UPDATED: VMSA-2014-0012.1 – VMware vSphere product updates address security vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2014-0012.1
Synopsis:    VMware vSphere product updates address security 
             vulnerabilities
Issue date:  2014-12-04
Updated on:  2015-01-27
CVE number:  CVE-2014-3797, CVE-2014-8371, CVE-2013-2877, CVE-2014-0191, 
             CVE-2014-0015, CVE-2014-0138, CVE-2013-1752 and 
             CVE-2013-4238
- ------------------------------------------------------------------------

1. Summary

   VMware vSphere product updates address a Cross Site Scripting issue, 
   a certificate validation issue and security vulnerabilities in 
   third-party libraries.
 
2. Relevant releases

   VMware vCenter Server Appliance 5.1 Prior to Update 3 

   VMware vCenter Server 5.5 prior to Update 2
   VMware vCenter Server 5.1 prior to Update 3
   VMware vCenter Server 5.0 prior to Update 3c

   VMware ESXi 5.1 without patch ESXi510-201412101-SG
   VMware ESXi 5.5
   VMware ESXi 5.0

3. Problem Description 

   a. VMware vCSA cross-site scripting vulnerability

      VMware vCenter Server Appliance (vCSA) contains a vulnerability
      that may allow for Cross Site Scripting. Exploitation of this 
      vulnerability in vCenter Server requires tricking a user to click
      on a malicious link or to open a malicious web page. 

      VMware would like to thank Tanya Secker of Trustwave SpiderLabs for 
      reporting this issue to us. 

      The Common Vulnerabilities and Exposures project (cve.mitre.org) 
      has assigned the name CVE-2014-3797 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      vCSA           5.5        any       Not Affected
      vCSA           5.1        any       5.1 Update 3
      vCSA           5.0        any       Not Affected

   b. vCenter Server certificate validation issue

      vCenter Server does not properly validate the presented certificate 
      when establishing a connection to a CIM Server residing on an ESXi 
      host. This may allow for a Man-in-the-middle attack against the CIM 
      service.

      VMware would like to thank The Google Security Team for reporting 
      this issue to us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2014-8371 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware          Product   Running   Replace with/
      Product         Version   on        Apply Patch
      =============   =======   =======   ==============
      vCenter Server  5.5       any       5.5 Update 2
      vCenter Server  5.1       any       5.1 Update 3
      vCenter Server  5.0       any       5.0 Update 3c

  c. Update to ESXi libxml2 package

     libxml2 is updated to address multiple security issues. 

     The Common Vulnerabilities and Exposures project 
     (cve.mitre.org) has assigned the names CVE-2013-2877 and
     CVE-2014-0191 to these issues. 

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is 
     available.

     VMware         Product    Running   Replace with/
     Product        Version    on        Apply Patch
     =============  =======    =======   =================
     ESXi           5.5        any       see VMSA-2015-0001
     ESXi           5.1        any       ESXi510-201412101-SG
     ESXi           5.0        any       see VMSA-2015-0001

  d. Update to ESXi Curl package

     Curl is updated to address multiple security issues. 

     The Common Vulnerabilities and Exposures project 
     (cve.mitre.org) has assigned the names CVE-2014-0015 and 
     CVE-2014-0138 to these issues. 

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is 
     available.

     VMware         Product  Running   Replace with/
     Product        Version  on        Apply Patch
     =============  =======  =======   =================
     ESXi           5.5      any       Patch Pending
     ESXi           5.1      any       ESXi510-201412101-SG
     ESXi           5.0      any       Patch Pending

  e. Update to ESXi Python package

     Python is updated to address multiple security issues. 

     The Common Vulnerabilities and Exposures project 
     (cve.mitre.org) has assigned the names CVE-2013-1752 and 
     CVE-2013-4238 to these issues. 

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is 
     available.

     VMware         Product  Running   Replace with/
     Product        Version  on        Apply Patch
     =============  =======  =======   =================
     ESXi           5.5      any       Patch Pending
     ESXi           5.1      any       ESXi510-201412101-SG
     ESXi           5.0      any       Patch Pending

  f. vCenter and Update Manager, Oracle JRE 1.6 Update 81

     Oracle has documented the CVE identifiers that are addressed in 
     JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update
     Advisory of July 2014. The References section provides a link to
     this advisory. 

     VMware                 Product  Running  Replace with/
     Product                Version  on       Apply Patch
     =============          =======  =======  =================
     vCenter Server         5.5      any      not applicable *
     vCenter Server         5.1      any      5.1 Update 3
     vCenter Server         5.0      any      patch pending
     vCenter Update Manager 5.5      any      not applicable *
     vCenter Update Manager 5.1      any      5.1 Update 3
     vCenter Update Manager 5.0      any      patch pending

     * this product uses the Oracle JRE 1.7.0 family

4. Solution

   Please review the patch/release notes for your product and version 
   and verify the checksum of your downloaded file. 
  
   vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and Update Manager 5.1
   Update 3
   ----------------------------
   Downloads and Documentation: 
   https://www.vmware.com/go/download-vsphere

   ESXi 5.1
   ----------------------------
   File: update-from-esxi5.1-5.1_update03.zip.zip
   md5sum: b3fd3549b59c6c59c04bfd09b08c6edf
   sha1sum: 02139101fe205894774caac02820f6ea8416fb8b
   http://kb.vmware.com/kb/2086288
   update-from-esxi5.1-5.1_update03 contains ESXi510-201412101-SG
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3797
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8371
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238

   JRE 
   Oracle Java SE Critical Patch Update Advisory of July 2014

  
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

- ------------------------------------------------------------------------

6. Change log

   2014-12-04 VMSA-2014-0012
   Initial security advisory in conjunction with the release of VMware
   vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and ESXi 5.1 Patches 
   released on 2014-12-04.

   2015-01-27 VMSA-2014-0012.1
   Security advisory updated in conjunction with the release of
   VMware ESXi 5.5 Patches released on 2015-01-27.


- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2015 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFUxqHHDEcm8Vbi9kMRAoSaAKD0BgI72YbonTMBbjAp1UMsFE2eBQCaAoPT
tg8/S+hjkMsW8AV18Kkj8Tw=
=UwKa
-----END PGP SIGNATURE-----

NEW VMSA-2015-0001 – VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues

Posted by VMware Security Response Center on Jan 27

————————————————————————
VMware Security Advisory

Advisory ID: VMSA-2015-0001
Synopsis: VMware vCenter Server, ESXi, Workstation, Player, and Fusion
updates address security issues
Issue date: 2015-01-27
Updated on: 2015-01-27 (Initial Advisory)
CVE number: CVE-2014-8370, CVE-2015-1043, CVE-2015-1044

— OPENSSL—
CVE-2014-3513,…

NEW: VMSA-2015-0001 – VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2015-0001
Synopsis:    VMware vCenter Server, ESXi, Workstation, Player, and Fusion
             updates address security issues
Issue date:  2015-01-27
Updated on:  2015-01-27 (Initial Advisory)
CVE number:  CVE-2014-8370, CVE-2015-1043, CVE-2015-1044

             --- OPENSSL---
             CVE-2014-3513, CVE-2014-3567,CVE-2014-3566, CVE-2014-3568

             --- libxml2 ---
             CVE-2014-3660
- ------------------------------------------------------------------------

1. Summary

   VMware vCenter Server, ESXi, Workstation, Player and Fusion address
   several security issues.
 
2. Relevant Releases

   VMware Workstation 10.x prior to version 10.0.5
  
   VMware Player 6.x prior to version 6.0.5

   VMware Fusion 7.x prior to version 7.0.1
   VMware Fusion 6.x prior to version 6.0.5

   vCenter Server 5.5 prior to Update 2d

   ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG
   ESXi 5.1 without patch ESXi510-201404101-SG
   ESXi 5.0 without patch ESXi500-201405101-SG

3. Problem Description 

   a. VMware ESXi, Workstation, Player, and Fusion host privilege
      escalation vulnerability

      VMware ESXi, Workstation, Player and Fusion contain an arbitrary 
      file write issue. Exploitation this issue may allow for privilege
      escalation on the host. 

      The vulnerability does not allow for privilege escalation from 
      the guest Operating System to the host or vice-versa. This means
      that host memory can not be manipulated from the Guest Operating
      System.

      Mitigation
      
      For ESXi to be affected, permissions must have been added to ESXi
      (or a vCenter Server managing it) for a virtual machine 
      administrator role or greater.

      VMware would like to thank Shanon Olsson for reporting this issue to
      us through JPCERT.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2014-8370 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      Workstation    11.x       any       not affected
      Workstation    10.x       any       10.0.5

      Player         7.x        any       not affected
      Player         6.x        any       6.0.5

      Fusion         7.x        any       not affected
      Fusion         6.x        any       6.0.5

      ESXi           5.5        ESXi      ESXi550-201403102-SG
      ESXi           5.1        ESXi      ESXi510-201404101-SG 
      ESXi           5.0        ESXi      ESXi500-201405101-SG

   b. VMware Workstation, Player, and Fusion Denial of Service 
      vulnerability

      VMware Workstation, Player, and Fusion contain an input validation 
      issue in the Host Guest File System (HGFS). This issue may allow
      for a Denial of Service of the Guest Operating system. 

      VMware would like to thank Peter Kamensky from Digital Security for 
      reporting this issue to us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2015-1043 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      Workstation    11.x       any       not affected
      Workstation    10.x       any       10.0.5

      Player         7.x        any       not affected
      Player         6.x        any       6.0.5

      Fusion         7.x        any       7.0.1
      Fusion         6.x        any       6.0.5

   c. VMware ESXi, Workstation, and Player Denial of Service 
      vulnerability

      VMware ESXi, Workstation, and Player contain an input
      validation issue in VMware Authorization process (vmware-authd).
      This issue may allow for a Denial of Service of the host. On 
      VMware ESXi and on Workstation running on Linux the Denial of
      Service would be partial.

      VMware would like to thank Dmitry Yudin < at >ret5et for reporting
      this issue to us through HP's Zero Day Initiative.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2015-1044 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      Workstation    11.x       any       not affected
      Workstation    10.x       any       10.0.5

      Player         7.x        any       not affected
      Player         6.x        any       6.0.5

      Fusion         7.x        any       not affected
      Fusion         6.x        any       not affected

      ESXi           5.5        ESXi      ESXi550-201501101-SG
      ESXi           5.1        ESXi      ESXi510-201410101-SG
      ESXi           5.0        ESXi      not affected

   d. Update to VMware vCenter Server and ESXi for OpenSSL 1.0.1 
      and 0.9.8 package

      The OpenSSL library is updated to version 1.0.1j or 0.9.8zc
      to resolve multiple security issues.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the names CVE-2014-3513, CVE-2014-3567, 
      CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      vCenter Server 5.5        any       Update 2d*
      vCenter Server 5.1        any       patch pending
      vCenter Server 5.0        any       patch pending

      ESXi           5.5        ESXi      ESXi550-201501101-SG       
      ESXi           5.1        ESXi      patch pending
      ESXi           5.0        ESXi      patch pending

      * The VMware vCenter 5.5 SSO component will be 
        updated in a later release
  
   e. Update to ESXi libxml2 package

      The libxml2 library is updated to version libxml2-2.7.6-17
      to resolve a security issue.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the name CVE-2014-3660 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      ESXi           5.5        ESXi      ESXi550-201501101-SG     
      ESXi           5.1        ESXi      patch pending
      ESXi           5.0        ESXi      patch pending
     
4. Solution

   Please review the patch/release notes for your product and 
   version and verify the checksum of your downloaded file. 

   VMware Workstation 10.x
   -------------------------------- 
   https://www.vmware.com/go/downloadworkstation 

   VMware Player 6.x
   --------------------------------     
   https://www.vmware.com/go/downloadplayer 

   VMware Fusion 7.x and 6.x
   --------------------------------     
   https://www.vmware.com/go/downloadplayer 

   vCenter Server
   ----------------------------
   Downloads and Documentation: 
   https://www.vmware.com/go/download-vsphere 

   ESXi 5.5 Update 2d
   ----------------------------
   File: update-from-esxi5.5-5.5_update01.zip
   md5sum: 5773844efc7d8e43135de46801d6ea25
   sha1sum: 6518355d260e81b562c66c5016781db9f077161f
   http://kb.vmware.com/kb/2065832
   update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG

   ESXi 5.5
   ----------------------------
   File: ESXi550-201501001.zip
   md5sum: b0f2edd9ad17d0bae5a11782aaef9304
   sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1
   http://kb.vmware.com/kb/2099265
   ESXi550-201501001.zip contains ESXi550-201501101-SG

   ESXi 5.1
   ----------------------------
   File: ESXi510-201404001.zip
   md5sum: 9dc3c9538de4451244a2b62d247e52c4
   sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66
   http://kb.vmware.com/kb/2070666
   ESXi510-201404001 contains ESXi510-201404101-SG

   ESXi 5.0
   ----------------------------
   File: ESXi500-201405001.zip
   md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d
   sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5
   http://kb.vmware.com/kb/2075521
   ESXi500-201405001 contains  ESXi500-201405101-SG
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8370
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1043
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1044
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660

- ------------------------------------------------------------------------

6. Change log

   2015-01-27 VMSA-2015-0001
   Initial security advisory in conjunction with the release of VMware
   Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d
   and, ESXi 5.5 Patches released on 2015-01-27.

- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2015 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFUyAAUDEcm8Vbi9kMRAqJ1AKC7Lunm2bkxAO7cNCVrGIjKj0sA2ACfaiXz
Sr3Q15TFOOR5wos4xdhR3OI=
=3DtZ
-----END PGP SIGNATURE-----

CESA-2015:0092 Critical CentOS 6 glibc SecurityUpdate

CentOS Errata and Security Advisory 2015:0092 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0092.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
0f0554770d7a565500adf20a0d403376de57f111118c04fed003266e2405598a  glibc-2.12-1.149.el6_6.5.i686.rpm
167bd7bd46bd8cc6005397b1ea5048ee7868a8717935ee6f95e13b00d8f7499c  glibc-common-2.12-1.149.el6_6.5.i686.rpm
d6c144e7cd4b67ecf5eafb02671c0f6f48d27f81df97c35808d2d442c7db582e  glibc-devel-2.12-1.149.el6_6.5.i686.rpm
c9484d79a9aac4a8b706aa17f5edbd51b5e5731fe0afb3e9914b3e83de1e801a  glibc-headers-2.12-1.149.el6_6.5.i686.rpm
250055e2980d905b82597cd8d6ef3e7b1dceec16da836b563bb781dc21d6ad1d  glibc-static-2.12-1.149.el6_6.5.i686.rpm
eea7f375894f8023953705e227ab82ab0fbe99915a4bab8d0e278392b43a1127  glibc-utils-2.12-1.149.el6_6.5.i686.rpm
c66347ad9cf803554e12f0c259f4f67fa6d313d34a58201ea80f67f890c899f9  nscd-2.12-1.149.el6_6.5.i686.rpm

x86_64:
0f0554770d7a565500adf20a0d403376de57f111118c04fed003266e2405598a  glibc-2.12-1.149.el6_6.5.i686.rpm
51df53cceee0f4a7c1cbbc4cea8aecb1910eb1232592e330b6fe467eb2d7b5b5  glibc-2.12-1.149.el6_6.5.x86_64.rpm
65285684336366a98c5ac3c33982c0ccd0d5291563faea655b5fc6f47e8cfa63  glibc-common-2.12-1.149.el6_6.5.x86_64.rpm
d6c144e7cd4b67ecf5eafb02671c0f6f48d27f81df97c35808d2d442c7db582e  glibc-devel-2.12-1.149.el6_6.5.i686.rpm
b6feecfbc9fbb10259c61ab60d7414d5a70c0cdef553fb2a4f14b7468e664160  glibc-devel-2.12-1.149.el6_6.5.x86_64.rpm
803fa33d7f62d944b019a644d1f3b0ec9f9e8aa67fde4c905cd7000939a1f872  glibc-headers-2.12-1.149.el6_6.5.x86_64.rpm
250055e2980d905b82597cd8d6ef3e7b1dceec16da836b563bb781dc21d6ad1d  glibc-static-2.12-1.149.el6_6.5.i686.rpm
3668f99e7d21eea55d9b823e86c735ed946ccf8d4f7d6ca9adb8a5fd348238c8  glibc-static-2.12-1.149.el6_6.5.x86_64.rpm
af41828eb52e0ae5c2d6239943f476cf186118edb4903ff884c5d6cc08665d6a  glibc-utils-2.12-1.149.el6_6.5.x86_64.rpm
bccce013dd1d94c1448eebb5febd25cc8abaa0bcb6b8bf744cf0eb2797b4f2bf  nscd-2.12-1.149.el6_6.5.x86_64.rpm

Source:
35b591c1fa712aba6b334d244374e182e0f1b7c1f85268c9bbc9dde42f4d9fb3  glibc-2.12-1.149.el6_6.5.src.rpm



CESA-2015:0090 Critical CentOS 5 glibc SecurityUpdate

CentOS Errata and Security Advisory 2015:0090 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0090.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
de2d9fe25d7e178d02f19e05b9846218899d9fbee7954647ed7bf20bf82b932a  glibc-2.5-123.el5_11.1.i386.rpm
f6b6314b95cb7a1bdfe076fa2ecbc7726a78fe3861e7c4765e379e45450dd51a  glibc-2.5-123.el5_11.1.i686.rpm
7f42ba356e442e9f9336f12cc3c7bc74720db4064256975ae876267bb68d1d1b  glibc-common-2.5-123.el5_11.1.i386.rpm
2814251a11726dccff4d9c841e9c04ccc327000591cd5354267caf576b1e4bd1  glibc-devel-2.5-123.el5_11.1.i386.rpm
e193b22ed56d39586f7161c02a5e66d0b5ef60785bef4ad00f2bee0fec0e037a  glibc-headers-2.5-123.el5_11.1.i386.rpm
a4ce5b65c002c59a2554df3a10416cb9db08b18a7540ef8b729d6cabb4b93ddc  glibc-utils-2.5-123.el5_11.1.i386.rpm
dc49612fa98f4a4ec9350994dd4e1aadaf696e3b4d3ba3d64c8d0b3d9f61e06d  nscd-2.5-123.el5_11.1.i386.rpm

x86_64:
f6b6314b95cb7a1bdfe076fa2ecbc7726a78fe3861e7c4765e379e45450dd51a  glibc-2.5-123.el5_11.1.i686.rpm
5e4038e4171fd179abb505261f3dcc4b30f5e1951c8ddedb8b0c3255e3eeac00  glibc-2.5-123.el5_11.1.x86_64.rpm
c8c8c040a410d1fe55f5c31987f1e2b8acc0f5395c1fadd333dfbf13fe9eb54d  glibc-common-2.5-123.el5_11.1.x86_64.rpm
2814251a11726dccff4d9c841e9c04ccc327000591cd5354267caf576b1e4bd1  glibc-devel-2.5-123.el5_11.1.i386.rpm
95bc9433ae83d6c0f1d272abf0922e67d294a6660aa31f6b32f2c049339e5c21  glibc-devel-2.5-123.el5_11.1.x86_64.rpm
381d969abd7036451949e4c7782d334865c24011d0cf4a9ebf16d3e0479dde29  glibc-headers-2.5-123.el5_11.1.x86_64.rpm
8f1f673e3dada621cf8ed943565f7bb3d3680497d918eb8dad3ae5d69176af23  glibc-utils-2.5-123.el5_11.1.x86_64.rpm
068c6219a96289c557796aee742b2728397b0bbf4398f53e3eb36e2e4f4aff7b  nscd-2.5-123.el5_11.1.x86_64.rpm

Source:
c4830df76209da0fcd243d24f555a2c2af8345770f53553a83b7d75ad56fc201  glibc-2.5-123.el5_11.1.src.rpm



Linux "Ghost" Remote Code Execution Vulnerability

Original release date: January 27, 2015

The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu and Red Hat. The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement.


This product is provided subject to this Notification and this Privacy & Use policy.