Docker centos:6.6

Vulnerabilities

173 via 173 paths

Dependencies

132

Source

Group 6 Copy Created with Sketch. Docker

Target OS

centos:6
Test your Docker Hub image against our market leading vulnerability database Sign up for free
Severity
  • 88
  • 74
  • 11
Status
  • 173
  • 0
  • 0

high severity

RHSA-2014:1984

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.30.rc1.el6_6.1

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.30.rc1.el6_6.1 or higher.

high severity

RHSA-2015:1471

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure. (CVE-2015-4620) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.37.rc1.el6_7.1 or higher.

high severity

RHSA-2015:1513

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.2

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jonathan Foote as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.37.rc1.el6_7.2 or higher.

high severity

RHSA-2015:1705

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.4

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Böck as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.37.rc1.el6_7.4 or higher.

high severity

RHSA-2015:2655

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.5

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.37.rc1.el6_7.5 or higher.

high severity

RHSA-2016:0459

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.7

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) Red Hat would like to thank ISC for reporting these issues. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.37.rc1.el6_7.7 or higher.

high severity

RHSA-2016:1944

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.1

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.47.rc1.el6_8.1 or higher.

high severity

RHSA-2016:2093

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.2

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.47.rc1.el6_8.2 or higher.

high severity

RHSA-2016:2141

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.3

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.47.rc1.el6_8.3 or higher.

high severity

RHSA-2017:0063

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.4

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.47.rc1.el6_8.4 or higher.

high severity

RHSA-2017:1105

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.1

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3137) * A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3136) Red Hat would like to thank ISC for reporting these issues. Upstream acknowledges Oleg Gorokhov (Yandex) as the original reporter of CVE-2017-3136.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.62.rc1.el6_9.1 or higher.

high severity

RHSA-2017:1202

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.2

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3139) Note: This issue affected only the BIND versions as shipped with Red Hat Enterprise Linux 6. This issue did not affect any upstream versions of BIND.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.62.rc1.el6_9.2 or higher.

high severity

RHSA-2017:1679

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.4

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A flaw was found in the way BIND handled TSIG authentication for dynamic updates. A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request. (CVE-2017-3143) * A flaw was found in the way BIND handled TSIG authentication of AXFR requests. A remote attacker, able to communicate with an authoritative BIND server, could use this flaw to view the entire contents of a zone by sending a specially constructed request packet. (CVE-2017-3142) Red Hat would like to thank Internet Systems Consortium for reporting these issues. Upstream acknowledges Clement Berthaux (Synacktiv) as the original reporter of these issues. Bug Fix(es): * ICANN is planning to perform a Root Zone DNSSEC Key Signing Key (KSK) rollover during October 2017. Maintaining an up-to-date KSK, by adding the new root zone KSK, is essential for ensuring that validating DNS resolvers continue to function following the rollover. (BZ#1458234)

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.62.rc1.el6_9.4 or higher.

high severity

RHSA-2018:0101

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.5

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jayachandran Palanisamy (Cygate AB) as the original reporter.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.62.rc1.el6_9.5 or higher.

high severity

RHSA-2018:2571

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.1

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service (CVE-2018-5740) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) as the original reporter.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.68.rc1.el6_10.1 or higher.

high severity

RHSA-2019:1492

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.3

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.68.rc1.el6_10.3 or higher.

high severity

RHSA-2020:2383

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.7

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) * bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.68.rc1.el6_10.7 or higher.

References

high severity

RHSA-2021:0672

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.10

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.68.rc1.el6_10.10 or higher.

References

high severity

RHSA-2021:1468

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.11

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.68.rc1.el6_10.11 or higher.

References

high severity

RHSA-2014:1984

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.30.rc1.el6_6.1

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.30.rc1.el6_6.1 or higher.

high severity

RHSA-2015:1471

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure. (CVE-2015-4620) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.1 or higher.

high severity

RHSA-2015:1513

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.2

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jonathan Foote as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.2 or higher.

high severity

RHSA-2015:1705

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.4

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Böck as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.4 or higher.

high severity

RHSA-2015:2655

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.5

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.5 or higher.

high severity

RHSA-2016:0459

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.7

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) Red Hat would like to thank ISC for reporting these issues. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.7 or higher.

high severity

RHSA-2016:1944

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.1

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.47.rc1.el6_8.1 or higher.

high severity

RHSA-2016:2093

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.2

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.47.rc1.el6_8.2 or higher.

high severity

RHSA-2016:2141

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.3

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.47.rc1.el6_8.3 or higher.

high severity

RHSA-2017:0063

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.47.rc1.el6_8.4

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) Red Hat would like to thank ISC for reporting this issue.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.47.rc1.el6_8.4 or higher.

high severity

RHSA-2017:1105

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.1

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3137) * A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3136) Red Hat would like to thank ISC for reporting these issues. Upstream acknowledges Oleg Gorokhov (Yandex) as the original reporter of CVE-2017-3136.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.62.rc1.el6_9.1 or higher.

high severity

RHSA-2017:1202

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.2

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3139) Note: This issue affected only the BIND versions as shipped with Red Hat Enterprise Linux 6. This issue did not affect any upstream versions of BIND.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.62.rc1.el6_9.2 or higher.

high severity

RHSA-2017:1679

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.4

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A flaw was found in the way BIND handled TSIG authentication for dynamic updates. A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request. (CVE-2017-3143) * A flaw was found in the way BIND handled TSIG authentication of AXFR requests. A remote attacker, able to communicate with an authoritative BIND server, could use this flaw to view the entire contents of a zone by sending a specially constructed request packet. (CVE-2017-3142) Red Hat would like to thank Internet Systems Consortium for reporting these issues. Upstream acknowledges Clement Berthaux (Synacktiv) as the original reporter of these issues. Bug Fix(es): * ICANN is planning to perform a Root Zone DNSSEC Key Signing Key (KSK) rollover during October 2017. Maintaining an up-to-date KSK, by adding the new root zone KSK, is essential for ensuring that validating DNS resolvers continue to function following the rollover. (BZ#1458234)

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.62.rc1.el6_9.4 or higher.

high severity

RHSA-2018:0101

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6_9.5

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jayachandran Palanisamy (Cygate AB) as the original reporter.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.62.rc1.el6_9.5 or higher.

high severity

RHSA-2018:2571

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.1

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service (CVE-2018-5740) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) as the original reporter.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.68.rc1.el6_10.1 or higher.

high severity

RHSA-2019:1492

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.3

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.68.rc1.el6_10.3 or higher.

high severity

RHSA-2020:2383

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.7

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) * bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.68.rc1.el6_10.7 or higher.

References

high severity

RHSA-2021:0672

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.10

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.68.rc1.el6_10.10 or higher.

References

high severity

RHSA-2021:1468

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.11

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.68.rc1.el6_10.11 or higher.

References

high severity

RHSA-2013:0568

  • Vulnerable module: dbus-glib
  • Introduced through: dbus-glib@0.86-6.el6
  • Fixed in: 0:0.86-6.el6_4

Detailed paths

  • Introduced through: centos:6.6@* dbus-glib@0.86-6.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream dbus-glib package. See Remediation section below for Centos:6 relevant versions.

dbus-glib is an add-on library to integrate the standard D-Bus library with the GLib main loop and threading model. A flaw was found in the way dbus-glib filtered the message sender (message source subject) when the "NameOwnerChanged" signal was received. This could trick a system service using dbus-glib (such as fprintd) into believing a signal was sent from a privileged process, when it was not. A local attacker could use this flaw to escalate their privileges. (CVE-2013-0292) All dbus-glib users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against dbus-glib, such as fprintd and NetworkManager, must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 dbus-glib to version 0:0.86-6.el6_4 or higher.

high severity

RHSA-2019:1726

  • Vulnerable module: dbus-libs
  • Introduced through: dbus-libs@1:1.2.24-7.el6_3
  • Fixed in: 1:1.2.24-11.el6_10

Detailed paths

  • Introduced through: centos:6.6@* dbus-libs@1:1.2.24-7.el6_3

NVD Description

Note: Versions mentioned in the description apply to the upstream dbus-libs package. See Remediation section below for Centos:6 relevant versions.

D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 dbus-libs to version 1:1.2.24-11.el6_10 or higher.

References

high severity

RHSA-2021:2467

  • Vulnerable module: glib2
  • Introduced through: glib2@2.28.8-4.el6
  • Fixed in: 0:2.28.8-11.el6_10

Detailed paths

  • Introduced through: centos:6.6@* glib2@2.28.8-4.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glib2 package. See Remediation section below for Centos:6 relevant versions.

GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 glib2 to version 0:2.28.8-11.el6_10 or higher.

References

high severity

RHSA-2015:0092

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.149.el6_6.5

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235) Red Hat would like to thank Qualys for reporting this issue. All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.149.el6_6.5 or higher.

high severity

RHSA-2016:0175

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.166.el6_7.7

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547) This issue was discovered by the Google Security Team and Red Hat. This update also fixes the following bugs: * The dynamic loader has been enhanced to allow the loading of more shared libraries that make use of static thread local storage. While static thread local storage is the fastest access mechanism it may also prevent the shared library from being loaded at all since the static storage space is a limited and shared process-global resource. Applications which would previously fail with "dlopen: cannot load any more object with static TLS" should now start up correctly. (BZ#1291270) * A bug in the POSIX realtime support would cause asynchronous I/O or certain timer API calls to fail and return errors in the presence of large thread-local storage data that exceeded PTHREAD_STACK_MIN in size (generally 16 KiB). The bug in librt has been corrected and the impacted APIs no longer return errors when large thread-local storage data is present in the application. (BZ#1301625) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.166.el6_7.7 or higher.

high severity

RHSA-2017:1480

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.209.el6_9.2

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.209.el6_9.2 or higher.

high severity

RHSA-2015:0092

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.149.el6_6.5

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235) Red Hat would like to thank Qualys for reporting this issue. All glibc users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.149.el6_6.5 or higher.

high severity

RHSA-2016:0175

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.166.el6_7.7

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547) This issue was discovered by the Google Security Team and Red Hat. This update also fixes the following bugs: * The dynamic loader has been enhanced to allow the loading of more shared libraries that make use of static thread local storage. While static thread local storage is the fastest access mechanism it may also prevent the shared library from being loaded at all since the static storage space is a limited and shared process-global resource. Applications which would previously fail with "dlopen: cannot load any more object with static TLS" should now start up correctly. (BZ#1291270) * A bug in the POSIX realtime support would cause asynchronous I/O or certain timer API calls to fail and return errors in the presence of large thread-local storage data that exceeded PTHREAD_STACK_MIN in size (generally 16 KiB). The bug in librt has been corrected and the impacted APIs no longer return errors when large thread-local storage data is present in the application. (BZ#1301625) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.166.el6_7.7 or higher.

high severity

RHSA-2017:1480

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.209.el6_9.2

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.209.el6_9.2 or higher.

high severity

RHSA-2018:2180

  • Vulnerable module: gnupg2
  • Introduced through: gnupg2@2.0.14-8.el6
  • Fixed in: 0:2.0.14-9.el6_10

Detailed paths

  • Introduced through: centos:6.6@* gnupg2@2.0.14-8.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream gnupg2 package. See Remediation section below for Centos:6 relevant versions.

The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification (CVE-2018-12020) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 gnupg2 to version 0:2.0.14-9.el6_10 or higher.

high severity

RHSA-2019:1652

  • Vulnerable module: libssh2
  • Introduced through: libssh2@1.4.2-1.el6
  • Fixed in: 0:1.4.2-3.el6_10.1

Detailed paths

  • Introduced through: centos:6.6@* libssh2@1.4.2-1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream libssh2 package. See Remediation section below for Centos:6 relevant versions.

The libssh2 packages provide a library that implements the SSH2 protocol. Security Fix(es): * libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855) * libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856) * libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857) * libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 libssh2 to version 0:1.4.2-3.el6_10.1 or higher.

References

high severity

RHSA-2015:1482

  • Vulnerable module: libuser
  • Introduced through: libuser@0.56.13-5.el6
  • Fixed in: 0:0.56.13-8.el6_7

Detailed paths

  • Introduced through: centos:6.6@* libuser@0.56.13-5.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream libuser package. See Remediation section below for Centos:6 relevant versions.

The libuser library implements a standardized interface for manipulating and administering user and group accounts. Sample applications that are modeled after applications from the shadow password suite (shadow-utils) are included in these packages. Two flaws were found in the way the libuser library handled the /etc/passwd file. A local attacker could use an application compiled against libuser (for example, userhelper) to manipulate the /etc/passwd file, which could result in a denial of service or possibly allow the attacker to escalate their privileges to root. (CVE-2015-3245, CVE-2015-3246) Red Hat would like to thank Qualys for reporting these issues. All libuser users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:6 libuser to version 0:0.56.13-8.el6_7 or higher.

high severity

RHSA-2016:1292

  • Vulnerable module: libxml2
  • Introduced through: libxml2@2.7.6-14.el6_5.2
  • Fixed in: 0:2.7.6-21.el6_8.1

Detailed paths

  • Introduced through: centos:6.6@* libxml2@2.7.6-14.el6_5.2

NVD Description

Note: Versions mentioned in the description apply to the upstream libxml2 package. See Remediation section below for Centos:6 relevant versions.

The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2016-1834, CVE-2016-1840) Multiple denial of service flaws were found in libxml2. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, could cause that application to crash. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449)

Remediation

Upgrade Centos:6 libxml2 to version 0:2.7.6-21.el6_8.1 or higher.

high severity

RHSA-2015:1981

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el6_5
  • Fixed in: 0:4.10.8-2.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nspr@4.10.6-1.el6_5

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss, nss-util and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 nspr to version 0:4.10.8-2.el6_7 or higher.

high severity

RHSA-2014:1948

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.16.2.3-3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. (BZ#1158159, BZ#1165003, BZ#1165525) Users of nss, nss-util, and nss-softokn are advised to upgrade to these updated packages, which contain a backported patch to mitigate the CVE-2014-3566 issue, fix these bugs, and add these enhancements. After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 nss to version 0:3.16.2.3-3.el6_6 or higher.

high severity

RHSA-2015:1981

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.19.1-5.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss, nss-util and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 nss to version 0:3.19.1-5.el6_7 or higher.

high severity

RHSA-2017:1100

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.28.4-1.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). Security Fix(es): * An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane as the original reporter.

Remediation

Upgrade Centos:6 nss to version 0:3.28.4-1.el6_9 or higher.

high severity

RHSA-2017:1364

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.28.4-3.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) Bug Fix(es): * The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1448488)

Remediation

Upgrade Centos:6 nss to version 0:3.28.4-3.el6_9 or higher.

high severity

RHSA-2017:2832

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.28.4-4.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application. (CVE-2017-7805) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Martin Thomson as the original reporter.

Remediation

Upgrade Centos:6 nss to version 0:3.28.4-4.el6_9 or higher.

high severity

RHSA-2019:4152

  • Vulnerable module: nss-softokn
  • Introduced through: nss-softokn@3.14.3-17.el6
  • Fixed in: 0:3.44.0-6.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-softokn@3.14.3-17.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-softokn package. See Remediation section below for Centos:6 relevant versions.

The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 nss-softokn to version 0:3.44.0-6.el6_10 or higher.

References

high severity

RHSA-2019:4152

  • Vulnerable module: nss-softokn-freebl
  • Introduced through: nss-softokn-freebl@3.14.3-17.el6
  • Fixed in: 0:3.44.0-6.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-softokn-freebl@3.14.3-17.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-softokn-freebl package. See Remediation section below for Centos:6 relevant versions.

The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. Security Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 nss-softokn-freebl to version 0:3.44.0-6.el6_10 or higher.

References

high severity

RHSA-2014:1948

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.16.2.3-3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. (BZ#1158159, BZ#1165003, BZ#1165525) Users of nss, nss-util, and nss-softokn are advised to upgrade to these updated packages, which contain a backported patch to mitigate the CVE-2014-3566 issue, fix these bugs, and add these enhancements. After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.16.2.3-3.el6_6 or higher.

high severity

RHSA-2015:1981

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.19.1-5.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss, nss-util and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.19.1-5.el6_7 or higher.

high severity

RHSA-2017:1100

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.28.4-1.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). Security Fix(es): * An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane as the original reporter.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.28.4-1.el6_9 or higher.

high severity

RHSA-2017:1364

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.28.4-3.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) Bug Fix(es): * The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1448488)

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.28.4-3.el6_9 or higher.

high severity

RHSA-2017:2832

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.28.4-4.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application. (CVE-2017-7805) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Martin Thomson as the original reporter.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.28.4-4.el6_9 or higher.

high severity

RHSA-2014:1948

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.16.2.3-3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. (BZ#1158159, BZ#1165003, BZ#1165525) Users of nss, nss-util, and nss-softokn are advised to upgrade to these updated packages, which contain a backported patch to mitigate the CVE-2014-3566 issue, fix these bugs, and add these enhancements. After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.16.2.3-3.el6_6 or higher.

high severity

RHSA-2015:1981

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.19.1-5.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss, nss-util and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.19.1-5.el6_7 or higher.

high severity

RHSA-2017:1100

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.28.4-1.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). Security Fix(es): * An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane as the original reporter.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.28.4-1.el6_9 or higher.

high severity

RHSA-2017:1364

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.28.4-3.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) Bug Fix(es): * The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, Red Hat recommends installing the updated CA list on June 12, 2017. (BZ#1448488)

Remediation

Upgrade Centos:6 nss-tools to version 0:3.28.4-3.el6_9 or higher.

high severity

RHSA-2017:2832

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.28.4-4.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application. (CVE-2017-7805) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Martin Thomson as the original reporter.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.28.4-4.el6_9 or higher.

high severity

RHSA-2014:1948

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.16.2.3-2.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 The nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2.3, which provides a number of bug fixes and enhancements over the previous version, and adds the support for Mozilla Firefox 31.3. (BZ#1158159, BZ#1165003, BZ#1165525) Users of nss, nss-util, and nss-softokn are advised to upgrade to these updated packages, which contain a backported patch to mitigate the CVE-2014-3566 issue, fix these bugs, and add these enhancements. After installing this update, applications using NSS or NSPR must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 nss-util to version 0:3.16.2.3-2.el6_6 or higher.

high severity

RHSA-2015:1981

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.19.1-2.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Tyson Smith, David Keeler and Ryan Sleevi as the original reporter. All nss, nss-util and nspr users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 nss-util to version 0:3.19.1-2.el6_7 or higher.

high severity

RHSA-2016:0370

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.19.1-5.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util package provides a set of utilities for NSS and the Softoken module. A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2016-1950) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Francis Gabriel as the original reporter. All nss-util users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all applications linked to the nss and nss-util library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 nss-util to version 0:3.19.1-5.el6_7 or higher.

high severity

RHSA-2017:1100

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.28.4-1.el6_9

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). Security Fix(es): * An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ronald Crane as the original reporter.

Remediation

Upgrade Centos:6 nss-util to version 0:3.28.4-1.el6_9 or higher.

high severity

RHSA-2015:1840

  • Vulnerable module: openldap
  • Introduced through: openldap@2.4.39-8.el6
  • Fixed in: 0:2.4.40-6.el6_7

Detailed paths

  • Introduced through: centos:6.6@* openldap@2.4.39-8.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openldap package. See Remediation section below for Centos:6 relevant versions.

OpenLDAP is an open source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap package contains configuration files, libraries, and documentation for OpenLDAP. A flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908) All openldap users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:6 openldap to version 0:2.4.40-6.el6_7 or higher.

high severity

RHSA-2014:1652

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-30.el6_6.2

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. (CVE-2014-3513) A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567) All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to mitigate the CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-30.el6_6.2 or higher.

high severity

RHSA-2016:0301

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-42.el6_7.4

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) Note: This issue was addressed by disabling the SSLv2 protocol by default when using the 'SSLv23' connection methods, and removing support for weak SSLv2 cipher suites. For more information, refer to the knowledge base article linked to in the References section. A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim's thread that is performing decryption, could use this flaw to recover RSA private keys. (CVE-2016-0702) A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705) An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) Red Hat would like to thank the OpenSSL project for reporting these issues. Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the original reporters of CVE-2016-0800 and CVE-2015-3197; Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705; Yuval Yarom (University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), Nadia Heninger (University of Pennsylvania) as the original reporters of CVE-2016-0702; and Guido Vranken as the original reporter of CVE-2016-0797. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-42.el6_7.4 or higher.

high severity

RHSA-2016:0996

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-48.el6_8.1

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) * Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106) * It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107) * Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842) * A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Böck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as the original reporter of CVE-2016-2107.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-48.el6_8.1 or higher.

high severity

RHSA-2016:1940

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-48.el6_8.3

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) * It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178) * It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. (CVE-2016-2179) * A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181) * An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code. (CVE-2016-2182) * A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default. * An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets. (CVE-2016-6302) * Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177) * An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. (CVE-2016-2180) * Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and CVE-2016-6306 and OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304 and CVE-2016-6306; and Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-48.el6_8.3 or higher.

high severity

RHSA-2021:0056

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-59.el6_10

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-59.el6_10 or higher.

References

high severity

RHSA-2016:2702

  • Vulnerable module: policycoreutils
  • Introduced through: policycoreutils@2.0.83-19.47.el6
  • Fixed in: 0:2.0.83-30.1.el6_8

Detailed paths

  • Introduced through: centos:6.6@* policycoreutils@2.0.83-19.47.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream policycoreutils package. See Remediation section below for Centos:6 relevant versions.

The policycoreutils packages contain the core policy utilities required to manage a SELinux environment. Security Fix(es): * It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox. (CVE-2016-7545)

Remediation

Upgrade Centos:6 policycoreutils to version 0:2.0.83-30.1.el6_8 or higher.

high severity

RHSA-2018:1777

  • Vulnerable module: procps
  • Introduced through: procps@3.2.8-30.el6
  • Fixed in: 0:3.2.8-45.el6_9.3

Detailed paths

  • Introduced through: centos:6.6@* procps@3.2.8-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream procps package. See Remediation section below for Centos:6 relevant versions.

The procps packages contain a set of system utilities that provide system information. The procps packages include the following utilities: ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, pwdx, sysctl, pmap, and slabtop. Security Fix(es): * procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124) * procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Qualys Research Labs for reporting these issues.

Remediation

Upgrade Centos:6 procps to version 0:3.2.8-45.el6_9.3 or higher.

high severity

RHSA-2019:1467

  • Vulnerable module: python
  • Introduced through: python@2.6.6-52.el6
  • Fixed in: 0:2.6.6-68.el6_10

Detailed paths

  • Introduced through: centos:6.6@* python@2.6.6-52.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream python package. See Remediation section below for Centos:6 relevant versions.

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 python to version 0:2.6.6-68.el6_10 or higher.

high severity

RHSA-2019:1467

  • Vulnerable module: python-libs
  • Introduced through: python-libs@2.6.6-52.el6
  • Fixed in: 0:2.6.6-68.el6_10

Detailed paths

  • Introduced through: centos:6.6@* python-libs@2.6.6-52.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream python-libs package. See Remediation section below for Centos:6 relevant versions.

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 python-libs to version 0:2.6.6-68.el6_10 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: rpm
  • Introduced through: rpm@4.8.0-37.el6
  • Fixed in: 0:4.8.0-38.el6_6

Detailed paths

  • Introduced through: centos:6.6@* rpm@4.8.0-37.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm package. See Remediation section below for Centos:6 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 rpm to version 0:4.8.0-38.el6_6 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: rpm-libs
  • Introduced through: rpm-libs@4.8.0-37.el6
  • Fixed in: 0:4.8.0-38.el6_6

Detailed paths

  • Introduced through: centos:6.6@* rpm-libs@4.8.0-37.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm-libs package. See Remediation section below for Centos:6 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 rpm-libs to version 0:4.8.0-38.el6_6 or higher.

high severity

RHSA-2014:1974

  • Vulnerable module: rpm-python
  • Introduced through: rpm-python@4.8.0-37.el6
  • Fixed in: 0:4.8.0-38.el6_6

Detailed paths

  • Introduced through: centos:6.6@* rpm-python@4.8.0-37.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream rpm-python package. See Remediation section below for Centos:6 relevant versions.

The RPM Package Manager (RPM) is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. (CVE-2013-6435) This issue was discovered by Florian Weimer of Red Hat Product Security. All rpm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against the RPM library must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 rpm-python to version 0:4.8.0-38.el6_6 or higher.

high severity

RHSA-2019:1774

  • Vulnerable module: vim-minimal
  • Introduced through: vim-minimal@2:7.2.411-1.8.el6
  • Fixed in: 2:7.4.629-5.el6_10.2

Detailed paths

  • Introduced through: centos:6.6@* vim-minimal@2:7.2.411-1.8.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream vim-minimal package. See Remediation section below for Centos:6 relevant versions.

Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 vim-minimal to version 2:7.4.629-5.el6_10.2 or higher.

References

high severity

RHSA-2018:2284

  • Vulnerable module: yum-plugin-fastestmirror
  • Introduced through: yum-plugin-fastestmirror@1.1.30-30.el6
  • Fixed in: 0:1.1.30-42.el6_10

Detailed paths

  • Introduced through: centos:6.6@* yum-plugin-fastestmirror@1.1.30-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream yum-plugin-fastestmirror package. See Remediation section below for Centos:6 relevant versions.

The yum-utils packages provide a collection of utilities and examples for the yum package manager to make yum easier and more powerful to use. Security Fix(es): * yum-utils: reposync: improper path validation may lead to directory traversal (CVE-2018-10897) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Jay Grizzard (Clover Network) and Aaron Levy (Clover Network) for reporting this issue.

Remediation

Upgrade Centos:6 yum-plugin-fastestmirror to version 0:1.1.30-42.el6_10 or higher.

medium severity

RHSA-2017:0725

  • Vulnerable module: bash
  • Introduced through: bash@4.1.2-29.el6
  • Fixed in: 0:4.1.2-48.el6

Detailed paths

  • Introduced through: centos:6.6@* bash@4.1.2-29.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bash package. See Remediation section below for Centos:6 relevant versions.

The bash packages provide Bash (Bourne-again shell), which is the default shell for Red Hat Enterprise Linux. Security Fix(es): * An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances. (CVE-2016-0634) * An arbitrary command injection flaw was found in the way bash processed the SHELLOPTS and PS4 environment variables. A local, authenticated attacker could use this flaw to exploit poorly written setuid programs to elevate their privileges under certain circumstances. (CVE-2016-7543) * A denial of service flaw was found in the way bash handled popd commands. A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session. (CVE-2016-9401) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 bash to version 0:4.1.2-48.el6 or higher.

medium severity

RHBA-2017:0651

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. Users of bind are advised to upgrade to these updated packages.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.62.rc1.el6 or higher.

References

medium severity

RHSA-2015:0672

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.30.rc1.el6_6.2

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled trust anchor management. A remote attacker could use this flaw to cause the BIND daemon (named) to crash under certain conditions. (CVE-2015-1349) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.30.rc1.el6_6.2 or higher.

medium severity

RHSA-2016:0073

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.6

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.37.rc1.el6_7.6 or higher.

medium severity

RHSA-2020:4183

  • Vulnerable module: bind-libs
  • Introduced through: bind-libs@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.8

Detailed paths

  • Introduced through: centos:6.6@* bind-libs@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-libs package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: truncated TSIG response can lead to an assertion failure (CVE-2020-8622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-libs to version 32:9.8.2-0.68.rc1.el6_10.8 or higher.

References

medium severity

RHBA-2017:0651

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.62.rc1.el6

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section. Users of bind are advised to upgrade to these updated packages.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.62.rc1.el6 or higher.

References

medium severity

RHSA-2015:0672

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.30.rc1.el6_6.2

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled trust anchor management. A remote attacker could use this flaw to cause the BIND daemon (named) to crash under certain conditions. (CVE-2015-1349) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.30.rc1.el6_6.2 or higher.

medium severity

RHSA-2016:0073

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.37.rc1.el6_7.6

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) Red Hat would like to thank ISC for reporting this issue. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.6 or higher.

medium severity

RHSA-2020:4183

  • Vulnerable module: bind-utils
  • Introduced through: bind-utils@32:9.8.2-0.30.rc1.el6
  • Fixed in: 32:9.8.2-0.68.rc1.el6_10.8

Detailed paths

  • Introduced through: centos:6.6@* bind-utils@32:9.8.2-0.30.rc1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream bind-utils package. See Remediation section below for Centos:6 relevant versions.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: truncated TSIG response can lead to an assertion failure (CVE-2020-8622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.68.rc1.el6_10.8 or higher.

References

medium severity

RHSA-2017:0654

  • Vulnerable module: coreutils
  • Introduced through: coreutils@8.4-37.el6
  • Fixed in: 0:8.4-46.el6

Detailed paths

  • Introduced through: centos:6.6@* coreutils@8.4-37.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream coreutils package. See Remediation section below for Centos:6 relevant versions.

The coreutils packages contain the GNU Core Utilities and represent a combination of the previously used GNU fileutils, sh-utils, and textutils packages. Security Fix(es): * A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616) Red Hat would like to thank Tobias Stöckmann for reporting this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 coreutils to version 0:8.4-46.el6 or higher.

medium severity

RHSA-2017:0654

  • Vulnerable module: coreutils-libs
  • Introduced through: coreutils-libs@8.4-37.el6
  • Fixed in: 0:8.4-46.el6

Detailed paths

  • Introduced through: centos:6.6@* coreutils-libs@8.4-37.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream coreutils-libs package. See Remediation section below for Centos:6 relevant versions.

The coreutils packages contain the GNU Core Utilities and represent a combination of the previously used GNU fileutils, sh-utils, and textutils packages. Security Fix(es): * A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616) Red Hat would like to thank Tobias Stöckmann for reporting this issue. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 coreutils-libs to version 0:8.4-46.el6 or higher.

medium severity

RHSA-2015:1254

  • Vulnerable module: curl
  • Introduced through: curl@7.19.7-37.el6_5.3
  • Fixed in: 0:7.19.7-46.el6

Detailed paths

  • Introduced through: centos:6.6@* curl@7.19.7-37.el6_5.3

NVD Description

Note: Versions mentioned in the description apply to the upstream curl package. See Remediation section below for Centos:6 relevant versions.

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. It was found that the libcurl library did not correctly handle partial literal IP addresses when parsing received HTTP cookies. An attacker able to trick a user into connecting to a malicious server could use this flaw to set the user's cookie to a crafted domain, making other cookie-related issues easier to exploit. (CVE-2014-3613) A flaw was found in the way the libcurl library performed the duplication of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS option for a handle, using the handle's duplicate could cause the application to crash or disclose a portion of its memory. (CVE-2014-3707) It was discovered that the libcurl library failed to properly handle URLs with embedded end-of-line characters. An attacker able to make an application using libcurl to access a specially crafted URL via an HTTP proxy could use this flaw to inject additional headers to the request or construct additional requests. (CVE-2014-8150) It was discovered that libcurl implemented aspects of the NTLM and Negotatiate authentication incorrectly. If an application uses libcurl and the affected mechanisms in a specifc way, certain requests to a previously NTLM-authenticated server could appears as sent by the wrong authenticated user. Additionally, the initial set of credentials for HTTP Negotiate-authenticated requests could be reused in subsequent requests, although a different set of credentials was specified. (CVE-2015-3143, CVE-2015-3148) Red Hat would like to thank the cURL project for reporting these issues. Bug fixes: * An out-of-protocol fallback to SSL version 3.0 (SSLv3.0) was available with libcurl. Attackers could abuse the fallback to force downgrade of the SSL version. The fallback has been removed from libcurl. Users requiring this functionality can explicitly enable SSLv3.0 through the libcurl API. (BZ#1154059) * A single upload transfer through the FILE protocol opened the destination file twice. If the inotify kernel subsystem monitored the file, two events were produced unnecessarily. The file is now opened only once per upload. (BZ#883002) * Utilities using libcurl for SCP/SFTP transfers could terminate unexpectedly when the system was running in FIPS mode. (BZ#1008178) * Using the "--retry" option with the curl utility could cause curl to terminate unexpectedly with a segmentation fault. Now, adding "--retry" no longer causes curl to crash. (BZ#1009455) * The "curl --trace-time" command did not use the correct local time when printing timestamps. Now, "curl --trace-time" works as expected. (BZ#1120196) * The valgrind utility could report dynamically allocated memory leaks on curl exit. Now, curl performs a global shutdown of the NetScape Portable Runtime (NSPR) library on exit, and valgrind no longer reports the memory leaks. (BZ#1146528) * Previously, libcurl returned an incorrect value of the CURLINFO_HEADER_SIZE field when a proxy server appended its own headers to the HTTP response. Now, the returned value is valid. (BZ#1161163) Enhancements: * The "--tlsv1.0", "--tlsv1.1", and "--tlsv1.2" options are available for specifying the minor version of the TLS protocol to be negotiated by NSS. The "--tlsv1" option now negotiates the highest version of the TLS protocol supported by both the client and the server. (BZ#1012136) * It is now possible to explicitly enable or disable the ECC and the new AES cipher suites to be used for TLS. (BZ#1058767, BZ#1156422) All curl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.

Remediation

Upgrade Centos:6 curl to version 0:7.19.7-46.el6 or higher.

medium severity

RHSA-2017:0847

  • Vulnerable module: curl
  • Introduced through: curl@7.19.7-37.el6_5.3
  • Fixed in: 0:7.19.7-53.el6_9

Detailed paths

  • Introduced through: centos:6.6@* curl@7.19.7-37.el6_5.3

NVD Description

Note: Versions mentioned in the description apply to the upstream curl package. See Remediation section below for Centos:6 relevant versions.

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. (CVE-2017-2628) This issue was discovered by Paulo Andrade (Red Hat).

Remediation

Upgrade Centos:6 curl to version 0:7.19.7-53.el6_9 or higher.

medium severity

RHSA-2016:2824

  • Vulnerable module: expat
  • Introduced through: expat@2.0.1-11.el6_2
  • Fixed in: 0:2.0.1-13.el6_8

Detailed paths

  • Introduced through: centos:6.6@* expat@2.0.1-11.el6_2

NVD Description

Note: Versions mentioned in the description apply to the upstream expat package. See Remediation section below for Centos:6 relevant versions.

Expat is a C library for parsing XML documents. Security Fix(es): * An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718) Red Hat would like to thank Gustavo Grieco for reporting this issue.

Remediation

Upgrade Centos:6 expat to version 0:2.0.1-13.el6_8 or higher.

medium severity

RHSA-2016:0760

  • Vulnerable module: file-libs
  • Introduced through: file-libs@5.04-21.el6
  • Fixed in: 0:5.04-30.el6

Detailed paths

  • Introduced through: centos:6.6@* file-libs@5.04-21.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream file-libs package. See Remediation section below for Centos:6 relevant versions.

The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats. Security Fix(es): * Multiple flaws were found in the file regular expression rules for detecting various files. A remote attacker could use these flaws to cause file to consume an excessive amount of CPU. (CVE-2014-3538) * A denial of service flaw was found in the way file parsed certain Composite Document Format (CDF) files. A remote attacker could use this flaw to crash file via a specially crafted CDF file. (CVE-2014-3587) * Multiple flaws were found in the way file parsed Executable and Linkable Format (ELF) files. A remote attacker could use these flaws to cause file to crash, disclose portions of its memory, or consume an excessive amount of system resources. (CVE-2014-3710, CVE-2014-8116, CVE-2014-8117, CVE-2014-9620, CVE-2014-9653) Red Hat would like to thank Thomas Jarosch (Intra2net AG) for reporting CVE-2014-8116 and CVE-2014-8117. The CVE-2014-3538 issue was discovered by Jan Kaluža (Red Hat Web Stack Team) and the CVE-2014-3710 issue was discovered by Francisco Alonso (Red Hat Product Security). For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 file-libs to version 0:5.04-30.el6 or higher.

medium severity

RHSA-2015:0016

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.149.el6_6.4

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. An out-of-bounds read flaw was found in the way glibc's iconv() function converted certain encoded data to UTF-8. An attacker able to make an application call the iconv() function with a specially crafted argument could use this flaw to crash that application. (CVE-2014-6040) It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application. (CVE-2014-7817) The CVE-2014-7817 issue was discovered by Tim Waugh of the Red Hat Developer Experience Team. This update also fixes the following bugs: * Previously, when an address lookup using the getaddrinfo() function for the AF_UNSPEC value was performed on a defective DNS server, the server in some cases responded with a valid response for the A record, but a referral response for the AAAA record, which resulted in a lookup failure. A prior update was implemented for getaddrinfo() to return the valid response, but it contained a typographical error, due to which the lookup could under some circumstances still fail. This error has been corrected and getaddrinfo() now returns a valid response in the described circumstances. (BZ#1172023) * An error in the dlopen() library function previously caused recursive calls to dlopen() to terminate unexpectedly or to abort with a library assertion. This error has been fixed and recursive calls to dlopen() no longer crash or abort. (BZ#1173469) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.149.el6_6.4 or higher.

medium severity

RHSA-2015:0863

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.149.el6_6.7

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. This update also fixes the following bug: * Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data. (BZ#1194149) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.149.el6_6.7 or higher.

medium severity

RHSA-2017:0680

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.209.el6

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) * An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.209.el6 or higher.

medium severity

RHSA-2018:1879

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.212.el6

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Buffer overflow in glob with GLOB_TILDE (CVE-2017-15670) * glibc: Buffer overflow during unescaping of user names with the ~ operator (CVE-2017-15804) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.10 Release Notes and Red Hat Enterprise Linux 6.10 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.212.el6 or higher.

medium severity

RHSA-2015:0016

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.149.el6_6.4

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. An out-of-bounds read flaw was found in the way glibc's iconv() function converted certain encoded data to UTF-8. An attacker able to make an application call the iconv() function with a specially crafted argument could use this flaw to crash that application. (CVE-2014-6040) It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application. (CVE-2014-7817) The CVE-2014-7817 issue was discovered by Tim Waugh of the Red Hat Developer Experience Team. This update also fixes the following bugs: * Previously, when an address lookup using the getaddrinfo() function for the AF_UNSPEC value was performed on a defective DNS server, the server in some cases responded with a valid response for the A record, but a referral response for the AAAA record, which resulted in a lookup failure. A prior update was implemented for getaddrinfo() to return the valid response, but it contained a typographical error, due to which the lookup could under some circumstances still fail. This error has been corrected and getaddrinfo() now returns a valid response in the described circumstances. (BZ#1172023) * An error in the dlopen() library function previously caused recursive calls to dlopen() to terminate unexpectedly or to abort with a library assertion. This error has been fixed and recursive calls to dlopen() no longer crash or abort. (BZ#1173469) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.149.el6_6.4 or higher.

medium severity

RHSA-2015:0863

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.149.el6_6.7

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. This update also fixes the following bug: * Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data. (BZ#1194149) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.149.el6_6.7 or higher.

medium severity

RHSA-2017:0680

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.209.el6

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) * An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779) Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.209.el6 or higher.

medium severity

RHSA-2018:1879

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.212.el6

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Buffer overflow in glob with GLOB_TILDE (CVE-2017-15670) * glibc: Buffer overflow during unescaping of user names with the ~ operator (CVE-2017-15804) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.10 Release Notes and Red Hat Enterprise Linux 6.10 Technical Notes linked from the References section.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.212.el6 or higher.

medium severity

RHSA-2015:0794

  • Vulnerable module: krb5-libs
  • Introduced through: krb5-libs@1.10.3-33.el6
  • Fixed in: 0:1.10.3-37.el6_6

Detailed paths

  • Introduced through: centos:6.6@* krb5-libs@1.10.3-33.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream krb5-libs package. See Remediation section below for Centos:6 relevant versions.

Kerberos is a networked authentication system which allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos KDC. The following security issues are fixed with this release: A use-after-free flaw was found in the way the MIT Kerberos libgssapi_krb5 library processed valid context deletion tokens. An attacker able to make an application using the GSS-API library (libgssapi) could call the gss_process_context_token() function and use this flaw to crash that application. (CVE-2014-5352) If kadmind were used with an LDAP back end for the KDC database, a remote, authenticated attacker who has the permissions to set the password policy could crash kadmind by attempting to use a named ticket policy object as a password policy for a principal. (CVE-2014-5353) It was found that the krb5_read_message() function of MIT Kerberos did not correctly sanitize input, and could create invalid krb5_data objects. A remote, unauthenticated attacker could use this flaw to crash a Kerberos child process via a specially crafted request. (CVE-2014-5355) A double-free flaw was found in the way MIT Kerberos handled invalid External Data Representation (XDR) data. An authenticated user could use this flaw to crash the MIT Kerberos administration server (kadmind), or other applications using Kerberos libraries, via specially crafted XDR packets. (CVE-2014-9421) It was found that the MIT Kerberos administration server (kadmind) incorrectly accepted certain authentication requests for two-component server principal names. A remote attacker able to acquire a key with a particularly named principal (such as "kad/x") could use this flaw to impersonate any user to kadmind, and perform administrative actions as that user. (CVE-2014-9422) Red Hat would like to thank the MIT Kerberos project for reporting CVE-2014-5352, CVE-2014-9421, and CVE-2014-9422. The MIT Kerberos project acknowledges Nico Williams for assisting with the analysis of CVE-2014-5352. All krb5 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Remediation

Upgrade Centos:6 krb5-libs to version 0:1.10.3-37.el6_6 or higher.

medium severity

RHSA-2016:0493

  • Vulnerable module: krb5-libs
  • Introduced through: krb5-libs@1.10.3-33.el6
  • Fixed in: 0:1.10.3-42z1.el6_7

Detailed paths

  • Introduced through: centos:6.6@* krb5-libs@1.10.3-33.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream krb5-libs package. See Remediation section below for Centos:6 relevant versions.

Kerberos is a networked authentication system which allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos KDC. A memory leak flaw was found in the krb5_unparse_name() function of the MIT Kerberos kadmind service. An authenticated attacker could repeatedly send specially crafted requests to the server, which could cause the server to consume large amounts of memory resources, ultimately leading to a denial of service due to memory exhaustion. (CVE-2015-8631) An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure. (CVE-2015-8629) The CVE-2015-8631 issue was discovered by Simo Sorce of Red Hat. All krb5 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.

Remediation

Upgrade Centos:6 krb5-libs to version 0:1.10.3-42z1.el6_7 or higher.

medium severity

RHSA-2015:1254

  • Vulnerable module: libcurl
  • Introduced through: libcurl@7.19.7-37.el6_5.3
  • Fixed in: 0:7.19.7-46.el6

Detailed paths

  • Introduced through: centos:6.6@* libcurl@7.19.7-37.el6_5.3

NVD Description

Note: Versions mentioned in the description apply to the upstream libcurl package. See Remediation section below for Centos:6 relevant versions.

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. It was found that the libcurl library did not correctly handle partial literal IP addresses when parsing received HTTP cookies. An attacker able to trick a user into connecting to a malicious server could use this flaw to set the user's cookie to a crafted domain, making other cookie-related issues easier to exploit. (CVE-2014-3613) A flaw was found in the way the libcurl library performed the duplication of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS option for a handle, using the handle's duplicate could cause the application to crash or disclose a portion of its memory. (CVE-2014-3707) It was discovered that the libcurl library failed to properly handle URLs with embedded end-of-line characters. An attacker able to make an application using libcurl to access a specially crafted URL via an HTTP proxy could use this flaw to inject additional headers to the request or construct additional requests. (CVE-2014-8150) It was discovered that libcurl implemented aspects of the NTLM and Negotatiate authentication incorrectly. If an application uses libcurl and the affected mechanisms in a specifc way, certain requests to a previously NTLM-authenticated server could appears as sent by the wrong authenticated user. Additionally, the initial set of credentials for HTTP Negotiate-authenticated requests could be reused in subsequent requests, although a different set of credentials was specified. (CVE-2015-3143, CVE-2015-3148) Red Hat would like to thank the cURL project for reporting these issues. Bug fixes: * An out-of-protocol fallback to SSL version 3.0 (SSLv3.0) was available with libcurl. Attackers could abuse the fallback to force downgrade of the SSL version. The fallback has been removed from libcurl. Users requiring this functionality can explicitly enable SSLv3.0 through the libcurl API. (BZ#1154059) * A single upload transfer through the FILE protocol opened the destination file twice. If the inotify kernel subsystem monitored the file, two events were produced unnecessarily. The file is now opened only once per upload. (BZ#883002) * Utilities using libcurl for SCP/SFTP transfers could terminate unexpectedly when the system was running in FIPS mode. (BZ#1008178) * Using the "--retry" option with the curl utility could cause curl to terminate unexpectedly with a segmentation fault. Now, adding "--retry" no longer causes curl to crash. (BZ#1009455) * The "curl --trace-time" command did not use the correct local time when printing timestamps. Now, "curl --trace-time" works as expected. (BZ#1120196) * The valgrind utility could report dynamically allocated memory leaks on curl exit. Now, curl performs a global shutdown of the NetScape Portable Runtime (NSPR) library on exit, and valgrind no longer reports the memory leaks. (BZ#1146528) * Previously, libcurl returned an incorrect value of the CURLINFO_HEADER_SIZE field when a proxy server appended its own headers to the HTTP response. Now, the returned value is valid. (BZ#1161163) Enhancements: * The "--tlsv1.0", "--tlsv1.1", and "--tlsv1.2" options are available for specifying the minor version of the TLS protocol to be negotiated by NSS. The "--tlsv1" option now negotiates the highest version of the TLS protocol supported by both the client and the server. (BZ#1012136) * It is now possible to explicitly enable or disable the ECC and the new AES cipher suites to be used for TLS. (BZ#1058767, BZ#1156422) All curl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.

Remediation

Upgrade Centos:6 libcurl to version 0:7.19.7-46.el6 or higher.

medium severity

RHSA-2017:0847

  • Vulnerable module: libcurl
  • Introduced through: libcurl@7.19.7-37.el6_5.3
  • Fixed in: 0:7.19.7-53.el6_9

Detailed paths

  • Introduced through: centos:6.6@* libcurl@7.19.7-37.el6_5.3

NVD Description

Note: Versions mentioned in the description apply to the upstream libcurl package. See Remediation section below for Centos:6 relevant versions.

The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. (CVE-2017-2628) This issue was discovered by Paulo Andrade (Red Hat).

Remediation

Upgrade Centos:6 libcurl to version 0:7.19.7-53.el6_9 or higher.

medium severity

RHSA-2016:2674

  • Vulnerable module: libgcrypt
  • Introduced through: libgcrypt@1.4.5-11.el6_4
  • Fixed in: 0:1.4.5-12.el6_8

Detailed paths

  • Introduced through: centos:6.6@* libgcrypt@1.4.5-11.el6_4

NVD Description

Note: Versions mentioned in the description apply to the upstream libgcrypt package. See Remediation section below for Centos:6 relevant versions.

The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes. (CVE-2016-6313) Red Hat would like to thank Felix Dörre and Vladimir Klebanov for reporting this issue.

Remediation

Upgrade Centos:6 libgcrypt to version 0:1.4.5-12.el6_8 or higher.

medium severity

RHSA-2016:0428

  • Vulnerable module: libssh2
  • Introduced through: libssh2@1.4.2-1.el6
  • Fixed in: 0:1.4.2-2.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* libssh2@1.4.2-1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream libssh2 package. See Remediation section below for Centos:6 relevant versions.

The libssh2 packages provide a library that implements the SSHv2 protocol. A type confusion issue was found in the way libssh2 generated ephemeral secrets for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use significantly less secure random parameters. (CVE-2016-0787) Red Hat would like to thank Aris Adamantiadis for reporting this issue. All libssh2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing these updated packages, all running applications using libssh2 must be restarted for this update to take effect.

Remediation

Upgrade Centos:6 libssh2 to version 0:1.4.2-2.el6_7.1 or higher.

medium severity

RHSA-2014:1655

  • Vulnerable module: libxml2
  • Introduced through: libxml2@2.7.6-14.el6_5.2
  • Fixed in: 0:2.7.6-17.el6_6.1

Detailed paths

  • Introduced through: centos:6.6@* libxml2@2.7.6-14.el6_5.2

NVD Description

Note: Versions mentioned in the description apply to the upstream libxml2 package. See Remediation section below for Centos:6 relevant versions.

The libxml2 library is a development toolbox providing the implementation of various XML standards. A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior. (CVE-2014-3660) All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The desktop must be restarted (log out, then log back in) for this update to take effect.

Remediation

Upgrade Centos:6 libxml2 to version 0:2.7.6-17.el6_6.1 or higher.

medium severity

RHSA-2015:2549

  • Vulnerable module: libxml2
  • Introduced through: libxml2@2.7.6-14.el6_5.2
  • Fixed in: 0:2.7.6-20.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* libxml2@2.7.6-14.el6_5.2

NVD Description

Note: Versions mentioned in the description apply to the upstream libxml2 package. See Remediation section below for Centos:6 relevant versions.

The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) Red Hat would like to thank the GNOME project for reporting CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-8241, CVE-2015-8242, and CVE-2015-8317. Upstream acknowledges Kostya Serebryany of Google as the original reporter of CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, and CVE-2015-7500; Hugh Davenport as the original reporter of CVE-2015-8241 and CVE-2015-8242; and Hanno Boeck as the original reporter of CVE-2015-8317. All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.

Remediation

Upgrade Centos:6 libxml2 to version 0:2.7.6-20.el6_7.1 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el6_5
  • Fixed in: 0:4.21.0-1.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nspr@4.10.6-1.el6_5

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nspr to version 0:4.21.0-1.el6_10 or higher.

References

medium severity

RHSA-2016:0591

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el6_5
  • Fixed in: 0:4.11.0-0.1.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nspr@4.10.6-1.el6_5

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nss-util 3.21.0, nspr 4.11.0. (BZ#1300629, BZ#1299874, BZ#1299861) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla Project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:6 nspr to version 0:4.11.0-0.1.el6_7 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.44.0-7.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nss to version 0:3.44.0-7.el6_10 or higher.

References

medium severity

RHSA-2015:1185

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.19.1-3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Users of nss and nss-util are advised to upgrade to these updated packages, which fix these security flaws, bugs, and add these enhancements.

Remediation

Upgrade Centos:6 nss to version 0:3.19.1-3.el6_6 or higher.

medium severity

RHSA-2016:0007

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.19.1-8.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) All nss users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the NSS library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 nss to version 0:3.19.1-8.el6_7 or higher.

medium severity

RHSA-2016:0591

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.21.0-0.3.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nss-util 3.21.0, nspr 4.11.0. (BZ#1300629, BZ#1299874, BZ#1299861) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla Project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:6 nss to version 0:3.21.0-0.3.el6_7 or higher.

medium severity

RHSA-2016:2779

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.21.3-2.el6_8

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.21.3), nss-util (3.21.3). Security Fix(es): * Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) * A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) * It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635) Red Hat would like to thank the Mozilla project for reporting CVE-2016-2834. The CVE-2016-8635 issue was discovered by Hubert Kario (Red Hat). Upstream acknowledges Tyson Smith and Jed Davis as the original reporter of CVE-2016-2834.

Remediation

Upgrade Centos:6 nss to version 0:3.21.3-2.el6_8 or higher.

medium severity

RHSA-2018:2898

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.36.0-9.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.

Remediation

Upgrade Centos:6 nss to version 0:3.36.0-9.el6_10 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nss-softokn
  • Introduced through: nss-softokn@3.14.3-17.el6
  • Fixed in: 0:3.44.0-5.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-softokn@3.14.3-17.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-softokn package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nss-softokn to version 0:3.44.0-5.el6_10 or higher.

References

medium severity

RHSA-2015:1699

  • Vulnerable module: nss-softokn
  • Introduced through: nss-softokn@3.14.3-17.el6
  • Fixed in: 0:3.14.3-23.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-softokn@3.14.3-17.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-softokn package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Watson Ladd as the original reporter of this issue. All nss-softokn users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:6 nss-softokn to version 0:3.14.3-23.el6_7 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nss-softokn-freebl
  • Introduced through: nss-softokn-freebl@3.14.3-17.el6
  • Fixed in: 0:3.44.0-5.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-softokn-freebl@3.14.3-17.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-softokn-freebl package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nss-softokn-freebl to version 0:3.44.0-5.el6_10 or higher.

References

medium severity

RHSA-2015:1699

  • Vulnerable module: nss-softokn-freebl
  • Introduced through: nss-softokn-freebl@3.14.3-17.el6
  • Fixed in: 0:3.14.3-23.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-softokn-freebl@3.14.3-17.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-softokn-freebl package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Watson Ladd as the original reporter of this issue. All nss-softokn users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

Remediation

Upgrade Centos:6 nss-softokn-freebl to version 0:3.14.3-23.el6_7 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.44.0-7.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.44.0-7.el6_10 or higher.

References

medium severity

RHSA-2015:1185

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.19.1-3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Users of nss and nss-util are advised to upgrade to these updated packages, which fix these security flaws, bugs, and add these enhancements.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.19.1-3.el6_6 or higher.

medium severity

RHSA-2016:0007

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.19.1-8.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) All nss users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the NSS library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.19.1-8.el6_7 or higher.

medium severity

RHSA-2016:0591

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.21.0-0.3.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nss-util 3.21.0, nspr 4.11.0. (BZ#1300629, BZ#1299874, BZ#1299861) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla Project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.21.0-0.3.el6_7 or higher.

medium severity

RHSA-2016:2779

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.21.3-2.el6_8

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.21.3), nss-util (3.21.3). Security Fix(es): * Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) * A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) * It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635) Red Hat would like to thank the Mozilla project for reporting CVE-2016-2834. The CVE-2016-8635 issue was discovered by Hubert Kario (Red Hat). Upstream acknowledges Tyson Smith and Jed Davis as the original reporter of CVE-2016-2834.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.21.3-2.el6_8 or higher.

medium severity

RHSA-2018:2898

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.36.0-9.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.36.0-9.el6_10 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.44.0-7.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nss-tools to version 0:3.44.0-7.el6_10 or higher.

References

medium severity

RHSA-2015:1185

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.19.1-3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Users of nss and nss-util are advised to upgrade to these updated packages, which fix these security flaws, bugs, and add these enhancements.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.19.1-3.el6_6 or higher.

medium severity

RHSA-2016:0007

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.19.1-8.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) All nss users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the NSS library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.19.1-8.el6_7 or higher.

medium severity

RHSA-2016:0591

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.21.0-0.3.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nss-util 3.21.0, nspr 4.11.0. (BZ#1300629, BZ#1299874, BZ#1299861) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla Project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.21.0-0.3.el6_7 or higher.

medium severity

RHSA-2016:2779

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.21.3-2.el6_8

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.21.3), nss-util (3.21.3). Security Fix(es): * Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) * A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) * It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635) Red Hat would like to thank the Mozilla project for reporting CVE-2016-2834. The CVE-2016-8635 issue was discovered by Hubert Kario (Red Hat). Upstream acknowledges Tyson Smith and Jed Davis as the original reporter of CVE-2016-2834.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.21.3-2.el6_8 or higher.

medium severity

RHSA-2018:2898

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.36.0-9.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.36.0-9.el6_10 or higher.

medium severity

RHEA-2019:3280

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.44.0-1.el6_10

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss, nss-softokn and nss-util packages have been upgraded to upstream versions 3.44, and the nspr packages have been upgraded to upstream version 4.21. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 68 Extended Support Release. (BZ#1684609, BZ#1743623, BZ#1743625, BZ#1743628)

Remediation

Upgrade Centos:6 nss-util to version 0:3.44.0-1.el6_10 or higher.

References

medium severity

RHSA-2015:1185

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.19.1-1.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Users of nss and nss-util are advised to upgrade to these updated packages, which fix these security flaws, bugs, and add these enhancements.

Remediation

Upgrade Centos:6 nss-util to version 0:3.19.1-1.el6_6 or higher.

medium severity

RHSA-2016:0591

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.21.0-0.3.el6_7

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a newer upstream version: nss 3.21.0, nss-util 3.21.0, nspr 4.11.0. (BZ#1300629, BZ#1299874, BZ#1299861) Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (Diffie-Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Red Hat would like to thank the Mozilla Project for reporting these issues. Upstream acknowledges Eric Rescorla as the original reporter of CVE-2016-1978; and Tim Taubert as the original reporter of CVE-2016-1979.

Remediation

Upgrade Centos:6 nss-util to version 0:3.21.0-0.3.el6_7 or higher.

medium severity

RHSA-2016:2779

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.21.3-1.el6_8

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.21.3), nss-util (3.21.3). Security Fix(es): * Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) * A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) * It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635) Red Hat would like to thank the Mozilla project for reporting CVE-2016-2834. The CVE-2016-8635 issue was discovered by Hubert Kario (Red Hat). Upstream acknowledges Tyson Smith and Jed Davis as the original reporter of CVE-2016-2834.

Remediation

Upgrade Centos:6 nss-util to version 0:3.21.3-1.el6_8 or higher.

medium severity

RHSA-2015:0066

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-30.el6_6.5

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. A NULL pointer dereference flaw was found in the DTLS implementation of OpenSSL. A remote attacker could send a specially crafted DTLS message, which would cause an OpenSSL server to crash. (CVE-2014-3571) A memory leak flaw was found in the way the dtls1_buffer_record() function of OpenSSL parsed certain DTLS messages. A remote attacker could send multiple specially crafted DTLS messages to exhaust all available memory of a DTLS server. (CVE-2015-0206) It was found that OpenSSL's BigNumber Squaring implementation could produce incorrect results under certain special conditions. This flaw could possibly affect certain OpenSSL library functionality, such as RSA blinding. Note that this issue occurred rarely and with a low probability, and there is currently no known way of exploiting it. (CVE-2014-3570) It was discovered that OpenSSL would perform an ECDH key exchange with a non-ephemeral key even when the ephemeral ECDH cipher suite was selected. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method than the one requested by the user. (CVE-2014-3572) It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method. (CVE-2015-0204) Multiple flaws were found in the way OpenSSL parsed X.509 certificates. An attacker could use these flaws to modify an X.509 certificate to produce a certificate with a different fingerprint without invalidating its signature, and possibly bypass fingerprint-based blacklisting in applications. (CVE-2014-8275) It was found that an OpenSSL server would, under certain conditions, accept Diffie-Hellman client certificates without the use of a private key. An attacker could use a user's client certificate to authenticate as that user, without needing the private key. (CVE-2015-0205) All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to mitigate the above issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-30.el6_6.5 or higher.

medium severity

RHSA-2015:0715

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-30.el6_6.7

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp() function. A remote attacker could crash a TLS/SSL client or server using OpenSSL via a specially crafted X.509 certificate when the attacker-supplied certificate was verified by the application. (CVE-2015-0286) An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input (such as a PEM file) could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292) A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported. (CVE-2015-0209) An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. A remote attacker could possibly use a specially crafted ASN.1 structure that, when parsed by an application, would cause that application to crash. (CVE-2015-0287) A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate handling implementation. A specially crafted X.509 certificate could cause an application using OpenSSL to crash if the application attempted to convert the certificate to a certificate request. (CVE-2015-0288) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw. (CVE-2015-0289) Red Hat would like to thank the OpenSSL project for reporting CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, and CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSL development team as the original reporter of CVE-2015-0286, Emilia Käsper of the OpenSSL development team as the original reporter of CVE-2015-0287, Brian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski of Google as the original reporter of CVE-2015-0289, Robert Dugal and David Ramos as the original reporters of CVE-2015-0292, and Sean Burford of Google and Emilia Käsper of the OpenSSL development team as the original reporters of CVE-2015-0293. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-30.el6_6.7 or higher.

medium severity

RHSA-2015:1072

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-30.el6_6.9

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. All openssl users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-30.el6_6.9 or higher.

medium severity

RHSA-2015:1115

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-30.el6_6.11

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176) A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216) An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. (CVE-2015-1791) A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Böck as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Käsper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-30.el6_6.11 or higher.

medium severity

RHSA-2015:2617

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-42.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. (CVE-2015-3194) A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. (CVE-2015-3196) All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-42.el6_7.1 or higher.

medium severity

RHSA-2016:0008

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-42.el6_7.2

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) All openssl users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-42.el6_7.2 or higher.

medium severity

RHSA-2017:0286

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-48.el6_8.4

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731) * A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-48.el6_8.4 or higher.

medium severity

RHSA-2019:2471

  • Vulnerable module: openssl
  • Introduced through: openssl@1.0.1e-30.el6
  • Fixed in: 0:1.0.1e-58.el6_10

Detailed paths

  • Introduced through: centos:6.6@* openssl@1.0.1e-30.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openssl package. See Remediation section below for Centos:6 relevant versions.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: 0-byte record padding oracle (CVE-2019-1559) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Remediation

Upgrade Centos:6 openssl to version 0:1.0.1e-58.el6_10 or higher.

References

medium severity

RHSA-2015:1640

  • Vulnerable module: pam
  • Introduced through: pam@1.1.1-20.el6
  • Fixed in: 0:1.1.1-20.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* pam@1.1.1-20.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream pam package. See Remediation section below for Centos:6 relevant versions.

Pluggable Authentication Modules (PAM) provide a system whereby administrators can set up authentication policies without having to recompile programs to handle authentication. It was discovered that the _unix_run_helper_binary() function of PAM's unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system. (CVE-2015-3238) Red Hat would like to thank Sebastien Macke of Trustwave SpiderLabs for reporting this issue. All pam users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

Remediation

Upgrade Centos:6 pam to version 0:1.1.1-20.el6_7.1 or higher.

medium severity

RHSA-2015:1330

  • Vulnerable module: python
  • Introduced through: python@2.6.6-52.el6
  • Fixed in: 0:2.6.6-64.el6

Detailed paths

  • Introduced through: centos:6.6@* python@2.6.6-52.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream python package. See Remediation section below for Centos:6 relevant versions.

Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme, or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC). It was discovered that the socket.recvfrom_into() function failed to check the size of the supplied buffer. This could lead to a buffer overflow when the function was called with an insufficiently sized buffer. (CVE-2014-1912) It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict the sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752) It was discovered that the CGIHTTPServer module incorrectly handled URL encoded paths. A remote attacker could use this flaw to execute scripts outside of the cgi-bin directory, or disclose the source code of the scripts in the cgi-bin directory. (CVE-2014-4650) An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control these arguments could use this flaw to disclose portions of the application memory or cause it to crash. (CVE-2014-7185) These updated python packages also include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. For information on the most significant of these changes, users are directed to the following article on the Red Hat Customer Portal: https://access.redhat.com/articles/1495363 All python users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement.

Remediation

Upgrade Centos:6 python to version 0:2.6.6-64.el6 or higher.

medium severity

RHSA-2016:1626

  • Vulnerable module: python
  • Introduced through: python@2.6.6-52.el6
  • Fixed in: 0:2.6.6-66.el6_8

Detailed paths

  • Introduced through: centos:6.6@* python@2.6.6-52.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream python package. See Remediation section below for Centos:6 relevant versions.

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * It was discovered that the Python CGIHandler class did not properly protect against the HTTP_PROXY variable name clash in a CGI context. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a Python CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000110) * It was found that Python's smtplib library did not return an exception when StartTLS failed to be established in the SMTP.starttls() function. A man in the middle attacker could strip out the STARTTLS command without generating an exception on the Python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772) * It was found that the Python's httplib library (used by urllib, urllib2 and others) did not properly check HTTPConnection.putheader() function arguments. An attacker could use this flaw to inject additional headers in a Python application that allowed user provided header names or values. (CVE-2016-5699) Red Hat would like to thank Scott Geary (VendHQ) for reporting CVE-2016-1000110.

Remediation

Upgrade Centos:6 python to version 0:2.6.6-66.el6_8 or higher.

medium severity

RHSA-2015:1330

  • Vulnerable module: python-libs
  • Introduced through: python-libs@2.6.6-52.el6
  • Fixed in: 0:2.6.6-64.el6

Detailed paths

  • Introduced through: centos:6.6@* python-libs@2.6.6-52.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream python-libs package. See Remediation section below for Centos:6 relevant versions.

Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme, or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC). It was discovered that the socket.recvfrom_into() function failed to check the size of the supplied buffer. This could lead to a buffer overflow when the function was called with an insufficiently sized buffer. (CVE-2014-1912) It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict the sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752) It was discovered that the CGIHTTPServer module incorrectly handled URL encoded paths. A remote attacker could use this flaw to execute scripts outside of the cgi-bin directory, or disclose the source code of the scripts in the cgi-bin directory. (CVE-2014-4650) An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control these arguments could use this flaw to disclose portions of the application memory or cause it to crash. (CVE-2014-7185) These updated python packages also include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. For information on the most significant of these changes, users are directed to the following article on the Red Hat Customer Portal: https://access.redhat.com/articles/1495363 All python users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add this enhancement.

Remediation

Upgrade Centos:6 python-libs to version 0:2.6.6-64.el6 or higher.

medium severity

RHSA-2016:1626

  • Vulnerable module: python-libs
  • Introduced through: python-libs@2.6.6-52.el6
  • Fixed in: 0:2.6.6-66.el6_8

Detailed paths

  • Introduced through: centos:6.6@* python-libs@2.6.6-52.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream python-libs package. See Remediation section below for Centos:6 relevant versions.

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * It was discovered that the Python CGIHandler class did not properly protect against the HTTP_PROXY variable name clash in a CGI context. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a Python CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000110) * It was found that Python's smtplib library did not return an exception when StartTLS failed to be established in the SMTP.starttls() function. A man in the middle attacker could strip out the STARTTLS command without generating an exception on the Python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772) * It was found that the Python's httplib library (used by urllib, urllib2 and others) did not properly check HTTPConnection.putheader() function arguments. An attacker could use this flaw to inject additional headers in a Python application that allowed user provided header names or values. (CVE-2016-5699) Red Hat would like to thank Scott Geary (VendHQ) for reporting CVE-2016-1000110.

Remediation

Upgrade Centos:6 python-libs to version 0:2.6.6-66.el6_8 or higher.

medium severity

RHSA-2015:1634

  • Vulnerable module: sqlite
  • Introduced through: sqlite@3.6.20-1.el6
  • Fixed in: 0:3.6.20-1.el6_7.2

Detailed paths

  • Introduced through: centos:6.6@* sqlite@3.6.20-1.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream sqlite package. See Remediation section below for Centos:6 relevant versions.

SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. It was found that SQLite's sqlite3VXPrintf() function did not properly handle precision and width values during floating-point conversions. A local attacker could submit a specially crafted SELECT statement that would crash the SQLite process, or have other unspecified impacts. (CVE-2015-3416) All sqlite users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

Remediation

Upgrade Centos:6 sqlite to version 0:3.6.20-1.el6_7.2 or higher.

medium severity

RHSA-2016:2972

  • Vulnerable module: vim-minimal
  • Introduced through: vim-minimal@2:7.2.411-1.8.el6
  • Fixed in: 2:7.4.629-5.el6_8.1

Detailed paths

  • Introduced through: centos:6.6@* vim-minimal@2:7.2.411-1.8.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream vim-minimal package. See Remediation section below for Centos:6 relevant versions.

Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim. (CVE-2016-1248)

Remediation

Upgrade Centos:6 vim-minimal to version 2:7.4.629-5.el6_8.1 or higher.

low severity

RHEA-2015:1302

  • Vulnerable module: elfutils-libelf
  • Introduced through: elfutils-libelf@0.158-3.2.el6
  • Fixed in: 0:0.161-3.el6

Detailed paths

  • Introduced through: centos:6.6@* elfutils-libelf@0.158-3.2.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream elfutils-libelf package. See Remediation section below for Centos:6 relevant versions.

The elfutils packages contain a number of utility programs and libraries related to the creation and maintenance of executable code. The elfutils packages have been upgraded to upstream version 0.161, which provides a number of bug fixes and enhancements over the previous version. The most notable new features are: * The eu-stack utility supports showing inlined frames and it is now able to produce backtraces even for processes that might have some of their on-disk libraries updated or deleted. * Improved DWZ compressed DWARF multi-file support with new functions, "dwarf_getalt" and "dwarf_setalt", has been introduced. * Support for ARM 64-bit architecture and Red Hat Enterprise Linux for POWER, little endian has been added. * The libdw library now supports LZMA-compressed (.ko.xz) kernel modules. * Support for ".debug_macro" has been added; new functions has been introduced: "dwarf_getmacros_off", "dwarf_macro_getsrcfiles", "dwarf_macro_getparamcnt", and "dwarf_macro_param". * New GNU extensions to the DWARF format are now recognized. * New functions have been added to the libdw library: "dwarf_peel_type", "dwarf_cu_getdwarf", "dwarf_cu_die", "dwelf_elf_gnu_debuglink", "dwelf_dwarf_gnu_debugaltlink", "dwelf_elf_gnu_build_id". (BZ#1167724) Users of elfutils are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 elfutils-libelf to version 0:0.161-3.el6 or higher.

References

low severity

RHBA-2015:1465

  • Vulnerable module: glibc
  • Introduced through: glibc@2.12-1.149.el6
  • Fixed in: 0:2.12-1.166.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* glibc@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. This update fixes the following bug: * A race condition in the malloc API family of functions could cause a deadlock leading to gluster NFS and Fuse mounts becoming unresponsive while running large amounts of I/O. The race condition in malloc has been removed and gluster NFS and Fuse mounts no longer hang in the described situation. (BZ#1244002) Users of glibc are advised to upgrade to these updated packages, which fix this bug.

Remediation

Upgrade Centos:6 glibc to version 0:2.12-1.166.el6_7.1 or higher.

References

low severity

RHBA-2015:1465

  • Vulnerable module: glibc-common
  • Introduced through: glibc-common@2.12-1.149.el6
  • Fixed in: 0:2.12-1.166.el6_7.1

Detailed paths

  • Introduced through: centos:6.6@* glibc-common@2.12-1.149.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc-common package. See Remediation section below for Centos:6 relevant versions.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. This update fixes the following bug: * A race condition in the malloc API family of functions could cause a deadlock leading to gluster NFS and Fuse mounts becoming unresponsive while running large amounts of I/O. The race condition in malloc has been removed and gluster NFS and Fuse mounts no longer hang in the described situation. (BZ#1244002) Users of glibc are advised to upgrade to these updated packages, which fix this bug.

Remediation

Upgrade Centos:6 glibc-common to version 0:2.12-1.166.el6_7.1 or higher.

References

low severity

RHSA-2015:1447

  • Vulnerable module: grep
  • Introduced through: grep@2.6.3-6.el6
  • Fixed in: 0:2.20-3.el6

Detailed paths

  • Introduced through: centos:6.6@* grep@2.6.3-6.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream grep package. See Remediation section below for Centos:6 relevant versions.

The grep utility searches through textual input for lines that contain a match to a specified pattern and then prints the matching lines. The GNU grep utilities include grep, egrep, and fgrep. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) The grep packages have been upgraded to upstream version 2.20, which provides a number of bug fixes and enhancements over the previous version. Notably, the speed of various operations has been improved significantly. Now, the recursive grep utility uses the fts function of the gnulib library for directory traversal, so that it can handle much larger directories without reporting the "File name too long" error message, and it can operate faster when dealing with large directory hierarchies. (BZ#982215, BZ#1064668, BZ#1126757, BZ#1167766, BZ#1171806) This update also fixes the following bugs: * Prior to this update, the \w and \W symbols were inconsistently matched to the [:alnum:] character class. Consequently, regular expressions that used \w and \W in some cases had incorrect results. An upstream patch which fixes the matching problem has been applied, and \w is now matched to the [[:alnum:]] character and \W to the [^[:alnum:]] character consistently. (BZ#799863) * Previously, the "--fixed-regexp" command-line option was not included in the grep(1) manual page. Consequently, the manual page was inconsistent with the built-in help of the grep utility. To fix this bug, grep(1) has been updated to include a note informing the user that "--fixed-regexp" is an obsolete option. Now, the built-in help and manual page are consistent regarding the "--fixed-regexp" option. (BZ#1103270) * Previously, the Perl Compatible Regular Expression (PCRE) library did not work correctly when matching non-UTF-8 text in UTF-8 mode. Consequently, an error message about invalid UTF-8 byte sequence characters was returned. To fix this bug, patches from upstream have been applied to the PCRE library and the grep utility. As a result, PCRE now skips non-UTF-8 characters as non-matching text without returning any error message. (BZ#1193030) All grep users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.

Remediation

Upgrade Centos:6 grep to version 0:2.20-3.el6 or higher.

low severity

RHSA-2015:1419

  • Vulnerable module: libxml2
  • Introduced through: libxml2@2.7.6-14.el6_5.2
  • Fixed in: 0:2.7.6-20.el6

Detailed paths

  • Introduced through: centos:6.6@* libxml2@2.7.6-14.el6_5.2

NVD Description

Note: Versions mentioned in the description apply to the upstream libxml2 package. See Remediation section below for Centos:6 relevant versions.

The libxml2 library is a development toolbox providing the implementation of various XML standards. A denial of service flaw was found in the way the libxml2 library parsed certain XML files. An attacker could provide a specially crafted XML file that, when parsed by an application using libxml2, could cause that application to use an excessive amount of memory. (CVE-2015-1819) This issue was discovered by Florian Weimer of Red Hat Product Security. This update also fixes the following bug: This update fixes an error that occurred when running a test case for the serialization of HTML documents. (BZ#1004513) Users of libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.

Remediation

Upgrade Centos:6 libxml2 to version 0:2.7.6-20.el6 or higher.

low severity

RHBA-2015:0926

  • Vulnerable module: nspr
  • Introduced through: nspr@4.10.6-1.el6_5
  • Fixed in: 0:4.10.8-1.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nspr@4.10.6-1.el6_5

NVD Description

Note: Versions mentioned in the description apply to the upstream nspr package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1205064, BZ#1205065, BZ#1207052) This update also fixes the following bugs: * Previously, a race condition in NSS in some cases caused heavily threaded applications, such as the ns-slapd daemon, to terminate unexpectedly when under load. This update fixes the underlying cause, and the described crash no longer occurs. (BZ#1182902) * When using version 3.16.1-4 of the nss packages, NSS returned different cipher suites than the prior versions of NSS. This caused certain applications that add external constraints to the cipher suites, such as the Lightweight Directory Access Protocol server (LDAPS), to fail. With this update, the cipher suites table in the /nss/lib/ssl/ssl3con.c file has been adjusted to be compatible with the previous version of NSS, and the affected applications now work as expected. (BZ#1202488) Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 nspr to version 0:4.10.8-1.el6_6 or higher.

References

low severity

RHBA-2015:0926

  • Vulnerable module: nss
  • Introduced through: nss@3.16.1-14.el6
  • Fixed in: 0:3.18.0-5.3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1205064, BZ#1205065, BZ#1207052) This update also fixes the following bugs: * Previously, a race condition in NSS in some cases caused heavily threaded applications, such as the ns-slapd daemon, to terminate unexpectedly when under load. This update fixes the underlying cause, and the described crash no longer occurs. (BZ#1182902) * When using version 3.16.1-4 of the nss packages, NSS returned different cipher suites than the prior versions of NSS. This caused certain applications that add external constraints to the cipher suites, such as the Lightweight Directory Access Protocol server (LDAPS), to fail. With this update, the cipher suites table in the /nss/lib/ssl/ssl3con.c file has been adjusted to be compatible with the previous version of NSS, and the affected applications now work as expected. (BZ#1202488) Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 nss to version 0:3.18.0-5.3.el6_6 or higher.

References

low severity

RHBA-2015:0926

  • Vulnerable module: nss-sysinit
  • Introduced through: nss-sysinit@3.16.1-14.el6
  • Fixed in: 0:3.18.0-5.3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-sysinit@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-sysinit package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1205064, BZ#1205065, BZ#1207052) This update also fixes the following bugs: * Previously, a race condition in NSS in some cases caused heavily threaded applications, such as the ns-slapd daemon, to terminate unexpectedly when under load. This update fixes the underlying cause, and the described crash no longer occurs. (BZ#1182902) * When using version 3.16.1-4 of the nss packages, NSS returned different cipher suites than the prior versions of NSS. This caused certain applications that add external constraints to the cipher suites, such as the Lightweight Directory Access Protocol server (LDAPS), to fail. With this update, the cipher suites table in the /nss/lib/ssl/ssl3con.c file has been adjusted to be compatible with the previous version of NSS, and the affected applications now work as expected. (BZ#1202488) Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 nss-sysinit to version 0:3.18.0-5.3.el6_6 or higher.

References

low severity

RHBA-2015:0926

  • Vulnerable module: nss-tools
  • Introduced through: nss-tools@3.16.1-14.el6
  • Fixed in: 0:3.18.0-5.3.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-tools@3.16.1-14.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-tools package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1205064, BZ#1205065, BZ#1207052) This update also fixes the following bugs: * Previously, a race condition in NSS in some cases caused heavily threaded applications, such as the ns-slapd daemon, to terminate unexpectedly when under load. This update fixes the underlying cause, and the described crash no longer occurs. (BZ#1182902) * When using version 3.16.1-4 of the nss packages, NSS returned different cipher suites than the prior versions of NSS. This caused certain applications that add external constraints to the cipher suites, such as the Lightweight Directory Access Protocol server (LDAPS), to fail. With this update, the cipher suites table in the /nss/lib/ssl/ssl3con.c file has been adjusted to be compatible with the previous version of NSS, and the affected applications now work as expected. (BZ#1202488) Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 nss-tools to version 0:3.18.0-5.3.el6_6 or higher.

References

low severity

RHBA-2015:0926

  • Vulnerable module: nss-util
  • Introduced through: nss-util@3.16.1-3.el6
  • Fixed in: 0:3.18.0-1.el6_6

Detailed paths

  • Introduced through: centos:6.6@* nss-util@3.16.1-3.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream nss-util package. See Remediation section below for Centos:6 relevant versions.

Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release. (BZ#1205064, BZ#1205065, BZ#1207052) This update also fixes the following bugs: * Previously, a race condition in NSS in some cases caused heavily threaded applications, such as the ns-slapd daemon, to terminate unexpectedly when under load. This update fixes the underlying cause, and the described crash no longer occurs. (BZ#1182902) * When using version 3.16.1-4 of the nss packages, NSS returned different cipher suites than the prior versions of NSS. This caused certain applications that add external constraints to the cipher suites, such as the Lightweight Directory Access Protocol server (LDAPS), to fail. With this update, the cipher suites table in the /nss/lib/ssl/ssl3con.c file has been adjusted to be compatible with the previous version of NSS, and the affected applications now work as expected. (BZ#1202488) Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 nss-util to version 0:3.18.0-1.el6_6 or higher.

References

low severity

RHBA-2015:1292

  • Vulnerable module: openldap
  • Introduced through: openldap@2.4.39-8.el6
  • Fixed in: 0:2.4.40-5.el6

Detailed paths

  • Introduced through: centos:6.6@* openldap@2.4.39-8.el6

NVD Description

Note: Versions mentioned in the description apply to the upstream openldap package. See Remediation section below for Centos:6 relevant versions.

OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap packages contain configuration files, libraries, and documentation for OpenLDAP. The openldap packages have been upgraded to upstream version 2.4.40, which provides a number of bug fixes and enhancements over the previous version. (BZ#1147983) This update also fixes the following bugs: * Previously, openldap did not correctly handle when multiple processes attempted to establish an encrypted connection at the same time. Consequently, utilities, such as the nslcd service, could terminate unexpectedly with a segmentation fault. Incorrect thread initialization code that caused this bug has been fixed. As a result, utilities no longer crash when processes establish multiple concurrent encrypted connections. (BZ#1144294) * Previously, the server could terminate unexpectedly when processing SRV records due to invalid memory access. The error that caused the invalid memory access has been corrected, and the server no longer crashes when processing SRV records. (BZ#1164369) * Prior to this update, user data was deleted after updating openldap when the slapd.conf file was used to store the configuration, but the slapd.d/ directory also existed. This update fixes incorrect logic in the post-installation script, and user data is no longer deleted in this situation. (BZ#1193519) * The server sometimes terminated unexpectedly with a segmentation fault on IBM Power Systems due to a regression. A code optimization that caused this problem has been removed, preventing the segmentation fault from occurring. As a result, the server no longer crashes in this situation. (BZ#1202696) In addition, this update adds the following enhancements: * This update introduces the Check Password extension for OpenLDAP, required for PCI compliance. (BZ#1155390) * Support for the TLS protocol version 1.1 and later has been added. (BZ#1160467) Users of openldap are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Remediation

Upgrade Centos:6 openldap to version 0:2.4.40-5.el6 or higher.

References