Red Hat 9037 Published by

The following updates has been released for Redhat Enterprise Linux: [RHSA-2012:0058-01] Moderate: glibc security and bug fix update, [RHSA-2012:0060-01] Moderate: openssl security update, [RHSA-2012:0062-01] Moderate: t1lib security update, [RHSA-2012:0061-01] Important: kernel-rt security update, and [RHSA-2012:0059-01] Moderate: openssl security update



[RHSA-2012:0058-01] Moderate: glibc security and bug fix update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: glibc security and bug fix update
Advisory ID: RHSA-2012:0058-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0058.html
Issue date: 2012-01-24
CVE Names: CVE-2009-5029 CVE-2011-4609
=====================================================================

1. Summary:

Updated glibc packages that fix two security issues and three bugs are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The glibc packages contain the standard C libraries used by multiple
programs on the system. These packages contain the standard C and the
standard math libraries. Without these two libraries, a Linux system cannot
function properly.

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the glibc library read timezone files. If a
carefully-crafted timezone file was loaded by an application linked against
glibc, it could cause the application to crash or, potentially, execute
arbitrary code with the privileges of the user running the application.
(CVE-2009-5029)

A denial of service flaw was found in the remote procedure call (RPC)
implementation in glibc. A remote attacker able to open a large number of
connections to an RPC service that is using the RPC implementation from
glibc, could use this flaw to make that service use an excessive amount of
CPU time. (CVE-2011-4609)

This update also fixes the following bugs:

* glibc had incorrect information for numeric separators and groupings for
specific French, Spanish, and German locales. Therefore, applications
utilizing glibc's locale support printed numbers with the wrong separators
and groupings when those locales were in use. With this update, the
separator and grouping information has been fixed. (BZ#754116)

* The RHBA-2011:1179 glibc update introduced a regression, causing glibc to
incorrectly parse groups with more than 126 members, resulting in
applications such as "id" failing to list all the groups a particular user
was a member of. With this update, group parsing has been fixed.
(BZ#766484)

* glibc incorrectly allocated too much memory due to a race condition
within its own malloc routines. This could cause a multi-threaded
application to allocate more memory than was expected. With this update,
the race condition has been fixed, and malloc's behavior is now consistent
with the documentation regarding the MALLOC_ARENA_TEST and MALLOC_ARENA_MAX
environment variables. (BZ#769594)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

761245 - CVE-2009-5029 glibc: __tzfile_read integer overflow to buffer overflow
767299 - CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

i386:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-headers-2.12-1.47.el6_2.5.i686.rpm
glibc-utils-2.12-1.47.el6_2.5.i686.rpm
nscd-2.12-1.47.el6_2.5.i686.rpm

x86_64:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-2.12-1.47.el6_2.5.x86_64.rpm
glibc-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.x86_64.rpm
glibc-headers-2.12-1.47.el6_2.5.x86_64.rpm
glibc-utils-2.12-1.47.el6_2.5.x86_64.rpm
nscd-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

i386:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm

x86_64:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

x86_64:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-2.12-1.47.el6_2.5.x86_64.rpm
glibc-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.x86_64.rpm
glibc-headers-2.12-1.47.el6_2.5.x86_64.rpm
glibc-utils-2.12-1.47.el6_2.5.x86_64.rpm
nscd-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

x86_64:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

i386:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-headers-2.12-1.47.el6_2.5.i686.rpm
glibc-utils-2.12-1.47.el6_2.5.i686.rpm
nscd-2.12-1.47.el6_2.5.i686.rpm

ppc64:
glibc-2.12-1.47.el6_2.5.ppc.rpm
glibc-2.12-1.47.el6_2.5.ppc64.rpm
glibc-common-2.12-1.47.el6_2.5.ppc64.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.ppc.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.ppc64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.ppc.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.ppc64.rpm
glibc-devel-2.12-1.47.el6_2.5.ppc.rpm
glibc-devel-2.12-1.47.el6_2.5.ppc64.rpm
glibc-headers-2.12-1.47.el6_2.5.ppc64.rpm
glibc-utils-2.12-1.47.el6_2.5.ppc64.rpm
nscd-2.12-1.47.el6_2.5.ppc64.rpm

s390x:
glibc-2.12-1.47.el6_2.5.s390.rpm
glibc-2.12-1.47.el6_2.5.s390x.rpm
glibc-common-2.12-1.47.el6_2.5.s390x.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.s390.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.s390x.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.s390.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.s390x.rpm
glibc-devel-2.12-1.47.el6_2.5.s390.rpm
glibc-devel-2.12-1.47.el6_2.5.s390x.rpm
glibc-headers-2.12-1.47.el6_2.5.s390x.rpm
glibc-utils-2.12-1.47.el6_2.5.s390x.rpm
nscd-2.12-1.47.el6_2.5.s390x.rpm

x86_64:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-2.12-1.47.el6_2.5.x86_64.rpm
glibc-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.x86_64.rpm
glibc-headers-2.12-1.47.el6_2.5.x86_64.rpm
glibc-utils-2.12-1.47.el6_2.5.x86_64.rpm
nscd-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

i386:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm

ppc64:
glibc-debuginfo-2.12-1.47.el6_2.5.ppc.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.ppc64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.ppc.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.ppc64.rpm
glibc-static-2.12-1.47.el6_2.5.ppc.rpm
glibc-static-2.12-1.47.el6_2.5.ppc64.rpm

s390x:
glibc-debuginfo-2.12-1.47.el6_2.5.s390.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.s390x.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.s390.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.s390x.rpm
glibc-static-2.12-1.47.el6_2.5.s390.rpm
glibc-static-2.12-1.47.el6_2.5.s390x.rpm

x86_64:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

i386:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-headers-2.12-1.47.el6_2.5.i686.rpm
glibc-utils-2.12-1.47.el6_2.5.i686.rpm
nscd-2.12-1.47.el6_2.5.i686.rpm

x86_64:
glibc-2.12-1.47.el6_2.5.i686.rpm
glibc-2.12-1.47.el6_2.5.x86_64.rpm
glibc-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-devel-2.12-1.47.el6_2.5.i686.rpm
glibc-devel-2.12-1.47.el6_2.5.x86_64.rpm
glibc-headers-2.12-1.47.el6_2.5.x86_64.rpm
glibc-utils-2.12-1.47.el6_2.5.x86_64.rpm
nscd-2.12-1.47.el6_2.5.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/glibc-2.12-1.47.el6_2.5.src.rpm

i386:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm

x86_64:
glibc-debuginfo-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-2.12-1.47.el6_2.5.x86_64.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.i686.rpm
glibc-debuginfo-common-2.12-1.47.el6_2.5.x86_64.rpm
glibc-static-2.12-1.47.el6_2.5.i686.rpm
glibc-static-2.12-1.47.el6_2.5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-5029.html
https://www.redhat.com/security/data/cve/CVE-2011-4609.html
https://access.redhat.com/security/updates/classification/#moderate
https://rhn.redhat.com/errata/RHBA-2011-1179.html

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPHyRKXlSAg2UNWIIRApoWAKC4J5Xxsn2G+Z/DPy9ewnJLtWAAYwCaA3B+
LTuIiDvp3F1TwN7edxyBI6I=
=hOeo
-----END PGP SIGNATURE-----
[RHSA-2012:0060-01] Moderate: openssl security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openssl security update
Advisory ID: RHSA-2012:0060-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0060.html
Issue date: 2012-01-24
CVE Names: CVE-2011-4108 CVE-2011-4109 CVE-2011-4576
CVE-2011-4619
=====================================================================

1. Summary:

Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64

3. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL leaked timing information when
performing certain operations. A remote attacker could possibly use this
flaw to retrieve plain text from the encrypted packets by using a DTLS
server as a padding oracle. (CVE-2011-4108)

A double free flaw was discovered in the policy checking code in OpenSSL.
A remote attacker could use this flaw to crash an application that uses
OpenSSL by providing an X.509 certificate that has specially-crafted
policy extension data. (CVE-2011-4109)

An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection.
(CVE-2011-4576)

It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake.
(CVE-2011-4619)

All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
771771 - CVE-2011-4109 openssl: double-free in policy checks
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771780 - CVE-2011-4619 openssl: SGC restart DoS attack

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl-0.9.8e-20.el5_7.1.src.rpm

i386:
openssl-0.9.8e-20.el5_7.1.i386.rpm
openssl-0.9.8e-20.el5_7.1.i686.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i386.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i686.rpm
openssl-perl-0.9.8e-20.el5_7.1.i386.rpm

x86_64:
openssl-0.9.8e-20.el5_7.1.i686.rpm
openssl-0.9.8e-20.el5_7.1.x86_64.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i686.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.x86_64.rpm
openssl-perl-0.9.8e-20.el5_7.1.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl-0.9.8e-20.el5_7.1.src.rpm

i386:
openssl-debuginfo-0.9.8e-20.el5_7.1.i386.rpm
openssl-devel-0.9.8e-20.el5_7.1.i386.rpm

x86_64:
openssl-debuginfo-0.9.8e-20.el5_7.1.i386.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.x86_64.rpm
openssl-devel-0.9.8e-20.el5_7.1.i386.rpm
openssl-devel-0.9.8e-20.el5_7.1.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openssl-0.9.8e-20.el5_7.1.src.rpm

i386:
openssl-0.9.8e-20.el5_7.1.i386.rpm
openssl-0.9.8e-20.el5_7.1.i686.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i386.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i686.rpm
openssl-devel-0.9.8e-20.el5_7.1.i386.rpm
openssl-perl-0.9.8e-20.el5_7.1.i386.rpm

ia64:
openssl-0.9.8e-20.el5_7.1.i686.rpm
openssl-0.9.8e-20.el5_7.1.ia64.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i686.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.ia64.rpm
openssl-devel-0.9.8e-20.el5_7.1.ia64.rpm
openssl-perl-0.9.8e-20.el5_7.1.ia64.rpm

ppc:
openssl-0.9.8e-20.el5_7.1.ppc.rpm
openssl-0.9.8e-20.el5_7.1.ppc64.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.ppc.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.ppc64.rpm
openssl-devel-0.9.8e-20.el5_7.1.ppc.rpm
openssl-devel-0.9.8e-20.el5_7.1.ppc64.rpm
openssl-perl-0.9.8e-20.el5_7.1.ppc.rpm

s390x:
openssl-0.9.8e-20.el5_7.1.s390.rpm
openssl-0.9.8e-20.el5_7.1.s390x.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.s390.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.s390x.rpm
openssl-devel-0.9.8e-20.el5_7.1.s390.rpm
openssl-devel-0.9.8e-20.el5_7.1.s390x.rpm
openssl-perl-0.9.8e-20.el5_7.1.s390x.rpm

x86_64:
openssl-0.9.8e-20.el5_7.1.i686.rpm
openssl-0.9.8e-20.el5_7.1.x86_64.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i386.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.i686.rpm
openssl-debuginfo-0.9.8e-20.el5_7.1.x86_64.rpm
openssl-devel-0.9.8e-20.el5_7.1.i386.rpm
openssl-devel-0.9.8e-20.el5_7.1.x86_64.rpm
openssl-perl-0.9.8e-20.el5_7.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4108.html
https://www.redhat.com/security/data/cve/CVE-2011-4109.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPHyS1XlSAg2UNWIIRAhxXAKClR3xRopyhygA4PgLUnOqWacOsfwCfSKMv
npqkzmNKX5c+YRYaCNRkdvw=
=rGKW
-----END PGP SIGNATURE-----
[RHSA-2012:0062-01] Moderate: t1lib security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: t1lib security update
Advisory ID: RHSA-2012:0062-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0062.html
Issue date: 2012-01-24
CVE Names: CVE-2010-2642 CVE-2011-0433 CVE-2011-0764
CVE-2011-1552 CVE-2011-1553 CVE-2011-1554
=====================================================================

1. Summary:

Updated t1lib packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The t1lib library allows you to rasterize bitmaps from PostScript Type 1
fonts.

Two heap-based buffer overflow flaws were found in the way t1lib processed
Adobe Font Metrics (AFM) files. If a specially-crafted font file was opened
by an application linked against t1lib, it could cause the application to
crash or, potentially, execute arbitrary code with the privileges of the
user running the application. (CVE-2010-2642, CVE-2011-0433)

An invalid pointer dereference flaw was found in t1lib. A specially-crafted
font file could, when opened, cause an application linked against t1lib to
crash or, potentially, execute arbitrary code with the privileges of the
user running the application. (CVE-2011-0764)

A use-after-free flaw was found in t1lib. A specially-crafted font file
could, when opened, cause an application linked against t1lib to crash or,
potentially, execute arbitrary code with the privileges of the user
running the application. (CVE-2011-1553)

An off-by-one flaw was found in t1lib. A specially-crafted font file could,
when opened, cause an application linked against t1lib to crash or,
potentially, execute arbitrary code with the privileges of the user running
the application. (CVE-2011-1554)

An out-of-bounds memory read flaw was found in t1lib. A specially-crafted
font file could, when opened, cause an application linked against t1lib to
crash. (CVE-2011-1552)

Red Hat would like to thank the Evince development team for reporting
CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the
original reporter of CVE-2010-2642.

All users of t1lib are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All applications linked
against t1lib must be restarted for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

666318 - CVE-2010-2642 evince, t1lib: Heap based buffer overflow in DVI file AFM font parser
679732 - CVE-2011-0433 evince, t1lib: Heap-based buffer overflow DVI file AFM font parser
692853 - CVE-2011-1552 t1lib: invalid read crash via crafted Type 1 font
692854 - CVE-2011-1553 t1lib: Use-after-free via crafted Type 1 font
692856 - CVE-2011-1554 t1lib: Off-by-one via crafted Type 1 font
692909 - CVE-2011-0764 t1lib: Invalid pointer dereference via crafted Type 1 font

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

i386:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

i386:
t1lib-apps-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-static-5.1.2-6.el6_2.1.i686.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-apps-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-static-5.1.2-6.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-apps-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-static-5.1.2-6.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

i386:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm

ppc64:
t1lib-5.1.2-6.el6_2.1.ppc64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.ppc64.rpm

s390x:
t1lib-5.1.2-6.el6_2.1.s390x.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.s390x.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

i386:
t1lib-apps-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-static-5.1.2-6.el6_2.1.i686.rpm

ppc64:
t1lib-5.1.2-6.el6_2.1.ppc.rpm
t1lib-apps-5.1.2-6.el6_2.1.ppc64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.ppc.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.ppc64.rpm
t1lib-devel-5.1.2-6.el6_2.1.ppc.rpm
t1lib-devel-5.1.2-6.el6_2.1.ppc64.rpm
t1lib-static-5.1.2-6.el6_2.1.ppc64.rpm

s390x:
t1lib-5.1.2-6.el6_2.1.s390.rpm
t1lib-apps-5.1.2-6.el6_2.1.s390x.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.s390.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.s390x.rpm
t1lib-devel-5.1.2-6.el6_2.1.s390.rpm
t1lib-devel-5.1.2-6.el6_2.1.s390x.rpm
t1lib-static-5.1.2-6.el6_2.1.s390x.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-apps-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-static-5.1.2-6.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

i386:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/t1lib-5.1.2-6.el6_2.1.src.rpm

i386:
t1lib-apps-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-static-5.1.2-6.el6_2.1.i686.rpm

x86_64:
t1lib-5.1.2-6.el6_2.1.i686.rpm
t1lib-apps-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.i686.rpm
t1lib-debuginfo-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-devel-5.1.2-6.el6_2.1.i686.rpm
t1lib-devel-5.1.2-6.el6_2.1.x86_64.rpm
t1lib-static-5.1.2-6.el6_2.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-2642.html
https://www.redhat.com/security/data/cve/CVE-2011-0433.html
https://www.redhat.com/security/data/cve/CVE-2011-0764.html
https://www.redhat.com/security/data/cve/CVE-2011-1552.html
https://www.redhat.com/security/data/cve/CVE-2011-1553.html
https://www.redhat.com/security/data/cve/CVE-2011-1554.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPHyXKXlSAg2UNWIIRAiolAJ40Z3cESS/dHhCSugnMEJFD5UJUuwCguRBu
YL/xws0fFkdvEdyaDfmFjl0=
=kAC9
-----END PGP SIGNATURE-----
[RHSA-2012:0061-01] Important: kernel-rt security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel-rt security update
Advisory ID: RHSA-2012:0061-01
Product: Red Hat Enterprise MRG for RHEL-6
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0061.html
Issue date: 2012-01-24
CVE Names: CVE-2012-0056
=====================================================================

1. Summary:

Updated kernel-rt packages that fix one security issue are now available
for Red Hat Enterprise MRG 2.1.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Relevant releases/architectures:

MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64

3. Description:

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* It was found that permissions were not checked properly in the Linux
kernel when handling the /proc/[pid]/mem writing functionality. A local,
unprivileged user could use this flaw to escalate their privileges. Refer
to Red Hat Knowledgebase article DOC-69129, linked to in the References,
for further information. (CVE-2012-0056, Important)

Red Hat would like to thank Jüri Aedla for reporting this issue.

Users should upgrade to these updated packages, which correct this issue.
The system must be rebooted for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

5. Bugs fixed (http://bugzilla.redhat.com/):

782642 - CVE-2012-0056 kernel: proc: /proc//mem mem_write insufficient permission checking

6. Package List:

MRG Realtime for RHEL 6 Server v.2:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/kernel-rt-3.0.9-rt26.46.el6rt.src.rpm

noarch:
kernel-rt-doc-3.0.9-rt26.46.el6rt.noarch.rpm
kernel-rt-firmware-3.0.9-rt26.46.el6rt.noarch.rpm

x86_64:
kernel-rt-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-debug-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-debug-debuginfo-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-debug-devel-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-debuginfo-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-devel-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-trace-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-trace-debuginfo-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-trace-devel-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-vanilla-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-vanilla-debuginfo-3.0.9-rt26.46.el6rt.x86_64.rpm
kernel-rt-vanilla-devel-3.0.9-rt26.46.el6rt.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-0056.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/kb/docs/DOC-69129

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPHyVuXlSAg2UNWIIRAs6nAJ4pbCh2MxprvrVuallqUdud6HdJQwCfSbCP
aqH9e0eP0cnA85BONeP0dDA=
=VAOB
-----END PGP SIGNATURE-----
[RHSA-2012:0059-01] Moderate: openssl security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openssl security update
Advisory ID: RHSA-2012:0059-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0059.html
Issue date: 2012-01-24
CVE Names: CVE-2011-4108 CVE-2011-4576 CVE-2011-4577
CVE-2011-4619
=====================================================================

1. Summary:

Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL leaked timing information when
performing certain operations. A remote attacker could possibly use this
flaw to retrieve plain text from the encrypted packets by using a DTLS
server as a padding oracle. (CVE-2011-4108)

An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection.
(CVE-2011-4576)

A denial of service flaw was found in the RFC 3779 implementation in
OpenSSL. A remote attacker could use this flaw to make an application using
OpenSSL exit unexpectedly by providing a specially-crafted X.509
certificate that has malformed RFC 3779 extension data. (CVE-2011-4577)

It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake.
(CVE-2011-4619)

All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures
771780 - CVE-2011-4619 openssl: SGC restart DoS attack

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm

x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm

x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm

ppc64:
openssl-1.0.0-20.el6_2.1.ppc.rpm
openssl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc.rpm
openssl-devel-1.0.0-20.el6_2.1.ppc64.rpm

s390x:
openssl-1.0.0-20.el6_2.1.s390.rpm
openssl-1.0.0-20.el6_2.1.s390x.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-devel-1.0.0-20.el6_2.1.s390.rpm
openssl-devel-1.0.0-20.el6_2.1.s390x.rpm

x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm

ppc64:
openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm
openssl-perl-1.0.0-20.el6_2.1.ppc64.rpm
openssl-static-1.0.0-20.el6_2.1.ppc64.rpm

s390x:
openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm
openssl-perl-1.0.0-20.el6_2.1.s390x.rpm
openssl-static-1.0.0-20.el6_2.1.s390x.rpm

x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

i386:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm

x86_64:
openssl-1.0.0-20.el6_2.1.i686.rpm
openssl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-devel-1.0.0-20.el6_2.1.i686.rpm
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm

i386:
openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
openssl-perl-1.0.0-20.el6_2.1.i686.rpm
openssl-static-1.0.0-20.el6_2.1.i686.rpm

x86_64:
openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4108.html
https://www.redhat.com/security/data/cve/CVE-2011-4576.html
https://www.redhat.com/security/data/cve/CVE-2011-4577.html
https://www.redhat.com/security/data/cve/CVE-2011-4619.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3
CJl5iUxU4cxJLOsSBESSRVs=
=PMiS
-----END PGP SIGNATURE-----