Skip to navigation Skip to main content

Utilities

  • Abonnements
  • Téléchargements
  • Console Red Hat
  • Assistance
Red Hat Customer Portal
  • Abonnements
  • Téléchargements
  • Console Red Hat
  • Assistance
  • Produits

    Produits Phares

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    Tous les produits

    Téléchargements et Conteneurs

    • Téléchargements
    • Packages
    • Containers

    Ressources principales

    • Documentation produits
    • Cycles de vie des produits
    • Conformité produits
    • Errata
  • Base de Connaisances

    Red Hat Knowledge Center

    • Solutions Knowledgebase
    • Articles Knowledgebase
    • Labs Portail Client
    • Errata

    Docs Produits phares

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    Toutes les Docs Produits

    Formation et Certification

    • À Propos
    • Index Cours
    • Index Certification
    • Skill Assessment
  • Sécurité

    Centre de Sécurité des Produits Red Hat

    • Mises à jour de sécurité
    • Alertes de Sécurité
    • Base de données CVE Red Hat
    • Errata

    References

    • Bulletins de sécurité
    • Indices de gravité
    • Données de sécurité

    Top Ressources

    • Labs de sécurité
    • Règles de rétroportage
    • Blog sécurité
  • Support

    Support Red Hat

    • Dossiers d'assistance
    • Résolution de panne
    • Obtenir de l'assistance
    • Contacter Red Hat Support

    Support Communauté Red Hat

    • Communauté Portail Client
    • Discussions Communauté
    • Red Hat Accelerator Program

    Top Ressources

    • Cycles de vie des produits
    • Labs Portail Client
    • Configurations prises en charge par Red Hat Jboss
    • Red Hat Lightspeed
Ou dépanner un problème.

Sélectionnez la langue

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure et gestion

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Informatique Cloud

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Stockage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Intégration et automatisation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
Tous les produits
Errata des produits Red Hat RHSA-2012:1168 - Security Advisory
Publié :
2012-08-14
Mis à jour :
2012-08-14

RHSA-2012:1168 - Security Advisory

  • Aperçu général
  • Paquets mis à jour

Synopsis

Important: condor security update

Type / Sévérité

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identifiez et remédiez aux systèmes concernés par cette alerte.

Voir les systèmes concernés

Sujet

Updated condor packages that fix one security issue are now available for
Red Hat Enterprise MRG 2.1 for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

Condor is a specialized workload management system for compute-intensive
jobs. It provides a job queuing mechanism, scheduling policy, priority
scheme, and resource monitoring and management.

Condor installations that rely solely upon host-based authentication were
vulnerable to an attacker who controls an IP, its reverse-DNS entry and has
knowledge of a target site's security configuration. With this control and
knowledge, the attacker could bypass the target site's host-based
authentication and be authorized to perform privileged actions (i.e.
actions requiring ALLOW_ADMINISTRATOR or ALLOW_WRITE). Condor deployments
using host-based authentication that contain no hostnames (IPs or IP globs
only) or use authentication stronger than host-based are not vulnerable.
(CVE-2012-3416)

Note: Condor will not run jobs as root; therefore, this flaw cannot lead to
a compromise of the root user account.

Red Hat would like to thank Ken Hahn and Dan Bradley for reporting this
issue.

All Red Hat Enterprise MRG 2.1 users are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
Condor must be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Produits concernés

  • MRG Grid 2 for RHEL 5 x86_64
  • MRG Grid 2 for RHEL 5 i386
  • MRG Grid from RHUI 2 for RHEL 5 x86_64

Correctifs

  • BZ - 841175 - CVE-2012-3416 condor: host based authentication does not implement forward-confirmed reverse dns

CVE

  • CVE-2012-3416

Références

  • https://access.redhat.com/security/updates/classification/#important
Remarque: Il existe peut-être des versions plus récentes de ces paquets. Cliquer sur un nom de paquet pour obtenir plus de détails.

MRG Grid 2 for RHEL 5

SRPM
condor-7.6.5-0.14.2.el5.src.rpm SHA-256: bf1536025a2e5201786f5284bdf275ff8442a7bd1b214655cc4267cc681c6dbe
x86_64
condor-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: eb43efb55fbb566cfdf9a5e7ff51c6bac5dddd38ac00c59aee4cc44536f9ea90
condor-aviary-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: f2b6e4d0f930585449cadb1f249cac23c81932fbd6e2bf3815edf96307762c96
condor-classads-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: 9cf13715bc2a9e53fbd958af6ebd51690c1f1040b6002e65d3b2502c5e919fa8
condor-kbdd-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: bd98faa011bd962c5988b20b67b3d70d7da2ec77077d0fc767702be3715f4db8
condor-qmf-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: ac132867262cd8a44b8fb1a22d47ba2dd817ea13bbf431e27d420b6ea682e45a
condor-vm-gahp-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: 27bfa549c5f86cc5ae38b293d7878db76d3d63c629684acc9ebd491e4a7060bf
i386
condor-7.6.5-0.14.2.el5.i386.rpm SHA-256: 114a6d38ec61a567705e2402fb673a5f21a8443f28be12c397b177f41a1919af
condor-aviary-7.6.5-0.14.2.el5.i386.rpm SHA-256: 993d4c43c68d4c155f97a89799d39b7a370f22bd5e5a974199039fdb6e8e414a
condor-classads-7.6.5-0.14.2.el5.i386.rpm SHA-256: 731f55f8b4d28f9111eeebd52eec7dcc25996f90644310e69ae816732c23238a
condor-kbdd-7.6.5-0.14.2.el5.i386.rpm SHA-256: 12e7c2130d93d4bff55704b0b493b34c96ef3cc7cae952766412d466b0b71d0c
condor-qmf-7.6.5-0.14.2.el5.i386.rpm SHA-256: 2fe821b4afe90cfcb8b5418c71c91faa5c9cb45a7315548e5488abbdee88c18d
condor-vm-gahp-7.6.5-0.14.2.el5.i386.rpm SHA-256: 68127f512b34519a42058e3b7602e6d5260b1737f2517b94f2960f4098216235

MRG Grid from RHUI 2 for RHEL 5

SRPM
condor-7.6.5-0.14.2.el5.src.rpm SHA-256: bf1536025a2e5201786f5284bdf275ff8442a7bd1b214655cc4267cc681c6dbe
x86_64
condor-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: eb43efb55fbb566cfdf9a5e7ff51c6bac5dddd38ac00c59aee4cc44536f9ea90
condor-aviary-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: f2b6e4d0f930585449cadb1f249cac23c81932fbd6e2bf3815edf96307762c96
condor-classads-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: 9cf13715bc2a9e53fbd958af6ebd51690c1f1040b6002e65d3b2502c5e919fa8
condor-kbdd-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: bd98faa011bd962c5988b20b67b3d70d7da2ec77077d0fc767702be3715f4db8
condor-qmf-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: ac132867262cd8a44b8fb1a22d47ba2dd817ea13bbf431e27d420b6ea682e45a
condor-vm-gahp-7.6.5-0.14.2.el5.x86_64.rpm SHA-256: 27bfa549c5f86cc5ae38b293d7878db76d3d63c629684acc9ebd491e4a7060bf

Le contact Red Hat Security est secalert@redhat.com. Plus d'infos contact à https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Liens rapides

  • Téléchargements
  • Abonnements
  • Dossiers d'assistance
  • Service client
  • Documentation produit

Aide

  • Nous contacter
  • FAQ du Portail Client
  • Aide relative à la connexion

Informations sur le site

  • Faire confiance à Red Hat
  • Politique de prise en charge des navigateurs
  • Accessibilité
  • Prix & récompenses
  • Colophon

Sites sur le même sujet

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • À propos de Red Hat
  • Jobs
  • Événements
  • Emplacements
  • Contactez Red Hat
  • Blog Red Hat
  • Inclusion at Red Hat
  • Red Hat Cool Shop
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Déclaration de confidentialité
  • Conditions d'utilisation
  • Toutes les politiques et directives
  • Accessibilité numérique