Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:0035 - Security Advisory
Issued:
2015-01-12
Updated:
2015-01-12

RHSA-2015:0035 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: condor security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated condor packages that fix one security issue are now available for
Red Hat Enterprise MRG 2.5 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

HTCondor is a specialized workload management system for compute-intensive
jobs. It provides a job queuing mechanism, scheduling policy, priority
scheme, and resource monitoring and management.

The HTCondor scheduler can optionally notify a user of completed jobs by
sending an email. Due to the way the daemon sent the email message,
authenticated users able to submit jobs could execute arbitrary code with
the privileges of the condor user. (CVE-2014-8126)

This issue was discovered by Florian Weimer of Red Hat Product Security.

All Red Hat Enterprise MRG 2.5 users are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
HTCondor must be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • MRG Grid 2 for RHEL 6 x86_64
  • MRG Grid 2 for RHEL 6 i386
  • MRG Grid Execute 2 x86_64
  • MRG Grid Execute 2 i386
  • MRG Grid from RHUI 2 for RHEL 6 x86_64

Fixes

  • BZ - RHSA-2015:0035 - CVE-2014-8126 condor: mailx invocation enables code execution as condor user

CVEs

  • CVE-2014-8126

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

MRG Grid 2 for RHEL 6

SRPM
condor-7.8.10-0.2.el6.src.rpm SHA-256: f523ab1688819a96af21e091de13e2f56ffca11400822cb76442487bd39b048e
x86_64
condor-7.8.10-0.2.el6.x86_64.rpm SHA-256: 9841fb84fb496e774d889f10e4e2e8d40ba5a1e8062096e48baada6aebc23a65
condor-aviary-7.8.10-0.2.el6.x86_64.rpm SHA-256: 04a7b5c3e2ff213c7ebb58919e679f77d2422fd1ece32a7d871f1fee18ccff49
condor-classads-7.8.10-0.2.el6.x86_64.rpm SHA-256: 8113142b95ce985505a3d6710d4a7fe085e72c886d0b9d5d94181f1cf55099c9
condor-cluster-resource-agent-7.8.10-0.2.el6.x86_64.rpm SHA-256: 1e150c804ce996247879d92d3773458c73a9ebc5d2eb37a3a74b3900caddddb9
condor-debuginfo-7.8.10-0.2.el6.x86_64.rpm SHA-256: cc02cdcebef3552995e51dca68a59335013b6e0f43b0b24939f0d8e5ee860dde
condor-deltacloud-gahp-7.8.10-0.2.el6.x86_64.rpm SHA-256: 72a223aea04d879517703e0d91aca7b86249c4e2ef935870f2b64e816cb5c3cc
condor-kbdd-7.8.10-0.2.el6.x86_64.rpm SHA-256: ac36b8fc930862ec23d99c29884d0d0e532d762c0877a41a91658d0e0fedbcec
condor-plumage-7.8.10-0.2.el6.x86_64.rpm SHA-256: 01dbabceda9774893d80ca8e734c306684e9bcc1deef12c7c17e6d5824597ce7
condor-qmf-7.8.10-0.2.el6.x86_64.rpm SHA-256: 254b4b7166bfea8fb29a549fe119c58d4f36d68bdc61d8dd70bb062f9f389074
condor-vm-gahp-7.8.10-0.2.el6.x86_64.rpm SHA-256: 8624e1b754302555ce07b59ba3a02502fe05b259eb4ff5720af1ffc9b18a29df
i386
condor-7.8.10-0.2.el6.i686.rpm SHA-256: aed31e3268c721bde79a0b3dabf6d8d8f603df61f740b7cb22ece912451f000c
condor-aviary-7.8.10-0.2.el6.i686.rpm SHA-256: 607e9c2ff7dd3be6f1da1a38ce301894e844ec1a4ec6130e34bdc6845ad6b1b5
condor-classads-7.8.10-0.2.el6.i686.rpm SHA-256: 6e09cd49d0d2655033b985ce5876e913adaa705715bbe72e8c60fb11395b2e40
condor-cluster-resource-agent-7.8.10-0.2.el6.i686.rpm SHA-256: e771fbc16a80924ceed508c5dbdc6f8cc48c8f06714c6cb490c77e96cf3900ff
condor-debuginfo-7.8.10-0.2.el6.i686.rpm SHA-256: 92419828890c11e8dd3cf2145305e55768565d89803620525b2622d411a3085b
condor-kbdd-7.8.10-0.2.el6.i686.rpm SHA-256: 6e4f33df095e32bd553cc2299c219381cf80d39bd485708ddabc40c14a26b9dd
condor-plumage-7.8.10-0.2.el6.i686.rpm SHA-256: f5099385f7acdafc2d3af3fdd99c3f7abbc3250ca4042bc200cfb297a2cd3580
condor-qmf-7.8.10-0.2.el6.i686.rpm SHA-256: 03e9dacd17b81753b21faec08ae56adcf8a8ca1e56c6bdc19fbac330b28945fa

MRG Grid Execute 2

SRPM
condor-7.8.10-0.2.el6.src.rpm SHA-256: f523ab1688819a96af21e091de13e2f56ffca11400822cb76442487bd39b048e
x86_64
condor-7.8.10-0.2.el6.x86_64.rpm SHA-256: 9841fb84fb496e774d889f10e4e2e8d40ba5a1e8062096e48baada6aebc23a65
condor-7.8.10-0.2.el6.x86_64.rpm SHA-256: 9841fb84fb496e774d889f10e4e2e8d40ba5a1e8062096e48baada6aebc23a65
condor-classads-7.8.10-0.2.el6.x86_64.rpm SHA-256: 8113142b95ce985505a3d6710d4a7fe085e72c886d0b9d5d94181f1cf55099c9
condor-classads-7.8.10-0.2.el6.x86_64.rpm SHA-256: 8113142b95ce985505a3d6710d4a7fe085e72c886d0b9d5d94181f1cf55099c9
condor-debuginfo-7.8.10-0.2.el6.x86_64.rpm SHA-256: cc02cdcebef3552995e51dca68a59335013b6e0f43b0b24939f0d8e5ee860dde
condor-debuginfo-7.8.10-0.2.el6.x86_64.rpm SHA-256: cc02cdcebef3552995e51dca68a59335013b6e0f43b0b24939f0d8e5ee860dde
condor-kbdd-7.8.10-0.2.el6.x86_64.rpm SHA-256: ac36b8fc930862ec23d99c29884d0d0e532d762c0877a41a91658d0e0fedbcec
condor-kbdd-7.8.10-0.2.el6.x86_64.rpm SHA-256: ac36b8fc930862ec23d99c29884d0d0e532d762c0877a41a91658d0e0fedbcec
condor-qmf-7.8.10-0.2.el6.x86_64.rpm SHA-256: 254b4b7166bfea8fb29a549fe119c58d4f36d68bdc61d8dd70bb062f9f389074
condor-qmf-7.8.10-0.2.el6.x86_64.rpm SHA-256: 254b4b7166bfea8fb29a549fe119c58d4f36d68bdc61d8dd70bb062f9f389074
condor-vm-gahp-7.8.10-0.2.el6.x86_64.rpm SHA-256: 8624e1b754302555ce07b59ba3a02502fe05b259eb4ff5720af1ffc9b18a29df
condor-vm-gahp-7.8.10-0.2.el6.x86_64.rpm SHA-256: 8624e1b754302555ce07b59ba3a02502fe05b259eb4ff5720af1ffc9b18a29df
i386
condor-7.8.10-0.2.el6.i686.rpm SHA-256: aed31e3268c721bde79a0b3dabf6d8d8f603df61f740b7cb22ece912451f000c
condor-classads-7.8.10-0.2.el6.i686.rpm SHA-256: 6e09cd49d0d2655033b985ce5876e913adaa705715bbe72e8c60fb11395b2e40
condor-debuginfo-7.8.10-0.2.el6.i686.rpm SHA-256: 92419828890c11e8dd3cf2145305e55768565d89803620525b2622d411a3085b
condor-kbdd-7.8.10-0.2.el6.i686.rpm SHA-256: 6e4f33df095e32bd553cc2299c219381cf80d39bd485708ddabc40c14a26b9dd
condor-qmf-7.8.10-0.2.el6.i686.rpm SHA-256: 03e9dacd17b81753b21faec08ae56adcf8a8ca1e56c6bdc19fbac330b28945fa

MRG Grid from RHUI 2 for RHEL 6

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility