Docker centos:5.11

Vulnerabilities

53 via 53 paths

Dependencies

110

Source

Group 6 Copy Created with Sketch. Docker

Target OS

centos:5
Test your Docker Hub image against our market leading vulnerability database Sign up for free
Severity
  • 37
  • 14
  • 2
Status
  • 53
  • 0
  • 0

high severity

RHSA-2014:1293

  • Vulnerable module: bash
  • Introduced through: bash@3.2-32.el5_9.1
  • Fixed in: 0:3.2-33.el5.1

Detailed paths

  • Introduced through: centos:5.11@* bash@3.2-32.el5_9.1

NVD Description

Note: Versions mentioned in the description apply to the upstream bash package. See Remediation section below for Centos:5 relevant versions.

The GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). Bash is the default shell for Red Hat Enterprise Linux. A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-6271) For additional information on the CVE-2014-6271 flaw, refer to the Knowledgebase article at https://access.redhat.com/articles/1200223 Red Hat would like to thank Stephane Chazelas for reporting this issue. All bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 bash to version 0:3.2-33.el5.1 or higher.

high severity

RHSA-2014:1306

  • Vulnerable module: bash
  • Introduced through: bash@3.2-32.el5_9.1
  • Fixed in: 0:3.2-33.el5_11.4

Detailed paths

  • Introduced through: centos:5.11@* bash@3.2-32.el5_9.1

NVD Description

Note: Versions mentioned in the description apply to the upstream bash package. See Remediation section below for Centos:5 relevant versions.

The GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). Bash is the default shell for Red Hat Enterprise Linux. It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169) Applications which directly create bash functions as environment variables need to be made aware of changes to the way names are handled by this update. Note that certain services, screen sessions, and tmux sessions may need to be restarted, and affected interactive users may need to re-login. Installing these updated packages without restarting services will address the vulnerability, but functionality may be impacted until affected services are restarted. For more information see the Knowledgebase article at https://access.redhat.com/articles/1200223 Note: Docker users are advised to use "yum update" within their containers, and to commit the resulting changes. For additional information on CVE-2014-6271 and CVE-2014-7169, refer to the aforementioned Knowledgebase article. All bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 bash to version 0:3.2-33.el5_11.4 or higher.

high severity

RHSA-2014:1984

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.2

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.2 or higher.

high severity

RHSA-2015:1514

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.3

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jonathan Foote as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.3 or higher.

high severity

RHSA-2015:1706

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.4

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Böck as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.4 or higher.

high severity

RHSA-2015:2656

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.5

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.5 or higher.

high severity

RHSA-2016:0459

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.8

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) Red Hat would like to thank ISC for reporting these issues. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.8 or higher.

high severity

RHSA-2016:1944

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.9

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.9 or higher.

high severity

RHSA-2016:2093

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.10

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.10 or higher.

high severity

RHSA-2016:2141

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.11

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.11 or higher.

high severity

RHSA-2017:0063

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.12

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.12 or higher.

high severity

RHSA-2014:1984

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.2

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.2 or higher.

high severity

RHSA-2015:1514

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.3

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jonathan Foote as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.3 or higher.

high severity

RHSA-2015:1706

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.4

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Böck as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.4 or higher.

high severity

RHSA-2015:2656

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.5

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.5 or higher.

high severity

RHSA-2016:0459

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.8

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) Red Hat would like to thank ISC for reporting these issues. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.8 or higher.

high severity

RHSA-2016:1944

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.9

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.9 or higher.

high severity

RHSA-2016:2093

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.10

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.10 or higher.

high severity

RHSA-2016:2141

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.11

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.11 or higher.

high severity

RHSA-2017:0063

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.12

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.12 or higher.

high severity

RHSA-2015:0090

  • Vulnerable module: glibc
  • Introduced through: glibc@2.5-123
  • Fixed in: 0:2.5-123.el5_11.1

Detailed paths

  • Introduced through: centos:5.11@* glibc@2.5-123

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:5 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235) Red Hat would like to thank Qualys for reporting this issue. All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 glibc to version 0:2.5-123.el5_11.1 or higher.

high severity

RHSA-2017:1479

  • Vulnerable module: glibc
  • Introduced through: glibc@2.5-123
  • Fixed in: 0:2.5-123.el5_11.4

Detailed paths

  • Introduced through: centos:5.11@* glibc@2.5-123

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:5 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.

Remediation

Upgrade Centos:5 glibc to version 0:2.5-123.el5_11.4 or higher.

high severity

RHSA-2015:0090

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.5-123
  • Fixed in: 0:2.5-123.el5_11.1

Detailed paths

  • Introduced through: centos:5.11@* glibc-common@2.5-123

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:5 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235) Red Hat would like to thank Qualys for reporting this issue. All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 glibc-common to version 0:2.5-123.el5_11.1 or higher.

high severity

RHSA-2017:1479

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.5-123
  • Fixed in: 0:2.5-123.el5_11.4

Detailed paths

  • Introduced through: centos:5.11@* glibc-common@2.5-123

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:5 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.

Remediation

Upgrade Centos:5 glibc-common to version 0:2.5-123.el5_11.4 or higher.

high severity

RHSA-2015:1980

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el5_10
  • Fixed in: 0:4.10.8-2.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nspr@4.10.6-1.el5_10

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:5 nspr to version 0:4.10.8-2.el5_11 or higher.

high severity

RHSA-2014:1307

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.16.1-4.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS. (CVE-2014-1568) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Antoine Delignat-Lavaud and Intel Product Security Incident Response Team as the original reporters. All NSS users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, applications using NSS must be restarted for this update to take effect.

Remediation

Upgrade Centos:5 nss to version 0:3.16.1-4.el5_11 or higher.

high severity

RHSA-2014:1948

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.16.2.3-1.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. (BZ#1158159, BZ#1165003, BZ#1165525) Users of nss, nss-util, and nss-softokn are advised to upgrade to these updated packages, which contain a backported patch to mitigate the CVE-2014-3566 issue, fix these bugs, and add these enhancements. After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.

Remediation

Upgrade Centos:5 nss to version 0:3.16.2.3-1.el5_11 or higher.

high severity

RHSA-2015:1980

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.19.1-2.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:5 nss to version 0:3.19.1-2.el5_11 or higher.

high severity

RHSA-2016:0371

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.19.1-4.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2016-1950) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Francis Gabriel as the original reporter. All nss users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all applications linked to the nss library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:5 nss to version 0:3.19.1-4.el5_11 or higher.

high severity

RHSA-2017:1101

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.21.4-1.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane as the original reporter.

Remediation

Upgrade Centos:5 nss to version 0:3.21.4-1.el5_11 or higher.

high severity

RHSA-2015:1840

  • Vulnerable module: openldap
  • Introduced through: openldap@2.3.43-28.el5_10
  • Fixed in: 0:2.3.43-29.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openldap@2.3.43-28.el5_10

NVD Description

Note: Versions mentioned in the description apply to the upstream openldap package. See Remediation section below for Centos:5 relevant versions.

OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap package contains configuration files, libraries, and documentation for OpenLDAP. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908) All openldap users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 openldap to version 0:2.3.43-29.el5_11 or higher.

high severity

RHSA-2016:0302

  • Vulnerable module: openssl
  • Introduced through: openssl@0.9.8e-27.el5_10.4
  • Fixed in: 0:0.9.8e-39.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openssl@0.9.8e-27.el5_10.4

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:5 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) Note: This issue was addressed by disabling the SSLv2 protocol by default when using the 'SSLv23' connection methods, and removing support for weak SSLv2 cipher suites. It is possible to re-enable the SSLv2 protocol in the 'SSLv23' connection methods by default by setting the OPENSSL_ENABLE_SSL2 environment variable before starting an application that needs to have SSLv2 enabled. For more information, refer to the knowledge base article linked to in the References section. A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) Red Hat would like to thank the OpenSSL project for reporting these issues. Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the original reporters of CVE-2016-0800 and CVE-2015-3197; and Guido Vranken as the original reporter of CVE-2016-0797. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:5 openssl to version 0:0.9.8e-39.el5_11 or higher.

high severity

RHSA-2016:1137

  • Vulnerable module: openssl
  • Introduced through: openssl@0.9.8e-27.el5_10.4
  • Fixed in: 0:0.9.8e-40.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openssl@0.9.8e-27.el5_10.4

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:5 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Böck, and David Benjamin (Google) as the original reporters.

Remediation

Upgrade Centos:5 openssl to version 0:0.9.8e-40.el5_11 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: popt
  • Introduced through: popt@1.10.2.3-34.el5
  • Fixed in: 0:1.10.2.3-36.el5_11

Detailed paths

  • Introduced through: centos:5.11@* popt@1.10.2.3-34.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream popt package. See Remediation section below for Centos:5 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:5 popt to version 0:1.10.2.3-36.el5_11 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: rpm
  • Introduced through: rpm@4.4.2.3-34.el5
  • Fixed in: 0:4.4.2.3-36.el5_11

Detailed paths

  • Introduced through: centos:5.11@* rpm@4.4.2.3-34.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm package. See Remediation section below for Centos:5 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:5 rpm to version 0:4.4.2.3-36.el5_11 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: rpm-libs
  • Introduced through: rpm-libs@4.4.2.3-34.el5
  • Fixed in: 0:4.4.2.3-36.el5_11

Detailed paths

  • Introduced through: centos:5.11@* rpm-libs@4.4.2.3-34.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm-libs package. See Remediation section below for Centos:5 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:5 rpm-libs to version 0:4.4.2.3-36.el5_11 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: rpm-python
  • Introduced through: rpm-python@4.4.2.3-34.el5
  • Fixed in: 0:4.4.2.3-36.el5_11

Detailed paths

  • Introduced through: centos:5.11@* rpm-python@4.4.2.3-34.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm-python package. See Remediation section below for Centos:5 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:5 rpm-python to version 0:4.4.2.3-36.el5_11 or higher.

medium severity

RHSA-2016:0073

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.6

Detailed paths

  • Introduced through: centos:5.11@* bind-libs@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-libs to version 30:9.3.6-25.P1.el5_11.6 or higher.

medium severity

RHSA-2016:0073

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@30:9.3.6-20.P1.el5_8.6
  • Fixed in: 30:9.3.6-25.P1.el5_11.6

Detailed paths

  • Introduced through: centos:5.11@* bind-utils@30:9.3.6-20.P1.el5_8.6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:5 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:5 bind-utils to version 30:9.3.6-25.P1.el5_11.6 or higher.

medium severity

RHSA-2015:1627

  • Vulnerable module: glibc
  • Introduced through: glibc@2.5-123
  • Fixed in: 0:2.5-123.el5_11.3

Detailed paths

  • Introduced through: centos:5.11@* glibc@2.5-123

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:5 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. An invalid free flaw was found in glibc's getaddrinfo() function when used with the AI_IDN flag. A remote attacker able to make an application call this function could use this flaw to execute arbitrary code with the permissions of the user running the application. Note that this flaw only affected applications using glibc compiled with libidn support. (CVE-2013-7424) All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 glibc to version 0:2.5-123.el5_11.3 or higher.

medium severity

RHSA-2015:1627

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.5-123
  • Fixed in: 0:2.5-123.el5_11.3

Detailed paths

  • Introduced through: centos:5.11@* glibc-common@2.5-123

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:5 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. An invalid free flaw was found in glibc's getaddrinfo() function when used with the AI_IDN flag. A remote attacker able to make an application call this function could use this flaw to execute arbitrary code with the permissions of the user running the application. Note that this flaw only affected applications using glibc compiled with libidn support. (CVE-2013-7424) All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:5 glibc-common to version 0:2.5-123.el5_11.3 or higher.

medium severity

RHSA-2014:1255

  • Vulnerable module: krb5-libs
  • Introduced through: krb5-libs@1.6.1-78.el5
  • Fixed in: 0:1.6.1-80.el5_11

Detailed paths

  • Introduced through: centos:5.11@* krb5-libs@1.6.1-78.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream krb5-libs package. See Remediation section below for Centos:5 relevant versions.

Kerberos is an authentication system which allows clients and services to authenticate to each other with the help of a trusted third party, a Kerberos Key Distribution Center (KDC). A buffer overflow was found in the KADM5 administration server (kadmind) when it was used with an LDAP back end for the KDC database. A remote, authenticated attacker could potentially use this flaw to execute arbitrary code on the system running kadmind. (CVE-2014-4345) All krb5 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the krb5kdc and kadmind daemons will be restarted automatically.

Remediation

Upgrade Centos:5 krb5-libs to version 0:1.6.1-80.el5_11 or higher.

medium severity

RHSA-2014:1885

  • Vulnerable module: libxml2
  • Introduced through: libxml2@2.6.26-2.1.21.el5_9.3
  • Fixed in: 0:2.6.26-2.1.25.el5_11

Detailed paths

  • Introduced through: centos:5.11@* libxml2@2.6.26-2.1.21.el5_9.3

NVD Description

Note: Versions mentioned in the description apply to the upstream libxml2 package. See Remediation section below for Centos:5 relevant versions.

The libxml2 library is a development toolbox providing the implementation of various XML standards. A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior. (CVE-2014-3660) All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The desktop must be restarted (log out, then log back in) for this update to take effect.

Remediation

Upgrade Centos:5 libxml2 to version 0:2.6.26-2.1.25.el5_11 or higher.

medium severity

RHSA-2016:0684

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el5_10
  • Fixed in: 0:4.11.0-1.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nspr@4.10.6-1.el5_10

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nspr 4.11.0. (BZ#1297944, BZ#1297943) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:5 nspr to version 0:4.11.0-1.el5_11 or higher.

medium severity

RHSA-2015:1664

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.19.1-1.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. It was found that NSS permitted skipping of the ServerKeyExchange packet during a handshake involving ECDHE (Elliptic Curve Diffie-Hellman key Exchange). A remote attacker could use this flaw to bypass the forward-secrecy of a TLS/SSL connection. (CVE-2015-2721) A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Karthikeyan Bhargavan as the original reporter of CVE-2015-2721, and Watson Ladd as the original reporter of CVE-2015-2730. The nss packages have been upgraded to upstream version 3.19.1, which provides a number of bug fixes and enhancements over the previous version. All nss users are advised to upgrade to these updated packages, which correct these issues.

Remediation

Upgrade Centos:5 nss to version 0:3.19.1-1.el5_11 or higher.

medium severity

RHSA-2016:0684

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.21.0-6.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nspr 4.11.0. (BZ#1297944, BZ#1297943) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:5 nss to version 0:3.21.0-6.el5_11 or higher.

medium severity

RHSA-2016:2779

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.21.3-2.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.21.3), nss-util (3.21.3). Security Fix(es): * Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) * A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) * It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635) Red Hat would like to thank the Mozilla project for reporting CVE-2016-2834. The CVE-2016-8635 issue was discovered by Hubert Kario (Red Hat). Upstream acknowledges Tyson Smith and Jed Davis as the original reporter of CVE-2016-2834.

Remediation

Upgrade Centos:5 nss to version 0:3.21.3-2.el5_11 or higher.

medium severity

RHSA-2014:1653

  • Vulnerable module: openssl
  • Introduced through: openssl@0.9.8e-27.el5_10.4
  • Fixed in: 0:0.9.8e-31.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openssl@0.9.8e-27.el5_10.4

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:5 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to mitigate the CVE-2014-3566 issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

Remediation

Upgrade Centos:5 openssl to version 0:0.9.8e-31.el5_11 or higher.

medium severity

RHSA-2015:0800

  • Vulnerable module: openssl
  • Introduced through: openssl@0.9.8e-27.el5_10.4
  • Fixed in: 0:0.9.8e-33.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openssl@0.9.8e-27.el5_10.4

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:5 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method. (CVE-2015-0204) An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input (such as a PEM file) could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292) A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) Multiple flaws were found in the way OpenSSL parsed X.509 certificates. An attacker could use these flaws to modify an X.509 certificate to produce a certificate with a different fingerprint without invalidating its signature, and possibly bypass fingerprint-based blacklisting in applications. (CVE-2014-8275) An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. A remote attacker could possibly use a specially crafted ASN.1 structure that, when parsed by an application, would cause that application to crash. (CVE-2015-0287) A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate handling implementation. A specially crafted X.509 certificate could cause an application using OpenSSL to crash if the application attempted to convert the certificate to a certificate request. (CVE-2015-0288) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw. (CVE-2015-0289) Red Hat would like to thank the OpenSSL project for reporting CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, and CVE-2015-0293. Upstream acknowledges Emilia Käsper of the OpenSSL development team as the original reporter of CVE-2015-0287, Brian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski of Google as the original reporter of CVE-2015-0289, Robert Dugal and David Ramos as the original reporters of CVE-2015-0292, and Sean Burford of Google and Emilia Käsper of the OpenSSL development team as the original reporters of CVE-2015-0293. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:5 openssl to version 0:0.9.8e-33.el5_11 or higher.

medium severity

RHSA-2015:1197

  • Vulnerable module: openssl
  • Introduced through: openssl@0.9.8e-27.el5_10.4
  • Fixed in: 0:0.9.8e-36.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openssl@0.9.8e-27.el5_10.4

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:5 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. Red Hat would like to thank the OpenSSL project for reporting CVE-2015-1789 and CVE-2015-1790. Upstream acknowledges Robert Swiecki and Hanno Böck as the original reporters of CVE-2015-1789, and Michal Zalewski as the original reporter of CVE-2015-1790. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:5 openssl to version 0:0.9.8e-36.el5_11 or higher.

medium severity

RHSA-2015:2616

  • Vulnerable module: openssl
  • Introduced through: openssl@0.9.8e-27.el5_10.4
  • Fixed in: 0:0.9.8e-37.el5_11

Detailed paths

  • Introduced through: centos:5.11@* openssl@0.9.8e-27.el5_10.4

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:5 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) All openssl users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:5 openssl to version 0:0.9.8e-37.el5_11 or higher.

low severity

RHBA-2015:0925

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el5_10
  • Fixed in: 0:4.10.8-1.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nspr@4.10.6-1.el5_10

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss packages have been upgraded to upstream version 3.18.0, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1200905, BZ#1200921) Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:5 nspr to version 0:4.10.8-1.el5_11 or higher.

References

low severity

RHBA-2015:0925

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-2.el5
  • Fixed in: 0:3.18.0-6.el5_11

Detailed paths

  • Introduced through: centos:5.11@* nss@3.16.1-2.el5

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:5 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss packages have been upgraded to upstream version 3.18.0, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1200905, BZ#1200921) Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:5 nss to version 0:3.18.0-6.el5_11 or higher.

References