee6479110ef2f37f30</sum></package><package arch="i386" name="krb5-devel" release="80.el5_11" src="krb5-1.6.1-80.el5_11.src.rpm" version="1.6.1"><filename>krb5-devel-1.6.1-80.el5_11.i386.rpm</filename><sum type="sha">e64a3acd558a89afef9cebf50374cd2f6d64e547</sum></package><package arch="i386" name="krb5-server" release="80.el5.slf5" src="krb5-1.6.1-80.el5.slf5.src.rpm" version="1.6.1"><filename>krb5-server-1.6.1-80.el5.slf5.i386.rpm</filename><sum type="sha">8272b9182745db1a6112cc1e215b77b3186e53fc</sum></package><package arch="i386" name="krb5-workstation" release="80.el5_11" src="krb5-1.6.1-80.el5_11.src.rpm" version="1.6.1"><filename>krb5-workstation-1.6.1-80.el5_11.i386.rpm</filename><sum type="sha">46520b6b03b2a02d8bf1e903013cad4b1e4ca04c</sum></package><package arch="i386" name="krb5-server" release="80.el5_11" src="krb5-1.6.1-80.el5_11.src.rpm" version="1.6.1"><filename>krb5-server-1.6.1-80.el5_11.i386.rpm</filename><sum type="sha">fe5be8e7058445f7e497215a831ba5c5f314e25e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" id="CVE-2014-4345" title="Krb5: Buffer Overrun In Kadmind With Ldap Backend (Mitkrb5-Sa-2014-001)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1255" id="RHSA-2014:1255-1" title="Rhsa-2014:1255-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128157" id="1128157" title="Krb5: Buffer Overrun In Kadmind With Ldap Backend (Mitkrb5-Sa-2014-001)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1293-1</id><title>Bash</title><description>A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-6271) 
For additional information on the CVE-2014-6271 flaw, refer to https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-09-24 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="bash" release="33.el5.1" src="bash-3.2-33.el5.1.src.rpm" version="3.2"><filename>bash-3.2-33.el5.1.i386.rpm</filename><sum type="sha">54a03f6e15936f0adcac5bdc4c0430d82b0c4d9a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" id="CVE-2014-6271" title="Bash: Specially-Crafted Environment Variables Can Be Used To Inject Shell Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1293" id="RHSA-2014:1293-1" title="Rhsa-2014:1293-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141597" id="1141597" title="Bash: Specially-Crafted Environment Variables Can Be Used To Inject Shell Commands" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1306-1</id><title>Bash</title><description>It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169) 
Applications which directly create bash functions as environment variables need to be made aware of changes to the way names are handled by this update. 
Note: Docker users are advised to use "yum update" within their containers, and to commit the resulting changes. 
For additional information on CVE-2014-6271 and CVE-2014-7169, refer to https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-26 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="bash" release="33.el5_11.4" src="bash-3.2-33.el5_11.4.src.rpm" version="3.2"><filename>bash-3.2-33.el5_11.4.i386.rpm</filename><sum type="sha">6dd653c39770fb7d8475f4d50b556f74de8c06d8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" id="CVE-2014-7169" title="Bash: Code Execution Via Specially-Crafted Environment (Incomplete Fix For Cve-2014-6271)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1306" id="RHSA-2014:1306-1" title="Rhsa-2014:1306-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1146319" id="1146319" title="Bash: Code Execution Via Specially-Crafted Environment (Incomplete Fix For Cve-2014-6271)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1307-1</id><title>Nss</title><description>A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS. (CVE-2014-1568) 
After installing this update, applications using NSS must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-09-30 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss-devel" release="4.el5_11" src="nss-3.16.1-4.el5_11.src.rpm" version="3.16.1"><filename>nss-devel-3.16.1-4.el5_11.i386.rpm</filename><sum type="sha">747837872e8acb774017073f5aa73687e6befa3c</sum></package><package arch="i386" name="nss-pkcs11-devel" release="4.el5_11" src="nss-3.16.1-4.el5_11.src.rpm" version="3.16.1"><filename>nss-pkcs11-devel-3.16.1-4.el5_11.i386.rpm</filename><sum type="sha">e0de25006c45a24c520856720436a0ea3453233e</sum></package><package arch="i386" name="nss-tools" release="4.el5_11" src="nss-3.16.1-4.el5_11.src.rpm" version="3.16.1"><filename>nss-tools-3.16.1-4.el5_11.i386.rpm</filename><sum type="sha">1215bba8d72d4170dea8e9bffeadce333c8f4be7</sum></package><package arch="i386" name="nss" release="4.el5_11" src="nss-3.16.1-4.el5_11.src.rpm" version="3.16.1"><filename>nss-3.16.1-4.el5_11.i386.rpm</filename><sum type="sha">645b6a6aa50bfb2be80f65fbac507f7f91183d99</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" id="CVE-2014-1568" title="Nss: Rsa Pkcs#1 Signature Verification Forgery Flaw (Mfsa 2014-73)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1307" id="RHSA-2014:1307-1" title="Rhsa-2014:1307-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1145429" id="1145429" title="Nss: Rsa Pkcs#1 Signature Verification Forgery Flaw (Mfsa 2014-73)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1326-1</id><title>Php53 And Php</title><description>It was found that the fix for CVE-2012-1571 was incomplete; the File Information (fileinfo) extension did not correctly parse certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted CDF file. (CVE-2014-3587) 
A NULL pointer dereference flaw was found in the gdImageCreateFromXpm() function of PHP's gd extension. A remote attacker could use this flaw to crash a PHP application using gd via a specially crafted X PixMap (XPM) file. (CVE-2014-2497) 
Multiple buffer over-read flaws were found in the php_parserr() function of PHP. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record() function to perform a DNS query. (CVE-2014-3597) 
Two use-after-free flaws were found in the way PHP handled certain Standard PHP Library (SPL) Iterators and ArrayIterators. A malicious script author could possibly use either of these flaws to disclose certain portions of server memory. (CVE-2014-4670, CVE-2014-4698) 
The CVE-2014-3597 issue was discovered by David Kutlek of the Red Hat BaseOS QE. 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="php53-imap" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-imap-5.3.3-24.el5.i386.rpm</filename><sum type="sha">7b2ec89500a77ca960ba2cc290169e8a10fb2c50</sum></package><package arch="i386" name="php53-devel" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-devel-5.3.3-24.el5.i386.rpm</filename><sum type="sha">0663fd2752794908a714b024d97e0bf5f23f5239</sum></package><package arch="i386" name="php53-xml" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-xml-5.3.3-24.el5.i386.rpm</filename><sum type="sha">c3544460746fcb1fb780652a2bcd8946dbb49304</sum></package><package arch="i386" name="php53-process" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-process-5.3.3-24.el5.i386.rpm</filename><sum type="sha">24fc46a60a204bfa7f0215c2a82ff4e0a67981e5</sum></package><package arch="i386" name="php53-mysql" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-mysql-5.3.3-24.el5.i386.rpm</filename><sum type="sha">42ef5d5de7af6c3e34000f3cc1d5c445b91f1175</sum></package><package arch="i386" name="php53-pspell" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-pspell-5.3.3-24.el5.i386.rpm</filename><sum type="sha">674fe7789d9fec7fcf08e912e2013b2ab97de140</sum></package><package arch="i386" name="php53-cli" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-cli-5.3.3-24.el5.i386.rpm</filename><sum type="sha">7708d48910703bff26790c31661940e8c5df3ee8</sum></package><package arch="i386" name="php53" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-5.3.3-24.el5.i386.rpm</filename><sum type="sha">e72b70ca5975f8720265e868a7d40a930ad852ee</sum></package><package arch="i386" name="php53-bcmath" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-bcmath-5.3.3-24.el5.i386.rpm</filename><sum type="sha">a6b28ed03fb7f09a2908278f002c10772fe986ff</sum></package><package arch="i386" name="php53-snmp" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-snmp-5.3.3-24.el5.i386.rpm</filename><sum type="sha">10f704f36ba55f7695ce41554e7d4c05b20763ef</sum></package><package arch="i386" name="php53-gd" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-gd-5.3.3-24.el5.i386.rpm</filename><sum type="sha">6d5ea1893c9a3e4cb6d4cd35b8bbb562e710716f</sum></package><package arch="i386" name="php53-soap" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-soap-5.3.3-24.el5.i386.rpm</filename><sum type="sha">b23463b3b298e68fa59f33dda3419ebcbc391d32</sum></package><package arch="i386" name="php53-intl" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-intl-5.3.3-24.el5.i386.rpm</filename><sum type="sha">db07f57b1a614f823bfe196aecb71d4bfa9a4f35</sum></package><package arch="i386" name="php53-ldap" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-ldap-5.3.3-24.el5.i386.rpm</filename><sum type="sha">d7b9884bf2a7cb5caefe75070a6b3e274c4f2367</sum></package><package arch="i386" name="php53-dba" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-dba-5.3.3-24.el5.i386.rpm</filename><sum type="sha">35100750b52cd1415879854bf4900d4d4aea71eb</sum></package><package arch="i386" name="php53-mbstring" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-mbstring-5.3.3-24.el5.i386.rpm</filename><sum type="sha">f5d2d7a427e73bc1b501c4e14040aaf940326f36</sum></package><package arch="i386" name="php53-pgsql" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-pgsql-5.3.3-24.el5.i386.rpm</filename><sum type="sha">9ff7d8bb9f1b0007135bb8321bd60d0955f4f4bf</sum></package><package arch="i386" name="php53-common" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-common-5.3.3-24.el5.i386.rpm</filename><sum type="sha">80ed419c05eddd2e6fe7f018f1960de660b7601e</sum></package><package arch="i386" name="php53-xmlrpc" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-xmlrpc-5.3.3-24.el5.i386.rpm</filename><sum type="sha">36b5c764fb32adb05b382ba0755714a153decbea</sum></package><package arch="i386" name="php53-odbc" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-odbc-5.3.3-24.el5.i386.rpm</filename><sum type="sha">66868bf3b8133112fa3c2d943d4447a8dc75febd</sum></package><package arch="i386" name="php53-pdo" release="24.el5" src="php53-5.3.3-24.el5.src.rpm" version="5.3.3"><filename>php53-pdo-5.3.3-24.el5.i386.rpm</filename><sum type="sha">42393d9f69fd9c893f8f89224f77072b725fca77</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" id="CVE-2014-2497" title="Gd: Null Pointer Dereference In Gdimagecreatefromxpm()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" id="CVE-2014-3587" title="File: Incomplete Fix For Cve-2012-1571 In Cdf_Read_Property_Info" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597" id="CVE-2014-3597" title="Php: Multiple Buffer Over-Reads In Php_Parserr" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" id="CVE-2014-4670" title="Php: Spl Iterators Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" id="CVE-2014-4698" title="Php: Arrayiterator Use-After-Free Due To Object Change During Sorting" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1326" id="RHSA-2014:1326-1" title="Rhsa-2014:1326-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1076676" id="1076676" title="Gd: Null Pointer Dereference In Gdimagecreatefromxpm()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120259" id="1120259" title="Php: Arrayiterator Use-After-Free Due To Object Change During Sorting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120266" id="1120266" title="Php: Spl Iterators Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1128587" id="1128587" title="File: Incomplete Fix For Cve-2012-1571 In Cdf_Read_Property_Info" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1132589" id="1132589" title="Php: Multiple Buffer Over-Reads In Php_Parserr" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1633-1</id><title>Java-1.7.0-Openjdk</title><description>Multiple flaws were discovered in the Libraries, 2D, and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511, CVE-2014-6504, CVE-2014-6519) 
It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents. (CVE-2014-6517) 
It was discovered that the DatagramSocket implementation in OpenJDK failed to perform source address checks for packets received on a connected socket. A remote attacker could use this flaw to have their packets processed as if they were received from the expected source. (CVE-2014-6512) 
It was discovered that the TLS/SSL implementation in the JSSE component in OpenJDK failed to properly verify the server identity during the renegotiation following session resumption, making it possible for malicious TLS/SSL servers to perform a Triple Handshake attack against clients using JSSE and client certificate authentication. (CVE-2014-6457) 
It was discovered that the CipherInputStream class implementation in OpenJDK did not properly handle certain exceptions. This could possibly allow an attacker to affect the integrity of an encrypted stream handled by this class. (CVE-2014-6558) 
This update also fixes the following bug: 
* The TLS/SSL implementation in OpenJDK previously failed to handle Diffie-Hellman (DH) keys with more than 1024 bits. This caused client applications using JSSE to fail to establish TLS/SSL connections to servers using larger DH keys during the connection handshake. This update adds support for DH keys with size up to 2048 bits. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.3.1.el5_11" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el5_11.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el5_11.i386.rpm</filename><sum type="sha">9e8dd253a2af0fd6f96e230d63fa1eab363cd6d3</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.3.1.el5_11" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el5_11.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el5_11.i386.rpm</filename><sum type="sha">7da9e492221d4cd24e552b7c0b836bcb171ae108</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.5.3.1.el5_11" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el5_11.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el5_11.i386.rpm</filename><sum type="sha">85bb1aede7217d9642b8a0226425b5b3c772e032</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.3.1.el5_11" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el5_11.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el5_11.i386.rpm</filename><sum type="sha">85036c7c12e59c6bf00691c40872991a1a75c82b</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.3.1.el5_11" src="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el5_11.src.rpm" version="1.7.0.71"><filename>java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el5_11.i386.rpm</filename><sum type="sha">893e0a50b6e61a606d1ad61d8f72bdd330dfb4b4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" id="CVE-2014-6457" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" id="CVE-2014-6502" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" id="CVE-2014-6504" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" id="CVE-2014-6506" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" id="CVE-2014-6511" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" id="CVE-2014-6512" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" id="CVE-2014-6517" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" id="CVE-2014-6519" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" id="CVE-2014-6531" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" id="CVE-2014-6558" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1633" id="RHSA-2014:1633-1" title="Rhsa-2014:1633-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1071210" id="1071210" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150155" id="1150155" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150182" id="1150182" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150273" id="1150273" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150651" id="1150651" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150669" id="1150669" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151046" id="1151046" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151063" id="1151063" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151364" id="1151364" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151517" id="1151517" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1634-1</id><title>Java-1.6.0-Openjdk</title><description>Multiple flaws were discovered in the Libraries, 2D, and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511, CVE-2014-6504, CVE-2014-6519) 
It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents. (CVE-2014-6517) 
It was discovered that the DatagramSocket implementation in OpenJDK failed to perform source address checks for packets received on a connected socket. A remote attacker could use this flaw to have their packets processed as if they were received from the expected source. (CVE-2014-6512) 
It was discovered that the TLS/SSL implementation in the JSSE component in OpenJDK failed to properly verify the server identity during the renegotiation following session resumption, making it possible for malicious TLS/SSL servers to perform a Triple Handshake attack against clients using JSSE and client certificate authentication. (CVE-2014-6457) 
It was discovered that the CipherInputStream class implementation in OpenJDK did not properly handle certain exceptions. This could possibly allow an attacker to affect the integrity of an encrypted stream handled by this class. (CVE-2014-6558) 
This update also fixes the following bug: 
* The TLS/SSL implementation in OpenJDK previously failed to handle Diffie-Hellman (DH) keys with more than 1024 bits. This caused client applications using JSSE to fail to establish TLS/SSL connections to servers using larger DH keys during the connection handshake. This update adds support for DH keys with size up to 2048 bits. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.5.0.el5_11" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el5_11.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el5_11.i386.rpm</filename><sum type="sha">dcda0f728ef7cb9f60157a075b7db87eab0fea41</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.5.0.el5_11" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el5_11.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el5_11.i386.rpm</filename><sum type="sha">56ef097b2b77ab0212d0acadd4423634e216d636</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.5.0.el5_11" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el5_11.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el5_11.i386.rpm</filename><sum type="sha">dd44c562bf9611beb1f4b3025cdaebe1b7f5e5f3</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.5.0.el5_11" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el5_11.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el5_11.i386.rpm</filename><sum type="sha">7c7fc2fd4df9b2b55f8c82c8118b9541332a161d</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.5.0.el5_11" src="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el5_11.src.rpm" version="1.6.0.33"><filename>java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el5_11.i386.rpm</filename><sum type="sha">c83d4ff685649f5fe7ae8707fc541536f29c721f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" id="CVE-2014-6457" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" id="CVE-2014-6502" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" id="CVE-2014-6504" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" id="CVE-2014-6506" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" id="CVE-2014-6511" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" id="CVE-2014-6512" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" id="CVE-2014-6517" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" id="CVE-2014-6519" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" id="CVE-2014-6531" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" id="CVE-2014-6558" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1634" id="RHSA-2014:1634-1" title="Rhsa-2014:1634-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1071210" id="1071210" title="Openjdk: Datagramsocket Connected Socket Missing Source Check (Libraries, 8039509)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150155" id="1150155" title="Openjdk: Insufficient Permission Checks When Setting Resource Bundle On System Logger (Libraries, 8041564)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150182" id="1150182" title="Openjdk: Incorrect Optimization Of Range Checks In C2 Compiler (Hotspot, 8022783)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150273" id="1150273" title="Openjdk: Missing Bootstrapmethods Bounds Check (Hotspot, 8041717)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150651" id="1150651" title="Openjdk: Insufficient Resourcebundle Name Check (Libraries, 8044274)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150669" id="1150669" title="Openjdk: Logrecord Use Of Incorrect Cl When Loading Resourcebundle (Libraries, 8042797)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151046" id="1151046" title="Openjdk: Triple Handshake Attack Against Tls/Ssl Connections (Jsse, 8037066)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151063" id="1151063" title="Openjdk: Cipherinputstream Incorrect Exception Handling (Security, 8037846)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151364" id="1151364" title="Openjdk: Stax Parser Parameter Entity Xxe (Jaxp, 8039533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151517" id="1151517" title="Icu: Layout Engine Contextualsubstitution Missing Boundary Checks (Jdk 2D, 8041540)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1635-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1574, CVE-2014-1578, CVE-2014-1581, CVE-2014-1576, CVE-2014-1577) 
A flaw was found in the Alarm API, which allows applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass cross-origin restrictions. (CVE-2014-1583) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="3.el5_11" src="firefox-31.2.0-3.el5_11.src.rpm" version="31.2.0"><filename>firefox-31.2.0-3.el5_11.i386.rpm</filename><sum type="sha">171b9cc0066958a0692d5c9d55823495aefd67fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" id="CVE-2014-1574" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" id="CVE-2014-1576" title="Mozilla: Buffer Overflow During Css Manipulation (Mfsa 2014-75)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" id="CVE-2014-1577" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" id="CVE-2014-1578" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" id="CVE-2014-1581" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" id="CVE-2014-1583" title="Mozilla: Accessing Cross-Origin Objects Via The Alarms Api (Mfsa 2014-82)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1635" id="RHSA-2014:1635-1" title="Rhsa-2014:1635-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152356" id="1152356" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152358" id="1152358" title="Mozilla: Buffer Overflow During Css Manipulation (Mfsa 2014-75)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152359" id="1152359" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152361" id="1152361" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152363" id="1152363" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152683" id="1152683" title="Mozilla: Accessing Cross-Origin Objects Via The Alarms Api (Mfsa 2014-82)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1647-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1574, CVE-2014-1578, CVE-2014-1581, CVE-2014-1577) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="2.el5_11" src="thunderbird-31.2.0-2.el5_11.src.rpm" version="31.2.0"><filename>thunderbird-31.2.0-2.el5_11.i386.rpm</filename><sum type="sha">5e9fc92f7e417347a8ad0f2d818b171ae00ace2f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" id="CVE-2014-1574" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" id="CVE-2014-1577" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" id="CVE-2014-1578" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" id="CVE-2014-1581" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1647" id="RHSA-2014:1647-1" title="Rhsa-2014:1647-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152356" id="1152356" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.2) (Mfsa 2014-74)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152359" id="1152359" title="Mozilla: Web Audio Memory Corruption Issues With Custom Waveforms (Mfsa 2014-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152361" id="1152361" title="Mozilla: Out-Of-Bounds Write With Webm Video (Mfsa 2014-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152363" id="1152363" title="Mozilla: Use-After-Free Interacting With Text Directionality (Mfsa 2014-79)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1653-1</id><title>Openssl</title><description>This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. 
This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. 
For additional information about this flaw, see Upstream's Knowledgebase article at https://access.redhat.com/articles/1232123 
For the update to take effect, all services linked to the OpenSSL library  (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="openssl-devel" release="31.el5_11" src="openssl-0.9.8e-31.el5_11.src.rpm" version="0.9.8e"><filename>openssl-devel-0.9.8e-31.el5_11.i386.rpm</filename><sum type="sha">860ce589037069ad456bb44badca8a8e657de465</sum></package><package arch="i386" name="openssl-perl" release="31.el5_11" src="openssl-0.9.8e-31.el5_11.src.rpm" version="0.9.8e"><filename>openssl-perl-0.9.8e-31.el5_11.i386.rpm</filename><sum type="sha">a8ab37d156cd903de2987b2eafcc9a9743e7c9ff</sum></package><package arch="i686" name="openssl" release="31.el5_11" src="openssl-0.9.8e-31.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-31.el5_11.i686.rpm</filename><sum type="sha">a08805f40a8588a6b70e8da550f7bbeb703e000d</sum></package><package arch="i386" name="openssl" release="31.el5_11" src="openssl-0.9.8e-31.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-31.el5_11.i386.rpm</filename><sum type="sha">69d845607d9077beb6efce68b817ce7b1cfe424d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1653" id="RHSA-2014:1653-1" title="Rhsa-2014:1653-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1671-1</id><title>Rsyslog5 And Rsyslog</title><description>A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon. (CVE-2014-3634) 
After installing the update, the rsyslog service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-10-28 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="rsyslog5-gssapi" release="5.el5_11" src="rsyslog5-5.8.12-5.el5_11.src.rpm" version="5.8.12"><filename>rsyslog5-gssapi-5.8.12-5.el5_11.i386.rpm</filename><sum type="sha">52d7d3786a4f0c43c0094173b98082997235d3be</sum></package><package arch="i386" name="rsyslog5-mysql" release="5.el5_11" src="rsyslog5-5.8.12-5.el5_11.src.rpm" version="5.8.12"><filename>rsyslog5-mysql-5.8.12-5.el5_11.i386.rpm</filename><sum type="sha">2ee309dadb65cc3e90885aa22f2fc84ce034d528</sum></package><package arch="i386" name="rsyslog5" release="5.el5_11" src="rsyslog5-5.8.12-5.el5_11.src.rpm" version="5.8.12"><filename>rsyslog5-5.8.12-5.el5_11.i386.rpm</filename><sum type="sha">ce241a7510536ee3c249b87ce6b6d1454777920f</sum></package><package arch="i386" name="rsyslog5-pgsql" release="5.el5_11" src="rsyslog5-5.8.12-5.el5_11.src.rpm" version="5.8.12"><filename>rsyslog5-pgsql-5.8.12-5.el5_11.i386.rpm</filename><sum type="sha">bcc0fc4f4a916af5bc3a1a835fd2d9f5ec240dbb</sum></package><package arch="i386" name="rsyslog5-snmp" release="5.el5_11" src="rsyslog5-5.8.12-5.el5_11.src.rpm" version="5.8.12"><filename>rsyslog5-snmp-5.8.12-5.el5_11.i386.rpm</filename><sum type="sha">0778d2006737df33451302da361fa86a786c15b9</sum></package><package arch="i386" name="rsyslog5-gnutls" release="5.el5_11" src="rsyslog5-5.8.12-5.el5_11.src.rpm" version="5.8.12"><filename>rsyslog5-gnutls-5.8.12-5.el5_11.i386.rpm</filename><sum type="sha">d7be833620f3ee7d08f4abfabb4baab8044cb4c4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" id="CVE-2014-3634" title="Rsyslog: Remote Syslog Pri Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1671" id="RHSA-2014:1671-1" title="Rhsa-2014:1671-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142373" id="1142373" title="Rsyslog: Remote Syslog Pri Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1677-1</id><title>Wireshark</title><description>Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432) 
Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428) 
All running instances of Wireshark must be restarted for the update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="wireshark" release="7.el5_11" src="wireshark-1.0.15-7.el5_11.src.rpm" version="1.0.15"><filename>wireshark-1.0.15-7.el5_11.i386.rpm</filename><sum type="sha">83e7ff76723795454ea2e4a1c551954e4e8a11db</sum></package><package arch="i386" name="wireshark-gnome" release="7.el5_11" src="wireshark-1.0.15-7.el5_11.src.rpm" version="1.0.15"><filename>wireshark-gnome-1.0.15-7.el5_11.i386.rpm</filename><sum type="sha">6aba865ca0af9fc806c3fb77aec9470f31ee8c35</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421" id="CVE-2014-6421" title="Wireshark: Rtp Dissector Crash (Wnpa-Sec-2014-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422" id="CVE-2014-6422" title="Wireshark: Rtp Dissector Crash (Wnpa-Sec-2014-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" id="CVE-2014-6423" title="Wireshark: Megaco Dissector Infinite Loop (Wnpa-Sec-2014-13)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425" id="CVE-2014-6425" title="Wireshark: Cups Dissector Crash (Wnpa-Sec-2014-15)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" id="CVE-2014-6428" title="Wireshark: Ses Dissector Crash (Wnpa-Sec-2014-18)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" id="CVE-2014-6429" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" id="CVE-2014-6430" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" id="CVE-2014-6431" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" id="CVE-2014-6432" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1677" id="RHSA-2014:1677-1" title="Rhsa-2014:1677-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142602" id="1142602" title="Wireshark: Dos Sniffer File Parser Flaw (Wnpa-Sec-2014-19)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142603" id="1142603" title="Wireshark: Ses Dissector Crash (Wnpa-Sec-2014-18)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142608" id="1142608" title="Wireshark: Cups Dissector Crash (Wnpa-Sec-2014-15)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142610" id="1142610" title="Wireshark: Megaco Dissector Infinite Loop (Wnpa-Sec-2014-13)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1142611" id="1142611" title="Wireshark: Rtp Dissector Crash (Wnpa-Sec-2014-12)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1768-1</id><title>Php53</title><description>A buffer overflow flaw was found in the Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_thumbnail() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2014-3670) 
An integer overflow flaw was found in the way custom objects were unserialized. Specially crafted input processed by the unserialize() function could cause a PHP application to crash. (CVE-2014-3669) 
An out-of-bounds read flaw was found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted ELF file. (CVE-2014-3710) 
An out of bounds read flaw was found in the way the xmlrpc extension parsed dates in the ISO 8601 format. A specially crafted XML-RPC request or response could possibly cause a PHP application to crash. (CVE-2014-3668) 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="php53-mysql" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-mysql-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">357859a5ab7ecc335d08ee6c23c77e675dbba21c</sum></package><package arch="i386" name="php53-common" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-common-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">e3de049c6a9ee242be63fbaab14edc9d0321b63a</sum></package><package arch="i386" name="php53-intl" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-intl-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">bbcf3e68fccfc88c2ab7320079c02b117754a2a0</sum></package><package arch="i386" name="php53-pspell" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-pspell-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">31e88582348f2cefd0d263c35d181a3b72b4840f</sum></package><package arch="i386" name="php53-soap" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-soap-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">b3b0849fdba8b8534582b3191dd4fb0e84224a15</sum></package><package arch="i386" name="php53-dba" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-dba-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">8a7e2c057868ab79019e4486a1b6f1e4055312f0</sum></package><package arch="i386" name="php53-snmp" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-snmp-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">02169d0df1613c7ebe0a789322fb726177eb855a</sum></package><package arch="i386" name="php53-imap" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-imap-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">ea7755e5948b62b6e2c581f38b834d87dfc4736d</sum></package><package arch="i386" name="php53-pdo" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-pdo-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">4e2a3dc6d3b164e631e8a39b9ce45a888986a46c</sum></package><package arch="i386" name="php53-xml" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-xml-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">a1c2969edba6f0b44625fc5f9d2a24e2629de735</sum></package><package arch="i386" name="php53-cli" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-cli-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">f863f7a7633b0c6406b8ef95229014897b644ddc</sum></package><package arch="i386" name="php53-gd" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-gd-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">437274a2f3a0b8518bca30503044ed4aaabac133</sum></package><package arch="i386" name="php53-pgsql" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-pgsql-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">1d3e8989a192d090479aba9d844511263d2a269f</sum></package><package arch="i386" name="php53-xmlrpc" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-xmlrpc-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">5547d0a8c2a6425fb2148bf268eea7c44246d3e6</sum></package><package arch="i386" name="php53-devel" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-devel-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">278ec03edbe5387fa52b2ccf2399c47c7953ba90</sum></package><package arch="i386" name="php53-process" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-process-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">14c5d592b7bb0bf790a13514581196daedc09f12</sum></package><package arch="i386" name="php53-bcmath" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-bcmath-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">3bbb8b79dc31019eb722c2e499f065fff118fa18</sum></package><package arch="i386" name="php53-odbc" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-odbc-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">b7a0375ca3b694aedd396382ae6eb23a26517952</sum></package><package arch="i386" name="php53-mbstring" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-mbstring-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">aebaf9bc6da590a298fef2c912da693825ada373</sum></package><package arch="i386" name="php53-ldap" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-ldap-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">3e657c2d7cc94b7c0d0b795fc8e07e3063de41a3</sum></package><package arch="i386" name="php53" release="26.el5_11" src="php53-5.3.3-26.el5_11.src.rpm" version="5.3.3"><filename>php53-5.3.3-26.el5_11.i386.rpm</filename><sum type="sha">fb36bd16585c54d2e18166ccf1520f46eef52373</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" id="CVE-2014-3668" title="Php: Xmlrpc Iso8601 Date Format Parsing Out-Of-Bounds Read In Mkgmtime()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" id="CVE-2014-3669" title="Php: Integer Overflow In Unserialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" id="CVE-2014-3670" title="Php: Heap Corruption Issue In Exif_Thumbnail()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" id="CVE-2014-3710" title="File: Out-Of-Bounds Read In Elf Note Headers" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1768" id="RHSA-2014:1768-1" title="Rhsa-2014:1768-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154500" id="1154500" title="Php: Integer Overflow In Unserialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154502" id="1154502" title="Php: Heap Corruption Issue In Exif_Thumbnail()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154503" id="1154503" title="Php: Xmlrpc Iso8601 Date Format Parsing Out-Of-Bounds Read In Mkgmtime()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155071" id="1155071" title="File: Out-Of-Bounds Read In Elf Note Headers" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1824-1</id><title>Php</title><description>A buffer overflow flaw was found in the Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_thumbnail() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2014-3670) 
A stack-based buffer overflow flaw was found in the way the xmlrpc extension parsed dates in the ISO 8601 format. A specially crafted XML-RPC request or response could possibly cause a PHP application to crash. (CVE-2014-8626) 
An integer overflow flaw was found in the way custom objects were unserialized. Specially crafted input processed by the unserialize() function could cause a PHP application to crash. (CVE-2014-3669) 
After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-11-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="php-cli" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-cli-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">aa2e14a939786c71c438079982bcb17afedf3b43</sum></package><package arch="i386" name="php-bcmath" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-bcmath-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">925bbce01f74b3b41e93f905d8353f99caed8f7d</sum></package><package arch="i386" name="php-imap" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-imap-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">5a2905b0624caea89d1af7b6fbd8d746226b0119</sum></package><package arch="i386" name="php-pdo" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-pdo-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">29674b5301aeb852f6b759e7bc7dd782583ef0bd</sum></package><package arch="i386" name="php-ldap" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-ldap-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">b652ec7723f0240ce59e0cf3fd5193e5fda333ac</sum></package><package arch="i386" name="php-odbc" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-odbc-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">201bde400c416af9d67a7750eded345246b9b81a</sum></package><package arch="i386" name="php-pgsql" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-pgsql-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">c75c9fa6c1cb2047ab07661b470e3490bd84e406</sum></package><package arch="i386" name="php-dba" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-dba-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">30663551bd6a9284a05bc649d457f412230a1849</sum></package><package arch="i386" name="php" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">bf78a44bba87e41447335fad28013c3027039e1b</sum></package><package arch="i386" name="php-mysql" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-mysql-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">2a4deeaef0aaf78999118bfe846bf96278c3c337</sum></package><package arch="i386" name="php-gd" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-gd-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">c7c3bb7b6ba6f627f824fefc0b7dfc49891ebdda</sum></package><package arch="i386" name="php-soap" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-soap-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">3d51805251c0a659c45bb052b294516a0c147b59</sum></package><package arch="i386" name="php-mbstring" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-mbstring-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">5638420754feaed475dbaf04ed53116a1da7b396</sum></package><package arch="i386" name="php-snmp" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-snmp-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">369290ed679929c57638a9f90e2c05e3e2f7772a</sum></package><package arch="i386" name="php-common" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-common-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">da113618556937172de8938475b3dcdb2219ba59</sum></package><package arch="i386" name="php-ncurses" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-ncurses-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">30f1635e7bd39027a6e53d0e363bb55bf3b9335b</sum></package><package arch="i386" name="php-xml" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-xml-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">85ab6b2a65a509cb3aea03c89cc1ec6be27d5f65</sum></package><package arch="i386" name="php-devel" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-devel-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">58529c03573f1a483aac5e58ab37e159068e0dee</sum></package><package arch="i386" name="php-xmlrpc" release="45.el5_11" src="php-5.1.6-45.el5_11.src.rpm" version="5.1.6"><filename>php-xmlrpc-5.1.6-45.el5_11.i386.rpm</filename><sum type="sha">1e30a842189ba30f38fb1621807bb161e6c9c2bf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" id="CVE-2014-3669" title="Php: Integer Overflow In Unserialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" id="CVE-2014-3670" title="Php: Heap Corruption Issue In Exif_Thumbnail()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8626" id="CVE-2014-8626" title="Php: Xmlrpc Iso8601 Date Format Parsing Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1824" id="RHSA-2014:1824-1" title="Rhsa-2014:1824-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154500" id="1154500" title="Php: Integer Overflow In Unserialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154502" id="1154502" title="Php: Heap Corruption Issue In Exif_Thumbnail()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1155607" id="1155607" title="Php: Xmlrpc Iso8601 Date Format Parsing Buffer Overflow" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1859-1</id><title>Mysql55-Mysql</title><description>This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page. (CVE-2014-2494, CVE-2014-4207, CVE-2014-4243, CVE-2014-4258, CVE-2014-4260, CVE-2014-4287,  CVE-2014-4274, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484, CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551, CVE-2014-6555, CVE-2014-6559) 
After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-02 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="mysql55-mysql-libs" release="2.el5" src="mysql55-mysql-5.5.40-2.el5.src.rpm" version="5.5.40"><filename>mysql55-mysql-libs-5.5.40-2.el5.i386.rpm</filename><sum type="sha">a83c58cb2b0af82ff11c887a9fc856686df5efa6</sum></package><package arch="i386" name="mysql55-mysql-bench" release="2.el5" src="mysql55-mysql-5.5.40-2.el5.src.rpm" version="5.5.40"><filename>mysql55-mysql-bench-5.5.40-2.el5.i386.rpm</filename><sum type="sha">e33a35000421481c8504fc6f6cff059140afb747</sum></package><package arch="i386" name="mysql55-mysql" release="2.el5" src="mysql55-mysql-5.5.40-2.el5.src.rpm" version="5.5.40"><filename>mysql55-mysql-5.5.40-2.el5.i386.rpm</filename><sum type="sha">ca4982866cf85bd5b8d94a49adae27d289778a0d</sum></package><package arch="i386" name="mysql55-mysql-devel" release="2.el5" src="mysql55-mysql-5.5.40-2.el5.src.rpm" version="5.5.40"><filename>mysql55-mysql-devel-5.5.40-2.el5.i386.rpm</filename><sum type="sha">354c40854e5cf119c1aba7337988485e81102fea</sum></package><package arch="i386" name="mysql55-mysql-server" release="2.el5" src="mysql55-mysql-5.5.40-2.el5.src.rpm" version="5.5.40"><filename>mysql55-mysql-server-5.5.40-2.el5.i386.rpm</filename><sum type="sha">56566dbed9500af4e8f590ede82d35f50a3d51ec</sum></package><package arch="i386" name="mysql55-mysql-test" release="2.el5" src="mysql55-mysql-5.5.40-2.el5.src.rpm" version="5.5.40"><filename>mysql55-mysql-test-5.5.40-2.el5.i386.rpm</filename><sum type="sha">ebecad4215664389617bb3bb085992a3e734842b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" id="CVE-2014-2494" title="Mysql: Unspecified Vulnerability Related To Enarc (Cpu July 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" id="CVE-2014-4207" title="Mysql: Unspecified Vulnerability Related To Sroptzr (Cpu July 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243" id="CVE-2014-4243" title="Mysql: Unspecified Vulnerability Related To Enfed (Cpu July 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" id="CVE-2014-4258" title="Mysql: Unspecified Vulnerability Related To Srinfosc (Cpu July 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" id="CVE-2014-4260" title="Mysql: Unspecified Vulnerability Related To Srchar (Cpu July 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" id="CVE-2014-4274" title="Mysql: Unspecified Myisam Temporary File Issue Fixed In 5.5.39 And 5.6.20" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" id="CVE-2014-4287" title="Mysql: Unspecified Vulnerability Related To Server:Character Sets (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" id="CVE-2014-6463" title="Mysql: Unspecified Vulnerability Related To Server:Replication Row Format Binary Log Dml (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" id="CVE-2014-6464" title="Mysql: Unspecified Vulnerability Related To Server:Innodb Dml Foreign Keys (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" id="CVE-2014-6469" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" id="CVE-2014-6484" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" id="CVE-2014-6505" title="Mysql: Unspecified Vulnerability Related To Server:Memory Storage Engine (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" id="CVE-2014-6507" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" id="CVE-2014-6520" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" id="CVE-2014-6530" title="Mysql: Unspecified Vulnerability Related To Client:Mysqldump (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" id="CVE-2014-6551" title="Mysql: Unspecified Vulnerability Related To Client:Mysqladmin (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" id="CVE-2014-6555" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu October 2014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" id="CVE-2014-6559" title="Mysql: Unspecified Vulnerability Related To C Api Ssl Certificate Handling (Cpu October 2014)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1859" id="RHSA-2014:1859-1" title="Rhsa-2014:1859-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120382" id="1120382" title="Mysql: Unspecified Vulnerability Related To Enarc (Cpu July 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120383" id="1120383" title="Mysql: Unspecified Vulnerability Related To Sroptzr (Cpu July 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120385" id="1120385" title="Mysql: Unspecified Vulnerability Related To Enfed (Cpu July 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120387" id="1120387" title="Mysql: Unspecified Vulnerability Related To Srinfosc (Cpu July 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120388" id="1120388" title="Mysql: Unspecified Vulnerability Related To Srchar (Cpu July 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126271" id="1126271" title="Mysql: Unspecified Myisam Temporary File Issue Fixed In 5.5.39 And 5.6.20" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153461" id="1153461" title="Mysql: Unspecified Vulnerability Related To Server:Character Sets (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153462" id="1153462" title="Mysql: Unspecified Vulnerability Related To Server:Replication Row Format Binary Log Dml (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153463" id="1153463" title="Mysql: Unspecified Vulnerability Related To Server:Innodb Dml Foreign Keys (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153464" id="1153464" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153467" id="1153467" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153489" id="1153489" title="Mysql: Unspecified Vulnerability Related To Server:Memory Storage Engine (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153490" id="1153490" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153491" id="1153491" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153493" id="1153493" title="Mysql: Unspecified Vulnerability Related To Client:Mysqldump (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153494" id="1153494" title="Mysql: Unspecified Vulnerability Related To Client:Mysqladmin (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153495" id="1153495" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu October 2014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1153496" id="1153496" title="Mysql: Unspecified Vulnerability Related To C Api Ssl Certificate Handling (Cpu October 2014)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1885-1</id><title>Libxml2</title><description>A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior. (CVE-2014-3660) 
The desktop must be restarted (log out, then log back in) for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-12-02 00:00:00" /><restart_suggested>true</restart_suggested><relogin_suggested>true</relogin_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="libxml2-devel" release="2.1.25.el5_11" src="libxml2-2.6.26-2.1.25.el5_11.src.rpm" version="2.6.26"><filename>libxml2-devel-2.6.26-2.1.25.el5_11.i386.rpm</filename><sum type="sha">038113bba7c25ae05d12395fa54445aa467ae4e7</sum></package><package arch="i386" name="libxml2-python" release="2.1.25.el5_11" src="libxml2-2.6.26-2.1.25.el5_11.src.rpm" version="2.6.26"><filename>libxml2-python-2.6.26-2.1.25.el5_11.i386.rpm</filename><sum type="sha">6be14d8c3a598f17d854defc66566667b171a365</sum></package><package arch="i386" name="libxml2" release="2.1.25.el5_11" src="libxml2-2.6.26-2.1.25.el5_11.src.rpm" version="2.6.26"><filename>libxml2-2.6.26-2.1.25.el5_11.i386.rpm</filename><sum type="sha">6f5850ecf6f65f79631523a62c61803e2028071c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" id="CVE-2014-3660" title="Libxml2: Denial Of Service Via Recursive Entity Expansion" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1885" id="RHSA-2014:1885-1" title="Rhsa-2014:1885-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1149084" id="1149084" title="Libxml2: Denial Of Service Via Recursive Entity Expansion" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1893-1</id><title>Libxfont</title><description>A use-after-free flaw was found in the way libXfont processed certain font files when attempting to add a new directory to the font path. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server. (CVE-2014-0209) 
Multiple out-of-bounds write flaws were found in the way libXfont parsed replies received from an X.org font server. A malicious X.org server could cause an X client to crash or, possibly, execute arbitrary code with the privileges of the X.Org server. (CVE-2014-0210, CVE-2014-0211) 
All running X.Org server instances must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="libXfont-devel" release="1.0.6.el5_11" src="libXfont-1.2.2-1.0.6.el5_11.src.rpm" version="1.2.2"><filename>libXfont-devel-1.2.2-1.0.6.el5_11.i386.rpm</filename><sum type="sha">43f8c0c08a49a87902721d0db2da2fddba16ac0f</sum></package><package arch="i386" name="libXfont" release="1.0.6.el5_11" src="libXfont-1.2.2-1.0.6.el5_11.src.rpm" version="1.2.2"><filename>libXfont-1.2.2-1.0.6.el5_11.i386.rpm</filename><sum type="sha">4d40f01f0c29210651a1ca541a216e9364b6689c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" id="CVE-2014-0209" title="Libxfont: Integer Overflow Of Allocations In Font Metadata File Parsing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" id="CVE-2014-0210" title="Libxfont: Unvalidated Length Fields When Parsing Xfs Protocol Replies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" id="CVE-2014-0211" title="Libxfont: Integer Overflows Calculating Memory Needs For Xfs Replies" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1893" id="RHSA-2014:1893-1" title="Rhsa-2014:1893-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096593" id="1096593" title="Cve-2014-0209 Libxfont: Integer Overflow Of Allocations In Font Metadata File Parsing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096597" id="1096597" title="Cve-2014-0210 Libxfont: Unvalidated Length Fields When Parsing Xfs Protocol Replies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1096601" id="1096601" title="Cve-2014-0211 Libxfont: Integer Overflows Calculating Memory Needs For Xfs Replies" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1919-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593) 
A flaw was found in the Alarm API, which could allow applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass the same-origin policy. (CVE-2014-1594) 
This update disables SSL 3.0 support by default in Firefox. Details on how to re-enable SSL 3.0 support are available at: 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="4.el5_11" src="firefox-31.3.0-4.el5_11.src.rpm" version="31.3.0"><filename>firefox-31.3.0-4.el5_11.i386.rpm</filename><sum type="sha">ada725d5ad3f60b688b0f63828587e0ce7db43e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" id="CVE-2014-1587" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" id="CVE-2014-1590" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" id="CVE-2014-1592" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" id="CVE-2014-1593" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" id="CVE-2014-1594" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1919" id="RHSA-2014:1919-1" title="Rhsa-2014:1919-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169201" id="1169201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169206" id="1169206" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169208" id="1169208" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169209" id="1169209" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169210" id="1169210" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1924-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593) 
A flaw was found in the Alarm API, which could allow applications to schedule actions to be run in the future. A malicious web application could use this flaw to bypass the same-origin policy. (CVE-2014-1594) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
This update disables SSL 3.0 support by default in Thunderbird. Details on how to re-enable SSL 3.0 support are available at: 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-31.3.0-1.el5_11.src.rpm" version="31.3.0"><filename>thunderbird-31.3.0-1.el5_11.i386.rpm</filename><sum type="sha">0166631e2800214dd683d78cd1271f5bd27f2bb6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" id="CVE-2014-1587" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" id="CVE-2014-1590" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" id="CVE-2014-1592" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" id="CVE-2014-1593" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" id="CVE-2014-1594" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1924" id="RHSA-2014:1924-1" title="Rhsa-2014:1924-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169201" id="1169201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.3) (Mfsa 2014-83)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169206" id="1169206" title="Mozilla: Xmlhttprequest Crashes With Some Input Streams (Mfsa 2014-85)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169208" id="1169208" title="Mozilla: Use-After-Free During Html5 Parsing (Mfsa 2014-87)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169209" id="1169209" title="Mozilla: Buffer Overflow While Parsing Media Content (Mfsa 2014-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1169210" id="1169210" title="Mozilla: Bad Casting From The Basicthebeslayer To Basiccontainerlayer (Mfsa 2014-89)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1948-1</id><title>Nss, Nss-Util, And Nss-Softokn</title><description>This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. 
This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. 
The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. 
After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss-pkcs11-devel" release="1.el5_11" src="nss-3.16.2.3-1.el5_11.src.rpm" version="3.16.2.3"><filename>nss-pkcs11-devel-3.16.2.3-1.el5_11.i386.rpm</filename><sum type="sha">fc8942081e86cde75810ff6b429f9d022c73a64e</sum></package><package arch="i386" name="nss-devel" release="1.el5_11" src="nss-3.16.2.3-1.el5_11.src.rpm" version="3.16.2.3"><filename>nss-devel-3.16.2.3-1.el5_11.i386.rpm</filename><sum type="sha">dc9eca927b5dd97442289a9dcc08cf7782d9923b</sum></package><package arch="i386" name="nss-tools" release="1.el5_11" src="nss-3.16.2.3-1.el5_11.src.rpm" version="3.16.2.3"><filename>nss-tools-3.16.2.3-1.el5_11.i386.rpm</filename><sum type="sha">e37a80410ad0d2ff118b05757faced39764e31ee</sum></package><package arch="i386" name="nss" release="1.el5_11" src="nss-3.16.2.3-1.el5_11.src.rpm" version="3.16.2.3"><filename>nss-3.16.2.3-1.el5_11.i386.rpm</filename><sum type="sha">994a209914a99bb11a61f115cf900290de541956</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1948" id="RHSA-2014:1948-1" title="Rhsa-2014:1948-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1959-1</id><title>Kernel</title><description>* It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process. (CVE-2014-0181, Moderate) 
This update also fixes the following bugs: 
* Previously, the kernel did not successfully deliver multicast packets when the multicast querier was disabled. Consequently, the corosync utility terminated unexpectedly and the affected storage node did not join its intended cluster. With this update, multicast packets are delivered properly when the multicast querier is disabled, and corosync handles the node as expected. 
* Previously, the kernel wrote the metadata contained in all system information blocks on a single page of the /proc/sysinfo file. However, when the machine configuration was very extensive and the data did not fit on a single page, the system overwrote random memory regions, which in turn caused data corruption when reading the /proc/sysconf file. With this update, /proc/sysinfo automatically allocates a larger buffer if the data output does not fit the current buffer, which prevents the data corruption. 
* Prior to this update, the it_real_fn() function did not, in certain cases, successfully acquire the SIGLOCK signal when the do_setitimer() function used the ITIMER_REAL timer. As a consequence, the current process entered an endless loop and became unresponsive. This update fixes the bug and it_real_fn() no longer causes the kernel to become unresponsive. 
The system must be rebooted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2014-12-09 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-module-drbd-2.6.18-400.1.1.el5" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-400.1.1.el5-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">782c92df6968e11ec46f258fa6fff0665503fbbf</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-400.el5PAE" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-400.el5PAE-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">24d21a9c0f4e6454f7b311eff32f3344e72134bd</sum></package><package arch="i686" name="kernel-devel" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-400.el5.i686.rpm</filename><sum type="sha">69fdf6ba8c168a383e77b98096bddf99833de4ed</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-400.el5xen" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-400.el5xen-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">c9f021a319344120f118e9121fe5b0e4ba88cc00</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-400.el5PAE" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-400.el5PAE-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">ed7b5f69637c593b1cf798852aeb27188d99808c</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-400.el5xen" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-400.el5xen-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">592804e9b8b7f31d47f6387973355101466ae6b8</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-400.1.1.el5PAE" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-400.1.1.el5PAE-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">31997daef017ef192a68c657e6ea79a26f36390a</sum></package><package arch="i686" name="kernel-debug" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-400.el5.i686.rpm</filename><sum type="sha">eaecbea1f7f0a508ab2c65112a7cf414d2393a57</sum></package><package arch="i686" name="kernel-xen" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-400.el5.i686.rpm</filename><sum type="sha">fdecf0fd06678d4c12bb611e8638f9067b5d4595</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-400.el5xen" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-400.el5xen-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">26b53d0cd809ae6948c0f2fa8aeed8594d338237</sum></package><package arch="noarch" name="kernel-doc" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-400.el5.noarch.rpm</filename><sum type="sha">882f70101325d60c497e2d8ad5c9135b84f73301</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-400.el5xen" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-400.el5xen-0.4-2.sl5.i686.rpm</filename><sum type="sha">9c4cb62345807c42ac928bfef96ffeabdd40eef6</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-400.el5PAE" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-400.el5PAE-0.4-2.sl5.i686.rpm</filename><sum type="sha">2e8a9d648dedc18ca3d838aedb798b5b19acf7b0</sum></package><package arch="i686" name="kernel-xen-devel" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-400.el5.i686.rpm</filename><sum type="sha">1f7cacfb833d0a04cc7df2d3292df49ae726477c</sum></package><package arch="i386" name="kernel-headers" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-400.el5.i386.rpm</filename><sum type="sha">383c9b313382072fe2340392f215a7860fa2c7cc</sum></package><package arch="i686" name="kernel-PAE-devel" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-400.el5.i686.rpm</filename><sum type="sha">b292a59a18f3fee6c48f367fa1ee78d77e1d5312</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-400.el5" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-400.el5-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">63c363ac9ea280a53ea3733f84a079dc13f5652d</sum></package><package arch="i686" name="kernel-PAE" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-400.el5.i686.rpm</filename><sum type="sha">873cd0e0f37f749deb1a30e6e5401488e8a1c6de</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-400.el5xen" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-400.el5xen-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">35bd5ec6bb5256ba97d9d40b75875c5043fb852e</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-400.el5" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-400.el5-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">86393d291822972d83031aa370dddad1a5f3f03c</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-400.el5" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-400.el5-0.4-2.sl5.i686.rpm</filename><sum type="sha">5ff11a6ce930fc4c97fbca4bacd000b001534c8e</sum></package><package arch="i686" name="kernel-debug-devel" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-400.el5.i686.rpm</filename><sum type="sha">82268bb96efadfb0052114b59f4182090bd59775</sum></package><package arch="i686" name="kernel" release="400.el5" src="kernel-2.6.18-400.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-400.el5.i686.rpm</filename><sum type="sha">6b7eb21bb629c6e6c1e8812b9e3235390b8a4b3c</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-400.el5PAE" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-400.el5PAE-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">4fb0a03b8a5645b5ff36bb6fad13394198f3f16d</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-400.el5" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-400.el5-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">cf4e2ba667235b97ab3cd8eeae509b18ca3c1e8b</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-400.el5" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-400.el5-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">30cb4f0a4a977e896c71b9dfdb2053bb3086696d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" id="CVE-2014-0181" title="Kernel: Net: Insufficient Permision Checks Of Netlink Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1959" id="RHSA-2014:1959-1" title="Rhsa-2014:1959-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1094265" id="1094265" title="Kernel: Net: Insufficient Permision Checks Of Netlink Messages" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1974-1</id><title>Rpm</title><description>It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) 
All running applications linked against the RPM library must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="rpm" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="4.4.2.3"><filename>rpm-4.4.2.3-36.el5_11.i386.rpm</filename><sum type="sha">6b65d49189c036f9177660ae3958beb2595271b0</sum></package><package arch="i386" name="rpm-devel" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="4.4.2.3"><filename>rpm-devel-4.4.2.3-36.el5_11.i386.rpm</filename><sum type="sha">e8e3623a1164b074aad4ea105bdff96fd5496ede</sum></package><package arch="i386" name="rpm-build" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="4.4.2.3"><filename>rpm-build-4.4.2.3-36.el5_11.i386.rpm</filename><sum type="sha">c04c7a7fb3f4e46d12b45f28a7ad88c2b692927b</sum></package><package arch="i386" name="rpm-python" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="4.4.2.3"><filename>rpm-python-4.4.2.3-36.el5_11.i386.rpm</filename><sum type="sha">3bf665ea52f3a62b6b7da159a3595fc703d61f18</sum></package><package arch="i386" name="rpm-apidocs" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="4.4.2.3"><filename>rpm-apidocs-4.4.2.3-36.el5_11.i386.rpm</filename><sum type="sha">a581eeaba7530665ec4bc594c4ed1fe32caaa9f3</sum></package><package arch="i386" name="rpm-libs" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="4.4.2.3"><filename>rpm-libs-4.4.2.3-36.el5_11.i386.rpm</filename><sum type="sha">91b8e222f468135036c232e2510b53edbb2f0443</sum></package><package arch="i386" name="popt" release="36.el5_11" src="rpm-4.4.2.3-36.el5_11.src.rpm" version="1.10.2.3"><filename>popt-1.10.2.3-36.el5_11.i386.rpm</filename><sum type="sha">9afb665472c78c939b4fb4a616f30594784f365f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" id="CVE-2013-6435" title="Rpm: Race Condition During The Installation Process" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1974" id="RHSA-2014:1974-1" title="Rhsa-2014:1974-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039811" id="1039811" title="Rpm: Race Condition During The Installation Process" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1982-1</id><title>Xorg-X11-Server</title><description>Multiple integer overflow flaws and out-of-bounds write flaws were found in the way the X.Org server calculated memory requirements for certain X11 core protocol and GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2014-8092, CVE-2014-8093, CVE-2014-8098) 
It was found that the X.Org server did not properly handle SUN-DES-1 (Secure RPC) authentication credentials. A malicious, unauthenticated client could use this flaw to crash the X.Org server by submitting a specially crafted authentication request. (CVE-2014-8091) 
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server, or leak memory contents to the client. (CVE-2014-8097) 
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server. (CVE-2014-8095, CVE-2014-8096, CVE-2014-8099, CVE-2014-8100, CVE-2014-8101, CVE-2014-8102)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="xorg-x11-server-Xnest" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-Xnest-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">5364b15450a1466970b97f84608858923edfc848</sum></package><package arch="i386" name="xorg-x11-server-Xvnc-source" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">7b207c2e96712a44875523320f9f7c3bfb1d0672</sum></package><package arch="i386" name="xorg-x11-server-sdk" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-sdk-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">78278a3d73e5bcdb4d4894f09ec87055772ffb3c</sum></package><package arch="i386" name="xorg-x11-server-Xorg" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-Xorg-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">95e1aa3784cc3e49d49b6f9f58b70e4b23cba0c2</sum></package><package arch="i386" name="xorg-x11-server-Xdmx" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">adf217c9ee2614ae9f387c4e1148ac2361d9f744</sum></package><package arch="i386" name="xorg-x11-server-Xvfb" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">c5ebcb6ea212d819a64db414f9e8e3a456e02809</sum></package><package arch="i386" name="xorg-x11-server-Xephyr" release="48.107.el5_11" src="xorg-x11-server-1.1.1-48.107.el5_11.src.rpm" version="1.1.1"><filename>xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.i386.rpm</filename><sum type="sha">a6476e4d7c665bb6f9c51bb1cc10cde41d65665c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" id="CVE-2014-8091" title="Xorg-X11-Server: Denial Of Service Due To Unchecked Malloc In Client Authentication" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" id="CVE-2014-8092" title="Xorg-X11-Server: Integer Overflow In X11 Core Protocol Requests When Calculating Memory Needs For Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" id="CVE-2014-8093" title="Xorg-X11-Server: Integer Overflow In Glx Extension Requests When Calculating Memory Needs For Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" id="CVE-2014-8095" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xinput Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" id="CVE-2014-8096" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xc-Misc Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" id="CVE-2014-8097" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Dbe Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" id="CVE-2014-8098" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Glx Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" id="CVE-2014-8099" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xvideo Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" id="CVE-2014-8100" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Render Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" id="CVE-2014-8101" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Randr Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" id="CVE-2014-8102" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xfixes Extension" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1982" id="RHSA-2014:1982-1" title="Rhsa-2014:1982-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168680" id="1168680" title="Xorg-X11-Server: Denial Of Service Due To Unchecked Malloc In Client Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168684" id="1168684" title="Xorg-X11-Server: Integer Overflow In X11 Core Protocol Requests When Calculating Memory Needs For Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168688" id="1168688" title="Xorg-X11-Server: Integer Overflow In Glx Extension Requests When Calculating Memory Needs For Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168694" id="1168694" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xinput Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168700" id="1168700" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xc-Misc Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168705" id="1168705" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Dbe Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168707" id="1168707" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Glx Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168710" id="1168710" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xvideo Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168711" id="1168711" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Render Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168713" id="1168713" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Randr Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168714" id="1168714" title="Xorg-X11-Server: Out Of Bounds Access Due To Not Validating Length Or Offset Values In Xfixes Extension" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1984-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">37ef4224132b9775cc2571b68645246862e927f2</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">a579c90de2e1681f4bec884fb9fcca6e04527c09</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">42c60b3ccfe3985fc2344c600a44da3a9d731304</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">5ecbd25995953daaf570e3a9d42ce82d20532093</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">dcc5a63fa8a65d910ceed43bf0b1a0906cf02d61</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">96b8c56d43189190fa367046f1f148f9b78307c6</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">b3944e0574850508751fcd522d0623f1fae9e7a7</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.2" src="bind-9.3.6-25.P1.el5_11.2.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.2.i386.rpm</filename><sum type="sha">7528cb5916bb524fca5c99f703e37ec867eeb0f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" id="CVE-2014-8500" title="Bind: Delegation Handling Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1984" id="RHSA-2014:1984-1" title="Rhsa-2014:1984-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171912" id="1171912" title="Bind: Delegation Handling Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:1985-1</id><title>Bind97</title><description>A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-16 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.1" src="bind97-9.7.0-21.P2.el5_11.1.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.1.i386.rpm</filename><sum type="sha">5d7dd2a11e3218aafacaba26186db04f05f87d8a</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.1" src="bind97-9.7.0-21.P2.el5_11.1.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.1.i386.rpm</filename><sum type="sha">6dcf7e1a238c21b2ae21a2d13796767d49400353</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.1" src="bind97-9.7.0-21.P2.el5_11.1.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.1.i386.rpm</filename><sum type="sha">a4cc8490464819705e2faf77e030897c20be9d23</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.1" src="bind97-9.7.0-21.P2.el5_11.1.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.1.i386.rpm</filename><sum type="sha">256f7e3bf4ca58bbde8cc69bc6771406da635b12</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.1" src="bind97-9.7.0-21.P2.el5_11.1.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.1.i386.rpm</filename><sum type="sha">b955dc836559b3f0c159917590f95c9567f084e7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" id="CVE-2014-8500" title="Bind: Delegation Handling Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:1985" id="RHSA-2014:1985-1" title="Rhsa-2014:1985-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1171912" id="1171912" title="Bind: Delegation Handling Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:2008-1</id><title>Kernel</title><description>* A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-9322, Important) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-23 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-module-aufs-2.6.18-400.1.1.el5PAE" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-400.1.1.el5PAE-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">e4423b405b197abdf4bee1a16284ac208580adf6</sum></package><package arch="i386" name="kernel-headers" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-400.1.1.el5.i386.rpm</filename><sum type="sha">63936ba07cb1c4d7dc7f5f9b03d70c16480b830d</sum></package><package arch="i686" name="kernel-PAE-devel" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">d024d28a04aafc99daa8af7c7885efbef444a48a</sum></package><package arch="i686" name="kernel-xen" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">5d5697a2c5b57f59915eaaeb371f48903cd84d14</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-400.1.1.el5xen" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-400.1.1.el5xen-0.4-2.sl5.i686.rpm</filename><sum type="sha">89d1ee7774e5f83dcd27b552bb681b2a708d640d</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-400.1.1.el5xen" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-400.1.1.el5xen-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">7747c2dfdf82dc3d002739d74c475f1fcec90b8d</sum></package><package arch="i686" name="kernel-debug" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">fa4596fcaae8234697b63dd435117566a39f1940</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-400.1.1.el5" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-400.1.1.el5-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">652dd6048a9fcdabd93269d25e11e971f2a3067c</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-400.1.1.el5PAE" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-400.1.1.el5PAE-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">84859d8ae5a7a5e26c42cb92b12ca2656f25d1eb</sum></package><package arch="i686" name="kernel" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">1ca2e3be7165fa0cbdcb738c6a6798471f58b0c3</sum></package><package arch="i686" name="kernel-debug-devel" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">3a7f4a14f2d083ee105c55ce350aaa53d7f95387</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-400.1.1.el5xen" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-400.1.1.el5xen-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">3608e2d1e6c06363e4582547994c149ebaf795a5</sum></package><package arch="i686" name="kernel-PAE" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">6751863bde3d5fbc26804f95c24f7f4e910ef09d</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-400.1.1.el5" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-400.1.1.el5-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">13798bf6342747bfe85c9bf45e82c7ed4b811633</sum></package><package arch="noarch" name="kernel-doc" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-400.1.1.el5.noarch.rpm</filename><sum type="sha">96857d888b158feb0b71d5b63469be07a2f5a1b4</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-400.1.1.el5PAE" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-400.1.1.el5PAE-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">99b3a99fabf01957ceb3c08a22c0f33270c3ba52</sum></package><package arch="i686" name="kernel-devel" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">62fe13a363faa57a4ad1dcd42d791ec98127ad15</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-400.1.1.el5PAE" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-400.1.1.el5PAE-0.4-2.sl5.i686.rpm</filename><sum type="sha">bc41002313ef03cd4cd8fcc312cc06524cbfd269</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-400.1.1.el5xen" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-400.1.1.el5xen-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">28d039aa03ecb96a5e3fd9c70a1957c8f08b4375</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-400.1.1.el5" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-400.1.1.el5-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">10f1ea81668eed8f495b32a4e8033f5dc3daa821</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-400.1.1.el5xen" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-400.1.1.el5xen-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">109aeebda63874f4b1adf105441736b58027fb55</sum></package><package arch="i686" name="kernel-xen-devel" release="400.1.1.el5" src="kernel-2.6.18-400.1.1.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-400.1.1.el5.i686.rpm</filename><sum type="sha">6a435d525eb5b5fd22dafc5ce3ed6ddce9439b2c</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-400.1.1.el5" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-400.1.1.el5-0.4-2.sl5.i686.rpm</filename><sum type="sha">123914d4f7aa465c2fc8ac9e8e29b554541c1be0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" id="CVE-2014-9322" title="Kernel: X86: Local Privesc Due To Bad_Iret And Paranoid Entry Incompatibility" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:2008" id="RHSA-2014:2008-1" title="Rhsa-2014:2008-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1172806" id="1172806" title="Kernel: X86: Local Privesc Due To Bad_Iret And Paranoid Entry Incompatibility" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2014:2025-1</id><title>Ntp</title><description>Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(), ctl_putdata(), and configure() functions. A remote attacker could use either of these flaws to send a specially crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the ntp user. Note: the crypto_recv() flaw requires non- default configurations to be active, while the ctl_putdata() flaw, by default, can only be exploited via local attackers, and the configure() flaw requires additional authentication to exploit. (CVE-2014-9295) 
It was found that ntpd automatically generated weak keys for its internal use if no ntpdc request authentication key was specified in the ntp.conf configuration file. A remote attacker able to match the configured IP restrictions could guess the generated key, and possibly use it to send ntpdc query or configuration requests. (CVE-2014-9293) 
It was found that ntp-keygen used a weak method for generating MD5 keys. This could possibly allow an attacker to guess generated MD5 keys that could then be used to spoof an NTP client or server. Note: it is recommended to regenerate any MD5 keys that had explicitly been generated with ntp-keygen; the default installation does not contain such keys). (CVE-2014-9294) 
After installing the update, the ntpd daemon will restart automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2014-12-23 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="ntp" release="18.el5_11" src="ntp-4.2.2p1-18.el5_11.src.rpm" version="4.2.2p1"><filename>ntp-4.2.2p1-18.el5_11.i386.rpm</filename><sum type="sha">9692caefe9a0286fc2f5207f8976def29447758d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" id="CVE-2014-9293" title="Ntp: Automatic Generation Of Weak Default Key In Config_Auth()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" id="CVE-2014-9294" title="Ntp: Ntp-Keygen Uses Weak Random Number Generator And Seed When Generating Md5 Keys" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" id="CVE-2014-9295" title="Ntp: Multiple Buffer Overflows Via Specially-Crafted Packets" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2014:2025" id="RHSA-2014:2025-1" title="Rhsa-2014:2025-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176032" id="1176032" title="Ntp: Automatic Generation Of Weak Default Key In Config_Auth()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176035" id="1176035" title="Ntp: Ntp-Keygen Uses Weak Random Number Generator And Seed When Generating Md5 Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176037" id="1176037" title="Ntp: Multiple Buffer Overflows Via Specially-Crafted Packets" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0046-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-8634, CVE-2014-8639, CVE-2014-8641) 
It was found that the Beacon interface implementation in Firefox did not follow the Cross-Origin Resource Sharing (CORS) specification. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (XSRF) attack. (CVE-2014-8638) 
This update also fixes the following bug: 
* The default dictionary for Firefox's spell checker is now correctly set to the system's locale language. 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-01-20 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-31.4.0-1.el5_11.src.rpm" version="31.4.0"><filename>firefox-31.4.0-1.el5_11.i386.rpm</filename><sum type="sha">4b420d3c707ebfbdcc04f96eac4c1e71c1d9320c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" id="CVE-2014-8634" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" id="CVE-2014-8638" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" id="CVE-2014-8639" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" id="CVE-2014-8641" title="Mozilla: Read-After-Free In Webrtc (Mfsa 2015-06)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0046" id="RHSA-2015:0046-1" title="Rhsa-2015:0046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1150572" id="1150572" title="Default Spellchecker Dictionary Is Not Correct For Firefox" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180962" id="1180962" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180966" id="1180966" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180967" id="1180967" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180973" id="1180973" title="Mozilla: Read-After-Free In Webrtc (Mfsa 2015-06)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=643954" id="643954" title="Default Spellchecker Dictionary Is Not Correct For Firefox" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0047-1</id><title>Thunderbird</title><description>Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-8634, CVE-2014-8639) 
It was found that the Beacon interface implementation in Thunderbird did not follow the Cross-Origin Resource Sharing (CORS) specification. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (XSRF) attack. (CVE-2014-8638) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-20 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-31.4.0-1.el5_11.src.rpm" version="31.4.0"><filename>thunderbird-31.4.0-1.el5_11.i386.rpm</filename><sum type="sha">465ee82e4f68b64989751f7abec54256ffd71dd9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" id="CVE-2014-8634" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" id="CVE-2014-8638" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" id="CVE-2014-8639" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0047" id="RHSA-2015:0047-1" title="Rhsa-2015:0047-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180962" id="1180962" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.4) (Mfsa 2015-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180966" id="1180966" title="Mozilla: Sendbeacon Requests Lack An Origin Header (Mfsa 2015-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180967" id="1180967" title="Mozilla: Cookie Injection Through Proxy Authenticate Responses (Mfsa 2015-04)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0068-1</id><title>Java-1.7.0-Openjdk</title><description>A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. (CVE-2014-6601) 
Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-0412, CVE-2015-0408) 
A flaw was found in the way the Hotspot garbage collector handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0395) 
A flaw was found in the way the DER (Distinguished Encoding Rules) decoder in the Security component in OpenJDK handled negative length values. A specially crafted, DER-encoded input could cause a Java application to enter an infinite loop when decoded. (CVE-2015-0410) 
A flaw was found in the way the SSL 3.0 protocol handled padding bytes when decrypting messages that were encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw could possibly allow a man-in-the- middle (MITM) attacker to decrypt portions of the cipher text using a padding oracle attack. (CVE-2014-3566) 
It was discovered that the SSL/TLS implementation in the JSSE component in OpenJDK failed to properly check whether the ChangeCipherSpec was received during the SSL/TLS connection handshake. An MITM attacker could possibly use this flaw to force a connection to be established without encryption being enabled. (CVE-2014-6593) 
An information leak flaw was found in the Swing component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0407) 
A NULL pointer dereference flaw was found in the MulticastSocket implementation in the Libraries component of OpenJDK. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2014-6587) 
Multiple boundary check flaws were found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could allow an untrusted Java application or applet to disclose portions of the Java Virtual Machine memory. (CVE-2014-6585, CVE-2014-6591) 
Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. (CVE-2015-0383) 
The CVE-2015-0383 issue was discovered by Red Hat. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.4.0.el5_11" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el5_11.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.0.el5_11.i386.rpm</filename><sum type="sha">88e7c29468021e6b8d7d97cc69c7769af0e68eb9</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.5.4.0.el5_11" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el5_11.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el5_11.i386.rpm</filename><sum type="sha">af78df3c1536f3bf6111e2a72cf832a2e93b36e1</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.4.0.el5_11" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el5_11.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.0.el5_11.i386.rpm</filename><sum type="sha">04223cf4a50950d9ef58f27dfc7a6a2ef03fa1e3</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.4.0.el5_11" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el5_11.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.0.el5_11.i386.rpm</filename><sum type="sha">79d8db16ef916c21e62218731fc3d20b60f3a167</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.4.0.el5_11" src="java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el5_11.src.rpm" version="1.7.0.75"><filename>java-1.7.0-openjdk-src-1.7.0.75-2.5.4.0.el5_11.i386.rpm</filename><sum type="sha">1f37848116204ca6a237d1eb13ffd8947e7b4d16</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" id="CVE-2014-6585" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" id="CVE-2014-6587" title="Openjdk: Multicastsocket Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" id="CVE-2014-6591" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" id="CVE-2014-6593" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" id="CVE-2014-6601" title="Openjdk: Class Verifier Insufficient " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" id="CVE-2015-0383" title="Openjdk: Insecure Hsperfdata Temporary File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" id="CVE-2015-0395" title="Openjdk: Phantom References Handling Issue In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" id="CVE-2015-0407" title="Openjdk: Directory Information Leak Via File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" id="CVE-2015-0408" title="Openjdk: Incorrect Context Class Loader Use In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" id="CVE-2015-0410" title="Openjdk: Der Decoder Infinite Loop (Security, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" id="CVE-2015-0412" title="Openjdk: Insufficient Code Privileges Checks " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0068" id="RHSA-2015:0068-1" title="Rhsa-2015:0068-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123870" id="1123870" title="Openjdk: Insecure Hsperfdata Temporary File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183020" id="1183020" title="Openjdk: Class Verifier Insufficient " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183021" id="1183021" title="Openjdk: Insufficient Code Privileges Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183023" id="1183023" title="Openjdk: Incorrect Context Class Loader Use In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183031" id="1183031" title="Openjdk: Phantom References Handling Issue In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183043" id="1183043" title="Openjdk: Directory Information Leak Via File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183044" id="1183044" title="Openjdk: Der Decoder Infinite Loop (Security, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183049" id="1183049" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183645" id="1183645" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183646" id="1183646" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183715" id="1183715" title="Openjdk: Multicastsocket Null Pointer " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0085-1</id><title>Java-1.6.0-Openjdk</title><description>A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. (CVE-2014-6601) 
Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-0412, CVE-2015-0408) 
A flaw was found in the way the Hotspot garbage collector handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0395) 
A flaw was found in the way the DER (Distinguished Encoding Rules) decoder in the Security component in OpenJDK handled negative length values. A specially crafted, DER-encoded input could cause a Java application to enter an infinite loop when decoded. (CVE-2015-0410) 
A flaw was found in the way the SSL 3.0 protocol handled padding bytes when decrypting messages that were encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw could possibly allow a man-in-the- middle (MITM) attacker to decrypt portions of the cipher text using a padding oracle attack. (CVE-2014-3566) 
It was discovered that the SSL/TLS implementation in the JSSE component in OpenJDK failed to properly check whether the ChangeCipherSpec was received during the SSL/TLS connection handshake. An MITM attacker could possibly use this flaw to force a connection to be established without encryption being enabled. (CVE-2014-6593) 
An information leak flaw was found in the Swing component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0407) 
A NULL pointer dereference flaw was found in the MulticastSocket implementation in the Libraries component of OpenJDK. An untrusted Java application or applet could possibly use this flaw to bypass certain Java sandbox restrictions. (CVE-2014-6587) 
Multiple boundary check flaws were found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could allow an untrusted Java application or applet to disclose portions of the Java Virtual Machine memory. (CVE-2014-6585, CVE-2014-6591) 
Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. (CVE-2015-0383) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.6.1.el5_11" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.i386.rpm</filename><sum type="sha">f2e948950344f2c802d1da4739ca532e45d115dd</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.6.1.el5_11" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el5_11.i386.rpm</filename><sum type="sha">5cb0f91ff98a63b109fb9c988d0673679643f3a5</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.6.1.el5_11" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el5_11.i386.rpm</filename><sum type="sha">ce9c2b227c28e008ab294ae9ef7bb6bebbfa8ac6</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.6.1.el5_11" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el5_11.i386.rpm</filename><sum type="sha">2673cf6e5ad93d3e702cd9e472de17cf462da0be</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.6.1.el5_11" src="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm" version="1.6.0.34"><filename>java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el5_11.i386.rpm</filename><sum type="sha">0141560c81c5462434cbd3fad39d0755bc124c5b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" id="CVE-2014-3566" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" id="CVE-2014-6585" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" id="CVE-2014-6587" title="Openjdk: Multicastsocket Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" id="CVE-2014-6591" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" id="CVE-2014-6593" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" id="CVE-2014-6601" title="Openjdk: Class Verifier Insufficient " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" id="CVE-2015-0383" title="Openjdk: Insecure Hsperfdata Temporary File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" id="CVE-2015-0395" title="Openjdk: Phantom References Handling Issue In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" id="CVE-2015-0407" title="Openjdk: Directory Information Leak Via File " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" id="CVE-2015-0408" title="Openjdk: Incorrect Context Class Loader Use In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" id="CVE-2015-0410" title="Openjdk: Der Decoder Infinite Loop (Security, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" id="CVE-2015-0412" title="Openjdk: Insufficient Code Privileges Checks " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0085" id="RHSA-2015:0085-1" title="Rhsa-2015:0085-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1123870" id="1123870" title="Openjdk: Insecure Hsperfdata Temporary File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1152789" id="1152789" title="Openssl: Padding Oracle On Downgraded Legacy Encryption Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183020" id="1183020" title="Openjdk: Class Verifier Insufficient " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183021" id="1183021" title="Openjdk: Insufficient Code Privileges Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183023" id="1183023" title="Openjdk: Incorrect Context Class Loader Use In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183031" id="1183031" title="Openjdk: Phantom References Handling Issue In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183043" id="1183043" title="Openjdk: Directory Information Leak Via File " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183044" id="1183044" title="Openjdk: Der Decoder Infinite Loop (Security, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183049" id="1183049" title="Openjdk: Incorrect Tracking Of Changecipherspec " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183645" id="1183645" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8055489)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183646" id="1183646" title="Icu: Font Parsing Oob Read (Openjdk 2D, 8056276)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183715" id="1183715" title="Openjdk: Multicastsocket Null Pointer " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0090-1</id><title>Glibc</title><description>A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-01-27 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="glibc-utils" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>glibc-utils-2.5-123.el5_11.1.i386.rpm</filename><sum type="sha">a30d12d9f6dab7a9595f8a604dfb542ded6f83d5</sum></package><package arch="i386" name="glibc-headers" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>glibc-headers-2.5-123.el5_11.1.i386.rpm</filename><sum type="sha">eb9687625a2f718f10aadddc49c44ccf72b34f34</sum></package><package arch="i686" name="glibc" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>glibc-2.5-123.el5_11.1.i686.rpm</filename><sum type="sha">4479549a93458503cd78f620c6f9399054649d06</sum></package><package arch="i386" name="glibc-devel" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>glibc-devel-2.5-123.el5_11.1.i386.rpm</filename><sum type="sha">4722d89e2d5ae8c32e3647843c7225ab74597b95</sum></package><package arch="i386" name="glibc-common" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>glibc-common-2.5-123.el5_11.1.i386.rpm</filename><sum type="sha">0466825ef07249f41c2d797ebe961a11f84097ad</sum></package><package arch="i386" name="nscd" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>nscd-2.5-123.el5_11.1.i386.rpm</filename><sum type="sha">138cc1d6c2dac36227ac451ba21ace55f7a23bc6</sum></package><package arch="i386" name="glibc" release="123.el5_11.1" src="glibc-2.5-123.el5_11.1.src.rpm" version="2.5"><filename>glibc-2.5-123.el5_11.1.i386.rpm</filename><sum type="sha">7d338c9eae27bd2f6bd2588fb767654ac70fbe98</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" id="CVE-2015-0235" title="Glibc: __Nss_Hostname_Digits_Dots() Heap-Based Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0090" id="RHSA-2015:0090-1" title="Rhsa-2015:0090-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183461" id="1183461" title="Glibc: __Nss_Hostname_Digits_Dots() Heap-Based Buffer Overflow" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0164-1</id><title>Kernel</title><description>* A flaw was found in the way the Linux kernel's splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system. (CVE-2014-7822, Moderate) 
This update also fixes the following bugs: 
* Previously, hot-unplugging of a virtio-blk device could in some cases lead to a kernel panic, for example during in-flight I/O requests. This update fixes race condition in the hot-unplug code in the virtio_blk.ko module. As a result, hot unplugging of the virtio-blk device no longer causes the guest kernel oops when there are in-flight I/O requests. 
* Before this update, due to a bug in the error-handling path, a corrupted metadata block could be used as a valid block. With this update, the error handling path has been fixed and more checks have been added to verify the metadata block. Now, when a corrupted metadata block is encountered, it is properly marked as corrupted and handled accordingly. 
* Previously, an incorrectly initialized variable resulted in a random value being stored in the variable that holds the number of default ACLs, and is sent in the SET_PATH_INFO data structure. Consequently, the setfacl command could, under certain circumstances, fail with an "Invalid argument" error. With this update, the variable is correctly initialized to zero, thus fixing the bug. 
The system must be rebooted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-02-17 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-PAE-devel" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-402.el5.i686.rpm</filename><sum type="sha">983fe9a1892949464ae50ec6edb0bc6c99253912</sum></package><package arch="i686" name="kernel" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-402.el5.i686.rpm</filename><sum type="sha">762317688963826a4443209d09fbd8b043b53c4f</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-402.el5xen" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-402.el5xen-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">833f009f4163de0e6c4f7799a9e9d30c2064e86e</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-402.el5" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-402.el5-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">9524d3b8e2eef6ef6440cb6506475b906629499c</sum></package><package arch="i686" name="kernel-debug" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-402.el5.i686.rpm</filename><sum type="sha">bff5b7cd8a8506bfe4cb8bf92c05aac21b9702e1</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-402.el5" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-402.el5-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">963d6920619528592432d209a2eadb573954c57f</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-402.el5" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-402.el5-0.4-2.sl5.i686.rpm</filename><sum type="sha">9f7ca2318200f5f9396a4f5e8b4ec80478326cd4</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-402.el5PAE" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-402.el5PAE-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">8b85ce5441007312acffc12443aa14243cb36ebb</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-402.el5PAE" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-402.el5PAE-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">694c404d5f2d3f3a2587ff2dbeb44d222a5fac8b</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-402.el5xen" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-402.el5xen-0.4-2.sl5.i686.rpm</filename><sum type="sha">195470ef1a7281de16bcecd438c68c51dc2d7c30</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-402.el5xen" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-402.el5xen-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">5c4ed85763ac28fc6710a1f5865369660c72357a</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-402.el5xen" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-402.el5xen-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">50582a745b60b874182a189612c08d7cf5adeacb</sum></package><package arch="i686" name="kernel-xen-devel" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-402.el5.i686.rpm</filename><sum type="sha">20c695804ecdd8cdbb028e148b2032236b2e1243</sum></package><package arch="i686" name="kernel-PAE" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-402.el5.i686.rpm</filename><sum type="sha">9b2850a46e3552ba4d65f757e8c304776691e554</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-402.el5" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-402.el5-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">7433f28b9841068de08a91aa44a67651f1b96611</sum></package><package arch="noarch" name="kernel-doc" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-402.el5.noarch.rpm</filename><sum type="sha">e3b761dc715a59e8d792fba6068498dbd9cb5ef6</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-402.el5xen" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-402.el5xen-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">28b521c5712fce64f07005213bf11c6361649036</sum></package><package arch="i686" name="kernel-debug-devel" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-402.el5.i686.rpm</filename><sum type="sha">42f34b2b48549d860113a74857916f622f587fa0</sum></package><package arch="i386" name="kernel-headers" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-402.el5.i386.rpm</filename><sum type="sha">067e2023e568009dde8da4ca17abb173197a9a35</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-402.el5PAE" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-402.el5PAE-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">f9bd2a12c4e31f3cd99a7aec9d1c26f65d0a3ed2</sum></package><package arch="i686" name="kernel-devel" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-402.el5.i686.rpm</filename><sum type="sha">f21d0b7043c44a22da7a905489a0a6f63a5992e5</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-402.el5" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-402.el5-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">92ddffa5d75f0be604881e1ddd120af8ebf9e5b4</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-402.el5PAE" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-402.el5PAE-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">6251fae97a26c96e946ff38d12819ae9e2f2ce25</sum></package><package arch="i686" name="kernel-xen" release="402.el5" src="kernel-2.6.18-402.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-402.el5.i686.rpm</filename><sum type="sha">ea026e02445b79ae8bcfa14b994bcdeb70b3c7f7</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-402.el5PAE" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-402.el5PAE-0.4-2.sl5.i686.rpm</filename><sum type="sha">5350df46e6bb793422c42d1768562985c34b65b7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" id="CVE-2014-7822" title="Kernel: Splice: Lack Of Generic Write Checks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0164" id="RHSA-2015:0164-1" title="Rhsa-2015:0164-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163792" id="1163792" title="Kernel: Splice: Lack Of Generic Write Checks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0249-1</id><title>Samba3X</title><description>An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user). (CVE-2015-0240) 
After installing this update, the smb service will be restarted automatically.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="samba3x" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">f5a84d2cbcf45b982bac21f7a7796b35b91363fc</sum></package><package arch="i386" name="samba3x-doc" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-doc-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">565b52bde9b57c48f22b77313868ee2a7011dc83</sum></package><package arch="i386" name="samba3x-swat" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-swat-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">db00727792bf6940c6da35e47bdbb7c5568d7808</sum></package><package arch="i386" name="samba3x-winbind" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-winbind-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">c96375a6191d18eda0b127c3d44cb44c288e4ce2</sum></package><package arch="i386" name="samba3x-common" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-common-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">6c6cc3099e703aa9cddcfdc04f64d17f42caa930</sum></package><package arch="i386" name="samba3x-domainjoin-gui" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-domainjoin-gui-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">a48e382246d5d4c906fc60c09d8d5914314f79bd</sum></package><package arch="i386" name="samba3x-client" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-client-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">d4c7f67df0e6babb996821870b8f30c9f858cf20</sum></package><package arch="i386" name="samba3x-winbind-devel" release="9.el5_11" src="samba3x-3.6.23-9.el5_11.src.rpm" version="3.6.23"><filename>samba3x-winbind-devel-3.6.23-9.el5_11.i386.rpm</filename><sum type="sha">22427be0a8dc64c8a7302ea8edaa351ae952cf97</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" id="CVE-2015-0240" title="Cve-2015-0240" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0249" id="RHSA-2015:0249-1" title="Rhsa-2015:0249-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191325" id="1191325" title="Samba: Talloc Free On Uninitialized Stack " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0265-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0836, CVE-2015-0831, CVE-2015-0827) 
An information leak flaw was found in the way Firefox implemented autocomplete forms. An attacker able to trick a user into specifying a local file in the form could use this flaw to access the contents of that file. (CVE-2015-0822) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-31.5.0-1.el5_11.src.rpm" version="31.5.0"><filename>firefox-31.5.0-1.el5_11.i386.rpm</filename><sum type="sha">2dbd00de8281c5038f38bfb04390ac57d27054b6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" id="CVE-2015-0822" title="Mozilla: Reading Of Local Files Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" id="CVE-2015-0827" title="Mozilla: Out-Of-Bounds Read And Write While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" id="CVE-2015-0831" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" id="CVE-2015-0836" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0265" id="RHSA-2015:0265-1" title="Rhsa-2015:0265-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195605" id="1195605" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195619" id="1195619" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195623" id="1195623" title="Mozilla: Out-Of-Bounds Read And Write While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195638" id="1195638" title="Mozilla: Reading Of Local Files Through " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0266-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0836, CVE-2015-0831, CVE-2015-0827) 
An information leak flaw was found in the way Thunderbird implemented autocomplete forms. An attacker able to trick a user into specifying a local file in the form could use this flaw to access the contents of that file. (CVE-2015-0822) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-03-03 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-31.5.0-1.el5_11.src.rpm" version="31.5.0"><filename>thunderbird-31.5.0-1.el5_11.i386.rpm</filename><sum type="sha">57f1c906e636975125815cf8e86ab1fcd006698d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" id="CVE-2015-0822" title="Mozilla: Reading Of Local Files Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" id="CVE-2015-0827" title="Mozilla: Out-Of-Bounds Read And Write While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" id="CVE-2015-0831" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" id="CVE-2015-0836" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0266" id="RHSA-2015:0266-1" title="Rhsa-2015:0266-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195605" id="1195605" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195619" id="1195619" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2015-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195623" id="1195623" title="Mozilla: Out-Of-Bounds Read And Write While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195638" id="1195638" title="Mozilla: Reading Of Local Files Through " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0718-1</id><title>Firefox</title><description>Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0817, CVE-2015-0818) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-03-31 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-31.5.3-1.el5_11.src.rpm" version="31.5.3"><filename>firefox-31.5.3-1.el5_11.i386.rpm</filename><sum type="sha">6d5858de8cb8aa8fe54dbb6016b0b6a2afddc3d0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" id="CVE-2015-0817" title="Mozilla: Code Execution Through Incorrect Javascript Bounds Checking Elimination (Mfsa 2015-29)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" id="CVE-2015-0818" title="Mozilla: Privilege Escalation Through Svg Navigation (Mfsa 2015-28)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0718" id="RHSA-2015:0718-1" title="Rhsa-2015:0718-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1204362" id="1204362" title="Mozilla: Code Execution Through Incorrect Javascript Bounds Checking Elimination (Mfsa 2015-29)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1204363" id="1204363" title="Mozilla: Privilege Escalation Through Svg Navigation (Mfsa 2015-28)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0729-1</id><title>Setroubleshoot</title><description>It was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command. (CVE-2015-1815)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="noarch" name="setroubleshoot" release="7.el5_11" src="setroubleshoot-2.0.5-7.el5_11.src.rpm" version="2.0.5"><filename>setroubleshoot-2.0.5-7.el5_11.noarch.rpm</filename><sum type="sha">2ef4dee87d98b21cee7e4cb8be32f3176aec5dc9</sum></package><package arch="noarch" name="setroubleshoot-server" release="7.el5_11" src="setroubleshoot-2.0.5-7.el5_11.src.rpm" version="2.0.5"><filename>setroubleshoot-server-2.0.5-7.el5_11.noarch.rpm</filename><sum type="sha">4c0f496d7613c43a686e27447aef40bd16b581c2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1815" id="CVE-2015-1815" title="Setroubleshoot: Command Injection Via Crafted File Name" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0729" id="RHSA-2015:0729-1" title="Rhsa-2015:0729-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1203352" id="1203352" title="Setroubleshoot: Command Injection Via Crafted File Name" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0766-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0813, CVE-2015-0815, CVE-2015-0801) 
A flaw was found in the way documents were loaded via resource URLs in, for example, Mozilla's PDF.js PDF file viewer. An attacker could use this flaw to bypass certain restrictions and under certain conditions even execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0816) 
A flaw was found in the Beacon interface implementation in Firefox. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack. (CVE-2015-0807) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="2.el5_11" src="firefox-31.6.0-2.el5_11.src.rpm" version="31.6.0"><filename>firefox-31.6.0-2.el5_11.i386.rpm</filename><sum type="sha">d64a4326aae24dc147f74ae6de2735d7932e146e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" id="CVE-2015-0801" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" id="CVE-2015-0807" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" id="CVE-2015-0813" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" id="CVE-2015-0815" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" id="CVE-2015-0816" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0766" id="RHSA-2015:0766-1" title="Rhsa-2015:0766-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207068" id="1207068" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207072" id="1207072" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207076" id="1207076" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207084" id="1207084" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207088" id="1207088" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0771-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0813, CVE-2015-0815, CVE-2015-0801) 
A flaw was found in the way documents were loaded via resource URLs. An attacker could use this flaw to bypass certain restrictions and under certain conditions even execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0816) 
A flaw was found in the Beacon interface implementation in Thunderbird. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack. (CVE-2015-0807) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-31.6.0-1.el5_11.src.rpm" version="31.6.0"><filename>thunderbird-31.6.0-1.el5_11.i386.rpm</filename><sum type="sha">80d84a8568f822f4fc1d446b422fd01c13012dad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" id="CVE-2015-0801" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" id="CVE-2015-0807" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" id="CVE-2015-0813" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" id="CVE-2015-0815" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" id="CVE-2015-0816" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0771" id="RHSA-2015:0771-1" title="Rhsa-2015:0771-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207068" id="1207068" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.6) (Mfsa 2015-30)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207072" id="1207072" title="Mozilla: Resource:// Documents Can Load Privileged Pages (Mfsa 2015-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207076" id="1207076" title="Mozilla: Cors Requests Should Not Follow 30X Redirections After Preflight (Mfsa 2015-36)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207084" id="1207084" title="Mozilla: Same-Origin Bypass Through Anchor Navigation (Mfsa 2015-40)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207088" id="1207088" title="Mozilla: Use-After-Free When Using The Fluendo Mp3 Gstreamer Plugin (Mfsa 2015-31)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0783-1</id><title>Kernel</title><description>* It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the (u)verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-8159, Important) 
* An insufficient bound checking flaw was found in the Xen hypervisor's implementation of acceleration support for the "REP MOVS" instructions. A privileged HVM guest user could potentially use this flaw to crash the host. (CVE-2014-8867, Important) 
This update also fixes the following bugs: 
* Under memory pressure, cached data was previously flushed to the backing server using the PID of the thread responsible for flushing the data in the Server Message Block (SMB) headers instead of the PID of the thread which actually wrote the data. As a consequence, when a file was locked by the writing thread prior to writing, the server considered writes by the thread flushing the pagecache as being a separate process from writing to a locked file, and thus rejected the writes. In addition, the data to be written was discarded. This update ensures that the correct PID is sent to the server, and data corruption is avoided when data is being written from a client under memory pressure. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-14 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-module-openafs-2.6.18-404.el5PAE" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-404.el5PAE-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">7cce126f399fc42484bd54c947984351cc01245d</sum></package><package arch="noarch" name="kernel-doc" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-404.el5.noarch.rpm</filename><sum type="sha">5e2de59704b076ec9174224b7d96981b9f9b9a00</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-404.el5xen" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-404.el5xen-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">aff1bf8579a8667ba3220e7fdeb39a408b96b960</sum></package><package arch="i686" name="kernel-PAE-devel" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-404.el5.i686.rpm</filename><sum type="sha">60b8a8ec31ef4d47b875256e45238466cb262b55</sum></package><package arch="i686" name="kernel-PAE" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-404.el5.i686.rpm</filename><sum type="sha">59e486253b762b9ddef28a3d6a704acd2491b50e</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-404.el5xen" release="86.sl5" src="openafs.SLx-1.4.15-86.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-404.el5xen-1.4.15-86.sl5.i686.rpm</filename><sum type="sha">45d63b3cd6ffc878a4b1a5c4e6824aeccfa22d88</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-404.el5PAE" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-404.el5PAE-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">7c078dbf200c0ae8907d86f8b89d53b12c9b3b80</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-404.el5" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-404.el5-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">3c16b7934abfc79731e2f855623d39dbee1a1220</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-404.el5xen" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-404.el5xen-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">e471234213ab71989557c8566f3b864704156dc0</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-404.el5" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-404.el5-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">c33814dc5eec7f28033a8485387248fb7e3d965b</sum></package><package arch="i386" name="kernel-headers" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-404.el5.i386.rpm</filename><sum type="sha">3e2c63faeaec6e972e65d922f1a3e21d03717075</sum></package><package arch="i686" name="kernel" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-404.el5.i686.rpm</filename><sum type="sha">a5e0ce3acd972122ed6daa085f3696fa73db464c</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-404.el5PAE" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-404.el5PAE-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">6f6575c743c832f3c4c9fb5ba2b9ebbdf2a4a0b7</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-404.el5PAE" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-404.el5PAE-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">1fbad2acd06a0b44b3d6c920c0f5588f153b1a3f</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-404.el5xen" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-404.el5xen-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">5bad621c7778cf009daf22a76fb849b36a378454</sum></package><package arch="i686" name="kernel-xen-devel" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-404.el5.i686.rpm</filename><sum type="sha">47dae3bb6ddfac04eb47870f49800d78e73b4be5</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-404.el5PAE" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-404.el5PAE-0.4-2.sl5.i686.rpm</filename><sum type="sha">c93b08fb6c02997ee416a605436ea9091ef25e19</sum></package><package arch="i686" name="kernel-module-drbd-2.6.18-404.el5" release="1.sl5" src="drbd-kernel-module-8.3.7-1.sl5.src.rpm" version="8.3.7"><filename>kernel-module-drbd-2.6.18-404.el5-8.3.7-1.sl5.i686.rpm</filename><sum type="sha">9520bf13111177f11d3b2dc1ef9a54a59aa08089</sum></package><package arch="i686" name="kernel-devel" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-404.el5.i686.rpm</filename><sum type="sha">084584c8707cd44879022f50c3da4e5b87a3fca9</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-404.el5xen" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-404.el5xen-0.4-2.sl5.i686.rpm</filename><sum type="sha">3bfa87ee0bec4cab006d2295bef8a5e30ec192c6</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-404.el5PAE" release="86.sl5" src="openafs.SLx-1.4.15-86.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-404.el5PAE-1.4.15-86.sl5.i686.rpm</filename><sum type="sha">4a417fc4bbe4c3472262856f97bc5ed081e3fef0</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-404.el5" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-404.el5-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">a60993a2c6bb8372677aa0675934389ae3c5728e</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-404.el5" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-404.el5-0.4-2.sl5.i686.rpm</filename><sum type="sha">55fce464e9025d54bfb86382cd2181e7d2a0eaab</sum></package><package arch="i686" name="kernel-debug" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-404.el5.i686.rpm</filename><sum type="sha">f571b76b0f62aad14953640dc017fff0b3b825ac</sum></package><package arch="i686" name="kernel-xen" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-404.el5.i686.rpm</filename><sum type="sha">4d90cc405f510e426cd03db15ed643c3fad979f1</sum></package><package arch="i686" name="kernel-debug-devel" release="404.el5" src="kernel-2.6.18-404.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-404.el5.i686.rpm</filename><sum type="sha">03f01cc3f253f598d747660854e199a2cd443f6d</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-404.el5" release="86.sl5" src="openafs.SLx-1.4.15-86.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-404.el5-1.4.15-86.sl5.i686.rpm</filename><sum type="sha">fcacd56836ef1d0cbed3212ec76c7c3734e46e56</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-404.el5xen" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-404.el5xen-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">89416db64c67bcb139000e65413818ac1d508b24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" id="CVE-2014-8159" title="Kernel: Infiniband: Uverbs: Unprotected Physical Memory Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867" id="CVE-2014-8867" title="Xen: Insufficient Bounding Of &quot;Rep Movs&quot; To Mmio Emulated Inside The Hypervisor (Xsa112)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0783" id="RHSA-2015:0783-1" title="Rhsa-2015:0783-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1164255" id="1164255" title="Xen: Insufficient Bounding Of &quot;Rep Movs&quot; To Mmio Emulated Inside The Hypervisor (Xsa112)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1181166" id="1181166" title="Kernel: Infiniband: Uverbs: Unprotected Physical Memory Access" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0800-1</id><title>Openssl</title><description>It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method. (CVE-2015-0204) 
An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input (such as a PEM file) could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292) 
A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) 
Multiple flaws were found in the way OpenSSL parsed X.509 certificates. An attacker could use these flaws to modify an X.509 certificate to produce a certificate with a different fingerprint without invalidating its signature, and possibly bypass fingerprint-based blacklisting in applications. (CVE-2014-8275) 
An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. A remote attacker could possibly use a specially crafted ASN.1 structure that, when parsed by an application, would cause that application to crash. (CVE-2015-0287) 
A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate handling implementation. A specially crafted X.509 certificate could cause an application using OpenSSL to crash if the application attempted to convert the certificate to a certificate request. (CVE-2015-0288) 
A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw. (CVE-2015-0289) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-04-14 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="openssl" release="33.el5_11" src="openssl-0.9.8e-33.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-33.el5_11.i686.rpm</filename><sum type="sha">53ff4468848f5eb2c1ac24a16e6d82b0a6c8667a</sum></package><package arch="i386" name="openssl" release="33.el5_11" src="openssl-0.9.8e-33.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-33.el5_11.i386.rpm</filename><sum type="sha">a03b56ec1e78ef9003f0ea3c2963297226a4f67c</sum></package><package arch="i386" name="openssl-perl" release="33.el5_11" src="openssl-0.9.8e-33.el5_11.src.rpm" version="0.9.8e"><filename>openssl-perl-0.9.8e-33.el5_11.i386.rpm</filename><sum type="sha">79d2a6853038c54f1814405f0c69430cce8b1f05</sum></package><package arch="i386" name="openssl-devel" release="33.el5_11" src="openssl-0.9.8e-33.el5_11.src.rpm" version="0.9.8e"><filename>openssl-devel-0.9.8e-33.el5_11.i386.rpm</filename><sum type="sha">2efa56063f94a9f140e889ce13ae2f07ab6cc09a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" id="CVE-2014-8275" title="Openssl: Fix Various Certificate Fingerprint Issues" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" id="CVE-2015-0204" title="Openssl: Only Allow Ephemeral Rsa Keys In Export " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" id="CVE-2015-0287" title="Openssl: Asn.1 Structure Reuse Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" id="CVE-2015-0288" title="Openssl: X509_To_X509_Req Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" id="CVE-2015-0289" title="Openssl: Pkcs7 Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" id="CVE-2015-0292" title="Openssl: Integer Underflow Leading To Buffer Overflow In Base64 Decoding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" id="CVE-2015-0293" title="Openssl: Assertion Failure In Sslv2 Servers" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0800" id="RHSA-2015:0800-1" title="Rhsa-2015:0800-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180184" id="1180184" title="Openssl: Only Allow Ephemeral Rsa Keys In Export " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180187" id="1180187" title="Openssl: Fix Various Certificate Fingerprint Issues" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202380" id="1202380" title="Openssl: Asn.1 Structure Reuse Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202384" id="1202384" title="Openssl: Pkcs7 Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202395" id="1202395" title="Openssl: Integer Underflow Leading To Buffer Overflow In Base64 Decoding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202404" id="1202404" title="Openssl: Assertion Failure In Sslv2 Servers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202418" id="1202418" title="Openssl: X509_To_X509_Req Null Pointer Dereference" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0807-1</id><title>Java-1.7.0-Openjdk</title><description>An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) 
A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) 
A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) 
A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0477) 
A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) 
It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.5.5.2.el5_11" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-src-1.7.0.79-2.5.5.2.el5_11.i386.rpm</filename><sum type="sha">1320bc829f9409b587438e5adc063d2f7e49e114</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.5.5.2.el5_11" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.2.el5_11.i386.rpm</filename><sum type="sha">32577134ee9d1c6ecb1ce2de3bc007dbe37cba89</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.5.5.2.el5_11" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.2.el5_11.i386.rpm</filename><sum type="sha">c0d5ee220370891e9d723021164021f4eadb85d1</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.5.5.2.el5_11" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.i386.rpm</filename><sum type="sha">1f615b996db727a83de4625f18a5c2059bb4f7c5</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.5.5.2.el5_11" src="java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm" version="1.7.0.79"><filename>java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.2.el5_11.i386.rpm</filename><sum type="sha">a0442bbb2a35c78bc806951a4c6a002f9ad71f85</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1080" id="CVE-2005-1080" title="Cve-2005-1080" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" id="CVE-2015-0460" title="Cve-2015-0460" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" id="CVE-2015-0469" title="Cve-2015-0469" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" id="CVE-2015-0477" title="Cve-2015-0477" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" id="CVE-2015-0478" title="Cve-2015-0478" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" id="CVE-2015-0480" title="Cve-2015-0480" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" id="CVE-2015-0488" title="Cve-2015-0488" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0807" id="RHSA-2015:0807-1" title="Rhsa-2015:0807-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210355" id="1210355" title="Openjdk: Rsa Implementation Hardening (Jce, 8071726)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210829" id="1210829" title="Icu: Layout Engine Glyphstorage Off-By-One (Openjdk 2D, 8067699)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211285" id="1211285" title="Openjdk: Incorrect Handling Of Phantom References (Hotspot, 8071931)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211299" id="1211299" title="Openjdk: Incorrect Permissions Check In Resource Loading (Beans, 8068320)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211504" id="1211504" title="Openjdk: Jar Directory Traversal Issues (Tools, 8064601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211543" id="1211543" title="Openjdk: Certificate Options Parsing Uncaught Exception (Jsse, 8068720)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=606442" id="606442" title="Jar: Directory Traversal Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0808-1</id><title>Java-1.6.0-Openjdk</title><description>An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) 
A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) 
A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) 
A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0477) 
A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) 
It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-04-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.7.1.el5_11" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el5_11.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el5_11.i386.rpm</filename><sum type="sha">9c904e35b9c2159264887d562ab933ec6b47828d</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.7.1.el5_11" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el5_11.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el5_11.i386.rpm</filename><sum type="sha">59704070986ef52d1f36d9d3f473c63a184d0258</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.7.1.el5_11" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el5_11.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el5_11.i386.rpm</filename><sum type="sha">50b079fb19a3a1f956f6710039b3e02aa0d8ba9e</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.7.1.el5_11" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el5_11.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el5_11.i386.rpm</filename><sum type="sha">fa93385c95d9e3b6b5121f7ebdeb3132f5f089a7</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.7.1.el5_11" src="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el5_11.src.rpm" version="1.6.0.35"><filename>java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el5_11.i386.rpm</filename><sum type="sha">3136a9652cb3178be6a0791945f74b4c1ed651da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1080" id="CVE-2005-1080" title="Cve-2005-1080" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" id="CVE-2015-0460" title="Cve-2015-0460" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" id="CVE-2015-0469" title="Cve-2015-0469" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" id="CVE-2015-0477" title="Cve-2015-0477" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" id="CVE-2015-0478" title="Cve-2015-0478" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" id="CVE-2015-0480" title="Cve-2015-0480" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" id="CVE-2015-0488" title="Cve-2015-0488" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0808" id="RHSA-2015:0808-1" title="Rhsa-2015:0808-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210355" id="1210355" title="Openjdk: Rsa Implementation Hardening (Jce, 8071726)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210829" id="1210829" title="Icu: Layout Engine Glyphstorage Off-By-One (Openjdk 2D, 8067699)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211285" id="1211285" title="Openjdk: Incorrect Handling Of Phantom References (Hotspot, 8071931)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211299" id="1211299" title="Openjdk: Incorrect Permissions Check In Resource Loading (Beans, 8068320)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211504" id="1211504" title="Openjdk: Jar Directory Traversal Issues (Tools, 8064601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211543" id="1211543" title="Openjdk: Certificate Options Parsing Uncaught Exception (Jsse, 8068720)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=606442" id="606442" title="Jar: Directory Traversal Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:0988-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2708, CVE-2015-0797, CVE-2015-2710, CVE-2015-2713) 
A heap-based buffer overflow flaw was found in the way Firefox processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Firefox, could cause it to crash or execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2716) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="4.el5_11" src="firefox-38.0-4.el5_11.src.rpm" version="38.0"><filename>firefox-38.0-4.el5_11.i386.rpm</filename><sum type="sha">ff2e0723ae8d0386a37c173bc732cb3972ba5ea8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" id="CVE-2015-0797" title="Mozilla: Buffer Overflow Parsing H.264 Video With Linux Gstreamer (Mfsa 2015-47)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" id="CVE-2015-2708" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" id="CVE-2015-2710" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" id="CVE-2015-2713" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" id="CVE-2015-2716" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:0988" id="RHSA-2015:0988-1" title="Rhsa-2015:0988-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220597" id="1220597" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220600" id="1220600" title="Mozilla: Buffer Overflow Parsing H.264 Video With Linux Gstreamer (Mfsa 2015-47)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220601" id="1220601" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220605" id="1220605" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220607" id="1220607" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1002-1</id><title>Xen</title><description>An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller (FDC) handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest. (CVE-2015-3456) 
After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="xen" release="146.el5_11" src="xen-3.0.3-146.el5_11.src.rpm" version="3.0.3"><filename>xen-3.0.3-146.el5_11.i386.rpm</filename><sum type="sha">3ded105f71b07447ca56507d5f487cde7ec66f3e</sum></package><package arch="i386" name="xen-devel" release="146.el5_11" src="xen-3.0.3-146.el5_11.src.rpm" version="3.0.3"><filename>xen-devel-3.0.3-146.el5_11.i386.rpm</filename><sum type="sha">5b6ac00e66586295bcf6dabefea403fe1f1bfedb</sum></package><package arch="i386" name="xen-libs" release="146.el5_11" src="xen-3.0.3-146.el5_11.src.rpm" version="3.0.3"><filename>xen-libs-3.0.3-146.el5_11.i386.rpm</filename><sum type="sha">c6a4e959597f57b34d0e49c14e228872de32cf0c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" id="CVE-2015-3456" title="Qemu: Fdc: Out-Of-Bounds Fifo Buffer Memory Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1002" id="RHSA-2015:1002-1" title="Rhsa-2015:1002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218611" id="1218611" title="Qemu: Fdc: Out-Of-Bounds Fifo Buffer Memory Access" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1012-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2708, CVE-2015-2710, CVE-2015-2713) 
A heap-based buffer overflow flaw was found in the way Thunderbird processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Thunderbird, could cause it to crash or execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2716) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-05-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-31.7.0-1.el5_11.src.rpm" version="31.7.0"><filename>thunderbird-31.7.0-1.el5_11.i386.rpm</filename><sum type="sha">0915291f170f7a1226585c5ee68600a5554a243b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" id="CVE-2015-2708" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" id="CVE-2015-2710" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" id="CVE-2015-2713" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" id="CVE-2015-2716" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1012" id="RHSA-2015:1012-1" title="Rhsa-2015:1012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220597" id="1220597" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.7) (Mfsa 2015-46)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220601" id="1220601" title="Mozilla: Buffer Overflow With Svg Content And Css (Mfsa 2015-48)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220605" id="1220605" title="Mozilla: Use-After-Free During Text Processing With Vertical Text Enabled (Mfsa 2015-51)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220607" id="1220607" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1042-1</id><title>Kernel</title><description>* It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) 
This update fixes the following bugs: 
* Due to a bug in the lpfc_device_reset_handler() function, a scsi command timeout could lead to a system crash. With this update, lpfc_device_reset_handler recovers storage without crashing. 
* Due to the code decrementing the reclaim_in_progress counter without having incremented it first, severe spinlock contention occurred in the shrink_zone() function even though the vm.max_reclaims_in_progress feature was set to 1. This update provides a patch fixing the underlying source code, and spinlock contention no longer occurs in this scenario. 
* A TCP socket using SACK that had a retransmission but recovered from it, failed to reset the retransmission timestamp. As a consequence, on certain connections, if a packet had to be re-transmitted, the retrans_stamp variable was only cleared when the next acked packet was received. This could lead to an early abortion of the TCP connection if this next packet also got lost. With this update, the socket clears retrans_stamp when the recovery is completed, thus fixing the bug. 
* Previously, the signal delivery paths did not clear the TS_USEDFPU flag, which could cause problems in the switch_to() function and lead to floating-point unit (FPU) corruption. With this update, TS_USEDFPU is cleared as expected, and FPU is no longer under threat of corruption. 
* A race condition in the exit_sem() function previously caused the semaphore undo list corruption. As a consequence, a kernel crash could occur. The corruption in the semaphore undo list has been fixed, and the kernel no longer crashes in this situation. 
* Previously, when running the "virsh blockresize [Device] [Newsize]" command to resize the disk, the new size was not reflected in a Scientific Linux 5 Virtual Machine (VM). With this update, the new size is now reflected online immediately in a Scientific Linux 5 VM so it is no longer necessary to reboot the VM to see the new disk size. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-06-09 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-module-xfs-2.6.18-406.el5PAE" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-406.el5PAE-0.4-2.sl5.i686.rpm</filename><sum type="sha">46920eab3d4f5cfc1f961959a92c9a9ed9dcd175</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-406.el5xen" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-406.el5xen-0.4-2.sl5.i686.rpm</filename><sum type="sha">94bdcf873ec183cd831894855b1451583772b660</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-406.el5" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-406.el5-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">0f2d95540e79d3c1d815c87ab305d141bc0ce944</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-406.el5xen" release="86.sl5" src="openafs.SLx-1.4.15-86.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-406.el5xen-1.4.15-86.sl5.i686.rpm</filename><sum type="sha">445fd1231f964b72a3f0142e15005071c1ea647e</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-406.el5" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-406.el5-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">dba60f95a6a1980995a0cf9291532f66e8df44d9</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-406.el5" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-406.el5-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">aab9af0edbca6bfcb1d708ef8350865a5e8dec58</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-406.el5PAE" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-406.el5PAE-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">e2097de4c9a0149f623cef21295b163e49bb0b4c</sum></package><package arch="i686" name="kernel" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-406.el5.i686.rpm</filename><sum type="sha">29e1e98f89150e5d194200ca538239626f1c18a4</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-406.el5PAE" release="86.sl5" src="openafs.SLx-1.4.15-86.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-406.el5PAE-1.4.15-86.sl5.i686.rpm</filename><sum type="sha">a8e5ee3051ea3f7750a59578db3b8e2bd3558b69</sum></package><package arch="i686" name="kernel-PAE" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-406.el5.i686.rpm</filename><sum type="sha">1ee84da62ccdbb17b0972d64fc0b877502709d53</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-406.el5" release="86.sl5" src="openafs.SLx-1.4.15-86.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-406.el5-1.4.15-86.sl5.i686.rpm</filename><sum type="sha">6dc6cd0dd3d6dc9e7cbff8802789fb57f4ea2377</sum></package><package arch="i686" name="kernel-module-xfs-2.6.18-406.el5" release="2.sl5" src="xfs-filesystem-0.4-2.sl5.src.rpm" version="0.4"><filename>kernel-module-xfs-2.6.18-406.el5-0.4-2.sl5.i686.rpm</filename><sum type="sha">ded40bc247d9dee5242092b53568e90cd3950d53</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-406.el5PAE" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-406.el5PAE-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">80e2bcc9265728ebb1fa3430a98396e552cf027a</sum></package><package arch="i686" name="kernel-PAE-devel" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-406.el5.i686.rpm</filename><sum type="sha">08f13ec283e5bd80a816085a74cf74641b10fb44</sum></package><package arch="i686" name="kernel-xen" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-406.el5.i686.rpm</filename><sum type="sha">dfb02b1376682cad795858ebe6b1312b9ac42290</sum></package><package arch="i386" name="kernel-headers" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-406.el5.i386.rpm</filename><sum type="sha">ef223ee9078cda185fbd3a4716cccee937ba4a85</sum></package><package arch="noarch" name="kernel-doc" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-406.el5.noarch.rpm</filename><sum type="sha">5751271bec42b1e7730c3171e5142cf31e4e1f8e</sum></package><package arch="i686" name="kernel-module-aufs-2.6.18-406.el5xen" release="6.sl5" src="aufs-0.20090202.cvs-6.sl5.src.rpm" version="0.20090202.cvs"><filename>kernel-module-aufs-2.6.18-406.el5xen-0.20090202.cvs-6.sl5.i686.rpm</filename><sum type="sha">a49e91a2df33a27c5730ca8928c5088a2192bda4</sum></package><package arch="i686" name="kernel-debug" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-406.el5.i686.rpm</filename><sum type="sha">c4e11c5cd32d850547081a06d084c0fcca7d023e</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-406.el5xen" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-406.el5xen-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">1a94c26e39332f18eecee4574fbad13c3ce42d6e</sum></package><package arch="i686" name="kernel-module-openafs-2.6.18-406.el5xen" release="85.sl5" src="openafs.SLx-1.4.15-85.src.rpm" version="1.4.15"><filename>kernel-module-openafs-2.6.18-406.el5xen-1.4.15-85.sl5.i686.rpm</filename><sum type="sha">da1e953f103e93398bb1704c14d6897aeb9960d2</sum></package><package arch="i686" name="kernel-devel" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-406.el5.i686.rpm</filename><sum type="sha">11e8bce4b6b3902c1fcf2a488ab5ffde7d3557a6</sum></package><package arch="i686" name="kernel-xen-devel" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-406.el5.i686.rpm</filename><sum type="sha">00f4cc3bcb5be07ab6e71d52387e7b2a4905d591</sum></package><package arch="i686" name="kernel-module-ipw3945-2.6.18-406.el5PAE" release="2.sl5" src="ipw3945-1.2.0-2.sl5.src.rpm" version="1.2.0"><filename>kernel-module-ipw3945-2.6.18-406.el5PAE-1.2.0-2.sl5.i686.rpm</filename><sum type="sha">d368d6a144b69f304610f238e3a85a9137232a57</sum></package><package arch="i686" name="kernel-debug-devel" release="406.el5" src="kernel-2.6.18-406.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-406.el5.i686.rpm</filename><sum type="sha">c7875520382154da4952a121be4395b29d5fedd3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" id="CVE-2015-1805" title="Kernel: Pipe: Iovec Overrun Leading To Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1042" id="RHSA-2015:1042-1" title="Rhsa-2015:1042-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202855" id="1202855" title="Kernel: Pipe: Iovec Overrun Leading To Memory Corruption" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1197-1</id><title>Openssl</title><description>An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) 
A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) 
A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000) 
Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-07-07 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="openssl-devel" release="36.el5_11" src="openssl-0.9.8e-36.el5_11.src.rpm" version="0.9.8e"><filename>openssl-devel-0.9.8e-36.el5_11.i386.rpm</filename><sum type="sha">28ecbc62a93896cb4b8c4447f822a8ef28bb9649</sum></package><package arch="i386" name="openssl" release="36.el5_11" src="openssl-0.9.8e-36.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-36.el5_11.i386.rpm</filename><sum type="sha">5fbe88c4a3b7471f7499ee82d08861e7cd9f86cb</sum></package><package arch="i386" name="openssl-perl" release="36.el5_11" src="openssl-0.9.8e-36.el5_11.src.rpm" version="0.9.8e"><filename>openssl-perl-0.9.8e-36.el5_11.i386.rpm</filename><sum type="sha">5e10fdd62b79872ec57aacf15e55b6e7a213bfb3</sum></package><package arch="i686" name="openssl" release="36.el5_11" src="openssl-0.9.8e-36.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-36.el5_11.i686.rpm</filename><sum type="sha">c00af5531e6317cef5ef08b6cb119b2340ecb195</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" id="CVE-2015-1789" title="Openssl: Out-Of-Bounds Read In X509_Cmp_Time" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" id="CVE-2015-1790" title="Openssl: Pkcs7 Crash With Missing Envelopedcontent" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1197" id="RHSA-2015:1197-1" title="Rhsa-2015:1197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228603" id="1228603" title="Openssl: Out-Of-Bounds Read In X509_Cmp_Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228604" id="1228604" title="Openssl: Pkcs7 Crash With Missing Envelopedcontent" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1207-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2722, CVE-2015-2727, CVE-2015-2728, CVE-2015-2729, CVE-2015-2731, CVE-2015-2733, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) 
It was found that Firefox skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741) 
A flaw was discovered in Mozilla's PDF.js PDF file viewer. When combined with another vulnerability, it could allow execution of arbitrary code with the privileges of the user running Firefox. (CVE-2015-2743) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-07-07 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.1.0-1.el5_11.src.rpm" version="38.1.0"><filename>firefox-38.1.0-1.el5_11.i386.rpm</filename><sum type="sha">519a4d359cbf6b45ec8d86de87e1b5eb65cfda99</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" id="CVE-2015-2722" title="Mozilla: Use-After-Free In Workers While Using Xmlhttprequest (Mfsa 2015-65)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" id="CVE-2015-2724" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" id="CVE-2015-2725" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727" id="CVE-2015-2727" title="Mozilla: Local Files Or Privileged Urls In Pages Can Be Opened Into New Tabs (Mfsa 2015-60)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" id="CVE-2015-2728" title="Mozilla: Type Confusion In Indexed Database Manager (Mfsa 2015-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" id="CVE-2015-2729" title="Mozilla: Out-Of-Bound Read While Computing An Oscillator Rendering Range In Web Audio (Mfsa 2015-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" id="CVE-2015-2731" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" id="CVE-2015-2733" title="Mozilla: Use-After-Free In Workers While Using Xmlhttprequest (Mfsa 2015-65)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" id="CVE-2015-2734" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" id="CVE-2015-2735" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" id="CVE-2015-2736" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" id="CVE-2015-2737" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" id="CVE-2015-2738" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" id="CVE-2015-2739" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" id="CVE-2015-2740" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" id="CVE-2015-2741" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" id="CVE-2015-2743" title="Mozilla: Privilege Escalation In Pdf.Js (Mfsa 2015-69)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1207" id="RHSA-2015:1207-1" title="Rhsa-2015:1207-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236947" id="1236947" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236950" id="1236950" title="Mozilla: Local Files Or Privileged Urls In Pages Can Be Opened Into New Tabs (Mfsa 2015-60)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236951" id="1236951" title="Mozilla: Type Confusion In Indexed Database Manager (Mfsa 2015-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236952" id="1236952" title="Mozilla: Out-Of-Bound Read While Computing An Oscillator Rendering Range In Web Audio (Mfsa 2015-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236953" id="1236953" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236955" id="1236955" title="Mozilla: Use-After-Free In Workers While Using Xmlhttprequest (Mfsa 2015-65)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236956" id="1236956" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236963" id="1236963" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236964" id="1236964" title="Mozilla: Privilege Escalation In Pdf.Js (Mfsa 2015-69)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1230-1</id><title>Java-1.7.0-Openjdk</title><description>Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) 
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) 
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) 
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) 
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) 
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) 
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) 
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-07-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.1.3.el5_11" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm</filename><sum type="sha">330fc1523eab325163269ee528c6d45366c8f8a0</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.1.3.el5_11" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm</filename><sum type="sha">728c4bb4e72f2be14bc1d9c08f36a777e6dd515d</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.1.3.el5_11" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm</filename><sum type="sha">02505417f7d601f290faca787f59b45340326629</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.1.3.el5_11" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm</filename><sum type="sha">7354c5aa64d463ce1877757627bb58a847d9d68e</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.1.3.el5_11" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm</filename><sum type="sha">f2f89a5f9ed30b4c10aa0f84eb6a33c744d79eef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" id="CVE-2015-2590" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" id="CVE-2015-2601" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" id="CVE-2015-2621" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" id="CVE-2015-2625" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" id="CVE-2015-2628" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" id="CVE-2015-2632" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" id="CVE-2015-2808" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" id="CVE-2015-4731" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" id="CVE-2015-4732" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" id="CVE-2015-4733" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" id="CVE-2015-4748" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" id="CVE-2015-4749" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" id="CVE-2015-4760" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1230" id="RHSA-2015:1230-1" title="Rhsa-2015:1230-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207101" id="1207101" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241965" id="1241965" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242019" id="1242019" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242232" id="1242232" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242234" id="1242234" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242240" id="1242240" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242275" id="1242275" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242281" id="1242281" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242372" id="1242372" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242379" id="1242379" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242394" id="1242394" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242447" id="1242447" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243139" id="1243139" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1455-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2731, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) 
It was found that Thunderbird skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-07-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-31.8.0-1.el5_11.src.rpm" version="31.8.0"><filename>thunderbird-31.8.0-1.el5_11.i386.rpm</filename><sum type="sha">cdd057a959e6b070f4ba5bfa0743a1c0e1adf131</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" id="CVE-2015-2724" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" id="CVE-2015-2725" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" id="CVE-2015-2731" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" id="CVE-2015-2734" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" id="CVE-2015-2735" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" id="CVE-2015-2736" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" id="CVE-2015-2737" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" id="CVE-2015-2738" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" id="CVE-2015-2739" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" id="CVE-2015-2740" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" id="CVE-2015-2741" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1455" id="RHSA-2015:1455-1" title="Rhsa-2015:1455-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236947" id="1236947" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:31.8 / Rv:38.1) (Mfsa 2015-59)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236953" id="1236953" title="Mozilla: Use-After-Free In Content Policy Due To Microtask Execution Error (Mfsa 2015-63)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236956" id="1236956" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-66)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236963" id="1236963" title="Mozilla: Key Pinning Is Ignored When Overridable Errors Are Encountered (Mfsa 2015-67)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1514-1</id><title>Bind</title><description>A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">f0409ef02ee9af5bada65439505289d7df6986e9</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">83ec2ed0dbc9356ad674ef9f4ace17addca40908</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">b343c20953742e10159f8d200f8452fd1570e8e5</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">a8e61482e25375ec96ac4216f26eaee5f2728f7b</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">4aa17cebb83dd10fe2b9f41909fac11b5af5dbee</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">2abd626041ecb5bf717a5eb374994d0b902d4c88</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">d36585ea98b9ee38ab1bc47e7ddeb9c7a44f072e</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.3" src="bind-9.3.6-25.P1.el5_11.3.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.3.i386.rpm</filename><sum type="sha">f1ed9b54654817feb8dfd009587eb6d72304dd9b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" id="CVE-2015-5477" title="Bind: Tkey Query Handling Flaw Leading To Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1514" id="RHSA-2015:1514-1" title="Rhsa-2015:1514-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247361" id="1247361" title="Bind: Tkey Query Handling Flaw Leading To Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1515-1</id><title>Bind97</title><description>A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.2" src="bind97-9.7.0-21.P2.el5_11.2.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm</filename><sum type="sha">84bf7d1d864db580dc5bbb90fea2b5407e442d25</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.2" src="bind97-9.7.0-21.P2.el5_11.2.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm</filename><sum type="sha">5addda86d2ee30ee93e1cce88e5f88ef071269e5</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.2" src="bind97-9.7.0-21.P2.el5_11.2.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.2.i386.rpm</filename><sum type="sha">b1e312a45378082a6f9e8b3383f5e6183a281e4c</sum></package><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.2" src="bind97-9.7.0-21.P2.el5_11.2.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.2.i386.rpm</filename><sum type="sha">00370e3ee4ce1b10ecb3384ec207e802d5612e09</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.2" src="bind97-9.7.0-21.P2.el5_11.2.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.2.i386.rpm</filename><sum type="sha">dfd90b61509683df0063397766b97bdadfdc57a8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" id="CVE-2015-5477" title="Bind: Tkey Query Handling Flaw Leading To Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1515" id="RHSA-2015:1515-1" title="Rhsa-2015:1515-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247361" id="1247361" title="Bind: Tkey Query Handling Flaw Leading To Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1526-1</id><title>Java-1.6.0-Openjdk</title><description>Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) 
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) 
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) 
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) 
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000) 
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) 
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) 
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.8.1.el5_11" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm</filename><sum type="sha">c98d8ce4b40f0fcfa220fcb46e91f3231ccc800f</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.8.1.el5_11" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm</filename><sum type="sha">4e01de94ede6b1af6f91d11c04ec85330055090e</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.8.1.el5_11" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm</filename><sum type="sha">da5e22d4a2dad4f42780cadd6b87d79e0e09ffd4</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.8.1.el5_11" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm</filename><sum type="sha">06b8a2c5ba5ba22c16125eca7f2edf049d98ea9d</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.8.1.el5_11" src="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm" version="1.6.0.36"><filename>java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm</filename><sum type="sha">7ac3699db3d7dd9ec82acec683d909bc5289a442</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" id="CVE-2015-2590" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" id="CVE-2015-2601" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" id="CVE-2015-2621" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" id="CVE-2015-2625" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" id="CVE-2015-2628" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" id="CVE-2015-2632" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" id="CVE-2015-2808" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" id="CVE-2015-4000" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" id="CVE-2015-4731" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" id="CVE-2015-4732" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" id="CVE-2015-4733" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" id="CVE-2015-4748" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" id="CVE-2015-4749" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" id="CVE-2015-4760" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1526" id="RHSA-2015:1526-1" title="Rhsa-2015:1526-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207101" id="1207101" title="Ssl/Tls: &quot;Invariance Weakness&quot; Vulnerability In Rc4 Stream Cipher" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223211" id="1223211" title="Logjam: Tls Connections Which Support Export Grade Dhe Key-Exchange Are Vulnerable To Mitm Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241965" id="1241965" title="Openjdk: Name For Reverse Dns Lookup Used In Certificate Identity Check (Jsse, 8067694)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242019" id="1242019" title="Openjdk: Non-Constant Time Comparisons In Crypto Code (Jce, 8074865)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242232" id="1242232" title="Openjdk: Iiopinputstream Type Confusion Vulnerability (Corba, 8076376)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242234" id="1242234" title="Openjdk: Improper Permission Checks In Mbeanserverinvocationhandler (Jmx, 8076397)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242240" id="1242240" title="Openjdk: Insufficient Context Checks During Object Deserialization (Libraries, 8076405)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242275" id="1242275" title="Openjdk: Remoteobjectinvocationhandler Allows Calling Finalize() (Rmi, 8076409)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242281" id="1242281" title="Openjdk: Incorrect Ocsp Nextupdate Checking (Libraries, 8075374)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242372" id="1242372" title="Openjdk: Incorrect Code Permission Checks In Rmiconnectionimpl (Jmx, 8075853)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242379" id="1242379" title="Openjdk: Dnsclient Fails To Release Request Information After Error (Jndi, 8075378)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242394" id="1242394" title="Icu: Integer Overflow In Letablereference Verifylength() (Openjdk 2D, 8077520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242447" id="1242447" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8071715)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243139" id="1243139" title="Openjdk: Deserialization Issue In Objectinputstream.Readserialdata() (Libraries, 8076401)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1581-1</id><title>Firefox</title><description>A flaw was discovered in Mozilla Firefox that could be used to violate the same-origin policy and inject web script into a non-privileged part of the built-in PDF file viewer (PDF.js). An attacker could create a malicious web page that, when viewed by a victim, could steal arbitrary files (including private SSH keys, the /etc/passwd file, and other potentially sensitive files) from the system running Firefox. (CVE-2015-4495) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-08-11 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.1.1-1.el5_11.src.rpm" version="38.1.1"><filename>firefox-38.1.1-1.el5_11.i386.rpm</filename><sum type="sha">b3593d204f38d38d22e636bda7a528a928a48d7f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" id="CVE-2015-4495" title="Mozilla: Same Origin Violation And Local File Stealing Via Pdf Reader (Mfsa 2015-78)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1581" id="RHSA-2015:1581-1" title="Rhsa-2015:1581-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1251318" id="1251318" title="Mozilla: Same Origin Violation And Local File Stealing Via Pdf Reader (Mfsa 2015-78)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1586-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4473, CVE-2015-4475, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4493, CVE-2015-4484, CVE-2015-4491, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4492) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-08-18 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="4.el5_11" src="firefox-38.2.0-4.el5_11.src.rpm" version="38.2.0"><filename>firefox-38.2.0-4.el5_11.i386.rpm</filename><sum type="sha">eb435a602599e3b2fabbecca476c05e67991efde</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" id="CVE-2015-4473" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" id="CVE-2015-4475" title="Mozilla: Out-Of-Bounds Read With Malformed Mp3 File (Mfsa 2015-80)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" id="CVE-2015-4478" title="Mozilla: Redefinition Of Non-Configurable Javascript Object Properties (Mfsa 2015-82)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" id="CVE-2015-4479" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480" id="CVE-2015-4480" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" id="CVE-2015-4484" title="Mozilla: Crash When Using Shared Memory In Javascript (Mfsa 2015-87)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" id="CVE-2015-4485" title="Mozilla: Buffer Overflows On Libvpx When Decoding Webm Video (Mfsa 2015-89)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" id="CVE-2015-4486" title="Mozilla: Buffer Overflows On Libvpx When Decoding Webm Video (Mfsa 2015-89)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" id="CVE-2015-4487" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" id="CVE-2015-4488" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" id="CVE-2015-4489" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" id="CVE-2015-4491" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" id="CVE-2015-4492" title="Mozilla: Use-After-Free In Xmlhttprequest With Shared Workers (Mfsa 2015-92)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493" id="CVE-2015-4493" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1586" id="RHSA-2015:1586-1" title="Rhsa-2015:1586-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252271" id="1252271" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252276" id="1252276" title="Mozilla: Out-Of-Bounds Read With Malformed Mp3 File (Mfsa 2015-80)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252282" id="1252282" title="Mozilla: Redefinition Of Non-Configurable Javascript Object Properties (Mfsa 2015-82)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252285" id="1252285" title="Mozilla: Overflow Issues In Libstagefright (Mfsa 2015-83)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252289" id="1252289" title="Mozilla: Crash When Using Shared Memory In Javascript (Mfsa 2015-87)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252290" id="1252290" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252292" id="1252292" title="Mozilla: Buffer Overflows On Libvpx When Decoding Webm Video (Mfsa 2015-89)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252293" id="1252293" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252295" id="1252295" title="Mozilla: Use-After-Free In Xmlhttprequest With Shared Workers (Mfsa 2015-92)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1627-1</id><title>Glibc</title><description>An invalid free flaw was found in glibc's getaddrinfo() function when used with the AI_IDN flag. A remote attacker able to make an application call this function could use this flaw to execute arbitrary code with the permissions of the user running the application. Note that this flaw only affected applications using glibc compiled with libidn support. (CVE-2013-7424)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nscd" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>nscd-2.5-123.el5_11.3.i386.rpm</filename><sum type="sha">6e6717b603d72ccf025ccbabac97848b025d797f</sum></package><package arch="i386" name="glibc" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>glibc-2.5-123.el5_11.3.i386.rpm</filename><sum type="sha">b2cb4cb0500413654cc8cff0834b4beddd8e48b9</sum></package><package arch="i686" name="glibc" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>glibc-2.5-123.el5_11.3.i686.rpm</filename><sum type="sha">ea16f455b7bfb59c64e5fac0dc981e5f4102b4fa</sum></package><package arch="i386" name="glibc-devel" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>glibc-devel-2.5-123.el5_11.3.i386.rpm</filename><sum type="sha">0f5a75716fdb49c7e78675e24e18d1b6b02a027f</sum></package><package arch="i386" name="glibc-common" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>glibc-common-2.5-123.el5_11.3.i386.rpm</filename><sum type="sha">27a70cb7b4dca6a368bfd6dc0cf1349a126ed654</sum></package><package arch="i386" name="glibc-utils" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>glibc-utils-2.5-123.el5_11.3.i386.rpm</filename><sum type="sha">57ae55589acb2ed4def575c7f1fd00dd6178c54a</sum></package><package arch="i386" name="glibc-headers" release="123.el5_11.3" src="glibc-2.5-123.el5_11.3.src.rpm" version="2.5"><filename>glibc-headers-2.5-123.el5_11.3.i386.rpm</filename><sum type="sha">ae45be089c82ca635fb7fe2b7ced09400300a911</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" id="CVE-2013-7424" title="Glibc: Invalid-Free When Using Getaddrinfo()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1627" id="RHSA-2015:1627-1" title="Rhsa-2015:1627-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1186614" id="1186614" title="Glibc: Invalid-Free When Using Getaddrinfo()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1628-1</id><title>Mysql55-Mysql</title><description>This update fixes several vulnerabilities in the MySQL database server. (CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382, CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2015-0433, CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757) 
After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="mysql55-mysql-devel" release="1.el5" src="mysql55-mysql-5.5.45-1.el5.src.rpm" version="5.5.45"><filename>mysql55-mysql-devel-5.5.45-1.el5.i386.rpm</filename><sum type="sha">9859d16de6c6166643319324e7b69afd0c2a058e</sum></package><package arch="i386" name="mysql55-mysql" release="1.el5" src="mysql55-mysql-5.5.45-1.el5.src.rpm" version="5.5.45"><filename>mysql55-mysql-5.5.45-1.el5.i386.rpm</filename><sum type="sha">33fe4c0b32a53d3a2a69d6c5599cd3dcc4bd9cfe</sum></package><package arch="i386" name="mysql55-mysql-server" release="1.el5" src="mysql55-mysql-5.5.45-1.el5.src.rpm" version="5.5.45"><filename>mysql55-mysql-server-5.5.45-1.el5.i386.rpm</filename><sum type="sha">a82e5551d174f2aa579a790b0172a4f90f5aaa9e</sum></package><package arch="i386" name="mysql55-mysql-bench" release="1.el5" src="mysql55-mysql-5.5.45-1.el5.src.rpm" version="5.5.45"><filename>mysql55-mysql-bench-5.5.45-1.el5.i386.rpm</filename><sum type="sha">047aac751e5138e7a29677bd62e36e3fb11c6f4c</sum></package><package arch="i386" name="mysql55-mysql-libs" release="1.el5" src="mysql55-mysql-5.5.45-1.el5.src.rpm" version="5.5.45"><filename>mysql55-mysql-libs-5.5.45-1.el5.i386.rpm</filename><sum type="sha">cc4b0cd98ba7448815242576c73e1d0edbb9d40c</sum></package><package arch="i386" name="mysql55-mysql-test" release="1.el5" src="mysql55-mysql-5.5.45-1.el5.src.rpm" version="5.5.45"><filename>mysql55-mysql-test-5.5.45-1.el5.i386.rpm</filename><sum type="sha">8f63956ad635e7cd62793a56201e94b7fcf7569a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" id="CVE-2014-6568" title="Mysql: Unspecified Vulnerability Related To Server:Innodb:Dml (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" id="CVE-2015-0374" title="Mysql: Unspecified Vulnerability Related To Server:Security:Privileges:Foreign Key (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" id="CVE-2015-0381" title="Mysql: Unspecified Vulnerability Related To Server:Replication (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" id="CVE-2015-0382" title="Mysql: Unspecified Vulnerability Related To Server:Replication (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" id="CVE-2015-0391" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" id="CVE-2015-0411" title="Mysql: Unspecified Vulnerability Related To Server:Security:Encryption (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" id="CVE-2015-0432" title="Mysql: Unspecified Vulnerability Related To Server:Innodb:Ddl:Foreign Key (Cpu Jan 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" id="CVE-2015-0433" title="Mysql: Unspecified Vulnerability Related To Server:Innodb:Dml (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" id="CVE-2015-0441" title="Mysql: Unspecified Vulnerability Related To Server:Security:Encryption (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" id="CVE-2015-0499" title="Mysql: Unspecified Vulnerability Related To Server:Federated (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" id="CVE-2015-0501" title="Mysql: Unspecified Vulnerability Related To Server:Compiling (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" id="CVE-2015-0505" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" id="CVE-2015-2568" title="Mysql: Unspecified Vulnerability Related To Server:Security:Privileges (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" id="CVE-2015-2571" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" id="CVE-2015-2573" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu April 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582" id="CVE-2015-2582" title="Mysql: Unspecified Vulnerability Related To Server:Gis (Cpu July 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620" id="CVE-2015-2620" title="Mysql: Unspecified Vulnerability Related To Server:Security:Privileges (Cpu July 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643" id="CVE-2015-2643" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu July 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648" id="CVE-2015-2648" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu July 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737" id="CVE-2015-4737" title="Mysql: Unspecified Vulnerability Related To Server:Pluggable Auth (Cpu July 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752" id="CVE-2015-4752" title="Mysql: Unspecified Vulnerability Related To Server:I_S (Cpu July 2015)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757" id="CVE-2015-4757" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu July 2015)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1628" id="RHSA-2015:1628-1" title="Rhsa-2015:1628-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184552" id="1184552" title="Mysql: Unspecified Vulnerability Related To Server:Innodb:Dml (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184553" id="1184553" title="Mysql: Unspecified Vulnerability Related To Server:Security:Privileges:Foreign Key (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184554" id="1184554" title="Mysql: Unspecified Vulnerability Related To Server:Replication (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184555" id="1184555" title="Mysql: Unspecified Vulnerability Related To Server:Replication (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184557" id="1184557" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184560" id="1184560" title="Mysql: Unspecified Vulnerability Related To Server:Security:Encryption (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1184561" id="1184561" title="Mysql: Unspecified Vulnerability Related To Server:Innodb:Ddl:Foreign Key (Cpu Jan 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212758" id="1212758" title="Mysql: Unspecified Vulnerability Related To Server:Compiling (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212763" id="1212763" title="Mysql: Unspecified Vulnerability Related To Server:Security:Privileges (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212768" id="1212768" title="Mysql: Unspecified Vulnerability Related To Server:Federated (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212772" id="1212772" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212776" id="1212776" title="Mysql: Unspecified Vulnerability Related To Server:Innodb:Dml (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212777" id="1212777" title="Mysql: Unspecified Vulnerability Related To Server:Security:Encryption (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212780" id="1212780" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212783" id="1212783" title="Mysql: Unspecified Vulnerability Related To Server:Ddl (Cpu April 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244768" id="1244768" title="Mysql: Unspecified Vulnerability Related To Server:Gis (Cpu July 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244771" id="1244771" title="Mysql: Unspecified Vulnerability Related To Server:Security:Privileges (Cpu July 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244774" id="1244774" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu July 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244775" id="1244775" title="Mysql: Unspecified Vulnerability Related To Server:Dml (Cpu July 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244778" id="1244778" title="Mysql: Unspecified Vulnerability Related To Server:Pluggable Auth (Cpu July 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244779" id="1244779" title="Mysql: Unspecified Vulnerability Related To Server:I_S (Cpu July 2015)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244781" id="1244781" title="Mysql: Unspecified Vulnerability Related To Server:Optimizer (Cpu July 2015)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1664-1</id><title>Nss</title><description>It was found that NSS permitted skipping of the ServerKeyExchange packet during a handshake involving ECDHE (Elliptic Curve Diffie-Hellman key Exchange). A remote attacker could use this flaw to bypass the forward- secrecy of a TLS/SSL connection. (CVE-2015-2721) 
A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730) 
The nss packages have been upgraded to upstream version 3.19.1, which provides a number of bug fixes and enhancements over the previous version.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-09-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss-devel" release="1.el5_11" src="nss-3.19.1-1.el5_11.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-1.el5_11.i386.rpm</filename><sum type="sha">a1729add6abba89226535b53b89263307a22df97</sum></package><package arch="i386" name="nss" release="1.el5_11" src="nss-3.19.1-1.el5_11.src.rpm" version="3.19.1"><filename>nss-3.19.1-1.el5_11.i386.rpm</filename><sum type="sha">26ca1b0197357ff40ef78986ba538b970ec2e14e</sum></package><package arch="i386" name="nss-tools" release="1.el5_11" src="nss-3.19.1-1.el5_11.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-1.el5_11.i386.rpm</filename><sum type="sha">ed039cbdd36ccf436108511d6c1fe57354c7503a</sum></package><package arch="i386" name="nss-pkcs11-devel" release="1.el5_11" src="nss-3.19.1-1.el5_11.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-1.el5_11.i386.rpm</filename><sum type="sha">b3f7d44ac1ebc7d0ce5ebc907653eaeb382ec72d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" id="CVE-2015-2721" title="Nss: Incorrectly Permited Skipping Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" id="CVE-2015-2730" title="Nss: Ecdsa Signature Validation Fails To Handle " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1664" id="RHSA-2015:1664-1" title="Rhsa-2015:1664-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236954" id="1236954" title="Nss: Ecdsa Signature Validation Fails To Handle " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236967" id="1236967" title="Nss: Incorrectly Permited Skipping Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1682-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4473, CVE-2015-4491, CVE-2015-4487, CVE-2015-4488,  CVE-2015-4489) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-01 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="4.el5_11" src="thunderbird-38.2.0-4.el5_11.src.rpm" version="38.2.0"><filename>thunderbird-38.2.0-4.el5_11.i386.rpm</filename><sum type="sha">46ba4991576107bc31dfa576673a5addec5c7b9b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" id="CVE-2015-4473" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" id="CVE-2015-4487" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" id="CVE-2015-4488" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" id="CVE-2015-4489" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" id="CVE-2015-4491" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1682" id="RHSA-2015:1682-1" title="Rhsa-2015:1682-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252271" id="1252271" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.2) (Mfsa 2015-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252290" id="1252290" title="Mozilla: Heap Overflow In Gdk-Pixbuf When Scaling Bitmap Images (Mfsa 2015-88)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252293" id="1252293" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-90)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1693-1</id><title>Firefox</title><description>A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4497) 
A flaw was found in the way Firefox handled installation of add-ons. An attacker could use this flaw to bypass the add-on installation prompt, and trick the user inso installing an add-on from a malicious source. (CVE-2015-4498) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-09-01 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.2.1-1.el5_11.src.rpm" version="38.2.1"><filename>firefox-38.2.1-1.el5_11.i386.rpm</filename><sum type="sha">974bf34f50671d3f714f77a94f2e26c4c8e480a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" id="CVE-2015-4497" title="Mozilla: Use-After-Free When Resizing Canvas Element During Restyling (Mfsa 2015-94)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" id="CVE-2015-4498" title="Mozilla: Add-On Notification Bypass Through Data Urls (Mfsa 2015-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1693" id="RHSA-2015:1693-1" title="Rhsa-2015:1693-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257276" id="1257276" title="Mozilla: Use-After-Free When Resizing Canvas Element During Restyling (Mfsa 2015-94)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257278" id="1257278" title="Mozilla: Add-On Notification Bypass Through Data Urls (Mfsa 2015-95)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1706-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">b47ca3b31f2634b2cbb47be238f0bc2513cb8c17</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">951916485812c5b29cf9f4da36c254fe1da3f615</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">b07bef2e3ae113d1605acfe02ee92539a6fd96a8</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">9040d2b4f2da28c7c1cc15c0359982adf0a06a1f</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">6c0336fb33592ab2f0013e959c3767c45998b997</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">f52f247e3dddf895e76a1fd34622c4ee0876c404</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">aabfea901a77dce6fb80d13e8e732984e69c1599</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.4" src="bind-9.3.6-25.P1.el5_11.4.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.4.i386.rpm</filename><sum type="sha">1a1cb6e693345db8e86362913d5098a430b780b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" id="CVE-2015-5722" title="Bind: Malformed Dnssec Key Failed Assertion Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1706" id="RHSA-2015:1706-1" title="Rhsa-2015:1706-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259087" id="1259087" title="Bind: Malformed Dnssec Key Failed Assertion Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1707-1</id><title>Bind97</title><description>A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.3" src="bind97-9.7.0-21.P2.el5_11.3.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.3.i386.rpm</filename><sum type="sha">bbd54568eb09597ff655f8a762b826bc1140228e</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.3" src="bind97-9.7.0-21.P2.el5_11.3.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.3.i386.rpm</filename><sum type="sha">6e6ce17eed3d0ceb4cc85bfc551de56204b3b8a7</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.3" src="bind97-9.7.0-21.P2.el5_11.3.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm</filename><sum type="sha">473be47dbea90d957337b10403474c43b3daf920</sum></package><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.3" src="bind97-9.7.0-21.P2.el5_11.3.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.3.i386.rpm</filename><sum type="sha">9890b032ccf98034d399c1bbd82d3ebdba0d32cb</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.3" src="bind97-9.7.0-21.P2.el5_11.3.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm</filename><sum type="sha">6d3f3ff07ad08af5ee19bee9ba1cc6c6adb3f343</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" id="CVE-2015-5722" title="Bind: Malformed Dnssec Key Failed Assertion Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1707" id="RHSA-2015:1707-1" title="Rhsa-2015:1707-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259087" id="1259087" title="Bind: Malformed Dnssec Key Failed Assertion Denial Of Service" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1834-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4510) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-09-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="2.el5_11" src="firefox-38.3.0-2.el5_11.src.rpm" version="38.3.0"><filename>firefox-38.3.0-2.el5_11.i386.rpm</filename><sum type="sha">79e41d576ff036c28fd2b946b95af0e724cf2111</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" id="CVE-2015-4500" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" id="CVE-2015-4509" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510" id="CVE-2015-4510" title="Mozilla: Use-After-Free With Shared Workers And Indexeddb (Mfsa 2015-104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1834" id="RHSA-2015:1834-1" title="Rhsa-2015:1834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265186" id="1265186" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265190" id="1265190" title="Mozilla: Use-After-Free With Shared Workers And Indexeddb (Mfsa 2015-104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265192" id="1265192" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1840-1</id><title>Openldap</title><description>A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-06 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="openldap-devel" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43"><filename>openldap-devel-2.3.43-29.el5_11.i386.rpm</filename><sum type="sha">e2cc3b38293946be627c8f71fd880330a83f5913</sum></package><package arch="i386" name="openldap" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43"><filename>openldap-2.3.43-29.el5_11.i386.rpm</filename><sum type="sha">faefbf2d40b06db1a21f61474b51aa46f38db72d</sum></package><package arch="i386" name="openldap-servers" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43"><filename>openldap-servers-2.3.43-29.el5_11.i386.rpm</filename><sum type="sha">60464d788822770647da3d9ef6e4fc00597e35ab</sum></package><package arch="i386" name="openldap-servers-overlays" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43"><filename>openldap-servers-overlays-2.3.43-29.el5_11.i386.rpm</filename><sum type="sha">49e24d7f25acf800d20731b14ac6d3d3ab73fb58</sum></package><package arch="i386" name="openldap-servers-sql" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43"><filename>openldap-servers-sql-2.3.43-29.el5_11.i386.rpm</filename><sum type="sha">2daba11806a7c2f4b59868d5248a314eca673095</sum></package><package arch="i386" name="openldap-clients" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43"><filename>openldap-clients-2.3.43-29.el5_11.i386.rpm</filename><sum type="sha">1d253563e1e009b7c73c8f0f3e925367ce2733c8</sum></package><package arch="i386" name="compat-openldap" release="29.el5_11" src="openldap-2.3.43-29.el5_11.src.rpm" version="2.3.43_2.2.29"><filename>compat-openldap-2.3.43_2.2.29-29.el5_11.i386.rpm</filename><sum type="sha">2fdfd05cb2185d7466693b59fa01d3654aa364a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" id="CVE-2015-6908" title="Openldap: Ber_Get_Next Denial Of Service Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1840" id="RHSA-2015:1840-1" title="Rhsa-2015:1840-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262393" id="1262393" title="Openldap: Ber_Get_Next Denial Of Service Vulnerability" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1852-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180) 
Two information leak flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to disclose sensitive information or, in certain cases, crash. (CVE-2015-4519, CVE-2015-4520) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-06 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-38.3.0-1.el5_11.src.rpm" version="38.3.0"><filename>thunderbird-38.3.0-1.el5_11.i386.rpm</filename><sum type="sha">2dd7e094e30e0d7da7467b2abf026add406c8e38</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" id="CVE-2015-4500" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" id="CVE-2015-4509" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" id="CVE-2015-4517" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" id="CVE-2015-4519" title="Mozilla: Dragging And Dropping Images Exposes Final Url After Redirects (Mfsa 2015-110)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" id="CVE-2015-4520" title="Mozilla: Errors In The Handling Of Cors Preflight Request Headers (Mfsa 2015-111)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" id="CVE-2015-4521" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" id="CVE-2015-4522" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" id="CVE-2015-7174" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" id="CVE-2015-7175" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" id="CVE-2015-7176" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" id="CVE-2015-7177" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" id="CVE-2015-7180" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1852" id="RHSA-2015:1852-1" title="Rhsa-2015:1852-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265186" id="1265186" title="Mozilla: Miscellaneous Memory Safety Hazards (Mfsa 2015-96)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265192" id="1265192" title="Mozilla: Use-After-Free While Manipulating Html Media Content (Mfsa 2015-106)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265778" id="1265778" title="Mozilla: Dragging And Dropping Images Exposes Final Url After Redirects (Mfsa 2015-110)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265781" id="1265781" title="Mozilla: Errors In The Handling Of Cors Preflight Request Headers (Mfsa 2015-111)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265784" id="1265784" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-112)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1921-1</id><title>Java-1.7.0-Openjdk</title><description>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) 
Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) 
It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) 
Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-10-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.2.1.el5_11" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el5_11.i386.rpm</filename><sum type="sha">48f8f8e6e295fb746493e834f0a167d9085b97ed</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.2.1.el5_11" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el5_11.i386.rpm</filename><sum type="sha">f7464109a4d89b0fe9c11e9f1c9658b5e45c6d04</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.2.1.el5_11" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el5_11.i386.rpm</filename><sum type="sha">a087ad78a74be2c4f2c2e8790e785d873269a171</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.2.1.el5_11" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el5_11.i386.rpm</filename><sum type="sha">9b34a1bbc97eb7ac89451e5a6392d0c99a98b405</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.2.1.el5_11" src="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.src.rpm" version="1.7.0.91"><filename>java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el5_11.i386.rpm</filename><sum type="sha">750fd2f14ff93fb6c35d91e715905aaa7add82f2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" id="CVE-2015-4734" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" id="CVE-2015-4803" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" id="CVE-2015-4805" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" id="CVE-2015-4806" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" id="CVE-2015-4835" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" id="CVE-2015-4840" title="Openjdk: Oob Access In Cms Code (2D, 8086092)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" id="CVE-2015-4842" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" id="CVE-2015-4843" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" id="CVE-2015-4844" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" id="CVE-2015-4860" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" id="CVE-2015-4872" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" id="CVE-2015-4881" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" id="CVE-2015-4882" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" id="CVE-2015-4883" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" id="CVE-2015-4893" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" id="CVE-2015-4903" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" id="CVE-2015-4911" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1921" id="RHSA-2015:1921-1" title="Rhsa-2015:1921-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233687" id="1233687" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273022" id="1273022" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273027" id="1273027" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273053" id="1273053" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273304" id="1273304" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273308" id="1273308" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273311" id="1273311" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273318" id="1273318" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273338" id="1273338" title="Openjdk: Oob Access In Cms Code (2D, 8086092)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273414" id="1273414" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273425" id="1273425" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273430" id="1273430" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273496" id="1273496" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273637" id="1273637" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273638" id="1273638" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273645" id="1273645" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273734" id="1273734" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1980-1</id><title>Nss And Nspr</title><description>A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) 
A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss" release="2.el5_11" src="nss-3.19.1-2.el5_11.src.rpm" version="3.19.1"><filename>nss-3.19.1-2.el5_11.i386.rpm</filename><sum type="sha">dd734b2e3fff8c85657475344d91fb412afa3068</sum></package><package arch="i386" name="nspr" release="2.el5_11" src="nspr-4.10.8-2.el5_11.src.rpm" version="4.10.8"><filename>nspr-4.10.8-2.el5_11.i386.rpm</filename><sum type="sha">cd56b2cc7b83db55f5c390522a64624a88810eed</sum></package><package arch="i386" name="nspr-devel" release="2.el5_11" src="nspr-4.10.8-2.el5_11.src.rpm" version="4.10.8"><filename>nspr-devel-4.10.8-2.el5_11.i386.rpm</filename><sum type="sha">1e1f2919683582013178ab7364a055a6df823d14</sum></package><package arch="i386" name="nss-devel" release="2.el5_11" src="nss-3.19.1-2.el5_11.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-2.el5_11.i386.rpm</filename><sum type="sha">274fa8c3dc3b544ed1b5154ea431ae3dddbd22d9</sum></package><package arch="i386" name="nss-pkcs11-devel" release="2.el5_11" src="nss-3.19.1-2.el5_11.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-2.el5_11.i386.rpm</filename><sum type="sha">9a4057c6be3c9d5227029a9cf43658b8c029889f</sum></package><package arch="i386" name="nss-tools" release="2.el5_11" src="nss-3.19.1-2.el5_11.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-2.el5_11.i386.rpm</filename><sum type="sha">5ea51d97be2c8cd469fa315d26cd064e44cf0b76</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" id="CVE-2015-7181" title="Nss: Use-After-Poison In Sec_Asn1D_Parse_Leaf() (Mfsa 2015-133)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" id="CVE-2015-7182" title="Nss: Asn.1 Decoder Heap Overflow When Decoding Constructed Octet String That Mixes Indefinite And Definite Length Encodings (Mfsa 2015-133)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" id="CVE-2015-7183" title="Nspr: Heap-Buffer Overflow In Pl_Arena_Allocate (Mfsa 2015-133)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1980" id="RHSA-2015:1980-1" title="Rhsa-2015:1980-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269345" id="1269345" title="Nss: Use-After-Poison In Sec_Asn1D_Parse_Leaf() (Mfsa 2015-133)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269351" id="1269351" title="Nss: Asn.1 Decoder Heap Overflow When Decoding Constructed Octet String That Mixes Indefinite And Definite Length Encodings (Mfsa 2015-133)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269353" id="1269353" title="Nspr: Heap-Buffer Overflow In Pl_Arena_Allocate (Mfsa 2015-133)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:1982-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7194, CVE-2015-7196, CVE-2015-7198, CVE-2015-7197) 
A same-origin policy bypass flaw was found in the way Firefox handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Firefox to disclose sensitive information. (CVE-2015-7193) 
A same-origin policy bypass flaw was found in the way Firefox handled URLs containing IP addresses with white-space characters. This could lead to cross-site scripting attacks. (CVE-2015-7188) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-11-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.4.0-1.el5_11.src.rpm" version="38.4.0"><filename>firefox-38.4.0-1.el5_11.i386.rpm</filename><sum type="sha">8076757381e9b8bbeaae30eb543e9ad0732371d2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" id="CVE-2015-4513" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" id="CVE-2015-7188" title="Mozilla: Trailing Whitespace In Ip Address Hostnames Can Bypass Same-Origin Policy (Mfsa 2015-122)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" id="CVE-2015-7189" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" id="CVE-2015-7193" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" id="CVE-2015-7194" title="Mozilla: Memory Corruption In Libjar Through Zip Files (Mfsa 2015-128)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" id="CVE-2015-7196" title="Mozilla: Javascript Garbage Collection Crash With Java Applet (Mfsa 2015-130)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" id="CVE-2015-7197" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" id="CVE-2015-7198" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:1982" id="RHSA-2015:1982-1" title="Rhsa-2015:1982-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277332" id="1277332" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277343" id="1277343" title="Mozilla: Trailing Whitespace In Ip Address Hostnames Can Bypass Same-Origin Policy (Mfsa 2015-122)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277344" id="1277344" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277346" id="1277346" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277347" id="1277347" title="Mozilla: Memory Corruption In Libjar Through Zip Files (Mfsa 2015-128)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277349" id="1277349" title="Mozilla: Javascript Garbage Collection Crash With Java Applet (Mfsa 2015-130)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277350" id="1277350" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277351" id="1277351" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2065-1</id><title>Xen</title><description>A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. (CVE-2015-5279) 
After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-11-24 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="xen" release="147.el5_11" src="xen-3.0.3-147.el5_11.src.rpm" version="3.0.3"><filename>xen-3.0.3-147.el5_11.i386.rpm</filename><sum type="sha">f34048c321049c925555686beb3169c160938602</sum></package><package arch="i386" name="xen-libs" release="147.el5_11" src="xen-3.0.3-147.el5_11.src.rpm" version="3.0.3"><filename>xen-libs-3.0.3-147.el5_11.i386.rpm</filename><sum type="sha">54ee5bc39db8e469ab997800db0027e64d6d1e1f</sum></package><package arch="i386" name="xen-devel" release="147.el5_11" src="xen-3.0.3-147.el5_11.src.rpm" version="3.0.3"><filename>xen-devel-3.0.3-147.el5_11.i386.rpm</filename><sum type="sha">e04075bdb4f6124deadd13eda6790e0440956b1c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" id="CVE-2015-5279" title="Qemu: Heap Overflow Vulnerability In Ne2000_Receive() Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2065" id="RHSA-2015:2065-1" title="Rhsa-2015:2065-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256672" id="1256672" title="Qemu: Heap Overflow Vulnerability In Ne2000_Receive() Function" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2086-1</id><title>Java-1.6.0-Openjdk</title><description>Multiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) 
Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) 
It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) 
Multiple flaws were found in the Libraries, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-11-24 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.9.4.el5_11" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el5_11.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el5_11.i386.rpm</filename><sum type="sha">d1d576363524d5c8a397d214cff7959b4315f505</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.9.4.el5_11" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el5_11.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el5_11.i386.rpm</filename><sum type="sha">ac4d799e494106366a313c28b1edd9f0be90ac10</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.9.4.el5_11" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el5_11.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el5_11.i386.rpm</filename><sum type="sha">22507b2ee97e12b360e2eb82573a59c6a0b44d28</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.9.4.el5_11" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el5_11.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el5_11.i386.rpm</filename><sum type="sha">d088735655c5f61c586408ed612084d4ea6fe505</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.9.4.el5_11" src="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el5_11.src.rpm" version="1.6.0.37"><filename>java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el5_11.i386.rpm</filename><sum type="sha">e8aba57da33201e8fe9ae083247717413868e66c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" id="CVE-2015-4734" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" id="CVE-2015-4803" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" id="CVE-2015-4805" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" id="CVE-2015-4806" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" id="CVE-2015-4835" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" id="CVE-2015-4842" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" id="CVE-2015-4843" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" id="CVE-2015-4844" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" id="CVE-2015-4860" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" id="CVE-2015-4872" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" id="CVE-2015-4881" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" id="CVE-2015-4882" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" id="CVE-2015-4883" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" id="CVE-2015-4893" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" id="CVE-2015-4903" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" id="CVE-2015-4911" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2086" id="RHSA-2015:2086-1" title="Rhsa-2015:2086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233687" id="1233687" title="Openjdk: Httpurlconnection Header Restriction Bypass (Libraries, 8130193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273022" id="1273022" title="Openjdk: Insufficient Permission Checks In Stubgenerator (Corba, 8076383)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273027" id="1273027" title="Openjdk: Missing Type Checks In Iiopinputstream (Corba, 8076392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273053" id="1273053" title="Openjdk: Java.Nio Buffers Integer Overflow Issues (Libraries, 8130891)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273304" id="1273304" title="Openjdk: Incorrect Access Control Context Used In Dgcclient (Rmi, 8076413)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273308" id="1273308" title="Openjdk: Incorrect Access Control Context Used In Dgcimpl (Rmi, 8080688)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273311" id="1273311" title="Openjdk: Missing Checks For Proper Initialization In Objectstreamclass (Serialization, 8103671)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273318" id="1273318" title="Icu: Missing Boundary Checks In Layout Engine (Openjdk 2D, 8132042)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273414" id="1273414" title="Openjdk: Incorrect String Object Deserialization In Iiopinputstream (Corba, 8076387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273425" id="1273425" title="Openjdk: Leak Of User.Dir Location (Jaxp, 8078427)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273430" id="1273430" title="Openjdk: Kerberos Realm Name Leak (Jgss, 8048030)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273496" id="1273496" title="Openjdk: Insufficient Proxy Class Checks In Remoteobjectinvocationhandler (Rmi, 8076339)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273637" id="1273637" title="Openjdk: Inefficient Use Of Hash Tables And Lists During Xml Parsing (Jaxp, 8068842)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273638" id="1273638" title="Openjdk: Incomplete Maxxmlnamelimit Enforcement (Jaxp, 8086733)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273645" id="1273645" title="Openjdk: Incomplete Supportdtd Enforcement (Jaxp, 8130078)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273734" id="1273734" title="Openjdk: Incomplete Constraints Enforcement By Algorithmchecker (Security, 8131291)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2519-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200) 
A same-origin policy bypass flaw was found in the way Thunderbird handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Thunderbird to disclose sensitive information. (CVE-2015-7193) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-01 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-38.4.0-1.el5_11.src.rpm" version="38.4.0"><filename>thunderbird-38.4.0-1.el5_11.i386.rpm</filename><sum type="sha">f39fd7710048a669bb0a2c5a31bbba72d9a16242</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" id="CVE-2015-4513" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" id="CVE-2015-7189" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" id="CVE-2015-7193" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" id="CVE-2015-7197" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" id="CVE-2015-7198" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" id="CVE-2015-7199" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" id="CVE-2015-7200" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2519" id="RHSA-2015:2519-1" title="Rhsa-2015:2519-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277332" id="1277332" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277344" id="1277344" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277346" id="1277346" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277350" id="1277350" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277351" id="1277351" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2616-1</id><title>Openssl</title><description>A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="openssl" release="37.el5_11" src="openssl-0.9.8e-37.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-37.el5_11.i686.rpm</filename><sum type="sha">6f4eac8f59b1fcc15144e8003180762a17634c05</sum></package><package arch="i386" name="openssl-devel" release="37.el5_11" src="openssl-0.9.8e-37.el5_11.src.rpm" version="0.9.8e"><filename>openssl-devel-0.9.8e-37.el5_11.i386.rpm</filename><sum type="sha">35aaaad1dbf1c306ad9b5de9c353bddb1ee543a2</sum></package><package arch="i386" name="openssl-perl" release="37.el5_11" src="openssl-0.9.8e-37.el5_11.src.rpm" version="0.9.8e"><filename>openssl-perl-0.9.8e-37.el5_11.i386.rpm</filename><sum type="sha">8eacc0f78ad0b2f6e5ab336553cf053b91f861c5</sum></package><package arch="i386" name="openssl" release="37.el5_11" src="openssl-0.9.8e-37.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-37.el5_11.i386.rpm</filename><sum type="sha">29996b83b41ef38e5398a5ac12265ef0995e85ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" id="CVE-2015-3195" title="Openssl: X509_Attribute Memory Leak" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2616" id="RHSA-2015:2616-1" title="Rhsa-2015:2616-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288322" id="1288322" title="Openssl: X509_Attribute Memory Leak" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2656-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) 
Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">f1979f3cb395c57ec997ba1a37d91bf40649cb4b</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">320db9313455852e664aa8dde149a321c17fa994</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">b93e2c22437290cb6485c16965e373d0dbd1dc51</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">18eef89018cf7a744e97e8efb2c64042a8be30e9</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">36954668cca0544dabddcef718d06176fa21f1ae</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">47e6fe1350b1154fcbb58ccad78038b98668ee87</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">bebbd6b83a598aac6d7ee6161caa6be01895791f</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.5" src="bind-9.3.6-25.P1.el5_11.5.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.5.i386.rpm</filename><sum type="sha">ad46c93787865a9515603051ea533c623a2e557a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" id="CVE-2015-8000" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2656" id="RHSA-2015:2656-1" title="Rhsa-2015:2656-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291176" id="1291176" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2657-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7210, CVE-2015-7212, CVE-2015-7213, CVE-2015-7222) 
A flaw was found in the way Firefox handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same- origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="2.el5_11" src="firefox-38.5.0-2.el5_11.src.rpm" version="38.5.0"><filename>firefox-38.5.0-2.el5_11.i386.rpm</filename><sum type="sha">16e12acad5d2b556dbfe7e7a060f134132b5fa1c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" id="CVE-2015-7201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" id="CVE-2015-7205" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" id="CVE-2015-7210" title="Mozilla: Use-After-Free In Webrtc When Datachannel Is Used After Being Destroyed (Mfsa 2015-138)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" id="CVE-2015-7212" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" id="CVE-2015-7213" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" id="CVE-2015-7214" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" id="CVE-2015-7222" title="Mozilla: Integer Underflow And Buffer Overflow Processing Mp4 Metadata In Libstagefright (Mfsa 2015-147)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2657" id="RHSA-2015:2657-1" title="Rhsa-2015:2657-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291571" id="1291571" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291585" id="1291585" title="Mozilla: Use-After-Free In Webrtc When Datachannel Is Used After Being Destroyed (Mfsa 2015-138)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291587" id="1291587" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291595" id="1291595" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291596" id="1291596" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291597" id="1291597" title="Mozilla: Integer Underflow And Buffer Overflow Processing Mp4 Metadata In Libstagefright (Mfsa 2015-147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291600" id="1291600" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2658-1</id><title>Bind97</title><description>A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) 
Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.4" src="bind97-9.7.0-21.P2.el5_11.4.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.4.i386.rpm</filename><sum type="sha">27e22a8af5598a7e880d8d27c4f4a845025c99f9</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.4" src="bind97-9.7.0-21.P2.el5_11.4.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.4.i386.rpm</filename><sum type="sha">397af007024172368b95e457801fe50fd22374f5</sum></package><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.4" src="bind97-9.7.0-21.P2.el5_11.4.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.4.i386.rpm</filename><sum type="sha">8b55d89ddc7156c0ddf458289374e6910ef51454</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.4" src="bind97-9.7.0-21.P2.el5_11.4.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.4.i386.rpm</filename><sum type="sha">033088a02cec86db9a9158cf760c17088e5fdb82</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.4" src="bind97-9.7.0-21.P2.el5_11.4.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.4.i386.rpm</filename><sum type="sha">5167593edfe64cf78c794189603a8ff8ebfe9e57</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" id="CVE-2015-8000" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2658" id="RHSA-2015:2658-1" title="Rhsa-2015:2658-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291176" id="1291176" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2015:2671-1</id><title>Jakarta-Commons-Collections</title><description>It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons- collections library. (CVE-2015-7501) 
With this update, deserialization of certain classes in the commons- collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization. 
In the interim, the quickest way to resolve this specific deserialization vulnerability is to remove the vulnerable class files (InvokerTransformer, InstantiateFactory, and InstantiateTransformer) in all commons-collections jar files. Any manual changes should be tested to avoid unforseen complications. 
All running applications using the commons-collections library must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2015-12-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="jakarta-commons-collections-testframework-javadoc" release="2jpp.4" src="jakarta-commons-collections-3.2-2jpp.4.src.rpm" version="3.2"><filename>jakarta-commons-collections-testframework-javadoc-3.2-2jpp.4.i386.rpm</filename><sum type="sha">e9e588e131df685d5486fa8dbebaed578f1dde13</sum></package><package arch="i386" name="jakarta-commons-collections-testframework" release="2jpp.4" src="jakarta-commons-collections-3.2-2jpp.4.src.rpm" version="3.2"><filename>jakarta-commons-collections-testframework-3.2-2jpp.4.i386.rpm</filename><sum type="sha">353ae63df3dba2800349265c8a810762ba74900d</sum></package><package arch="i386" name="jakarta-commons-collections-tomcat5" release="2jpp.4" src="jakarta-commons-collections-3.2-2jpp.4.src.rpm" version="3.2"><filename>jakarta-commons-collections-tomcat5-3.2-2jpp.4.i386.rpm</filename><sum type="sha">c15360932879412e9b5236a43f7d00a9f792e214</sum></package><package arch="i386" name="jakarta-commons-collections" release="2jpp.4" src="jakarta-commons-collections-3.2-2jpp.4.src.rpm" version="3.2"><filename>jakarta-commons-collections-3.2-2jpp.4.i386.rpm</filename><sum type="sha">973d8478a33c6e26101b44e90092ff9fac5bcfa0</sum></package><package arch="i386" name="jakarta-commons-collections-javadoc" release="2jpp.4" src="jakarta-commons-collections-3.2-2jpp.4.src.rpm" version="3.2"><filename>jakarta-commons-collections-javadoc-3.2-2jpp.4.i386.rpm</filename><sum type="sha">ea435fc90518a9bdb7ea7f3272f7fc85ec2ff3bf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501" id="CVE-2015-7501" title="Cve-2015-7501" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2671" id="RHSA-2015:2671-1" title="Rhsa-2015:2671-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279330" id="1279330" title="Apache-Commons-Collections: Invokertransformer Code Execution During Deserialisation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0001-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7212, CVE-2015-7213) 
A flaw was found in the way Thunderbird handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same-origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-01-12 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-38.5.0-1.el5_11.src.rpm" version="38.5.0"><filename>thunderbird-38.5.0-1.el5_11.i386.rpm</filename><sum type="sha">d53670923a383e25fcfdb46d955cc7d59a2c016a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" id="CVE-2015-7201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" id="CVE-2015-7205" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" id="CVE-2015-7212" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" id="CVE-2015-7213" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" id="CVE-2015-7214" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0001" id="RHSA-2016:0001-1" title="Rhsa-2016:0001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291571" id="1291571" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291587" id="1291587" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291595" id="1291595" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291596" id="1291596" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291600" id="1291600" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0045-1</id><title>Kernel</title><description>* Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-01-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="kernel-headers" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-408.el5.i386.rpm</filename><sum type="sha">e73814b859ae2af834261b5680ef09ad8114a2f8</sum></package><package arch="i686" name="kernel-PAE-devel" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-408.el5.i686.rpm</filename><sum type="sha">6a8d934c8a9623886aece15d209621d47ca95b95</sum></package><package arch="i686" name="kernel" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-408.el5.i686.rpm</filename><sum type="sha">57bebb344a5a9b236f42124000589fd78c33daaa</sum></package><package arch="noarch" name="kernel-doc" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-408.el5.noarch.rpm</filename><sum type="sha">ee704d4382b96377df452de416d643131c417669</sum></package><package arch="i686" name="kernel-debug" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-408.el5.i686.rpm</filename><sum type="sha">50d090b48289ba77cc6fad366d236086fc18b50c</sum></package><package arch="i686" name="kernel-debug-devel" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-408.el5.i686.rpm</filename><sum type="sha">34590cddb4bd9c675d59cec6cc4da69adf58dca1</sum></package><package arch="i686" name="kernel-xen-devel" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-408.el5.i686.rpm</filename><sum type="sha">50953c7f06ba6cbef2fe6b7ba1acb41f59561ff9</sum></package><package arch="i686" name="kernel-PAE" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-408.el5.i686.rpm</filename><sum type="sha">2a0ee53358388ead556d4b55f09af02418b58636</sum></package><package arch="i686" name="kernel-xen" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-408.el5.i686.rpm</filename><sum type="sha">a032f1dc626335b3c602a5c9fa62e31cd08ad0f6</sum></package><package arch="i686" name="kernel-devel" release="408.el5" src="kernel-2.6.18-408.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-408.el5.i686.rpm</filename><sum type="sha">a6fa617015e19888b3fffc0b4a781622cf1e79b3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" id="CVE-2015-5364" title="Kernel: Net: Incorrect Processing Of Checksums In Udp Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" id="CVE-2015-5366" title="Kernel: Net: Incorrect Processing Of Checksums In Udp Implementation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0045" id="RHSA-2016:0045-1" title="Rhsa-2016:0045-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1239029" id="1239029" title="Kernel: Net: Incorrect Processing Of Checksums In Udp Implementation" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0054-1</id><title>Java-1.7.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
Multiple flaws were discovered in the Libraries, Networking, and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4871, CVE-2016-0402, CVE-2016-0448) 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-01-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.4.1.el5_11" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.i386.rpm</filename><sum type="sha">90f88d31a8371863e03955eebaf7824784f5c631</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.4.1.el5_11" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-src-1.7.0.95-2.6.4.1.el5_11.i386.rpm</filename><sum type="sha">4c2312c155cf396999a89931d1e9de144238293f</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.4.1.el5_11" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.1.el5_11.i386.rpm</filename><sum type="sha">addc971e13f71804da33540e2303f65f54738fb9</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.4.1.el5_11" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.1.el5_11.i386.rpm</filename><sum type="sha">d8a1cd1f2b4ccab01f3439989619a74fe08b61f4</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.4.1.el5_11" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.1.el5_11.i386.rpm</filename><sum type="sha">d83d35e63f9a1d8e3c400fdbda8ab86260eae206</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" id="CVE-2015-4871" title="Oracle Jdk: Unspecified Vulnerability Fixed In 7U91 (Libraries)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0054" id="RHSA-2016:0054-1" title="Rhsa-2016:0054-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273859" id="1273859" title="Oracle Jdk: Unspecified Vulnerability Fixed In 7U91 (Libraries)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0067-1</id><title>Java-1.6.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.10.0.el5_11" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el5_11.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el5_11.i386.rpm</filename><sum type="sha">3c3e553e5911c80defd335f84722c429bc55b290</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.10.0.el5_11" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el5_11.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el5_11.i386.rpm</filename><sum type="sha">820f0d46d986dc30d439b95d7ccc2bbd5e2af5cc</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.10.0.el5_11" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el5_11.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el5_11.i386.rpm</filename><sum type="sha">a7c244443c0dfefd37126fb6c5356ea9b0a4cfc3</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.10.0.el5_11" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el5_11.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el5_11.i386.rpm</filename><sum type="sha">a9dc616a167ea08cec829d30aa0b5e116c26902d</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.10.0.el5_11" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el5_11.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el5_11.i386.rpm</filename><sum type="sha">27c06ac6765c79058b67a297537a031df79d09a8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0067" id="RHSA-2016:0067-1" title="Rhsa-2016:0067-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0071-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1930, CVE-2016-1935) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.6.0-1.el5_11.src.rpm" version="38.6.0"><filename>firefox-38.6.0-1.el5_11.i386.rpm</filename><sum type="sha">37a823f81bce50fa15adc8013b265065f34c2606</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" id="CVE-2016-1930" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" id="CVE-2016-1935" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0071" id="RHSA-2016:0071-1" title="Rhsa-2016:0071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301818" id="1301818" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301821" id="1301821" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0073-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">085be36db708de4d962fe9594617c1f582c34610</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">f12490898c2b28340e311293c3317934133069e5</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">2626a4990ea45622cb96283466acdc3fec4f3f8f</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">b328cfe06a05efa4eedacf5e607a0c6875f99d03</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">61ed3980a83426d5e890ffeaf5148c6558410c58</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">ddef10dc463c703a7a7b3ffcebba9d7c5b3871a0</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">c62457076ccd4491e4d7b48c654917d0497f3005</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.6" src="bind-9.3.6-25.P1.el5_11.6.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.6.i386.rpm</filename><sum type="sha">f43cf6890a018f2eae7243ee3811b78b0f4258f1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" id="CVE-2015-8704" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0073" id="RHSA-2016:0073-1" title="Rhsa-2016:0073-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299364" id="1299364" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0074-1</id><title>Bind97</title><description>A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-02-02 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.5" src="bind97-9.7.0-21.P2.el5_11.5.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm</filename><sum type="sha">6005ed75813dd7561286cac6d20c556cbeb9d609</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.5" src="bind97-9.7.0-21.P2.el5_11.5.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.5.i386.rpm</filename><sum type="sha">b49fd681021056969c07f1fe69ed70d1e8e113d2</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.5" src="bind97-9.7.0-21.P2.el5_11.5.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm</filename><sum type="sha">71e1799802df3a865150d76e4fd41f31122d2c45</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.5" src="bind97-9.7.0-21.P2.el5_11.5.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.5.i386.rpm</filename><sum type="sha">2a6bac1a8b0b25ac535745920323d552d03dd64c</sum></package><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.5" src="bind97-9.7.0-21.P2.el5_11.5.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.5.i386.rpm</filename><sum type="sha">6d7aeb9403012217ef242db34a325d8676c5792e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" id="CVE-2015-8704" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0074" id="RHSA-2016:0074-1" title="Rhsa-2016:0074-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299364" id="1299364" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0197-1</id><title>Firefox</title><description>Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-02-23 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.6.1-1.el5_11.src.rpm" version="38.6.1"><filename>firefox-38.6.1-1.el5_11.i386.rpm</filename><sum type="sha">c5b5e8d2da5c079ef5deb27e220afd80048e2fca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" id="CVE-2016-1521" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522" id="CVE-2016-1522" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" id="CVE-2016-1523" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0197" id="RHSA-2016:0197-1" title="Rhsa-2016:0197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305805" id="1305805" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305810" id="1305810" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305813" id="1305813" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306496" id="1306496" title="Mozilla: Vulnerabilities In Graphite 2 (Mfsa 2016-14)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0258-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1930, CVE-2016-1935) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-02-23 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-38.6.0-1.el5_11.src.rpm" version="38.6.0"><filename>thunderbird-38.6.0-1.el5_11.i386.rpm</filename><sum type="sha">6c6ba2a711a8d262dc864230fbda2a276022e593</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" id="CVE-2016-1930" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" id="CVE-2016-1935" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0258" id="RHSA-2016:0258-1" title="Rhsa-2016:0258-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301818" id="1301818" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301821" id="1301821" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0302-1</id><title>Openssl</title><description>A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) 
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) 
An integer overflow flaw, leading to a NULL pointer dereference or a heap- based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-08 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="openssl-devel" release="39.el5_11" src="openssl-0.9.8e-39.el5_11.src.rpm" version="0.9.8e"><filename>openssl-devel-0.9.8e-39.el5_11.i386.rpm</filename><sum type="sha">de59d51cbe7b8a5c4c8f8e5daa6e6738daa83c5d</sum></package><package arch="i686" name="openssl" release="39.el5_11" src="openssl-0.9.8e-39.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-39.el5_11.i686.rpm</filename><sum type="sha">0391159dde59ae4cfd645059158fa9a8fc541522</sum></package><package arch="i386" name="openssl-perl" release="39.el5_11" src="openssl-0.9.8e-39.el5_11.src.rpm" version="0.9.8e"><filename>openssl-perl-0.9.8e-39.el5_11.i386.rpm</filename><sum type="sha">ebc3bb84eb38561c6ec97481b7956a3c8d7480a2</sum></package><package arch="i386" name="openssl" release="39.el5_11" src="openssl-0.9.8e-39.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-39.el5_11.i386.rpm</filename><sum type="sha">997ad242b99b2d47952567df774c5c16f7ab8ef1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" id="CVE-2015-3197" title="Openssl: Sslv2 Doesn&apos;T Block Disabled Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" id="CVE-2016-0797" title="Openssl: Bn_Hex2Bn/Bn_Dec2Bn Null Pointer Deref/Heap Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" id="CVE-2016-0800" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0302" id="RHSA-2016:0302-1" title="Rhsa-2016:0302-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301846" id="1301846" title="Openssl: Sslv2 Doesn&apos;T Block Disabled Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310593" id="1310593" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311880" id="1311880" title="Openssl: Bn_Hex2Bn/Bn_Dec2Bn Null Pointer Deref/Heap Corruption" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0371-1</id><title>Nss</title><description>A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2016-1950) 
For the update to take effect, all applications linked to the nss library must be restarted, or the system rebooted.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-03-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss-pkcs11-devel" release="4.el5_11" src="nss-3.19.1-4.el5_11.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm</filename><sum type="sha">e9503df32a6d392166eddbd691eaed391d29e5b6</sum></package><package arch="i386" name="nss-tools" release="4.el5_11" src="nss-3.19.1-4.el5_11.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-4.el5_11.i386.rpm</filename><sum type="sha">79c32dcf700fca68caa055361b504cf7f2fd30f1</sum></package><package arch="i386" name="nss-devel" release="4.el5_11" src="nss-3.19.1-4.el5_11.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-4.el5_11.i386.rpm</filename><sum type="sha">8cbe44f80e381ab067b2ec072bfc14df2112e0f8</sum></package><package arch="i386" name="nss" release="4.el5_11" src="nss-3.19.1-4.el5_11.src.rpm" version="3.19.1"><filename>nss-3.19.1-4.el5_11.i386.rpm</filename><sum type="sha">3cc238236ea3690a4a821abb88aea8bb9414e355</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" id="CVE-2016-1950" title="Nss: Heap Buffer Overflow Vulnerability In Asn1 Certificate Parsing (Mfsa 2016-35)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0371" id="RHSA-2016:0371-1" title="Rhsa-2016:0371-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310509" id="1310509" title="Nss: Heap Buffer Overflow Vulnerability In Asn1 Certificate Parsing (Mfsa 2016-35)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0373-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1958, CVE-2016-1960, CVE-2016-1961, CVE-2016-1962, CVE-2016-1973, CVE-2016-1974, CVE-2016-1964, CVE-2016-1965, CVE-2016-1966) 
Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-03-15 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-38.7.0-1.el5_11.src.rpm" version="38.7.0"><filename>firefox-38.7.0-1.el5_11.i386.rpm</filename><sum type="sha">5b1508ec1db1fdb10b88affc049eb679b6c8212c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" id="CVE-2016-1952" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" id="CVE-2016-1954" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" id="CVE-2016-1957" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" id="CVE-2016-1958" title="Mozilla: Displayed Page Address Can Be Overridden (Mfsa 2016-21)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" id="CVE-2016-1960" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" id="CVE-2016-1961" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" id="CVE-2016-1962" title="Mozilla: Use-After-Free When Using Multiple Webrtc Data Channels (Mfsa 2016-25)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" id="CVE-2016-1964" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" id="CVE-2016-1965" title="Mozilla: Addressbar Spoofing Though History Navigation And Location Protocol Property (Mfsa 2016-28)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" id="CVE-2016-1966" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973" id="CVE-2016-1973" title="Mozilla: Use-After-Free In Getstaticinstance In Webrtc (Mfsa 2016-33)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" id="CVE-2016-1974" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0373" id="RHSA-2016:0373-1" title="Rhsa-2016:0373-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315566" id="1315566" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315569" id="1315569" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315573" id="1315573" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315574" id="1315574" title="Mozilla: Displayed Page Address Can Be Overridden (Mfsa 2016-21)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315576" id="1315576" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315577" id="1315577" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315578" id="1315578" title="Mozilla: Use-After-Free When Using Multiple Webrtc Data Channels (Mfsa 2016-25)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315774" id="1315774" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315775" id="1315775" title="Mozilla: Addressbar Spoofing Though History Navigation And Location Protocol Property (Mfsa 2016-28)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315778" id="1315778" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315782" id="1315782" title="Mozilla: Use-After-Free In Getstaticinstance In Webrtc (Mfsa 2016-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315785" id="1315785" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315795" id="1315795" title="Mozilla: Font Vulnerabilities In The Graphite 2 Library (Mfsa 2016-37)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0450-1</id><title>Kernel</title><description>* An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. (CVE-2013-2596, Important) 
* It was found that the Xen hypervisor x86 CPU emulator implementation did not correctly handle certain instructions with segment overrides, potentially resulting in a memory corruption. A malicious guest user could use this flaw to read arbitrary data relating to other guests, cause a denial of service on the host, or potentially escalate their privileges on the host. (CVE-2015-2151, Important) 
This update also fixes the following bugs: 
* Previously, the CPU power of a CPU group could be zero. As a consequence, a kernel panic occurred at "find_busiest_group+570" with do_divide_error. The provided patch ensures that the division is only performed if the CPU power is not zero, and the aforementioned panic no longer occurs. 
* Prior to this update, a bug occurred when performing an online resize of an ext4 file system which had been previously converted from ext3. As a consequence, the kernel crashed. The provided patch fixes online resizing for such file systems by limiting the blockgroup search loop for non- extent files, and the mentioned kernel crash no longer occurs. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-devel" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-409.el5.i686.rpm</filename><sum type="sha">81aa9dbc8cff6dc27bcff750d67fd33f567a150b</sum></package><package arch="i686" name="kernel-xen" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-409.el5.i686.rpm</filename><sum type="sha">298886590428d41745321e515f01a0ff63c2fc6e</sum></package><package arch="i686" name="kernel-debug" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-409.el5.i686.rpm</filename><sum type="sha">c149af114bb5bf9bee115f68cb915fe85f3fa22e</sum></package><package arch="i386" name="kernel-headers" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-409.el5.i386.rpm</filename><sum type="sha">a606870b4246c3a8bac01c488557ab8d74cd2a65</sum></package><package arch="noarch" name="kernel-doc" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-409.el5.noarch.rpm</filename><sum type="sha">e5d87ce281e04e8e4e4471c796992c9b47a6f398</sum></package><package arch="i686" name="kernel" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-409.el5.i686.rpm</filename><sum type="sha">c301a182c1487e314a37cbce8c1a1037ce0231aa</sum></package><package arch="i686" name="kernel-PAE-devel" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-409.el5.i686.rpm</filename><sum type="sha">721cf97176584dd5e974e505022df4ae5802c19d</sum></package><package arch="i686" name="kernel-PAE" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-409.el5.i686.rpm</filename><sum type="sha">c8bc510333aa5dacf2dd079bc8f2a11303e0ce76</sum></package><package arch="i686" name="kernel-debug-devel" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-409.el5.i686.rpm</filename><sum type="sha">9a997bc028ff99d11430121e7a3f1e5fd8256584</sum></package><package arch="i686" name="kernel-xen-devel" release="409.el5" src="kernel-2.6.18-409.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-409.el5.i686.rpm</filename><sum type="sha">f0e29d7e165efac6d152aeae0c22887dafa3ac88</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2596" id="CVE-2013-2596" title="Kernel: Integer Overflow In Fb_Mmap" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151" id="CVE-2015-2151" title="Xen: Hypervisor Memory Corruption Due To X86 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0450" id="RHSA-2016:0450-1" title="Rhsa-2016:0450-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1034490" id="1034490" title="Kernel: Integer Overflow In Fb_Mmap" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196274" id="1196274" title="Xen: Hypervisor Memory Corruption Due To X86 " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0458-1</id><title>Bind97</title><description>A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) 
A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.6" src="bind97-9.7.0-21.P2.el5_11.6.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.6.i386.rpm</filename><sum type="sha">ccce5175a93ebeeb7b9933d49f169e3bd640b22c</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.6" src="bind97-9.7.0-21.P2.el5_11.6.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.6.i386.rpm</filename><sum type="sha">721dfab75b902fa22c0545ff5336ee143d32b6b6</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.6" src="bind97-9.7.0-21.P2.el5_11.6.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.6.i386.rpm</filename><sum type="sha">ea1326985373382d04a80dd6f72a910fb27d38bd</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.6" src="bind97-9.7.0-21.P2.el5_11.6.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.6.i386.rpm</filename><sum type="sha">e55019aea759e302c164a938b2aff3c370a98a27</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.6" src="bind97-9.7.0-21.P2.el5_11.6.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.6.i386.rpm</filename><sum type="sha">fe5f3f20c46914fd19512fcaa2c176a65724bb3d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" id="CVE-2016-1285" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" id="CVE-2016-1286" title="Bind: Malformed Signature Records For Dname " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0458" id="RHSA-2016:0458-1" title="Rhsa-2016:0458-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315674" id="1315674" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315680" id="1315680" title="Bind: Malformed Signature Records For Dname " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0459-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) 
A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">d23a34e9b1c172af08dea3c97599153baf2ce37a</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">f258c3ddc0563b9bd1475f90482ad36bd5aa6ff4</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">85483df661ee01646765297490a4dfed21647c35</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">522fcea630facdbb904d98dca8a1b11568024f50</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">823677baca4cd37980f04f36b1c99793b6385056</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">f6845c5a061f7b7795ffa57501227beef19750be</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">ebde1fc4d63f135bb1c5fd16e0262b8373889335</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.8" src="bind-9.3.6-25.P1.el5_11.8.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.8.i386.rpm</filename><sum type="sha">b85e02712119a8edde757ba6801b102d1e6be9f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" id="CVE-2016-1285" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" id="CVE-2016-1286" title="Bind: Malformed Signature Records For Dname " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0459" id="RHSA-2016:0459-1" title="Rhsa-2016:0459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315674" id="1315674" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315680" id="1315680" title="Bind: Malformed Signature Records For Dname " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0460-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1960, CVE-2016-1961, CVE-2016-1974, CVE-2016-1964, CVE-2016-1966) 
Multiple security flaws were found in the graphite2 font library shipped with Thunderbird. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-38.7.0-1.el5_11.src.rpm" version="38.7.0"><filename>thunderbird-38.7.0-1.el5_11.i386.rpm</filename><sum type="sha">eb72b920779df6a068114beb425559ce9094e219</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" id="CVE-2016-1952" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" id="CVE-2016-1954" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" id="CVE-2016-1957" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" id="CVE-2016-1960" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" id="CVE-2016-1961" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" id="CVE-2016-1964" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" id="CVE-2016-1966" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" id="CVE-2016-1974" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0460" id="RHSA-2016:0460-1" title="Rhsa-2016:0460-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315566" id="1315566" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315569" id="1315569" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315573" id="1315573" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315576" id="1315576" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315577" id="1315577" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315774" id="1315774" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315778" id="1315778" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315785" id="1315785" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315795" id="1315795" title="Mozilla: Font Vulnerabilities In The Graphite 2 Library (Mfsa 2016-37)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0512-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.5.0.el5_11" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el5_11.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-devel-1.7.0.99-2.6.5.0.el5_11.i386.rpm</filename><sum type="sha">861754815521d0833b5b33ff9ddeec197abee810</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.5.0.el5_11" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el5_11.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-src-1.7.0.99-2.6.5.0.el5_11.i386.rpm</filename><sum type="sha">3a0bc915050d54de97d4844fbb0465eead68b3d9</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.5.0.el5_11" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el5_11.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-demo-1.7.0.99-2.6.5.0.el5_11.i386.rpm</filename><sum type="sha">f1b53c7a075c2458c60bc65cdd323ddc7c74cd3d</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.5.0.el5_11" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el5_11.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-javadoc-1.7.0.99-2.6.5.0.el5_11.i386.rpm</filename><sum type="sha">04a4cd14d07f1755143f27c188570a3d77464776</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.5.0.el5_11" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el5_11.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el5_11.i386.rpm</filename><sum type="sha">57eb3c5cc59a04cde87a6eeded85a18bcdfbfd2a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" id="CVE-2016-0636" title="Openjdk: Out-Of-Band Urgent Security Fix " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0512" id="RHSA-2016:0512-1" title="Rhsa-2016:0512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320650" id="1320650" title="Openjdk: Out-Of-Band Urgent Security Fix " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0613-1</id><title>Samba3X</title><description>Security Fix(es): 
* Multiple flaws were found in Samba's DCE/RPC protocol implementation. A remote, authenticated attacker could use these flaws to cause a denial of service against the Samba server (high CPU load or a crash) or, possibly, execute arbitrary code with the permissions of the user running Samba (root). This flaw could also be used to downgrade a secure DCE/RPC connection by a man-in-the-middle attacker taking control of an Active Directory (AD) object and compromising the security of a Samba Active Directory Domain Controller (DC). (CVE-2015-5370) 
Note: While Samba packages as shipped in Scientific Linux do not support running Samba as an AD DC, this flaw applies to all roles Samba implements. 
* A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database. (CVE-2016-2118) 
* Several flaws were found in Samba's implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection. (CVE-2016-2110) 
* It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine. (CVE-2016-2111) 
* It was found that Samba's LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections. (CVE-2016-2112) 
* It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (CVE-2016-2115)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-04-19 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="samba3x-common" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-common-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">4cb875a9e641ba5aad740b84d81589e22fc173a6</sum></package><package arch="i386" name="samba3x-domainjoin-gui" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-domainjoin-gui-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">debfda24d70cb206c2efe194a7a2937dfa9f5f77</sum></package><package arch="i386" name="samba3x-client" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-client-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">99817317d0d816ac4a82392f51ba78428bb3d8e2</sum></package><package arch="i386" name="samba3x" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">a9f3fccc70b416d81f3a67713f3dca9926812d77</sum></package><package arch="i386" name="samba3x-winbind-devel" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-winbind-devel-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">57900a4deb381b4a0b8eb06c8ea1ca6fe47ad4bd</sum></package><package arch="i386" name="samba3x-swat" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-swat-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">8619a965414cbe1f7ce48a12dffc289d18df5b10</sum></package><package arch="i386" name="samba3x-winbind" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-winbind-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">251f80ef69b13a4e399f6cd872ebfff9541ccd7a</sum></package><package arch="i386" name="samba3x-doc" release="12.el5_11" src="samba3x-3.6.23-12.el5_11.src.rpm" version="3.6.23"><filename>samba3x-doc-3.6.23-12.el5_11.i386.rpm</filename><sum type="sha">98668d2374972f5353c3feaae6e0b94648de6aa0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" id="CVE-2015-5370" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" id="CVE-2016-2110" title="Samba: Man-In-The-Middle Attacks Possible With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" id="CVE-2016-2111" title="Samba: Spoofing Vulnerability When Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" id="CVE-2016-2112" title="Samba: Missing Downgrade Detection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" id="CVE-2016-2115" title="Samba: Smb Signing Not Required By Default When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" id="CVE-2016-2118" title="Samba: Samr And Lsa Man In The Middle Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0613" id="RHSA-2016:0613-1" title="Rhsa-2016:0613-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309987" id="1309987" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311893" id="1311893" title="Samba: Man-In-The-Middle Attacks Possible With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311902" id="1311902" title="Samba: Spoofing Vulnerability When Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311903" id="1311903" title="Samba: Missing Downgrade Detection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312084" id="1312084" title="Samba: Smb Signing Not Required By Default When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317990" id="1317990" title="Samba: Samr And Lsa Man In The Middle Attacks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0621-1</id><title>Samba</title><description>Security Fix(es): 
* A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database. (CVE-2016-2118) 
* Several flaws were found in Samba's implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection. (CVE-2016-2110) 
* It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine. (CVE-2016-2111) 
* It was found that Samba's LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections. (CVE-2016-2112) 
* It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (CVE-2016-2115)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-04-19 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="libsmbclient-devel" release="3.41.el5_11" src="samba-3.0.33-3.41.el5_11.src.rpm" version="3.0.33"><filename>libsmbclient-devel-3.0.33-3.41.el5_11.i386.rpm</filename><sum type="sha">b94cdbcef4b314d51c0fe5980963a2eac58f3bdd</sum></package><package arch="i386" name="samba-common" release="3.41.el5_11" src="samba-3.0.33-3.41.el5_11.src.rpm" version="3.0.33"><filename>samba-common-3.0.33-3.41.el5_11.i386.rpm</filename><sum type="sha">2d210f5711de945c58ecc51ffe8104cf9689a8f0</sum></package><package arch="i386" name="samba-swat" release="3.41.el5_11" src="samba-3.0.33-3.41.el5_11.src.rpm" version="3.0.33"><filename>samba-swat-3.0.33-3.41.el5_11.i386.rpm</filename><sum type="sha">f77e5598844aa2a2e80f8aba9694ad0b606e50c0</sum></package><package arch="i386" name="samba-client" release="3.41.el5_11" src="samba-3.0.33-3.41.el5_11.src.rpm" version="3.0.33"><filename>samba-client-3.0.33-3.41.el5_11.i386.rpm</filename><sum type="sha">0d43f36ba6f774e091958d393f875b70addc12c8</sum></package><package arch="i386" name="libsmbclient" release="3.41.el5_11" src="samba-3.0.33-3.41.el5_11.src.rpm" version="3.0.33"><filename>libsmbclient-3.0.33-3.41.el5_11.i386.rpm</filename><sum type="sha">d6460501907411d26884faf8f2a0b32cafed7e61</sum></package><package arch="i386" name="samba" release="3.41.el5_11" src="samba-3.0.33-3.41.el5_11.src.rpm" version="3.0.33"><filename>samba-3.0.33-3.41.el5_11.i386.rpm</filename><sum type="sha">3390f6846298eae85a0ff2be84b7ede940afdd89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" id="CVE-2016-2110" title="Samba: Man-In-The-Middle Attacks Possible With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" id="CVE-2016-2111" title="Samba: Spoofing Vulnerability When Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" id="CVE-2016-2112" title="Samba: Missing Downgrade Detection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" id="CVE-2016-2115" title="Samba: Smb Signing Not Required By Default When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" id="CVE-2016-2118" title="Samba: Samr And Lsa Man In The Middle Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0621" id="RHSA-2016:0621-1" title="Rhsa-2016:0621-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311893" id="1311893" title="Samba: Man-In-The-Middle Attacks Possible With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311902" id="1311902" title="Samba: Spoofing Vulnerability When Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311903" id="1311903" title="Samba: Missing Downgrade Detection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312084" id="1312084" title="Samba: Smb Signing Not Required By Default When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317990" id="1317990" title="Samba: Samr And Lsa Man In The Middle Attacks" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0676-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.6.1.el5_11" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el5_11.i386.rpm</filename><sum type="sha">5cb6f32f944c1e6afdf4784687636493470eea2c</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.6.1.el5_11" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el5_11.i386.rpm</filename><sum type="sha">f4aad8a21099202a4f6619bd77e0149ec9cd6048</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.6.1.el5_11" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el5_11.i386.rpm</filename><sum type="sha">81fe5377ca19662440829864223e07e35db8f0ae</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.6.1.el5_11" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11.i386.rpm</filename><sum type="sha">2ec8c84d26dc8a70ebefe23b8a609ccdeaf1c3e7</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.6.1.el5_11" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el5_11.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el5_11.i386.rpm</filename><sum type="sha">9fedccd336ca28782f1c33bb6d07104a679f9ebe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0676" id="RHSA-2016:0676-1" title="Rhsa-2016:0676-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0684-1</id><title>Nss And Nspr</title><description>The following packages have been upgraded to a newer upstream version: nss 3.21.0, nspr 4.11.0. 
Security Fix(es): 
* A use-after-free flaw was found in the way NSS handled DHE (Diffie- Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) 
* A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nspr-devel" release="1.el5_11" src="nspr-4.11.0-1.el5_11.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-1.el5_11.i386.rpm</filename><sum type="sha">819a9e8fc52216f447f885864917fb66d3bf10b9</sum></package><package arch="i386" name="nss" release="6.el5_11" src="nss-3.21.0-6.el5_11.src.rpm" version="3.21.0"><filename>nss-3.21.0-6.el5_11.i386.rpm</filename><sum type="sha">2fa27924a12d86e02c06d2a77cd80f5e4b982202</sum></package><package arch="i386" name="nss-tools" release="6.el5_11" src="nss-3.21.0-6.el5_11.src.rpm" version="3.21.0"><filename>nss-tools-3.21.0-6.el5_11.i386.rpm</filename><sum type="sha">529abb836f9f2131fecf09fe391bb6dc0aa4fa41</sum></package><package arch="i386" name="nss-pkcs11-devel" release="6.el5_11" src="nss-3.21.0-6.el5_11.src.rpm" version="3.21.0"><filename>nss-pkcs11-devel-3.21.0-6.el5_11.i386.rpm</filename><sum type="sha">ffdf488e2d5951db2bac16fc48e7326deb0869e0</sum></package><package arch="i386" name="nss-devel" release="6.el5_11" src="nss-3.21.0-6.el5_11.src.rpm" version="3.21.0"><filename>nss-devel-3.21.0-6.el5_11.i386.rpm</filename><sum type="sha">06526a09a19e653c4530684094b2b8263160854f</sum></package><package arch="i386" name="nspr" release="1.el5_11" src="nspr-4.11.0-1.el5_11.src.rpm" version="4.11.0"><filename>nspr-4.11.0-1.el5_11.i386.rpm</filename><sum type="sha">6244dfb651659617b8c7dc616449bc2e49d1290d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" id="CVE-2016-1978" title="Nss: Use-After-Free In Nss During Ssl " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" id="CVE-2016-1979" title="Nss: Use-After-Free During Processing Of Der " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0684" id="RHSA-2016:0684-1" title="Rhsa-2016:0684-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297943" id="1297943" title="Rebase Rhel 5.11.Z To Nspr 4.11 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297944" id="1297944" title="Rebase Rhel 5.11.Z To Nss 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315202" id="1315202" title="Nss: Use-After-Free During Processing Of Der " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315565" id="1315565" title="Nss: Use-After-Free In Nss During Ssl " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0695-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.1.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2805, CVE-2016-2806, CVE-2016-2807, CVE-2016-2808, CVE-2016-2814)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.1.0-1.el5_11.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el5_11.i386.rpm</filename><sum type="sha">c9e3eca0d13f734f19122e571b158b3209fabd29</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" id="CVE-2016-2806" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" id="CVE-2016-2808" title="Mozilla: Write To Invalid Hashmap Entry Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" id="CVE-2016-2814" title="Mozilla: Buffer Overflow In Libstagefright With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0695" id="RHSA-2016:0695-1" title="Rhsa-2016:0695-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330270" id="1330270" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330280" id="1330280" title="Mozilla: Buffer Overflow In Libstagefright With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330286" id="1330286" title="Mozilla: Write To Invalid Hashmap Entry Through " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0723-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.11.0.el5_11" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.i386.rpm</filename><sum type="sha">8519a3fb5dc7b11f36305416e053d80c182192d6</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.11.0.el5_11" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.i386.rpm</filename><sum type="sha">f8ee7182eb4628e171d008775e4af9d1e1974c53</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.11.0.el5_11" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.i386.rpm</filename><sum type="sha">622709c99f34df46d47b238c6053cf5085884972</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.11.0.el5_11" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.i386.rpm</filename><sum type="sha">965061f3136c4e542708b1b6c82ce260b85b8486</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.11.0.el5_11" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.i386.rpm</filename><sum type="sha">5f2fd01deffc0d86d877f60d50ca0725d08a0729</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0723" id="RHSA-2016:0723-1" title="Rhsa-2016:0723-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1041-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 38.8.0. 
Security Fix(es): 
* Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2805, CVE-2016-2807)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-05-17 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-38.8.0-1.el5_11.src.rpm" version="38.8.0"><filename>thunderbird-38.8.0-1.el5_11.i386.rpm</filename><sum type="sha">cfc17f5f93bbe5d91a03cfb30f4d9adbf570a618</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1041" id="RHSA-2016:1041-1" title="Rhsa-2016:1041-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1137-1</id><title>Openssl</title><description>Security Fix(es): 
* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="openssl-devel" release="40.el5_11" src="openssl-0.9.8e-40.el5_11.src.rpm" version="0.9.8e"><filename>openssl-devel-0.9.8e-40.el5_11.i386.rpm</filename><sum type="sha">4644ecc188d2891666bf5de3acaf921ef7ad3c4f</sum></package><package arch="i386" name="openssl-perl" release="40.el5_11" src="openssl-0.9.8e-40.el5_11.src.rpm" version="0.9.8e"><filename>openssl-perl-0.9.8e-40.el5_11.i386.rpm</filename><sum type="sha">621e5e812f93ebcbe31be0ba56f5461aac61ad16</sum></package><package arch="i686" name="openssl" release="40.el5_11" src="openssl-0.9.8e-40.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-40.el5_11.i686.rpm</filename><sum type="sha">bffd76552548f80a979e7dd6abeb9bb34b9df688</sum></package><package arch="i386" name="openssl" release="40.el5_11" src="openssl-0.9.8e-40.el5_11.src.rpm" version="0.9.8e"><filename>openssl-0.9.8e-40.el5_11.i386.rpm</filename><sum type="sha">22d576d347464560bb031d6e0ff4ed95886dd468</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" id="CVE-2016-2108" title="Openssl: Memory Corruption In The Asn.1 Encoder" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1137" id="RHSA-2016:1137-1" title="Rhsa-2016:1137-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331402" id="1331402" title="Openssl: Memory Corruption In The Asn.1 Encoder" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1217-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.2.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2818, CVE-2016-2819, CVE-2016-2821, CVE-2016-2822, CVE-2016-2828, CVE-2016-2831)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-06-21 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.2.0-1.el5_11.src.rpm" version="45.2.0"><filename>firefox-45.2.0-1.el5_11.i386.rpm</filename><sum type="sha">ecc968da1ac34bf88f38e2b3440579326590f05e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" id="CVE-2016-2818" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" id="CVE-2016-2819" title="Mozilla: Buffer Overflow Parsing Html5 Fragments " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" id="CVE-2016-2821" title="Mozilla: Use-After-Free Deleting Tables From A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" id="CVE-2016-2822" title="Mozilla: Addressbar Spoofing Though The Select " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" id="CVE-2016-2828" title="Mozilla: Use-After-Free When Textures Are Used " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" id="CVE-2016-2831" title="Mozilla: Entering Fullscreen And Persistent " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1217" id="RHSA-2016:1217-1" title="Rhsa-2016:1217-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342887" id="1342887" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342891" id="1342891" title="Mozilla: Buffer Overflow Parsing Html5 Fragments " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342892" id="1342892" title="Mozilla: Use-After-Free Deleting Tables From A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342893" id="1342893" title="Mozilla: Addressbar Spoofing Though The Select " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342895" id="1342895" title="Mozilla: Use-After-Free When Textures Are Used " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342898" id="1342898" title="Mozilla: Entering Fullscreen And Persistent " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1392-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.2.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2818)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-07-19 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.2-1.el5_11.src.rpm" version="45.2"><filename>thunderbird-45.2-1.el5_11.i386.rpm</filename><sum type="sha">ac6713d5b61a3a64748ad133f41f7e3594b962a1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" id="CVE-2016-2818" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1392" id="RHSA-2016:1392-1" title="Rhsa-2016:1392-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342887" id="1342887" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1421-1</id><title>Httpd</title><description>Security Fix(es): 
* It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5387) 
Note: After this update, httpd will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="httpd" release="92.sl5" src="httpd-2.2.3-92.sl5.src.rpm" version="2.2.3"><filename>httpd-2.2.3-92.sl5.i386.rpm</filename><sum type="sha">f3e0a4e26c024b1b08918d7099066902b2cbf3b8</sum></package><package arch="i386" name="httpd-manual" release="92.sl5" src="httpd-2.2.3-92.sl5.src.rpm" version="2.2.3"><filename>httpd-manual-2.2.3-92.sl5.i386.rpm</filename><sum type="sha">f6047da3e351b9e172f76ccaaa29c1bdbdb57b97</sum></package><package arch="i386" name="httpd-devel" release="92.sl5" src="httpd-2.2.3-92.sl5.src.rpm" version="2.2.3"><filename>httpd-devel-2.2.3-92.sl5.i386.rpm</filename><sum type="sha">48e10a5b20fed91327641a95e501811de2f880e0</sum></package><package arch="i386" epoch="1" name="mod_ssl" release="92.sl5" src="httpd-2.2.3-92.sl5.src.rpm" version="2.2.3"><filename>mod_ssl-2.2.3-92.sl5.i386.rpm</filename><sum type="sha">f0833ab0a9ab97c1a74b970b1dd14a84c66a20f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" id="CVE-2016-5387" title="Apache Httpd: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1421" id="RHSA-2016:1421-1" title="Rhsa-2016:1421-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353755" id="1353755" title="Apache Httpd: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1504-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3598, CVE-2016-3610) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-08-02 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.7.1.el5_11" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.1.el5_11.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-src-1.7.0.111-2.6.7.1.el5_11.i386.rpm</filename><sum type="sha">86683c994fe2f21ff3bef2302a90c8a9a913cb6f</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.7.1.el5_11" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.1.el5_11.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.1.el5_11.i386.rpm</filename><sum type="sha">19b4f64396e71eeb5be2ec99440e32d01a1bb64a</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.7.1.el5_11" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.1.el5_11.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-1.7.0.111-2.6.7.1.el5_11.i386.rpm</filename><sum type="sha">64ec510c3111ed355626b81bdca9fe9fb49898ba</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.7.1.el5_11" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.1.el5_11.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.1.el5_11.i386.rpm</filename><sum type="sha">d4daf2f663b8f6dbfa365366f3365f3dd592c173</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.7.1.el5_11" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.1.el5_11.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.1.el5_11.i386.rpm</filename><sum type="sha">162be998f5fb4b41b9aaa423a3e164497619a15e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" id="CVE-2016-3598" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" id="CVE-2016-3610" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1504" id="RHSA-2016:1504-1" title="Rhsa-2016:1504-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356971" id="1356971" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356994" id="1356994" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1551-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.3.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2836, CVE-2016-5258, CVE-2016-5259, CVE-2016-5252, CVE-2016-5263, CVE-2016-2830, CVE-2016-2838, CVE-2016-5254, CVE-2016-5262, CVE-2016-5264, CVE-2016-5265, CVE-2016-2837)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-08-09 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.3.0-1.el5_11.src.rpm" version="45.3.0"><filename>firefox-45.3.0-1.el5_11.i386.rpm</filename><sum type="sha">eca4dd3a482720462960c2d1bf5e7058342951a0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" id="CVE-2016-2830" title="Mozilla: Favicon Network Connection Persists When Page Is Closed (Mfsa 2016-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" id="CVE-2016-2836" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" id="CVE-2016-2837" title="Mozilla: Buffer Overflow In Clearkey Content Decryption Module (Cdm) During Video Playback (Mfsa 2016-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" id="CVE-2016-2838" title="Mozilla: Buffer Overflow Rendering Svg With Bidirectional Content (Mfsa 2016-64)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" id="CVE-2016-5252" title="Mozilla: Stack Underflow During 2D Graphics Rendering (Mfsa 2016-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" id="CVE-2016-5254" title="Mozilla: Use-After-Free When Using Alt Key And Toplevel Menus (Mfsa 2016-70)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" id="CVE-2016-5258" title="Mozilla: Use-After-Free In Dtls During Webrtc Session Shutdown (Mfsa 2016-72)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" id="CVE-2016-5259" title="Mozilla: Use-After-Free In Service Workers With Nested Sync Events (Mfsa 2016-73)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" id="CVE-2016-5262" title="Mozilla: Scripts On Marquee Tag Can Execute In Sandboxed Iframes (Mfsa 2016-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" id="CVE-2016-5263" title="Mozilla: Type Confusion In Display Transformation (Mfsa 2016-78)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" id="CVE-2016-5264" title="Mozilla: Use-After-Free When Applying Svg Effects (Mfsa 2016-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" id="CVE-2016-5265" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-80)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1551" id="RHSA-2016:1551-1" title="Rhsa-2016:1551-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342897" id="1342897" title="Mozilla: Favicon Network Connection Persists When Page Is Closed (Mfsa 2016-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361974" id="1361974" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361976" id="1361976" title="Mozilla: Buffer Overflow Rendering Svg With Bidirectional Content (Mfsa 2016-64)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361979" id="1361979" title="Mozilla: Stack Underflow During 2D Graphics Rendering (Mfsa 2016-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361980" id="1361980" title="Mozilla: Use-After-Free When Using Alt Key And Toplevel Menus (Mfsa 2016-70)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361982" id="1361982" title="Mozilla: Use-After-Free In Dtls During Webrtc Session Shutdown (Mfsa 2016-72)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361984" id="1361984" title="Mozilla: Use-After-Free In Service Workers With Nested Sync Events (Mfsa 2016-73)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361987" id="1361987" title="Mozilla: Scripts On Marquee Tag Can Execute In Sandboxed Iframes (Mfsa 2016-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361989" id="1361989" title="Mozilla: Buffer Overflow In Clearkey Content Decryption Module (Cdm) During Video Playback (Mfsa 2016-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361991" id="1361991" title="Mozilla: Type Confusion In Display Transformation (Mfsa 2016-78)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361992" id="1361992" title="Mozilla: Use-After-Free When Applying Svg Effects (Mfsa 2016-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361994" id="1361994" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-80)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1776-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* An insufficient bytecode verification flaw was discovered in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to completely bypass Java sandbox restrictions. (CVE-2016-3606) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-08-30 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.12.4.el5_11" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.4.el5_11.i386.rpm</filename><sum type="sha">e5be1a166d0f797e430b56cbeb4016ad5e12179d</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.12.4.el5_11" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-src-1.6.0.40-1.13.12.4.el5_11.i386.rpm</filename><sum type="sha">a575589044cbdd5ef9ad1746edba3e9a41737048</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.12.4.el5_11" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11.i386.rpm</filename><sum type="sha">ce4740e8349873a8aa7dba9f04df619cfe8f36ca</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.12.4.el5_11" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.4.el5_11.i386.rpm</filename><sum type="sha">56e0ce5492dd47b2d1a4336cbf78e9f301c209cb</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.12.4.el5_11" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.4.el5_11.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.4.el5_11.i386.rpm</filename><sum type="sha">07f5e2eca98704da7cabbe917a8ad1662e5f9131</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1776" id="RHSA-2016:1776-1" title="Rhsa-2016:1776-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1809-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.3.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2836)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-09-13 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.3.0-1.el5_11.src.rpm" version="45.3.0"><filename>thunderbird-45.3.0-1.el5_11.i386.rpm</filename><sum type="sha">29cd15b81fc7426493cf63de8fefabcc59696f8b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" id="CVE-2016-2836" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1809" id="RHSA-2016:1809-1" title="Rhsa-2016:1809-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361974" id="1361974" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1912-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.4.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5257, CVE-2016-5278, CVE-2016-5270, CVE-2016-5272, CVE-2016-5274, CVE-2016-5276, CVE-2016-5277, CVE-2016-5280, CVE-2016-5281, CVE-2016-5284, CVE-2016-5250, CVE-2016-5261)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-09-27 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.4.0-1.el5_11.src.rpm" version="45.4.0"><filename>firefox-45.4.0-1.el5_11.i386.rpm</filename><sum type="sha">14e33b8cc20638d308693bec55d4a1312ab438f9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" id="CVE-2016-5250" title="Mozilla: Resource Timing Api Is Storing Resources Sent By The Previous Page (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" id="CVE-2016-5257" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" id="CVE-2016-5261" title="Mozilla: Integer Overflow And Memory Corruption In Websocketchannel (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" id="CVE-2016-5270" title="Mozilla: Heap-Buffer-Overflow In Nscasetransformtextrunfactory::Transformstring (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" id="CVE-2016-5272" title="Mozilla: Bad Cast In Nsimagegeometrymixin (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" id="CVE-2016-5274" title="Mozilla: Use-After-Free In Nsframemanager::Captureframestate (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" id="CVE-2016-5276" title="Mozilla: Heap-Use-After-Free In Mozilla::A11Y::Docaccessible::Processinvalidationlist (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" id="CVE-2016-5277" title="Mozilla: Heap-Use-After-Free In Nsrefreshdriver::Tick (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" id="CVE-2016-5278" title="Mozilla: Heap-Buffer-Overflow In Nsbmpencoder::Addimageframe (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" id="CVE-2016-5280" title="Mozilla: Use-After-Free In Mozilla::Nstextnodedirectionalitymap::Removeelementfrommap (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" id="CVE-2016-5281" title="Mozilla: Use-After-Free In Domsvglength (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" id="CVE-2016-5284" title="Mozilla: Add-On Update Site Certificate Pin Expiration (Mfsa 2016-86)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1912" id="RHSA-2016:1912-1" title="Rhsa-2016:1912-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361986" id="1361986" title="Mozilla: Integer Overflow And Memory Corruption In Websocketchannel (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361998" id="1361998" title="Mozilla: Resource Timing Api Is Storing Resources Sent By The Previous Page (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377543" id="1377543" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377549" id="1377549" title="Mozilla: Heap-Buffer-Overflow In Nsbmpencoder::Addimageframe (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377552" id="1377552" title="Mozilla: Heap-Buffer-Overflow In Nscasetransformtextrunfactory::Transformstring (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377554" id="1377554" title="Mozilla: Bad Cast In Nsimagegeometrymixin (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377557" id="1377557" title="Mozilla: Heap-Use-After-Free In Mozilla::A11Y::Docaccessible::Processinvalidationlist (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377558" id="1377558" title="Mozilla: Use-After-Free In Nsframemanager::Captureframestate (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377559" id="1377559" title="Mozilla: Heap-Use-After-Free In Nsrefreshdriver::Tick (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377561" id="1377561" title="Mozilla: Use-After-Free In Mozilla::Nstextnodedirectionalitymap::Removeelementfrommap (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377563" id="1377563" title="Mozilla: Use-After-Free In Domsvglength (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377565" id="1377565" title="Mozilla: Add-On Update Site Certificate Pin Expiration (Mfsa 2016-86)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1944-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">57a7a6124fe153950e999cd7d55bebebf0a627b0</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">96f6121ad9aea5c64c6a2d5f70da21ef30771a4c</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">b6014a2821ef8d6b22c8fd364a9b7b282c502420</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">98ab141f324542d79b8e5a0c95f1b4153d5fc3af</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">bcac2d0b050f32bffe7ac621ab49ae3c09191af9</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">191923249ef0905496227a0eaf5c04a42cdf8cb2</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">a42a14908ab58108bceec73c5f7abcfd01c42f50</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.9" src="bind-9.3.6-25.P1.el5_11.9.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.9.i386.rpm</filename><sum type="sha">73b8a42ce3bb515a3f7b22828c6561ed99741184</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" id="CVE-2016-2776" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1944" id="RHSA-2016:1944-1" title="Rhsa-2016:1944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378380" id="1378380" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1945-1</id><title>Bind97</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.7" src="bind97-9.7.0-21.P2.el5_11.7.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm</filename><sum type="sha">8531fc523e2a27e0c5e6d6a6f24e6213a9d36c0e</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.7" src="bind97-9.7.0-21.P2.el5_11.7.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm</filename><sum type="sha">39ea3bf7d12fd967d8f99b4fb59386dc5b278d97</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.7" src="bind97-9.7.0-21.P2.el5_11.7.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.7.i386.rpm</filename><sum type="sha">63c0b570929b47afc9ce6db3f5fc1f7bc02375e6</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.7" src="bind97-9.7.0-21.P2.el5_11.7.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm</filename><sum type="sha">c6b7fcba4b614c29c339eb392dc4268d19531589</sum></package><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.7" src="bind97-9.7.0-21.P2.el5_11.7.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm</filename><sum type="sha">dd07918a42e1e8d52495ba7784dbc18a17f5897d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" id="CVE-2016-2776" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1945" id="RHSA-2016:1945-1" title="Rhsa-2016:1945-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378380" id="1378380" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:1985-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.4.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5257)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-11 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.4.0-1.el5_11.src.rpm" version="45.4.0"><filename>thunderbird-45.4.0-1.el5_11.i386.rpm</filename><sum type="sha">4bcfca50fc126bd45ee13ca3bcae4dda802b49dd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" id="CVE-2016-5257" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1985" id="RHSA-2016:1985-1" title="Rhsa-2016:1985-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377543" id="1377543" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2093-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">b0e96a20093a4ba77984ff2b870b89b6aac3c38e</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">a5a868637107ff485148a6cb572a591744aa732d</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">dd3655631419804af5a7cf8fe86e64c48a32b75f</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">e28255d42ef324504aeb0b4651bf9d6b4296b078</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">62ecbc4389ae08fdd2b34bf376daec0b27f62e83</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">515022f5f20c0b0b55ddaa43e3c2a7a58281b390</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">f74796e2519b8da56da1a56db83ad212fdb204ca</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.10" src="bind-9.3.6-25.P1.el5_11.10.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.10.i386.rpm</filename><sum type="sha">27c174fc2a3da2e337034b109218e5f2d3ddf524</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2848" id="CVE-2016-2848" title="Bind: Assertion Failure Triggered By A Packet " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2093" id="RHSA-2016:2093-1" title="Rhsa-2016:2093-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385450" id="1385450" title="Bind: Assertion Failure Triggered By A Packet " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2094-1</id><title>Bind97</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.8" src="bind97-9.7.0-21.P2.el5_11.8.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.8.i386.rpm</filename><sum type="sha">3ea36f55147ad75793e9eb0f96db197d8084b6be</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.8" src="bind97-9.7.0-21.P2.el5_11.8.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.8.i386.rpm</filename><sum type="sha">d229c52adbfbbe3f03bb7b410d7773d01bbf4623</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.8" src="bind97-9.7.0-21.P2.el5_11.8.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.8.i386.rpm</filename><sum type="sha">c22093d458266f0b92cb26b4b05e396aeaf1bcf7</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.8" src="bind97-9.7.0-21.P2.el5_11.8.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.8.i386.rpm</filename><sum type="sha">99ada0e06451bfdf23b1af97e23598dac9adf03f</sum></package><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.8" src="bind97-9.7.0-21.P2.el5_11.8.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.8.i386.rpm</filename><sum type="sha">719fe662c698ec766770201e2345b61b86d78860</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2848" id="CVE-2016-2848" title="Bind: Assertion Failure Triggered By A Packet " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2094" id="RHSA-2016:2094-1" title="Rhsa-2016:2094-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385450" id="1385450" title="Bind: Assertion Failure Triggered By A Packet " type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2124-1</id><title>Kernel</title><description>Security Fix(es): 
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) 
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important) 
Bug Fix(es): 
* In some cases, a kernel crash or file system corruption occurred when running journal mode 'ordered'. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. 
* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-debug-devel" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-416.el5.i686.rpm</filename><sum type="sha">0afe2761b0f2ec81a8067a70b9e298edb631e923</sum></package><package arch="i686" name="kernel-PAE" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-416.el5.i686.rpm</filename><sum type="sha">b3a13ab8aa87f95ff914f85800895c443c9f6621</sum></package><package arch="i686" name="kernel-debug" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-416.el5.i686.rpm</filename><sum type="sha">90f815a18b9056d848ad6fa770cf941365a4076b</sum></package><package arch="i686" name="kernel-PAE-devel" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-416.el5.i686.rpm</filename><sum type="sha">c1c0e6386572068414f3469e7403b2bc5b5b700f</sum></package><package arch="i686" name="kernel-xen" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-416.el5.i686.rpm</filename><sum type="sha">1b341fd722886a612c0d5d625b3160ad171ea4bf</sum></package><package arch="i686" name="kernel" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-416.el5.i686.rpm</filename><sum type="sha">9f14648e63cd9731c3e64bba1e5fba662637c919</sum></package><package arch="i686" name="kernel-devel" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-416.el5.i686.rpm</filename><sum type="sha">d65fc4b5a9da4fea5fead3b4b7845adeffc12080</sum></package><package arch="i686" name="kernel-xen-devel" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-416.el5.i686.rpm</filename><sum type="sha">50263f8c34e9ccfd3bd0e5d23748a040810f0aa9</sum></package><package arch="i386" name="kernel-headers" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-416.el5.i386.rpm</filename><sum type="sha">e86b92f94a5bd5262192a9f26b5c592dd4264d13</sum></package><package arch="noarch" name="kernel-doc" release="416.el5" src="kernel-2.6.18-416.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-416.el5.noarch.rpm</filename><sum type="sha">4d5cb9957cd65311db8b9a89d0189282f3b2b674</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" id="CVE-2016-1583" title="Kernel: Stack Overflow Via Ecryptfs And /Proc/$Pid/Environ" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" id="CVE-2016-5195" title="Kernel: Mm: Privilege Escalation Via Map_Private Cow Breakage" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2124" id="RHSA-2016:2124-1" title="Rhsa-2016:2124-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344721" id="1344721" title="Kernel: Stack Overflow Via Ecryptfs And /Proc/$Pid/Environ" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384344" id="1384344" title="Kernel: Mm: Privilege Escalation Via Map_Private Cow Breakage" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2141-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-08 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">9af280acc53161508bbc275101c35ec7af3c7a8c</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">7bdc7be6afc964df7b10dc80839bbc1095cb3833</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">c249c27de95538a8e368e363a810c58535ceea16</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">f58900f0b28b4c9d9a858690a07b35f06bc35bd5</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">b443b08aef202617afa9d28656cb49887a24e68f</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">76bb5ddb64f4cee8950a5dbd5e26b52d20345a25</sum></package><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">8a3138b639bc15ff504576fbbd310efd92e352a8</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.11" src="bind-9.3.6-25.P1.el5_11.11.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.11.i386.rpm</filename><sum type="sha">9e7fb24e767630f7705a64953d8373f06f49542e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" id="CVE-2016-8864" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2141" id="RHSA-2016:2141-1" title="Rhsa-2016:2141-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389652" id="1389652" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2142-1</id><title>Bind97</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-08 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.9" src="bind97-9.7.0-21.P2.el5_11.9.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm</filename><sum type="sha">c58747a12f5aae262730e02f6ef13719afcc8552</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.9" src="bind97-9.7.0-21.P2.el5_11.9.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm</filename><sum type="sha">ad387fb2823ed6535cbd7052b135f8fdd767caf6</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.9" src="bind97-9.7.0-21.P2.el5_11.9.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.9.i386.rpm</filename><sum type="sha">77aab87e83c51abd687ae21729aaa0f68efb1d16</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.9" src="bind97-9.7.0-21.P2.el5_11.9.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm</filename><sum type="sha">03d61e6a93c14e873dc3edd047c41de462e708e7</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.9" src="bind97-9.7.0-21.P2.el5_11.9.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm</filename><sum type="sha">d1f85c858a90e8931a5fa9e27cd2603c486caa51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" id="CVE-2016-8864" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2142" id="RHSA-2016:2142-1" title="Rhsa-2016:2142-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389652" id="1389652" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2658-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.8.1.el5_11" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el5_11.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.1.el5_11.i386.rpm</filename><sum type="sha">d82a22bd22f486e16d2f70d83c9ff49f656f3a52</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.8.1.el5_11" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el5_11.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-src-1.7.0.121-2.6.8.1.el5_11.i386.rpm</filename><sum type="sha">2b3ddffc3f15682b5f1792f2c770bb2d4257eec8</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.8.1.el5_11" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el5_11.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.1.el5_11.i386.rpm</filename><sum type="sha">f10b36b622888d3fc6881a0a6f622e0a3d6f94e9</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.8.1.el5_11" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el5_11.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el5_11.i386.rpm</filename><sum type="sha">42cbfb65d5d42b41ad8c37c9ae38905874941cc0</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.8.1.el5_11" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.1.el5_11.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.1.el5_11.i386.rpm</filename><sum type="sha">5aeddf4c82dea0748b79b99fee3871ce1b6e8f2b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2658" id="RHSA-2016:2658-1" title="Rhsa-2016:2658-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2779-1</id><title>Nss And Nss-Util</title><description>The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. 
The following packages have been upgraded to a newer upstream version: nss (3.12.3), nss-util (3.12.3). 
Security Fix(es): 
* Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) 
* A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) 
* It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635)</description><severity>moderate</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="nss-devel" release="2.el5_11" src="nss-3.21.3-2.el5_11.src.rpm" version="3.21.3"><filename>nss-devel-3.21.3-2.el5_11.i386.rpm</filename><sum type="sha">dd8193efed843cfcaa13b6dd7ce90fd359e6b8e3</sum></package><package arch="i386" name="nss-pkcs11-devel" release="2.el5_11" src="nss-3.21.3-2.el5_11.src.rpm" version="3.21.3"><filename>nss-pkcs11-devel-3.21.3-2.el5_11.i386.rpm</filename><sum type="sha">43b3a9a18e79346a285dba82819f388ca0662cd3</sum></package><package arch="i386" name="nss-tools" release="2.el5_11" src="nss-3.21.3-2.el5_11.src.rpm" version="3.21.3"><filename>nss-tools-3.21.3-2.el5_11.i386.rpm</filename><sum type="sha">5e899f1623cbfc69193ceddaddc39b99e87591c8</sum></package><package arch="i386" name="nss" release="2.el5_11" src="nss-3.21.3-2.el5_11.src.rpm" version="3.21.3"><filename>nss-3.21.3-2.el5_11.i386.rpm</filename><sum type="sha">8cad52f27b32073c52873b61db354abed8f76d1d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" id="CVE-2016-2834" title="Nss: Multiple Security Flaws (Mfsa 2016-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" id="CVE-2016-5285" title="Nss: Missing Null Check In Pk11_Signwithsymkey / Ssl3_Computerecordmacconstanttime Causes Server Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" id="CVE-2016-8635" title="Nss: Small-Subgroups Attack Flaw" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2779" id="RHSA-2016:2779-1" title="Rhsa-2016:2779-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347908" id="1347908" title="Nss: Multiple Security Flaws (Mfsa 2016-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383883" id="1383883" title="Nss: Missing Null Check In Pk11_Signwithsymkey / Ssl3_Computerecordmacconstanttime Causes Server Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391818" id="1391818" title="Nss: Small-Subgroups Attack Flaw" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2780-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.5.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5296, CVE-2016-5297, CVE-2016-9066, CVE-2016-5291, CVE-2016-5290) 
* A flaw was found in the way Add-on update process was handled by Firefox. A Man-in-the-Middle attacker could use this flaw to install a malicious signed add-on update. (CVE-2016-9064)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.5.0-1.el5_11.src.rpm" version="45.5.0"><filename>firefox-45.5.0-1.el5_11.i386.rpm</filename><sum type="sha">620c8d8f5244e84357193377f56bb9cf17bf7883</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" id="CVE-2016-5290" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" id="CVE-2016-5291" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" id="CVE-2016-5296" title="Mozilla: Heap-Buffer-Overflow Write In Rasterize_Edges_1 (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" id="CVE-2016-5297" title="Mozilla: Incorrect Argument Length Checking In Javascript (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" id="CVE-2016-9064" title="Mozilla: Addons Update Must Verify Ids Match Between Current And New Versions (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" id="CVE-2016-9066" title="Mozilla: Integer Overflow Leading To A Buffer Overflow In Nsscriptloadhandler (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2780" id="RHSA-2016:2780-1" title="Rhsa-2016:2780-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395055" id="1395055" title="Mozilla: Heap-Buffer-Overflow Write In Rasterize_Edges_1 (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395058" id="1395058" title="Mozilla: Incorrect Argument Length Checking In Javascript (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395060" id="1395060" title="Mozilla: Addons Update Must Verify Ids Match Between Current And New Versions (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395061" id="1395061" title="Mozilla: Integer Overflow Leading To A Buffer Overflow In Nsscriptloadhandler (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395065" id="1395065" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395066" id="1395066" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2825-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.5.0 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5290)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.5.0-1.el5_11.src.rpm" version="45.5.0"><filename>thunderbird-45.5.0-1.el5_11.i386.rpm</filename><sum type="sha">a3326c883c30c930f650e092cc1ba007779b8728</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" id="CVE-2016-5290" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2825" id="RHSA-2016:2825-1" title="Rhsa-2016:2825-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395066" id="1395066" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2843-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.5.1 ESR. 
Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9079)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.5.1-1.el5_11.src.rpm" version="45.5.1"><filename>firefox-45.5.1-1.el5_11.i386.rpm</filename><sum type="sha">3cfbc7aad5dc8c6ce4a55445aac3cf54ddceda7e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" id="CVE-2016-9079" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2843" id="RHSA-2016:2843-1" title="Rhsa-2016:2843-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400376" id="1400376" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2850-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.5.1. 
Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9079)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.5.1-1.el5_11.src.rpm" version="45.5.1"><filename>thunderbird-45.5.1-1.el5_11.i386.rpm</filename><sum type="sha">0bde7133525f5102d5787bf86ea73a236316dd03</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" id="CVE-2016-9079" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2850" id="RHSA-2016:2850-1" title="Rhsa-2016:2850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400376" id="1400376" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2946-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.6.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9897, CVE-2016-9898, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9904, CVE-2016-9905)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-12-20 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.6.0-1.el5_11.src.rpm" version="45.6.0"><filename>firefox-45.6.0-1.el5_11.i386.rpm</filename><sum type="sha">6ee7872fa1dadde411544f967324ccf234d2ba25</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" id="CVE-2016-9893" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" id="CVE-2016-9895" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" id="CVE-2016-9897" title="Mozilla: Memory Corruption In Libgles (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" id="CVE-2016-9898" title="Mozilla: Use-After-Free In Editor While Manipulating Dom Subtrees (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" id="CVE-2016-9899" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" id="CVE-2016-9900" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" id="CVE-2016-9901" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" id="CVE-2016-9902" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" id="CVE-2016-9904" title="Mozilla: Cross-Origin Information Leak In Shared Atoms (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" id="CVE-2016-9905" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2946" id="RHSA-2016:2946-1" title="Rhsa-2016:2946-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404083" id="1404083" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404086" id="1404086" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404087" id="1404087" title="Mozilla: Memory Corruption In Libgles (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404089" id="1404089" title="Mozilla: Use-After-Free In Editor While Manipulating Dom Subtrees (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404090" id="1404090" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404091" id="1404091" title="Mozilla: Cross-Origin Information Leak In Shared Atoms (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404094" id="1404094" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404096" id="1404096" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404358" id="1404358" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404359" id="1404359" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2962-1</id><title>Kernel</title><description>Security Fix(es): 
* A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) 
Bug Fix(es): 
* Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-xen" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-417.el5.i686.rpm</filename><sum type="sha">e16f825d184f4e86f4e9914583243537f0c7e468</sum></package><package arch="i686" name="kernel-debug" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-417.el5.i686.rpm</filename><sum type="sha">74482b27c658f0e324b365b4e5abd8ea592a918b</sum></package><package arch="noarch" name="kernel-doc" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-417.el5.noarch.rpm</filename><sum type="sha">696dbedd600e765b9b4eb3b185ad9e2741ce0763</sum></package><package arch="i686" name="kernel" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-417.el5.i686.rpm</filename><sum type="sha">c310196222200116558610885636ef9881094e88</sum></package><package arch="i686" name="kernel-xen-devel" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-417.el5.i686.rpm</filename><sum type="sha">5507b060567e79f8fab7c54a80d5a08c70e74b33</sum></package><package arch="i686" name="kernel-PAE-devel" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-417.el5.i686.rpm</filename><sum type="sha">1de6f3531a6a446f50bf06103eaac7c40bed5eb9</sum></package><package arch="i686" name="kernel-debug-devel" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-417.el5.i686.rpm</filename><sum type="sha">b56c6abb08cc48dce09bdb0cdf707c3d607bb771</sum></package><package arch="i686" name="kernel-PAE" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-417.el5.i686.rpm</filename><sum type="sha">e4ad0c45745af1f84f17e84b75fa3a9d2e088d8d</sum></package><package arch="i686" name="kernel-devel" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-417.el5.i686.rpm</filename><sum type="sha">f79226f4f4cd8bcc9b853c98950d9e870e8e0de6</sum></package><package arch="i386" name="kernel-headers" release="417.el5" src="kernel-2.6.18-417.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-417.el5.i386.rpm</filename><sum type="sha">b40a3bc25c50bca51409555a881b76654dfc3aaa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" id="CVE-2016-7117" title="Kernel: Use-After-Free In The Recvmmsg Exit Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2962" id="RHSA-2016:2962-1" title="Rhsa-2016:2962-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382268" id="1382268" title="Kernel: Use-After-Free In The Recvmmsg Exit Path" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2963-1</id><title>Xen</title><description>Security Fix(es): 
* An out of bounds array access issue was found in the Xen virtual machine monitor, built with the QEMU ioport support. It could occur while doing ioport read/write operations, if guest was to supply a 32bit address parameter. A privileged guest user/process could use this flaw to potentially escalate their privileges on a host. (CVE-2016-9637)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="xen" release="148.el5_11" src="xen-3.0.3-148.el5_11.src.rpm" version="3.0.3"><filename>xen-3.0.3-148.el5_11.i386.rpm</filename><sum type="sha">8c001a16abb098b64b3e75ba112f1eabe7745f78</sum></package><package arch="i386" name="xen-devel" release="148.el5_11" src="xen-3.0.3-148.el5_11.src.rpm" version="3.0.3"><filename>xen-devel-3.0.3-148.el5_11.i386.rpm</filename><sum type="sha">438642673f508e15481ce39bfd49731bf99b4343</sum></package><package arch="i386" name="xen-libs" release="148.el5_11" src="xen-3.0.3-148.el5_11.src.rpm" version="3.0.3"><filename>xen-libs-3.0.3-148.el5_11.i386.rpm</filename><sum type="sha">e803e3cf50a176b912d0e2290fb08d75bcf044aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" id="CVE-2016-9637" title="Xsa199 Xen: Qemu Ioport Out-Of-Bounds Array Access (Xsa-199)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2963" id="RHSA-2016:2963-1" title="Rhsa-2016:2963-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397043" id="1397043" title="Xsa199 Xen: Qemu Ioport Out-Of-Bounds Array Access (Xsa-199)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:2973-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.6.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9905)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.6.0-1.el5_11.src.rpm" version="45.6.0"><filename>thunderbird-45.6.0-1.el5_11.i386.rpm</filename><sum type="sha">2b720805b676ce8b2dd804db02fd1726d0f83f08</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" id="CVE-2016-9893" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" id="CVE-2016-9895" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" id="CVE-2016-9899" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" id="CVE-2016-9900" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" id="CVE-2016-9901" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" id="CVE-2016-9902" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" id="CVE-2016-9905" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2973" id="RHSA-2016:2973-1" title="Rhsa-2016:2973-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404083" id="1404083" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404086" id="1404086" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404090" id="1404090" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404094" id="1404094" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404096" id="1404096" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404358" id="1404358" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404359" id="1404359" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0061-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.13.1.el5_11" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el5_11.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el5_11.i386.rpm</filename><sum type="sha">db07b6776ea106122fa8222a4ae62f3981fa2ff8</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.13.1.el5_11" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el5_11.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el5_11.i386.rpm</filename><sum type="sha">f8422487db96f967f1c721b633e260bee5f95994</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.13.1.el5_11" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el5_11.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el5_11.i386.rpm</filename><sum type="sha">810d8e878aa3aba501b98d9df74db565cfc3050b</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.13.1.el5_11" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el5_11.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el5_11.i386.rpm</filename><sum type="sha">3fa1f2068d9702253ecbc1d7d26eb3ef864e6c55</sum></package><package arch="i386" epoch="1" name="java-1.6.0-openjdk" release="1.13.13.1.el5_11" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el5_11.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el5_11.i386.rpm</filename><sum type="sha">1b38c0aa270754be3d3fc30f1841b36d657453a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0061" id="RHSA-2017:0061-1" title="Rhsa-2017:0061-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0063-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-24 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="30" name="bind-chroot" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-chroot-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">53a36271d44ecf69adede14afa3cb0ef1b7c3c83</sum></package><package arch="i386" epoch="30" name="caching-nameserver" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>caching-nameserver-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">ba1744a925e7a8feb3fb4dfcb28afdf708e8d876</sum></package><package arch="i386" epoch="30" name="bind-libbind-devel" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-libbind-devel-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">36998c700d75a1c1ec065c6b94efca1c8af6cb0f</sum></package><package arch="i386" epoch="30" name="bind-devel" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-devel-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">68f3d7c80063d60930bc84985ebaabb595cf3d3e</sum></package><package arch="i386" epoch="30" name="bind-libs" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-libs-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">a24640c7cde85f56a71e92b8b32c67c1d8d4b399</sum></package><package arch="i386" epoch="30" name="bind-sdb" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-sdb-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">9e4e2c36324909897268a2fbc062f1a90037a5a7</sum></package><package arch="i386" epoch="30" name="bind-utils" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-utils-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">c82eba31534afc25731a64f731f58ee1fe038eda</sum></package><package arch="i386" epoch="30" name="bind" release="25.P1.el5_11.12" src="bind-9.3.6-25.P1.el5_11.12.src.rpm" version="9.3.6"><filename>bind-9.3.6-25.P1.el5_11.12.i386.rpm</filename><sum type="sha">cf2dd6d0a920e0fabfbe59c9914605979464a417</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" id="CVE-2016-9147" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0063" id="RHSA-2017:0063-1" title="Rhsa-2017:0063-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411367" id="1411367" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0064-1</id><title>Bind97</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-01-24 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="32" name="bind97-utils" release="21.P2.el5_11.10" src="bind97-9.7.0-21.P2.el5_11.10.src.rpm" version="9.7.0"><filename>bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm</filename><sum type="sha">92aa209d1ca17028ebc10d1406ba16eb212f9b53</sum></package><package arch="i386" epoch="32" name="bind97-devel" release="21.P2.el5_11.10" src="bind97-9.7.0-21.P2.el5_11.10.src.rpm" version="9.7.0"><filename>bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm</filename><sum type="sha">9f4b505122c67b13ef698b7226560e595b02dadd</sum></package><package arch="i386" epoch="32" name="bind97-libs" release="21.P2.el5_11.10" src="bind97-9.7.0-21.P2.el5_11.10.src.rpm" version="9.7.0"><filename>bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm</filename><sum type="sha">fc4bf087b2c2a11656bf5b87406154d797ca7c4c</sum></package><package arch="i386" epoch="32" name="bind97-chroot" release="21.P2.el5_11.10" src="bind97-9.7.0-21.P2.el5_11.10.src.rpm" version="9.7.0"><filename>bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm</filename><sum type="sha">68985fca8ac38cd84239da6a042f1cca1c09a312</sum></package><package arch="i386" epoch="32" name="bind97" release="21.P2.el5_11.10" src="bind97-9.7.0-21.P2.el5_11.10.src.rpm" version="9.7.0"><filename>bind97-9.7.0-21.P2.el5_11.10.i386.rpm</filename><sum type="sha">ee46967af575870d2b777ba06829b2851293cdb3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" id="CVE-2016-9147" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0064" id="RHSA-2017:0064-1" title="Rhsa-2017:0064-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411367" id="1411367" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0190-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.7.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-01-31 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="2.el5_11" src="firefox-45.7.0-2.el5_11.src.rpm" version="45.7.0"><filename>firefox-45.7.0-2.el5_11.i386.rpm</filename><sum type="sha">e97d3f2d824dbce85be2791ef9daa967fb84a2d4</sum></package><package arch="i386" name="firefox" release="1.el5_11" src="firefox-45.7.0-1.el5_11.src.rpm" version="45.7.0"><filename>firefox-45.7.0-1.el5_11.i386.rpm</filename><sum type="sha">61428ce5f7c66f61fc5ed3f6d7b8cdfe8ec2cfa9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" id="CVE-2017-5373" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" id="CVE-2017-5375" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" id="CVE-2017-5376" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" id="CVE-2017-5378" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" id="CVE-2017-5380" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" id="CVE-2017-5383" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" id="CVE-2017-5386" title="Mozilla: Webextensions Can Use Data: Protocol To Affect Other Extensions (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" id="CVE-2017-5390" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" id="CVE-2017-5396" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0190" id="RHSA-2017:0190-1" title="Rhsa-2017:0190-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415924" id="1415924" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416271" id="1416271" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416272" id="1416272" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416273" id="1416273" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416274" id="1416274" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416279" id="1416279" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416280" id="1416280" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416281" id="1416281" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416282" id="1416282" title="Mozilla: Webextensions Can Use Data: Protocol To Affect Other Extensions (Mfsa 2017-02)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0238-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.7.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, CVE-2017-5396)</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-02-07 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="thunderbird" release="1.el5_11" src="thunderbird-45.7.0-1.el5_11.src.rpm" version="45.7.0"><filename>thunderbird-45.7.0-1.el5_11.i386.rpm</filename><sum type="sha">73c70668d75f90392c018cfe4def8b7ec19be144</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" id="CVE-2017-5373" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" id="CVE-2017-5375" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" id="CVE-2017-5376" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" id="CVE-2017-5378" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" id="CVE-2017-5380" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" id="CVE-2017-5383" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" id="CVE-2017-5390" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" id="CVE-2017-5396" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0238" id="RHSA-2017:0238-1" title="Rhsa-2017:0238-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415924" id="1415924" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416271" id="1416271" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416272" id="1416272" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416273" id="1416273" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416274" id="1416274" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416279" id="1416279" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416280" id="1416280" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416281" id="1416281" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0269-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) 
This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. 
* Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) 
* A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) 
* It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) 
* It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) 
* It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) 
* It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) 
* It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) 
* Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) 
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite.</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2017-02-21 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.9.0.el5_11" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el5_11.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el5_11.i386.rpm</filename><sum type="sha">b63c6b6a8fbc0e6c20fe759fbc112b874e9f8d59</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk" release="2.6.9.0.el5_11" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el5_11.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el5_11.i386.rpm</filename><sum type="sha">d84512a76a4a8ed7b02e25d12c9ec01b2a4d227d</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.9.0.el5_11" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el5_11.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el5_11.i386.rpm</filename><sum type="sha">86895893245768aa539ce32384ba7cb5558b12d0</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.9.0.el5_11" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el5_11.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el5_11.i386.rpm</filename><sum type="sha">3071f13708d62ebd39c1e8ff0447fd25e1a11a58</sum></package><package arch="i386" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.9.0.el5_11" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el5_11.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el5_11.i386.rpm</filename><sum type="sha">45c86a2f5e829c636de22ce50b3662521ad48ee0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" id="CVE-2016-5546" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" id="CVE-2016-5547" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" id="CVE-2016-5548" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" id="CVE-2016-5552" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" id="CVE-2017-3231" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" id="CVE-2017-3241" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" id="CVE-2017-3252" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" id="CVE-2017-3253" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" id="CVE-2017-3261" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" id="CVE-2017-3272" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" id="CVE-2017-3289" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0269" id="RHSA-2017:0269-1" title="Rhsa-2017:0269-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413554" id="1413554" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413562" id="1413562" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413583" id="1413583" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413653" id="1413653" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413717" id="1413717" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413764" id="1413764" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413882" id="1413882" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413906" id="1413906" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413911" id="1413911" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413920" id="1413920" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413955" id="1413955" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0323-1</id><title>Kernel</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) 
* It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634, Moderate) 
Important: This update disables the DCCP kernel module at load time by using the kernel module blacklist method. The module is disabled in an attempt to reduce further exposure to additional issues.</description><severity>important</severity><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i686" name="kernel-PAE" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-2.6.18-419.el5.i686.rpm</filename><sum type="sha">f29c119499b3c6a2aba593e34c1ac77a86dce635</sum></package><package arch="i686" name="kernel-PAE-devel" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-PAE-devel-2.6.18-419.el5.i686.rpm</filename><sum type="sha">108dc5c56471e5593fbe61bca4f5e2c9e5d900bd</sum></package><package arch="i686" name="kernel-xen-devel" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-xen-devel-2.6.18-419.el5.i686.rpm</filename><sum type="sha">f982482b796b8145bbefd3a92355f3ee167bcca4</sum></package><package arch="i686" name="kernel" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-2.6.18-419.el5.i686.rpm</filename><sum type="sha">1e6c3035b8d8960bbf71b1d0859c121d8e276a54</sum></package><package arch="i686" name="kernel-debug" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-debug-2.6.18-419.el5.i686.rpm</filename><sum type="sha">d651731e0dee165249599e1543aecb4c2390741b</sum></package><package arch="noarch" name="kernel-doc" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-doc-2.6.18-419.el5.noarch.rpm</filename><sum type="sha">c7d3549148b35a7a3a15ad50608843e8e09f6188</sum></package><package arch="i686" name="kernel-debug-devel" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-debug-devel-2.6.18-419.el5.i686.rpm</filename><sum type="sha">95f3d2e69d8e51fd4b1620e727f2d36b9939c5df</sum></package><package arch="i386" name="kernel-headers" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-headers-2.6.18-419.el5.i386.rpm</filename><sum type="sha">f75b885bea0c08db78b9cda73f3d6cd280ae1451</sum></package><package arch="i686" name="kernel-xen" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-xen-2.6.18-419.el5.i686.rpm</filename><sum type="sha">e227a08f260b6b3e276e65a80e3312d55b8da0a2</sum></package><package arch="i686" name="kernel-devel" release="419.el5" src="kernel-2.6.18-419.el5.src.rpm" version="2.6.18"><filename>kernel-devel-2.6.18-419.el5.i686.rpm</filename><sum type="sha">3862e49150858a5f43be0336490eff891727c9ce</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2634" id="CVE-2017-2634" title="Kernel: Dccp: Crash While Sending Ipv6 Reset Packet" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" id="CVE-2017-6074" title="Kernel: Use After Free In Dccp Protocol" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0323" id="RHSA-2017:0323-1" title="Rhsa-2017:0323-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1423071" id="1423071" title="Kernel: Use After Free In Dccp Protocol" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1424751" id="1424751" title="Kernel: Dccp: Crash While Sending Ipv6 Reset Packet" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2017:0459-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.8.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="1970-01-01 00:00:00" /><pkglist><collection short="SLF5"><name>Scientific Linux Fermi 5</name><package arch="i386" name="firefox" release="2.el5_11" src="firefox-45.8.0-2.el5_11.src.rpm" version="45.8.0"><filename>firefox-45.8.0-2.el5_11.i386.rpm</filename><sum type="sha">e972225ba7089716c5b0a25fbea4f31bd76d1610</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" id="CVE-2017-5398" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" id="CVE-2017-5400" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" id="CVE-2017-5401" title="Mozilla: Memory Corruption When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" id="CVE-2017-5402" title="Mozilla: Use-After-Free Working With Events In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" id="CVE-2017-5404" title="Mozilla: Use-After-Free Working With Ranges In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" id="CVE-2017-5405" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" id="CVE-2017-5407" title="Mozilla: Pixel And History Stealing Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" id="CVE-2017-5408" title="Mozilla: Cross-Origin Reading Of Video Captions " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" id="CVE-2017-5410" title="Mozilla: Memory Corruption During Javascript " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0459" id="RHSA-2017:0459-1" title="Rhsa-2017:0459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429778" id="1429778" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429779" id="1429779" title="Mozilla: Memory Corruption When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429780" id="1429780" title="Mozilla: Use-After-Free Working With Events In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429781" id="1429781" title="Mozilla: Use-After-Free Working With Ranges In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429782" id="1429782" title="Mozilla: Pixel And History Stealing Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429783" id="1429783" title="Mozilla: Memory Corruption During Javascript " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429784" id="1429784" title="Mozilla: Cross-Origin Reading Of Video Captions " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429785" id="1429785" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429786" id="1429786" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="bugzilla" /></references></update></updates>