Skip to navigation

Bug Fix Advisory libgpg-error enhancement update

Advisory: RHBA-2011:1717-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated libgpg-error package is now available for Red Hat Enterprise Linux 6.

The libgpg-error library provides a set of common error codes and definitions
which are shared by the gnupg, libgcrypt and other packages.

This update adds the following enhancement:

* Previously, the libgpg-error package was compiled without the RELRO (read-only
relocations) flag. Programs provided by this package were thus vulnerable to
various attacks based on overwriting the ELF section of a program. To increase
the security of the libgpg-error library, the libgpg-error spec file has been
modified to use the "-Wl,-z,relro" flags when compiling the package. As a
result, the libgpg-error package is now provided with partial RELRO protection.
(BZ#727287)

Users of libgpg-error are advised to upgrade to this updated package, which adds
this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
libgpg-error-1.7-4.el6.src.rpm     MD5: 922d24c42a6d579d73bcd215f71b26f4
SHA-256: b6c495a2c27b29a3bc7ef88f4e079abed73d05f796b7c920956092e3c775a459
 
IA-32:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
 
x86_64:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-1.7-4.el6.x86_64.rpm     MD5: 0f9eebe3f480ceaed71c7b369eb0bb21
SHA-256: b0380bd8ddd990d11415868134f0beaadd2e134ad8308593b42bd6d1b359e8ef
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-debuginfo-1.7-4.el6.x86_64.rpm     MD5: 715465d811f35e896b647b0a9971f03c
SHA-256: 904a1b06d9abae263000f81f606d6a7358cb5f8c7fa0b0c709cd28e9cdab30ab
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
libgpg-error-devel-1.7-4.el6.x86_64.rpm     MD5: e6f2a79bd64eef992512003af99b0131
SHA-256: 57257f2941370205c3d8f335f8f989ee66f551949bb06b79284c620148fc5485
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
libgpg-error-1.7-4.el6.src.rpm     MD5: 922d24c42a6d579d73bcd215f71b26f4
SHA-256: b6c495a2c27b29a3bc7ef88f4e079abed73d05f796b7c920956092e3c775a459
 
x86_64:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-1.7-4.el6.x86_64.rpm     MD5: 0f9eebe3f480ceaed71c7b369eb0bb21
SHA-256: b0380bd8ddd990d11415868134f0beaadd2e134ad8308593b42bd6d1b359e8ef
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-debuginfo-1.7-4.el6.x86_64.rpm     MD5: 715465d811f35e896b647b0a9971f03c
SHA-256: 904a1b06d9abae263000f81f606d6a7358cb5f8c7fa0b0c709cd28e9cdab30ab
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
libgpg-error-devel-1.7-4.el6.x86_64.rpm     MD5: e6f2a79bd64eef992512003af99b0131
SHA-256: 57257f2941370205c3d8f335f8f989ee66f551949bb06b79284c620148fc5485
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
libgpg-error-1.7-4.el6.src.rpm     MD5: 922d24c42a6d579d73bcd215f71b26f4
SHA-256: b6c495a2c27b29a3bc7ef88f4e079abed73d05f796b7c920956092e3c775a459
 
IA-32:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
 
PPC:
libgpg-error-1.7-4.el6.ppc.rpm     MD5: 5df5efbd390e51b11ff0d7a63f1358a3
SHA-256: 764036d987c03c80ff9662454d3b3b2b5e5589df789331b834f7e01a5478a109
libgpg-error-1.7-4.el6.ppc64.rpm     MD5: f36cf826f10c0d5ca48caedc821df1f5
SHA-256: d58eb614e436a22921db51c84d720fe5928175c6a693f3e176574e6df56f2b4d
libgpg-error-debuginfo-1.7-4.el6.ppc.rpm     MD5: 5f37235a50a69784ccba8341cbf94a52
SHA-256: 5a77fea2804d94a15f4e67c720fe13558e23baaf77facba107398f630e48e04a
libgpg-error-debuginfo-1.7-4.el6.ppc64.rpm     MD5: 1f1506d222784c9959708785a8549672
SHA-256: 14b369e170af473f1fcf8dc9f9a09ca36d85e9e57e6f7a28203339c121c7430a
libgpg-error-devel-1.7-4.el6.ppc.rpm     MD5: 1470f293de715f62c506711ca2aec75c
SHA-256: edc9649815ecf4868e037beab53df46b54888ffd3edbfe1302253b5fd931d268
libgpg-error-devel-1.7-4.el6.ppc64.rpm     MD5: 738665893d7788bb673d1bf388fde76b
SHA-256: 5f7ec6097bcb5d883dea231f75232fbc1d08589876549ec9e51f025a45f3dd78
 
s390x:
libgpg-error-1.7-4.el6.s390.rpm     MD5: a49a06f5c45c49384244fa1e713af12e
SHA-256: f8eea71b0dc1347bd18a058a98f41fe94ef4f9a4848c77e3497315ac690e3837
libgpg-error-1.7-4.el6.s390x.rpm     MD5: f69efbd85d263476eaebe4b06e858662
SHA-256: 8ed60e1786d80c489ad269b4f254d0acb97121c250863c958bd12c9e4c2df193
libgpg-error-debuginfo-1.7-4.el6.s390.rpm     MD5: fc10fddf31069fb42dad8e00eccea7f7
SHA-256: 6235970978a231597b17262c4a67ab3f887a95749b2290c7cba43cc3d1a84a7c
libgpg-error-debuginfo-1.7-4.el6.s390x.rpm     MD5: 01cbdc06114ae6a0fcf75b5a77c60719
SHA-256: 64457790593b8040957911b7b27be3b1dd885fd5d25b9a0d6d45184ac76b8556
libgpg-error-devel-1.7-4.el6.s390.rpm     MD5: abe5a8c590b4be6d9a453f4df4a69230
SHA-256: 1478bbf981fd4049b8de3b33f13802e4a3fe6399dd60d9054144128b17539e6b
libgpg-error-devel-1.7-4.el6.s390x.rpm     MD5: b08d96aa5c234b7d46d33d3356f651b1
SHA-256: 93a93021bd26191e9243efd0d1f1f2e2bc41d76248d0ccba58d2b98d1cecbdb3
 
x86_64:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-1.7-4.el6.x86_64.rpm     MD5: 0f9eebe3f480ceaed71c7b369eb0bb21
SHA-256: b0380bd8ddd990d11415868134f0beaadd2e134ad8308593b42bd6d1b359e8ef
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-debuginfo-1.7-4.el6.x86_64.rpm     MD5: 715465d811f35e896b647b0a9971f03c
SHA-256: 904a1b06d9abae263000f81f606d6a7358cb5f8c7fa0b0c709cd28e9cdab30ab
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
libgpg-error-devel-1.7-4.el6.x86_64.rpm     MD5: e6f2a79bd64eef992512003af99b0131
SHA-256: 57257f2941370205c3d8f335f8f989ee66f551949bb06b79284c620148fc5485
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
libgpg-error-1.7-4.el6.src.rpm     MD5: 922d24c42a6d579d73bcd215f71b26f4
SHA-256: b6c495a2c27b29a3bc7ef88f4e079abed73d05f796b7c920956092e3c775a459
 
IA-32:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
 
x86_64:
libgpg-error-1.7-4.el6.i686.rpm     MD5: ba0a958c9338a08797fb2aa77174d588
SHA-256: 94a5ab8b53ef1012a34872fafdedb4e3ef3c230bad1b18177cfd88c12d6b9dbb
libgpg-error-1.7-4.el6.x86_64.rpm     MD5: 0f9eebe3f480ceaed71c7b369eb0bb21
SHA-256: b0380bd8ddd990d11415868134f0beaadd2e134ad8308593b42bd6d1b359e8ef
libgpg-error-debuginfo-1.7-4.el6.i686.rpm     MD5: 85cc6dbbde8607e8290ce1018939483b
SHA-256: da391a2cb69f6039fd8be168c27a4154274be32ac1d015bd5153c24da18aaaa0
libgpg-error-debuginfo-1.7-4.el6.x86_64.rpm     MD5: 715465d811f35e896b647b0a9971f03c
SHA-256: 904a1b06d9abae263000f81f606d6a7358cb5f8c7fa0b0c709cd28e9cdab30ab
libgpg-error-devel-1.7-4.el6.i686.rpm     MD5: 738a83e94cc011b740e0102fcd048170
SHA-256: ef7e7149d967508d2933afd54ebbc81371eaa04ae9e0781ed4dfdbd3695558ec
libgpg-error-devel-1.7-4.el6.x86_64.rpm     MD5: e6f2a79bd64eef992512003af99b0131
SHA-256: 57257f2941370205c3d8f335f8f989ee66f551949bb06b79284c620148fc5485
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

727291 - Request to recompile libraries with -Wl,-z,relro flags


Keywords

relro


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/